Searched defs:DH (Results 1 - 9 of 9) sorted by relevance

/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/
H A DDH.java6 public class DH class
19 provider.addAlgorithm("KeyPairGenerator.DH", PREFIX + "KeyPairGeneratorSpi");
20 provider.addAlgorithm("Alg.Alias.KeyPairGenerator.DIFFIEHELLMAN", "DH");
22 provider.addAlgorithm("KeyAgreement.DH", PREFIX + "KeyAgreementSpi");
23 provider.addAlgorithm("Alg.Alias.KeyAgreement.DIFFIEHELLMAN", "DH");
25 provider.addAlgorithm("KeyFactory.DH", PREFIX + "KeyFactorySpi");
26 provider.addAlgorithm("Alg.Alias.KeyFactory.DIFFIEHELLMAN", "DH");
28 provider.addAlgorithm("AlgorithmParameters.DH", PREFIX + "AlgorithmParametersSpi");
29 provider.addAlgorithm("Alg.Alias.AlgorithmParameters.DIFFIEHELLMAN", "DH");
31 provider.addAlgorithm("Alg.Alias.AlgorithmParameterGenerator.DIFFIEHELLMAN", "DH");
[all...]
/external/llvm/include/llvm/Support/
H A DSourceMgr.h80 void setDiagHandler(DiagHandlerTy DH, void *Ctx = 0) { argument
81 DiagHandler = DH;
/external/openssl/crypto/bn/asm/
H A Dia64.S1388 #define DH r22 define
1434 shr.u DH=r34,32
1436 { .mii; setf.sig f7=DH
1457 cmp.eq p6,p7=HH,DH };;
1487 cmp.eq p6,p7=HH,DH };;
H A Dmips3.s654 #define DH v1 define
656 dsrl DH,a2,32
666 beq DH,HH,.L_bn_div_words_skip_div1
667 ddivu zero,a0,DH
699 beq DH,HH,.L_bn_div_words_skip_div2
700 ddivu zero,a0,DH
703 #undef DH
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/
H A DKeyAgreementSpi.java291 public static class DH class in class:KeyAgreementSpi
294 public DH() method in class:KeyAgreementSpi.DH
/external/openssl/crypto/
H A Dossl_typ.h134 typedef struct dh_st DH; typedef in typeref:struct:dh_st
/external/openssl/include/openssl/
H A Dossl_typ.h134 typedef struct dh_st DH; typedef in typeref:struct:dh_st
/external/dropbear/libtomcrypt/
H A Dcrypt.tex121 public key cryptography (via PKCS \#1 RSA, DH or ECCDH), and a plethora of support routines.
3604 to attack (no sub-exponential attacks exist unlike normal DH crypto) in fact the fastest attack requires the square root
3847 Note: this function stores only the $x$ co-ordinate of the shared elliptic point as described in ANSI X9.63 ECC--DH.
3850 ECC--DH Encryption is performed by producing a random key, hashing it, and XOR'ing the digest against the plaintext. It is not strictly ANSI X9.63 compliant
3854 \subsection{ECC-DH Encryption}
3875 \subsection{ECC-DH Decryption}
4958 The following chart gives the work factor for solving a DH/RSA public key using the NFS. The work factor for a key of order
4969 \hline RSA/DH Key Size (bits) & Work Factor ($log_2$) \\
4981 \caption{RSA/DH Key Strength}
5007 \hline Security Goal & RSA/DH Ke
[all...]
/external/qemu/
H A Di386-dis.c405 #define DH { OP_IMREG, dh_reg } macro

Completed in 135 milliseconds