/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_record.c | 236 * @out_data: Buffer for output data (must be at least as long as in_data) 237 * @out_len: Set to maximum out_data length by caller; used to return the 247 u8 *out_data, size_t *out_len, u8 *alert) 315 os_memcpy(out_data, in_data, in_len); 319 if (crypto_cipher_decrypt(rl->read_cbc, out_data, 320 out_data, in_len) < 0) { 331 padlen = out_data[in_len - 1]; 341 if (out_data[i] != padlen) { 345 out_data + in_len - padlen, 357 out_data, in_len) [all...] |
tlsv1_client.h | 35 u8 *out_data, size_t out_len); 38 u8 *out_data, size_t out_len);
|
tlsv1_server.h | 33 u8 *out_data, size_t out_len); 36 u8 *out_data, size_t out_len);
|
tlsv1_record.h | 72 u8 *out_data, size_t *out_len, u8 *alert);
|
tlsv1_client.c | 214 * @out_data: Pointer to output buffer (encrypted TLS data) 215 * @out_len: Maximum out_data length 216 * Returns: Number of bytes written to out_data, -1 on failure 223 u8 *out_data, size_t out_len) 230 os_memcpy(out_data + TLS_RECORD_HEADER_LEN, in_data, in_len); 233 out_data, out_len, in_len, &rlen) < 0) { 249 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel) 250 * @out_len: Maximum out_data length 251 * Returns: Number of bytes written to out_data, -1 on failure 258 u8 *out_data, size_t out_len [all...] |
tlsv1_server.c | 188 * @out_data: Pointer to output buffer (encrypted TLS data) 189 * @out_len: Maximum out_data length 190 * Returns: Number of bytes written to out_data, -1 on failure 197 u8 *out_data, size_t out_len) 204 os_memcpy(out_data + TLS_RECORD_HEADER_LEN, in_data, in_len); 207 out_data, out_len, in_len, &rlen) < 0) { 223 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel) 224 * @out_len: Maximum out_data length 225 * Returns: Number of bytes written to out_data, -1 on failure 232 u8 *out_data, size_t out_len [all...] |
tlsv1_client_i.h | 85 u8 **out_data, size_t *out_len);
|
/external/wpa_supplicant/ |
tlsv1_client.h | 32 u8 *out_data, size_t out_len); 35 u8 *out_data, size_t out_len);
|
tls_none.c | 130 u8 *out_data, size_t out_len) 138 u8 *out_data, size_t out_len) 221 u8 *out_data, size_t out_len)
|
tlsv1_common.c | 380 * @out_data: Buffer for output data (must be at least as long as in_data) 381 * @out_len: Set to maximum out_data length by caller; used to return the 391 u8 *out_data, size_t *out_len, u8 *alert) 458 os_memcpy(out_data, in_data, in_len); 462 if (crypto_cipher_decrypt(rl->read_cbc, out_data, 463 out_data, in_len) < 0) { 474 padlen = out_data[in_len - 1]; 484 if (out_data[i] != padlen) { 488 out_data + in_len - padlen, 500 out_data, in_len) [all...] |
tls_schannel.c | 484 u8 *out_data, size_t out_len) 510 wpa_printf(MSG_DEBUG, "%s: too short out_data (out_len=%lu " 518 bufs[0].pvBuffer = out_data; 522 os_memcpy(out_data + sizes.cbHeader, in_data, in_len); 523 bufs[1].pvBuffer = out_data + sizes.cbHeader; 527 bufs[2].pvBuffer = out_data + sizes.cbHeader + in_len; 545 "out_data=%p bufs %p %p %p", 546 out_data, bufs[0].pvBuffer, bufs[1].pvBuffer, 560 "EncryptMessage", out_data, total_len); 572 u8 *out_data, size_t out_len [all...] |
tls_internal.c | 213 u8 *out_data, size_t out_len) 215 return tlsv1_client_encrypt(conn->client, in_data, in_len, out_data, 222 u8 *out_data, size_t out_len) 224 return tlsv1_client_decrypt(conn->client, in_data, in_len, out_data, 308 u8 *out_data, size_t out_len)
|
tls.h | 331 * @out_data: Pointer to output buffer (encrypted TLS data) 332 * @out_len: Maximum out_data length 333 * Returns: Number of bytes written to out_data, -1 on failure 340 u8 *out_data, size_t out_len); 348 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel) 349 * @out_len: Maximum out_data length 350 * Returns: Number of bytes written to out_data, -1 on failure 357 u8 *out_data, size_t out_len); 486 * @out_data: Pointer to output buffer (encrypted TLS/IA data) 487 * @out_len: Maximum out_data length [all...] |
