/external/wpa_supplicant_8/src/crypto/ |
milenage.h | 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 16 u8 *sqn); 19 int milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, 23 const u8 *sqn, const u8 *amf, u8 *mac_a, u8 *mac_s);
|
milenage.c | 30 * @sqn: SQN = 48-bit sequence number 37 const u8 *sqn, const u8 *amf, u8 *mac_a, u8 *mac_s) 48 /* tmp2 = IN1 = SQN || AMF || SQN || AMF */ 49 os_memcpy(tmp2, sqn, 6); 165 * @sqn: SQN = 48-bit sequence number 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 184 if (milenage_f1(opc, k, _rand, sqn, amf, mac_a, NULL) | [all...] |
/external/wpa_supplicant_8/hostapd/ |
hlr_auc_gw.c | 46 * SQN generation follows the not time-based Profile 2 described in 88 u8 sqn[6]; member in struct:milenage_parameters 129 " sqn CHAR(12) NOT NULL," 191 if (os_strcmp(col[i], "sqn") == 0 && argv[i] && 192 hexstr2bin(argv[i], m->sqn, sizeof(m->sqn))) { 193 printf("Invalid sqn value in database\n"); 235 pos += wpa_snprintf_hex(pos, sizeof(val), m->sqn, 6); 238 "UPDATE milenage SET sqn='%s' WHERE imsi=%s;", 241 printf("Failed to update SQN in database for IMSI %s\n" 814 u8 _auts[EAP_AKA_AUTS_LEN], _rand[EAP_AKA_RAND_LEN], sqn[6]; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_aka.c | 269 u8 opc[16], k[16], sqn[6]; local 293 if (hexstr2bin(pos, sqn, 6)) 296 return milenage_check(opc, k, sqn, data->rand, data->autn, 985 /* Note: AUTN = (SQN ^ AK) || AMF || MAC which gives us the 986 * needed 6-octet SQN ^ AK for CK',IK' derivation */ [all...] |