/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | milenage.c | 167 * @autn: Buffer for AUTN = 128-bit authentication token 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 193 autn[i] = sqn[i] ^ ak[i]; 194 os_memcpy(autn + 6, amf, 2); 195 os_memcpy(autn + 8, mac_a, 8); 262 * @autn: AUTN = 128-bit authentication token 271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 278 wpa_hexdump(MSG_DEBUG, "Milenage: AUTN", autn, 16); 292 rx_sqn[i] = autn[i] ^ ak[i]; 308 amf = autn 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
H A D | milenage.h | 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | milenage.c | 167 * @autn: Buffer for AUTN = 128-bit authentication token 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 193 autn[i] = sqn[i] ^ ak[i]; 194 os_memcpy(autn + 6, amf, 2); 195 os_memcpy(autn + 8, mac_a, 8); 262 * @autn: AUTN = 128-bit authentication token 271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 278 wpa_hexdump(MSG_DEBUG, "Milenage: AUTN", autn, 16); 292 rx_sqn[i] = autn[i] ^ ak[i]; 308 amf = autn 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
H A D | milenage.h | 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | milenage.c | 167 * @autn: Buffer for AUTN = 128-bit authentication token 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 193 autn[i] = sqn[i] ^ ak[i]; 194 os_memcpy(autn + 6, amf, 2); 195 os_memcpy(autn + 8, mac_a, 8); 262 * @autn: AUTN = 128-bit authentication token 271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 278 wpa_hexdump(MSG_DEBUG, "Milenage: AUTN", autn, 16); 292 rx_sqn[i] = autn[i] ^ ak[i]; 308 amf = autn 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
H A D | milenage.h | 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | pcsc_funcs.h | 29 const unsigned char *autn,
|
/external/wpa_supplicant_8/src/utils/ |
H A D | pcsc_funcs.h | 29 const unsigned char *autn,
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | pcsc_funcs.h | 29 const unsigned char *autn,
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_sim_db.h | 86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
|
H A D | eap_sim_db.c | 52 u8 autn[EAP_AKA_AUTN_LEN]; member in struct:eap_sim_db_pending::__anon29232::__anon29234 521 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN)) 1307 * @autn: Buffer for AUTN value 1327 u8 *_rand, u8 *autn, u8 *ik, u8 *ck, 1365 os_memcpy(autn, entry->u.aka.autn, EAP_AKA_AUTN_LEN); 1326 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
|
H A D | eap_server_aka.c | 29 u8 autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data 477 eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN); 790 data->rand, data->autn, data->ik, 804 data->autn,
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_sim_db.h | 86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
|
H A D | eap_sim_db.c | 52 u8 autn[EAP_AKA_AUTN_LEN]; member in struct:eap_sim_db_pending::__anon29462::__anon29464 521 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN)) 1307 * @autn: Buffer for AUTN value 1327 u8 *_rand, u8 *autn, u8 *ik, u8 *ck, 1365 os_memcpy(autn, entry->u.aka.autn, EAP_AKA_AUTN_LEN); 1326 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
|
H A D | eap_server_aka.c | 29 u8 autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data 477 eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN); 790 data->rand, data->autn, data->ik, 804 data->autn,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_sim_db.h | 86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
|
H A D | eap_sim_db.c | 52 u8 autn[EAP_AKA_AUTN_LEN]; member in struct:eap_sim_db_pending::__anon29694::__anon29696 521 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN)) 1307 * @autn: Buffer for AUTN value 1327 u8 *_rand, u8 *autn, u8 *ik, u8 *ck, 1365 os_memcpy(autn, entry->u.aka.autn, EAP_AKA_AUTN_LEN); 1326 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
|
H A D | eap_server_aka.c | 29 u8 autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data 477 eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN); 790 data->rand, data->autn, data->ik, 804 data->autn,
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_aka.c | 32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data 156 data->autn, data->res, &data->res_len, 189 return milenage_check(opc, k, sqn, data->rand, data->autn, 206 u8 autn[EAP_AKA_AUTN_LEN]; local 207 os_memset(autn, '1', EAP_AKA_AUTN_LEN); 208 if (os_memcmp(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) { 843 if (!attr->mac || !attr->rand || !attr->autn) { 848 !attr->autn ? " AT_AUTN" : ""); 853 os_memcpy(data->autn, att [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_aka.c | 32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data 156 data->autn, data->res, &data->res_len, 189 return milenage_check(opc, k, sqn, data->rand, data->autn, 206 u8 autn[EAP_AKA_AUTN_LEN]; local 207 os_memset(autn, '1', EAP_AKA_AUTN_LEN); 208 if (os_memcmp(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) { 843 if (!attr->mac || !attr->rand || !attr->autn) { 848 !attr->autn ? " AT_AUTN" : ""); 853 os_memcpy(data->autn, att [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_aka.c | 32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data 156 data->autn, data->res, &data->res_len, 189 return milenage_check(opc, k, sqn, data->rand, data->autn, 206 u8 autn[EAP_AKA_AUTN_LEN]; local 207 os_memset(autn, '1', EAP_AKA_AUTN_LEN); 208 if (os_memcmp(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) { 843 if (!attr->mac || !attr->rand || !attr->autn) { 848 !attr->autn ? " AT_AUTN" : ""); 853 os_memcpy(data->autn, att [all...] |
/external/wpa_supplicant_8/hostapd/ |
H A D | hlr_auc_gw.c | 720 u8 autn[EAP_AKA_AUTN_LEN]; local 743 autn, ik, ck, res, &res_len); 749 memset(autn, '1', EAP_AKA_AUTN_LEN); 774 pos += wpa_snprintf_hex(pos, end - pos, autn, EAP_AKA_AUTN_LEN);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.h | 184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sim_common.h | 184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.h | 184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
|