Searched defs:auts (Results 1 - 17 of 17) sorted by relevance

/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dmilenage.c204 * @auts: AUTS = 112-bit authentication token from client
208 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, argument
218 sqn[i] = auts[i] ^ ak[i];
220 os_memcmp_const(mac_s, auts + 6, 8) != 0)
267 * @auts: 112-bit buffer for AUTS
272 u8 *auts)
301 auts[i] = sqn[i] ^ ak[i];
302 if (milenage_f1(opc, k, _rand, sqn, auts_amf, NULL, auts + 6))
304 wpa_hexdump(MSG_DEBUG, "Milenage: AUTS", auts, 14);
270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument
/external/wpa_supplicant_8/src/crypto/
H A Dmilenage.c204 * @auts: AUTS = 112-bit authentication token from client
208 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, argument
218 sqn[i] = auts[i] ^ ak[i];
220 os_memcmp_const(mac_s, auts + 6, 8) != 0)
267 * @auts: 112-bit buffer for AUTS
272 u8 *auts)
301 auts[i] = sqn[i] ^ ak[i];
302 if (milenage_f1(opc, k, _rand, sqn, auts_amf, NULL, auts + 6))
304 wpa_hexdump(MSG_DEBUG, "Milenage: AUTS", auts, 14);
270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dmilenage.c204 * @auts: AUTS = 112-bit authentication token from client
208 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, argument
218 sqn[i] = auts[i] ^ ak[i];
220 os_memcmp_const(mac_s, auts + 6, 8) != 0)
267 * @auts: 112-bit buffer for AUTS
272 u8 *auts)
301 auts[i] = sqn[i] ^ ak[i];
302 if (milenage_f1(opc, k, _rand, sqn, auts_amf, NULL, auts + 6))
304 wpa_hexdump(MSG_DEBUG, "Milenage: AUTS", auts, 14);
270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument
/external/wpa_supplicant_8/hostapd/
H A Dhlr_auc_gw.c813 char *auts, *__rand; local
821 auts = strchr(imsi, ' ');
822 if (auts == NULL)
824 *auts++ = '\0';
826 __rand = strchr(auts, ' ');
833 imsi, auts, __rand);
835 if (hexstr2bin(auts, _auts, EAP_AKA_AUTS_LEN) ||
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sim_common.h186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_aka.c33 u8 auts[EAP_AKA_AUTS_LEN]; member in struct:eap_aka_data
142 os_memset(data->auts, 0, EAP_AKA_AUTS_LEN);
192 if (hexstr2bin(pos, data->auts, EAP_AKA_AUTS_LEN) < 0)
194 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: AUTS", data->auts,
264 data->ik, data->ck, data->auts);
298 data->res, &data->res_len, data->auts);
590 eap_sim_msg_add_full(msg, EAP_SIM_AT_AUTS, data->auts,
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_sim_db.c1479 * @auts: AUTS value from the peer
1491 const u8 *auts, const u8 *_rand)
1525 auts, EAP_AKA_AUTS_LEN);
1489 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument
/external/wpa_supplicant_8/hostapd/src/utils/
H A Dpcsc_funcs.c1329 * @auts: 14-byte buffer for AUTS
1337 * synchronization failure, the received AUTS value will be written into auts
1343 unsigned char *ik, unsigned char *ck, unsigned char *auts)
1397 os_memcpy(auts, buf + 2, AKA_AUTS_LEN);
1398 wpa_hexdump(MSG_DEBUG, "SCARD: AUTS", auts, AKA_AUTS_LEN);
1340 scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, const unsigned char *autn, unsigned char *res, size_t *res_len, unsigned char *ik, unsigned char *ck, unsigned char *auts) argument
/external/wpa_supplicant_8/src/eap_common/
H A Deap_sim_common.h186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_aka.c33 u8 auts[EAP_AKA_AUTS_LEN]; member in struct:eap_aka_data
142 os_memset(data->auts, 0, EAP_AKA_AUTS_LEN);
192 if (hexstr2bin(pos, data->auts, EAP_AKA_AUTS_LEN) < 0)
194 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: AUTS", data->auts,
264 data->ik, data->ck, data->auts);
298 data->res, &data->res_len, data->auts);
590 eap_sim_msg_add_full(msg, EAP_SIM_AT_AUTS, data->auts,
/external/wpa_supplicant_8/src/eap_server/
H A Deap_sim_db.c1479 * @auts: AUTS value from the peer
1491 const u8 *auts, const u8 *_rand)
1525 auts, EAP_AKA_AUTS_LEN);
1489 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument
/external/wpa_supplicant_8/src/utils/
H A Dpcsc_funcs.c1329 * @auts: 14-byte buffer for AUTS
1337 * synchronization failure, the received AUTS value will be written into auts
1343 unsigned char *ik, unsigned char *ck, unsigned char *auts)
1397 os_memcpy(auts, buf + 2, AKA_AUTS_LEN);
1398 wpa_hexdump(MSG_DEBUG, "SCARD: AUTS", auts, AKA_AUTS_LEN);
1340 scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, const unsigned char *autn, unsigned char *res, size_t *res_len, unsigned char *ik, unsigned char *ck, unsigned char *auts) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_sim_common.h186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_aka.c33 u8 auts[EAP_AKA_AUTS_LEN]; member in struct:eap_aka_data
142 os_memset(data->auts, 0, EAP_AKA_AUTS_LEN);
192 if (hexstr2bin(pos, data->auts, EAP_AKA_AUTS_LEN) < 0)
194 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: AUTS", data->auts,
264 data->ik, data->ck, data->auts);
298 data->res, &data->res_len, data->auts);
590 eap_sim_msg_add_full(msg, EAP_SIM_AT_AUTS, data->auts,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_sim_db.c1479 * @auts: AUTS value from the peer
1491 const u8 *auts, const u8 *_rand)
1525 auts, EAP_AKA_AUTS_LEN);
1489 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument
/external/wpa_supplicant_8/wpa_supplicant/src/utils/
H A Dpcsc_funcs.c1329 * @auts: 14-byte buffer for AUTS
1337 * synchronization failure, the received AUTS value will be written into auts
1343 unsigned char *ik, unsigned char *ck, unsigned char *auts)
1397 os_memcpy(auts, buf + 2, AKA_AUTS_LEN);
1398 wpa_hexdump(MSG_DEBUG, "SCARD: AUTS", auts, AKA_AUTS_LEN);
1340 scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, const unsigned char *autn, unsigned char *res, size_t *res_len, unsigned char *ik, unsigned char *ck, unsigned char *auts) argument
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.0/
H A Dsta_network.cpp621 const hidl_array<uint8_t, 14> &auts,
627 auts);
1582 const std::array<uint8_t, 14> &auts)
1585 uint32_t auts_hex_len = auts.size() * 2 + 1;
1588 auts_hex.data(), auts_hex.size(), auts.data(), auts.size());
1600 MSG_DEBUG, "network sim umts auts response param",
620 sendNetworkEapSimUmtsAutsResponse( const hidl_array<uint8_t, 14> &auts, sendNetworkEapSimUmtsAutsResponse_cb _hidl_cb) argument
1581 sendNetworkEapSimUmtsAutsResponseInternal( const std::array<uint8_t, 14> &auts) argument

Completed in 407 milliseconds