/external/wpa_supplicant_8/src/crypto/ |
milenage.c | 31 * @amf: AMF = 16-bit authentication management field 37 const u8 *sqn, const u8 *amf, u8 *mac_a, u8 *mac_s) 48 /* tmp2 = IN1 = SQN || AMF || SQN || AMF */ 50 os_memcpy(tmp2 + 6, amf, 2); 163 * @amf: AMF = 16-bit authentication management field 173 void milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, 184 if (milenage_f1(opc, k, _rand, sqn, amf, mac_a, NULL) | 211 u8 amf[2] = { 0x00, 0x00 }; \/* TS 33.102 v7.0.0, 6.3.3 *\/ local 276 const u8 *amf; local [all...] |
/external/wpa_supplicant_8/hostapd/ |
hlr_auc_gw.c | 81 /* OPc and AMF parameters for Milenage (Example algorithms for AKA). */ 87 u8 amf[2]; member in struct:milenage_parameters 128 " amf CHAR(4) NOT NULL," 185 if (os_strcmp(col[i], "amf") == 0 && argv[i] && 186 hexstr2bin(argv[i], m->amf, sizeof(m->amf))) { 187 printf("Invalid amf value in database\n"); 407 /* Parse IMSI Ki OPc AMF SQN [RES_len] */ 454 /* AMF */ 456 if (!pos || os_strlen(pos) != 4 || hexstr2bin(pos, m->amf, 2)) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_aka.c | 980 /* Note: AUTN = (SQN ^ AK) || AMF || MAC which gives us the 982 u16 amf = WPA_GET_BE16(data->autn + 6); local 983 if (!(amf & 0x8000)) { 984 wpa_printf(MSG_WARNING, "EAP-AKA': AMF separation bit " 985 "not set (AMF=0x%4x)", amf); [all...] |