| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_tls_common.c | 110 wpabuf_free(data->tls_out); 111 data->tls_out = NULL; 208 if (data->tls_out == NULL) { 209 wpa_printf(MSG_ERROR, "SSL: tls_out NULL in %s", __func__); 214 send_len = wpabuf_len(data->tls_out) - data->tls_out_pos; 234 wpabuf_put_be32(req, wpabuf_len(data->tls_out)); 236 wpabuf_put_data(req, wpabuf_head_u8(data->tls_out) + data->tls_out_pos, 240 if (data->tls_out_pos == wpabuf_len(data->tls_out)) { 244 wpabuf_free(data->tls_out); 245 data->tls_out = NULL [all...] |
| eap_tls_common.h | 22 * tls_out - TLS message to be sent out in fragments 24 struct wpabuf *tls_out; member in struct:eap_ssl_data
|
| eap_server_peap.c | 521 wpabuf_free(data->ssl.tls_out); 526 if (wpabuf_resize(&data->ssl.tls_out, wpabuf_len(encr_req)) < 0) { 532 wpabuf_put_buf(data->ssl.tls_out, encr_req); 537 return data->ssl.tls_out; 565 if (data->ssl.tls_v13 && data->ssl.tls_out && 566 wpabuf_len(data->ssl.tls_out) == 0) { 583 wpabuf_free(data->ssl.tls_out); 585 data->ssl.tls_out = eap_peap_build_phase2_req(sm, data, id); 589 wpabuf_free(data->ssl.tls_out); 591 data->ssl.tls_out = eap_peap_build_phase2_soh(sm, data, id) [all...] |
| eap_server_fast.c | 821 if (data->ssl.tls_out && piggyback) { 826 (int) wpabuf_len(data->ssl.tls_out), 828 if (wpabuf_resize(&data->ssl.tls_out, wpabuf_len(encr)) < 0) { 834 wpabuf_put_buf(data->ssl.tls_out, encr); 837 wpabuf_free(data->ssl.tls_out); 839 data->ssl.tls_out = encr; 1465 wpabuf_len(data->ssl.tls_out) > 0)
|
| eap_server_tls.c | 310 if (data->ssl.tls_v13 && data->ssl.tls_out) { 313 data->ssl.tls_out);
|
| eap_server_teap.c | 869 if (data->ssl.tls_out && piggyback) { 873 (int) wpabuf_len(data->ssl.tls_out), 875 if (wpabuf_resize(&data->ssl.tls_out, wpabuf_len(encr)) < 0) { 881 wpabuf_put_buf(data->ssl.tls_out, encr); 884 wpabuf_free(data->ssl.tls_out); 886 data->ssl.tls_out = encr; 1793 wpabuf_len(data->ssl.tls_out) > 0)
|
| eap_server_ttls.c | 492 wpabuf_free(data->ssl.tls_out); 494 data->ssl.tls_out = eap_ttls_build_phase2_eap_req(sm, data, 498 wpabuf_free(data->ssl.tls_out); 500 data->ssl.tls_out = eap_ttls_build_phase2_mschapv2(sm, data);
|
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_tls_common.c | 595 if (data->tls_out) { 598 "tls_out data even though tls_out_len = 0"); 599 wpabuf_free(data->tls_out); 600 WPA_ASSERT(data->tls_out == NULL); 603 data->tls_out = tls_connection_handshake(data->ssl_ctx, data->conn, 642 if (data->tls_out == NULL) 644 len = wpabuf_len(data->tls_out) - data->tls_out_pos; 648 (unsigned long) wpabuf_len(data->tls_out)); 663 (wpabuf_len(data->tls_out) > data->tls_out_limit || 688 wpabuf_put_be32(*out_data, wpabuf_len(data->tls_out)); [all...] |
| eap_tls_common.h | 22 * tls_out - TLS message to be sent out in fragments 24 struct wpabuf *tls_out; member in struct:eap_ssl_data
|
| eap_tls.c | 190 if (data->ssl.tls_out) {
|
| eap_teap.c | 1529 if (res == 0 && !data->ssl.tls_out &&
|
| eap_ttls.c | 1660 !data->ssl.tls_out) {
|
| /src/crypto/external/apache2/openssl/dist/test/certs/ |
| mkcert.sh | 399 --tls_out ${cert}.tlssct
|
| /src/crypto/external/bsd/openssl/dist/test/certs/ |
| mkcert.sh | 396 --tls_out ${cert}.tlssct
|