Lines Matching +full:1 +full:x64 +full:- +full:bit
2 * Diffie-Hellman groups
19 /* RFC 4306, B.1. Group 1 - 768 Bit MODP
21 * Prime: 2^768 - 2 ^704 - 1 + 2^64 * { [2^638 pi] + 149686 }
23 static const u8 dh_group1_generator[1] = { 0x02 };
53 /* RFC 4306, B.2. Group 2 - 1024 Bit MODP
55 * Prime: 2^1024 - 2^960 - 1 + 2^64 * { [2^894 pi] + 129093 }
57 static const u8 dh_group2_generator[1] = { 0x02 };
97 /* RFC 3526, 2. Group 5 - 1536 Bit MODP
99 * Prime: 2^1536 - 2^1472 - 1 + 2^64 * { [2^1406 pi] + 741804 }
101 static const u8 dh_group5_generator[1] = { 0x02 };
157 /* RFC 3526, 3. Group 14 - 2048 Bit MODP
159 * Prime: 2^2048 - 2^1984 - 1 + 2^64 * { [2^1918 pi] + 124476 }
161 static const u8 dh_group14_generator[1] = { 0x02 };
223 0xDA, 0xE2, 0xAE, 0xF8, 0x37, 0xA6, 0x29, 0x64,
231 /* RFC 3526, 4. Group 15 - 3072 Bit MODP
233 * Prime: 2^3072 - 2^3008 - 1 + 2^64 * { [2^2942 pi] + 1690314 }
235 static const u8 dh_group15_generator[1] = { 0x02 };
269 0xA8, 0x55, 0x21, 0xAB, 0xDF, 0x1C, 0xBA, 0x64,
276 0xF1, 0x2F, 0xFA, 0x06, 0xD9, 0x8A, 0x08, 0x64,
277 0xD8, 0x76, 0x02, 0x73, 0x3E, 0xC8, 0x6A, 0x64,
313 0xDA, 0xE2, 0xAE, 0xF8, 0x37, 0xA6, 0x29, 0x64,
327 0x6C, 0x3B, 0x01, 0x39, 0x9F, 0x64, 0x35, 0x32,
337 /* RFC 3526, 5. Group 16 - 4096 Bit MODP
339 * Prime: 2^4096 - 2^4032 - 1 + 2^64 * { [2^3966 pi] + 240904 }
341 static const u8 dh_group16_generator[1] = { 0x02 };
375 0xA8, 0x55, 0x21, 0xAB, 0xDF, 0x1C, 0xBA, 0x64,
382 0xF1, 0x2F, 0xFA, 0x06, 0xD9, 0x8A, 0x08, 0x64,
383 0xD8, 0x76, 0x02, 0x73, 0x3E, 0xC8, 0x6A, 0x64,
435 0xDA, 0xE2, 0xAE, 0xF8, 0x37, 0xA6, 0x29, 0x64,
449 0x6C, 0x3B, 0x01, 0x39, 0x9F, 0x64, 0x35, 0x32,
475 /* RFC 3526, 6. Group 17 - 6144 Bit MODP
477 * Prime: 2^6144 - 2^6080 - 1 + 2^64 * { [2^6014 pi] + 929484 }
479 static const u8 dh_group17_generator[1] = { 0x02 };
513 0xA8, 0x55, 0x21, 0xAB, 0xDF, 0x1C, 0xBA, 0x64,
520 0xF1, 0x2F, 0xFA, 0x06, 0xD9, 0x8A, 0x08, 0x64,
521 0xD8, 0x76, 0x02, 0x73, 0x3E, 0xC8, 0x6A, 0x64,
605 0xDA, 0xE2, 0xAE, 0xF8, 0x37, 0xA6, 0x29, 0x64,
619 0x6C, 0x3B, 0x01, 0x39, 0x9F, 0x64, 0x35, 0x32,
644 0x64, 0xBA, 0x8F, 0x3B, 0x1E, 0xDD, 0x1B, 0xDE,
669 0x6D, 0x2B, 0x64, 0xF6, 0x17, 0x79, 0x4B, 0x19,
677 /* RFC 3526, 7. Group 18 - 8192 Bit MODP
679 * Prime: 2^8192 - 2^8128 - 1 + 2^64 * { [2^8062 pi] + 4743158 }
681 static const u8 dh_group18_generator[1] = { 0x02 };
