Lines Matching refs:id

241 				     struct eap_aka_data *data, int id)
243 if ((id & CLEAR_PSEUDONYM) && data->pseudonym) {
250 if ((id & CLEAR_REAUTH_ID) && data->reauth_id) {
256 if ((id & CLEAR_EAP_ID) && data->last_eap_identity) {
432 static struct wpabuf * eap_aka_client_error(struct eap_aka_data *data, u8 id,
443 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method,
451 u8 id)
460 "(id=%d)", id);
461 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method,
468 struct eap_aka_data *data, u8 id)
476 "(id=%d)", id);
477 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method,
488 u8 id,
515 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Identity (id=%d)", id);
516 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method,
531 u8 id)
535 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Challenge (id=%d)", id);
536 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method,
553 u8 id, int counter_too_small,
559 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Reauthentication (id=%d)",
560 id);
561 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method,
596 u8 id, u16 notification)
601 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Notification (id=%d)", id);
602 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method,
630 u8 id,
662 return eap_aka_client_error(data, id,
666 buf = eap_aka_response_identity(sm, data, id, attr->id_req);
668 if (data->prev_id != id) {
671 data->prev_id = id;
692 u8 id, u16 kdf)
698 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Challenge (id=%d) (KDF "
699 "select)", id);
700 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method,
709 u8 id, struct eap_sim_attrs *attr)
715 return eap_aka_prime_kdf_select(data, id,
721 return eap_aka_authentication_reject(data, id);
776 u8 id,
792 return eap_aka_client_error(data, id,
802 return eap_aka_authentication_reject(data, id);
809 return eap_aka_authentication_reject(data, id);
820 return eap_aka_authentication_reject(data, id);
823 return eap_aka_prime_kdf_neg(data, id, attr);
837 return eap_aka_authentication_reject(data, id);
849 return eap_aka_client_error(data, id,
859 return eap_aka_authentication_reject(data, id);
863 return eap_aka_synchronization_failure(data, id);
866 return eap_aka_client_error(data, id,
877 return eap_aka_authentication_reject(data, id);
908 return eap_aka_client_error(data, id,
925 data, id, EAP_AKA_UNABLE_TO_PROCESS_PACKET);
945 return eap_aka_response_challenge(data, id);
1011 struct eap_sm *sm, struct eap_aka_data *data, u8 id,
1018 return eap_aka_client_error(data, id,
1025 return eap_aka_client_error(data, id,
1031 return eap_aka_client_error(data, id,
1041 return eap_aka_response_notification(data, id, attr->notification);
1046 struct eap_sm *sm, struct eap_aka_data *data, u8 id,
1059 return eap_aka_client_error(data, id,
1066 return eap_aka_client_error(data, id,
1074 return eap_aka_client_error(data, id,
1081 return eap_aka_client_error(data, id,
1091 return eap_aka_client_error(data, id,
1100 return eap_aka_client_error(data, id,
1121 res = eap_aka_response_reauth(data, id, 1, eattr.nonce_s);
1164 return eap_aka_response_reauth(data, id, 0, data->nonce_s);
1174 u8 subtype, id;
1195 id = req->identifier;
1210 res = eap_aka_client_error(data, id,
1217 res = eap_aka_process_identity(sm, data, id, reqData, &attr);
1220 res = eap_aka_process_challenge(sm, data, id, reqData, &attr);
1223 res = eap_aka_process_notification(sm, data, id, reqData,
1227 res = eap_aka_process_reauthentication(sm, data, id, reqData,
1232 res = eap_aka_client_error(data, id,
1237 res = eap_aka_client_error(data, id,