/external/wpa_supplicant/ |
eap_aka.c | 33 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data 79 data->autn, data->res, &data->res_len, 89 u8 autn[EAP_AKA_AUTN_LEN]; 90 os_memset(autn, '1', EAP_AKA_AUTN_LEN); 91 if (os_memcmp(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) { 92 wpa_printf(MSG_WARNING, "EAP-AKA: AUTN did not match " 435 if (!attr->mac || !attr->rand || !attr->autn) { 440 !attr->autn ? " AT_AUTN" : ""); 445 os_memcpy(data->autn, attr->autn, EAP_AKA_AUTN_LEN) [all...] |
eap_sim_common.h | 131 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
|
/external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/ |
hlr_auc_gw.c | 30 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> 37 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings. 471 /* AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> */ 474 u8 autn[EAP_AKA_AUTN_LEN]; local 492 autn, ik, ck, res, &res_len); 498 memset(autn, '1', EAP_AKA_AUTN_LEN); 516 pos += wpa_snprintf_hex(pos, end - pos, autn, EAP_AKA_AUTN_LEN);
|
/external/wpa_supplicant_8/hostapd/ |
hlr_auc_gw.c | 30 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> 37 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings. 472 /* AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> */ 475 u8 autn[EAP_AKA_AUTN_LEN]; local 493 autn, ik, ck, res, &res_len); 499 memset(autn, '1', EAP_AKA_AUTN_LEN); 517 pos += wpa_snprintf_hex(pos, end - pos, autn, EAP_AKA_AUTN_LEN);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_aka.c | 40 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data 154 data->autn, data->res, &data->res_len, 187 return milenage_check(opc, k, sqn, data->rand, data->autn, 204 u8 autn[EAP_AKA_AUTN_LEN]; local 205 os_memset(autn, '1', EAP_AKA_AUTN_LEN); 206 if (os_memcmp(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) { 207 wpa_printf(MSG_WARNING, "EAP-AKA: AUTN did not match " 692 /* No matching KDF found - fail authentication as if AUTN had been 774 /* Fail authentication as if AUTN had been incorrect * [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_aka.c | 35 u8 autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data 373 eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN); 694 identity_len, data->rand, data->autn, 706 /* Note: AUTN = (SQN ^ AK) || AMF || MAC which gives us the 709 data->autn, [all...] |
eap_sim_db.c | 56 u8 autn[EAP_AKA_AUTN_LEN]; member in struct:eap_sim_db_pending::__anon13927::__anon13929 194 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> 196 * (IMSI = ASCII string, RAND/AUTN/IK/CK/RES = hex string) 228 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN)) 1152 * @autn: Buffer for AUTN value 1175 size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_aka.c | 38 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data 152 data->autn, data->res, &data->res_len, 185 return milenage_check(opc, k, sqn, data->rand, data->autn, 202 u8 autn[EAP_AKA_AUTN_LEN]; local 203 os_memset(autn, '1', EAP_AKA_AUTN_LEN); 204 if (os_memcmp(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) { 205 wpa_printf(MSG_WARNING, "EAP-AKA: AUTN did not match " 690 /* No matching KDF found - fail authentication as if AUTN had been 772 /* Fail authentication as if AUTN had been incorrect * [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_aka.c | 35 u8 autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data 373 eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN); 694 identity_len, data->rand, data->autn, 706 /* Note: AUTN = (SQN ^ AK) || AMF || MAC which gives us the 709 data->autn, [all...] |
eap_sim_db.c | 57 u8 autn[EAP_AKA_AUTN_LEN]; member in struct:eap_sim_db_pending::__anon14147::__anon14149 195 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> 197 * (IMSI = ASCII string, RAND/AUTN/IK/CK/RES = hex string) 229 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN)) 1153 * @autn: Buffer for AUTN value 1176 size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sim_common.h | 190 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.h | 190 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
|