Home | History | Annotate | Download | only in eap_common

Lines Matching refs:aka

2  * EAP peer/server: EAP-SIM/AKA/AKA' shared routines
71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN);
72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN);
73 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN);
286 * MK = PRF'(IK'|CK',"EAP-AKA'"|Identity)
297 prf_prime(key, "EAP-AKA'", identity, identity_len, NULL, 0,
302 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': K_encr",
307 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': K_aut",
312 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': K_re",
317 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': MSK", msk, EAP_MSK_LEN);
321 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': EMSK", emsk, EAP_EMSK_LEN);
334 * MK = PRF'(K_re,"EAP-AKA' re-auth"|Identity|counter|NONCE_S)
342 prf_prime(k_re, "EAP-AKA' re-auth", identity, identity_len,
348 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': MSK", msk, EAP_MSK_LEN);
352 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': EMSK", emsk, EAP_EMSK_LEN);
385 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Verify MAC - msg",
387 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Verify MAC - extra data",
389 wpa_hexdump_key(MSG_MSGDUMP, "EAP-AKA': Verify MAC - K_aut",
392 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Verify MAC: MAC",
414 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Add MAC - msg", msg, msg_len);
415 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Add MAC - extra data",
417 wpa_hexdump_key(MSG_MSGDUMP, "EAP-AKA': Add MAC - K_aut",
421 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Add MAC: MAC",
441 * AKA procedure with network name passed in there and option to use
459 wpa_printf(MSG_DEBUG, "EAP-AKA': Derive (CK',IK') from (CK,IK)");
460 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': CK", ck, EAP_AKA_CK_LEN);
461 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK", ik, EAP_AKA_IK_LEN);
462 wpa_printf(MSG_DEBUG, "EAP-AKA': FC = 0x%x", fc);
463 wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA': P0 = Access network identity",
465 wpa_hexdump(MSG_DEBUG, "EAP-AKA': P1 = SQN xor AK", sqn_ak, 6);
469 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': Key = CK || IK",
486 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': KDF output (CK' || IK')",
491 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': CK'", ck, EAP_AKA_CK_LEN);
492 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK'", ik, EAP_AKA_IK_LEN);
498 struct eap_sim_attrs *attr, int aka, int encr)
537 if ((!aka && (alen % GSM_RAND_LEN)) ||
538 (aka && alen != EAP_AKA_RAND_LEN)) {
548 wpa_printf(MSG_DEBUG, "EAP-AKA: AT_AUTN");
549 if (!aka) {
557 wpa_printf(MSG_INFO, "EAP-AKA: Invalid AT_AUTN"
638 if (aka) {
639 wpa_printf(MSG_DEBUG, "EAP-AKA: "
797 if (!aka || alen < EAP_AKA_MIN_RES_LEN ||
808 wpa_printf(MSG_DEBUG, "EAP-AKA: AT_AUTS");
809 if (!aka) {
815 wpa_printf(MSG_INFO, "EAP-AKA: Invalid AT_AUTS"
823 wpa_printf(MSG_DEBUG, "EAP-AKA: AT_CHECKCODE");
824 if (!aka) {
833 wpa_printf(MSG_INFO, "EAP-AKA: Invalid "
858 if (aka != 2) {
859 wpa_printf(MSG_INFO, "EAP-AKA: Unexpected "
864 wpa_printf(MSG_DEBUG, "EAP-AKA: AT_KDF_INPUT");
869 wpa_printf(MSG_INFO, "EAP-AKA': Invalid "
880 if (aka != 2) {
881 wpa_printf(MSG_INFO, "EAP-AKA: Unexpected "
886 wpa_printf(MSG_DEBUG, "EAP-AKA: AT_KDF");
888 wpa_printf(MSG_INFO, "EAP-AKA': Invalid "
894 wpa_printf(MSG_DEBUG, "EAP-AKA': Too many "
902 wpa_printf(MSG_DEBUG, "EAP-AKA: AT_BIDDING");
904 wpa_printf(MSG_INFO, "EAP-AKA: Invalid "
929 "(aka=%d encr=%d)", aka, encr);
937 struct eap_sim_attrs *attr, int aka)
959 aka, 1)) {
1168 void eap_sim_report_notification(void *msg_ctx, int notification, int aka)
1171 const char *type = aka ? "AKA" : "SIM";