/external/bluetooth/bluez/audio/ |
H A D | telephony-dummy.c | 216 static DBusMessage *outgoing_call(DBusConnection *conn, DBusMessage *msg, argument 241 static DBusMessage *incoming_call(DBusConnection *conn, DBusMessage *msg, argument 266 static DBusMessage *cancel_call(DBusConnection *conn, DBusMessage *msg, argument 287 static DBusMessage *signal_strength(DBusConnection *conn, DBusMessage *msg, argument 306 static DBusMessage *battery_level(DBusConnection *conn, DBusMessage *msg, argument 325 static DBusMessage *roaming_status(DBusConnection *conn, DBusMessage *msg, argument 344 static DBusMessage *registration_status(DBusConnection *conn, DBusMessage *msg, argument 363 static DBusMessage *set_subscriber_number(DBusConnection *conn, argument
|
/external/bluetooth/bluez/gdbus/ |
H A D | mainloop.c | 51 DBusConnection *conn; member in struct:watch_info 59 static gboolean disconnected_signal(DBusConnection *conn, argument 66 dc_data->function(conn, dc_data->user_data); 68 dbus_connection_unref(conn); 75 DBusConnection *conn = data; local 77 dbus_connection_ref(conn); 80 while (dbus_connection_dispatch(conn) == DBUS_DISPATCH_DATA_REMAINS); 82 dbus_connection_unref(conn); 87 static inline void queue_dispatch(DBusConnection *conn, argument 91 g_timeout_add(DISPATCH_TIMEOUT, message_dispatch, conn); 133 DBusConnection *conn = data; local 245 dispatch_status(DBusConnection *conn, DBusDispatchStatus status, void *data) argument 254 setup_dbus_with_main_loop(DBusConnection *conn) argument 266 setup_bus(DBusConnection *conn, const char *name, DBusError *error) argument 295 DBusConnection *conn; local 318 DBusConnection *conn; local [all...] |
/external/bluetooth/bluez/serial/ |
H A D | port.c | 67 DBusConnection *conn; /* for name listener handling */ member in struct:serial_device 197 g_dbus_remove_watch(device->conn, port->listener_id); 208 if (device->conn) 209 dbus_connection_unref(device->conn); 213 static void port_owner_exited(DBusConnection *conn, void *user_data) argument 256 g_dbus_send_message(device->conn, reply); 355 g_dbus_send_message(device->conn, reply); 356 g_dbus_remove_watch(device->conn, port->listener_id); 416 g_dbus_remove_watch(device->conn, port->listener_id); 418 g_dbus_send_message(device->conn, repl 469 port_connect(DBusConnection *conn, DBusMessage *msg, void *user_data) argument 514 port_disconnect(DBusConnection *conn, DBusMessage *msg, void *user_data) argument 551 create_serial_device(DBusConnection *conn, const char *path, bdaddr_t *src, bdaddr_t *dst) argument 579 port_register(DBusConnection *conn, const char *path, bdaddr_t *src, bdaddr_t *dst, const char *uuid, uint8_t channel) argument [all...] |
/external/bluetooth/bluez/src/ |
H A D | main.c | 312 DBusConnection *conn = get_dbus_connection(); local 314 if (!conn || !dbus_connection_get_is_connected(conn)) 317 manager_cleanup(conn, "/"); 321 dbus_connection_unref(conn); 326 DBusConnection *conn; local 331 conn = g_dbus_setup_bus(DBUS_BUS_SYSTEM, BLUEZ_NAME, &err); 332 if (!conn) { 340 if (!manager_init(conn, "/")) 343 set_dbus_connection(conn); [all...] |
H A D | manager.c | 62 static DBusMessage *default_adapter(DBusConnection *conn, argument 85 static DBusMessage *find_adapter(DBusConnection *conn, argument 130 static DBusMessage *list_adapters(DBusConnection *conn, argument 160 static DBusMessage *get_properties(DBusConnection *conn, argument 213 dbus_bool_t manager_init(DBusConnection *conn, const char *path) argument 215 connection = conn; 219 return g_dbus_register_interface(conn, "/", MANAGER_INTERFACE, 291 void manager_cleanup(DBusConnection *conn, const char *path) argument 296 g_dbus_unregister_interface(conn, "/", MANAGER_INTERFACE);
