/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tls_common.c | 64 wpabuf_free(data->tls_out); 65 data->tls_out = NULL; 120 if (data->tls_out == NULL) { 121 wpa_printf(MSG_ERROR, "SSL: tls_out NULL in %s", __func__); 126 send_len = wpabuf_len(data->tls_out) - data->tls_out_pos; 147 wpabuf_put_be32(req, wpabuf_len(data->tls_out)); 149 wpabuf_put_data(req, wpabuf_head_u8(data->tls_out) + data->tls_out_pos, 153 if (data->tls_out_pos == wpabuf_len(data->tls_out)) { 157 wpabuf_free(data->tls_out); 158 data->tls_out = NULL [all...] |
eap_tls_common.h | 28 * tls_out - TLS message to be sent out in fragments 30 struct wpabuf *tls_out; member in struct:eap_ssl_data
|
eap_server_peap.c | 519 wpabuf_free(data->ssl.tls_out); 521 data->ssl.tls_out = eap_peap_build_phase2_req(sm, data, id); 525 wpabuf_free(data->ssl.tls_out); 527 data->ssl.tls_out = eap_peap_build_phase2_soh(sm, data, id); 531 wpabuf_free(data->ssl.tls_out); 533 data->ssl.tls_out = eap_peap_build_phase2_tlv(sm, data, id); 536 wpabuf_free(data->ssl.tls_out); 538 data->ssl.tls_out = eap_peap_build_phase2_term(sm, data, id, 542 wpabuf_free(data->ssl.tls_out); 544 data->ssl.tls_out = eap_peap_build_phase2_term(sm, data, id [all...] |
eap_server_ttls.c | 552 wpabuf_free(data->ssl.tls_out); 554 data->ssl.tls_out = eap_ttls_build_phase2_eap_req(sm, data, 558 wpabuf_free(data->ssl.tls_out); 560 data->ssl.tls_out = eap_ttls_build_phase2_mschapv2(sm, data); 563 wpabuf_free(data->ssl.tls_out); 565 data->ssl.tls_out = eap_ttls_build_phase_finished(sm, data, 1); [all...] |
eap_server_fast.c | 828 if (data->ssl.tls_out && piggyback) { 833 (int) wpabuf_len(data->ssl.tls_out), 835 if (wpabuf_resize(&data->ssl.tls_out, wpabuf_len(encr)) < 0) { 841 wpabuf_put_buf(data->ssl.tls_out, encr); 844 wpabuf_free(data->ssl.tls_out); 846 data->ssl.tls_out = encr; [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls_common.c | 443 if (data->tls_out) { 446 "tls_out data even though tls_out_len = 0"); 447 wpabuf_free(data->tls_out); 448 WPA_ASSERT(data->tls_out == NULL); 451 data->tls_out = tls_connection_handshake(sm->ssl_ctx, data->conn, 489 if (data->tls_out == NULL) 491 len = wpabuf_len(data->tls_out) - data->tls_out_pos; 495 (unsigned long) wpabuf_len(data->tls_out)); 510 (wpabuf_len(data->tls_out) > data->tls_out_limit || 536 wpabuf_put_be32(*out_data, wpabuf_len(data->tls_out)); [all...] |
eap_tls_common.h | 28 * tls_out - TLS message to be sent out in fragments 30 struct wpabuf *tls_out; member in struct:eap_ssl_data
|
/external/wpa_supplicant/ |
eap_tls_common.c | 214 os_free(data->tls_out); 382 if (data->tls_out) { 385 "tls_out data even though tls_out_len = 0"); 386 os_free(data->tls_out); 387 WPA_ASSERT(data->tls_out == NULL); 390 data->tls_out = tls_connection_handshake(sm->ssl_ctx, data->conn, 459 os_memcpy(pos, &data->tls_out[data->tls_out_pos], len); 465 os_free(data->tls_out); 466 data->tls_out = NULL; 516 if (data->tls_out == NULL) [all...] |
eap_tls_common.h | 21 u8 *tls_out; member in struct:eap_ssl_data
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_tls_common.h | 28 * tls_out - TLS message to be sent out in fragments 30 u8 *tls_out; member in struct:eap_ssl_data
|
eap_tls_common.c | 446 if (data->tls_out) { 449 "tls_out data even though tls_out_len = 0"); 450 os_free(data->tls_out); 451 WPA_ASSERT(data->tls_out == NULL); 454 data->tls_out = tls_connection_handshake(sm->ssl_ctx, data->conn, 545 wpabuf_put_data(*out_data, &data->tls_out[data->tls_out_pos], len); 616 * response was allocated into data->tls_out buffer. 620 if (data->tls_out == NULL) { 632 wpa_printf(MSG_DEBUG, "SSL: Failed - tls_out available to " 645 os_free(data->tls_out); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_tls_common.c | 256 wpa_printf(MSG_INFO, "SSL: pending tls_out data when "
|