Lines Matching refs:attr
192 struct eap_sim_attrs *attr)
194 if (attr->next_pseudonym) {
196 data->pseudonym = os_malloc(attr->next_pseudonym_len);
202 os_memcpy(data->pseudonym, attr->next_pseudonym,
203 attr->next_pseudonym_len);
204 data->pseudonym_len = attr->next_pseudonym_len;
211 if (attr->next_reauth_id) {
213 data->reauth_id = os_malloc(attr->next_reauth_id_len);
219 os_memcpy(data->reauth_id, attr->next_reauth_id,
220 attr->next_reauth_id_len);
221 data->reauth_id_len = attr->next_reauth_id_len;
403 struct eap_sim_attrs *attr)
410 if (attr->version_list == NULL) {
418 data->ver_list = os_malloc(attr->version_list_len);
425 os_memcpy(data->ver_list, attr->version_list, attr->version_list_len);
426 data->ver_list_len = attr->version_list_len;
447 switch (attr->id_req) {
474 attr->id_req);
483 struct eap_sim_attrs *attr)
491 if (!attr->mac || !attr->rand) {
494 !attr->mac ? " AT_MAC" : "",
495 !attr->rand ? " AT_RAND" : "");
501 (unsigned long) attr->num_chal);
502 if (attr->num_chal < data->min_num_chal) {
504 "challenges (%lu)", (unsigned long) attr->num_chal);
508 if (attr->num_chal > 3) {
510 "(%lu)", (unsigned long) attr->num_chal);
516 if (os_memcmp(attr->rand, attr->rand + GSM_RAND_LEN,
518 (attr->num_chal > 2 &&
519 (os_memcmp(attr->rand, attr->rand + 2 * GSM_RAND_LEN,
521 os_memcmp(attr->rand + GSM_RAND_LEN,
522 attr->rand + 2 * GSM_RAND_LEN,
529 os_memcpy(data->rand, attr->rand, attr->num_chal * GSM_RAND_LEN);
530 data->num_chal = attr->num_chal;
554 attr->mac, data->nonce_mt,
568 if (attr->encr_data) {
570 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
571 attr->encr_data_len, attr->iv,
596 struct eap_sim_attrs *attr)
601 if (attr->encr_data == NULL || attr->iv == NULL) {
607 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
608 attr->encr_data_len, attr->iv, &eattr,
632 struct eap_sim_attrs *attr)
634 if (attr->mac == NULL) {
640 if (eap_sim_verify_mac(data->k_aut, (u8 *) req, reqDataLen, attr->mac,
648 eap_sim_process_notification_reauth(data, attr)) {
663 struct eap_sim_attrs *attr)
673 if (attr->notification == -1) {
680 if ((attr->notification & 0x4000) == 0 &&
681 eap_sim_process_notification_auth(data, req, reqDataLen, attr)) {
686 eap_sim_report_notification(sm->msg_ctx, attr->notification, 0);
687 if (attr->notification >= 0 && attr->notification < 32768) {
691 attr->notification);
700 struct eap_sim_attrs *attr)
716 attr->mac, (u8 *) "", 0)) {
723 if (attr->encr_data == NULL || attr->iv == NULL) {
730 decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
731 attr->encr_data_len, attr->iv, &eattr,
803 struct eap_sim_attrs attr;
832 if (eap_sim_parse_attr(pos, reqData + len, &attr, 0, 0)) {
841 respDataLen, &attr);
845 respDataLen, &attr);
849 respDataLen, &attr);
853 respDataLen, &attr);