Searched defs:conn (Results 126 - 150 of 257) sorted by relevance

1234567891011

/external/bluetooth/bluez/audio/
H A Dtelephony-dummy.c216 static DBusMessage *outgoing_call(DBusConnection *conn, DBusMessage *msg, argument
241 static DBusMessage *incoming_call(DBusConnection *conn, DBusMessage *msg, argument
266 static DBusMessage *cancel_call(DBusConnection *conn, DBusMessage *msg, argument
287 static DBusMessage *signal_strength(DBusConnection *conn, DBusMessage *msg, argument
306 static DBusMessage *battery_level(DBusConnection *conn, DBusMessage *msg, argument
325 static DBusMessage *roaming_status(DBusConnection *conn, DBusMessage *msg, argument
344 static DBusMessage *registration_status(DBusConnection *conn, DBusMessage *msg, argument
363 static DBusMessage *set_subscriber_number(DBusConnection *conn, argument
/external/bluetooth/bluez/gdbus/
H A Dmainloop.c51 DBusConnection *conn; member in struct:watch_info
59 static gboolean disconnected_signal(DBusConnection *conn, argument
66 dc_data->function(conn, dc_data->user_data);
68 dbus_connection_unref(conn);
75 DBusConnection *conn = data; local
77 dbus_connection_ref(conn);
80 while (dbus_connection_dispatch(conn) == DBUS_DISPATCH_DATA_REMAINS);
82 dbus_connection_unref(conn);
87 static inline void queue_dispatch(DBusConnection *conn, argument
91 g_timeout_add(DISPATCH_TIMEOUT, message_dispatch, conn);
133 DBusConnection *conn = data; local
245 dispatch_status(DBusConnection *conn, DBusDispatchStatus status, void *data) argument
254 setup_dbus_with_main_loop(DBusConnection *conn) argument
266 setup_bus(DBusConnection *conn, const char *name, DBusError *error) argument
295 DBusConnection *conn; local
318 DBusConnection *conn; local
[all...]
/external/bluetooth/bluez/serial/
H A Dport.c67 DBusConnection *conn; /* for name listener handling */ member in struct:serial_device
197 g_dbus_remove_watch(device->conn, port->listener_id);
208 if (device->conn)
209 dbus_connection_unref(device->conn);
213 static void port_owner_exited(DBusConnection *conn, void *user_data) argument
256 g_dbus_send_message(device->conn, reply);
355 g_dbus_send_message(device->conn, reply);
356 g_dbus_remove_watch(device->conn, port->listener_id);
416 g_dbus_remove_watch(device->conn, port->listener_id);
418 g_dbus_send_message(device->conn, repl
469 port_connect(DBusConnection *conn, DBusMessage *msg, void *user_data) argument
514 port_disconnect(DBusConnection *conn, DBusMessage *msg, void *user_data) argument
551 create_serial_device(DBusConnection *conn, const char *path, bdaddr_t *src, bdaddr_t *dst) argument
579 port_register(DBusConnection *conn, const char *path, bdaddr_t *src, bdaddr_t *dst, const char *uuid, uint8_t channel) argument
[all...]
/external/bluetooth/bluez/src/
H A Dmain.c312 DBusConnection *conn = get_dbus_connection(); local
314 if (!conn || !dbus_connection_get_is_connected(conn))
317 manager_cleanup(conn, "/");
321 dbus_connection_unref(conn);
326 DBusConnection *conn; local
331 conn = g_dbus_setup_bus(DBUS_BUS_SYSTEM, BLUEZ_NAME, &err);
332 if (!conn) {
340 if (!manager_init(conn, "/"))
343 set_dbus_connection(conn);
[all...]
