Searched refs:autn (Results 1 - 25 of 31) sorted by relevance

12

/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dmilenage.c167 * @autn: Buffer for AUTN = 128-bit authentication token
174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik,
193 autn[i] = sqn[i] ^ ak[i];
194 os_memcpy(autn + 6, amf, 2);
195 os_memcpy(autn + 8, mac_a, 8);
262 * @autn: AUTN = 128-bit authentication token
271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
278 wpa_hexdump(MSG_DEBUG, "Milenage: AUTN", autn, 16);
292 rx_sqn[i] = autn[i] ^ ak[i];
308 amf = autn
173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument
270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument
[all...]
H A Dmilenage.h13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik,
20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
/external/wpa_supplicant_8/src/crypto/
H A Dmilenage.c167 * @autn: Buffer for AUTN = 128-bit authentication token
174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik,
193 autn[i] = sqn[i] ^ ak[i];
194 os_memcpy(autn + 6, amf, 2);
195 os_memcpy(autn + 8, mac_a, 8);
262 * @autn: AUTN = 128-bit authentication token
271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
278 wpa_hexdump(MSG_DEBUG, "Milenage: AUTN", autn, 16);
292 rx_sqn[i] = autn[i] ^ ak[i];
308 amf = autn
173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument
270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument
[all...]
H A Dmilenage.h13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik,
20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dmilenage.c167 * @autn: Buffer for AUTN = 128-bit authentication token
174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik,
193 autn[i] = sqn[i] ^ ak[i];
194 os_memcpy(autn + 6, amf, 2);
195 os_memcpy(autn + 8, mac_a, 8);
262 * @autn: AUTN = 128-bit authentication token
271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
278 wpa_hexdump(MSG_DEBUG, "Milenage: AUTN", autn, 16);
292 rx_sqn[i] = autn[i] ^ ak[i];
308 amf = autn
173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument
270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument
[all...]
H A Dmilenage.h13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik,
20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
/external/wpa_supplicant_8/hostapd/src/utils/
H A Dpcsc_funcs.h22 const unsigned char *autn,
/external/wpa_supplicant_8/src/utils/
H A Dpcsc_funcs.h22 const unsigned char *autn,
/external/wpa_supplicant_8/wpa_supplicant/src/utils/
H A Dpcsc_funcs.h22 const unsigned char *autn,
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_aka.c32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data
139 os_memset(data->autn, 0, EAP_AKA_AUTN_LEN);
170 wpa_snprintf_hex(pos, end - pos, data->autn, EAP_AKA_AUTN_LEN);
261 data->autn, data->res, &data->res_len,
294 return milenage_check(opc, k, sqn, data->rand, data->autn,
311 u8 autn[EAP_AKA_AUTN_LEN]; local
312 os_memset(autn, '1', EAP_AKA_AUTN_LEN);
313 if (os_memcmp_const(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) {
949 if (!attr->mac || !attr->rand || !attr->autn) {
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_sim_db.h86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
H A Deap_sim_db.c51 u8 autn[EAP_AKA_AUTN_LEN]; member in struct:eap_sim_db_pending::__anon33703::__anon33705
520 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN))
1316 * @autn: Buffer for AUTN value
1336 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
1374 os_memcpy(autn, entry->u.aka.autn, EAP_AKA_AUTN_LEN);
1335 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
H A Deap_server_aka.c29 u8 autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data
477 eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN);
790 data->rand, data->autn, data->ik,
804 data->autn,
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_aka.c32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data
139 os_memset(data->autn, 0, EAP_AKA_AUTN_LEN);
170 wpa_snprintf_hex(pos, end - pos, data->autn, EAP_AKA_AUTN_LEN);
261 data->autn, data->res, &data->res_len,
294 return milenage_check(opc, k, sqn, data->rand, data->autn,
311 u8 autn[EAP_AKA_AUTN_LEN]; local
312 os_memset(autn, '1', EAP_AKA_AUTN_LEN);
313 if (os_memcmp_const(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) {
949 if (!attr->mac || !attr->rand || !attr->autn) {
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_sim_db.h86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
H A Deap_sim_db.c51 u8 autn[EAP_AKA_AUTN_LEN]; member in struct:eap_sim_db_pending::__anon33956::__anon33958
520 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN))
1316 * @autn: Buffer for AUTN value
1336 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
1374 os_memcpy(autn, entry->u.aka.autn, EAP_AKA_AUTN_LEN);
1335 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
H A Deap_server_aka.c29 u8 autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data
477 eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN);
790 data->rand, data->autn, data->ik,
804 data->autn,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_aka.c32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data
139 os_memset(data->autn, 0, EAP_AKA_AUTN_LEN);
170 wpa_snprintf_hex(pos, end - pos, data->autn, EAP_AKA_AUTN_LEN);
261 data->autn, data->res, &data->res_len,
294 return milenage_check(opc, k, sqn, data->rand, data->autn,
311 u8 autn[EAP_AKA_AUTN_LEN]; local
312 os_memset(autn, '1', EAP_AKA_AUTN_LEN);
313 if (os_memcmp_const(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) {
949 if (!attr->mac || !attr->rand || !attr->autn) {
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_sim_db.h86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
H A Deap_sim_db.c51 u8 autn[EAP_AKA_AUTN_LEN]; member in struct:eap_sim_db_pending::__anon34207::__anon34209
520 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN))
1316 * @autn: Buffer for AUTN value
1336 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
1374 os_memcpy(autn, entry->u.aka.autn, EAP_AKA_AUTN_LEN);
1335 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
H A Deap_server_aka.c29 u8 autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data
477 eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN);
790 data->rand, data->autn, data->ik,
804 data->autn,
/external/wpa_supplicant_8/hostapd/
H A Dhlr_auc_gw.c775 u8 autn[EAP_AKA_AUTN_LEN]; local
800 autn, ik, ck, res, &res_len);
806 memset(autn, '1', EAP_AKA_AUTN_LEN);
831 pos += wpa_snprintf_hex(pos, end - pos, autn, EAP_AKA_AUTN_LEN);
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sim_common.h184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
/external/wpa_supplicant_8/src/eap_common/
H A Deap_sim_common.h184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_sim_common.h184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs

Completed in 314 milliseconds

12