/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_record.h | 32 u16 tls_version; member in struct:tlsv1_record_layer
|
H A D | tlsv1_client_write.c | 51 u16 tls_version = TLS_VERSION; local 56 tls_version == TLS_VERSION_1_2) 57 tls_version = TLS_VERSION_1_1; 61 tls_version == TLS_VERSION_1_1) 62 tls_version = TLS_VERSION_1; 65 tls_version == TLS_VERSION_1) { 71 tls_version_str(tls_version)); 104 WPA_PUT_BE16(pos, tls_version); 129 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 618 if (conn->rl.tls_version [all...] |
H A D | tlsv1_common.h | 262 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_Alg, 267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, 271 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
|
H A D | tlsv1_client.c | 65 if (tls_prf(conn->rl.tls_version, 80 if (conn->rl.tls_version == TLS_VERSION_1) 82 if (tls_prf(conn->rl.tls_version, 108 if (conn->rl.tls_version == TLS_VERSION_1) { 476 conn->rl.tls_version = TLS_VERSION; 541 return tls_prf(conn->rl.tls_version, 854 switch (conn->rl.tls_version) {
|
H A D | tlsv1_client_read.c | 84 u16 tls_version; local 126 tls_version = WPA_GET_BE16(pos); 127 if (!tls_version_ok(tls_version) || 128 tls_version_disabled(conn, tls_version)) { 138 tls_version_str(tls_version)); 139 conn->rl.tls_version = tls_version; 733 if (conn->rl.tls_version == TLS_VERSION_1_2) { 757 conn->rl.tls_version, pos[0], 767 conn->rl.tls_version, con [all...] |
H A D | tlsv1_record.c | 167 WPA_PUT_BE16(pos, rl->tls_version); 176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1; 378 if (rl->tls_version >= TLS_VERSION_1_1) {
|
H A D | tlsv1_common.c | 338 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, argument 378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, argument 414 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, argument 466 if (tls_version >= TLS_VERSION_1_2) {
|
H A D | tlsv1_server_read.c | 186 conn->rl.tls_version = TLS_VERSION_1; 189 conn->rl.tls_version = TLS_VERSION_1_2; 192 conn->rl.tls_version = TLS_VERSION_1_1; 194 conn->rl.tls_version = conn->client_version; 196 tls_version_str(conn->rl.tls_version)); 931 if (conn->rl.tls_version == TLS_VERSION_1_2) { 1002 if (tls_verify_signature(conn->rl.tls_version, conn->client_rsa_key, 1165 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 1206 if (tls_prf(conn->rl.tls_version,
|
H A D | tlsv1_server_write.c | 85 WPA_PUT_BE16(pos, conn->rl.tls_version); 566 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 569 conn->rl.tls_version, TLS_HASH_ALG_SHA256, 618 conn->rl.tls_version, conn->client_random, 843 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 884 if (tls_prf(conn->rl.tls_version, 1072 WPA_PUT_BE16(pos, conn->rl.tls_version ? conn->rl.tls_version :
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_record.h | 32 u16 tls_version; member in struct:tlsv1_record_layer
|
H A D | tlsv1_client_write.c | 51 u16 tls_version = TLS_VERSION; local 56 tls_version == TLS_VERSION_1_2) 57 tls_version = TLS_VERSION_1_1; 61 tls_version == TLS_VERSION_1_1) 62 tls_version = TLS_VERSION_1; 65 tls_version == TLS_VERSION_1) { 71 tls_version_str(tls_version)); 104 WPA_PUT_BE16(pos, tls_version); 129 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 618 if (conn->rl.tls_version [all...] |
H A D | tlsv1_common.h | 262 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_Alg, 267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, 271 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
|
H A D | tlsv1_client.c | 65 if (tls_prf(conn->rl.tls_version, 80 if (conn->rl.tls_version == TLS_VERSION_1) 82 if (tls_prf(conn->rl.tls_version, 108 if (conn->rl.tls_version == TLS_VERSION_1) { 476 conn->rl.tls_version = TLS_VERSION; 541 return tls_prf(conn->rl.tls_version, 854 switch (conn->rl.tls_version) {
