HomeSort by relevance Sort by last modified time
    Searched refs:dh_p (Results 1 - 19 of 19) sorted by null

  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_cred.h 24 u8 *dh_p; /* prime */ member in struct:tlsv1_credentials
tlsv1_cred.c 40 os_free(cred->dh_p);
309 os_free(cred->dh_p);
310 cred->dh_p = os_malloc(hdr.length);
311 if (cred->dh_p == NULL)
313 os_memcpy(cred->dh_p, hdr.payload, hdr.length);
tlsv1_client_i.h 57 u8 *dh_p; member in struct:tlsv1_client
tlsv1_server_write.c 276 if (conn->cred == NULL || conn->cred->dh_p == NULL ||
303 if (os_memcmp(conn->dh_secret, conn->cred->dh_p, conn->dh_secret_len) >
330 conn->cred->dh_p, conn->cred->dh_p_len,
354 * opaque dh_p<1..2^16-1>;
377 /* dh_p */
380 "dh_p");
388 os_memcpy(pos, conn->cred->dh_p, conn->cred->dh_p_len);
tlsv1_client_write.c 235 if (os_memcmp(csecret, conn->dh_p, csecret_len) > 0)
259 conn->dh_p, conn->dh_p_len,
300 conn->dh_p, conn->dh_p_len,
tlsv1_client.c 39 os_free(conn->dh_p);
42 conn->dh_p = conn->dh_g = conn->dh_ys = NULL;
tlsv1_client_read.c 425 wpa_printf(MSG_DEBUG, "TLSv1: Invalid dh_p length %lu",
429 conn->dh_p = os_malloc(conn->dh_p_len);
430 if (conn->dh_p == NULL)
432 os_memcpy(conn->dh_p, pos, conn->dh_p_len);
435 conn->dh_p, conn->dh_p_len);
tlsv1_server_read.c 619 if (conn->cred == NULL || conn->cred->dh_p == NULL ||
640 conn->cred->dh_p, conn->cred->dh_p_len,
  /external/wpa_supplicant_8/src/tls/
tlsv1_cred.h 24 u8 *dh_p; /* prime */ member in struct:tlsv1_credentials
tlsv1_client_i.h 58 u8 *dh_p; member in struct:tlsv1_client
tlsv1_cred.c 40 os_free(cred->dh_p);
380 os_free(cred->dh_p);
381 cred->dh_p = os_malloc(hdr.length);
382 if (cred->dh_p == NULL)
384 os_memcpy(cred->dh_p, hdr.payload, hdr.length);
tlsv1_server_write.c 274 if (conn->cred == NULL || conn->cred->dh_p == NULL ||
301 if (os_memcmp(conn->dh_secret, conn->cred->dh_p, conn->dh_secret_len) >
328 conn->cred->dh_p, conn->cred->dh_p_len,
352 * opaque dh_p<1..2^16-1>;
375 /* dh_p */
378 "dh_p");
386 os_memcpy(pos, conn->cred->dh_p, conn->cred->dh_p_len);
tlsv1_client_write.c 235 if (os_memcmp(csecret, conn->dh_p, csecret_len) > 0)
259 conn->dh_p, conn->dh_p_len,
300 conn->dh_p, conn->dh_p_len,
tlsv1_client.c 39 os_free(conn->dh_p);
42 conn->dh_p = conn->dh_g = conn->dh_ys = NULL;
tlsv1_client_read.c 426 wpa_printf(MSG_DEBUG, "TLSv1: Invalid dh_p length %lu",
430 conn->dh_p = os_malloc(conn->dh_p_len);
431 if (conn->dh_p == NULL)
433 os_memcpy(conn->dh_p, pos, conn->dh_p_len);
436 conn->dh_p, conn->dh_p_len);
tlsv1_server_read.c 618 if (conn->cred == NULL || conn->cred->dh_p == NULL ||
639 conn->cred->dh_p, conn->cred->dh_p_len,
  /external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/
ServerKeyExchangeTest.java 88 BigInteger dh_p = new BigInteger("1234567890"); local
93 ServerKeyExchange message = new ServerKeyExchange(dh_p, dh_g, dh_Ys,
100 assertEquals("incorrect ServerKeyExchange", dh_p, message.par1);
140 BigInteger dh_p = new BigInteger("1234567890"); local
143 ServerKeyExchange message = new ServerKeyExchange(dh_p, dh_g, dh_Ys,
149 assertEquals("incorrect ServerKeyExchange", dh_p, message.par1);
  /external/dropbear/
common-kex.c 476 DEF_MP_INT(dh_p);
482 m_mp_init_multi(&dh_g, &dh_p, &dh_q, NULL);
485 bytes_to_mp(&dh_p, (unsigned char*)dh_p_val, DH_P_LEN);
493 if (mp_sub_d(&dh_p, 1, dh_priv) != MP_OKAY) {
504 if (mp_exptmod(&dh_g, dh_priv, &dh_p, dh_pub) != MP_OKAY) {
507 mp_clear_multi(&dh_g, &dh_p, &dh_q, NULL);
517 mp_int dh_p; local
522 m_mp_init(&dh_p);
523 bytes_to_mp(&dh_p, dh_p_val, DH_P_LEN);
526 if (mp_cmp(dh_pub_them, &dh_p) != MP_LT
    [all...]
  /external/wpa_supplicant/
tlsv1_client.c 75 u8 *dh_p; member in struct:tlsv1_client
627 os_free(conn->dh_p);
630 conn->dh_p = conn->dh_g = conn->dh_ys = NULL;
650 conn->dh_p = os_malloc(conn->dh_p_len);
651 if (conn->dh_p == NULL)
653 os_memcpy(conn->dh_p, pos, conn->dh_p_len);
656 conn->dh_p, conn->dh_p_len);
    [all...]

Completed in 109 milliseconds