/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_record.c | 234 * @in_data: Received data 236 * @out_data: Buffer for output data (must be at least as long as in_data) 246 const u8 *in_data, size_t in_len, 255 in_data, in_len); 265 "length %d", in_data[0], in_data[1], in_data[2], 266 WPA_GET_BE16(in_data + 3)); 268 if (in_data[0] != TLS_CONTENT_TYPE_HANDSHAKE && 269 in_data[0] != TLS_CONTENT_TYPE_CHANGE_CIPHER_SPEC & [all...] |
tlsv1_client.h | 30 const u8 *in_data, size_t in_len, 34 const u8 *in_data, size_t in_len, 37 const u8 *in_data, size_t in_len,
|
tlsv1_server.h | 30 const u8 *in_data, size_t in_len, size_t *out_len); 32 const u8 *in_data, size_t in_len, 35 const u8 *in_data, size_t in_len,
|
tlsv1_client_read.c | 28 const u8 *in_data, size_t *in_len); 30 const u8 *in_data, size_t *in_len); 32 const u8 *in_data, size_t *in_len); 36 const u8 *in_data, size_t *in_len) 50 pos = in_data; 199 *in_len = end - in_data; 214 const u8 *in_data, size_t *in_len) 230 pos = in_data; 254 return tls_process_server_key_exchange(conn, ct, in_data, 257 return tls_process_certificate_request(conn, ct, in_data, [all...] |
tlsv1_client.c | 124 * @in_data: Input data from TLS peer 132 const u8 *in_data, size_t in_len, 147 if (in_data == NULL || in_len == 0) 150 pos = in_data; 151 end = in_data + in_len; 212 * @in_data: Pointer to plaintext data to be encrypted 222 const u8 *in_data, size_t in_len, 228 in_data, in_len); 230 os_memcpy(out_data + TLS_RECORD_HEADER_LEN, in_data, in_len); 247 * @in_data: Pointer to input buffer (encrypted TLS data [all...] |
tlsv1_server.c | 106 * @in_data: Input data from TLS peer 112 const u8 *in_data, size_t in_len, 119 if (in_data == NULL || in_len == 0) { 124 pos = in_data; 125 end = in_data + in_len; 186 * @in_data: Pointer to plaintext data to be encrypted 196 const u8 *in_data, size_t in_len, 202 in_data, in_len); 204 os_memcpy(out_data + TLS_RECORD_HEADER_LEN, in_data, in_len); 221 * @in_data: Pointer to input buffer (encrypted TLS data [all...] |
tlsv1_server_read.c | 29 const u8 *in_data, size_t *in_len); 31 u8 ct, const u8 *in_data, 36 const u8 *in_data, size_t *in_len) 53 pos = in_data; 251 *in_len = end - in_data; 268 const u8 *in_data, size_t *in_len) 284 pos = in_data; 318 return tls_process_client_key_exchange(conn, ct, in_data, 461 *in_len = end - in_data; 675 const u8 *in_data, size_t *in_len [all...] |
tlsv1_record.h | 71 const u8 *in_data, size_t in_len,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_tls_common.h | 106 struct eap_ssl_data *data, const u8 *in_data, size_t in_len, 110 u8 id, const u8 *in_data, size_t in_len, 126 const struct wpabuf *in_data, 130 const struct wpabuf *in_data,
|
eap_tls_common.c | 312 * @in_data: Next incoming TLS segment 313 * @in_len: Length of in_data 318 const u8 *in_data, size_t in_len) 359 os_memcpy(buf + data->tls_in_len, in_data, in_len); 377 * @in_data: Next incoming TLS segment 378 * @in_len: Length of in_data 389 struct eap_ssl_data *data, const u8 *in_data, size_t in_len, 396 int res = eap_peer_tls_reassemble_fragment(data, in_data, 411 os_memcpy(data->tls_in, in_data, in_len); 424 * @in_data: Message received from the serve [all...] |
/external/wpa_supplicant/ |
tlsv1_client.h | 28 const u8 *in_data, size_t in_len, 31 const u8 *in_data, size_t in_len, 34 const u8 *in_data, size_t in_len,
|
tlsv1_common.c | 378 * @in_data: Received data 380 * @out_data: Buffer for output data (must be at least as long as in_data) 390 const u8 *in_data, size_t in_len, 399 in_data, in_len); 409 "length %d", in_data[0], in_data[1], in_data[2], 410 WPA_GET_BE16(in_data + 3)); 412 if (in_data[0] != TLS_CONTENT_TYPE_HANDSHAKE && 413 in_data[0] != TLS_CONTENT_TYPE_CHANGE_CIPHER_SPEC & [all...] |
tls_none.c | 111 const u8 *in_data, size_t in_len, 121 const u8 *in_data, size_t in_len, 129 const u8 *in_data, size_t in_len, 137 const u8 *in_data, size_t in_len,
|
tls_internal.c | 188 const u8 *in_data, size_t in_len, 195 wpa_printf(MSG_DEBUG, "TLS: %s(in_data=%p in_len=%lu)", 196 __func__, in_data, (unsigned long) in_len); 197 return tlsv1_client_handshake(conn->client, in_data, in_len, out_len); 203 const u8 *in_data, size_t in_len, 212 const u8 *in_data, size_t in_len, 215 return tlsv1_client_encrypt(conn->client, in_data, in_len, out_data, 221 const u8 *in_data, size_t in_len, 224 return tlsv1_client_decrypt(conn->client, in_data, in_len, out_data,
|