|
H A D | tlsv1_client_read.c | 84 u16 tls_version; local 126 tls_version = WPA_GET_BE16(pos); 127 if (!tls_version_ok(tls_version) || 128 tls_version_disabled(conn, tls_version)) { 138 tls_version_str(tls_version)); 139 conn->rl.tls_version = tls_version; 733 if (conn->rl.tls_version == TLS_VERSION_1_2) { 757 conn->rl.tls_version, pos[0], 767 conn->rl.tls_version, con [all...] |
H A D | tlsv1_record.c | 167 WPA_PUT_BE16(pos, rl->tls_version); 176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1; 378 if (rl->tls_version >= TLS_VERSION_1_1) {
|
H A D | tlsv1_common.c | 338 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, argument 378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, argument 414 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, argument 466 if (tls_version >= TLS_VERSION_1_2) {
|
H A D | tlsv1_server_read.c | 186 conn->rl.tls_version = TLS_VERSION_1; 189 conn->rl.tls_version = TLS_VERSION_1_2; 192 conn->rl.tls_version = TLS_VERSION_1_1; 194 conn->rl.tls_version = conn->client_version; 196 tls_version_str(conn->rl.tls_version)); 931 if (conn->rl.tls_version == TLS_VERSION_1_2) { 1002 if (tls_verify_signature(conn->rl.tls_version, conn->client_rsa_key, 1165 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 1206 if (tls_prf(conn->rl.tls_version,
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_record.h | 32 u16 tls_version; member in struct:tlsv1_record_layer
|
H A D | tlsv1_client_write.c | 51 u16 tls_version = TLS_VERSION; local 56 tls_version == TLS_VERSION_1_2) 57 tls_version = TLS_VERSION_1_1; 61 tls_version == TLS_VERSION_1_1) 62 tls_version = TLS_VERSION_1; 65 tls_version == TLS_VERSION_1) { 71 tls_version_str(tls_version)); 104 WPA_PUT_BE16(pos, tls_version); 129 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 618 if (conn->rl.tls_version [all...] |
H A D | tlsv1_common.h | 262 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_Alg, 267 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, 271 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
|
H A D | tlsv1_client.c | 65 if (tls_prf(conn->rl.tls_version, 80 if (conn->rl.tls_version == TLS_VERSION_1) 82 if (tls_prf(conn->rl.tls_version, 108 if (conn->rl.tls_version == TLS_VERSION_1) { 476 conn->rl.tls_version = TLS_VERSION; 541 return tls_prf(conn->rl.tls_version, 854 switch (conn->rl.tls_version) {
|
H A D | tlsv1_client_read.c | 84 u16 tls_version; local 126 tls_version = WPA_GET_BE16(pos); 127 if (!tls_version_ok(tls_version) || 128 tls_version_disabled(conn, tls_version)) { 138 tls_version_str(tls_version)); 139 conn->rl.tls_version = tls_version; 733 if (conn->rl.tls_version == TLS_VERSION_1_2) { 757 conn->rl.tls_version, pos[0], 767 conn->rl.tls_version, con [all...] |
H A D | tlsv1_record.c | 167 WPA_PUT_BE16(pos, rl->tls_version); 176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1; 378 if (rl->tls_version >= TLS_VERSION_1_1) {
|
H A D | tlsv1_common.c | 338 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, argument 378 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, argument 414 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, argument 466 if (tls_version >= TLS_VERSION_1_2) {
|
H A D | tlsv1_server_read.c | 186 conn->rl.tls_version = TLS_VERSION_1; 189 conn->rl.tls_version = TLS_VERSION_1_2; 192 conn->rl.tls_version = TLS_VERSION_1_1; 194 conn->rl.tls_version = conn->client_version; 196 tls_version_str(conn->rl.tls_version)); 931 if (conn->rl.tls_version == TLS_VERSION_1_2) { 1002 if (tls_verify_signature(conn->rl.tls_version, conn->client_rsa_key, 1165 if (conn->rl.tls_version >= TLS_VERSION_1_2) { 1206 if (tls_prf(conn->rl.tls_version,
|