/hostap-latest/tests/ |
D | test-milenage.c | 32 u8 kc[8]; member 787 u8 sres[4], kc[8]; in main() local 790 gsm_milenage(g->opc, g->ki, g->rand, sres, kc); in main() 791 if (memcmp(g->kc, kc, 8) != 0) { in main()
|
/hostap-latest/hostapd/ |
D | hlr_auc_gw.c | 74 u8 kc[8]; member 326 if (!pos || os_strlen(pos) != 16 || hexstr2bin(pos, g->kc, 8)) { in read_gsm_triplets() 617 u8 _rand[16], sres[4], kc[8]; in sim_req_auth() local 621 gsm_milenage(m->opc, m->ki, _rand, sres, kc); in sim_req_auth() 623 rpos += wpa_snprintf_hex(rpos, rend - rpos, kc, 8); in sim_req_auth() 640 rpos += wpa_snprintf_hex(rpos, rend - rpos, g->kc, 8); in sim_req_auth() 684 u8 _rand[16], sres[4], kc[8]; in gsm_auth_req() local 688 gsm_milenage(m->opc, m->ki, _rand, sres, kc); in gsm_auth_req() 690 rpos += wpa_snprintf_hex(rpos, rend - rpos, kc, 8); in gsm_auth_req()
|
/hostap-latest/src/eap_peer/ |
D | eap_sim.c | 28 u8 kc[3][EAP_SIM_KC_LEN]; member 181 os_memset(data->kc, 0, 3 * EAP_SIM_KC_LEN); in eap_sim_clear_keys() 248 if (hexstr2bin(pos, data->kc[i], EAP_SIM_KC_LEN) < 0) in eap_sim_ext_sim_result() 251 data->kc[i], EAP_SIM_KC_LEN); in eap_sim_ext_sim_result() 299 data->sres[0], data->kc[0]) || in eap_sim_gsm_auth() 301 data->sres[1], data->kc[1]) || in eap_sim_gsm_auth() 304 data->sres[2], data->kc[2]))) { in eap_sim_gsm_auth() 338 data->sres[i], data->kc[i])) { in eap_sim_gsm_auth() 349 data->kc[i], EAP_SIM_KC_LEN); in eap_sim_gsm_auth() 368 os_memcpy(data->kc[i], in eap_sim_gsm_auth() [all …]
|
/hostap-latest/src/utils/ |
D | pcsc_funcs.h | 20 unsigned char *sres, unsigned char *kc);
|
D | pcsc_funcs.c | 1242 unsigned char *sres, unsigned char *kc) in scard_gsm_auth() argument 1296 os_memcpy(kc, buf + 4, 8); in scard_gsm_auth() 1310 os_memcpy(kc, buf + 6, 8); in scard_gsm_auth() 1314 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - Kc", kc, 8); in scard_gsm_auth()
|
/hostap-latest/src/crypto/ |
D | milenage.c | 235 int gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, u8 *kc) in gsm_milenage() argument 244 kc[i] = ck[i] ^ ck[i + 8] ^ ik[i] ^ ik[i + 8]; in gsm_milenage()
|
D | milenage.h | 18 u8 *kc);
|
/hostap-latest/wpa_supplicant/ |
D | eapol_test.c | 1100 unsigned char kc[8]; in scard_test() local 1142 if (scard_gsm_auth(scard, _rand, sres, kc)) in scard_test() 1146 if (scard_gsm_auth(scard, _rand, sres, kc)) in scard_test() 1208 unsigned char kc[8]; in scard_get_triplets() local 1242 if (scard_gsm_auth(scard, _rand, sres, kc)) in scard_get_triplets() 1250 printf("%02X", kc[j]); in scard_get_triplets()
|
/hostap-latest/src/eap_server/ |
D | eap_sim_db.h | 42 u8 *_rand, u8 *kc, u8 *sres,
|
D | eap_sim_db.c | 44 u8 kc[EAP_SIM_MAX_CHAL][EAP_SIM_KC_LEN]; member 496 if (hexstr2bin(start, entry->u.sim.kc[num_chal], in eap_sim_db_sim_resp_auth() 927 u8 *_rand, u8 *kc, u8 *sres, in eap_sim_db_get_gsm_triplets() argument 971 os_memcpy(kc, entry->u.sim.kc, num_chal * EAP_SIM_KC_LEN); in eap_sim_db_get_gsm_triplets()
|
D | eap_server_sim.c | 28 u8 kc[EAP_SIM_MAX_CHAL][EAP_SIM_KC_LEN]; member 663 (u8 *) data->rand, (u8 *) data->kc, (u8 *) data->sres, sm); in eap_sim_process_start() 692 data->num_chal, (const u8 *) data->kc, data->mk); in eap_sim_process_start()
|
/hostap-latest/src/eap_common/ |
D | eap_sim_common.h | 77 int num_chal, const u8 *kc, u8 *mk);
|
D | eap_sim_common.c | 31 int num_chal, const u8 *kc, u8 *mk) in eap_sim_derive_mk() argument 39 addr[1] = kc; in eap_sim_derive_mk()
|