H A Dmanager.c62 static DBusMessage *default_adapter(DBusConnection *conn, argument
85 static DBusMessage *find_adapter(DBusConnection *conn, argument
130 static DBusMessage *list_adapters(DBusConnection *conn, argument
160 static DBusMessage *get_properties(DBusConnection *conn, argument
213 dbus_bool_t manager_init(DBusConnection *conn, const char *path) argument
215 connection = conn;
219 return g_dbus_register_interface(conn, "/", MANAGER_INTERFACE,
291 void manager_cleanup(DBusConnection *conn, const char *path) argument
296 g_dbus_unregister_interface(conn, "/", MANAGER_INTERFACE);
/external/bluetooth/bluez/test/
H A Dagent.c50 static DBusHandlerResult agent_filter(DBusConnection *conn, argument
76 static DBusHandlerResult request_pincode_message(DBusConnection *conn, argument
113 dbus_connection_send(conn, reply, NULL);
115 dbus_connection_flush(conn);
122 static DBusHandlerResult request_passkey_message(DBusConnection *conn, argument
162 dbus_connection_send(conn, reply, NULL);
164 dbus_connection_flush(conn);
171 static DBusHandlerResult request_confirmation_message(DBusConnection *conn, argument
204 dbus_connection_send(conn, reply, NULL);
206 dbus_connection_flush(conn);
213 authorize_message(DBusConnection *conn, DBusMessage *msg, void *data) argument
249 cancel_message(DBusConnection *conn, DBusMessage *msg, void *data) argument
276 release_message(DBusConnection *conn, DBusMessage *msg, void *data) argument
306 agent_message(DBusConnection *conn, DBusMessage *msg, void *data) argument
337 register_agent(DBusConnection *conn, const char *adapter_path, const char *agent_path, const char *capabilities) argument
377 unregister_agent(DBusConnection *conn, const char *adapter_path, const char *agent_path) argument
417 create_paired_device(DBusConnection *conn, const char *adapter_path, const char *agent_path, const char *capabilities, const char *device) argument
452 get_default_adapter_path(DBusConnection *conn) argument
504 get_adapter_path(DBusConnection *conn, const char *adapter) argument
585 DBusConnection *conn; local
[all...]
H A Dbtiotest.c267 BtIOConnect conn; local
273 conn = NULL;
276 conn = connect_cb;
285 l2_srv = bt_io_listen(BT_IO_L2CAP, conn, cfm,
294 l2_srv = bt_io_listen(BT_IO_L2CAP, conn, cfm,
351 BtIOConnect conn; local
357 conn = NULL;
360 conn = connect_cb;
367 rc_srv = bt_io_listen(BT_IO_RFCOMM, conn, cfm,
376 rc_srv = bt_io_listen(BT_IO_RFCOMM, conn, cf
[all...]
H A Dhstest.c85 struct sco_conninfo conn; local
112 memset(&conn, 0, sizeof(conn));
113 size = sizeof(conn);
115 if (getsockopt(s, SOL_SCO, SCO_CONNINFO, &conn, &size) < 0) {
129 *handle = conn.hci_handle;
H A Dscotest.c71 struct sco_conninfo conn; local
107 memset(&conn, 0, sizeof(conn));
108 optlen = sizeof(conn);
110 if (getsockopt(sk, SOL_SCO, SCO_CONNINFO, &conn, &optlen) < 0) {
117 conn.hci_handle,
118 conn.dev_class[2], conn.dev_class[1], conn.dev_class[0]);
130 struct sco_conninfo conn; local
[all...]
