/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_peap.c | 740 struct wpabuf *in_decrypted = NULL; local 754 in_decrypted = data->pending_phase2_req; 779 res = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted); 785 in_decrypted); 787 hdr = wpabuf_mhead(in_decrypted); 788 if (wpabuf_len(in_decrypted) == 5 && hdr->code == EAP_CODE_REQUEST && 790 eap_get_type(in_decrypted) == EAP_TYPE_IDENTITY) { 795 if (wpabuf_len(in_decrypted) >= 5 && hdr->code == EAP_CODE_REQUEST && 796 eap_get_type(in_decrypted) == EAP_TYPE_TLV) { 803 wpabuf_len(in_decrypted)); [all...] |
H A D | eap_tls_common.h | 120 struct wpabuf **in_decrypted);
|
H A D | eap_ttls.c | 917 static int eap_ttls_parse_avps(struct wpabuf *in_decrypted, argument 924 pos = wpabuf_mhead(in_decrypted); 925 left = wpabuf_len(in_decrypted); 1156 struct wpabuf *in_decrypted, 1217 data->pending_phase2_req = wpabuf_dup(in_decrypted); 1312 struct wpabuf *in_decrypted = NULL; local 1328 in_decrypted = data->pending_phase2_req; 1330 if (wpabuf_len(in_decrypted) == 0) { 1331 wpabuf_free(in_decrypted); 1351 retval = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted); 1151 eap_ttls_process_decrypted(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, struct ttls_parse_avp *parse, struct wpabuf *in_decrypted, struct wpabuf **out_data) argument [all...] |
H A D | eap_fast.c | 1291 struct wpabuf *in_decrypted; local 1303 in_decrypted = data->pending_phase2_req; 1315 res = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted); 1321 in_decrypted); 1323 if (wpabuf_len(in_decrypted) < 4) { 1326 (unsigned long) wpabuf_len(in_decrypted)); 1327 wpabuf_free(in_decrypted); 1332 in_decrypted, out_data); 1334 wpabuf_free(in_decrypted);
|
H A D | eap_tls_common.c | 955 * @in_decrypted: Buffer for returning a pointer to the decrypted message 960 struct wpabuf **in_decrypted) 969 *in_decrypted = tls_connection_decrypt(data->ssl_ctx, data->conn, msg); 971 if (*in_decrypted == NULL) { 958 eap_peer_tls_decrypt(struct eap_sm *sm, struct eap_ssl_data *data, const struct wpabuf *in_data, struct wpabuf **in_decrypted) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_peap.c | 740 struct wpabuf *in_decrypted = NULL; local 754 in_decrypted = data->pending_phase2_req; 779 res = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted); 785 in_decrypted); 787 hdr = wpabuf_mhead(in_decrypted); 788 if (wpabuf_len(in_decrypted) == 5 && hdr->code == EAP_CODE_REQUEST && 790 eap_get_type(in_decrypted) == EAP_TYPE_IDENTITY) { 795 if (wpabuf_len(in_decrypted) >= 5 && hdr->code == EAP_CODE_REQUEST && 796 eap_get_type(in_decrypted) == EAP_TYPE_TLV) { 803 wpabuf_len(in_decrypted)); [all...] |
H A D | eap_tls_common.h | 120 struct wpabuf **in_decrypted);
|
H A D | eap_ttls.c | 917 static int eap_ttls_parse_avps(struct wpabuf *in_decrypted, argument 924 pos = wpabuf_mhead(in_decrypted); 925 left = wpabuf_len(in_decrypted); 1156 struct wpabuf *in_decrypted, 1217 data->pending_phase2_req = wpabuf_dup(in_decrypted); 1312 struct wpabuf *in_decrypted = NULL; local 1328 in_decrypted = data->pending_phase2_req; 1330 if (wpabuf_len(in_decrypted) == 0) { 1331 wpabuf_free(in_decrypted); 1351 retval = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted); 1151 eap_ttls_process_decrypted(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, struct ttls_parse_avp *parse, struct wpabuf *in_decrypted, struct wpabuf **out_data) argument [all...] |
