Home
last modified time | relevance | path

Searched refs:EAP_AKA_AUTN_LEN (Results 1 – 25 of 28) sorted by relevance

12

/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_peer/
H A Deap_aka.c32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN];
148 os_memset(data->autn, 0, EAP_AKA_AUTN_LEN); in eap_aka_clear_keys()
179 wpa_snprintf_hex(pos, end - pos, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_ext_sim_req()
320 u8 autn[EAP_AKA_AUTN_LEN]; in eap_aka_umts_auth()
321 os_memset(autn, '1', EAP_AKA_AUTN_LEN); in eap_aka_umts_auth()
322 if (os_memcmp_const(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) { in eap_aka_umts_auth()
1018 os_memcpy(data->autn, attr->autn, EAP_AKA_AUTN_LEN); in eap_aka_process_challenge()
1548 *len = 1 + EAP_AKA_RAND_LEN + EAP_AKA_AUTN_LEN; in eap_aka_get_session_id()
1559 EAP_AKA_AUTN_LEN); in eap_aka_get_session_id()
/dports/net/hostapd/hostapd-2.9/src/eap_peer/
H A Deap_aka.c32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN];
148 os_memset(data->autn, 0, EAP_AKA_AUTN_LEN); in eap_aka_clear_keys()
179 wpa_snprintf_hex(pos, end - pos, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_ext_sim_req()
320 u8 autn[EAP_AKA_AUTN_LEN]; in eap_aka_umts_auth()
321 os_memset(autn, '1', EAP_AKA_AUTN_LEN); in eap_aka_umts_auth()
322 if (os_memcmp_const(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) { in eap_aka_umts_auth()
1004 os_memcpy(data->autn, attr->autn, EAP_AKA_AUTN_LEN); in eap_aka_process_challenge()
1534 *len = 1 + EAP_AKA_RAND_LEN + EAP_AKA_AUTN_LEN; in eap_aka_get_session_id()
1545 EAP_AKA_AUTN_LEN); in eap_aka_get_session_id()
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_peer/
H A Deap_aka.c32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN];
148 os_memset(data->autn, 0, EAP_AKA_AUTN_LEN); in eap_aka_clear_keys()
179 wpa_snprintf_hex(pos, end - pos, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_ext_sim_req()
320 u8 autn[EAP_AKA_AUTN_LEN]; in eap_aka_umts_auth()
321 os_memset(autn, '1', EAP_AKA_AUTN_LEN); in eap_aka_umts_auth()
322 if (os_memcmp_const(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) { in eap_aka_umts_auth()
1004 os_memcpy(data->autn, attr->autn, EAP_AKA_AUTN_LEN); in eap_aka_process_challenge()
1534 *len = 1 + EAP_AKA_RAND_LEN + EAP_AKA_AUTN_LEN; in eap_aka_get_session_id()
1545 EAP_AKA_AUTN_LEN); in eap_aka_get_session_id()
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_peer/
H A Deap_aka.c32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN];
148 os_memset(data->autn, 0, EAP_AKA_AUTN_LEN); in eap_aka_clear_keys()
179 wpa_snprintf_hex(pos, end - pos, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_ext_sim_req()
320 u8 autn[EAP_AKA_AUTN_LEN]; in eap_aka_umts_auth()
321 os_memset(autn, '1', EAP_AKA_AUTN_LEN); in eap_aka_umts_auth()
322 if (os_memcmp_const(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) { in eap_aka_umts_auth()
1018 os_memcpy(data->autn, attr->autn, EAP_AKA_AUTN_LEN); in eap_aka_process_challenge()
1548 *len = 1 + EAP_AKA_RAND_LEN + EAP_AKA_AUTN_LEN; in eap_aka_get_session_id()
1559 EAP_AKA_AUTN_LEN); in eap_aka_get_session_id()
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Deap_aka.c32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN];
148 os_memset(data->autn, 0, EAP_AKA_AUTN_LEN); in eap_aka_clear_keys()
179 wpa_snprintf_hex(pos, end - pos, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_ext_sim_req()
320 u8 autn[EAP_AKA_AUTN_LEN]; in eap_aka_umts_auth()
321 os_memset(autn, '1', EAP_AKA_AUTN_LEN); in eap_aka_umts_auth()
322 if (os_memcmp_const(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) { in eap_aka_umts_auth()
1004 os_memcpy(data->autn, attr->autn, EAP_AKA_AUTN_LEN); in eap_aka_process_challenge()
1534 *len = 1 + EAP_AKA_RAND_LEN + EAP_AKA_AUTN_LEN; in eap_aka_get_session_id()
1545 EAP_AKA_AUTN_LEN); in eap_aka_get_session_id()
/dports/net/hostapd/hostapd-2.9/hostapd/
H A Dhlr_auc_gw.c98 #define EAP_AKA_AUTN_LEN 16 macro
739 u8 autn[EAP_AKA_AUTN_LEN]; in aka_req_auth()
774 memset(autn, '1', EAP_AKA_AUTN_LEN); in aka_req_auth()
