Lines Matching refs:attr

416 				  struct eap_sim_attrs *attr)
437 if (!attr->identity || attr->identity_len == 0) {
443 new_identity = os_malloc(attr->identity_len);
448 os_memcpy(sm->identity, attr->identity, attr->identity_len);
449 sm->identity_len = attr->identity_len;
508 if (attr->nonce_mt == NULL || attr->selected_version < 0) {
514 if (!eap_sim_supported_ver(data, attr->selected_version)) {
516 "version %d", attr->selected_version);
547 os_memcpy(data->nonce_mt, attr->nonce_mt, EAP_SIM_NONCE_MT_LEN);
549 eap_sim_derive_mk(sm->identity, identity_len, attr->nonce_mt,
550 attr->selected_version, ver_list, sizeof(ver_list),
567 struct eap_sim_attrs *attr)
569 if (attr->mac == NULL ||
570 eap_sim_verify_mac(data->k_aut, respData, attr->mac,
582 if (sm->eap_sim_aka_result_ind && attr->result_ind) {
606 struct eap_sim_attrs *attr)
611 if (attr->mac == NULL ||
612 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
619 if (attr->encr_data == NULL || attr->iv == NULL) {
625 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
626 attr->encr_data_len, attr->iv, &eattr,
655 if (sm->eap_sim_aka_result_ind && attr->result_ind) {
686 struct eap_sim_attrs *attr)
689 attr->client_error_code);
700 struct eap_sim_attrs *attr)
717 struct eap_sim_attrs attr;
735 if (eap_sim_parse_attr(pos, end, &attr, 0, 0)) {
750 eap_sim_process_client_error(sm, data, respData, &attr);
756 eap_sim_process_start(sm, data, respData, &attr);
759 eap_sim_process_challenge(sm, data, respData, &attr);
762 eap_sim_process_reauth(sm, data, respData, &attr);
765 eap_sim_process_notification(sm, data, respData, &attr);