H A D | eap_fast.c | 1291 struct wpabuf *in_decrypted; local 1303 in_decrypted = data->pending_phase2_req; 1315 res = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted); 1321 in_decrypted); 1323 if (wpabuf_len(in_decrypted) < 4) { 1326 (unsigned long) wpabuf_len(in_decrypted)); 1327 wpabuf_free(in_decrypted); 1332 in_decrypted, out_data); 1334 wpabuf_free(in_decrypted);
|
H A D | eap_tls_common.c | 955 * @in_decrypted: Buffer for returning a pointer to the decrypted message 960 struct wpabuf **in_decrypted) 969 *in_decrypted = tls_connection_decrypt(data->ssl_ctx, data->conn, msg); 971 if (*in_decrypted == NULL) { 958 eap_peer_tls_decrypt(struct eap_sm *sm, struct eap_ssl_data *data, const struct wpabuf *in_data, struct wpabuf **in_decrypted) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_peap.c | 740 struct wpabuf *in_decrypted = NULL; local 754 in_decrypted = data->pending_phase2_req; 779 res = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted); 785 in_decrypted); 787 hdr = wpabuf_mhead(in_decrypted); 788 if (wpabuf_len(in_decrypted) == 5 && hdr->code == EAP_CODE_REQUEST && 790 eap_get_type(in_decrypted) == EAP_TYPE_IDENTITY) { 795 if (wpabuf_len(in_decrypted) >= 5 && hdr->code == EAP_CODE_REQUEST && 796 eap_get_type(in_decrypted) == EAP_TYPE_TLV) { 803 wpabuf_len(in_decrypted)); [all...] |
H A D | eap_tls_common.h | 120 struct wpabuf **in_decrypted);
|
H A D | eap_ttls.c | 917 static int eap_ttls_parse_avps(struct wpabuf *in_decrypted, argument 924 pos = wpabuf_mhead(in_decrypted); 925 left = wpabuf_len(in_decrypted); 1156 struct wpabuf *in_decrypted, 1217 data->pending_phase2_req = wpabuf_dup(in_decrypted); 1312 struct wpabuf *in_decrypted = NULL; local 1328 in_decrypted = data->pending_phase2_req; 1330 if (wpabuf_len(in_decrypted) == 0) { 1331 wpabuf_free(in_decrypted); 1351 retval = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted); 1151 eap_ttls_process_decrypted(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, struct ttls_parse_avp *parse, struct wpabuf *in_decrypted, struct wpabuf **out_data) argument [all...] |
H A D | eap_fast.c | 1291 struct wpabuf *in_decrypted; local 1303 in_decrypted = data->pending_phase2_req; 1315 res = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted); 1321 in_decrypted); 1323 if (wpabuf_len(in_decrypted) < 4) { 1326 (unsigned long) wpabuf_len(in_decrypted)); 1327 wpabuf_free(in_decrypted); 1332 in_decrypted, out_data); 1334 wpabuf_free(in_decrypted);
|
H A D | eap_tls_common.c | 955 * @in_decrypted: Buffer for returning a pointer to the decrypted message 960 struct wpabuf **in_decrypted) 969 *in_decrypted = tls_connection_decrypt(data->ssl_ctx, data->conn, msg); 971 if (*in_decrypted == NULL) { 958 eap_peer_tls_decrypt(struct eap_sm *sm, struct eap_ssl_data *data, const struct wpabuf *in_data, struct wpabuf **in_decrypted) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_peap.c | 999 struct wpabuf *in_decrypted; local 1016 in_decrypted = tls_connection_decrypt(sm->ssl_ctx, data->ssl.conn, 1018 if (in_decrypted == NULL) { 1026 in_decrypted); 1033 wpabuf_len(in_decrypted)); 1035 wpabuf_free(in_decrypted); 1044 wpabuf_len(in_decrypted)); 1045 wpabuf_put_buf(nbuf, in_decrypted); 1046 wpabuf_free(in_decrypted); 1048 in_decrypted [all...] |
