/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | milenage.c | 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, in milenage_generate() argument 193 autn[i] = sqn[i] ^ ak[i]; in milenage_generate() 194 os_memcpy(autn + 6, amf, 2); in milenage_generate() 195 os_memcpy(autn + 8, mac_a, 8); in milenage_generate() 271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, in milenage_check() argument 278 wpa_hexdump(MSG_DEBUG, "Milenage: AUTN", autn, 16); in milenage_check() 292 rx_sqn[i] = autn[i] ^ ak[i]; in milenage_check() 308 amf = autn + 6; in milenage_check() 315 if (os_memcmp_const(mac_a, autn + 8, 8) != 0) { in milenage_check() 318 autn + 8, 8); in milenage_check()
|
D | milenage.h | 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | milenage.c | 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, in milenage_generate() argument 193 autn[i] = sqn[i] ^ ak[i]; in milenage_generate() 194 os_memcpy(autn + 6, amf, 2); in milenage_generate() 195 os_memcpy(autn + 8, mac_a, 8); in milenage_generate() 271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, in milenage_check() argument 278 wpa_hexdump(MSG_DEBUG, "Milenage: AUTN", autn, 16); in milenage_check() 292 rx_sqn[i] = autn[i] ^ ak[i]; in milenage_check() 308 amf = autn + 6; in milenage_check() 315 if (os_memcmp_const(mac_a, autn + 8, 8) != 0) { in milenage_check() 318 autn + 8, 8); in milenage_check()
|
D | milenage.h | 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_aka.c | 32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; member 148 os_memset(data->autn, 0, EAP_AKA_AUTN_LEN); in eap_aka_clear_keys() 179 wpa_snprintf_hex(pos, end - pos, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_ext_sim_req() 270 data->autn, data->res, &data->res_len, in eap_aka_umts_auth() 303 return milenage_check(opc, k, sqn, data->rand, data->autn, in eap_aka_umts_auth() 320 u8 autn[EAP_AKA_AUTN_LEN]; in eap_aka_umts_auth() local 321 os_memset(autn, '1', EAP_AKA_AUTN_LEN); in eap_aka_umts_auth() 322 if (os_memcmp_const(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) { in eap_aka_umts_auth() 994 if (!attr->mac || !attr->rand || !attr->autn) { in eap_aka_process_challenge() 999 !attr->autn ? " AT_AUTN" : ""); in eap_aka_process_challenge() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_aka.c | 32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; member 148 os_memset(data->autn, 0, EAP_AKA_AUTN_LEN); in eap_aka_clear_keys() 179 wpa_snprintf_hex(pos, end - pos, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_ext_sim_req() 270 data->autn, data->res, &data->res_len, in eap_aka_umts_auth() 303 return milenage_check(opc, k, sqn, data->rand, data->autn, in eap_aka_umts_auth() 320 u8 autn[EAP_AKA_AUTN_LEN]; in eap_aka_umts_auth() local 321 os_memset(autn, '1', EAP_AKA_AUTN_LEN); in eap_aka_umts_auth() 322 if (os_memcmp_const(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) { in eap_aka_umts_auth() 1008 if (!attr->mac || !attr->rand || !attr->autn) { in eap_aka_process_challenge() 1013 !attr->autn ? " AT_AUTN" : ""); in eap_aka_process_challenge() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
D | pcsc_funcs.h | 22 const unsigned char *autn,
|
D | pcsc_funcs.c | 1341 const unsigned char *autn, in scard_umts_auth() argument 1362 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS auth - AUTN", autn, AKA_AUTN_LEN); in scard_umts_auth() 1366 os_memcpy(cmd + 6 + AKA_RAND_LEN + 1, autn, AKA_AUTN_LEN); in scard_umts_auth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
D | pcsc_funcs.h | 22 const unsigned char *autn,
|
D | pcsc_funcs.c | 1341 const unsigned char *autn, in scard_umts_auth() argument 1362 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS auth - AUTN", autn, AKA_AUTN_LEN); in scard_umts_auth() 1366 os_memcpy(cmd + 6 + AKA_RAND_LEN + 1, autn, AKA_AUTN_LEN); in scard_umts_auth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_sim_db.h | 86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
|
D | eap_sim_db.c | 51 u8 autn[EAP_AKA_AUTN_LEN]; member 576 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN)) in eap_sim_db_aka_resp_auth() 1394 u8 *_rand, u8 *autn, u8 *ik, u8 *ck, in eap_sim_db_get_aka_auth() argument 1432 os_memcpy(autn, entry->u.aka.autn, EAP_AKA_AUTN_LEN); in eap_sim_db_get_aka_auth()
|
D | eap_server_aka.c | 29 u8 autn[EAP_AKA_AUTN_LEN]; member 484 eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_build_challenge() 807 data->rand, data->autn, data->ik, in eap_aka_fullauth() 825 data->autn, in eap_aka_fullauth() 1335 os_memcpy(id + 1 + EAP_AKA_RAND_LEN, data->autn, in eap_aka_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_sim_db.h | 86 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
|
D | eap_sim_db.c | 51 u8 autn[EAP_AKA_AUTN_LEN]; member 576 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN)) in eap_sim_db_aka_resp_auth() 1394 u8 *_rand, u8 *autn, u8 *ik, u8 *ck, in eap_sim_db_get_aka_auth() argument 1432 os_memcpy(autn, entry->u.aka.autn, EAP_AKA_AUTN_LEN); in eap_sim_db_get_aka_auth()
|
D | eap_server_aka.c | 29 u8 autn[EAP_AKA_AUTN_LEN]; member 484 eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_build_challenge() 807 data->rand, data->autn, data->ik, in eap_aka_fullauth() 825 data->autn, in eap_aka_fullauth() 1337 os_memcpy(id + 1 + EAP_AKA_RAND_LEN, data->autn, in eap_aka_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/ |
D | hlr_auc_gw.c | 739 u8 autn[EAP_AKA_AUTN_LEN]; in aka_req_auth() local 764 autn, ik, ck, res, &res_len); in aka_req_auth() 774 memset(autn, '1', EAP_AKA_AUTN_LEN); in aka_req_auth() 799 pos += wpa_snprintf_hex(pos, end - pos, autn, EAP_AKA_AUTN_LEN); in aka_req_auth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/ |
D | hlr_auc_gw.c | 739 u8 autn[EAP_AKA_AUTN_LEN]; in aka_req_auth() local 764 autn, ik, ck, res, &res_len); in aka_req_auth() 774 memset(autn, '1', EAP_AKA_AUTN_LEN); in aka_req_auth() 799 pos += wpa_snprintf_hex(pos, end - pos, autn, EAP_AKA_AUTN_LEN); in aka_req_auth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_sim_common.h | 184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member
|
D | eap_sim_common.c | 560 attr->autn = apos; in eap_sim_parse_attr()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_sim_common.h | 184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member
|
D | eap_sim_common.c | 560 attr->autn = apos; in eap_sim_parse_attr()
|