Lines Matching +full:128 +full:k
27 * @opc: OPc = 128-bit value derived from OP and K
28 * @k: K = 128-bit subscriber key
29 * @_rand: RAND = 128-bit random challenge
36 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, in milenage_f1() argument
45 if (aes_128_encrypt_block(k, tmp1, tmp1)) in milenage_f1()
64 if (aes_128_encrypt_block(k, tmp3, tmp1)) in milenage_f1()
78 * @opc: OPc = 128-bit value derived from OP and K
79 * @k: K = 128-bit subscriber key
80 * @_rand: RAND = 128-bit random challenge
82 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
83 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL
88 int milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, in milenage_f2345() argument
97 if (aes_128_encrypt_block(k, tmp1, tmp2)) in milenage_f2345()
111 if (aes_128_encrypt_block(k, tmp1, tmp3)) in milenage_f2345()
126 if (aes_128_encrypt_block(k, tmp1, ck)) in milenage_f2345()
138 if (aes_128_encrypt_block(k, tmp1, ik)) in milenage_f2345()
150 if (aes_128_encrypt_block(k, tmp1, tmp1)) in milenage_f2345()
162 * @opc: OPc = 128-bit operator variant algorithm configuration field (encr.)
164 * @k: K = 128-bit subscriber key
166 * @_rand: RAND = 128-bit random challenge
167 * @autn: Buffer for AUTN = 128-bit authentication token
168 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL
169 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
173 void milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, in milenage_generate() argument
184 if (milenage_f1(opc, k, _rand, sqn, amf, mac_a, NULL) || in milenage_generate()
185 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { in milenage_generate()
201 * @opc: OPc = 128-bit operator variant algorithm configuration field (encr.)
202 * @k: K = 128-bit subscriber key
203 * @_rand: RAND = 128-bit random challenge
208 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, in milenage_auts() argument
215 if (milenage_f2345(opc, k, _rand, NULL, NULL, NULL, NULL, ak)) in milenage_auts()
219 if (milenage_f1(opc, k, _rand, sqn, amf, NULL, mac_s) || in milenage_auts()
228 * @opc: OPc = 128-bit operator variant algorithm configuration field (encr.)
229 * @k: K = 128-bit subscriber key
230 * @_rand: RAND = 128-bit random challenge
235 int gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, u8 *kc) in gsm_milenage() argument
240 if (milenage_f2345(opc, k, _rand, res, ck, ik, NULL, NULL)) in gsm_milenage()
258 * @opc: OPc = 128-bit operator variant algorithm configuration field (encr.)
259 * @k: K = 128-bit subscriber key
261 * @_rand: RAND = 128-bit random challenge
262 * @autn: AUTN = 128-bit authentication token
263 * @ik: Buffer for IK = 128-bit integrity key (f4), or %NULL
264 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL
270 int milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, in milenage_check() argument
281 if (milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) in milenage_check()
297 if (milenage_f2345(opc, k, _rand, NULL, NULL, NULL, NULL, ak)) in milenage_check()
302 if (milenage_f1(opc, k, _rand, sqn, auts_amf, NULL, auts + 6)) in milenage_check()
310 if (milenage_f1(opc, k, _rand, rx_sqn, amf, mac_a, NULL)) in milenage_check()