/freebsd-11.0-release/crypto/openssl/crypto/bn/asm/ |
H A D | ia64.S | 1388 #define DH r22 define 1434 shr.u DH=r34,32 1436 { .mii; setf.sig f7=DH 1457 cmp.eq p6,p7=HH,DH };; 1487 cmp.eq p6,p7=HH,DH };;
|
H A D | mips.pl | 911 $DH=$v1; 914 $SRL $DH,$a2,4*$BNSZ # bits 925 beq $DH,$HH,.L_bn_div_words_skip_div1 926 $DIVU $zero,$a0,$DH 958 beq $DH,$HH,.L_bn_div_words_skip_div2 959 $DIVU $zero,$a0,$DH 1005 undef $HH; undef $QT; undef $DH;
|
H A D | mips3.s | 654 #define DH v1 define 656 dsrl DH,a2,32 666 beq DH,HH,.L_bn_div_words_skip_div1 667 ddivu zero,a0,DH 699 beq DH,HH,.L_bn_div_words_skip_div2 700 ddivu zero,a0,DH 703 #undef DH
|
/freebsd-11.0-release/crypto/heimdal/kdc/ |
H A D | pkinit.c | 54 DH *key; 333 DH *dh = NULL; 374 krb5_set_error_message(context, ret, "Cannot create DH structure"); 378 dh->p = integer_to_BN(context, "DH prime", &dhparam.p); 381 dh->g = integer_to_BN(context, "DH base", &dhparam.g); 384 dh->q = integer_to_BN(context, "DH p-1 factor", &dhparam.q); 785 "DH not supported for windows"); 837 krb5_set_error_message(context, ret, "PKINIT unknown DH mechanism"); 1114 DH *kdc_dh = cp->u.dh.key; 1203 kdc_log(context, config, 0, "Failed signing the DH* repl [all...] |
/freebsd-11.0-release/crypto/openssl/ssl/ |
H A D | ssl_conf.c | 413 DH *dh = NULL;
|
H A D | s3_clnt.c | 339 /* Check if it is anon DH/ECDH, SRP auth */ 434 * EAY EAY EAY need to check for DH fix cert sent back 1385 DH *dh = NULL; 1807 /* else anonymous DH, so no certificate or pkey. */ 2116 /* TLS does not like anon-DH with client cert */ 2477 static DH *get_server_static_dh_key(SESS_CERT *scert) 2479 DH *dh_srvr = NULL; 2728 DH *dh_srvr, *dh_clnt; 2771 * use the 'p' output buffer for the DH key, but make sure to 3375 * cert exists, if we have a suitable digest for TLS 1.2 if static DH clien [all...] |
H A D | s3_srvr.c | 421 /* Check if it is anon DH or anon ECDH, */ 460 * only send if a DH key exchange, fortezza or RSA but we have a 1607 DH *dh = NULL, *dhp; 2171 DH *dh_srvr, *dh_clnt = NULL; 2295 * protocol does not offer such protection for DH ciphersuites). 2578 * the protocol does not offer such protection for DH 3002 * DH). In that case the ClientKeyExchange processing will skip the
|
H A D | ssl.h | 273 # define SSL_TXT_DH "DH" 2520 DH *(*dh) (SSL *ssl, int is_export, 2523 DH *(*dh) (SSL *ssl, int is_export,
|
H A D | ssl_lib.c | 3365 * \brief Set the callback for generating temporary DH keys. 3372 DH *(*dh) (SSL *ssl, int is_export, 3378 void SSL_set_tmp_dh_callback(SSL *ssl, DH *(*dh) (SSL *ssl, int is_export,
|
/freebsd-11.0-release/contrib/llvm/lib/DebugInfo/PDB/ |
H A D | PDBExtras.cpp | 102 CASE_OUTPUT_ENUM_CLASS_NAME(PDB_RegisterId, DH, OS)
|
/freebsd-11.0-release/contrib/llvm/lib/Target/X86/Disassembler/ |
H A D | X86DisassemblerDecoder.h | 83 ENTRY(DH) \
|
/freebsd-11.0-release/crypto/heimdal/lib/krb5/ |
H A D | pkinit.c | 65 DH *dh; 133 select_dh_group(krb5_context context, DH *dh, unsigned long bits, 150 N_("Did not find a DH group parameter " 451 N_("pkinit: failed to generate DH key", "")); 479 DH *dh = ctx->u.dh; 1362 "KDC DH Key Info", "")); 1369 N_("PKINIT: DH nonce is wrong", "")); 1384 N_("pkinit; got DH reuse but no " 1497 N_("PKINIT: resulting DH key <= 0", "")); 1517 N_("PKINIT: can't create key from DH ke [all...] |
/freebsd-11.0-release/crypto/openssl/engines/ |
H A D | e_sureware.c | 150 static int surewarehk_modexp_dh(const DH *dh, BIGNUM *r, const BIGNUM *a, 158 "SureWare DH method", 885 * This cleans up an DH KM key (destroys the key into hardware), called when
|
/freebsd-11.0-release/crypto/openssh/ |
H A D | monitor_wrap.c | 183 DH *
|
H A D | monitor.c | 648 DH *dh;
|
/freebsd-11.0-release/contrib/unbound/daemon/ |
H A D | remote.c | 144 * (some openssl versions reject DH that is 'too small', eg. 512). 147 DH *get_dh1024() 175 DH *dh; 232 * DH params, let's generate and set them 235 log_crypto_err("Wanted to set DH param, but failed");
|
/freebsd-11.0-release/sys/boot/pc98/cdboot/ |
H A D | cdboot.S | 657 # Load DH sectors starting at LBA EAX into [EBX].
|
/freebsd-11.0-release/sys/dev/hwpmc/ |
H A D | hwpmc_core.c | 1126 IAPDESCR(6DH, 0x6D, IAP_M_AGENT | IAP_M_CORE, IAP_F_CA | IAP_F_CC2), 1127 IAPDESCR(6DH, 0x6D, IAP_M_CORE, IAP_F_CC), 1172 IAPDESCR(7DH, 0x7D, IAP_M_CORE, IAP_F_ALLCPUSCORE2),
|
/freebsd-11.0-release/contrib/llvm/lib/Target/X86/MCTargetDesc/ |
H A D | X86MCCodeEmitter.cpp | 1009 if (Reg == X86::AH || Reg == X86::BH || Reg == X86::CH || Reg == X86::DH)
|
/freebsd-11.0-release/contrib/wpa/src/crypto/ |
H A D | tls_openssl.c | 2663 wpa_printf(MSG_ERROR, "TLS: openssl does not include DH support, but " 2667 DH *dh; 2678 wpa_printf(MSG_INFO, "TLS: Failed to open DH file '%s': %s", 2687 wpa_printf(MSG_DEBUG, "TLS: Failed to parse DH file '%s': %s -" 2702 wpa_printf(MSG_DEBUG, "TLS: DH file in DSA param format"); 2707 "params into DH params"); 2714 wpa_printf(MSG_INFO, "TLS: Failed to read/parse DH/DSA file " 2720 wpa_printf(MSG_INFO, "TLS: Failed to set DH params from '%s': " 2737 wpa_printf(MSG_ERROR, "TLS: openssl does not include DH support, but " 2742 DH *d [all...] |
/freebsd-11.0-release/contrib/binutils/opcodes/ |
H A D | i386-dis.c | 283 #define DH { OP_IMREG, dh_reg } macro
|