/external/openssh/ |
dh.h | 1 /* $OpenBSD: dh.h,v 1.10 2008/06/26 09:19:40 djm Exp $ */ 35 DH *choose_dh(int, int, int); 36 DH *dh_new_group_asc(const char *, const char *); 37 DH *dh_new_group(BIGNUM *, BIGNUM *); 38 DH *dh_new_group1(void); 39 DH *dh_new_group14(void); 41 void dh_gen_key(DH *, int); 42 int dh_pub_is_valid(DH *, BIGNUM *);
|
dh.c | 1 /* $OpenBSD: dh.c,v 1.48 2009/10/01 11:37:33 grunk Exp $ */ 31 #include <openssl/dh.h> 38 #include "dh.h" 124 DH * 193 dh_pub_is_valid(DH *dh, BIGNUM *dh_pub) 201 logit("invalid public DH value: negative"); 205 logit("invalid public DH value: <= 1"); 213 if (!BN_sub(tmp, dh->p, BN_value_one()) || 216 logit("invalid public DH value: >= p-1") 267 DH *dh; local 288 DH *dh; local [all...] |
kexdhc.c | 30 #include <openssl/dh.h> 44 #include "dh.h" 51 DH *dh; local 58 /* generate and send 'e', client DH public key */ 61 dh = dh_new_group1(); 64 dh = dh_new_group14(); 69 dh_gen_key(dh, kex->we_need * 8); 71 packet_put_bignum2(dh->pub_key); 76 DHparams_print_fp(stderr, dh); [all...] |
monitor_wrap.h | 42 DH *mm_choose_dh(int, int, int);
|
kexdhs.c | 34 #include <openssl/dh.h> 43 #include "dh.h" 54 DH *dh; local 60 /* generate server DH public key */ 63 dh = dh_new_group1(); 66 dh = dh_new_group14(); 71 dh_gen_key(dh, kex->we_need * 8); 101 DHparams_print_fp(stderr, dh); 103 BN_print_fp(stderr, dh->pub_key) [all...] |
kexgexc.c | 31 #include <openssl/dh.h> 45 #include "dh.h" 59 DH *dh; local 104 dh = dh_new_group(g, p); 105 dh_gen_key(dh, kex->we_need * 8); 108 DHparams_print_fp(stderr, dh); 110 BN_print_fp(stderr, dh->pub_key); 115 /* generate and send 'e', client DH public key */ 117 packet_put_bignum2(dh->pub_key) [all...] |
/external/openssl/crypto/dh/ |
dh.h | 1 /* crypto/dh/dh.h */ 65 #error DH is disabled. 81 #define DH_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DH 89 /* If this flag is set the DH method is FIPS compliant and can be used 109 /* typedef struct dh_st DH; */ 116 int (*generate_key)(DH *dh); 117 int (*compute_key)(unsigned char *key,const BIGNUM *pub_key,DH *dh); [all...] |
dh_asn1.c | 62 #include <openssl/dh.h> 75 DH_free((DH *)*pval); 83 ASN1_SIMPLE(DH, p, BIGNUM), 84 ASN1_SIMPLE(DH, g, BIGNUM), 85 ASN1_OPT(DH, length, ZLONG), 86 } ASN1_SEQUENCE_END_cb(DH, DHparams) 88 IMPLEMENT_ASN1_ENCODE_FUNCTIONS_const_fname(DH, DHparams, DHparams) 90 DH *DHparams_dup(DH *dh) [all...] |
dh_depr.c | 1 /* crypto/dh/dh_depr.c */ 62 #include <openssl/dh.h> 67 DH *DH_generate_parameters(int prime_len, int generator, 71 DH *ret=NULL;
|
dh_key.c | 1 /* crypto/dh/dh_key.c */ 63 #include <openssl/dh.h> 65 static int generate_key(DH *dh); 66 static int compute_key(unsigned char *key, const BIGNUM *pub_key, DH *dh); 67 static int dh_bn_mod_exp(const DH *dh, BIGNUM *r, 71 static int dh_init(DH *dh); [all...] |
dh_lib.c | 1 /* crypto/dh/dh_lib.c */ 62 #include <openssl/dh.h> 96 int DH_set_method(DH *dh, const DH_METHOD *meth) 101 mtmp = dh->meth; 102 if (mtmp->finish) mtmp->finish(dh); 104 if (dh->engine) 106 ENGINE_finish(dh->engine); 107 dh->engine = NULL; 110 dh->meth = meth [all...] |
dh_gen.c | 1 /* crypto/dh/dh_gen.c */ 67 #include <openssl/dh.h> 73 static int dh_builtin_genparams(DH *ret, int prime_len, int generator, BN_GENCB *cb); 75 int DH_generate_parameters_ex(DH *ret, int prime_len, int generator, BN_GENCB *cb) 95 /* We generate DH parameters as follows 113 * Since DH should be using a safe prime (both p and q are prime), 120 static int dh_builtin_genparams(DH *ret, int prime_len, int generator, BN_GENCB *cb)
