Lines Matching full:identity
161 if (sm->identity) { in eap_sim_init()
162 /* Use the EAP-Response/Identity in MK derivation if AT_IDENTITY in eap_sim_init()
164 data->mk_identity = os_memdup(sm->identity, sm->identity_len); in eap_sim_init()
434 const u8 *identity = NULL; in eap_sim_learn_ids() local
444 /* Look for the realm of the permanent identity */ in eap_sim_learn_ids()
445 identity = eap_get_config_identity(sm, &identity_len); in eap_sim_learn_ids()
446 if (identity) { in eap_sim_learn_ids()
447 for (realm = identity, realm_len = identity_len; in eap_sim_learn_ids()
515 const u8 *identity, size_t identity_len, in eap_sim_encrypt_identity() argument
522 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM: Encrypt permanent identity", in eap_sim_encrypt_identity()
523 identity, identity_len); in eap_sim_encrypt_identity()
525 imsi_buf = wpabuf_alloc_copy(identity, identity_len); in eap_sim_encrypt_identity()
553 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM: Encrypted permanent identity", in eap_sim_encrypt_identity()
565 const u8 *identity = NULL; in eap_sim_response_start() local
575 identity = data->reauth_id; in eap_sim_response_start()
582 identity = data->pseudonym; in eap_sim_response_start()
586 identity = eap_get_config_identity(sm, &identity_len); in eap_sim_response_start()
587 if (identity) { in eap_sim_response_start()
601 if (identity && data->imsi_privacy_key) { in eap_sim_response_start()
609 identity, identity_len, attr); in eap_sim_response_start()
612 "EAP-SIM: Failed to encrypt permanent identity"); in eap_sim_response_start()
617 /* Use the real identity, not the encrypted one, in MK in eap_sim_response_start()
620 data->mk_identity = os_memdup(identity, identity_len); in eap_sim_response_start()
622 identity = wpabuf_head(enc_identity); in eap_sim_response_start()
631 if (identity) { in eap_sim_response_start()
633 identity, identity_len); in eap_sim_response_start()
635 identity, identity_len); in eap_sim_response_start()
637 /* Use the IMSI identity override, i.e., the not in eap_sim_response_start()
639 * externally encrypted identity in configuration. */ in eap_sim_response_start()
646 /* Use the last AT_IDENTITY value as the identity in in eap_sim_response_start()
649 data->mk_identity = os_memdup(identity, identity_len); in eap_sim_response_start()
848 const u8 *identity; in eap_sim_process_challenge() local
914 identity = data->mk_identity; in eap_sim_process_challenge()
916 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM: Selected identity for MK " in eap_sim_process_challenge()
917 "derivation", identity, identity_len); in eap_sim_process_challenge()
918 eap_sim_derive_mk(identity, identity_len, data->nonce_mt, in eap_sim_process_challenge()
937 /* Old reauthentication identity must not be used anymore. In in eap_sim_process_challenge()
938 * other words, if no new reauth identity is received, full in eap_sim_process_challenge()
940 * pseudonym identity or permanent identity). */ in eap_sim_process_challenge()
1206 wpa_printf(MSG_INFO, "EAP-SIM: Identity not configured"); in eap_sim_process()
1313 if (sm->identity) { in eap_sim_init_for_reauth()
1314 /* Use the EAP-Response/Identity in MK derivation if AT_IDENTITY in eap_sim_init_for_reauth()
1317 data->mk_identity = os_memdup(sm->identity, sm->identity_len); in eap_sim_init_for_reauth()