HomeSort by relevance Sort by last modified time
    Searched refs:dh_p (Results 1 - 13 of 13) sorted by null

  /external/wpa_supplicant_8/src/tls/
tlsv1_cred.h 23 u8 *dh_p; /* prime */ member in struct:tlsv1_credentials
tlsv1_client_i.h 55 u8 *dh_p; member in struct:tlsv1_client
tlsv1_server_i.h 84 void tlsv1_server_get_dh_p(struct tlsv1_server *conn, const u8 **dh_p,
tlsv1_server.c 793 void tlsv1_server_get_dh_p(struct tlsv1_server *conn, const u8 **dh_p,
796 *dh_p = conn->cred->dh_p;
802 *dh_p = test_tls_prime511b;
806 *dh_p = test_tls_prime767b;
810 *dh_p = test_tls_prime15;
814 *dh_p = test_tls_prime58;
818 *dh_p = test_tls_non_prime;
tlsv1_server_write.c 374 const u8 *dh_p; local
394 if (conn->cred == NULL || conn->cred->dh_p == NULL ||
401 tlsv1_server_get_dh_p(conn, &dh_p, &dh_p_len);
423 if (os_memcmp(conn->dh_secret, dh_p, conn->dh_secret_len) > 0)
449 dh_p, dh_p_len, dh_ys, &dh_ys_len)) {
472 * opaque dh_p<1..2^16-1>;
496 /* dh_p */
499 "dh_p");
507 os_memcpy(pos, dh_p, dh_p_len);
tlsv1_cred.c 37 os_free(cred->dh_p);
1168 os_free(cred->dh_p);
1169 cred->dh_p = os_malloc(hdr.length);
1170 if (cred->dh_p == NULL)
1172 os_memcpy(cred->dh_p, hdr.payload, hdr.length);
    [all...]
tlsv1_server_read.c 681 const u8 *dh_p; local
726 if (conn->cred == NULL || conn->cred->dh_p == NULL ||
734 tlsv1_server_get_dh_p(conn, &dh_p, &dh_p_len);
748 conn->dh_secret_len, dh_p, dh_p_len,
    [all...]
tlsv1_client.c 34 os_free(conn->dh_p);
37 conn->dh_p = conn->dh_g = conn->dh_ys = NULL;
tlsv1_client_read.c 676 wpa_printf(MSG_DEBUG, "TLSv1: Invalid dh_p length %u", val);
688 conn->dh_p = os_malloc(conn->dh_p_len);
689 if (conn->dh_p == NULL)
691 os_memcpy(conn->dh_p, pos, conn->dh_p_len);
694 conn->dh_p, conn->dh_p_len);
    [all...]
tlsv1_client_write.c 369 if (os_memcmp(csecret, conn->dh_p, csecret_len) > 0)
393 conn->dh_p, conn->dh_p_len,
441 conn->dh_p, conn->dh_p_len,
  /external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/
ServerKeyExchangeTest.java 87 BigInteger dh_p = new BigInteger("1234567890"); local
92 ServerKeyExchange message = new ServerKeyExchange(dh_p, dh_g, dh_Ys,
99 assertEquals("incorrect ServerKeyExchange", dh_p, message.par1);
139 BigInteger dh_p = new BigInteger("1234567890"); local
142 ServerKeyExchange message = new ServerKeyExchange(dh_p, dh_g, dh_Ys,
148 assertEquals("incorrect ServerKeyExchange", dh_p, message.par1);
  /libcore/ojluni/src/main/java/sun/security/ssl/
HandshakeMessage.java 687 private byte dh_p []; // 1 to 2^16 - 1 bytes field in class:HandshakeMessage.DH_ServerKeyExchange
757 dh_p = input.getBytes16();
761 new BigInteger(1, dh_p),
781 dh_p = input.getBytes16();
785 new BigInteger(1, dh_p),
812 messageSize -= (dh_p.length + 2);
845 return new BigInteger(1, dh_p);
868 tmp = dh_p.length;
871 sig.update(dh_p);
885 dh_p = toByteArray(obj.getModulus())
    [all...]
  /external/boringssl/src/ssl/
s3_clnt.c 1141 CBS dh_p, dh_g, dh_Ys; local
    [all...]

Completed in 470 milliseconds