HomeSort by relevance Sort by last modified time
    Searched refs:out_data (Results 1 - 25 of 34) sorted by null

1 2

  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_record.c 236 * @out_data: Buffer for output data (must be at least as long as in_data)
237 * @out_len: Set to maximum out_data length by caller; used to return the
247 u8 *out_data, size_t *out_len, u8 *alert)
315 os_memcpy(out_data, in_data, in_len);
319 if (crypto_cipher_decrypt(rl->read_cbc, out_data,
320 out_data, in_len) < 0) {
331 padlen = out_data[in_len - 1];
341 if (out_data[i] != padlen) {
345 out_data + in_len - padlen,
357 out_data, in_len)
    [all...]
tlsv1_client.h 35 u8 *out_data, size_t out_len);
38 u8 *out_data, size_t out_len);
tlsv1_server.h 33 u8 *out_data, size_t out_len);
36 u8 *out_data, size_t out_len);
tlsv1_record.h 72 u8 *out_data, size_t *out_len, u8 *alert);
tlsv1_client.c 214 * @out_data: Pointer to output buffer (encrypted TLS data)
215 * @out_len: Maximum out_data length
216 * Returns: Number of bytes written to out_data, -1 on failure
223 u8 *out_data, size_t out_len)
230 os_memcpy(out_data + TLS_RECORD_HEADER_LEN, in_data, in_len);
233 out_data, out_len, in_len, &rlen) < 0) {
249 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel)
250 * @out_len: Maximum out_data length
251 * Returns: Number of bytes written to out_data, -1 on failure
258 u8 *out_data, size_t out_len
    [all...]
tlsv1_server.c 188 * @out_data: Pointer to output buffer (encrypted TLS data)
189 * @out_len: Maximum out_data length
190 * Returns: Number of bytes written to out_data, -1 on failure
197 u8 *out_data, size_t out_len)
204 os_memcpy(out_data + TLS_RECORD_HEADER_LEN, in_data, in_len);
207 out_data, out_len, in_len, &rlen) < 0) {
223 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel)
224 * @out_len: Maximum out_data length
225 * Returns: Number of bytes written to out_data, -1 on failure
232 u8 *out_data, size_t out_len
    [all...]
tlsv1_client_i.h 85 u8 **out_data, size_t *out_len);
  /external/wpa_supplicant/
tlsv1_client.h 32 u8 *out_data, size_t out_len);
35 u8 *out_data, size_t out_len);
tls_none.c 130 u8 *out_data, size_t out_len)
138 u8 *out_data, size_t out_len)
221 u8 *out_data, size_t out_len)
tlsv1_common.c 380 * @out_data: Buffer for output data (must be at least as long as in_data)
381 * @out_len: Set to maximum out_data length by caller; used to return the
391 u8 *out_data, size_t *out_len, u8 *alert)
458 os_memcpy(out_data, in_data, in_len);
462 if (crypto_cipher_decrypt(rl->read_cbc, out_data,
463 out_data, in_len) < 0) {
474 padlen = out_data[in_len - 1];
484 if (out_data[i] != padlen) {
488 out_data + in_len - padlen,
500 out_data, in_len)
    [all...]
tls_schannel.c 484 u8 *out_data, size_t out_len)
510 wpa_printf(MSG_DEBUG, "%s: too short out_data (out_len=%lu "
518 bufs[0].pvBuffer = out_data;
522 os_memcpy(out_data + sizes.cbHeader, in_data, in_len);
523 bufs[1].pvBuffer = out_data + sizes.cbHeader;
527 bufs[2].pvBuffer = out_data + sizes.cbHeader + in_len;
545 "out_data=%p bufs %p %p %p",
546 out_data, bufs[0].pvBuffer, bufs[1].pvBuffer,
560 "EncryptMessage", out_data, total_len);
572 u8 *out_data, size_t out_len
    [all...]
tls_internal.c 213 u8 *out_data, size_t out_len)
215 return tlsv1_client_encrypt(conn->client, in_data, in_len, out_data,
222 u8 *out_data, size_t out_len)
224 return tlsv1_client_decrypt(conn->client, in_data, in_len, out_data,
308 u8 *out_data, size_t out_len)
tls.h 331 * @out_data: Pointer to output buffer (encrypted TLS data)
332 * @out_len: Maximum out_data length
333 * Returns: Number of bytes written to out_data, -1 on failure
340 u8 *out_data, size_t out_len);
