Searched defs:DH (Results 1 - 9 of 9) sorted by relevance
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ |
H A D | DH.java | 6 public class DH class 19 provider.addAlgorithm("KeyPairGenerator.DH", PREFIX + "KeyPairGeneratorSpi"); 20 provider.addAlgorithm("Alg.Alias.KeyPairGenerator.DIFFIEHELLMAN", "DH"); 22 provider.addAlgorithm("KeyAgreement.DH", PREFIX + "KeyAgreementSpi"); 23 provider.addAlgorithm("Alg.Alias.KeyAgreement.DIFFIEHELLMAN", "DH"); 25 provider.addAlgorithm("KeyFactory.DH", PREFIX + "KeyFactorySpi"); 26 provider.addAlgorithm("Alg.Alias.KeyFactory.DIFFIEHELLMAN", "DH"); 28 provider.addAlgorithm("AlgorithmParameters.DH", PREFIX + "AlgorithmParametersSpi"); 29 provider.addAlgorithm("Alg.Alias.AlgorithmParameters.DIFFIEHELLMAN", "DH"); 31 provider.addAlgorithm("Alg.Alias.AlgorithmParameterGenerator.DIFFIEHELLMAN", "DH"); [all...] |
/external/llvm/include/llvm/Support/ |
H A D | SourceMgr.h | 80 void setDiagHandler(DiagHandlerTy DH, void *Ctx = 0) { argument 81 DiagHandler = DH;
|
/external/openssl/crypto/bn/asm/ |
H A D | ia64.S | 1388 #define DH r22 define 1434 shr.u DH=r34,32 1436 { .mii; setf.sig f7=DH 1457 cmp.eq p6,p7=HH,DH };; 1487 cmp.eq p6,p7=HH,DH };;
|
H A D | mips3.s | 654 #define DH v1 define 656 dsrl DH,a2,32 666 beq DH,HH,.L_bn_div_words_skip_div1 667 ddivu zero,a0,DH 699 beq DH,HH,.L_bn_div_words_skip_div2 700 ddivu zero,a0,DH 703 #undef DH
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/ |
H A D | KeyAgreementSpi.java | 291 public static class DH class in class:KeyAgreementSpi 294 public DH() method in class:KeyAgreementSpi.DH
|
/external/openssl/crypto/ |
H A D | ossl_typ.h | 134 typedef struct dh_st DH; typedef in typeref:struct:dh_st
|
/external/openssl/include/openssl/ |
H A D | ossl_typ.h | 134 typedef struct dh_st DH; typedef in typeref:struct:dh_st
|
/external/dropbear/libtomcrypt/ |
H A D | crypt.tex | 121 public key cryptography (via PKCS \#1 RSA, DH or ECCDH), and a plethora of support routines. 3604 to attack (no sub-exponential attacks exist unlike normal DH crypto) in fact the fastest attack requires the square root 3847 Note: this function stores only the $x$ co-ordinate of the shared elliptic point as described in ANSI X9.63 ECC--DH. 3850 ECC--DH Encryption is performed by producing a random key, hashing it, and XOR'ing the digest against the plaintext. It is not strictly ANSI X9.63 compliant 3854 \subsection{ECC-DH Encryption} 3875 \subsection{ECC-DH Decryption} 4958 The following chart gives the work factor for solving a DH/RSA public key using the NFS. The work factor for a key of order 4969 \hline RSA/DH Key Size (bits) & Work Factor ($log_2$) \\ 4981 \caption{RSA/DH Key Strength} 5007 \hline Security Goal & RSA/DH Ke [all...] |
/external/qemu/ |
H A D | i386-dis.c | 405 #define DH { OP_IMREG, dh_reg } macro
|
Completed in 135 milliseconds