/freebsd-11.0-release/crypto/openssh/ |
H A D | dh.h | 35 DH *choose_dh(int, int, int); 36 DH *dh_new_group_asc(const char *, const char *); 37 DH *dh_new_group(BIGNUM *, BIGNUM *); 38 DH *dh_new_group1(void); 39 DH *dh_new_group14(void); 40 DH *dh_new_group_fallback(int); 42 int dh_gen_key(DH *, int); 43 int dh_pub_is_valid(DH *, BIGNUM *); 49 * Miniumum increased in light of DH precomputation attacks.
|
H A D | dh.c | 145 DH * 216 dh_pub_is_valid(DH *dh, BIGNUM *dh_pub) 224 logit("invalid public DH value: negative"); 228 logit("invalid public DH value: <= 1"); 239 logit("invalid public DH value: >= p-1"); 253 logit("invalid public DH value (%d/%d)", bits_set, BN_num_bits(dh->p)); 258 dh_gen_key(DH *dh, int need) 275 DH * 278 DH *dh; 295 DH * [all...] |
H A D | monitor_wrap.h | 42 DH *mm_choose_dh(int, int, int);
|
H A D | kex.h | 154 DH *dh; /* DH */
|
/freebsd-11.0-release/crypto/openssl/crypto/dh/ |
H A D | dh.h | 65 # error DH is disabled. 83 * new with 0.9.7h; the built-in DH 93 * If this flag is set the DH method is FIPS compliant and can be used in 114 /* typedef struct dh_st DH; */ 120 int (*generate_key) (DH *dh); 121 int (*compute_key) (unsigned char *key, const BIGNUM *pub_key, DH *dh); 123 int (*bn_mod_exp) (const DH *dh, BIGNUM *r, const BIGNUM *a, 126 int (*init) (DH *dh); 127 int (*finish) (DH *dh); 131 int (*generate_params) (DH *d [all...] |
H A D | dh_depr.c | 66 DH *DH_generate_parameters(int prime_len, int generator, 70 DH *ret = NULL;
|
H A D | dh_asn1.c | 77 DH_free((DH *)*pval); 85 ASN1_SIMPLE(DH, p, BIGNUM), 86 ASN1_SIMPLE(DH, g, BIGNUM), 87 ASN1_OPT(DH, length, ZLONG), 88 } ASN1_SEQUENCE_END_cb(DH, DHparams) 90 IMPLEMENT_ASN1_ENCODE_FUNCTIONS_const_fname(DH, DHparams, DHparams) 93 * Internal only structures for handling X9.42 DH: this gets translated to or 94 * from a DH structure straight away. 129 /* Application leve function: read in X9.42 DH parameters into DH structur [all...] |
H A D | dh_key.c | 65 static int generate_key(DH *dh); 66 static int compute_key(unsigned char *key, const BIGNUM *pub_key, DH *dh); 67 static int dh_bn_mod_exp(const DH *dh, BIGNUM *r, 70 static int dh_init(DH *dh); 71 static int dh_finish(DH *dh); 73 int DH_generate_key(DH *dh) 85 int DH_compute_key(unsigned char *key, const BIGNUM *pub_key, DH *dh) 97 int DH_compute_key_padded(unsigned char *key, const BIGNUM *pub_key, DH *dh) 112 "OpenSSL DH Method", 128 static int generate_key(DH *d [all...] |
H A D | dh_prn.c | 65 int DHparams_print_fp(FILE *fp, const DH *x)
|
H A D | dh_lib.c | 95 int DH_set_method(DH *dh, const DH_METHOD *meth) 117 DH *DH_new(void) 122 DH *DH_new_method(ENGINE *engine) 124 DH *ret; 126 ret = (DH *)OPENSSL_malloc(sizeof(DH)); 182 void DH_free(DH *r) 189 REF_PRINT("DH", r); 228 int DH_up_ref(DH *r) 232 REF_PRINT("DH", [all...] |
H A D | dh_gen.c | 73 static int dh_builtin_genparams(DH *ret, int prime_len, int generator, 76 int DH_generate_parameters_ex(DH *ret, int prime_len, int generator, 96 * We generate DH parameters as follows 114 * Since DH should be using a safe prime (both p and q are prime), 122 static int dh_builtin_genparams(DH *ret, int prime_len, int generator,
