Searched refs:dh_g (Results 1 – 10 of 10) sorted by relevance
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
D | ServerKeyExchangeTest.java | 89 BigInteger dh_g = new BigInteger("987654321"); in testServerKeyExchange_DHE_DSS() local 93 ServerKeyExchange message = new ServerKeyExchange(dh_p, dh_g, dh_Ys, in testServerKeyExchange_DHE_DSS() 101 assertEquals("incorrect ServerKeyExchange", dh_g, message.par2); in testServerKeyExchange_DHE_DSS() 141 BigInteger dh_g = new BigInteger("987654321"); in testServerKeyExchange_DH_anon() local 143 ServerKeyExchange message = new ServerKeyExchange(dh_p, dh_g, dh_Ys, in testServerKeyExchange_DH_anon() 150 assertEquals("incorrect ServerKeyExchange", dh_g, message.par2); in testServerKeyExchange_DH_anon()
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_cred.c | 35 os_free(cred->dh_g); in tlsv1_cred_free() 415 os_free(cred->dh_g); in tlsv1_set_dhparams_der() 416 cred->dh_g = os_malloc(hdr.length); in tlsv1_set_dhparams_der() 417 if (cred->dh_g == NULL) in tlsv1_set_dhparams_der() 419 os_memcpy(cred->dh_g, hdr.payload, hdr.length); in tlsv1_set_dhparams_der()
|
D | tlsv1_cred.h | 20 u8 *dh_g; /* generator */ member
|
D | tlsv1_client_read.c | 445 conn->dh_g = os_malloc(conn->dh_g_len); in tlsv1_process_diffie_hellman() 446 if (conn->dh_g == NULL) in tlsv1_process_diffie_hellman() 448 os_memcpy(conn->dh_g, pos, conn->dh_g_len); in tlsv1_process_diffie_hellman() 451 conn->dh_g, conn->dh_g_len); in tlsv1_process_diffie_hellman() 452 if (conn->dh_g_len == 1 && conn->dh_g[0] < 2) in tlsv1_process_diffie_hellman()
|
D | tlsv1_client_i.h | 55 u8 *dh_g; member
|
D | tlsv1_server_write.c | 272 conn->cred->dh_g == NULL) { in tls_write_server_key_exchange() 323 if (crypto_mod_exp(conn->cred->dh_g, conn->cred->dh_g_len, in tls_write_server_key_exchange() 397 os_memcpy(pos, conn->cred->dh_g, conn->cred->dh_g_len); in tls_write_server_key_exchange()
|
D | tlsv1_client.c | 34 os_free(conn->dh_g); in tlsv1_client_free_dh() 36 conn->dh_p = conn->dh_g = conn->dh_ys = NULL; in tlsv1_client_free_dh()
|
D | tlsv1_client_write.c | 254 if (crypto_mod_exp(conn->dh_g, conn->dh_g_len, in tlsv1_key_x_anon_dh()
|
/external/dropbear/ |
D | common-kex.c | 478 DEF_MP_INT(dh_g); in gen_kexdh_vals() 482 m_mp_init_multi(&dh_g, &dh_p, &dh_q, NULL); in gen_kexdh_vals() 487 if (mp_set_int(&dh_g, DH_G_VAL) != MP_OKAY) { in gen_kexdh_vals() 504 if (mp_exptmod(&dh_g, dh_priv, &dh_p, dh_pub) != MP_OKAY) { in gen_kexdh_vals() 507 mp_clear_multi(&dh_g, &dh_p, &dh_q, NULL); in gen_kexdh_vals()
|
/external/chromium_org/net/third_party/nss/ssl/ |
D | ssl3con.c | 1254 SECItem dh_p, SECItem dh_g, SECItem dh_Ys, in ssl3_ComputeDHKeyHash() argument 1264 bufLen = 2*SSL3_RANDOM_LENGTH + 2 + dh_p.len + 2 + dh_g.len + 2 + dh_Ys.len; in ssl3_ComputeDHKeyHash() 1283 pBuf[0] = (PRUint8)(dh_g.len >> 8); in ssl3_ComputeDHKeyHash() 1284 pBuf[1] = (PRUint8)(dh_g.len); in ssl3_ComputeDHKeyHash() 1286 memcpy(pBuf, dh_g.data, dh_g.len); in ssl3_ComputeDHKeyHash() 1287 pBuf += dh_g.len; in ssl3_ComputeDHKeyHash() 6864 SECItem dh_g = {siBuffer, NULL, 0}; in ssl3_HandleServerKeyExchange() local 6875 rv = ssl3_ConsumeHandshakeVariable(ss, &dh_g, 2, &b, &length); in ssl3_HandleServerKeyExchange() 6879 if (dh_g.len > dh_p.len || !ssl3_BigIntGreaterThanOne(&dh_g)) in ssl3_HandleServerKeyExchange() 6910 PRINT_BUF(60, (NULL, "Server DH g", dh_g.data, dh_g.len)); in ssl3_HandleServerKeyExchange() [all …]
|