HomeSort by relevance Sort by last modified time
    Searched refs:in_data (Results 1 - 25 of 41) sorted by null

1 2

  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_record.c 234 * @in_data: Received data
236 * @out_data: Buffer for output data (must be at least as long as in_data)
246 const u8 *in_data, size_t in_len,
255 in_data, in_len);
265 "length %d", in_data[0], in_data[1], in_data[2],
266 WPA_GET_BE16(in_data + 3));
268 if (in_data[0] != TLS_CONTENT_TYPE_HANDSHAKE &&
269 in_data[0] != TLS_CONTENT_TYPE_CHANGE_CIPHER_SPEC &
    [all...]
tlsv1_client.h 30 const u8 *in_data, size_t in_len,
34 const u8 *in_data, size_t in_len,
37 const u8 *in_data, size_t in_len,
tlsv1_server.h 30 const u8 *in_data, size_t in_len, size_t *out_len);
32 const u8 *in_data, size_t in_len,
35 const u8 *in_data, size_t in_len,
tlsv1_client_read.c 28 const u8 *in_data, size_t *in_len);
30 const u8 *in_data, size_t *in_len);
32 const u8 *in_data, size_t *in_len);
36 const u8 *in_data, size_t *in_len)
50 pos = in_data;
199 *in_len = end - in_data;
214 const u8 *in_data, size_t *in_len)
230 pos = in_data;
254 return tls_process_server_key_exchange(conn, ct, in_data,
257 return tls_process_certificate_request(conn, ct, in_data,
    [all...]
tlsv1_client.c 124 * @in_data: Input data from TLS peer
132 const u8 *in_data, size_t in_len,
147 if (in_data == NULL || in_len == 0)
150 pos = in_data;
151 end = in_data + in_len;
212 * @in_data: Pointer to plaintext data to be encrypted
222 const u8 *in_data, size_t in_len,
228 in_data, in_len);
230 os_memcpy(out_data + TLS_RECORD_HEADER_LEN, in_data, in_len);
247 * @in_data: Pointer to input buffer (encrypted TLS data
    [all...]
tlsv1_server.c 106 * @in_data: Input data from TLS peer
112 const u8 *in_data, size_t in_len,
119 if (in_data == NULL || in_len == 0) {
124 pos = in_data;
125 end = in_data + in_len;
186 * @in_data: Pointer to plaintext data to be encrypted
196 const u8 *in_data, size_t in_len,
202 in_data, in_len);
204 os_memcpy(out_data + TLS_RECORD_HEADER_LEN, in_data, in_len);
221 * @in_data: Pointer to input buffer (encrypted TLS data
    [all...]
tlsv1_server_read.c 29 const u8 *in_data, size_t *in_len);
31 u8 ct, const u8 *in_data,
36 const u8 *in_data, size_t *in_len)
53 pos = in_data;
251 *in_len = end - in_data;
268 const u8 *in_data, size_t *in_len)
284 pos = in_data;
318 return tls_process_client_key_exchange(conn, ct, in_data,
461 *in_len = end - in_data;
675 const u8 *in_data, size_t *in_len
    [all...]
tlsv1_record.h 71 const u8 *in_data, size_t in_len,
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_tls_common.h 106 struct eap_ssl_data *data, const u8 *in_data, size_t in_len,
110 u8 id, const u8 *in_data, size_t in_len,
126 const struct wpabuf *in_data,
130 const struct wpabuf *in_data,
eap_tls_common.c 312 * @in_data: Next incoming TLS segment
313 * @in_len: Length of in_data
318 const u8 *in_data, size_t in_len)
359 os_memcpy(buf + data->tls_in_len, in_data, in_len);
377 * @in_data: Next incoming TLS segment
378 * @in_len: Length of in_data
389 struct eap_ssl_data *data, const u8 *in_data, size_t in_len,
396 int res = eap_peer_tls_reassemble_fragment(data, in_data,
411 os_memcpy(data->tls_in, in_data, in_len);
424 * @in_data: Message received from the serve
    [all...]
  /external/wpa_supplicant/
tlsv1_client.h 28 const u8 *in_data, size_t in_len,
31 const u8 *in_data, size_t in_len,
34 const u8 *in_data, size_t in_len,
tlsv1_common.c 378 * @in_data: Received data
380 * @out_data: Buffer for output data (must be at least as long as in_data)
390 const u8 *in_data, size_t in_len,
399 in_data, in_len);
409 "length %d", in_data[0], in_data[1], in_data[2],
410 WPA_GET_BE16(in_data + 3));
412 if (in_data[0] != TLS_CONTENT_TYPE_HANDSHAKE &&
413 in_data[0] != TLS_CONTENT_TYPE_CHANGE_CIPHER_SPEC &
    [all...]
tls_none.c 111 const u8 *in_data, size_t in_len,
121 const u8 *in_data, size_t in_len,
129 const u8 *in_data, size_t in_len,
137 const u8 *in_data, size_t in_len,
tls_internal.c 188 const u8 *in_data, size_t in_len,
195 wpa_printf(MSG_DEBUG, "TLS: %s(in_data=%p in_len=%lu)",
196 __func__, in_data, (unsigned long) in_len);
197 return tlsv1_client_handshake(conn->client, in_data, in_len, out_len);
203 const u8 *in_data, size_t in_len,
212 const u8 *in_data, size_t in_len,
215 return tlsv1_client_encrypt(conn->client, in_data, in_len, out_data,
221 const u8 *in_data, size_t in_len,
224 return tlsv1_client_decrypt(conn->client, in_data, in_len, out_data,
