Lines Matching full:identity
119 username = sim_get_username(sm->identity, sm->identity_len); in eap_sim_build_start()
129 wpa_printf(MSG_DEBUG, " No identity request"); in eap_sim_build_start()
132 * RFC 4186, Chap. 4.2.4 recommends that identity from EAP is in eap_sim_build_start()
133 * ignored and the SIM/Start is used to request the identity. in eap_sim_build_start()
145 * already know the identity of the peer, there is no need to in eap_sim_build_start()
146 * request any identity in this case. in eap_sim_build_start()
148 } else if (sm->identity && sm->identity_len > 0 && in eap_sim_build_start()
149 sm->identity[0] == EAP_SIM_REAUTH_ID_PREFIX) { in eap_sim_build_start()
288 eap_sim_derive_keys_reauth(data->counter, sm->identity, in eap_sim_build_reauth()
453 const u8 *identity; in eap_sim_process_start() local
463 * Special case for AT_COUNTER_TOO_SMALL recovery - no identity in eap_sim_process_start()
470 (!attr->identity || attr->identity_len == 0)) in eap_sim_process_start()
474 * Unless explicitly configured otherwise, we always request identity in eap_sim_process_start()
477 if (!attr->identity || attr->identity_len == 0) { in eap_sim_process_start()
479 "identity"); in eap_sim_process_start()
486 os_free(sm->identity); in eap_sim_process_start()
487 sm->identity = new_identity; in eap_sim_process_start()
488 os_memcpy(sm->identity, attr->identity, attr->identity_len); in eap_sim_process_start()
493 identity = (const u8 *) sm->sim_aka_permanent; in eap_sim_process_start()
496 identity = sm->identity; in eap_sim_process_start()
499 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM: Identity", in eap_sim_process_start()
500 identity, identity_len); in eap_sim_process_start()
501 username = sim_get_username(identity, identity_len); in eap_sim_process_start()
513 "identity - request full auth identity"); in eap_sim_process_start()
524 "EAP-SIM: Permanent identity recognized - skip new Identity query"); in eap_sim_process_start()
558 "identity - request permanent identity"); in eap_sim_process_start()
570 } else if (sm->identity_len > 1 && sm->identity[0] == '\0') { in eap_sim_process_start()
581 "EAP-SIM: Received encrypted identity, but no IMSI privacy key configured to decrypt it"); in eap_sim_process_start()
585 enc_id = (char *) &sm->identity[1]; in eap_sim_process_start()
586 end = (char *) &sm->identity[sm->identity_len]; in eap_sim_process_start()
594 "EAP-SIM: Encrypted permanent identity", in eap_sim_process_start()
599 "EAP-SIM: Could not base64 decode encrypted identity"); in eap_sim_process_start()
603 "EAP-SIM: Decoded encrypted permanent identity", in eap_sim_process_start()
614 "EAP-SIM: Failed to decrypt encrypted identity"); in eap_sim_process_start()
617 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM: Decrypted permanent identity", in eap_sim_process_start()
629 os_free(sm->identity); in eap_sim_process_start()
630 sm->identity = new_id; in eap_sim_process_start()
680 while (identity_len > 0 && sm->identity[identity_len - 1] == '\0') { in eap_sim_process_start()
682 "character from identity"); in eap_sim_process_start()
685 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM: Identity for MK derivation", in eap_sim_process_start()
686 sm->identity, identity_len); in eap_sim_process_start()
690 eap_sim_derive_mk(sm->identity, identity_len, attr->nonce_mt, in eap_sim_process_start()