/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_record.h | 32 u16 tls_version; member in struct:tlsv1_record_layer
|
H A D | tlsv1_server_write.c | 85 WPA_PUT_BE16(pos, conn->rl.tls_version); 443 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 446 conn->rl.tls_version, conn->client_random, 494 conn->rl.tls_version, conn->client_random, 719 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 760 if (tls_prf(conn->rl.tls_version, 922 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version :
|
H A D | tlsv1_client_read.c | 36 u16 tls_version; local 78 tls_version = WPA_GET_BE16(pos); 79 if (!tls_version_ok(tls_version)) { 89 tls_version_str(tls_version)); 90 conn->rl.tls_version = tls_version; 513 if (conn->rl.tls_version == TLS_VERSION_1_2) { 536 conn->rl.tls_version, conn->client_random, 544 conn->rl.tls_version, conn->client_random, 554 if (tls_verify_signature(conn->rl.tls_version, [all...] |
H A D | tlsv1_common.h | 260 int tlsv12_key_x_server_params_hash(u16 tls_version, const u8 *client_random, 264 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, 268 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
|
H A D | tlsv1_client.c | 64 if (tls_prf(conn->rl.tls_version, 79 if (conn->rl.tls_version == TLS_VERSION_1) 81 if (tls_prf(conn->rl.tls_version, 107 if (conn->rl.tls_version == TLS_VERSION_1) { 476 conn->rl.tls_version = TLS_VERSION; 540 return tls_prf(conn->rl.tls_version,
|
H A D | tlsv1_client_write.c | 474 if (conn->rl.tls_version == TLS_VERSION_1_2) { 539 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 647 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 688 if (tls_prf(conn->rl.tls_version, 842 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version :
|
H A D | tlsv1_record.c | 167 WPA_PUT_BE16(pos, rl->tls_version); 176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1; 378 if (rl->tls_version >= TLS_VERSION_1_1) {
|
H A D | tlsv1_common.c | 338 int tlsv12_key_x_server_params_hash(u16 tls_version, argument 362 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, argument 398 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, argument 450 if (tls_version >= TLS_VERSION_1_2) {
|
H A D | tlsv1_server_read.c | 114 conn->rl.tls_version = TLS_VERSION_1; 117 conn->rl.tls_version = TLS_VERSION_1_2; 120 conn->rl.tls_version = TLS_VERSION_1_1; 122 conn->rl.tls_version = conn->client_version; 124 tls_version_str(conn->rl.tls_version)); 845 if (conn->rl.tls_version == TLS_VERSION_1_2) { 916 if (tls_verify_signature(conn->rl.tls_version, conn->client_rsa_key, 1079 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 1120 if (tls_prf(conn->rl.tls_version,
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_record.h | 32 u16 tls_version; member in struct:tlsv1_record_layer
|
H A D | tlsv1_server_write.c | 85 WPA_PUT_BE16(pos, conn->rl.tls_version); 443 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 446 conn->rl.tls_version, conn->client_random, 494 conn->rl.tls_version, conn->client_random, 719 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 760 if (tls_prf(conn->rl.tls_version, 922 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version :
|
H A D | tlsv1_client_read.c | 36 u16 tls_version; local 78 tls_version = WPA_GET_BE16(pos); 79 if (!tls_version_ok(tls_version)) { 89 tls_version_str(tls_version)); 90 conn->rl.tls_version = tls_version; 513 if (conn->rl.tls_version == TLS_VERSION_1_2) { 536 conn->rl.tls_version, conn->client_random, 544 conn->rl.tls_version, conn->client_random, 554 if (tls_verify_signature(conn->rl.tls_version, [all...] |
H A D | tlsv1_common.h | 260 int tlsv12_key_x_server_params_hash(u16 tls_version, const u8 *client_random, 264 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, 268 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
|
H A D | tlsv1_client.c | 64 if (tls_prf(conn->rl.tls_version, 79 if (conn->rl.tls_version == TLS_VERSION_1) 81 if (tls_prf(conn->rl.tls_version, 107 if (conn->rl.tls_version == TLS_VERSION_1) { 476 conn->rl.tls_version = TLS_VERSION; 540 return tls_prf(conn->rl.tls_version,
|
H A D | tlsv1_client_write.c | 474 if (conn->rl.tls_version == TLS_VERSION_1_2) { 539 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 647 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 688 if (tls_prf(conn->rl.tls_version, 842 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version :
|
H A D | tlsv1_record.c | 167 WPA_PUT_BE16(pos, rl->tls_version); 176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1; 378 if (rl->tls_version >= TLS_VERSION_1_1) {
|
H A D | tlsv1_common.c | 338 int tlsv12_key_x_server_params_hash(u16 tls_version, argument 362 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, argument 398 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, argument 450 if (tls_version >= TLS_VERSION_1_2) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_record.h | 32 u16 tls_version; member in struct:tlsv1_record_layer
|
H A D | tlsv1_server_write.c | 85 WPA_PUT_BE16(pos, conn->rl.tls_version); 443 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 446 conn->rl.tls_version, conn->client_random, 494 conn->rl.tls_version, conn->client_random, 719 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 760 if (tls_prf(conn->rl.tls_version, 922 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version :
|
H A D | tlsv1_client_read.c | 36 u16 tls_version; local 78 tls_version = WPA_GET_BE16(pos); 79 if (!tls_version_ok(tls_version)) { 89 tls_version_str(tls_version)); 90 conn->rl.tls_version = tls_version; 513 if (conn->rl.tls_version == TLS_VERSION_1_2) { 536 conn->rl.tls_version, conn->client_random, 544 conn->rl.tls_version, conn->client_random, 554 if (tls_verify_signature(conn->rl.tls_version, [all...] |
H A D | tlsv1_common.h | 260 int tlsv12_key_x_server_params_hash(u16 tls_version, const u8 *client_random, 264 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, 268 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
|
H A D | tlsv1_client.c | 64 if (tls_prf(conn->rl.tls_version, 79 if (conn->rl.tls_version == TLS_VERSION_1) 81 if (tls_prf(conn->rl.tls_version, 107 if (conn->rl.tls_version == TLS_VERSION_1) { 476 conn->rl.tls_version = TLS_VERSION; 540 return tls_prf(conn->rl.tls_version,
|
H A D | tlsv1_client_write.c | 474 if (conn->rl.tls_version == TLS_VERSION_1_2) { 539 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 647 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 688 if (tls_prf(conn->rl.tls_version, 842 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version :
|
H A D | tlsv1_record.c | 167 WPA_PUT_BE16(pos, rl->tls_version); 176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1; 378 if (rl->tls_version >= TLS_VERSION_1_1) {
|
H A D | tlsv1_common.c | 338 int tlsv12_key_x_server_params_hash(u16 tls_version, argument 362 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, argument 398 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, argument 450 if (tls_version >= TLS_VERSION_1_2) {
|