tls.h 278 * @in_data: Input data from TLS peer
291 * in_data == %NULL and the library is expected to return ClientHello packet.
293 * to TLS library by calling this function again with in_data pointing to the
305 const u8 *in_data, size_t in_len,
313 * @in_data: Input data from TLS peer
322 const u8 *in_data, size_t in_len,
329 * @in_data: Pointer to plaintext data to be encrypted
339 const u8 *in_data, size_t in_len,
346 * @in_data: Pointer to input buffer (encrypted TLS data)
356 const u8 *in_data, size_t in_len
    [all...]
eap_tls_common.h 55 struct eap_sm *sm, struct eap_ssl_data *data, const u8 *in_data,
59 u8 id, const u8 *in_data, size_t in_len,
tlsv1_client.c 94 const u8 *in_data, size_t *in_len);
96 const u8 *in_data, size_t *in_len);
98 const u8 *in_data, size_t *in_len);
250 const u8 *in_data, size_t *in_len)
264 pos = in_data;
390 *in_len = end - in_data;
430 const u8 *in_data, size_t *in_len)
446 pos = in_data;
470 return tls_process_server_key_exchange(conn, ct, in_data,
473 return tls_process_certificate_request(conn, ct, in_data,
    [all...]
tls_schannel.c 320 const u8 *in_data, size_t in_len,
349 inbufs[0].pvBuffer = (u8 *) in_data;
475 const u8 *in_data, size_t in_len,
483 const u8 *in_data, size_t in_len,
522 os_memcpy(out_data + sizes.cbHeader, in_data, in_len);
571 const u8 *in_data, size_t in_len,
587 in_data, in_len);
589 os_memcpy(out_data, in_data, in_len);
eap_tls_common.c 285 * @in_data: Next incoming TLS segment
286 * @in_len: Length of in_data
297 struct eap_sm *sm, struct eap_ssl_data *data, const u8 *in_data,
336 os_memcpy(buf + data->tls_in_len, in_data, in_len);
357 os_memcpy(data->tls_in, in_data, in_len);
367 const u8 *in_data, size_t in_len,
376 msg = eap_tls_data_reassemble(sm, data, in_data, in_len,
480 * @in_data: Message received from the server
481 * @in_len: Length of in_data
498 u8 id, const u8 *in_data, size_t in_len
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
tls_internal.c 335 const u8 *in_data, size_t in_len,
346 wpa_printf(MSG_DEBUG, "TLS: %s(in_data=%p in_len=%lu)",
347 __func__, in_data, (unsigned long) in_len);
348 return tlsv1_client_handshake(conn->client, in_data, in_len, out_len,
358 const u8 *in_data, size_t in_len,
366 wpa_printf(MSG_DEBUG, "TLS: %s(in_data=%p in_len=%lu)",
367 __func__, in_data, (unsigned long) in_len);
368 out = tlsv1_server_handshake(conn->server, in_data, in_len, out_len);
381 const u8 *in_data, size_t in_len,
386 return tlsv1_client_encrypt(conn->client, in_data, in_len
    [all...]
tls_none.c 111 const u8 *in_data, size_t in_len,
121 const u8 *in_data, size_t in_len,
129 const u8 *in_data, size_t in_len,
137 const u8 *in_data, size_t in_len,
tls.h 295 * @in_data: Input data from TLS peer
308 * in_data == %NULL and the library is expected to return ClientHello packet.
310 * to TLS library by calling this function again with in_data pointing to the
322 const u8 *in_data, size_t in_len,
330 * @in_data: Input data from TLS peer
339 const u8 *in_data, size_t in_len,
346 * @in_data: Pointer to plaintext data to be encrypted
357 const u8 *in_data, size_t in_len,
364 * @in_data: Pointer to input buffer (encrypted TLS data)
375 const u8 *in_data, size_t in_len
    [all...]
tls_schannel.c 320 const u8 *in_data, size_t in_len,
349 inbufs[0].pvBuffer = (u8 *) in_data;
475 const u8 *in_data, size_t in_len,
483 const u8 *in_data, size_t in_len,
522 os_memcpy(out_data + sizes.cbHeader, in_data, in_len);
571 const u8 *in_data, size_t in_len,
587 in_data, in_len);
589 os_memcpy(out_data, in_data, in_len);
  /external/qemu/hw/
bt-hci-csr.c 44 int in_data; member in struct:csrhci_s
316 s->in_data = csrhci_data_len(s->inpkt) + s->in_hdr;
318 if (s->in_len >= s->in_data) {
321 memmove(s->inpkt, s->inpkt + s->in_len, s->in_len - s->in_data);
322 s->in_len -= s->in_data;
324 s->in_data = INT_MAX;
396 s->in_data = INT_MAX;
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_peap.c 645 struct wpabuf *in_data)
653 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_TLV, in_data, &left);
763 struct wpabuf *in_data)
773 pos = eap_hdr_validate(EAP_VENDOR_MICROSOFT, 0x21, in_data, &left);
893 struct wpabuf *in_data)
901 eap_peap_process_phase2_tlv(sm, data, in_data);
907 eap_peap_process_phase2_soh(sm, data, in_data);
918 hdr = wpabuf_head(in_data);
921 if (wpabuf_len(in_data) > sizeof(*hdr) && *pos == EAP_TYPE_NAK) {
922 left = wpabuf_len(in_data) - sizeof(*hdr)
1035 u8 *in_data; local
    [all...]

Completed in 183 milliseconds

1 2