HomeSort by relevance Sort by last modified time
    Searched refs:autn (Results 1 - 16 of 16) sorted by null

  /hardware/interfaces/wifi/supplicant/1.0/
ISupplicantStaNetworkCallback.hal 37 uint8_t[16] autn;
  /external/wpa_supplicant_8/src/crypto/
milenage.c 161 * milenage_generate - Generate AKA AUTN,IK,CK,RES
167 * @autn: Buffer for AUTN = 128-bit authentication token
174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik,
191 /* AUTN = (SQN ^ AK) || AMF || MAC */
193 autn[i] = sqn[i] ^ ak[i];
194 os_memcpy(autn + 6, amf, 2);
195 os_memcpy(autn + 8, mac_a, 8);
257 * milenage_generate - Generate AKA AUTN,IK,CK,RES
262 * @autn: AUTN = 128-bit authentication toke
    [all...]
milenage.h 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik,
20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
  /external/wpa_supplicant_8/src/utils/
pcsc_funcs.h 22 const unsigned char *autn,
pcsc_funcs.c 36 * RUN UMTS ALG: 88 00 81 <len=0x22> data: 0x10 | RAND | 0x10 | AUTN
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_sim_db.h 86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
eap_server_aka.c 29 u8 autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data
477 eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN);
790 data->rand, data->autn, data->ik,
801 /* Note: AUTN = (SQN ^ AK) || AMF || MAC which gives us the
804 data->autn,
    [all...]
eap_sim_db.c 51 u8 autn[EAP_AKA_AUTN_LEN]; member in struct:eap_sim_db_pending::__anon44754::__anon44756
542 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES>
544 * (IMSI = ASCII string, RAND/AUTN/IK/CK/RES = hex string)
576 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN))
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_aka.c 32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data
147 os_memset(data->autn, 0, EAP_AKA_AUTN_LEN);
178 wpa_snprintf_hex(pos, end - pos, data->autn, EAP_AKA_AUTN_LEN);
269 data->autn, data->res, &data->res_len,
302 return milenage_check(opc, k, sqn, data->rand, data->autn,
319 u8 autn[EAP_AKA_AUTN_LEN]; local
320 os_memset(autn, '1', EAP_AKA_AUTN_LEN);
321 if (os_memcmp_const(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) {
322 wpa_printf(MSG_WARNING, "EAP-AKA: AUTN did not match
    [all...]
  /external/wpa_supplicant_8/hostapd/
hlr_auc_gw.c 27 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES>
34 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings.
736 /* AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> */
739 u8 autn[EAP_AKA_AUTN_LEN]; local
764 autn, ik, ck, res, &res_len);
774 memset(autn, '1', EAP_AKA_AUTN_LEN);
799 pos += wpa_snprintf_hex(pos, end - pos, autn, EAP_AKA_AUTN_LEN);
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.h 184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
eap_sim_common.c 560 attr->autn = apos;
  /frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/
SupplicantStaNetworkHalTest.java     [all...]
  /external/wpa_supplicant_8/wpa_supplicant/hidl/1.0/
hidl_manager.cpp 28 // UMTS-AUTH:<RAND>:<AUTN>
728 hidl_params.autn = umts_autn;
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/hidl/1.1/
hidl_manager.cpp 28 // UMTS-AUTH:<RAND>:<AUTN>
753 hidl_params.autn = umts_autn;
    [all...]
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/
SupplicantStaNetworkHal.java     [all...]

Completed in 814 milliseconds