/external/openssh/ |
dh.h | 1 /* $OpenBSD: dh.h,v 1.10 2008/06/26 09:19:40 djm Exp $ */ 35 DH *choose_dh(int, int, int); 36 DH *dh_new_group_asc(const char *, const char *); 37 DH *dh_new_group(BIGNUM *, BIGNUM *); 38 DH *dh_new_group1(void); 39 DH *dh_new_group14(void); 41 void dh_gen_key(DH *, int); 42 int dh_pub_is_valid(DH *, BIGNUM *);
|
dh.c | 1 /* $OpenBSD: dh.c,v 1.48 2009/10/01 11:37:33 grunk Exp $ */ 31 #include <openssl/dh.h> 38 #include "dh.h" 124 DH * 193 dh_pub_is_valid(DH *dh, BIGNUM *dh_pub) 201 logit("invalid public DH value: negative"); 205 logit("invalid public DH value: <= 1"); 213 if (!BN_sub(tmp, dh->p, BN_value_one()) || 216 logit("invalid public DH value: >= p-1") 267 DH *dh; local 288 DH *dh; local [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/dh/ |
dh.h | 1 /* crypto/dh/dh.h */ 65 #error DH is disabled. 81 #define DH_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DH 89 /* If this flag is set the DH method is FIPS compliant and can be used 109 /* typedef struct dh_st DH; */ 116 int (*generate_key)(DH *dh); 117 int (*compute_key)(unsigned char *key,const BIGNUM *pub_key,DH *dh); [all...] |
dh_asn1.c | 62 #include <openssl/dh.h> 75 DH_free((DH *)*pval); 83 ASN1_SIMPLE(DH, p, BIGNUM), 84 ASN1_SIMPLE(DH, g, BIGNUM), 85 ASN1_OPT(DH, length, ZLONG), 86 } ASN1_SEQUENCE_END_cb(DH, DHparams) 88 IMPLEMENT_ASN1_ENCODE_FUNCTIONS_const_fname(DH, DHparams, DHparams) 90 DH *DHparams_dup(DH *dh) [all...] |
dh_depr.c | 1 /* crypto/dh/dh_depr.c */ 62 #include <openssl/dh.h> 67 DH *DH_generate_parameters(int prime_len, int generator, 71 DH *ret=NULL;
|
dh_key.c | 1 /* crypto/dh/dh_key.c */ 63 #include <openssl/dh.h> 65 static int generate_key(DH *dh); 66 static int compute_key(unsigned char *key, const BIGNUM *pub_key, DH *dh); 67 static int dh_bn_mod_exp(const DH *dh, BIGNUM *r, 71 static int dh_init(DH *dh); [all...] |
dh_lib.c | 1 /* crypto/dh/dh_lib.c */ 62 #include <openssl/dh.h> 96 int DH_set_method(DH *dh, const DH_METHOD *meth) 101 mtmp = dh->meth; 102 if (mtmp->finish) mtmp->finish(dh); 104 if (dh->engine) 106 ENGINE_finish(dh->engine); 107 dh->engine = NULL; 110 dh->meth = meth [all...] |
dh_gen.c | 1 /* crypto/dh/dh_gen.c */ 67 #include <openssl/dh.h> 73 static int dh_builtin_genparams(DH *ret, int prime_len, int generator, BN_GENCB *cb); 75 int DH_generate_parameters_ex(DH *ret, int prime_len, int generator, BN_GENCB *cb) 95 /* We generate DH parameters as follows 113 * Since DH should be using a safe prime (both p and q are prime), 120 static int dh_builtin_genparams(DH *ret, int prime_len, int generator, BN_GENCB *cb)
|
p192.c | 1 /* crypto/dh/p192.c */ 62 #include <openssl/dh.h> 73 DH *dh; local 75 dh=DH_new(); 76 dh->p=BN_bin2bn(data,sizeof(data),NULL); 77 dh->g=BN_new(); 78 BN_set_word(dh->g,3); 79 PEM_write_DHparams(stdout,dh);
|
dh_check.c | 1 /* crypto/dh/dh_check.c */ 62 #include <openssl/dh.h> 73 int DH_check(const DH *dh, int *ret) 86 if (BN_is_word(dh->g,DH_GENERATOR_2)) 88 l=BN_mod_word(dh->p,24); 92 else if (BN_is_word(dh->g,DH_GENERATOR_3)) 94 l=BN_mod_word(dh->p,12); 98 else if (BN_is_word(dh->g,DH_GENERATOR_5)) 100 l=BN_mod_word(dh->p,10) [all...] |
p512.c | 1 /* crypto/dh/p512.c */ 62 #include <openssl/dh.h> 78 DH *dh; local 80 dh=DH_new(); 81 dh->p=BN_bin2bn(data,sizeof(data),NULL); 82 dh->g=BN_new(); 83 BN_set_word(dh->g,2); 84 PEM_write_DHparams(stdout,dh);
|
dh_ameth.c | 62 #include <openssl/dh.h> 68 DH_free(pkey->pkey.dh); 81 DH *dh = NULL; local 97 if (!(dh = d2i_DHparams(NULL, &pm, pmlen))) 110 if (!(dh->pub_key = ASN1_INTEGER_to_BN(public_key, NULL))) 117 EVP_PKEY_assign_DH(pkey, dh); 123 if (dh) 124 DH_free(dh); 131 DH *dh local 194 DH *dh = NULL; local 301 DH *dh; local [all...] |
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
dh.h | 1 /* crypto/dh/dh.h */ 65 #error DH is disabled. 81 #define DH_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DH 89 /* If this flag is set the DH method is FIPS compliant and can be used 109 /* typedef struct dh_st DH; */ 116 int (*generate_key)(DH *dh); 117 int (*compute_key)(unsigned char *key,const BIGNUM *pub_key,DH *dh); [all...] |