|
/external/bluetooth/bluez/test/ |
H A D | agent.c | 50 static DBusHandlerResult agent_filter(DBusConnection *conn, argument 76 static DBusHandlerResult request_pincode_message(DBusConnection *conn, argument 113 dbus_connection_send(conn, reply, NULL); 115 dbus_connection_flush(conn); 122 static DBusHandlerResult request_passkey_message(DBusConnection *conn, argument 162 dbus_connection_send(conn, reply, NULL); 164 dbus_connection_flush(conn); 171 static DBusHandlerResult request_confirmation_message(DBusConnection *conn, argument 204 dbus_connection_send(conn, reply, NULL); 206 dbus_connection_flush(conn); 213 authorize_message(DBusConnection *conn, DBusMessage *msg, void *data) argument 249 cancel_message(DBusConnection *conn, DBusMessage *msg, void *data) argument 276 release_message(DBusConnection *conn, DBusMessage *msg, void *data) argument 306 agent_message(DBusConnection *conn, DBusMessage *msg, void *data) argument 337 register_agent(DBusConnection *conn, const char *adapter_path, const char *agent_path, const char *capabilities) argument 377 unregister_agent(DBusConnection *conn, const char *adapter_path, const char *agent_path) argument 417 create_paired_device(DBusConnection *conn, const char *adapter_path, const char *agent_path, const char *capabilities, const char *device) argument 452 get_default_adapter_path(DBusConnection *conn) argument 504 get_adapter_path(DBusConnection *conn, const char *adapter) argument 585 DBusConnection *conn; local [all...] |
H A D | btiotest.c | 267 BtIOConnect conn; local 273 conn = NULL; 276 conn = connect_cb; 285 l2_srv = bt_io_listen(BT_IO_L2CAP, conn, cfm, 294 l2_srv = bt_io_listen(BT_IO_L2CAP, conn, cfm, 351 BtIOConnect conn; local 357 conn = NULL; 360 conn = connect_cb; 367 rc_srv = bt_io_listen(BT_IO_RFCOMM, conn, cfm, 376 rc_srv = bt_io_listen(BT_IO_RFCOMM, conn, cf [all...] |
H A D | hstest.c | 85 struct sco_conninfo conn; local 112 memset(&conn, 0, sizeof(conn)); 113 size = sizeof(conn); 115 if (getsockopt(s, SOL_SCO, SCO_CONNINFO, &conn, &size) < 0) { 129 *handle = conn.hci_handle;
|
H A D | scotest.c | 71 struct sco_conninfo conn; local 107 memset(&conn, 0, sizeof(conn)); 108 optlen = sizeof(conn); 110 if (getsockopt(sk, SOL_SCO, SCO_CONNINFO, &conn, &optlen) < 0) { 117 conn.hci_handle, 118 conn.dev_class[2], conn.dev_class[1], conn.dev_class[0]); 130 struct sco_conninfo conn; local [all...] |
/external/chromium/chrome/browser/debugger/ |
H A D | devtools_remote_listen_socket.cc | 214 SOCKET conn = ListenSocket::Accept(socket_); local 215 if (conn != INVALID_SOCKET) { 217 new DevToolsRemoteListenSocket(conn,
|
/external/chromium/net/base/ |
H A D | listen_socket.cc | 135 SOCKET conn = local 137 if (conn != kInvalidSocket) { 138 net::SetNonBlocking(conn); 140 return conn; 183 SOCKET conn = Accept(socket_); local 184 if (conn != kInvalidSocket) { 186 new ListenSocket(conn, socket_delegate_));
|
/external/chromium/net/tools/fetch/ |
H A D | http_listen_socket.cc | 32 SOCKET conn = ListenSocket::Accept(socket_); local 33 DCHECK_NE(conn, ListenSocket::kInvalidSocket); 34 if (conn == ListenSocket::kInvalidSocket) { 38 new HttpListenSocket(conn, delegate_));
|
/external/javasqlite/src/main/java/SQLite/JDBC2z/ |
H A D | JDBCStatement.java | 8 protected JDBCConnection conn; field in class:JDBCStatement 14 public JDBCStatement(JDBCConnection conn) { argument 15 this.conn = conn; 70 conn.timeout = 5000; 72 conn.timeout = seconds * 1000; 78 return conn.timeout / 1000; // android-changed: should return seconds 93 if (conn == null || conn.db == null) { 97 boolean starttrans = !conn [all...] |
