HomeSort by relevance Sort by last modified time
    Searched refs:DH (Results 1 - 25 of 121) sorted by null

1 2 3 4 5

  /external/openssh/
dh.h 1 /* $OpenBSD: dh.h,v 1.10 2008/06/26 09:19:40 djm Exp $ */
35 DH *choose_dh(int, int, int);
36 DH *dh_new_group_asc(const char *, const char *);
37 DH *dh_new_group(BIGNUM *, BIGNUM *);
38 DH *dh_new_group1(void);
39 DH *dh_new_group14(void);
41 void dh_gen_key(DH *, int);
42 int dh_pub_is_valid(DH *, BIGNUM *);
dh.c 1 /* $OpenBSD: dh.c,v 1.48 2009/10/01 11:37:33 grunk Exp $ */
31 #include <openssl/dh.h>
38 #include "dh.h"
124 DH *
193 dh_pub_is_valid(DH *dh, BIGNUM *dh_pub)
201 logit("invalid public DH value: negative");
205 logit("invalid public DH value: <= 1");
213 if (!BN_sub(tmp, dh->p, BN_value_one()) ||
216 logit("invalid public DH value: >= p-1")
267 DH *dh; local
288 DH *dh; local
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/dh/
dh.h 1 /* crypto/dh/dh.h */
65 #error DH is disabled.
81 #define DH_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DH
89 /* If this flag is set the DH method is FIPS compliant and can be used
109 /* typedef struct dh_st DH; */
116 int (*generate_key)(DH *dh);
117 int (*compute_key)(unsigned char *key,const BIGNUM *pub_key,DH *dh);
    [all...]
dh_asn1.c 62 #include <openssl/dh.h>
75 DH_free((DH *)*pval);
83 ASN1_SIMPLE(DH, p, BIGNUM),
84 ASN1_SIMPLE(DH, g, BIGNUM),
85 ASN1_OPT(DH, length, ZLONG),
86 } ASN1_SEQUENCE_END_cb(DH, DHparams)
88 IMPLEMENT_ASN1_ENCODE_FUNCTIONS_const_fname(DH, DHparams, DHparams)
90 DH *DHparams_dup(DH *dh)
    [all...]
dh_depr.c 1 /* crypto/dh/dh_depr.c */
62 #include <openssl/dh.h>
67 DH *DH_generate_parameters(int prime_len, int generator,
71 DH *ret=NULL;
dh_key.c 1 /* crypto/dh/dh_key.c */
63 #include <openssl/dh.h>
65 static int generate_key(DH *dh);
66 static int compute_key(unsigned char *key, const BIGNUM *pub_key, DH *dh);
67 static int dh_bn_mod_exp(const DH *dh, BIGNUM *r,
71 static int dh_init(DH *dh);
    [all...]
dh_lib.c 1 /* crypto/dh/dh_lib.c */
62 #include <openssl/dh.h>
96 int DH_set_method(DH *dh, const DH_METHOD *meth)
101 mtmp = dh->meth;
102 if (mtmp->finish) mtmp->finish(dh);
104 if (dh->engine)
106 ENGINE_finish(dh->engine);
107 dh->engine = NULL;
110 dh->meth = meth
    [all...]
dh_gen.c 1 /* crypto/dh/dh_gen.c */
67 #include <openssl/dh.h>
73 static int dh_builtin_genparams(DH *ret, int prime_len, int generator, BN_GENCB *cb);
75 int DH_generate_parameters_ex(DH *ret, int prime_len, int generator, BN_GENCB *cb)
95 /* We generate DH parameters as follows
113 * Since DH should be using a safe prime (both p and q are prime),
120 static int dh_builtin_genparams(DH *ret, int prime_len, int generator, BN_GENCB *cb)
p192.c 1 /* crypto/dh/p192.c */
62 #include <openssl/dh.h>
73 DH *dh; local
75 dh=DH_new();
76 dh->p=BN_bin2bn(data,sizeof(data),NULL);
77 dh->g=BN_new();
78 BN_set_word(dh->g,3);
79 PEM_write_DHparams(stdout,dh);
dh_check.c 1 /* crypto/dh/dh_check.c */
62 #include <openssl/dh.h>
73 int DH_check(const DH *dh, int *ret)
86 if (BN_is_word(dh->g,DH_GENERATOR_2))
88 l=BN_mod_word(dh->p,24);
92 else if (BN_is_word(dh->g,DH_GENERATOR_3))
94 l=BN_mod_word(dh->p,12);
98 else if (BN_is_word(dh->g,DH_GENERATOR_5))
100 l=BN_mod_word(dh->p,10)
    [all...]
p512.c 1 /* crypto/dh/p512.c */
62 #include <openssl/dh.h>
78 DH *dh; local
80 dh=DH_new();
81 dh->p=BN_bin2bn(data,sizeof(data),NULL);
82 dh->g=BN_new();
83 BN_set_word(dh->g,2);
84 PEM_write_DHparams(stdout,dh);
dh_ameth.c 62 #include <openssl/dh.h>
68 DH_free(pkey->pkey.dh);
81 DH *dh = NULL; local
97 if (!(dh = d2i_DHparams(NULL, &pm, pmlen)))
110 if (!(dh->pub_key = ASN1_INTEGER_to_BN(public_key, NULL)))
117 EVP_PKEY_assign_DH(pkey, dh);
123 if (dh)
124 DH_free(dh);
131 DH *dh local
194 DH *dh = NULL; local
301 DH *dh; local
    [all...]
  /external/chromium_org/third_party/openssl/openssl/include/openssl/
dh.h 1 /* crypto/dh/dh.h */
65 #error DH is disabled.
81 #define DH_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DH
89 /* If this flag is set the DH method is FIPS compliant and can be used
