/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_tls_common.c | 417 * @out_data: Buffer for returning a pointer to application data (if available) 423 struct wpabuf **out_data) 454 *out_data = appl_data; 471 * @out_data: Buffer for returning the allocated output buffer 476 struct wpabuf **out_data) 517 *out_data = eap_msg_alloc(EAP_VENDOR_IETF, eap_type, 520 if (*out_data == NULL) 523 flags = wpabuf_put(*out_data, 1); 529 wpabuf_put_be32(*out_data, wpabuf_len(data->tls_out)); 532 wpabuf_put_data(*out_data, 421 eap_tls_process_input(struct eap_sm *sm, struct eap_ssl_data *data, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument 474 eap_tls_process_output(struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, int ret, struct wpabuf **out_data) argument 573 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument 873 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |
H A D | eap_peap.c | 756 struct wpabuf **out_data) 794 req->identifier, NULL, out_data); 1015 rmsg, out_data)) { 752 eap_peap_decrypt(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument
|
H A D | eap_fast.c | 1102 u8 identifier, struct wpabuf **out_data) 1111 resp, out_data)) { 1144 struct wpabuf **out_data) 1154 req->identifier, out_data); 1159 req->identifier, out_data); 1165 req->identifier, out_data); 1247 out_data); 1255 struct wpabuf **out_data) 1278 req->identifier, NULL, out_data); 1298 in_decrypted, out_data); 1099 eap_fast_encrypt_response(struct eap_sm *sm, struct eap_fast_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument 1139 eap_fast_process_decrypted(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, struct wpabuf *decrypted, struct wpabuf **out_data) argument 1251 eap_fast_decrypt(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |
H A D | eap_ttls.c | 957 struct wpabuf **out_data) 966 resp, out_data)) { 1127 struct wpabuf **out_data) 1180 out_data) < 0) 1198 struct wpabuf **out_data) 1233 out_data); 1249 struct wpabuf **out_data) 1264 *out_data = eap_peer_tls_build_ack(identifier, EAP_TYPE_TTLS, 1273 out_data); 1280 struct wpabuf **out_data) 954 eap_ttls_encrypt_response(struct eap_sm *sm, struct eap_ttls_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument 1121 eap_ttls_process_decrypted(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, struct ttls_parse_avp *parse, struct wpabuf *in_decrypted, struct wpabuf **out_data) argument 1194 eap_ttls_implicit_identity_request(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, struct wpabuf **out_data) argument 1247 eap_ttls_phase2_start(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, struct wpabuf **out_data) argument 1277 eap_ttls_decrypt(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, const struct wpabuf *in_data, struct wpabuf **out_data) argument 1349 eap_ttls_process_handshake(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client.c | 266 * @out_data: Pointer to output buffer (encrypted TLS data) 267 * @out_len: Maximum out_data length 268 * Returns: Number of bytes written to out_data, -1 on failure 275 u8 *out_data, size_t out_len) 283 out_data, out_len, in_data, in_len, &rlen) < 0) { 273 tlsv1_client_encrypt(struct tlsv1_client *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_tls_common.c | 417 * @out_data: Buffer for returning a pointer to application data (if available) 423 struct wpabuf **out_data) 454 *out_data = appl_data; 471 * @out_data: Buffer for returning the allocated output buffer 476 struct wpabuf **out_data) 517 *out_data = eap_msg_alloc(EAP_VENDOR_IETF, eap_type, 520 if (*out_data == NULL) 523 flags = wpabuf_put(*out_data, 1); 529 wpabuf_put_be32(*out_data, wpabuf_len(data->tls_out)); 532 wpabuf_put_data(*out_data, 421 eap_tls_process_input(struct eap_sm *sm, struct eap_ssl_data *data, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument 474 eap_tls_process_output(struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, int ret, struct wpabuf **out_data) argument 573 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument 873 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |
H A D | eap_peap.c | 756 struct wpabuf **out_data) 794 req->identifier, NULL, out_data); 1015 rmsg, out_data)) { 752 eap_peap_decrypt(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument
