Searched refs:DH (Results 51 - 71 of 71) sorted by relevance

123

/freebsd-11.0-release/crypto/openssl/crypto/bn/asm/
H A Dia64.S1388 #define DH r22 define
1434 shr.u DH=r34,32
1436 { .mii; setf.sig f7=DH
1457 cmp.eq p6,p7=HH,DH };;
1487 cmp.eq p6,p7=HH,DH };;
H A Dmips.pl911 $DH=$v1;
914 $SRL $DH,$a2,4*$BNSZ # bits
925 beq $DH,$HH,.L_bn_div_words_skip_div1
926 $DIVU $zero,$a0,$DH
958 beq $DH,$HH,.L_bn_div_words_skip_div2
959 $DIVU $zero,$a0,$DH
1005 undef $HH; undef $QT; undef $DH;
H A Dmips3.s654 #define DH v1 define
656 dsrl DH,a2,32
666 beq DH,HH,.L_bn_div_words_skip_div1
667 ddivu zero,a0,DH
699 beq DH,HH,.L_bn_div_words_skip_div2
700 ddivu zero,a0,DH
703 #undef DH
/freebsd-11.0-release/crypto/heimdal/kdc/
H A Dpkinit.c54 DH *key;
333 DH *dh = NULL;
374 krb5_set_error_message(context, ret, "Cannot create DH structure");
378 dh->p = integer_to_BN(context, "DH prime", &dhparam.p);
381 dh->g = integer_to_BN(context, "DH base", &dhparam.g);
384 dh->q = integer_to_BN(context, "DH p-1 factor", &dhparam.q);
785 "DH not supported for windows");
837 krb5_set_error_message(context, ret, "PKINIT unknown DH mechanism");
1114 DH *kdc_dh = cp->u.dh.key;
1203 kdc_log(context, config, 0, "Failed signing the DH* repl
[all...]
/freebsd-11.0-release/crypto/openssl/ssl/
H A Dssl_conf.c413 DH *dh = NULL;
H A Ds3_clnt.c339 /* Check if it is anon DH/ECDH, SRP auth */
434 * EAY EAY EAY need to check for DH fix cert sent back
1385 DH *dh = NULL;
1807 /* else anonymous DH, so no certificate or pkey. */
2116 /* TLS does not like anon-DH with client cert */
2477 static DH *get_server_static_dh_key(SESS_CERT *scert)
2479 DH *dh_srvr = NULL;
2728 DH *dh_srvr, *dh_clnt;
2771 * use the 'p' output buffer for the DH key, but make sure to
3375 * cert exists, if we have a suitable digest for TLS 1.2 if static DH clien
[all...]
H A Ds3_srvr.c421 /* Check if it is anon DH or anon ECDH, */
460 * only send if a DH key exchange, fortezza or RSA but we have a
1607 DH *dh = NULL, *dhp;
2171 DH *dh_srvr, *dh_clnt = NULL;
2295 * protocol does not offer such protection for DH ciphersuites).
2578 * the protocol does not offer such protection for DH
3002 * DH). In that case the ClientKeyExchange processing will skip the
H A Dssl.h273 # define SSL_TXT_DH "DH"
2520 DH *(*dh) (SSL *ssl, int is_export,
2523 DH *(*dh) (SSL *ssl, int is_export,
H A Dssl_lib.c3365 * \brief Set the callback for generating temporary DH keys.
3372 DH *(*dh) (SSL *ssl, int is_export,
3378 void SSL_set_tmp_dh_callback(SSL *ssl, DH *(*dh) (SSL *ssl, int is_export,
/freebsd-11.0-release/contrib/llvm/lib/DebugInfo/PDB/
H A DPDBExtras.cpp102 CASE_OUTPUT_ENUM_CLASS_NAME(PDB_RegisterId, DH, OS)
/freebsd-11.0-release/contrib/llvm/lib/Target/X86/Disassembler/
H A DX86DisassemblerDecoder.h83 ENTRY(DH) \
/freebsd-11.0-release/crypto/heimdal/lib/krb5/
H A Dpkinit.c65 DH *dh;
133 select_dh_group(krb5_context context, DH *dh, unsigned long bits,
150 N_("Did not find a DH group parameter "
451 N_("pkinit: failed to generate DH key", ""));
479 DH *dh = ctx->u.dh;
1362 "KDC DH Key Info", ""));
1369 N_("PKINIT: DH nonce is wrong", ""));
1384 N_("pkinit; got DH reuse but no "
1497 N_("PKINIT: resulting DH key <= 0", ""));
1517 N_("PKINIT: can't create key from DH ke
[all...]
/freebsd-11.0-release/crypto/openssl/engines/
H A De_sureware.c150 static int surewarehk_modexp_dh(const DH *dh, BIGNUM *r, const BIGNUM *a,
158 "SureWare DH method",
885 * This cleans up an DH KM key (destroys the key into hardware), called when
/freebsd-11.0-release/crypto/openssh/
H A Dmonitor_wrap.c183 DH *
H A Dmonitor.c648 DH *dh;
/freebsd-11.0-release/contrib/unbound/daemon/
H A Dremote.c144 * (some openssl versions reject DH that is 'too small', eg. 512).
147 DH *get_dh1024()
175 DH *dh;
232 * DH params, let's generate and set them
235 log_crypto_err("Wanted to set DH param, but failed");
/freebsd-11.0-release/sys/boot/pc98/cdboot/
H A Dcdboot.S657 # Load DH sectors starting at LBA EAX into [EBX].
/freebsd-11.0-release/sys/dev/hwpmc/
H A Dhwpmc_core.c1126 IAPDESCR(6DH, 0x6D, IAP_M_AGENT | IAP_M_CORE, IAP_F_CA | IAP_F_CC2),
1127 IAPDESCR(6DH, 0x6D, IAP_M_CORE, IAP_F_CC),
1172 IAPDESCR(7DH, 0x7D, IAP_M_CORE, IAP_F_ALLCPUSCORE2),
/freebsd-11.0-release/contrib/llvm/lib/Target/X86/MCTargetDesc/
H A DX86MCCodeEmitter.cpp1009 if (Reg == X86::AH || Reg == X86::BH || Reg == X86::CH || Reg == X86::DH)
/freebsd-11.0-release/contrib/wpa/src/crypto/
H A Dtls_openssl.c2663 wpa_printf(MSG_ERROR, "TLS: openssl does not include DH support, but "
2667 DH *dh;
2678 wpa_printf(MSG_INFO, "TLS: Failed to open DH file '%s': %s",
2687 wpa_printf(MSG_DEBUG, "TLS: Failed to parse DH file '%s': %s -"
2702 wpa_printf(MSG_DEBUG, "TLS: DH file in DSA param format");
2707 "params into DH params");
2714 wpa_printf(MSG_INFO, "TLS: Failed to read/parse DH/DSA file "
2720 wpa_printf(MSG_INFO, "TLS: Failed to set DH params from '%s': "
2737 wpa_printf(MSG_ERROR, "TLS: openssl does not include DH support, but "
2742 DH *d
[all...]
/freebsd-11.0-release/contrib/binutils/opcodes/
H A Di386-dis.c283 #define DH { OP_IMREG, dh_reg } macro

Completed in 271 milliseconds

123