/external/wpa_supplicant_8/src/tls/ |
tlsv1_cred.h | 23 u8 *dh_p; /* prime */ member in struct:tlsv1_credentials
|
tlsv1_client_i.h | 55 u8 *dh_p; member in struct:tlsv1_client
|
tlsv1_server_i.h | 84 void tlsv1_server_get_dh_p(struct tlsv1_server *conn, const u8 **dh_p,
|
tlsv1_server.c | 793 void tlsv1_server_get_dh_p(struct tlsv1_server *conn, const u8 **dh_p, 796 *dh_p = conn->cred->dh_p; 802 *dh_p = test_tls_prime511b; 806 *dh_p = test_tls_prime767b; 810 *dh_p = test_tls_prime15; 814 *dh_p = test_tls_prime58; 818 *dh_p = test_tls_non_prime;
|
tlsv1_server_write.c | 374 const u8 *dh_p; local 394 if (conn->cred == NULL || conn->cred->dh_p == NULL || 401 tlsv1_server_get_dh_p(conn, &dh_p, &dh_p_len); 423 if (os_memcmp(conn->dh_secret, dh_p, conn->dh_secret_len) > 0) 449 dh_p, dh_p_len, dh_ys, &dh_ys_len)) { 472 * opaque dh_p<1..2^16-1>; 496 /* dh_p */ 499 "dh_p"); 507 os_memcpy(pos, dh_p, dh_p_len);
|
tlsv1_cred.c | 37 os_free(cred->dh_p); 1168 os_free(cred->dh_p); 1169 cred->dh_p = os_malloc(hdr.length); 1170 if (cred->dh_p == NULL) 1172 os_memcpy(cred->dh_p, hdr.payload, hdr.length); [all...] |
tlsv1_server_read.c | 681 const u8 *dh_p; local 726 if (conn->cred == NULL || conn->cred->dh_p == NULL || 734 tlsv1_server_get_dh_p(conn, &dh_p, &dh_p_len); 748 conn->dh_secret_len, dh_p, dh_p_len, [all...] |
tlsv1_client.c | 34 os_free(conn->dh_p); 37 conn->dh_p = conn->dh_g = conn->dh_ys = NULL;
|
tlsv1_client_read.c | 676 wpa_printf(MSG_DEBUG, "TLSv1: Invalid dh_p length %u", val); 688 conn->dh_p = os_malloc(conn->dh_p_len); 689 if (conn->dh_p == NULL) 691 os_memcpy(conn->dh_p, pos, conn->dh_p_len); 694 conn->dh_p, conn->dh_p_len); [all...] |
tlsv1_client_write.c | 369 if (os_memcmp(csecret, conn->dh_p, csecret_len) > 0) 393 conn->dh_p, conn->dh_p_len, 441 conn->dh_p, conn->dh_p_len,
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
ServerKeyExchangeTest.java | 87 BigInteger dh_p = new BigInteger("1234567890"); local 92 ServerKeyExchange message = new ServerKeyExchange(dh_p, dh_g, dh_Ys, 99 assertEquals("incorrect ServerKeyExchange", dh_p, message.par1); 139 BigInteger dh_p = new BigInteger("1234567890"); local 142 ServerKeyExchange message = new ServerKeyExchange(dh_p, dh_g, dh_Ys, 148 assertEquals("incorrect ServerKeyExchange", dh_p, message.par1);
|
/libcore/ojluni/src/main/java/sun/security/ssl/ |
HandshakeMessage.java | 687 private byte dh_p []; // 1 to 2^16 - 1 bytes field in class:HandshakeMessage.DH_ServerKeyExchange 757 dh_p = input.getBytes16(); 761 new BigInteger(1, dh_p), 781 dh_p = input.getBytes16(); 785 new BigInteger(1, dh_p), 812 messageSize -= (dh_p.length + 2); 845 return new BigInteger(1, dh_p); 868 tmp = dh_p.length; 871 sig.update(dh_p); 885 dh_p = toByteArray(obj.getModulus()) [all...] |
/external/boringssl/src/ssl/ |
s3_clnt.c | 1141 CBS dh_p, dh_g, dh_Ys; local [all...] |