/external/jmonkeyengine/engine/src/networking/com/jme3/network/rmi/ |
H A D | ObjectStore.java | 95 public void connectionAdded(Server server, HostedConnection conn) { argument 96 onConnection(conn); 99 public void connectionRemoved(Server server, HostedConnection conn) { argument 322 private void onConnection(HostedConnection conn) { argument 338 conn.send(defMsg);
|
/external/openssl/apps/ |
H A D | s_time.c | 568 BIO *conn; local 573 if ((conn=BIO_new(BIO_s_connect())) == NULL) 576 /* BIO_set_conn_port(conn,port);*/ 577 BIO_set_conn_hostname(conn,host); 587 SSL_set_bio(serverCon,conn,conn);
|
/external/ppp/pppd/plugins/rp-pppoe/ |
H A D | common.c | 388 * conn -- PPPoE connection 396 sendPADT(PPPoEConnection *conn, char const *msg) argument 404 if (!conn->session) return; 407 if (conn->discoverySocket < 0) return; 409 memcpy(packet.ethHdr.h_dest, conn->peerEth, ETH_ALEN); 410 memcpy(packet.ethHdr.h_source, conn->myEth, ETH_ALEN); 416 packet.session = conn->session; 420 conn->session = 0; 423 if (conn->useHostUniq) { 447 if (conn [all...] |
/external/v8/src/ |
H A D | debug-agent.cc | 234 SmartArrayPointer<char> DebuggerAgentUtil::ReceiveMessage(const Socket* conn) { argument 249 received = conn->Receive(&c, 1); 311 received = ReceiveAll(conn, buffer, content_length); 322 bool DebuggerAgentUtil::SendConnectMessage(const Socket* conn, argument 332 ok = conn->Send(buffer, len); 337 ok = conn->Send(buffer, len); 342 ok = conn->Send(buffer, len); 348 ok = conn->Send(buffer, len); 354 ok = conn->Send(buffer, len); 359 ok = conn 368 SendMessage(const Socket* conn, const Vector<uint16_t> message) argument 427 SendMessage(const Socket* conn, const v8::Handle<v8::String> request) argument 453 ReceiveAll(const Socket* conn, char* data, int len) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | tls_none.c | 44 void tls_connection_deinit(void *tls_ctx, struct tls_connection *conn) argument 49 int tls_connection_established(void *tls_ctx, struct tls_connection *conn) argument 55 int tls_connection_shutdown(void *tls_ctx, struct tls_connection *conn) argument 61 int tls_connection_set_params(void *tls_ctx, struct tls_connection *conn, argument 81 int tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, argument 88 int tls_connection_set_ia(void *tls_ctx, struct tls_connection *conn, argument 95 int tls_connection_get_keys(void *tls_ctx, struct tls_connection *conn, argument 102 int tls_connection_prf(void *tls_ctx, struct tls_connection *conn, argument 110 u8 * tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, argument 120 struct tls_connection *conn, 119 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, size_t *out_len) argument 128 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 136 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 144 tls_connection_resumed(void *tls_ctx, struct tls_connection *conn) argument 150 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument 157 tls_get_cipher(void *tls_ctx, struct tls_connection *conn, char *buf, size_t buflen) argument 164 tls_connection_enable_workaround(void *tls_ctx, struct tls_connection *conn) argument 171 tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument 179 tls_connection_get_failed(void *tls_ctx, struct tls_connection *conn) argument 185 tls_connection_get_read_alerts(void *tls_ctx, struct tls_connection *conn) argument 191 tls_connection_get_write_alerts(void *tls_ctx, struct tls_connection *conn) argument 198 tls_connection_get_keyblock_size(void *tls_ctx, struct tls_connection *conn) argument 211 tls_connection_ia_send_phase_finished(void *tls_ctx, struct tls_connection *conn, int final, u8 *out_data, size_t