tls.h | 278 * @in_data: Input data from TLS peer 291 * in_data == %NULL and the library is expected to return ClientHello packet. 293 * to TLS library by calling this function again with in_data pointing to the 305 const u8 *in_data, size_t in_len, 313 * @in_data: Input data from TLS peer 322 const u8 *in_data, size_t in_len, 329 * @in_data: Pointer to plaintext data to be encrypted 339 const u8 *in_data, size_t in_len, 346 * @in_data: Pointer to input buffer (encrypted TLS data) 356 const u8 *in_data, size_t in_len [all...] |
eap_tls_common.h | 55 struct eap_sm *sm, struct eap_ssl_data *data, const u8 *in_data, 59 u8 id, const u8 *in_data, size_t in_len,
|
tlsv1_client.c | 94 const u8 *in_data, size_t *in_len); 96 const u8 *in_data, size_t *in_len); 98 const u8 *in_data, size_t *in_len); 250 const u8 *in_data, size_t *in_len) 264 pos = in_data; 390 *in_len = end - in_data; 430 const u8 *in_data, size_t *in_len) 446 pos = in_data; 470 return tls_process_server_key_exchange(conn, ct, in_data, 473 return tls_process_certificate_request(conn, ct, in_data, [all...] |
tls_schannel.c | 320 const u8 *in_data, size_t in_len, 349 inbufs[0].pvBuffer = (u8 *) in_data; 475 const u8 *in_data, size_t in_len, 483 const u8 *in_data, size_t in_len, 522 os_memcpy(out_data + sizes.cbHeader, in_data, in_len); 571 const u8 *in_data, size_t in_len, 587 in_data, in_len); 589 os_memcpy(out_data, in_data, in_len);
|
eap_tls_common.c | 285 * @in_data: Next incoming TLS segment 286 * @in_len: Length of in_data 297 struct eap_sm *sm, struct eap_ssl_data *data, const u8 *in_data, 336 os_memcpy(buf + data->tls_in_len, in_data, in_len); 357 os_memcpy(data->tls_in, in_data, in_len); 367 const u8 *in_data, size_t in_len, 376 msg = eap_tls_data_reassemble(sm, data, in_data, in_len, 480 * @in_data: Message received from the server 481 * @in_len: Length of in_data 498 u8 id, const u8 *in_data, size_t in_len [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
tls_internal.c | 335 const u8 *in_data, size_t in_len, 346 wpa_printf(MSG_DEBUG, "TLS: %s(in_data=%p in_len=%lu)", 347 __func__, in_data, (unsigned long) in_len); 348 return tlsv1_client_handshake(conn->client, in_data, in_len, out_len, 358 const u8 *in_data, size_t in_len, 366 wpa_printf(MSG_DEBUG, "TLS: %s(in_data=%p in_len=%lu)", 367 __func__, in_data, (unsigned long) in_len); 368 out = tlsv1_server_handshake(conn->server, in_data, in_len, out_len); 381 const u8 *in_data, size_t in_len, 386 return tlsv1_client_encrypt(conn->client, in_data, in_len [all...] |
tls_none.c | 111 const u8 *in_data, size_t in_len, 121 const u8 *in_data, size_t in_len, 129 const u8 *in_data, size_t in_len, 137 const u8 *in_data, size_t in_len,
|
tls.h | 295 * @in_data: Input data from TLS peer 308 * in_data == %NULL and the library is expected to return ClientHello packet. 310 * to TLS library by calling this function again with in_data pointing to the 322 const u8 *in_data, size_t in_len, 330 * @in_data: Input data from TLS peer 339 const u8 *in_data, size_t in_len, 346 * @in_data: Pointer to plaintext data to be encrypted 357 const u8 *in_data, size_t in_len, 364 * @in_data: Pointer to input buffer (encrypted TLS data) 375 const u8 *in_data, size_t in_len [all...] |
tls_schannel.c | 320 const u8 *in_data, size_t in_len, 349 inbufs[0].pvBuffer = (u8 *) in_data; 475 const u8 *in_data, size_t in_len, 483 const u8 *in_data, size_t in_len, 522 os_memcpy(out_data + sizes.cbHeader, in_data, in_len); 571 const u8 *in_data, size_t in_len, 587 in_data, in_len); 589 os_memcpy(out_data, in_data, in_len);
|
/external/qemu/hw/ |
bt-hci-csr.c | 44 int in_data; member in struct:csrhci_s 316 s->in_data = csrhci_data_len(s->inpkt) + s->in_hdr; 318 if (s->in_len >= s->in_data) { 321 memmove(s->inpkt, s->inpkt + s->in_len, s->in_len - s->in_data); 322 s->in_len -= s->in_data; 324 s->in_data = INT_MAX; 396 s->in_data = INT_MAX;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_peap.c | 645 struct wpabuf *in_data) 653 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_TLV, in_data, &left); 763 struct wpabuf *in_data) 773 pos = eap_hdr_validate(EAP_VENDOR_MICROSOFT, 0x21, in_data, &left); 893 struct wpabuf *in_data) 901 eap_peap_process_phase2_tlv(sm, data, in_data); 907 eap_peap_process_phase2_soh(sm, data, in_data); 918 hdr = wpabuf_head(in_data); 921 if (wpabuf_len(in_data) > sizeof(*hdr) && *pos == EAP_TYPE_NAK) { 922 left = wpabuf_len(in_data) - sizeof(*hdr) 1035 u8 *in_data; local [all...] |