/external/wpa_supplicant_8/src/eap_peer/ |
eap_peap.c | 744 struct wpabuf *in_decrypted = NULL; local 758 in_decrypted = data->pending_phase2_req; 783 res = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted); 789 in_decrypted); 791 hdr = wpabuf_mhead(in_decrypted); 792 if (wpabuf_len(in_decrypted) == 5 && hdr->code == EAP_CODE_REQUEST && 794 eap_get_type(in_decrypted) == EAP_TYPE_IDENTITY) { 799 if (wpabuf_len(in_decrypted) >= 5 && hdr->code == EAP_CODE_REQUEST && 800 eap_get_type(in_decrypted) == EAP_TYPE_TLV) { 807 wpabuf_len(in_decrypted)); [all...] |
eap_tls_common.h | 120 struct wpabuf **in_decrypted);
|
eap_ttls.c | 984 static int eap_ttls_parse_avps(struct wpabuf *in_decrypted, 991 pos = wpabuf_mhead(in_decrypted); 992 left = wpabuf_len(in_decrypted); 1380 struct wpabuf *in_decrypted = NULL; local [all...] |
eap_fast.c | 1294 struct wpabuf *in_decrypted; local [all...] |
eap_tls_common.c | 938 * @in_decrypted: Buffer for returning a pointer to the decrypted message 943 struct wpabuf **in_decrypted) 952 *in_decrypted = tls_connection_decrypt(data->ssl_ctx, data->conn, msg); 954 if (*in_decrypted == NULL) { [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_peap.c | 1059 struct wpabuf *in_decrypted; local 1076 in_decrypted = tls_connection_decrypt(sm->ssl_ctx, data->ssl.conn, 1078 if (in_decrypted == NULL) { 1086 in_decrypted); 1093 wpabuf_len(in_decrypted)); 1095 wpabuf_free(in_decrypted); 1104 wpabuf_len(in_decrypted)); 1105 wpabuf_put_buf(nbuf, in_decrypted); 1106 wpabuf_free(in_decrypted); 1108 in_decrypted = nbuf [all...] |
eap_server_fast.c | 1387 struct wpabuf *in_decrypted; local [all...] |
eap_server_ttls.c | 1006 struct wpabuf *in_decrypted; local 1023 in_decrypted = tls_connection_decrypt(sm->ssl_ctx, data->ssl.conn, 1025 if (in_decrypted == NULL) { 1033 in_decrypted); 1035 if (eap_ttls_avp_parse(in_decrypted, &parse) < 0) { 1037 wpabuf_free(in_decrypted); 1106 wpabuf_free(in_decrypted); [all...] |