|
p192.c | 1 /* crypto/dh/p192.c */ 62 #include <openssl/dh.h> 73 DH *dh; local 75 dh=DH_new(); 76 dh->p=BN_bin2bn(data,sizeof(data),NULL); 77 dh->g=BN_new(); 78 BN_set_word(dh->g,3); 79 PEM_write_DHparams(stdout,dh);
|
dh_check.c | 1 /* crypto/dh/dh_check.c */ 62 #include <openssl/dh.h> 73 int DH_check(const DH *dh, int *ret) 86 if (BN_is_word(dh->g,DH_GENERATOR_2)) 88 l=BN_mod_word(dh->p,24); 92 else if (BN_is_word(dh->g,DH_GENERATOR_3)) 94 l=BN_mod_word(dh->p,12); 98 else if (BN_is_word(dh->g,DH_GENERATOR_5)) 100 l=BN_mod_word(dh->p,10) [all...] |
p512.c | 1 /* crypto/dh/p512.c */ 62 #include <openssl/dh.h> 78 DH *dh; local 80 dh=DH_new(); 81 dh->p=BN_bin2bn(data,sizeof(data),NULL); 82 dh->g=BN_new(); 83 BN_set_word(dh->g,2); 84 PEM_write_DHparams(stdout,dh);
|
dh_ameth.c | 62 #include <openssl/dh.h> 68 DH_free(pkey->pkey.dh); 81 DH *dh = NULL; local 97 if (!(dh = d2i_DHparams(NULL, &pm, pmlen))) 110 if (!(dh->pub_key = ASN1_INTEGER_to_BN(public_key, NULL))) 117 EVP_PKEY_assign_DH(pkey, dh); 123 if (dh) 124 DH_free(dh); 131 DH *dh local 194 DH *dh = NULL; local 301 DH *dh; local [all...] |
dh_pmeth.c | 63 #include <openssl/dh.h> 67 /* DH pkey context structure */ 163 DH *dh = NULL; local 174 dh = DH_new(); 175 if (!dh) 177 ret = DH_generate_parameters_ex(dh, 180 EVP_PKEY_assign_DH(pkey, dh); 182 DH_free(dh); 188 DH *dh = NULL local [all...] |
dhtest.c | 1 /* crypto/dh/dhtest.c */ 80 printf("No DH support\n"); 84 #include <openssl/dh.h> 99 DH *a; 100 DH *b=NULL; 191 fprintf(stderr,"Error in DH routines\n");
|
p1024.c | 1 /* crypto/dh/p1024.c */ 62 #include <openssl/dh.h> 85 DH *dh; local 87 dh=DH_new(); 88 dh->p=BN_bin2bn(data,sizeof(data),NULL); 89 dh->g=BN_new(); 90 BN_set_word(dh->g,2); 91 PEM_write_DHparams(stdout,dh);
|
/external/openssl/include/openssl/ |
dh.h | 1 /* crypto/dh/dh.h */ 65 #error DH is disabled. 81 #define DH_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DH 89 /* If this flag is set the DH method is FIPS compliant and can be used 109 /* typedef struct dh_st DH; */ 116 int (*generate_key)(DH *dh); 117 int (*compute_key)(unsigned char *key,const BIGNUM *pub_key,DH *dh); [all...] |
/external/llvm/include/llvm/Support/ |
SourceMgr.h | 80 void setDiagHandler(DiagHandlerTy DH, void *Ctx = 0) { 81 DiagHandler = DH;
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
JDKAlgorithmParameterGenerator.java | 47 public static class DH 59 throw new InvalidAlgorithmParameterException("DH parameter generator requires a DHGenParameterSpec for initialisation"); 87 params = AlgorithmParameters.getInstance("DH", BouncyCastleProvider.PROVIDER_NAME); 209 // throw new InvalidAlgorithmParameterException("DH parameter generator requires a DHGenParameterSpec for initialisation");
|
JDKKeyPairGenerator.java | 126 public static class DH 138 public DH() 140 super("DH");
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/asymmetric/ec/ |
KeyAgreement.java | 292 public static class DH 295 public DH()
|
/external/openssl/crypto/dsa/ |
dsa_lib.c | 70 #include <openssl/dh.h> 289 DH *DSA_dup_DH(const DSA *r) 292 * DH has p, optional length, g, optional pub_key, optional priv_key, 296 DH *ret = NULL;
|