HomeSort by relevance Sort by last modified time
    Searched refs:autn (Results 1 - 16 of 16) sorted by null

  /external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/
milenage.h 19 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik,
26 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
hlr_auc_gw.c 30 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES>
37 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings.
471 /* AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> */
474 u8 autn[EAP_AKA_AUTN_LEN]; local
492 autn, ik, ck, res, &res_len);
498 memset(autn, '1', EAP_AKA_AUTN_LEN);
516 pos += wpa_snprintf_hex(pos, end - pos, autn, EAP_AKA_AUTN_LEN);
milenage.c 167 * milenage_generate - Generate AKA AUTN,IK,CK,RES
173 * @autn: Buffer for AUTN = 128-bit authentication token
180 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik,
197 /* AUTN = (SQN ^ AK) || AMF || MAC */
199 autn[i] = sqn[i] ^ ak[i];
200 os_memcpy(autn + 6, amf, 2);
201 os_memcpy(autn + 8, mac_a, 8);
263 * milenage_generate - Generate AKA AUTN,IK,CK,RES
268 * @autn: AUTN = 128-bit authentication toke
    [all...]
  /external/wpa_supplicant/
pcsc_funcs.h 53 const unsigned char *autn,
eap_aka.c 33 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data
79 data->autn, data->res, &data->res_len,
89 u8 autn[EAP_AKA_AUTN_LEN];
90 os_memset(autn, '1', EAP_AKA_AUTN_LEN);
91 if (os_memcmp(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) {
92 wpa_printf(MSG_WARNING, "EAP-AKA: AUTN did not match "
435 if (!attr->mac || !attr->rand || !attr->autn) {
440 !attr->autn ? " AT_AUTN" : "");
445 os_memcpy(data->autn, attr->autn, EAP_AKA_AUTN_LEN)
    [all...]
eap_sim_common.h 131 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
pcsc_funcs.c 38 * RUN UMTS ALG: 88 00 81 <len=0x22> data: 0x10 | RAND | 0x10 | AUTN
1123 * @autn: 16-byte AUTN value from HLR/AuC
1133 * RAND and AUTN values from HLR/AuC. If authentication command can be
1140 const unsigned char *autn,
1161 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS auth - AUTN", autn, AKA_AUTN_LEN);
1165 os_memcpy(cmd + 6 + AKA_RAND_LEN + 1, autn, AKA_AUTN_LEN);
    [all...]
eap_sim_common.c 297 attr->autn = apos;
  /external/wpa_supplicant_6/wpa_supplicant/src/utils/
pcsc_funcs.h 53 const unsigned char *autn,
pcsc_funcs.c 38 * RUN UMTS ALG: 88 00 81 <len=0x22> data: 0x10 | RAND | 0x10 | AUTN
1123 * @autn: 16-byte AUTN value from HLR/AuC
1133 * RAND and AUTN values from HLR/AuC. If authentication command can be
1140 const unsigned char *autn,
1161 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS auth - AUTN", autn, AKA_AUTN_LEN);
1165 os_memcpy(cmd + 6 + AKA_RAND_LEN + 1, autn, AKA_AUTN_LEN);
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_sim_db.h 85 size_t identity_len, u8 *_rand, u8 *autn, u8 *ik,
eap_sim_db.c 56 u8 autn[EAP_AKA_AUTN_LEN]; member in struct:eap_sim_db_pending::__anon8508::__anon8510
194 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES>
196 * (IMSI = ASCII string, RAND/AUTN/IK/CK/RES = hex string)
228 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN))
1152 * @autn: Buffer for AUTN value
1175 size_t identity_len, u8 *_rand, u8 *autn, u8 *ik,
    [all...]
eap_aka.c 35 u8 autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data
373 eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN);
694 identity_len, data->rand, data->autn,
706 /* Note: AUTN = (SQN ^ AK) || AMF || MAC which gives us the
709 data->autn,
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_aka.c 40 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data
154 data->autn, data->res, &data->res_len,
187 return milenage_check(opc, k, sqn, data->rand, data->autn,
204 u8 autn[EAP_AKA_AUTN_LEN]; local
205 os_memset(autn, '1', EAP_AKA_AUTN_LEN);
206 if (os_memcmp(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) {
207 wpa_printf(MSG_WARNING, "EAP-AKA: AUTN did not match "
692 /* No matching KDF found - fail authentication as if AUTN had been
774 /* Fail authentication as if AUTN had been incorrect *
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sim_common.h 190 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
eap_sim_common.c 567 attr->autn = apos;

Completed in 467 milliseconds