/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_tls_common.c | 185 if (len > wpabuf_tailroom(data->tls_in)) { 190 wpabuf_put_data(data->tls_in, buf, len); 193 (unsigned long) wpabuf_tailroom(data->tls_in)); 204 if (data->tls_in == NULL && !(flags & EAP_TLS_FLAGS_LENGTH_INCLUDED)) { 210 if (data->tls_in == NULL) { 221 data->tls_in = wpabuf_alloc(message_length); 222 if (data->tls_in == NULL) { 226 wpabuf_put_data(data->tls_in, buf, len); 230 (unsigned long) wpabuf_tailroom(data->tls_in)); 249 data->tls_in, NUL [all...] |
H A D | eap_tls_common.h | 37 * tls_in - Received TLS message buffer for re-assembly 39 struct wpabuf *tls_in; member in struct:eap_ssl_data
|
H A D | eap_server_tls.c | 166 if (data->state == SUCCESS && wpabuf_len(data->ssl.tls_in) == 0) {
|
H A D | eap_server_ttls.c | 1083 eap_ttls_process_phase2(sm, data, data->ssl.tls_in); 1087 if (data->mschapv2_resp_ok && wpabuf_len(data->ssl.tls_in) == 1101 wpabuf_len(data->ssl.tls_in));
|
H A D | eap_server_fast.c | 1517 eap_fast_process_phase2(sm, data, data->ssl.tls_in);
|
H A D | eap_server_peap.c | 1270 eap_peap_process_phase2(sm, data, respData, data->ssl.tls_in);
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_tls_common.c | 185 if (len > wpabuf_tailroom(data->tls_in)) { 190 wpabuf_put_data(data->tls_in, buf, len); 193 (unsigned long) wpabuf_tailroom(data->tls_in)); 204 if (data->tls_in == NULL && !(flags & EAP_TLS_FLAGS_LENGTH_INCLUDED)) { 210 if (data->tls_in == NULL) { 221 data->tls_in = wpabuf_alloc(message_length); 222 if (data->tls_in == NULL) { 226 wpabuf_put_data(data->tls_in, buf, len); 230 (unsigned long) wpabuf_tailroom(data->tls_in)); 249 data->tls_in, NUL [all...] |
H A D | eap_tls_common.h | 37 * tls_in - Received TLS message buffer for re-assembly 39 struct wpabuf *tls_in; member in struct:eap_ssl_data
|
H A D | eap_server_tls.c | 166 if (data->state == SUCCESS && wpabuf_len(data->ssl.tls_in) == 0) {
|
H A D | eap_server_ttls.c | 1083 eap_ttls_process_phase2(sm, data, data->ssl.tls_in); 1087 if (data->mschapv2_resp_ok && wpabuf_len(data->ssl.tls_in) == 1101 wpabuf_len(data->ssl.tls_in));
|
H A D | eap_server_fast.c | 1517 eap_fast_process_phase2(sm, data, data->ssl.tls_in);
|
H A D | eap_server_peap.c | 1270 eap_peap_process_phase2(sm, data, respData, data->ssl.tls_in);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_tls_common.c | 185 if (len > wpabuf_tailroom(data->tls_in)) { 190 wpabuf_put_data(data->tls_in, buf, len); 193 (unsigned long) wpabuf_tailroom(data->tls_in)); 204 if (data->tls_in == NULL && !(flags & EAP_TLS_FLAGS_LENGTH_INCLUDED)) { 210 if (data->tls_in == NULL) { 221 data->tls_in = wpabuf_alloc(message_length); 222 if (data->tls_in == NULL) { 226 wpabuf_put_data(data->tls_in, buf, len); 230 (unsigned long) wpabuf_tailroom(data->tls_in)); 249 data->tls_in, NUL [all...] |
H A D | eap_tls_common.h | 37 * tls_in - Received TLS message buffer for re-assembly 39 struct wpabuf *tls_in; member in struct:eap_ssl_data
|
H A D | eap_server_tls.c | 166 if (data->state == SUCCESS && wpabuf_len(data->ssl.tls_in) == 0) {
|
H A D | eap_server_ttls.c | 1083 eap_ttls_process_phase2(sm, data, data->ssl.tls_in); 1087 if (data->mschapv2_resp_ok && wpabuf_len(data->ssl.tls_in) == 1101 wpabuf_len(data->ssl.tls_in));
|
H A D | eap_server_fast.c | 1517 eap_fast_process_phase2(sm, data, data->ssl.tls_in);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_tls_common.c | 318 tls_in_len = data->tls_in ? wpabuf_len(data->tls_in) : 0; 351 if (wpabuf_resize(&data->tls_in, in_len) < 0) { 358 wpabuf_put_buf(data->tls_in, in_data); 389 if (data->tls_in_left > wpabuf_len(in_data) || data->tls_in) { 402 data->tls_in = wpabuf_dup(in_data); 403 if (data->tls_in == NULL) 407 return data->tls_in; 786 wpabuf_free(data->tls_in); 787 data->tls_in [all...] |
H A D | eap_tls_common.h | 37 * tls_in - Received TLS message buffer for re-assembly 39 struct wpabuf *tls_in; member in struct:eap_ssl_data
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_tls_common.c | 318 tls_in_len = data->tls_in ? wpabuf_len(data->tls_in) : 0; 351 if (wpabuf_resize(&data->tls_in, in_len) < 0) { 358 wpabuf_put_buf(data->tls_in, in_data); 389 if (data->tls_in_left > wpabuf_len(in_data) || data->tls_in) { 402 data->tls_in = wpabuf_dup(in_data); 403 if (data->tls_in == NULL) 407 return data->tls_in; 786 wpabuf_free(data->tls_in); 787 data->tls_in [all...] |
H A D | eap_tls_common.h | 37 * tls_in - Received TLS message buffer for re-assembly 39 struct wpabuf *tls_in; member in struct:eap_ssl_data
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_tls_common.c | 318 tls_in_len = data->tls_in ? wpabuf_len(data->tls_in) : 0; 351 if (wpabuf_resize(&data->tls_in, in_len) < 0) { 358 wpabuf_put_buf(data->tls_in, in_data); 389 if (data->tls_in_left > wpabuf_len(in_data) || data->tls_in) { 402 data->tls_in = wpabuf_dup(in_data); 403 if (data->tls_in == NULL) 407 return data->tls_in; 786 wpabuf_free(data->tls_in); 787 data->tls_in [all...] |
H A D | eap_tls_common.h | 37 * tls_in - Received TLS message buffer for re-assembly 39 struct wpabuf *tls_in; member in struct:eap_ssl_data
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_tls_common.h | 48 * tls_in - Received TLS message buffer for re-assembly 50 u8 *tls_in; member in struct:eap_ssl_data 53 * tls_in_len - Number of bytes of the received TLS message in tls_in
|
H A D | eap_tls_common.c | 352 buf = os_realloc(data->tls_in, data->tls_in_len + in_len); 360 data->tls_in = buf; 394 if (data->tls_in_left > in_len || data->tls_in) { 408 data->tls_in = os_malloc(in_len ? in_len : 1); 409 if (data->tls_in == NULL) 411 os_memcpy(data->tls_in, in_data, in_len); 416 return data->tls_in; 797 os_free(data->tls_in); 798 data->tls_in = NULL; 825 os_free(data->tls_in); [all...] |