Home | History | Annotate | Download | only in eap_peer

Lines Matching refs:autn

32 	u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN];
141 os_memset(data->autn, 0, EAP_AKA_AUTN_LEN);
172 wpa_snprintf_hex(pos, end - pos, data->autn, EAP_AKA_AUTN_LEN);
263 data->autn, data->res, &data->res_len,
296 return milenage_check(opc, k, sqn, data->rand, data->autn,
313 u8 autn[EAP_AKA_AUTN_LEN];
314 os_memset(autn, '1', EAP_AKA_AUTN_LEN);
315 if (os_memcmp_const(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) {
316 wpa_printf(MSG_WARNING, "EAP-AKA: AUTN did not match "
830 /* No matching KDF found - fail authentication as if AUTN had been
912 /* Fail authentication as if AUTN had been incorrect */
947 /* Fail authentication as if AUTN had been incorrect */
954 if (!attr->mac || !attr->rand || !attr->autn) {
959 !attr->autn ? " AT_AUTN" : "");
964 os_memcpy(data->autn, attr->autn, EAP_AKA_AUTN_LEN);
969 "failed (AUTN)");
973 "failed (AUTN seq# -> AUTS)");
985 /* Note: AUTN = (SQN ^ AK) || AMF || MAC which gives us the
987 u16 amf = WPA_GET_BE16(data->autn + 6);
994 data->autn,
1471 os_memcpy(id + 1 + EAP_AKA_RAND_LEN, data->autn, EAP_AKA_AUTN_LEN);