H A D | eap_server_ttls.c | 954 struct wpabuf *in_decrypted; local 971 in_decrypted = tls_connection_decrypt(sm->ssl_ctx, data->ssl.conn, 973 if (in_decrypted == NULL) { 981 in_decrypted); 983 if (eap_ttls_avp_parse(in_decrypted, &parse) < 0) { 985 wpabuf_free(in_decrypted); 1054 wpabuf_free(in_decrypted);
|
H A D | eap_server_fast.c | 1378 struct wpabuf *in_decrypted; local 1393 in_decrypted = tls_connection_decrypt(sm->ssl_ctx, data->ssl.conn, 1395 if (in_decrypted == NULL) { 1403 in_decrypted); 1405 eap_fast_process_phase2_tlvs(sm, data, in_decrypted); 1411 data->pending_phase2_resp = in_decrypted; 1415 wpabuf_free(in_decrypted);
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_peap.c | 999 struct wpabuf *in_decrypted; local 1016 in_decrypted = tls_connection_decrypt(sm->ssl_ctx, data->ssl.conn, 1018 if (in_decrypted == NULL) { 1026 in_decrypted); 1033 wpabuf_len(in_decrypted)); 1035 wpabuf_free(in_decrypted); 1044 wpabuf_len(in_decrypted)); 1045 wpabuf_put_buf(nbuf, in_decrypted); 1046 wpabuf_free(in_decrypted); 1048 in_decrypted [all...] |
H A D | eap_server_ttls.c | 954 struct wpabuf *in_decrypted; local 971 in_decrypted = tls_connection_decrypt(sm->ssl_ctx, data->ssl.conn, 973 if (in_decrypted == NULL) { 981 in_decrypted); 983 if (eap_ttls_avp_parse(in_decrypted, &parse) < 0) { 985 wpabuf_free(in_decrypted); 1054 wpabuf_free(in_decrypted);
|
H A D | eap_server_fast.c | 1378 struct wpabuf *in_decrypted; local 1393 in_decrypted = tls_connection_decrypt(sm->ssl_ctx, data->ssl.conn, 1395 if (in_decrypted == NULL) { 1403 in_decrypted); 1405 eap_fast_process_phase2_tlvs(sm, data, in_decrypted); 1411 data->pending_phase2_resp = in_decrypted; 1415 wpabuf_free(in_decrypted);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_peap.c | 999 struct wpabuf *in_decrypted; local 1016 in_decrypted = tls_connection_decrypt(sm->ssl_ctx, data->ssl.conn, 1018 if (in_decrypted == NULL) { 1026 in_decrypted); 1033 wpabuf_len(in_decrypted)); 1035 wpabuf_free(in_decrypted); 1044 wpabuf_len(in_decrypted)); 1045 wpabuf_put_buf(nbuf, in_decrypted); 1046 wpabuf_free(in_decrypted); 1048 in_decrypted [all...] |
H A D | eap_server_ttls.c | 954 struct wpabuf *in_decrypted; local 971 in_decrypted = tls_connection_decrypt(sm->ssl_ctx, data->ssl.conn, 973 if (in_decrypted == NULL) { 981 in_decrypted); 983 if (eap_ttls_avp_parse(in_decrypted, &parse) < 0) { 985 wpabuf_free(in_decrypted); 1054 wpabuf_free(in_decrypted);
|
H A D | eap_server_fast.c | 1378 struct wpabuf *in_decrypted; local 1393 in_decrypted = tls_connection_decrypt(sm->ssl_ctx, data->ssl.conn, 1395 if (in_decrypted == NULL) { 1403 in_decrypted); 1405 eap_fast_process_phase2_tlvs(sm, data, in_decrypted); 1411 data->pending_phase2_resp = in_decrypted; 1415 wpabuf_free(in_decrypted);
|