eap_tls_common.c | 368 u8 **out_data, size_t *out_len) 405 *out_data = appl_data; 418 u8 **out_data, size_t *out_len) 442 *out_data = (u8 *) 446 if (*out_data == NULL) 482 * @out_data: Buffer for returning a pointer to the response message 491 * out_data is used to return the response message if the return value of this 494 * *out_data is not %NULL. 499 u8 **out_data, size_t *out_len) 505 *out_data = NULL [all...] |
eap_tls_common.h | 60 u8 **out_data, size_t *out_len);
|
tls_gnutls.c | 938 u8 *out_data; local 1022 out_data = conn->push_buf; 1026 return out_data; 1042 u8 *out_data, size_t out_len) 1061 os_memcpy(out_data, conn->push_buf, out_len); 1071 u8 *out_data, size_t out_len) 1089 res = gnutls_ia_recv(conn->session, (char *) out_data, 1116 (char *) out_data); 1142 res = gnutls_record_recv(conn->session, out_data, out_len); 1286 u8 *out_data, size_t out_len [all...] |
tls_openssl.c | 1893 u8 *out_data; local 1981 u8 *out_data; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
tls_none.c | 130 u8 *out_data, size_t out_len) 138 u8 *out_data, size_t out_len) 214 u8 *out_data, size_t out_len)
|
tls_internal.c | 382 u8 *out_data, size_t out_len) 387 out_data, out_len); 393 out_data, out_len); 402 u8 *out_data, size_t out_len) 407 out_data, out_len); 413 out_data, out_len); 530 u8 *out_data, size_t out_len)
|
tls_schannel.c | 484 u8 *out_data, size_t out_len) 510 wpa_printf(MSG_DEBUG, "%s: too short out_data (out_len=%lu " 518 bufs[0].pvBuffer = out_data; 522 os_memcpy(out_data + sizes.cbHeader, in_data, in_len); 523 bufs[1].pvBuffer = out_data + sizes.cbHeader; 527 bufs[2].pvBuffer = out_data + sizes.cbHeader + in_len; 545 "out_data=%p bufs %p %p %p", 546 out_data, bufs[0].pvBuffer, bufs[1].pvBuffer, 560 "EncryptMessage", out_data, total_len); 572 u8 *out_data, size_t out_len [all...] |
tls.h | 348 * @out_data: Pointer to output buffer (encrypted TLS data) 349 * @out_len: Maximum out_data length 350 * Returns: Number of bytes written to out_data, -1 on failure 358 u8 *out_data, size_t out_len); 366 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel) 367 * @out_len: Maximum out_data length 368 * Returns: Number of bytes written to out_data, -1 on failure 376 u8 *out_data, size_t out_len); 496 * @out_data: Pointer to output buffer (encrypted TLS/IA data) 497 * @out_len: Maximum out_data length [all...] |
tls_gnutls.c | 988 u8 *out_data; local 1079 out_data = conn->push_buf; 1083 return out_data; 1099 u8 *out_data, size_t out_len) 1126 os_memcpy(out_data, conn->push_buf, out_len); 1136 u8 *out_data, size_t out_len) 1155 res = gnutls_ia_recv(conn->session, (char *) out_data, 1182 (char *) out_data); 1208 res = gnutls_record_recv(conn->session, out_data, out_len); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_tls_common.h | 111 struct wpabuf **out_data); 131 struct wpabuf **out_data);
|
eap_tls_common.c | 426 * @out_data: Buffer for returning a pointer to application data (if available) 432 struct wpabuf **out_data) 466 *out_data = wpabuf_alloc_ext_data(appl_data, appl_data_len); 467 if (*out_data == NULL) { 487 * @out_data: Buffer for returning the allocated output buffer 492 struct wpabuf **out_data) 530 *out_data = eap_msg_alloc(EAP_VENDOR_IETF, eap_type, 533 if (*out_data == NULL) 536 flags = wpabuf_put(*out_data, 1); 542 wpabuf_put_be32(*out_data, data->tls_out_len) [all...] |
eap_ttls.c | [all...] |