/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_peer/ |
H A D | eap_aka.c | 32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; 148 os_memset(data->autn, 0, EAP_AKA_AUTN_LEN); in eap_aka_clear_keys() 179 wpa_snprintf_hex(pos, end - pos, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_ext_sim_req() 320 u8 autn[EAP_AKA_AUTN_LEN]; in eap_aka_umts_auth() 321 os_memset(autn, '1', EAP_AKA_AUTN_LEN); in eap_aka_umts_auth() 322 if (os_memcmp_const(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) { in eap_aka_umts_auth() 1018 os_memcpy(data->autn, attr->autn, EAP_AKA_AUTN_LEN); in eap_aka_process_challenge() 1548 *len = 1 + EAP_AKA_RAND_LEN + EAP_AKA_AUTN_LEN; in eap_aka_get_session_id() 1559 EAP_AKA_AUTN_LEN); in eap_aka_get_session_id()
|
/dports/net/hostapd/hostapd-2.9/src/eap_peer/ |
H A D | eap_aka.c | 32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; 148 os_memset(data->autn, 0, EAP_AKA_AUTN_LEN); in eap_aka_clear_keys() 179 wpa_snprintf_hex(pos, end - pos, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_ext_sim_req() 320 u8 autn[EAP_AKA_AUTN_LEN]; in eap_aka_umts_auth() 321 os_memset(autn, '1', EAP_AKA_AUTN_LEN); in eap_aka_umts_auth() 322 if (os_memcmp_const(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) { in eap_aka_umts_auth() 1004 os_memcpy(data->autn, attr->autn, EAP_AKA_AUTN_LEN); in eap_aka_process_challenge() 1534 *len = 1 + EAP_AKA_RAND_LEN + EAP_AKA_AUTN_LEN; in eap_aka_get_session_id() 1545 EAP_AKA_AUTN_LEN); in eap_aka_get_session_id()
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_aka.c | 32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; 148 os_memset(data->autn, 0, EAP_AKA_AUTN_LEN); in eap_aka_clear_keys() 179 wpa_snprintf_hex(pos, end - pos, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_ext_sim_req() 320 u8 autn[EAP_AKA_AUTN_LEN]; in eap_aka_umts_auth() 321 os_memset(autn, '1', EAP_AKA_AUTN_LEN); in eap_aka_umts_auth() 322 if (os_memcmp_const(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) { in eap_aka_umts_auth() 1004 os_memcpy(data->autn, attr->autn, EAP_AKA_AUTN_LEN); in eap_aka_process_challenge() 1534 *len = 1 + EAP_AKA_RAND_LEN + EAP_AKA_AUTN_LEN; in eap_aka_get_session_id() 1545 EAP_AKA_AUTN_LEN); in eap_aka_get_session_id()
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_peer/ |
H A D | eap_aka.c | 32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; 148 os_memset(data->autn, 0, EAP_AKA_AUTN_LEN); in eap_aka_clear_keys() 179 wpa_snprintf_hex(pos, end - pos, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_ext_sim_req() 320 u8 autn[EAP_AKA_AUTN_LEN]; in eap_aka_umts_auth() 321 os_memset(autn, '1', EAP_AKA_AUTN_LEN); in eap_aka_umts_auth() 322 if (os_memcmp_const(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) { in eap_aka_umts_auth() 1018 os_memcpy(data->autn, attr->autn, EAP_AKA_AUTN_LEN); in eap_aka_process_challenge() 1548 *len = 1 + EAP_AKA_RAND_LEN + EAP_AKA_AUTN_LEN; in eap_aka_get_session_id() 1559 EAP_AKA_AUTN_LEN); in eap_aka_get_session_id()
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_aka.c | 32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; 148 os_memset(data->autn, 0, EAP_AKA_AUTN_LEN); in eap_aka_clear_keys() 179 wpa_snprintf_hex(pos, end - pos, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_ext_sim_req() 320 u8 autn[EAP_AKA_AUTN_LEN]; in eap_aka_umts_auth() 321 os_memset(autn, '1', EAP_AKA_AUTN_LEN); in eap_aka_umts_auth() 322 if (os_memcmp_const(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) { in eap_aka_umts_auth() 1004 os_memcpy(data->autn, attr->autn, EAP_AKA_AUTN_LEN); in eap_aka_process_challenge() 1534 *len = 1 + EAP_AKA_RAND_LEN + EAP_AKA_AUTN_LEN; in eap_aka_get_session_id() 1545 EAP_AKA_AUTN_LEN); in eap_aka_get_session_id()
|
/dports/net/hostapd/hostapd-2.9/hostapd/ |
H A D | hlr_auc_gw.c | 98 #define EAP_AKA_AUTN_LEN 16 macro 739 u8 autn[EAP_AKA_AUTN_LEN]; in aka_req_auth() 774 memset(autn, '1', EAP_AKA_AUTN_LEN); in aka_req_auth() 799 pos += wpa_snprintf_hex(pos, end - pos, autn, EAP_AKA_AUTN_LEN); in aka_req_auth()
|
/dports/net/hostapd-devel/hostap-14ab4a816/hostapd/ |