348 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel)
349 * @out_len: Maximum out_data length
350 * Returns: Number of bytes written to out_data, -1 on failure
357 u8 *out_data, size_t out_len);
486 * @out_data: Pointer to output buffer (encrypted TLS/IA data)
487 * @out_len: Maximum out_data length
    [all...]
eap_tls_common.c 368 u8 **out_data, size_t *out_len)
405 *out_data = appl_data;
418 u8 **out_data, size_t *out_len)
442 *out_data = (u8 *)
446 if (*out_data == NULL)
482 * @out_data: Buffer for returning a pointer to the response message
491 * out_data is used to return the response message if the return value of this
494 * *out_data is not %NULL.
499 u8 **out_data, size_t *out_len)
505 *out_data = NULL
    [all...]
eap_tls_common.h 60 u8 **out_data, size_t *out_len);
tls_gnutls.c 938 u8 *out_data; local
1022 out_data = conn->push_buf;
1026 return out_data;
1042 u8 *out_data, size_t out_len)
1061 os_memcpy(out_data, conn->push_buf, out_len);
1071 u8 *out_data, size_t out_len)
1089 res = gnutls_ia_recv(conn->session, (char *) out_data,
1116 (char *) out_data);
1142 res = gnutls_record_recv(conn->session, out_data, out_len);
1286 u8 *out_data, size_t out_len
    [all...]
tls_openssl.c 1893 u8 *out_data; local
1981 u8 *out_data; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
tls_none.c 130 u8 *out_data, size_t out_len)
138 u8 *out_data, size_t out_len)
214 u8 *out_data, size_t out_len)
tls_internal.c 382 u8 *out_data, size_t out_len)
387 out_data, out_len);
393 out_data, out_len);
402 u8 *out_data, size_t out_len)
407 out_data, out_len);
413 out_data, out_len);
530 u8 *out_data, size_t out_len)
tls_schannel.c 484 u8 *out_data, size_t out_len)
510 wpa_printf(MSG_DEBUG, "%s: too short out_data (out_len=%lu "
518 bufs[0].pvBuffer = out_data;
522 os_memcpy(out_data + sizes.cbHeader, in_data, in_len);
523 bufs[1].pvBuffer = out_data + sizes.cbHeader;
527 bufs[2].pvBuffer = out_data + sizes.cbHeader + in_len;
545 "out_data=%p bufs %p %p %p",
546 out_data, bufs[0].pvBuffer, bufs[1].pvBuffer,
560 "EncryptMessage", out_data, total_len);
572 u8 *out_data, size_t out_len
    [all...]
tls.h 348 * @out_data: Pointer to output buffer (encrypted TLS data)
349 * @out_len: Maximum out_data length
350 * Returns: Number of bytes written to out_data, -1 on failure
358 u8 *out_data, size_t out_len);
366 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel)
367 * @out_len: Maximum out_data length
368 * Returns: Number of bytes written to out_data, -1 on failure
376 u8 *out_data, size_t out_len);
496 * @out_data: Pointer to output buffer (encrypted TLS/IA data)
497 * @out_len: Maximum out_data length
    [all...]
tls_gnutls.c 988 u8 *out_data; local
1079 out_data = conn->push_buf;
1083 return out_data;
1099 u8 *out_data, size_t out_len)
1126 os_memcpy(out_data, conn->push_buf, out_len);
1136 u8 *out_data, size_t out_len)
1155 res = gnutls_ia_recv(conn->session, (char *) out_data,
1182 (char *) out_data);
1208 res = gnutls_record_recv(conn->session, out_data, out_len);
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_tls_common.h 111 struct wpabuf **out_data);
131 struct wpabuf **out_data);
eap_tls_common.c 426 * @out_data: Buffer for returning a pointer to application data (if available)
432 struct wpabuf **out_data)
466 *out_data = wpabuf_alloc_ext_data(appl_data, appl_data_len);
467 if (*out_data == NULL) {
487 * @out_data: Buffer for returning the allocated output buffer
492 struct wpabuf **out_data)
530 *out_data = eap_msg_alloc(EAP_VENDOR_IETF, eap_type,
533 if (*out_data == NULL)
536 flags = wpabuf_put(*out_data, 1);
542 wpabuf_put_be32(*out_data, data->tls_out_len)
    [all...]
eap_ttls.c     [all...]

Completed in 886 milliseconds

1 2