799 pos += wpa_snprintf_hex(pos, end - pos, autn, EAP_AKA_AUTN_LEN); in aka_req_auth()
/dports/net/hostapd-devel/hostap-14ab4a816/hostapd/
H A Dhlr_auc_gw.c98 #define EAP_AKA_AUTN_LEN 16 macro
739 u8 autn[EAP_AKA_AUTN_LEN]; in aka_req_auth()
774 memset(autn, '1', EAP_AKA_AUTN_LEN); in aka_req_auth()
799 pos += wpa_snprintf_hex(pos, end - pos, autn, EAP_AKA_AUTN_LEN); in aka_req_auth()
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/hostapd/
H A Dhlr_auc_gw.c98 #define EAP_AKA_AUTN_LEN 16 macro
739 u8 autn[EAP_AKA_AUTN_LEN]; in aka_req_auth()
774 memset(autn, '1', EAP_AKA_AUTN_LEN); in aka_req_auth()
799 pos += wpa_snprintf_hex(pos, end - pos, autn, EAP_AKA_AUTN_LEN); in aka_req_auth()
/dports/net/hostapd/hostapd-2.9/src/eap_server/
H A Deap_server_aka.c29 u8 autn[EAP_AKA_AUTN_LEN];
484 eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_build_challenge()
1325 *len = 1 + EAP_AKA_RAND_LEN + EAP_AKA_AUTN_LEN; in eap_aka_get_session_id()
1336 EAP_AKA_AUTN_LEN); in eap_aka_get_session_id()
H A Deap_sim_db.c51 u8 autn[EAP_AKA_AUTN_LEN];
576 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN)) in eap_sim_db_aka_resp_auth()
1432 os_memcpy(autn, entry->u.aka.autn, EAP_AKA_AUTN_LEN); in eap_sim_db_get_aka_auth()
/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_server/
H A Deap_server_aka.c29 u8 autn[EAP_AKA_AUTN_LEN];
484 eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_build_challenge()
1327 *len = 1 + EAP_AKA_RAND_LEN + EAP_AKA_AUTN_LEN; in eap_aka_get_session_id()
1338 EAP_AKA_AUTN_LEN); in eap_aka_get_session_id()
H A Deap_sim_db.c51 u8 autn[EAP_AKA_AUTN_LEN];
576 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN)) in eap_sim_db_aka_resp_auth()
1432 os_memcpy(autn, entry->u.aka.autn, EAP_AKA_AUTN_LEN); in eap_sim_db_get_aka_auth()
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_aka.c29 u8 autn[EAP_AKA_AUTN_LEN];
484 eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_build_challenge()
1325 *len = 1 + EAP_AKA_RAND_LEN + EAP_AKA_AUTN_LEN; in eap_aka_get_session_id()
1336 EAP_AKA_AUTN_LEN); in eap_aka_get_session_id()
H A Deap_sim_db.c51 u8 autn[EAP_AKA_AUTN_LEN];
576 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN)) in eap_sim_db_aka_resp_auth()
1432 os_memcpy(autn, entry->u.aka.autn, EAP_AKA_AUTN_LEN); in eap_sim_db_get_aka_auth()
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_server/
H A Deap_server_aka.c29 u8 autn[EAP_AKA_AUTN_LEN];
484 eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_build_challenge()
1327 *len = 1 + EAP_AKA_RAND_LEN + EAP_AKA_AUTN_LEN; in eap_aka_get_session_id()
1338 EAP_AKA_AUTN_LEN); in eap_aka_get_session_id()
H A Deap_sim_db.c51 u8 autn[EAP_AKA_AUTN_LEN];
576 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN)) in eap_sim_db_aka_resp_auth()
1432 os_memcpy(autn, entry->u.aka.autn, EAP_AKA_AUTN_LEN); in eap_sim_db_get_aka_auth()
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_aka.c29 u8 autn[EAP_AKA_AUTN_LEN];
484 eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN); in eap_aka_build_challenge()
1325 *len = 1 + EAP_AKA_RAND_LEN + EAP_AKA_AUTN_LEN; in eap_aka_get_session_id()
1336 EAP_AKA_AUTN_LEN); in eap_aka_get_session_id()
H A Deap_sim_db.c51 u8 autn[EAP_AKA_AUTN_LEN];
576 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN)) in eap_sim_db_aka_resp_auth()
1432 os_memcpy(autn, entry->u.aka.autn, EAP_AKA_AUTN_LEN); in eap_sim_db_get_aka_auth()
/dports/net/hostapd/hostapd-2.9/src/eap_common/
H A Deap_sim_common.h58 #define EAP_AKA_AUTN_LEN 16 macro
H A Deap_sim_common.c554 if (alen != EAP_AKA_AUTN_LEN) { in eap_sim_parse_attr()
/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_common/
H A Deap_sim_common.h58 #define EAP_AKA_AUTN_LEN 16 macro
H A Deap_sim_common.c554 if (alen != EAP_AKA_AUTN_LEN) { in eap_sim_parse_attr()
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_common/
H A Deap_sim_common.h58 #define EAP_AKA_AUTN_LEN 16 macro
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Deap_sim_common.h58 #define EAP_AKA_AUTN_LEN 16 macro
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_common/
H A Deap_sim_common.h58 #define EAP_AKA_AUTN_LEN 16 macro

12