/external/wpa_supplicant_8/src/crypto/ |
milenage.h | 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 16 u8 *sqn); 19 int milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, 23 const u8 *sqn, const u8 *amf, u8 *mac_a, u8 *mac_s);
|
milenage.c | 30 * @sqn: SQN = 48-bit sequence number 37 const u8 *sqn, const u8 *amf, u8 *mac_a, u8 *mac_s) 48 /* tmp2 = IN1 = SQN || AMF || SQN || AMF */ 49 os_memcpy(tmp2, sqn, 6); 165 * @sqn: SQN = 48-bit sequence number 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 184 if (milenage_f1(opc, k, _rand, sqn, amf, mac_a, NULL) | [all...] |
/external/wpa_supplicant_8/hostapd/ |
hlr_auc_gw.c | 39 * SQN generation follows the not time-based Profile 2 described in 80 u8 sqn[6]; member in struct:milenage_parameters 119 " sqn CHAR(12) NOT NULL" 180 if (os_strcmp(col[i], "sqn") == 0 && argv[i] && 181 hexstr2bin(argv[i], m->sqn, sizeof(m->sqn))) { 182 printf("Invalid sqn value in database\n"); 201 "SELECT ki,opc,amf,sqn FROM milenage WHERE imsi=%llu;", 218 pos += wpa_snprintf_hex(pos, sizeof(val), m->sqn, 6); 221 "UPDATE milenage SET sqn='%s' WHERE imsi=%s;" 795 u8 _auts[EAP_AKA_AUTS_LEN], _rand[EAP_AKA_RAND_LEN], sqn[6]; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_aka.c | 162 u8 opc[16], k[16], sqn[6]; local 186 if (hexstr2bin(pos, sqn, 6)) 189 return milenage_check(opc, k, sqn, data->rand, data->autn, 871 /* Note: AUTN = (SQN ^ AK) || AMF || MAC which gives us the 872 * needed 6-octet SQN ^ AK for CK',IK' derivation */ [all...] |