/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tls_common.c | 58 wpabuf_free(data->tls_out); 59 data->tls_out = NULL; 114 if (data->tls_out == NULL) { 115 wpa_printf(MSG_ERROR, "SSL: tls_out NULL in %s", __func__); 120 send_len = wpabuf_len(data->tls_out) - data->tls_out_pos; 141 wpabuf_put_be32(req, wpabuf_len(data->tls_out)); 143 wpabuf_put_data(req, wpabuf_head_u8(data->tls_out) + data->tls_out_pos, 147 if (data->tls_out_pos == wpabuf_len(data->tls_out)) { 151 wpabuf_free(data->tls_out); 152 data->tls_out = NULL [all...] |
eap_tls_common.h | 22 * tls_out - TLS message to be sent out in fragments 24 struct wpabuf *tls_out; member in struct:eap_ssl_data
|
eap_server_peap.c | 517 wpabuf_free(data->ssl.tls_out); 519 data->ssl.tls_out = eap_peap_build_phase2_req(sm, data, id); 523 wpabuf_free(data->ssl.tls_out); 525 data->ssl.tls_out = eap_peap_build_phase2_soh(sm, data, id); 529 wpabuf_free(data->ssl.tls_out); 531 data->ssl.tls_out = eap_peap_build_phase2_tlv(sm, data, id); 534 wpabuf_free(data->ssl.tls_out); 536 data->ssl.tls_out = eap_peap_build_phase2_term(sm, data, id, 540 wpabuf_free(data->ssl.tls_out); 542 data->ssl.tls_out = eap_peap_build_phase2_term(sm, data, id [all...] |
eap_server_fast.c | 822 if (data->ssl.tls_out && piggyback) { 827 (int) wpabuf_len(data->ssl.tls_out), 829 if (wpabuf_resize(&data->ssl.tls_out, wpabuf_len(encr)) < 0) { 835 wpabuf_put_buf(data->ssl.tls_out, encr); 838 wpabuf_free(data->ssl.tls_out); 840 data->ssl.tls_out = encr; [all...] |
eap_server_ttls.c | 461 wpabuf_free(data->ssl.tls_out); 463 data->ssl.tls_out = eap_ttls_build_phase2_eap_req(sm, data, 467 wpabuf_free(data->ssl.tls_out); 469 data->ssl.tls_out = eap_ttls_build_phase2_mschapv2(sm, data);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls_common.c | 436 if (data->tls_out) { 439 "tls_out data even though tls_out_len = 0"); 440 wpabuf_free(data->tls_out); 441 WPA_ASSERT(data->tls_out == NULL); 444 data->tls_out = tls_connection_handshake(sm->ssl_ctx, data->conn, 482 if (data->tls_out == NULL) 484 len = wpabuf_len(data->tls_out) - data->tls_out_pos; 488 (unsigned long) wpabuf_len(data->tls_out)); 503 (wpabuf_len(data->tls_out) > data->tls_out_limit || 529 wpabuf_put_be32(*out_data, wpabuf_len(data->tls_out)); [all...] |
eap_tls_common.h | 22 * tls_out - TLS message to be sent out in fragments 24 struct wpabuf *tls_out; member in struct:eap_ssl_data
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_tls_common.c | 446 if (data->tls_out) { 449 "tls_out data even though tls_out_len = 0"); 450 os_free(data->tls_out); 451 WPA_ASSERT(data->tls_out == NULL); 454 data->tls_out = tls_connection_handshake(sm->ssl_ctx, data->conn, 545 wpabuf_put_data(*out_data, &data->tls_out[data->tls_out_pos], len); 616 * response was allocated into data->tls_out buffer. 620 if (data->tls_out == NULL) { 632 wpa_printf(MSG_DEBUG, "SSL: Failed - tls_out available to " 645 os_free(data->tls_out); [all...] |
eap_tls_common.h | 28 * tls_out - TLS message to be sent out in fragments 30 u8 *tls_out; member in struct:eap_ssl_data
|