715 0xA8, 0x55, 0x21, 0xAB, 0xDF, 0x1C, 0xBA, 0x64,
722 0xF1, 0x2F, 0xFA, 0x06, 0xD9, 0x8A, 0x08, 0x64,
723 0xD8, 0x76, 0x02, 0x73, 0x3E, 0xC8, 0x6A, 0x64,
790 0x34, 0x73, 0xFC, 0x64, 0x6C, 0xEA, 0x30, 0x6B,
798 0x64, 0xF3, 0x1C, 0xC5, 0x08, 0x46, 0x85, 0x1D,
839 0xDA, 0xE2, 0xAE, 0xF8, 0x37, 0xA6, 0x29, 0x64,
853 0x6C, 0x3B, 0x01, 0x39, 0x9F, 0x64, 0x35, 0x32,
878 0x64, 0xBA, 0x8F, 0x3B, 0x1E, 0xDD, 0x1B, 0xDE,
903 0x6D, 0x2B, 0x64, 0xF6, 0x17, 0x79, 0x4B, 0x19,
939 0xB0, 0x64, 0xC0, 0x6E, 0xCC, 0x76, 0xE9, 0xEF,
945 * Group 22 - 1024-bit MODP Group with 160-bit Prime Order Subgroup
976 0x4E, 0xFF, 0xD6, 0xFA, 0xE5, 0x64, 0x47, 0x38,
985 0x8A, 0xBA, 0x4E, 0x7D, 0x64, 0xB7, 0xCB, 0x9D,
991 * Group 23 - 2048-bit MODP Group with 224-bit Prime Order Subgroup
1030 0xA2, 0x0D, 0x64, 0xE5, 0x68, 0x3B, 0x9F, 0xD1,
1070 * Group 24 - 2048-bit MODP Group with 256-bit Prime Order Subgroup
1087 0x64, 0xE6, 0x79, 0x82, 0x42, 0x8E, 0xBC, 0x83,
1089 0xB5, 0x04, 0x5A, 0xF2, 0x76, 0x71, 0x64, 0xE1,
1097 0xB3, 0x35, 0x3B, 0xBB, 0x64, 0xE0, 0xEC, 0x37,
1115 0x20, 0x9E, 0x0C, 0x64, 0x97, 0x51, 0x7A, 0xBD,
1128 0x67, 0xE1, 0x44, 0xE5, 0x14, 0x05, 0x64, 0x25,
1144 0xA3, 0x08, 0xB0, 0xFE, 0x64, 0xF5, 0xFB, 0xD3
1157 DH_GROUP(5, 1),
1159 DH_GROUP(1, 1),
1160 DH_GROUP(2, 1),
1161 DH_GROUP(14, 1),
1162 DH_GROUP(15, 1),
1163 DH_GROUP(16, 1),
1164 DH_GROUP(17, 1),
1165 DH_GROUP(18, 1),
1188 * dh_init - Initialize Diffie-Hellman handshake
1189 * @dh: Selected Diffie-Hellman group
1190 * @priv: Pointer for returning Diffie-Hellman private key
1191 * Returns: Diffie-Hellman public value
1202 *priv = wpabuf_alloc(dh->prime_len); in dh_init()
1206 pv_len = dh->prime_len; in dh_init()
1213 if (crypto_dh_init(*dh->generator, dh->prime, dh->prime_len, in dh_init()
1221 wpabuf_put(*priv, dh->prime_len); in dh_init()
1222 wpabuf_put(pv, dh->prime_len); in dh_init()
1231 * dh_derive_shared - Derive shared Diffie-Hellman key
1232 * @peer_public: Diffie-Hellman public value from peer
1233 * @own_private: Diffie-Hellman private key from dh_init()
1234 * @dh: Selected Diffie-Hellman group
1235 * Returns: Diffie-Hellman shared key
1247 shared_len = dh->prime_len; in dh_derive_shared()
1251 if (crypto_dh_derive_secret(*dh->generator, dh->prime, dh->prime_len, in dh_derive_shared()
1252 dh->order, dh->order_len, in dh_derive_shared()