/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/ |
H A D | hlr_auc_gw.c | 88 u8 sqn[6]; member 129 " sqn CHAR(12) NOT NULL," in db_table_create_milenage() 191 if (os_strcmp(col[i], "sqn") == 0 && argv[i] && in get_milenage_cb() 192 hexstr2bin(argv[i], m->sqn, sizeof(m->sqn))) { in get_milenage_cb() 193 printf("Invalid sqn value in database\n"); in get_milenage_cb() 235 pos += wpa_snprintf_hex(pos, sizeof(val), m->sqn, 6); in db_update_milenage_sqn() 238 "UPDATE milenage SET sqn='%s' WHERE imsi=%s;", in db_update_milenage_sqn() 465 hexstr2bin(pos, m->sqn, 6)) { in read_milenage() 545 pos += wpa_snprintf_hex(pos, end - pos, m->sqn, in update_milenage_file() 712 inc_sqn(u8 *sqn) inc_sqn() argument 814 u8 _auts[EAP_AKA_AUTS_LEN], _rand[EAP_AKA_RAND_LEN], sqn[6]; aka_auts() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/ |
H A D | hlr_auc_gw.c | 88 u8 sqn[6]; member 129 " sqn CHAR(12) NOT NULL," in db_table_create_milenage() 191 if (os_strcmp(col[i], "sqn") == 0 && argv[i] && in get_milenage_cb() 192 hexstr2bin(argv[i], m->sqn, sizeof(m->sqn))) { in get_milenage_cb() 193 printf("Invalid sqn value in database\n"); in get_milenage_cb() 235 pos += wpa_snprintf_hex(pos, sizeof(val), m->sqn, 6); in db_update_milenage_sqn() 238 "UPDATE milenage SET sqn='%s' WHERE imsi=%s;", in db_update_milenage_sqn() 465 hexstr2bin(pos, m->sqn, 6)) { in read_milenage() 545 pos += wpa_snprintf_hex(pos, end - pos, m->sqn, in update_milenage_file() 712 inc_sqn(u8 *sqn) inc_sqn() argument 814 u8 _auts[EAP_AKA_AUTS_LEN], _rand[EAP_AKA_RAND_LEN], sqn[6]; aka_auts() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | milenage.c | 30 * @sqn: SQN = 48-bit sequence number 37 const u8 *sqn, const u8 *amf, u8 *mac_a, u8 *mac_s) in milenage_f1() 49 os_memcpy(tmp2, sqn, 6); in milenage_f1() 165 * @sqn: SQN = 48-bit sequence number 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, in milenage_generate() 184 if (milenage_f1(opc, k, _rand, sqn, amf, mac_a, NULL) || in milenage_generate() 193 autn[i] = sqn[i] ^ ak[i]; in milenage_generate() 205 * @sqn: Buffer for SQN = 48-bit sequence number 206 * Returns: 0 = success (sqn filled), -1 on failure 209 u8 *sqn) in milenage_auts() 36 milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *sqn, const u8 *amf, u8 *mac_a, u8 *mac_s) milenage_f1() argument 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) milenage_generate() argument 208 milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, u8 *sqn) milenage_auts() argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) milenage_check() argument [all...] |
H A D | milenage.h | 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 16 u8 *sqn); 19 int milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, 23 const u8 *sqn, const u8 *amf, u8 *mac_a, u8 *mac_s);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | milenage.c | 30 * @sqn: SQN = 48-bit sequence number 37 const u8 *sqn, const u8 *amf, u8 *mac_a, u8 *mac_s) in milenage_f1() 49 os_memcpy(tmp2, sqn, 6); in milenage_f1() 165 * @sqn: SQN = 48-bit sequence number 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, in milenage_generate() 184 if (milenage_f1(opc, k, _rand, sqn, amf, mac_a, NULL) || in milenage_generate() 193 autn[i] = sqn[i] ^ ak[i]; in milenage_generate() 205 * @sqn: Buffer for SQN = 48-bit sequence number 206 * Returns: 0 = success (sqn filled), -1 on failure 209 u8 *sqn) in milenage_auts() 36 milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *sqn, const u8 *amf, u8 *mac_a, u8 *mac_s) milenage_f1() argument 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) milenage_generate() argument 208 milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, u8 *sqn) milenage_auts() argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) milenage_check() argument [all...] |
H A D | milenage.h | 13 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 16 u8 *sqn); 19 int milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, 23 const u8 *sqn, const u8 *amf, u8 *mac_a, u8 *mac_s);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | notify.h | 63 char sqn[MAX_SQN_LEN]; member
|
H A D | notify.c | 467 hexstr2bin(eapaka_params.sqn, local_sqn, sizeof(local_sqn)); in wpas_send_network_eapaka_umtsauth_response_internal()
|
H A D | ctrl_iface.c | 3848 eapaka_params.opc, eapaka_params.amf, eapaka_params.sqn};
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_aka.c | 276 u8 opc[16], k[16], sqn[6]; in eap_aka_umts_auth() local 300 if (hexstr2bin(pos, sqn, 6)) in eap_aka_umts_auth() 303 return milenage_check(opc, k, sqn, data->rand, data->autn, in eap_aka_umts_auth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_aka.c | 276 u8 opc[16], k[16], sqn[6]; in eap_aka_umts_auth() local 300 if (hexstr2bin(pos, sqn, 6)) in eap_aka_umts_auth() 303 return milenage_check(opc, k, sqn, data->rand, data->autn, in eap_aka_umts_auth()
|