/external/openssl/crypto/dh/ |
dh.h | 1 /* crypto/dh/dh.h */ 65 #error DH is disabled. 81 #define DH_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DH 89 /* If this flag is set the DH method is FIPS compliant and can be used 109 /* typedef struct dh_st DH; */ 116 int (*generate_key)(DH *dh); 117 int (*compute_key)(unsigned char *key,const BIGNUM *pub_key,DH *dh); [all...] |
dh_asn1.c | 62 #include <openssl/dh.h> 75 DH_free((DH *)*pval); 83 ASN1_SIMPLE(DH, p, BIGNUM), 84 ASN1_SIMPLE(DH, g, BIGNUM), 85 ASN1_OPT(DH, length, ZLONG), 86 } ASN1_SEQUENCE_END_cb(DH, DHparams) 88 IMPLEMENT_ASN1_ENCODE_FUNCTIONS_const_fname(DH, DHparams, DHparams) 90 DH *DHparams_dup(DH *dh) [all...] |
dh_depr.c | 1 /* crypto/dh/dh_depr.c */ 62 #include <openssl/dh.h> 67 DH *DH_generate_parameters(int prime_len, int generator, 71 DH *ret=NULL;
|
dh_key.c | 1 /* crypto/dh/dh_key.c */ 63 #include <openssl/dh.h> 65 static int generate_key(DH *dh); 66 static int compute_key(unsigned char *key, const BIGNUM *pub_key, DH *dh); 67 static int dh_bn_mod_exp(const DH *dh, BIGNUM *r, 71 static int dh_init(DH *dh); [all...] |
dh_lib.c | 1 /* crypto/dh/dh_lib.c */ 62 #include <openssl/dh.h> 96 int DH_set_method(DH *dh, const DH_METHOD *meth) 101 mtmp = dh->meth; 102 if (mtmp->finish) mtmp->finish(dh); 104 if (dh->engine) 106 ENGINE_finish(dh->engine); 107 dh->engine = NULL; 110 dh->meth = meth [all...] |
dh_gen.c | 1 /* crypto/dh/dh_gen.c */ 67 #include <openssl/dh.h> 73 static int dh_builtin_genparams(DH *ret, int prime_len, int generator, BN_GENCB *cb); 75 int DH_generate_parameters_ex(DH *ret, int prime_len, int generator, BN_GENCB *cb) 95 /* We generate DH parameters as follows 113 * Since DH should be using a safe prime (both p and q are prime), 120 static int dh_builtin_genparams(DH *ret, int prime_len, int generator, BN_GENCB *cb)
|
p192.c | 1 /* crypto/dh/p192.c */ 62 #include <openssl/dh.h> 73 DH *dh; local 75 dh=DH_new(); 76 dh->p=BN_bin2bn(data,sizeof(data),NULL); 77 dh->g=BN_new(); 78 BN_set_word(dh->g,3); 79 PEM_write_DHparams(stdout,dh);
|
dh_check.c | 1 /* crypto/dh/dh_check.c */ 62 #include <openssl/dh.h> 73 int DH_check(const DH *dh, int *ret) 86 if (BN_is_word(dh->g,DH_GENERATOR_2)) 88 l=BN_mod_word(dh->p,24); 92 else if (BN_is_word(dh->g,DH_GENERATOR_3)) 94 l=BN_mod_word(dh->p,12); 98 else if (BN_is_word(dh->g,DH_GENERATOR_5)) 100 l=BN_mod_word(dh->p,10) [all...] |
p512.c | 1 /* crypto/dh/p512.c */ 62 #include <openssl/dh.h> 78 DH *dh; local 80 dh=DH_new(); 81 dh->p=BN_bin2bn(data,sizeof(data),NULL); 82 dh->g=BN_new(); 83 BN_set_word(dh->g,2); 84 PEM_write_DHparams(stdout,dh);
|
/external/openssl/include/openssl/ |
dh.h | 1 /* crypto/dh/dh.h */ 65 #error DH is disabled. 81 #define DH_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DH 89 /* If this flag is set the DH method is FIPS compliant and can be used 109 /* typedef struct dh_st DH; */ 116 int (*generate_key)(DH *dh); 117 int (*compute_key)(unsigned char *key,const BIGNUM *pub_key,DH *dh); [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ |
DH.java | 6 public class DH 8 private static final String PREFIX = "org.bouncycastle.jcajce.provider.asymmetric" + ".dh."; 19 provider.addAlgorithm("KeyPairGenerator.DH", PREFIX + "KeyPairGeneratorSpi"); 20 provider.addAlgorithm("Alg.Alias.KeyPairGenerator.DIFFIEHELLMAN", "DH"); 22 provider.addAlgorithm("KeyAgreement.DH", PREFIX + "KeyAgreementSpi"); 23 provider.addAlgorithm("Alg.Alias.KeyAgreement.DIFFIEHELLMAN", "DH"); 25 provider.addAlgorithm("KeyFactory.DH", PREFIX + "KeyFactorySpi"); 26 provider.addAlgorithm("Alg.Alias.KeyFactory.DIFFIEHELLMAN", "DH"); 28 provider.addAlgorithm("AlgorithmParameters.DH", PREFIX + "AlgorithmParametersSpi"); 29 provider.addAlgorithm("Alg.Alias.AlgorithmParameters.DIFFIEHELLMAN", "DH"); [all...] |
/art/compiler/utils/x86/ |
constants_x86.h | 37 DH = 6,
|