/external/chromium/chrome/browser/debugger/
H A Ddevtools_remote_listen_socket.cc214 SOCKET conn = ListenSocket::Accept(socket_); local
215 if (conn != INVALID_SOCKET) {
217 new DevToolsRemoteListenSocket(conn,
/external/chromium/net/base/
H A Dlisten_socket.cc135 SOCKET conn = local
137 if (conn != kInvalidSocket) {
138 net::SetNonBlocking(conn);
140 return conn;
183 SOCKET conn = Accept(socket_); local
184 if (conn != kInvalidSocket) {
186 new ListenSocket(conn, socket_delegate_));
/external/chromium/net/tools/fetch/
H A Dhttp_listen_socket.cc32 SOCKET conn = ListenSocket::Accept(socket_); local
33 DCHECK_NE(conn, ListenSocket::kInvalidSocket);
34 if (conn == ListenSocket::kInvalidSocket) {
38 new HttpListenSocket(conn, delegate_));
/external/javasqlite/src/main/java/SQLite/JDBC2z/
H A DJDBCStatement.java8 protected JDBCConnection conn; field in class:JDBCStatement
14 public JDBCStatement(JDBCConnection conn) { argument
15 this.conn = conn;
70 conn.timeout = 5000;
72 conn.timeout = seconds * 1000;
78 return conn.timeout / 1000; // android-changed: should return seconds
93 if (conn == null || conn.db == null) {
97 boolean starttrans = !conn
[all...]
/external/jmonkeyengine/engine/src/networking/com/jme3/network/rmi/
H A DObjectStore.java95 public void connectionAdded(Server server, HostedConnection conn) { argument
96 onConnection(conn);
99 public void connectionRemoved(Server server, HostedConnection conn) { argument
322 private void onConnection(HostedConnection conn) { argument
338 conn.send(defMsg);
/external/openssl/apps/
H A Ds_time.c568 BIO *conn; local
573 if ((conn=BIO_new(BIO_s_connect())) == NULL)
576 /* BIO_set_conn_port(conn,port);*/
577 BIO_set_conn_hostname(conn,host);
587 SSL_set_bio(serverCon,conn,conn);
/external/ppp/pppd/plugins/rp-pppoe/
H A Dcommon.c388 * conn -- PPPoE connection
396 sendPADT(PPPoEConnection *conn, char const *msg) argument
404 if (!conn->session) return;
407 if (conn->discoverySocket < 0) return;
409 memcpy(packet.ethHdr.h_dest, conn->peerEth, ETH_ALEN);
410 memcpy(packet.ethHdr.h_source, conn->myEth, ETH_ALEN);
416 packet.session = conn->session;
420 conn->session = 0;
423 if (conn->useHostUniq) {
447 if (conn
[all...]
/external/v8/src/
H A Ddebug-agent.cc234 SmartArrayPointer<char> DebuggerAgentUtil::ReceiveMessage(const Socket* conn) { argument
249 received = conn->Receive(&c, 1);
311 received = ReceiveAll(conn, buffer, content_length);
322 bool DebuggerAgentUtil::SendConnectMessage(const Socket* conn, argument
332 ok = conn->Send(buffer, len);
337 ok = conn->Send(buffer, len);
342 ok = conn->Send(buffer, len);
348 ok = conn->Send(buffer, len);
354 ok = conn->Send(buffer, len);
359 ok = conn
368 SendMessage(const Socket* conn, const Vector<uint16_t> message) argument
427 SendMessage(const Socket* conn, const v8::Handle<v8::String> request) argument
453 ReceiveAll(const Socket* conn, char* data, int len) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
H A Dtls_none.c44 void tls_connection_deinit(void *tls_ctx, struct tls_connection *conn) argument
49 int tls_connection_established(void *tls_ctx, struct tls_connection *conn) argument
55 int tls_connection_shutdown(void *tls_ctx, struct tls_connection *conn) argument
61 int tls_connection_set_params(void *tls_ctx, struct tls_connection *conn, argument
81 int tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, argument
88 int tls_connection_set_ia(void *tls_ctx, struct tls_connection *conn, argument
95 int tls_connection_get_keys(void *tls_ctx, struct tls_connection *conn, argument
102 int tls_connection_prf(void *tls_ctx, struct tls_connection *conn, argument
110 u8 * tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, argument
120 struct tls_connection *conn,
119 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, size_t *out_len) argument
128 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
136 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
144 tls_connection_resumed(void *tls_ctx, struct tls_connection *conn) argument
150 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
157 tls_get_cipher(void *tls_ctx, struct tls_connection *conn, char *buf, size_t buflen) argument
