HomeSort by relevance Sort by last modified time
    Searched refs:DH (Results 1 - 25 of 95) sorted by null

1 2 3 4

  /external/chromium_org/third_party/boringssl/src/include/openssl/
dh.h 70 /* DH contains functions for performing Diffie-Hellman key agreement in
76 /* DH_new returns a new, empty DH object or NULL on error. */
77 OPENSSL_EXPORT DH *DH_new(void);
80 OPENSSL_EXPORT DH *DH_new_method(const ENGINE *engine);
82 /* DH_free decrements the reference count of |dh| and frees it if the reference
84 OPENSSL_EXPORT void DH_free(DH *dh);
86 /* DH_up_ref increments the reference count of |dh|. */
87 OPENSSL_EXPORT int DH_up_ref(DH *dh);
    [all...]
  /external/chromium_org/third_party/boringssl/src/crypto/dh/
dh_asn1.c 56 #include <openssl/dh.h>
73 DH_free((DH *)*pval);
81 ASN1_SIMPLE(DH, p, BIGNUM), ASN1_SIMPLE(DH, g, BIGNUM),
82 ASN1_OPT(DH, priv_length, ZLONG)} ASN1_SEQUENCE_END_cb(DH, DHparams);
84 IMPLEMENT_ASN1_ENCODE_FUNCTIONS_const_fname(DH, DHparams, DHparams)
dh.c 57 #include <openssl/dh.h>
71 DH *DH_new(void) { return DH_new_method(NULL); }
73 DH *DH_new_method(const ENGINE *engine) {
74 DH *dh = (DH *)OPENSSL_malloc(sizeof(DH)); local
75 if (dh == NULL) {
76 OPENSSL_PUT_ERROR(DH, DH_new_method, ERR_R_MALLOC_FAILURE);
80 memset(dh, 0, sizeof(DH))
    [all...]
dh_impl.c 57 #include <openssl/dh.h>
66 static int generate_parameters(DH *ret, int prime_bits, int generator, BN_GENCB *cb) {
67 /* We generate DH parameters as follows
85 * Since DH should be using a safe prime (both p and q are prime),
118 OPENSSL_PUT_ERROR(DH, generate_parameters, DH_R_BAD_GENERATOR);
166 OPENSSL_PUT_ERROR(DH, generate_parameters, ERR_R_BN_LIB);
176 static int generate_key(DH *dh) {
190 if (dh->priv_key == NULL) {
197 priv_key = dh->priv_key
    [all...]
check.c 57 #include <openssl/dh.h>
64 int DH_check_pub_key(const DH *dh, const BIGNUM *pub_key, int *ret) {
77 if (!BN_copy(&q, dh->p) ||
93 int DH_check(const DH *dh, int *ret) {
121 if (dh->q) {
122 if (BN_cmp(dh->g, BN_value_one()) <= 0) {
124 } else if (BN_cmp(dh->g, dh->p) >= 0)
    [all...]
params.c 53 #include <openssl/dh.h>
241 static DH *get_standard_parameters(const struct standard_parameters *params,
243 DH *dh; local
245 dh = DH_new_method(engine);
246 if (!dh) {
250 dh->p = BN_dup(&params->p);
251 dh->q = BN_dup(&params->q);
252 dh->g = BN_dup(&params->g);
253 if (!dh->p || !dh->q || !dh->g)
    [all...]
  /external/openssl/crypto/dh/
dh.h 1 /* crypto/dh/dh.h */
65 #error DH is disabled.
81 #define DH_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DH
89 /* If this flag is set the DH method is FIPS compliant and can be used
109 /* typedef struct dh_st DH; */
116 int (*generate_key)(DH *dh);
117 int (*compute_key)(unsigned char *key,const BIGNUM *pub_key,DH *dh);
    [all...]
dh_asn1.c 62 #include <openssl/dh.h>
75 DH_free((DH *)*pval);
83 ASN1_SIMPLE(DH, p, BIGNUM),
84 ASN1_SIMPLE(DH, g, BIGNUM),
85 ASN1_OPT(DH, length, ZLONG),
86 } ASN1_SEQUENCE_END_cb(DH, DHparams)
88 IMPLEMENT_ASN1_ENCODE_FUNCTIONS_const_fname(DH, DHparams, DHparams)
90 DH *DHparams_dup(DH *dh)
    [all...]
dh_depr.c 1 /* crypto/dh/dh_depr.c */
62 #include <openssl/dh.h>
67 DH *DH_generate_parameters(int prime_len, int generator,
71 DH *ret=NULL;
dh_key.c 1 /* crypto/dh/dh_key.c */
63 #include <openssl/dh.h>
65 static int generate_key(DH *dh);
66 static int compute_key(unsigned char *key, const BIGNUM *pub_key, DH *dh);
67 static int dh_bn_mod_exp(const DH *dh, BIGNUM *r,
71 static int dh_init(DH *dh);
    [all...]
dh_lib.c 1 /* crypto/dh/dh_lib.c */
62 #include <openssl/dh.h>
96 int DH_set_method(DH *dh, const DH_METHOD *meth)
101 mtmp = dh->meth;
102 if (mtmp->finish) mtmp->finish(dh);
104 if (dh->engine)
106 ENGINE_finish(dh->engine);
107 dh->engine = NULL;
110 dh->meth = meth
    [all...]
dh_gen.c 1 /* crypto/dh/dh_gen.c */
67 #include <openssl/dh.h>
73 static int dh_builtin_genparams(DH *ret, int prime_len, int generator, BN_GENCB *cb);
75 int DH_generate_parameters_ex(DH *ret, int prime_len, int generator, BN_GENCB *cb)
