/external/wpa_supplicant_8/src/crypto/ |
milenage.c | 161 * milenage_generate - Generate AKA AUTN,IK,CK,RES 167 * @autn: Buffer for AUTN = 128-bit authentication token 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 191 /* AUTN = (SQN ^ AK) || AMF || MAC */ 193 autn[i] = sqn[i] ^ ak[i]; 194 os_memcpy(autn + 6, amf, 2); 195 os_memcpy(autn + 8, mac_a, 8); 257 * milenage_generate - Generate AKA AUTN,IK,CK,RES 262 * @autn: AUTN = 128-bit authentication toke [all...] |
milenage.h | 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
/external/wpa_supplicant_8/src/utils/ |
pcsc_funcs.h | 29 const unsigned char *autn,
|
pcsc_funcs.c | 32 * RUN UMTS ALG: 88 00 81 <len=0x22> data: 0x10 | RAND | 0x10 | AUTN [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.h | 86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
|
eap_sim_db.c | 52 u8 autn[EAP_AKA_AUTN_LEN]; member in struct:eap_sim_db_pending::__anon31609::__anon31611 487 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> 489 * (IMSI = ASCII string, RAND/AUTN/IK/CK/RES = hex string) 521 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN)) [all...] |
eap_server_aka.c | 29 u8 autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data 477 eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN); 790 data->rand, data->autn, data->ik, 801 /* Note: AUTN = (SQN ^ AK) || AMF || MAC which gives us the 804 data->autn, [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_aka.c | 32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data 156 data->autn, data->res, &data->res_len, 189 return milenage_check(opc, k, sqn, data->rand, data->autn, 206 u8 autn[EAP_AKA_AUTN_LEN]; local 207 os_memset(autn, '1', EAP_AKA_AUTN_LEN); 208 if (os_memcmp(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) { 209 wpa_printf(MSG_WARNING, "EAP-AKA: AUTN did not match " 719 /* No matching KDF found - fail authentication as if AUTN had been 801 /* Fail authentication as if AUTN had been incorrect * [all...] |
/external/wpa_supplicant_8/hostapd/ |
hlr_auc_gw.c | 24 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> 31 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings. 717 /* AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> */ 720 u8 autn[EAP_AKA_AUTN_LEN]; local 743 autn, ik, ck, res, &res_len); 749 memset(autn, '1', EAP_AKA_AUTN_LEN); 774 pos += wpa_snprintf_hex(pos, end - pos, autn, EAP_AKA_AUTN_LEN);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.h | 184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
|
eap_sim_common.c | 562 attr->autn = apos;
|