HomeSort by relevance Sort by last modified time
    Searched full:clientkeyexchange (Results 1 - 11 of 11) sorted by null

  /external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/
ClientKeyExchangeTest.java 27 * Tests for <code>ClientKeyExchange</code> constructor and methods
33 * Test for void ClientKeyExchange(byte[], boolean)
42 ClientKeyExchange message = new ClientKeyExchange(
47 assertTrue("incorrect ClientKeyExchange", Arrays.equals(
58 ClientKeyExchange message_2 = new ClientKeyExchange(in, message
68 message_2 = new ClientKeyExchange(in, message.length() - 1,
82 message_2 = new ClientKeyExchange(in, message.length() + 3,
96 * Test for void ClientKeyExchange(BigInteger
    [all...]
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
ClientKeyExchange.java 31 public class ClientKeyExchange extends Message {
53 public ClientKeyExchange(byte[] encrypted_pre_master_secret, boolean isTLS) {
67 public ClientKeyExchange(BigInteger dh_Yc) {
83 public ClientKeyExchange() {
96 public ClientKeyExchange(HandshakeIODataStream in, int length, boolean isTLS, boolean isRSA)
115 fatalAlert(AlertProtocol.DECODE_ERROR, "DECODE ERROR: incorrect ClientKeyExchange");
ServerHandshakeImpl.java 159 || clientKeyExchange == null
161 || clientKeyExchange.isEmpty() //client certificate
195 || clientKeyExchange != null
202 clientKeyExchange = new ClientKeyExchange(io_stream,
209 preMasterSecret = c.unwrap(clientKeyExchange.exchange_keys,
227 clientKeyExchange = new ClientKeyExchange(io_stream,
230 if (clientKeyExchange.isEmpty()) {
243 clientKeyExchange.exchange_keys)
    [all...]
ClientHandshakeImpl.java 434 clientKeyExchange = new ClientKeyExchange(c
478 clientKeyExchange = new ClientKeyExchange(); // empty
482 clientKeyExchange = new ClientKeyExchange(
495 if (clientKeyExchange != null) {
496 send(clientKeyExchange);
503 if (clientCert != null && !clientKeyExchange.isEmpty()) {
HandshakeProtocol.java 108 protected ClientKeyExchange clientKeyExchange;
493 clientKeyExchange = null;
  /external/wpa_supplicant_8/src/tls/
tlsv1_server_read.c 334 "ClientKeyExchange)", type);
497 wpa_printf(MSG_DEBUG, "TLSv1: Invalid ClientKeyExchange "
549 "ClientKeyExchange does not match with version in "
709 wpa_printf(MSG_DEBUG, "TLSv1: Too short ClientKeyExchange "
722 wpa_printf(MSG_DEBUG, "TLSv1: Mismatch in ClientKeyExchange "
734 "message %d (expected ClientKeyExchange)", type);
740 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientKeyExchange");
742 wpa_hexdump(MSG_DEBUG, "TLSv1: ClientKeyExchange", pos, len);
tlsv1_client_write.c 387 wpa_printf(MSG_DEBUG, "TLSv1: Send ClientKeyExchange");
401 /* body - ClientKeyExchange */
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_server_read.c 324 "ClientKeyExchange)", type);
531 "ClientKeyExchange does not match with version in "
695 wpa_printf(MSG_DEBUG, "TLSv1: Too short ClientKeyExchange "
708 wpa_printf(MSG_DEBUG, "TLSv1: Mismatch in ClientKeyExchange "
720 "message %d (expected ClientKeyExchange)", type);
726 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientKeyExchange");
728 wpa_hexdump(MSG_DEBUG, "TLSv1: ClientKeyExchange", pos, len);
tlsv1_client_write.c 394 wpa_printf(MSG_DEBUG, "TLSv1: Send ClientKeyExchange");
408 /* body - ClientKeyExchange */
  /external/openssl/apps/
s_cb.c 601 str_details1 = ", ClientKeyExchange";
  /external/openssl/ssl/
s3_srvr.c     [all...]

Completed in 387 milliseconds