H A D | hlr_auc_gw.c | 98 #define EAP_AKA_AUTN_LEN 16 macro 739 u8 autn[EAP_AKA_AUTN_LEN]; in aka_req_auth() 774 memset(autn, '1', EAP_AKA_AUTN_LEN); in aka_req_auth() 799 pos += wpa_snprintf_hex(pos, end - pos, autn, EAP_AKA_AUTN_LEN); in aka_req_auth()
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/hostapd/ |
H A D | hlr_auc_gw.c | 98 #define EAP_AKA_AUTN_LEN 16 macro 739 u8 autn[EAP_AKA_AUTN_LEN]; in aka_req_auth() 774 memset(autn, '1', EAP_AKA_AUTN_LEN); in aka_req_auth() 799 pos += wpa_snprintf_hex(pos, end - pos, autn, EAP_AKA_AUTN_LEN); in aka_req_auth()
|
/dports/net/hostapd/hostapd-2.9/src/eap_server/ |
H A D | eap_server_aka.c | 29 u8 autn[EAP_AKA_AUTN_LEN]; 484 eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_build_challenge() 1325 *len = 1 + EAP_AKA_RAND_LEN + EAP_AKA_AUTN_LEN; in eap_aka_get_session_id() 1336 EAP_AKA_AUTN_LEN); in eap_aka_get_session_id()
|
H A D | eap_sim_db.c | 51 u8 autn[EAP_AKA_AUTN_LEN]; 576 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN)) in eap_sim_db_aka_resp_auth() 1432 os_memcpy(autn, entry->u.aka.autn, EAP_AKA_AUTN_LEN); in eap_sim_db_get_aka_auth()
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_server/ |
H A D | eap_server_aka.c | 29 u8 autn[EAP_AKA_AUTN_LEN]; 484 eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_build_challenge() 1327 *len = 1 + EAP_AKA_RAND_LEN + EAP_AKA_AUTN_LEN; in eap_aka_get_session_id() 1338 EAP_AKA_AUTN_LEN); in eap_aka_get_session_id()
|
H A D | eap_sim_db.c | 51 u8 autn[EAP_AKA_AUTN_LEN]; 576 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN)) in eap_sim_db_aka_resp_auth() 1432 os_memcpy(autn, entry->u.aka.autn, EAP_AKA_AUTN_LEN); in eap_sim_db_get_aka_auth()
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_aka.c | 29 u8 autn[EAP_AKA_AUTN_LEN]; 484 eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_build_challenge() 1325 *len = 1 + EAP_AKA_RAND_LEN + EAP_AKA_AUTN_LEN; in eap_aka_get_session_id() 1336 EAP_AKA_AUTN_LEN); in eap_aka_get_session_id()
|
H A D | eap_sim_db.c | 51 u8 autn[EAP_AKA_AUTN_LEN]; 576 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN)) in eap_sim_db_aka_resp_auth() 1432 os_memcpy(autn, entry->u.aka.autn, EAP_AKA_AUTN_LEN); in eap_sim_db_get_aka_auth()
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_server/ |
H A D | eap_server_aka.c | 29 u8 autn[EAP_AKA_AUTN_LEN]; 484 eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_build_challenge() 1327 *len = 1 + EAP_AKA_RAND_LEN + EAP_AKA_AUTN_LEN; in eap_aka_get_session_id() 1338 EAP_AKA_AUTN_LEN); in eap_aka_get_session_id()
|
H A D | eap_sim_db.c | 51 u8 autn[EAP_AKA_AUTN_LEN]; 576 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN)) in eap_sim_db_aka_resp_auth() 1432 os_memcpy(autn, entry->u.aka.autn, EAP_AKA_AUTN_LEN); in eap_sim_db_get_aka_auth()
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_aka.c | 29 u8 autn[EAP_AKA_AUTN_LEN]; 484 eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_build_challenge() 1325 *len = 1 + EAP_AKA_RAND_LEN + EAP_AKA_AUTN_LEN; in eap_aka_get_session_id() 1336 EAP_AKA_AUTN_LEN); in eap_aka_get_session_id()
|
H A D | eap_sim_db.c | 51 u8 autn[EAP_AKA_AUTN_LEN]; 576 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN)) in eap_sim_db_aka_resp_auth() 1432 os_memcpy(autn, entry->u.aka.autn, EAP_AKA_AUTN_LEN); in eap_sim_db_get_aka_auth()
|
/dports/net/hostapd/hostapd-2.9/src/eap_common/ |
H A D | eap_sim_common.h | 58 #define EAP_AKA_AUTN_LEN 16 macro
|
H A D | eap_sim_common.c | 554 if (alen != EAP_AKA_AUTN_LEN) { in eap_sim_parse_attr()
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_common/ |
H A D | eap_sim_common.h | 58 #define EAP_AKA_AUTN_LEN 16 macro
|
H A D | eap_sim_common.c | 554 if (alen != EAP_AKA_AUTN_LEN) { in eap_sim_parse_attr()
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_common/ |
H A D | eap_sim_common.h | 58 #define EAP_AKA_AUTN_LEN 16 macro
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_sim_common.h | 58 #define EAP_AKA_AUTN_LEN 16 macro
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_sim_common.h | 58 #define EAP_AKA_AUTN_LEN 16 macro
|