out_len) argument 220 tls_connection_ia_final_phase_finished(void *tls_ctx, struct tls_connection *conn) argument 227 tls_connection_ia_permute_inner_secret(void *tls_ctx, struct tls_connection *conn, const u8 *key, size_t key_len) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_write.c | 28 static size_t tls_client_cert_chain_der_len(struct tlsv1_client *conn) argument 33 if (conn->cred == NULL) 36 cert = conn->cred->cert; 41 cert = x509_certificate_get_subject(conn->cred->trusted_certs, 49 u8 * tls_send_client_hello(struct tlsv1_client *conn, size_t *out_len) argument 59 WPA_PUT_BE32(conn->client_random, now.sec); 60 if (os_get_random(conn->client_random + 4, TLS_RANDOM_LEN - 4)) { 66 conn->client_random, TLS_RANDOM_LEN); 68 len = 100 + conn->num_cipher_suites * 2 + conn 132 tls_write_client_certificate(struct tlsv1_client *conn, u8 **msgpos, u8 *end) argument 210 tlsv1_key_x_anon_dh(struct tlsv1_client *conn, u8 **pos, u8 *end) argument 331 tlsv1_key_x_rsa(struct tlsv1_client *conn, u8 **pos, u8 *end) argument 378 tls_write_client_key_exchange(struct tlsv1_client *conn, u8 **msgpos, u8 *end) argument 435 tls_write_client_certificate_verify(struct tlsv1_client *conn, u8 **msgpos, u8 *end) argument 557 tls_write_client_change_cipher_spec(struct tlsv1_client *conn, u8 **msgpos, u8 *end) argument 591 tls_write_client_finished(struct tlsv1_client *conn, u8 **msgpos, u8 *end) argument 668 tls_send_client_key_exchange(struct tlsv1_client *conn, size_t *out_len) argument 711 tls_send_change_cipher_spec(struct tlsv1_client *conn, size_t *out_len) argument 741 tlsv1_client_handshake_write(struct tlsv1_client *conn, size_t *out_len, int no_appl_data) argument 767 tlsv1_client_send_alert(struct tlsv1_client *conn, u8 level, u8 description, size_t *out_len) argument [all...] |
H A D | tlsv1_server.c | 30 void tlsv1_server_alert(struct tlsv1_server *conn, u8 level, u8 description) argument 32 conn->alert_level = level; 33 conn->alert_description = description; 37 int tlsv1_server_derive_keys(struct tlsv1_server *conn, argument 49 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 50 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, 54 conn->master_secret, TLS_MASTER_SECRET_LEN)) { 60 conn->master_secret, TLS_MASTER_SECRET_LEN); 63 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN); 64 os_memcpy(seed + TLS_RANDOM_LEN, conn 111 tlsv1_server_handshake(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, size_t *out_len) argument 195 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 230 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 310 struct tlsv1_server *conn; local 344 tlsv1_server_clear_data(struct tlsv1_server *conn) argument 369 tlsv1_server_deinit(struct tlsv1_server *conn) argument 381 tlsv1_server_established(struct tlsv1_server *conn) argument 397 tlsv1_server_prf(struct tlsv1_server *conn, const char *label, int server_random_first, u8 *out, size_t out_len) argument 429 tlsv1_server_get_cipher(struct tlsv1_server *conn, char *buf, size_t buflen) argument 471 tlsv1_server_shutdown(struct tlsv1_server *conn) argument 492 tlsv1_server_resumed(struct tlsv1_server *conn) argument 504 tlsv1_server_get_keys(struct tlsv1_server *conn, struct tls_keys *keys) argument 530 tlsv1_server_get_keyblock_size(struct tlsv1_server *conn) argument 547 tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument 581 tlsv1_server_set_verify(struct tlsv1_server *conn, int verify_peer) argument 588 tlsv1_server_set_session_ticket_cb(struct tlsv1_server *conn, tlsv1_server_session_ticket_cb cb, void *ctx) argument [all...] |
