/external/wpa_supplicant_8/src/tls/ |
tlsv1_cred.h | 23 u8 *dh_p; /* prime */ member in struct:tlsv1_credentials
|
tlsv1_client_i.h | 55 u8 *dh_p; member in struct:tlsv1_client
|
tlsv1_server_i.h | 84 void tlsv1_server_get_dh_p(struct tlsv1_server *conn, const u8 **dh_p,
|
tlsv1_server.c | 793 void tlsv1_server_get_dh_p(struct tlsv1_server *conn, const u8 **dh_p, 796 *dh_p = conn->cred->dh_p; 802 *dh_p = test_tls_prime511b; 806 *dh_p = test_tls_prime767b; 810 *dh_p = test_tls_prime15; 814 *dh_p = test_tls_prime58; 818 *dh_p = test_tls_non_prime;
|
tlsv1_server_write.c | 374 const u8 *dh_p; local 394 if (conn->cred == NULL || conn->cred->dh_p == NULL || 401 tlsv1_server_get_dh_p(conn, &dh_p, &dh_p_len); 423 if (os_memcmp(conn->dh_secret, dh_p, conn->dh_secret_len) > 0) 449 dh_p, dh_p_len, dh_ys, &dh_ys_len)) { 472 * opaque dh_p<1..2^16-1>; 496 /* dh_p */ 499 "dh_p"); 507 os_memcpy(pos, dh_p, dh_p_len);
|
tlsv1_cred.c | 37 os_free(cred->dh_p); 1168 os_free(cred->dh_p); 1169 cred->dh_p = os_malloc(hdr.length); 1170 if (cred->dh_p == NULL) 1172 os_memcpy(cred->dh_p, hdr.payload, hdr.length); [all...] |
tlsv1_server_read.c | 681 const u8 *dh_p; local 726 if (conn->cred == NULL || conn->cred->dh_p == NULL || 734 tlsv1_server_get_dh_p(conn, &dh_p, &dh_p_len); 748 conn->dh_secret_len, dh_p, dh_p_len, [all...] |
tlsv1_client.c | 34 os_free(conn->dh_p); 37 conn->dh_p = conn->dh_g = conn->dh_ys = NULL;
|
tlsv1_client_read.c | 676 wpa_printf(MSG_DEBUG, "TLSv1: Invalid dh_p length %u", val); 688 conn->dh_p = os_malloc(conn->dh_p_len); 689 if (conn->dh_p == NULL) 691 os_memcpy(conn->dh_p, pos, conn->dh_p_len); 694 conn->dh_p, conn->dh_p_len); [all...] |
tlsv1_client_write.c | 369 if (os_memcmp(csecret, conn->dh_p, csecret_len) > 0) 393 conn->dh_p, conn->dh_p_len, 441 conn->dh_p, conn->dh_p_len,
|
/external/boringssl/src/ssl/ |
handshake_client.c | 1245 CBS dh_p, dh_g, dh_Ys; local [all...] |
/external/boringssl/src/ssl/test/runner/ |
key_agreement.go | 607 // Read dh_p
|