/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_cred.h | 24 u8 *dh_p; /* prime */ member in struct:tlsv1_credentials
|
tlsv1_cred.c | 40 os_free(cred->dh_p); 309 os_free(cred->dh_p); 310 cred->dh_p = os_malloc(hdr.length); 311 if (cred->dh_p == NULL) 313 os_memcpy(cred->dh_p, hdr.payload, hdr.length);
|
tlsv1_client_i.h | 57 u8 *dh_p; member in struct:tlsv1_client
|
tlsv1_server_write.c | 276 if (conn->cred == NULL || conn->cred->dh_p == NULL || 303 if (os_memcmp(conn->dh_secret, conn->cred->dh_p, conn->dh_secret_len) > 330 conn->cred->dh_p, conn->cred->dh_p_len, 354 * opaque dh_p<1..2^16-1>; 377 /* dh_p */ 380 "dh_p"); 388 os_memcpy(pos, conn->cred->dh_p, conn->cred->dh_p_len);
|
tlsv1_client_write.c | 235 if (os_memcmp(csecret, conn->dh_p, csecret_len) > 0) 259 conn->dh_p, conn->dh_p_len, 300 conn->dh_p, conn->dh_p_len,
|
tlsv1_client.c | 39 os_free(conn->dh_p); 42 conn->dh_p = conn->dh_g = conn->dh_ys = NULL;
|
tlsv1_client_read.c | 425 wpa_printf(MSG_DEBUG, "TLSv1: Invalid dh_p length %lu", 429 conn->dh_p = os_malloc(conn->dh_p_len); 430 if (conn->dh_p == NULL) 432 os_memcpy(conn->dh_p, pos, conn->dh_p_len); 435 conn->dh_p, conn->dh_p_len);
|
tlsv1_server_read.c | 619 if (conn->cred == NULL || conn->cred->dh_p == NULL || 640 conn->cred->dh_p, conn->cred->dh_p_len,
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_cred.h | 24 u8 *dh_p; /* prime */ member in struct:tlsv1_credentials
|
tlsv1_client_i.h | 58 u8 *dh_p; member in struct:tlsv1_client
|
tlsv1_cred.c | 40 os_free(cred->dh_p); 380 os_free(cred->dh_p); 381 cred->dh_p = os_malloc(hdr.length); 382 if (cred->dh_p == NULL) 384 os_memcpy(cred->dh_p, hdr.payload, hdr.length);
|
tlsv1_server_write.c | 274 if (conn->cred == NULL || conn->cred->dh_p == NULL || 301 if (os_memcmp(conn->dh_secret, conn->cred->dh_p, conn->dh_secret_len) > 328 conn->cred->dh_p, conn->cred->dh_p_len, 352 * opaque dh_p<1..2^16-1>; 375 /* dh_p */ 378 "dh_p"); 386 os_memcpy(pos, conn->cred->dh_p, conn->cred->dh_p_len);
|
tlsv1_client_write.c | 235 if (os_memcmp(csecret, conn->dh_p, csecret_len) > 0) 259 conn->dh_p, conn->dh_p_len, 300 conn->dh_p, conn->dh_p_len,
|
tlsv1_client.c | 39 os_free(conn->dh_p); 42 conn->dh_p = conn->dh_g = conn->dh_ys = NULL;
|
tlsv1_client_read.c | 426 wpa_printf(MSG_DEBUG, "TLSv1: Invalid dh_p length %lu", 430 conn->dh_p = os_malloc(conn->dh_p_len); 431 if (conn->dh_p == NULL) 433 os_memcpy(conn->dh_p, pos, conn->dh_p_len); 436 conn->dh_p, conn->dh_p_len);
|
tlsv1_server_read.c | 618 if (conn->cred == NULL || conn->cred->dh_p == NULL || 639 conn->cred->dh_p, conn->cred->dh_p_len,
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
ServerKeyExchangeTest.java | 88 BigInteger dh_p = new BigInteger("1234567890"); local 93 ServerKeyExchange message = new ServerKeyExchange(dh_p, dh_g, dh_Ys, 100 assertEquals("incorrect ServerKeyExchange", dh_p, message.par1); 140 BigInteger dh_p = new BigInteger("1234567890"); local 143 ServerKeyExchange message = new ServerKeyExchange(dh_p, dh_g, dh_Ys, 149 assertEquals("incorrect ServerKeyExchange", dh_p, message.par1);
|
/external/dropbear/ |
common-kex.c | 476 DEF_MP_INT(dh_p); 482 m_mp_init_multi(&dh_g, &dh_p, &dh_q, NULL); 485 bytes_to_mp(&dh_p, (unsigned char*)dh_p_val, DH_P_LEN); 493 if (mp_sub_d(&dh_p, 1, dh_priv) != MP_OKAY) { 504 if (mp_exptmod(&dh_g, dh_priv, &dh_p, dh_pub) != MP_OKAY) { 507 mp_clear_multi(&dh_g, &dh_p, &dh_q, NULL); 517 mp_int dh_p; local 522 m_mp_init(&dh_p); 523 bytes_to_mp(&dh_p, dh_p_val, DH_P_LEN); 526 if (mp_cmp(dh_pub_them, &dh_p) != MP_LT [all...] |
/external/wpa_supplicant/ |
tlsv1_client.c | 75 u8 *dh_p; member in struct:tlsv1_client 627 os_free(conn->dh_p); 630 conn->dh_p = conn->dh_g = conn->dh_ys = NULL; 650 conn->dh_p = os_malloc(conn->dh_p_len); 651 if (conn->dh_p == NULL) 653 os_memcpy(conn->dh_p, pos, conn->dh_p_len); 656 conn->dh_p, conn->dh_p_len); [all...] |