Searched refs:dh_p (Results 1 - 25 of 34) sorted by relevance

12

/external/wpa_supplicant_6/wpa_supplicant/src/tls/
H A Dtlsv1_cred.h24 u8 *dh_p; /* prime */ member in struct:tlsv1_credentials
H A Dtlsv1_cred.c40 os_free(cred->dh_p);
309 os_free(cred->dh_p);
310 cred->dh_p = os_malloc(hdr.length);
311 if (cred->dh_p == NULL)
313 os_memcpy(cred->dh_p, hdr.payload, hdr.length);
H A Dtlsv1_client_i.h57 u8 *dh_p; member in struct:tlsv1_client
H A Dtlsv1_server_write.c276 if (conn->cred == NULL || conn->cred->dh_p == NULL ||
303 if (os_memcmp(conn->dh_secret, conn->cred->dh_p, conn->dh_secret_len) >
330 conn->cred->dh_p, conn->cred->dh_p_len,
354 * opaque dh_p<1..2^16-1>;
377 /* dh_p */
380 "dh_p");
388 os_memcpy(pos, conn->cred->dh_p, conn->cred->dh_p_len);
H A Dtlsv1_client_write.c235 if (os_memcmp(csecret, conn->dh_p, csecret_len) > 0)
259 conn->dh_p, conn->dh_p_len,
300 conn->dh_p, conn->dh_p_len,
H A Dtlsv1_client.c39 os_free(conn->dh_p);
42 conn->dh_p = conn->dh_g = conn->dh_ys = NULL;
H A Dtlsv1_client_read.c425 wpa_printf(MSG_DEBUG, "TLSv1: Invalid dh_p length %lu",
429 conn->dh_p = os_malloc(conn->dh_p_len);
430 if (conn->dh_p == NULL)
432 os_memcpy(conn->dh_p, pos, conn->dh_p_len);
435 conn->dh_p, conn->dh_p_len);
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_cred.h18 u8 *dh_p; /* prime */ member in struct:tlsv1_credentials
H A Dtlsv1_client_i.h52 u8 *dh_p; member in struct:tlsv1_client
H A Dtlsv1_cred.c34 os_free(cred->dh_p);
393 os_free(cred->dh_p);
394 cred->dh_p = os_malloc(hdr.length);
395 if (cred->dh_p == NULL)
397 os_memcpy(cred->dh_p, hdr.payload, hdr.length);
H A Dtlsv1_server_write.c271 if (conn->cred == NULL || conn->cred->dh_p == NULL ||
298 if (os_memcmp(conn->dh_secret, conn->cred->dh_p, conn->dh_secret_len) >
325 conn->cred->dh_p, conn->cred->dh_p_len,
349 * opaque dh_p<1..2^16-1>;
372 /* dh_p */
375 "dh_p");
383 os_memcpy(pos, conn->cred->dh_p, conn->cred->dh_p_len);
H A Dtlsv1_client_write.c232 if (os_memcmp(csecret, conn->dh_p, csecret_len) > 0)
256 conn->dh_p, conn->dh_p_len,
297 conn->dh_p, conn->dh_p_len,
H A Dtlsv1_client_read.c427 wpa_printf(MSG_DEBUG, "TLSv1: Invalid dh_p length %lu",
431 conn->dh_p = os_malloc(conn->dh_p_len);
432 if (conn->dh_p == NULL)
434 os_memcpy(conn->dh_p, pos, conn->dh_p_len);
437 conn->dh_p, conn->dh_p_len);
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_cred.h18 u8 *dh_p; /* prime */ member in struct:tlsv1_credentials
H A Dtlsv1_client_i.h52 u8 *dh_p; member in struct:tlsv1_client
H A Dtlsv1_cred.c34 os_free(cred->dh_p);
393 os_free(cred->dh_p);
394 cred->dh_p = os_malloc(hdr.length);
395 if (cred->dh_p == NULL)
397 os_memcpy(cred->dh_p, hdr.payload, hdr.length);
H A Dtlsv1_server_write.c271 if (conn->cred == NULL || conn->cred->dh_p == NULL ||
298 if (os_memcmp(conn->dh_secret, conn->cred->dh_p, conn->dh_secret_len) >
325 conn->cred->dh_p, conn->cred->dh_p_len,
349 * opaque dh_p<1..2^16-1>;
372 /* dh_p */
375 "dh_p");
383 os_memcpy(pos, conn->cred->dh_p, conn->cred->dh_p_len);
H A Dtlsv1_client_write.c232 if (os_memcmp(csecret, conn->dh_p, csecret_len) > 0)
256 conn->dh_p, conn->dh_p_len,
297 conn->dh_p, conn->dh_p_len,
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_cred.h18 u8 *dh_p; /* prime */ member in struct:tlsv1_credentials
H A Dtlsv1_client_i.h52 u8 *dh_p; member in struct:tlsv1_client
H A Dtlsv1_cred.c34 os_free(cred->dh_p);
393 os_free(cred->dh_p);
394 cred->dh_p = os_malloc(hdr.length);
395 if (cred->dh_p == NULL)
397 os_memcpy(cred->dh_p, hdr.payload, hdr.length);
H A Dtlsv1_server_write.c271 if (conn->cred == NULL || conn->cred->dh_p == NULL ||
298 if (os_memcmp(conn->dh_secret, conn->cred->dh_p, conn->dh_secret_len) >
325 conn->cred->dh_p, conn->cred->dh_p_len,
349 * opaque dh_p<1..2^16-1>;
372 /* dh_p */
375 "dh_p");
383 os_memcpy(pos, conn->cred->dh_p, conn->cred->dh_p_len);
H A Dtlsv1_client_write.c232 if (os_memcmp(csecret, conn->dh_p, csecret_len) > 0)
256 conn->dh_p, conn->dh_p_len,
297 conn->dh_p, conn->dh_p_len,
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/
H A DServerKeyExchangeTest.java88 BigInteger dh_p = new BigInteger("1234567890");
93 ServerKeyExchange message = new ServerKeyExchange(dh_p, dh_g, dh_Ys,
100 assertEquals("incorrect ServerKeyExchange", dh_p, message.par1);
140 BigInteger dh_p = new BigInteger("1234567890");
143 ServerKeyExchange message = new ServerKeyExchange(dh_p, dh_g, dh_Ys,
149 assertEquals("incorrect ServerKeyExchange", dh_p, message.par1);
/external/dropbear/
H A Dcommon-kex.c476 DEF_MP_INT(dh_p);
482 m_mp_init_multi(&dh_g, &dh_p, &dh_q, NULL);
485 bytes_to_mp(&dh_p, (unsigned char*)dh_p_val, DH_P_LEN);
493 if (mp_sub_d(&dh_p, 1, dh_priv) != MP_OKAY) {
504 if (mp_exptmod(&dh_g, dh_priv, &dh_p, dh_pub) != MP_OKAY) {
507 mp_clear_multi(&dh_g, &dh_p, &dh_q, NULL);
517 mp_int dh_p; local
522 m_mp_init(&dh_p);
523 bytes_to_mp(&dh_p, dh_p_val, DH_P_LEN);
526 if (mp_cmp(dh_pub_them, &dh_p) !
[all...]

Completed in 546 milliseconds

12