Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching refs:attr

233 		       struct eap_sim_attrs *attr, int aka, int encr)
238 os_memset(attr, 0, sizeof(*attr));
239 attr->id_req = NO_ID_REQ;
240 attr->notification = -1;
241 attr->counter = -1;
242 attr->selected_version = -1;
243 attr->client_error_code = -1;
279 attr->rand = apos;
280 attr->num_chal = alen / GSM_RAND_LEN;
297 attr->autn = apos;
325 attr->nonce_mt = apos + 2;
329 attr->id_req = PERMANENT_ID;
338 attr->mac = apos + 2;
347 attr->notification = apos[0] * 256 + apos[1];
349 attr->notification);
353 attr->id_req = ANY_ID;
357 attr->identity = apos + 2;
358 attr->identity_len = alen - 2;
376 attr->version_list = apos + 2;
377 attr->version_list_len = list_len;
387 attr->selected_version = apos[0] * 256 + apos[1];
389 "%d", attr->selected_version);
393 attr->id_req = FULLAUTH_ID;
407 attr->counter = apos[0] * 256 + apos[1];
409 attr->counter);
425 attr->counter_too_small = 1;
441 attr->nonce_s = apos + 2;
450 attr->client_error_code = apos[0] * 256 + apos[1];
452 "%d", attr->client_error_code);
461 attr->iv = apos + 2;
465 attr->encr_data = apos + 2;
466 attr->encr_data_len = alen - 2;
467 if (attr->encr_data_len % 16) {
471 attr->encr_data_len);
487 " len %lu, attr len %lu)",
492 attr->next_pseudonym = pos + 4;
493 attr->next_pseudonym_len = plen;
507 " len %lu, attr len %lu)",
512 attr->next_reauth_id = pos + 4;
513 attr->next_reauth_id_len = plen;
526 attr->res = apos;
527 attr->res_len = alen;
542 attr->auts = apos;
569 struct eap_sim_attrs *attr, int aka)
587 if (eap_sim_parse_attr(decrypted, decrypted + encr_data_len, attr,
686 u8 * eap_sim_msg_add_full(struct eap_sim_msg *msg, u8 attr,
701 *pos++ = attr;
713 u8 * eap_sim_msg_add(struct eap_sim_msg *msg, u8 attr, u16 value,
728 *pos++ = attr;
743 u8 * eap_sim_msg_add_mac(struct eap_sim_msg *msg, u8 attr)
745 u8 *pos = eap_sim_msg_add(msg, attr, 0, NULL, EAP_SIM_MAC_LEN);