> *Refer to* [*README*](../README.md) *for main instruction file*
# MCOP MOCK
The MCOP Mock app is used to bypass the SIM authentication in order to test the **MCOP SDK** in those devices that don't have a proper SIM plugin due to privilege constraints.
It uses **AKAv2** (*Authentication and Key Agreement*, [*RFC 3310*](https://tools.ietf.org/html/rfc3310)) for authentication. AKA is a challenge-response based mechanism that uses symmetric cryptography.
## Parameters
* **IMPI**: The IP Multimedia Private Identity used to authenticate.
e.g. mcptt-test-A@organization.org
* **DOMAIN**: domain.
e.g. organization.org
* **PASSWORD**: A shared secret key for the authentication process.
e.g. 0123456789
## Usage
Open the **Mock app** and enter the IMPI, DOMAIN and PASSWORD values. After that, it can be even closed.
The **MCOP SDK** or **MCOP MCPTT** Client need to be opened after the data has been entered in the Mock App.
## Installation
Download the **Mock apk** from [here](https://demo.mcopenplatform.org/gitlist/mcop/MCOP-SDK.git/raw/master/mock/mockAPP.apk).
It can be installed directly from an Android device, or using [Android ADB](https://developer.android.com/studio/command-line/adb) from a computer.
## Screenshot
![MOCK](../images/images_mockAuth.png)
## Response
The Mock app provides a response according to the standard specified in [ETSI TS 131 102](http://www.etsi.org/deliver/etsi_ts/131100_131199/131102/14.04.00_60/ts_131102v140400p.pdf) on section *7.1.2.1 GSM/3G security context*, in base64 format.
## Disclaimer
The Mock App internally uses **amf = 0x0000 (hex)** and **OP = 0x00000000000000000000000000000000 (hex)**.