|
H A D | eap_fast.c | 1102 u8 identifier, struct wpabuf **out_data) 1111 resp, out_data)) { 1144 struct wpabuf **out_data) 1154 req->identifier, out_data); 1159 req->identifier, out_data); 1165 req->identifier, out_data); 1247 out_data); 1255 struct wpabuf **out_data) 1278 req->identifier, NULL, out_data); 1298 in_decrypted, out_data); 1099 eap_fast_encrypt_response(struct eap_sm *sm, struct eap_fast_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument 1139 eap_fast_process_decrypted(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, struct wpabuf *decrypted, struct wpabuf **out_data) argument 1251 eap_fast_decrypt(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |
H A D | eap_ttls.c | 957 struct wpabuf **out_data) 966 resp, out_data)) { 1127 struct wpabuf **out_data) 1180 out_data) < 0) 1198 struct wpabuf **out_data) 1233 out_data); 1249 struct wpabuf **out_data) 1264 *out_data = eap_peer_tls_build_ack(identifier, EAP_TYPE_TTLS, 1273 out_data); 1280 struct wpabuf **out_data) 954 eap_ttls_encrypt_response(struct eap_sm *sm, struct eap_ttls_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument 1121 eap_ttls_process_decrypted(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, struct ttls_parse_avp *parse, struct wpabuf *in_decrypted, struct wpabuf **out_data) argument 1194 eap_ttls_implicit_identity_request(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, struct wpabuf **out_data) argument 1247 eap_ttls_phase2_start(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, struct wpabuf **out_data) argument 1277 eap_ttls_decrypt(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, const struct wpabuf *in_data, struct wpabuf **out_data) argument 1349 eap_ttls_process_handshake(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client.c | 266 * @out_data: Pointer to output buffer (encrypted TLS data) 267 * @out_len: Maximum out_data length 268 * Returns: Number of bytes written to out_data, -1 on failure 275 u8 *out_data, size_t out_len) 283 out_data, out_len, in_data, in_len, &rlen) < 0) { 273 tlsv1_client_encrypt(struct tlsv1_client *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_tls_common.c | 417 * @out_data: Buffer for returning a pointer to application data (if available) 423 struct wpabuf **out_data) 454 *out_data = appl_data; 471 * @out_data: Buffer for returning the allocated output buffer 476 struct wpabuf **out_data) 517 *out_data = eap_msg_alloc(EAP_VENDOR_IETF, eap_type, 520 if (*out_data == NULL) 523 flags = wpabuf_put(*out_data, 1); 529 wpabuf_put_be32(*out_data, wpabuf_len(data->tls_out)); 532 wpabuf_put_data(*out_data, 421 eap_tls_process_input(struct eap_sm *sm, struct eap_ssl_data *data, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument 474 eap_tls_process_output(struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, int ret, struct wpabuf **out_data) argument 573 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument 873 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |
H A D | eap_peap.c | 756 struct wpabuf **out_data) 794 req->identifier, NULL, out_data); 1015 rmsg, out_data)) { 752 eap_peap_decrypt(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client.c | 266 * @out_data: Pointer to output buffer (encrypted TLS data) 267 * @out_len: Maximum out_data length 268 * Returns: Number of bytes written to out_data, -1 on failure 275 u8 *out_data, size_t out_len) 283 out_data, out_len, in_data, in_len, &rlen) < 0) { 273 tlsv1_client_encrypt(struct tlsv1_client *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
|
/external/chromium/chrome/browser/history/ |
H A D | history_backend_unittest.cc | 318 std::vector<unsigned char> out_data; local 320 &out_data)); 321 EXPECT_FALSE(backend_->thumbnail_db_->GetPageThumbnail(row2_id, &out_data));