H A D | tlsv1_server_read.c | 28 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, 30 static int tls_process_change_cipher_spec(struct tlsv1_server *conn, 35 static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct, argument 48 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL, 63 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL, 85 conn->client_version = WPA_GET_BE16(pos); 87 conn->client_version >> 8, conn->client_version & 0xff); 88 if (conn->client_version < TLS_VERSION) { 91 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATA 267 tls_process_certificate(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 469 tls_process_client_key_exchange_rsa( struct tlsv1_server *conn, const u8 *pos, const u8 *end) argument 567 tls_process_client_key_exchange_dh_anon( struct tlsv1_server *conn, const u8 *pos, const u8 *end) argument 674 tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 752 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 918 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 968 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1085 tlsv1_server_process_handshake(struct tlsv1_server *conn, u8 ct, const u8 *buf, size_t *len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_none.c | 37 void tls_connection_deinit(void *tls_ctx, struct tls_connection *conn) argument 42 int tls_connection_established(void *tls_ctx, struct tls_connection *conn) argument 48 int tls_connection_shutdown(void *tls_ctx, struct tls_connection *conn) argument 54 int tls_connection_set_params(void *tls_ctx, struct tls_connection *conn, argument 74 int tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, argument 81 int tls_connection_get_keys(void *tls_ctx, struct tls_connection *conn, argument 88 int tls_connection_prf(void *tls_ctx, struct tls_connection *conn, argument 97 struct tls_connection *conn, 106 struct tls_connection *conn, 115 struct tls_connection *conn, 96 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 105 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 114 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 122 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 130 tls_connection_resumed(void *tls_ctx, struct tls_connection *conn) argument 136 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument 143 tls_get_cipher(void *tls_ctx, struct tls_connection *conn, char *buf, size_t buflen) argument 150 tls_connection_enable_workaround(void *tls_ctx, struct tls_connection *conn) argument 157 tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument 165 tls_connection_get_failed(void *tls_ctx, struct tls_connection *conn) argument 171 tls_connection_get_read_alerts(void *tls_ctx, struct tls_connection *conn) argument 177 tls_connection_get_write_alerts(void *tls_ctx, struct tls_connection *conn) argument 184 tls_connection_get_keyblock_size(void *tls_ctx, struct tls_connection *conn) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_write.c | 24 static size_t tls_client_cert_chain_der_len(struct tlsv1_client *conn) argument 29 if (conn->cred == NULL) 32 cert = conn->cred->cert; 37 cert = x509_certificate_get_subject(conn->cred->trusted_certs, 45 u8 * tls_send_client_hello(struct tlsv1_client *conn, size_t *out_len) argument 55 WPA_PUT_BE32(conn->client_random, now.sec); 56 if (random_get_bytes(conn->client_random + 4, TLS_RANDOM_LEN - 4)) { 62 conn->client_random, TLS_RANDOM_LEN); 64 len = 100 + conn->num_cipher_suites * 2 + conn 129 tls_write_client_certificate(struct tlsv1_client *conn, u8 **msgpos, u8 *end) argument 208 tlsv1_key_x_anon_dh(struct tlsv1_client *conn, u8 **pos, u8 *end) argument 324 tlsv1_key_x_rsa(struct tlsv1_client *conn, u8 **pos, u8 *end) argument 371 tls_write_client_key_exchange(struct