95 /* We generate DH parameters as follows
113 * Since DH should be using a safe prime (both p and q are prime),
120 static int dh_builtin_genparams(DH *ret, int prime_len, int generator, BN_GENCB *cb)
p192.c 1 /* crypto/dh/p192.c */
62 #include <openssl/dh.h>
73 DH *dh; local
75 dh=DH_new();
76 dh->p=BN_bin2bn(data,sizeof(data),NULL);
77 dh->g=BN_new();
78 BN_set_word(dh->g,3);
79 PEM_write_DHparams(stdout,dh);
dh_check.c 1 /* crypto/dh/dh_check.c */
62 #include <openssl/dh.h>
73 int DH_check(const DH *dh, int *ret)
86 if (BN_is_word(dh->g,DH_GENERATOR_2))
88 l=BN_mod_word(dh->p,24);
92 else if (BN_is_word(dh->g,DH_GENERATOR_3))
94 l=BN_mod_word(dh->p,12);
98 else if (BN_is_word(dh->g,DH_GENERATOR_5))
100 l=BN_mod_word(dh->p,10)
    [all...]
p512.c 1 /* crypto/dh/p512.c */
62 #include <openssl/dh.h>
78 DH *dh; local
80 dh=DH_new();
81 dh->p=BN_bin2bn(data,sizeof(data),NULL);
82 dh->g=BN_new();
83 BN_set_word(dh->g,2);
84 PEM_write_DHparams(stdout,dh);
dh_ameth.c 62 #include <openssl/dh.h>
68 DH_free(pkey->pkey.dh);
81 DH *dh = NULL; local
97 if (!(dh = d2i_DHparams(NULL, &pm, pmlen)))
110 if (!(dh->pub_key = ASN1_INTEGER_to_BN(public_key, NULL)))
117 EVP_PKEY_assign_DH(pkey, dh);
123 if (dh)
124 DH_free(dh);
131 DH *dh local
194 DH *dh = NULL; local
301 DH *dh; local
    [all...]
dh_pmeth.c 63 #include <openssl/dh.h>
67 /* DH pkey context structure */
163 DH *dh = NULL; local
174 dh = DH_new();
175 if (!dh)
177 ret = DH_generate_parameters_ex(dh,
180 EVP_PKEY_assign_DH(pkey, dh);
182 DH_free(dh);
188 DH *dh = NULL local
    [all...]
dhtest.c 1 /* crypto/dh/dhtest.c */
80 printf("No DH support\n");
84 #include <openssl/dh.h>
99 DH *a;
100 DH *b=NULL;
191 fprintf(stderr,"Error in DH routines\n");
p1024.c 1 /* crypto/dh/p1024.c */
62 #include <openssl/dh.h>
85 DH *dh; local
87 dh=DH_new();
88 dh->p=BN_bin2bn(data,sizeof(data),NULL);
89 dh->g=BN_new();
90 BN_set_word(dh->g,2);
91 PEM_write_DHparams(stdout,dh);
  /external/openssl/include/openssl/
dh.h 1 /* crypto/dh/dh.h */
65 #error DH is disabled.
81 #define DH_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DH
89 /* If this flag is set the DH method is FIPS compliant and can be used
109 /* typedef struct dh_st DH; */
116 int (*generate_key)(DH *dh);
117 int (*compute_key)(unsigned char *key,const BIGNUM *pub_key,DH *dh);
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/
DH.java 5 import org.bouncycastle.jcajce.provider.asymmetric.dh.KeyFactorySpi;
13 public class DH
15 private static final String PREFIX = "org.bouncycastle.jcajce.provider.asymmetric" + ".dh.";
26 provider.addAlgorithm("KeyPairGenerator.DH", PREFIX + "KeyPairGeneratorSpi");
27 provider.addAlgorithm("Alg.Alias.KeyPairGenerator.DIFFIEHELLMAN", "DH");
29 provider.addAlgorithm("KeyAgreement.DH", PREFIX + "KeyAgreementSpi");
30 provider.addAlgorithm("Alg.Alias.KeyAgreement.DIFFIEHELLMAN", "DH");
32 provider.addAlgorithm("KeyFactory.DH", PREFIX + "KeyFactorySpi");
33 provider.addAlgorithm("Alg.Alias.KeyFactory.DIFFIEHELLMAN", "DH");
36 registerOid(provider, PKCSObjectIdentifiers.dhKeyAgreement, "DH", keyFact)
    [all...]
  /external/chromium_org/third_party/boringssl/src/crypto/pem/
pem_pkey.c 62 #include <openssl/dh.h>
160 } else if (len == 2 && memcmp(name, "DH", 2) == 0) {
266 /* Transparently read in PKCS#3 or X9.42 DH parameters */
268 DH *PEM_read_bio_DHparams(BIO *bp, DH **x, pem_password_cb *cb, void *u)
274 DH *ret=NULL;
295 DH *PEM_read_DHparams(FILE *fp, DH **x, pem_password_cb *cb, void *u)
298 DH *ret;
  /art/compiler/utils/x86/
constants_x86.h 37 DH = 6,
  /external/chromium_org/third_party/boringssl/src/crypto/evp/
evp.c 62 #include <openssl/dh.h>
309 int EVP_PKEY_set1_DH(EVP_PKEY *pkey, DH *key) {
317 int EVP_PKEY_assign_DH(EVP_PKEY *pkey, DH *key) {
321 DH *EVP_PKEY_get1_DH(EVP_PKEY *pkey) {
326 DH_up_ref(pkey->pkey.dh);
327 return pkey->pkey.dh;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/
KeyAgreementSpi.java 297 public static class DH
300 public DH()

Completed in 782 milliseconds

1 2 3 4