Lines Matching refs:id

385 				     struct eap_aka_data *data, int id)  in eap_aka_clear_identities()  argument
387 if ((id & CLEAR_PSEUDONYM) && data->pseudonym) { in eap_aka_clear_identities()
395 if ((id & CLEAR_REAUTH_ID) && data->reauth_id) { in eap_aka_clear_identities()
581 static struct wpabuf * eap_aka_client_error(struct eap_aka_data *data, u8 id, in eap_aka_client_error() argument
592 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method, in eap_aka_client_error()
600 u8 id) in eap_aka_authentication_reject() argument
609 "(id=%d)", id); in eap_aka_authentication_reject()
610 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method, in eap_aka_authentication_reject()
617 struct eap_aka_data *data, u8 id, struct eap_sim_attrs *attr) in eap_aka_synchronization_failure() argument
625 "(id=%d)", id); in eap_aka_synchronization_failure()
626 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method, in eap_aka_synchronization_failure()
695 u8 id, in eap_aka_response_identity() argument
746 data, id, in eap_aka_response_identity()
760 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Identity (id=%d)", id); in eap_aka_response_identity()
761 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method, in eap_aka_response_identity()
793 u8 id) in eap_aka_response_challenge() argument
797 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Challenge (id=%d)", id); in eap_aka_response_challenge()
798 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method, in eap_aka_response_challenge()
816 u8 id, int counter_too_small, in eap_aka_response_reauth() argument
823 id); in eap_aka_response_reauth()
824 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method, in eap_aka_response_reauth()
859 u8 id, u16 notification) in eap_aka_response_notification() argument
864 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Notification (id=%d)", id); in eap_aka_response_notification()
865 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method, in eap_aka_response_notification()
893 u8 id, in eap_aka_process_identity() argument
925 return eap_aka_client_error(data, id, in eap_aka_process_identity()
929 buf = eap_aka_response_identity(sm, data, id, attr->id_req); in eap_aka_process_identity()
931 if (data->prev_id != id) { in eap_aka_process_identity()
937 data, id, EAP_AKA_UNABLE_TO_PROCESS_PACKET); in eap_aka_process_identity()
939 data->prev_id = id; in eap_aka_process_identity()
960 u8 id, u16 kdf) in eap_aka_prime_kdf_select() argument
967 "select)", id); in eap_aka_prime_kdf_select()
968 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method, in eap_aka_prime_kdf_select()
977 u8 id, struct eap_sim_attrs *attr) in eap_aka_prime_kdf_neg() argument
986 return eap_aka_prime_kdf_select(data, id, in eap_aka_prime_kdf_neg()
993 return eap_aka_authentication_reject(data, id); in eap_aka_prime_kdf_neg()
1054 u8 id, in eap_aka_process_challenge() argument
1074 return eap_aka_client_error(data, id, in eap_aka_process_challenge()
1085 return eap_aka_authentication_reject(data, id); in eap_aka_process_challenge()
1093 return eap_aka_authentication_reject(data, id); in eap_aka_process_challenge()
1103 return eap_aka_authentication_reject(data, id); in eap_aka_process_challenge()
1106 data, id, EAP_AKA_UNABLE_TO_PROCESS_PACKET); in eap_aka_process_challenge()
1109 return eap_aka_prime_kdf_neg(data, id, attr); in eap_aka_process_challenge()
1123 return eap_aka_authentication_reject(data, id); in eap_aka_process_challenge()
1135 return eap_aka_client_error(data, id, in eap_aka_process_challenge()
1145 return eap_aka_authentication_reject(data, id); in eap_aka_process_challenge()
1149 return eap_aka_synchronization_failure(data, id, attr); in eap_aka_process_challenge()
1155 return eap_aka_client_error(data, id, in eap_aka_process_challenge()
1166 return eap_aka_authentication_reject(data, id); in eap_aka_process_challenge()
1196 return eap_aka_client_error(data, id, in eap_aka_process_challenge()
1214 data, id, EAP_AKA_UNABLE_TO_PROCESS_PACKET); in eap_aka_process_challenge()
1234 return eap_aka_response_challenge(data, id); in eap_aka_process_challenge()
1300 struct eap_sm *sm, struct eap_aka_data *data, u8 id, in eap_aka_process_notification() argument
1307 return eap_aka_client_error(data, id, in eap_aka_process_notification()
1314 return eap_aka_client_error(data, id, in eap_aka_process_notification()
1320 return eap_aka_client_error(data, id, in eap_aka_process_notification()
1331 return eap_aka_response_notification(data, id, attr->notification); in eap_aka_process_notification()
1336 struct eap_sm *sm, struct eap_aka_data *data, u8 id, in eap_aka_process_reauthentication() argument
1354 return eap_aka_client_error(data, id, in eap_aka_process_reauthentication()
1361 return eap_aka_client_error(data, id, in eap_aka_process_reauthentication()
1369 return eap_aka_client_error(data, id, in eap_aka_process_reauthentication()
1384 return eap_aka_client_error(data, id, in eap_aka_process_reauthentication()
1394 return eap_aka_client_error(data, id, in eap_aka_process_reauthentication()
1403 return eap_aka_client_error(data, id, in eap_aka_process_reauthentication()
1418 res = eap_aka_response_reauth(data, id, 1, eattr.nonce_s); in eap_aka_process_reauthentication()
1460 return eap_aka_response_reauth(data, id, 0, data->nonce_s); in eap_aka_process_reauthentication()
1470 u8 subtype, id; in eap_aka_process() local
1491 id = req->identifier; in eap_aka_process()
1506 res = eap_aka_client_error(data, id, in eap_aka_process()
1513 res = eap_aka_process_identity(sm, data, id, reqData, &attr); in eap_aka_process()
1516 res = eap_aka_process_challenge(sm, data, id, reqData, &attr); in eap_aka_process()
1519 res = eap_aka_process_notification(sm, data, id, reqData, in eap_aka_process()
1523 res = eap_aka_process_reauthentication(sm, data, id, reqData, in eap_aka_process()
1528 res = eap_aka_client_error(data, id, in eap_aka_process()
1533 res = eap_aka_client_error(data, id, in eap_aka_process()
1652 u8 *id; in eap_aka_get_session_id() local
1661 id = os_malloc(*len); in eap_aka_get_session_id()
1662 if (id == NULL) in eap_aka_get_session_id()
1665 id[0] = data->eap_method; in eap_aka_get_session_id()
1667 os_memcpy(id + 1, data->rand, EAP_AKA_RAND_LEN); in eap_aka_get_session_id()
1668 os_memcpy(id + 1 + EAP_AKA_RAND_LEN, data->autn, in eap_aka_get_session_id()
1671 os_memcpy(id + 1, data->nonce_s, EAP_SIM_NONCE_S_LEN); in eap_aka_get_session_id()
1672 os_memcpy(id + 1 + EAP_SIM_NONCE_S_LEN, data->reauth_mac, in eap_aka_get_session_id()
1675 wpa_hexdump(MSG_DEBUG, "EAP-AKA: Derived Session-Id", id, *len); in eap_aka_get_session_id()
1677 return id; in eap_aka_get_session_id()