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | tls_schannel.c | 484 u8 *out_data, size_t out_len) 510 wpa_printf(MSG_DEBUG, "%s: too short out_data (out_len=%lu " 518 bufs[0].pvBuffer = out_data; 522 os_memcpy(out_data + sizes.cbHeader, in_data, in_len); 523 bufs[1].pvBuffer = out_data + sizes.cbHeader; 527 bufs[2].pvBuffer = out_data + sizes.cbHeader + in_len; 545 "out_data=%p bufs %p %p %p", 546 out_data, bufs[0].pvBuffer, bufs[1].pvBuffer, 560 "EncryptMessage", out_data, total_len); 572 u8 *out_data, size_ 482 tls_connection_encrypt(void *ssl_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 570 tls_connection_decrypt(void *ssl_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 768 tls_connection_ia_send_phase_finished(void *tls_ctx, struct tls_connection *conn, int final, u8 *out_data, size_t out_len) argument [all...] |
H A D | tls_gnutls.c | 988 u8 *out_data; local 1079 out_data = conn->push_buf; 1083 return out_data; 1099 u8 *out_data, size_t out_len) 1126 os_memcpy(out_data, conn->push_buf, out_len); 1136 u8 *out_data, size_t out_len) 1155 res = gnutls_ia_recv(conn->session, (char *) out_data, 1182 (char *) out_data); 1208 res = gnutls_record_recv(conn->session, out_data, out_len); 1344 u8 *out_data, size_ 1097 tls_connection_encrypt(void *ssl_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 1134 tls_connection_decrypt(void *ssl_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 1341 tls_connection_ia_send_phase_finished(void *tls_ctx, struct tls_connection *conn, int final, u8 *out_data, size_t out_len) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_peap.c | 760 struct wpabuf **out_data) 798 req->identifier, NULL, out_data); 1019 rmsg, out_data)) { 756 eap_peap_decrypt(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument
|
H A D | eap_fast.c | 1103 u8 identifier, struct wpabuf **out_data) 1112 resp, out_data)) { 1145 struct wpabuf **out_data) 1155 req->identifier, out_data); 1160 req->identifier, out_data); 1166 req->identifier, out_data); 1248 out_data); 1256 struct wpabuf **out_data) 1279 req->identifier, NULL, out_data); 1299 in_decrypted, out_data); 1100 eap_fast_encrypt_response(struct eap_sm *sm, struct eap_fast_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument 1140 eap_fast_process_decrypted(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, struct wpabuf *decrypted, struct wpabuf **out_data) argument 1252 eap_fast_decrypt(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |
H A D | eap_ttls.c | 1246 struct wpabuf **out_data) 1255 resp, out_data)) { 1426 struct wpabuf **out_data) 1479 out_data) < 0) 1498 struct wpabuf **out_data) 1505 *out_data = eap_ttls_build_phase_finished(sm, data, identifier, 1); 1515 struct wpabuf **out_data) 1535 out_data); 1551 struct wpabuf **out_data) 1566 *out_data 1243 eap_ttls_encrypt_response(struct eap_sm *sm, struct eap_ttls_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument 1420 eap_ttls_process_decrypted(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, struct ttls_parse_avp *parse, struct wpabuf *in_decrypted, struct wpabuf **out_data) argument 1494 eap_ttls_final_phase_finished(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, struct wpabuf **out_data) argument 1511 eap_ttls_implicit_identity_request(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, struct wpabuf **out_data) argument 1549 eap_ttls_phase2_start(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, struct wpabuf **out_data) argument 1579 eap_ttls_decrypt(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, const struct wpabuf *in_data, struct wpabuf **out_data) argument 1702 eap_ttls_process_handshake(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_nss.c | 451 struct wpabuf *out_data; local 484 out_data = wpabuf_alloc_ext_data(conn->push_buf, conn->push_buf_len); 485 if (out_data == NULL) 489 return out_data;
|
H A D | tls_gnutls.c | 950 struct wpabuf *out_data; local 1029 out_data = conn->push_buf; 1031 return out_data;
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_nss.c | 451 struct wpabuf *out_data; local 484 out_data = wpabuf_alloc_ext_data(conn->push_buf, conn->push_buf_len); 485 if (out_data == NULL) 489 return out_data;
|
H A D | tls_gnutls.c | 950 struct wpabuf *out_data; local 1029 out_data = conn->push_buf; 1031 return out_data;
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_nss.c | 451 struct wpabuf *out_data; local 484 out_data = wpabuf_alloc_ext_data(conn->push_buf, conn->push_buf_len); 485 if (out_data == NULL) 489 return out_data;
|
H A D | tls_gnutls.c | 950 struct wpabuf *out_data; local 1029 out_data = conn->push_buf; 1031 return out_data;
|