109 /* typedef struct dh_st DH; */
116 int (*generate_key)(DH *dh);
117 int (*compute_key)(unsigned char *key,const BIGNUM *pub_key,DH *dh);
    [all...]
  /external/openssl/crypto/dh/
dh.h 1 /* crypto/dh/dh.h */
65 #error DH is disabled.
81 #define DH_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DH
89 /* If this flag is set the DH method is FIPS compliant and can be used
109 /* typedef struct dh_st DH; */
116 int (*generate_key)(DH *dh);
117 int (*compute_key)(unsigned char *key,const BIGNUM *pub_key,DH *dh);
    [all...]
dh_asn1.c 62 #include <openssl/dh.h>
75 DH_free((DH *)*pval);
83 ASN1_SIMPLE(DH, p, BIGNUM),
84 ASN1_SIMPLE(DH, g, BIGNUM),
85 ASN1_OPT(DH, length, ZLONG),
86 } ASN1_SEQUENCE_END_cb(DH, DHparams)
88 IMPLEMENT_ASN1_ENCODE_FUNCTIONS_const_fname(DH, DHparams, DHparams)
90 DH *DHparams_dup(DH *dh)
    [all...]
dh_depr.c 1 /* crypto/dh/dh_depr.c */
62 #include <openssl/dh.h>
67 DH *DH_generate_parameters(int prime_len, int generator,
71 DH *ret=NULL;
dh_key.c 1 /* crypto/dh/dh_key.c */
63 #include <openssl/dh.h>
65 static int generate_key(DH *dh);
66 static int compute_key(unsigned char *key, const BIGNUM *pub_key, DH *dh);
67 static int dh_bn_mod_exp(const DH *dh, BIGNUM *r,
71 static int dh_init(DH *dh);
    [all...]
dh_lib.c 1 /* crypto/dh/dh_lib.c */
62 #include <openssl/dh.h>
96 int DH_set_method(DH *dh, const DH_METHOD *meth)
101 mtmp = dh->meth;
102 if (mtmp->finish) mtmp->finish(dh);
104 if (dh->engine)
106 ENGINE_finish(dh->engine);
107 dh->engine = NULL;
110 dh->meth = meth
    [all...]
dh_gen.c 1 /* crypto/dh/dh_gen.c */
67 #include <openssl/dh.h>
73 static int dh_builtin_genparams(DH *ret, int prime_len, int generator, BN_GENCB *cb);
75 int DH_generate_parameters_ex(DH *ret, int prime_len, int generator, BN_GENCB *cb)
95 /* We generate DH parameters as follows
113 * Since DH should be using a safe prime (both p and q are prime),
120 static int dh_builtin_genparams(DH *ret, int prime_len, int generator, BN_GENCB *cb)
p192.c 1 /* crypto/dh/p192.c */
62 #include <openssl/dh.h>
73 DH *dh; local
75 dh=DH_new();
76 dh->p=BN_bin2bn(data,sizeof(data),NULL);
77 dh->g=BN_new();
78 BN_set_word(dh->g,3);
79 PEM_write_DHparams(stdout,dh);
dh_check.c 1 /* crypto/dh/dh_check.c */
62 #include <openssl/dh.h>
73 int DH_check(const DH *dh, int *ret)
86 if (BN_is_word(dh->g,DH_GENERATOR_2))
88 l=BN_mod_word(dh->p,24);
92 else if (BN_is_word(dh->g,DH_GENERATOR_3))
94 l=BN_mod_word(dh->p,12);
98 else if (BN_is_word(dh->g,DH_GENERATOR_5))
100 l=BN_mod_word(dh->p,10)
    [all...]
p512.c 1 /* crypto/dh/p512.c */
62 #include <openssl/dh.h>
78 DH *dh; local
80 dh=DH_new();
81 dh->p=BN_bin2bn(data,sizeof(data),NULL);
82 dh->g=BN_new();
83 BN_set_word(dh->g,2);
84 PEM_write_DHparams(stdout,dh);
  /external/openssl/include/openssl/
dh.h 1 /* crypto/dh/dh.h */
65 #error DH is disabled.
81 #define DH_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DH
89 /* If this flag is set the DH method is FIPS compliant and can be used
109 /* typedef struct dh_st DH; */
116 int (*generate_key)(DH *dh);
117 int (*compute_key)(unsigned char *key,const BIGNUM *pub_key,DH *dh);
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/
DH.java 6 public class DH
8 private static final String PREFIX = "org.bouncycastle.jcajce.provider.asymmetric" + ".dh.";
19 provider.addAlgorithm("KeyPairGenerator.DH", PREFIX + "KeyPairGeneratorSpi");
20 provider.addAlgorithm("Alg.Alias.KeyPairGenerator.DIFFIEHELLMAN", "DH");
22 provider.addAlgorithm("KeyAgreement.DH", PREFIX + "KeyAgreementSpi");
23 provider.addAlgorithm("Alg.Alias.KeyAgreement.DIFFIEHELLMAN", "DH");
25 provider.addAlgorithm("KeyFactory.DH", PREFIX + "KeyFactorySpi");
26 provider.addAlgorithm("Alg.Alias.KeyFactory.DIFFIEHELLMAN", "DH");
28 provider.addAlgorithm("AlgorithmParameters.DH", PREFIX + "AlgorithmParametersSpi");
29 provider.addAlgorithm("Alg.Alias.AlgorithmParameters.DIFFIEHELLMAN", "DH");
    [all...]
  /art/compiler/utils/x86/
constants_x86.h 37 DH = 6,

Completed in 325 milliseconds

1 2 3 4 5