Lines Matching full:aka

8  * This is an example implementation of the EAP-SIM/AKA database/authentication
12 * EAP-SIM/AKA pseudonyms and re-auth identities. It can be used with different
41 int aka; member
56 } aka; member
377 eap_sim_db_get_pending(struct eap_sim_db_data *data, const char *imsi, int aka) in eap_sim_db_get_pending() argument
383 if (entry->aka == aka && os_strcmp(entry->imsi, imsi) == 0) { in eap_sim_db_get_pending()
542 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> in eap_sim_db_aka_resp_auth()
543 * AKA-RESP-AUTH <IMSI> FAILURE in eap_sim_db_aka_resp_auth()
568 if (hexstr2bin(start, entry->u.aka.rand, EAP_AKA_RAND_LEN)) in eap_sim_db_aka_resp_auth()
576 if (hexstr2bin(start, entry->u.aka.autn, EAP_AKA_AUTN_LEN)) in eap_sim_db_aka_resp_auth()
584 if (hexstr2bin(start, entry->u.aka.ik, EAP_AKA_IK_LEN)) in eap_sim_db_aka_resp_auth()
592 if (hexstr2bin(start, entry->u.aka.ck, EAP_AKA_CK_LEN)) in eap_sim_db_aka_resp_auth()
604 entry->u.aka.res_len = (end - start) / 2; in eap_sim_db_aka_resp_auth()
605 if (entry->u.aka.res_len > EAP_AKA_RES_MAX_LEN) { in eap_sim_db_aka_resp_auth()
607 entry->u.aka.res_len = 0; in eap_sim_db_aka_resp_auth()
610 if (hexstr2bin(start, entry->u.aka.res, entry->u.aka.res_len)) in eap_sim_db_aka_resp_auth()
664 else if (os_strcmp(cmd, "AKA-RESP-AUTH") == 0) in eap_sim_db_receive()
1036 * @method: EAP method (SIM/AKA/AKA')
1068 * @method: EAP method (SIM/AKA/AKA')
1238 * eap_sim_db_add_reauth_prime - EAP-AKA' DB: Add new re-authentication entry
1250 * This function adds a new re-authentication entry for an EAP-AKA' user.
1370 * eap_sim_db_get_aka_auth - Get AKA authentication values
1385 * When using an external server for AKA authentication, this function can
1412 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Get AKA auth for IMSI '%s'", in eap_sim_db_get_aka_auth()
1431 os_memcpy(_rand, entry->u.aka.rand, EAP_AKA_RAND_LEN); in eap_sim_db_get_aka_auth()
1432 os_memcpy(autn, entry->u.aka.autn, EAP_AKA_AUTN_LEN); in eap_sim_db_get_aka_auth()
1433 os_memcpy(ik, entry->u.aka.ik, EAP_AKA_IK_LEN); in eap_sim_db_get_aka_auth()
1434 os_memcpy(ck, entry->u.aka.ck, EAP_AKA_CK_LEN); in eap_sim_db_get_aka_auth()
1435 os_memcpy(res, entry->u.aka.res, EAP_AKA_RES_MAX_LEN); in eap_sim_db_get_aka_auth()
1436 *res_len = entry->u.aka.res_len; in eap_sim_db_get_aka_auth()
1447 len = os_snprintf(msg, sizeof(msg), "AKA-REQ-AUTH "); in eap_sim_db_get_aka_auth()
1454 wpa_printf(MSG_DEBUG, "EAP-SIM DB: requesting AKA authentication " in eap_sim_db_get_aka_auth()
1463 entry->aka = 1; in eap_sim_db_get_aka_auth()
1476 * eap_sim_db_resynchronize - Resynchronize AKA AUTN
1505 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Get AKA auth for IMSI '%s'", in eap_sim_db_resynchronize()
1513 len = os_snprintf(msg, sizeof(msg), "AKA-AUTS "); in eap_sim_db_resynchronize()
1532 wpa_printf(MSG_DEBUG, "EAP-SIM DB: reporting AKA AUTS for " in eap_sim_db_resynchronize()