164 tls_connection_enable_workaround(void *tls_ctx, struct tls_connection *conn) argument
171 tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
179 tls_connection_get_failed(void *tls_ctx, struct tls_connection *conn) argument
185 tls_connection_get_read_alerts(void *tls_ctx, struct tls_connection *conn) argument
191 tls_connection_get_write_alerts(void *tls_ctx, struct tls_connection *conn) argument
198 tls_connection_get_keyblock_size(void *tls_ctx, struct tls_connection *conn) argument
211 tls_connection_ia_send_phase_finished(void *tls_ctx, struct tls_connection *conn, int final, u8 *out_data, size_t out_len) argument
220 tls_connection_ia_final_phase_finished(void *tls_ctx, struct tls_connection *conn) argument
227 tls_connection_ia_permute_inner_secret(void *tls_ctx, struct tls_connection *conn, const u8 *key, size_t key_len) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/tls/
H A Dtlsv1_client_write.c28 static size_t tls_client_cert_chain_der_len(struct tlsv1_client *conn) argument
33 if (conn->cred == NULL)
36 cert = conn->cred->cert;
41 cert = x509_certificate_get_subject(conn->cred->trusted_certs,
49 u8 * tls_send_client_hello(struct tlsv1_client *conn, size_t *out_len) argument
59 WPA_PUT_BE32(conn->client_random, now.sec);
60 if (os_get_random(conn->client_random + 4, TLS_RANDOM_LEN - 4)) {
66 conn->client_random, TLS_RANDOM_LEN);
68 len = 100 + conn->num_cipher_suites * 2 + conn
132 tls_write_client_certificate(struct tlsv1_client *conn, u8 **msgpos, u8 *end) argument
210 tlsv1_key_x_anon_dh(struct tlsv1_client *conn, u8 **pos, u8 *end) argument
331 tlsv1_key_x_rsa(struct tlsv1_client *conn, u8 **pos, u8 *end) argument
378 tls_write_client_key_exchange(struct tlsv1_client *conn, u8 **msgpos, u8 *end) argument
435 tls_write_client_certificate_verify(struct tlsv1_client *conn, u8 **msgpos, u8 *end) argument
557 tls_write_client_change_cipher_spec(struct tlsv1_client *conn, u8 **msgpos, u8 *end) argument
591 tls_write_client_finished(struct tlsv1_client *conn, u8 **msgpos, u8 *end) argument
668 tls_send_client_key_exchange(struct tlsv1_client *conn, size_t *out_len) argument
711 tls_send_change_cipher_spec(struct tlsv1_client *conn, size_t *out_len) argument
741 tlsv1_client_handshake_write(struct tlsv1_client *conn, size_t *out_len, int no_appl_data) argument
767 tlsv1_client_send_alert(struct tlsv1_client *conn, u8 level, u8 description, size_t *out_len) argument
[all...]
H A Dtlsv1_server.c30 void tlsv1_server_alert(struct tlsv1_server *conn, u8 level, u8 description) argument
32 conn->alert_level = level;
33 conn->alert_description = description;
37 int tlsv1_server_derive_keys(struct tlsv1_server *conn, argument
49 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
50 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random,
54 conn->master_secret, TLS_MASTER_SECRET_LEN)) {
60 conn->master_secret, TLS_MASTER_SECRET_LEN);
63 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN);
64 os_memcpy(seed + TLS_RANDOM_LEN, conn
111 tlsv1_server_handshake(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, size_t *out_len) argument
195 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
230 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
310 struct tlsv1_server *conn; local
344 tlsv1_server_clear_data(struct tlsv1_server *conn) argument
369 tlsv1_server_deinit(struct tlsv1_server *conn) argument
381 tlsv1_server_established(struct tlsv1_server *conn) argument
397 tlsv1_server_prf(struct tlsv1_server *conn, const char *label, int server_random_first, u8 *out, size_t out_len) argument
429 tlsv1_server_get_cipher(struct tlsv1_server *conn, char *buf, size_t buflen) argument
471 tlsv1_server_shutdown(struct tlsv1_server *conn) argument
492 tlsv1_server_resumed(struct tlsv1_server *conn) argument
504 tlsv1_server_get_keys(struct tlsv1_server *conn, struct tls_keys *keys) argument
530 tlsv1_server_get_keyblock_size(struct tlsv1_server *conn) argument
547 tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument
581 tlsv1_server_set_verify(struct tlsv1_server *conn, int verify_peer) argument
588 tlsv1_server_set_session_ticket_cb(struct tlsv1_server *conn, tlsv1_server_session_ticket_cb cb, void *ctx) argument
[all...]