|
H A D | p192.c | 73 DH *dh;
|
H A D | p512.c | 78 DH *dh;
|
H A D | dh_ameth.c | 73 * i2d/d2i like DH parameter functions which use the appropriate routine for 74 * PKCS#3 DH or X9.42 DH. 77 static DH *d2i_dhp(const EVP_PKEY *pkey, const unsigned char **pp, 85 static int i2d_dhp(const EVP_PKEY *pkey, const DH *a, unsigned char **pp) 107 DH *dh = NULL; 153 DH *dh; 201 * PKCS#8 DH is defined in PKCS#11 of all places. It is similar to DH in that 216 DH *d [all...] |
H A D | dh_check.c | 74 int DH_check(const DH *dh, int *ret) 151 int DH_check_pub_key(const DH *dh, const BIGNUM *pub_key, int *ret)
|
H A D | p1024.c | 85 DH *dh;
|
H A D | dh_pmeth.c | 72 /* DH pkey context structure */ 85 /* KDF (if any) to use for DH */ 354 DH *dh = NULL; 413 DH *dh = NULL; 432 DH *dh;
|
/freebsd-11.0-release/crypto/openssl/crypto/pem/ |
H A D | pem_pkey.c | 250 /* Transparently read in PKCS#3 or X9.42 DH parameters */ 252 DH *PEM_read_bio_DHparams(BIO *bp, DH **x, pem_password_cb *cb, void *u) 258 DH *ret = NULL; 277 DH *PEM_read_DHparams(FILE *fp, DH **x, pem_password_cb *cb, void *u) 280 DH *ret;
|
/freebsd-11.0-release/contrib/llvm/tools/llvm-readobj/ |
H A D | COFFDumper.cpp | 70 void printDOSHeader(const dos_header *DH); 399 if (const dos_header *DH = Obj->getDOSHeader()) 400 printDOSHeader(DH); 403 void COFFDumper::printDOSHeader(const dos_header *DH) { argument 405 W.printString("Magic", StringRef(DH->Magic, sizeof(DH->Magic))); 406 W.printNumber("UsedBytesInTheLastPage", DH->UsedBytesInTheLastPage); 407 W.printNumber("FileSizeInPages", DH->FileSizeInPages); 408 W.printNumber("NumberOfRelocationItems", DH->NumberOfRelocationItems); 409 W.printNumber("HeaderSizeInParagraphs", DH [all...] |
/freebsd-11.0-release/contrib/llvm/lib/Target/X86/MCTargetDesc/ |
H A D | X86MCTargetDesc.cpp | 290 case X86::DH: case X86::DL: case X86::DX: case X86::EDX: case X86::RDX: 291 return X86::DH; 302 case X86::DH: case X86::DL: case X86::DX: case X86::EDX: case X86::RDX: 339 case X86::DH: case X86::DL: case X86::DX: case X86::EDX: case X86::RDX: 375 case X86::DH: case X86::DL: case X86::DX: case X86::EDX: case X86::RDX: 411 case X86::DH: case X86::DL: case X86::DX: case X86::EDX: case X86::RDX:
|
/freebsd-11.0-release/crypto/openssl/engines/ccgost/ |
H A D | gost94_keyx.c | 33 DH *dh) 56 DH *dh = DH_new();
|
/freebsd-11.0-release/contrib/llvm/include/llvm/Support/ |
H A D | SourceMgr.h | 89 void setDiagHandler(DiagHandlerTy DH, void *Ctx = nullptr) { argument 90 DiagHandler = DH;
|
/freebsd-11.0-release/crypto/openssl/crypto/dsa/ |
H A D | dsa_lib.c | 290 DH *DSA_dup_DH(const DSA *r) 293 * DSA has p, q, g, optional pub_key, optional priv_key. DH has p, 297 DH *ret = NULL;
|
/freebsd-11.0-release/crypto/openssl/crypto/ |
H A D | ossl_typ.h | 140 typedef struct dh_st DH; typedef in typeref:struct:dh_st
|
/freebsd-11.0-release/crypto/openssl/apps/ |
H A D | gendh.c | 94 DH *dh = NULL; 195 "Generating DH parameters, %d bit long safe prime, generator %d\n",
|