HomeSort by relevance Sort by last modified time
    Searched defs:autn (Results 1 - 5 of 5) sorted by null

  /external/wpa_supplicant_8/hostapd/
hlr_auc_gw.c 24 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES>
31 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings.
717 /* AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> */
720 u8 autn[EAP_AKA_AUTN_LEN]; local
743 autn, ik, ck, res, &res_len);
749 memset(autn, '1', EAP_AKA_AUTN_LEN);
774 pos += wpa_snprintf_hex(pos, end - pos, autn, EAP_AKA_AUTN_LEN);
  /external/wpa_supplicant_8/src/eap_server/
eap_server_aka.c 29 u8 autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data
477 eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN);
790 data->rand, data->autn, data->ik,
801 /* Note: AUTN = (SQN ^ AK) || AMF || MAC which gives us the
804 data->autn,
    [all...]
eap_sim_db.c 52 u8 autn[EAP_AKA_AUTN_LEN]; member in struct:eap_sim_db_pending::__anon31609::__anon31611
487 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES>
489 * (IMSI = ASCII string, RAND/AUTN/IK/CK/RES = hex string)
521 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN))
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.h 184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
  /external/wpa_supplicant_8/src/eap_peer/
eap_aka.c 32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data
156 data->autn, data->res, &data->res_len,
189 return milenage_check(opc, k, sqn, data->rand, data->autn,
206 u8 autn[EAP_AKA_AUTN_LEN]; local
207 os_memset(autn, '1', EAP_AKA_AUTN_LEN);
208 if (os_memcmp(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) {
209 wpa_printf(MSG_WARNING, "EAP-AKA: AUTN did not match "
719 /* No matching KDF found - fail authentication as if AUTN had been
801 /* Fail authentication as if AUTN had been incorrect *
    [all...]

Completed in 1090 milliseconds