H A Dtlsv1_server_read.c28 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct,
30 static int tls_process_change_cipher_spec(struct tlsv1_server *conn,
35 static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct, argument
48 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
63 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
85 conn->client_version = WPA_GET_BE16(pos);
87 conn->client_version >> 8, conn->client_version & 0xff);
88 if (conn->client_version < TLS_VERSION) {
91 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATA
267 tls_process_certificate(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
469 tls_process_client_key_exchange_rsa( struct tlsv1_server *conn, const u8 *pos, const u8 *end) argument
567 tls_process_client_key_exchange_dh_anon( struct tlsv1_server *conn, const u8 *pos, const u8 *end) argument
674 tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
752 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
918 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
968 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
1085 tlsv1_server_process_handshake(struct tlsv1_server *conn, u8 ct, const u8 *buf, size_t *len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls_none.c37 void tls_connection_deinit(void *tls_ctx, struct tls_connection *conn) argument
42 int tls_connection_established(void *tls_ctx, struct tls_connection *conn) argument
48 int tls_connection_shutdown(void *tls_ctx, struct tls_connection *conn) argument
54 int tls_connection_set_params(void *tls_ctx, struct tls_connection *conn, argument
74 int tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, argument
81 int tls_connection_get_keys(void *tls_ctx, struct tls_connection *conn, argument
88 int tls_connection_prf(void *tls_ctx, struct tls_connection *conn, argument
97 struct tls_connection *conn,
106 struct tls_connection *conn,
115 struct tls_connection *conn,
96 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument
105 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument
114 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument
122 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument
130 tls_connection_resumed(void *tls_ctx, struct tls_connection *conn) argument
136 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
143 tls_get_cipher(void *tls_ctx, struct tls_connection *conn, char *buf, size_t buflen) argument
150 tls_connection_enable_workaround(void *tls_ctx, struct tls_connection *conn) argument
157 tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
165 tls_connection_get_failed(void *tls_ctx, struct tls_connection *conn) argument
171 tls_connection_get_read_alerts(void *tls_ctx, struct tls_connection *conn) argument
177 tls_connection_get_write_alerts(void *tls_ctx, struct tls_connection *conn) argument
184 tls_connection_get_keyblock_size(void *tls_ctx, struct tls_connection *conn) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client_write.c24 static size_t tls_client_cert_chain_der_len(struct tlsv1_client *conn) argument
29 if (conn->cred == NULL)
32 cert = conn->cred->cert;
37 cert = x509_certificate_get_subject(conn->cred->trusted_certs,
45 u8 * tls_send_client_hello(struct tlsv1_client *conn, size_t *out_len) argument
55 WPA_PUT_BE32(conn->client_random, now.sec);
56 if (random_get_bytes(conn->client_random + 4, TLS_RANDOM_LEN - 4)) {
62 conn->client_random, TLS_RANDOM_LEN);
64 len = 100 + conn->num_cipher_suites * 2 + conn
129 tls_write_client_certificate(struct tlsv1_client *conn, u8 **msgpos, u8 *end) argument
208 tlsv1_key_x_anon_dh(struct tlsv1_client *conn, u8 **pos, u8 *end) argument
324 tlsv1_key_x_rsa(struct tlsv1_client *conn, u8 **pos, u8 *end) argument
371 tls_write_client_key_exchange(struct tlsv1_client *conn, u8 **msgpos, u8 *end) argument
429 tls_write_client_certificate_verify(struct tlsv1_client *conn, u8 **msgpos, u8 *end) argument
607 tls_write_client_change_cipher_spec(struct tlsv1_client *conn, u8 **msgpos, u8 *end) argument
640 tls_write_client_finished(struct tlsv1_client *conn, u8 **msgpos, u8 *end) argument
731 tls_send_client_key_exchange(struct tlsv1_client *conn, size_t *out_len) argument
774 tls_send_change_cipher_spec(struct tlsv1_client *conn, size_t *out_len) argument
804 tlsv1_client_handshake_write(struct tlsv1_client *conn, size_t *out_len, int no_appl_data) argument
830 tlsv1_client_send_alert(struct tlsv1_client *conn, u8 level, u8 description, size_t *out_len) argument
[all...]