tlsv1_client *conn, u8 **msgpos, u8 *end) argument 429 tls_write_client_certificate_verify(struct tlsv1_client *conn, u8 **msgpos, u8 *end) argument 607 tls_write_client_change_cipher_spec(struct tlsv1_client *conn, u8 **msgpos, u8 *end) argument 640 tls_write_client_finished(struct tlsv1_client *conn, u8 **msgpos, u8 *end) argument 731 tls_send_client_key_exchange(struct tlsv1_client *conn, size_t *out_len) argument 774 tls_send_change_cipher_spec(struct tlsv1_client *conn, size_t *out_len) argument 804 tlsv1_client_handshake_write(struct tlsv1_client *conn, size_t *out_len, int no_appl_data) argument 830 tlsv1_client_send_alert(struct tlsv1_client *conn, u8 level, u8 description, size_t *out_len) argument [all...] |
H A D | tlsv1_server.c | 24 void tlsv1_server_alert(struct tlsv1_server *conn, u8 level, u8 description) argument 26 conn->alert_level = level; 27 conn->alert_description = description; 31 int tlsv1_server_derive_keys(struct tlsv1_server *conn, argument 43 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 44 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, 46 if (tls_prf(conn->rl.tls_version, 49 conn->master_secret, TLS_MASTER_SECRET_LEN)) { 55 conn->master_secret, TLS_MASTER_SECRET_LEN); 58 os_memcpy(seed, conn 107 tlsv1_server_handshake(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, size_t *out_len) argument 200 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 233 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 343 struct tlsv1_server *conn; local 377 tlsv1_server_clear_data(struct tlsv1_server *conn) argument 402 tlsv1_server_deinit(struct tlsv1_server *conn) argument 414 tlsv1_server_established(struct tlsv1_server *conn) argument 430 tlsv1_server_prf(struct tlsv1_server *conn, const char *label, int server_random_first, u8 *out, size_t out_len) argument 463 tlsv1_server_get_cipher(struct tlsv1_server *conn, char *buf, size_t buflen) argument 505 tlsv1_server_shutdown(struct tlsv1_server *conn) argument 526 tlsv1_server_resumed(struct tlsv1_server *conn) argument 538 tlsv1_server_get_keys(struct tlsv1_server *conn, struct tls_keys *keys) argument 564 tlsv1_server_get_keyblock_size(struct tlsv1_server *conn) argument 581 tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument 611 tlsv1_server_set_verify(struct tlsv1_server *conn, int verify_peer) argument 618 tlsv1_server_set_session_ticket_cb(struct tlsv1_server *conn, tlsv1_server_session_ticket_cb cb, void *ctx) argument [all...] |
H A D | tlsv1_server_read.c | 23 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, 25 static int tls_process_change_cipher_spec(struct tlsv1_server *conn, 30 static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct, argument 43 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL, 58 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL, 80 conn->client_version = WPA_GET_BE16(pos); 82 conn->client_version >> 8, conn->client_version & 0xff); 83 if (conn->client_version < TLS_VERSION_1) { 86 conn 277 tls_process_certificate(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 479 tls_process_client_key_exchange_rsa( struct tlsv1_server *conn, const u8 *pos, const u8 *end) argument 585 tls_process_client_key_exchange_dh_anon( struct tlsv1_server *conn, const u8 *pos, const u8 *end) argument 688 tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 766 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1012 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1062 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1200 tlsv1_server_process_handshake(struct tlsv1_server *conn, u8 ct, const u8 *buf, size_t *len) argument [all...] |