H A Dtlsv1_server.c24 void tlsv1_server_alert(struct tlsv1_server *conn, u8 level, u8 description) argument
26 conn->alert_level = level;
27 conn->alert_description = description;
31 int tlsv1_server_derive_keys(struct tlsv1_server *conn, argument
43 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
44 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random,
46 if (tls_prf(conn->rl.tls_version,
49 conn->master_secret, TLS_MASTER_SECRET_LEN)) {
55 conn->master_secret, TLS_MASTER_SECRET_LEN);
58 os_memcpy(seed, conn
107 tlsv1_server_handshake(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, size_t *out_len) argument
200 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
233 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
343 struct tlsv1_server *conn; local
377 tlsv1_server_clear_data(struct tlsv1_server *conn) argument
402 tlsv1_server_deinit(struct tlsv1_server *conn) argument
414 tlsv1_server_established(struct tlsv1_server *conn) argument
430 tlsv1_server_prf(struct tlsv1_server *conn, const char *label, int server_random_first, u8 *out, size_t out_len) argument
463 tlsv1_server_get_cipher(struct tlsv1_server *conn, char *buf, size_t buflen) argument
505 tlsv1_server_shutdown(struct tlsv1_server *conn) argument
526 tlsv1_server_resumed(struct tlsv1_server *conn) argument
538 tlsv1_server_get_keys(struct tlsv1_server *conn, struct tls_keys *keys) argument
564 tlsv1_server_get_keyblock_size(struct tlsv1_server *conn) argument
581 tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument
611 tlsv1_server_set_verify(struct tlsv1_server *conn, int verify_peer) argument
618 tlsv1_server_set_session_ticket_cb(struct tlsv1_server *conn, tlsv1_server_session_ticket_cb cb, void *ctx) argument
[all...]
H A Dtlsv1_server_read.c23 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct,
25 static int tls_process_change_cipher_spec(struct tlsv1_server *conn,
30 static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct, argument
43 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
58 tlsv1_server_alert(conn, TLS_ALERT_LEVEL_FATAL,
80 conn->client_version = WPA_GET_BE16(pos);
82 conn->client_version >> 8, conn->client_version & 0xff);
83 if (conn->client_version < TLS_VERSION_1) {
86 conn
277 tls_process_certificate(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
479 tls_process_client_key_exchange_rsa( struct tlsv1_server *conn, const u8 *pos, const u8 *end) argument
585 tls_process_client_key_exchange_dh_anon( struct tlsv1_server *conn, const u8 *pos, const u8 *end) argument
688 tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
766 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
1012 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
1062 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
1200 tlsv1_server_process_handshake(struct tlsv1_server *conn, u8 ct, const u8 *buf, size_t *len) argument
[all...]

Completed in 714 milliseconds

1234567891011