Lines Matching +full:2 +full:x32 +full:- +full:bit
2 * Diffie-Hellman groups
19 /* RFC 4306, B.1. Group 1 - 768 Bit MODP
20 * Generator: 2
21 * Prime: 2^768 - 2 ^704 - 1 + 2^64 * { [2^638 pi] + 149686 }
53 /* RFC 4306, B.2. Group 2 - 1024 Bit MODP
54 * Generator: 2
55 * Prime: 2^1024 - 2^960 - 1 + 2^64 * { [2^894 pi] + 129093 }
97 /* RFC 3526, 2. Group 5 - 1536 Bit MODP
98 * Generator: 2
99 * Prime: 2^1536 - 2^1472 - 1 + 2^64 * { [2^1406 pi] + 741804 }
157 /* RFC 3526, 3. Group 14 - 2048 Bit MODP
158 * Generator: 2
159 * Prime: 2^2048 - 2^1984 - 1 + 2^64 * { [2^1918 pi] + 124476 }
186 0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B,
231 /* RFC 3526, 4. Group 15 - 3072 Bit MODP
232 * Generator: 2
233 * Prime: 2^3072 - 2^3008 - 1 + 2^64 * { [2^2942 pi] + 1690314 }
260 0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B,
319 0xD4, 0x2A, 0x90, 0xD5, 0xEF, 0x8E, 0x5D, 0x32,
326 0xF8, 0x97, 0xFD, 0x03, 0x6C, 0xC5, 0x04, 0x32,
327 0x6C, 0x3B, 0x01, 0x39, 0x9F, 0x64, 0x35, 0x32,
337 /* RFC 3526, 5. Group 16 - 4096 Bit MODP
338 * Generator: 2
339 * Prime: 2^4096 - 2^4032 - 1 + 2^64 * { [2^3966 pi] + 240904 }
366 0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B,
441 0xD4, 0x2A, 0x90, 0xD5, 0xEF, 0x8E, 0x5D, 0x32,
448 0xF8, 0x97, 0xFD, 0x03, 0x6C, 0xC5, 0x04, 0x32,
449 0x6C, 0x3B, 0x01, 0x39, 0x9F, 0x64, 0x35, 0x32,
475 /* RFC 3526, 6. Group 17 - 6144 Bit MODP
476 * Generator: 2
477 * Prime: 2^6144 - 2^6080 - 1 + 2^64 * { [2^6014 pi] + 929484 }
504 0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B,
557 0xF0, 0x32, 0xEA, 0x15, 0xD1, 0x72, 0x1D, 0x03,
571 0xDA, 0x56, 0xC9, 0xEC, 0x2E, 0xF2, 0x96, 0x32,
611 0xD4, 0x2A, 0x90, 0xD5, 0xEF, 0x8E, 0x5D, 0x32,
618 0xF8, 0x97, 0xFD, 0x03, 0x6C, 0xC5, 0x04, 0x32,
619 0x6C, 0x3B, 0x01, 0x39, 0x9F, 0x64, 0x35, 0x32,
677 /* RFC 3526, 7. Group 18 - 8192 Bit MODP
678 * Generator: 2
679 * Prime: 2^8192 - 2^8128 - 1 + 2^64 * { [2^8062 pi] + 4743158 }
706 0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B,
759 0xF0, 0x32, 0xEA, 0x15, 0xD1, 0x72, 0x1D, 0x03,
773 0xDA, 0x56, 0xC9, 0xEC, 0x2E, 0xF2, 0x96, 0x32,
779 0x38, 0x77, 0x7C, 0xB6, 0xA9, 0x32, 0xDF, 0x8C,
781 0x3B, 0xC8, 0x32, 0xB6, 0x8D, 0x9D, 0xD3, 0x00,
845 0xD4, 0x2A, 0x90, 0xD5, 0xEF, 0x8E, 0x5D, 0x32,
852 0xF8, 0x97, 0xFD, 0x03, 0x6C, 0xC5, 0x04, 0x32,
853 0x6C, 0x3B, 0x01, 0x39, 0x9F, 0x64, 0x35, 0x32,
920 0x9A, 0x39, 0xFE, 0x32, 0x36, 0x75, 0x18, 0x35,
945 * Group 22 - 1024-bit MODP Group with 160-bit Prime Order Subgroup
991 * Group 23 - 2048-bit MODP Group with 224-bit Prime Order Subgroup
994 0xAC, 0x40, 0x32, 0xEF, 0x4F, 0x2D, 0x9A, 0xE3,
1049 0xCD, 0xF9, 0x3A, 0xCC, 0x44, 0x32, 0x83, 0x87,
1070 * Group 24 - 2048-bit MODP Group with 256-bit Prime Order Subgroup
1160 DH_GROUP(2, 1),
1188 * dh_init - Initialize Diffie-Hellman handshake
1189 * @dh: Selected Diffie-Hellman group
1190 * @priv: Pointer for returning Diffie-Hellman private key
1191 * Returns: Diffie-Hellman public value
1202 *priv = wpabuf_alloc(dh->prime_len); in dh_init()
1206 pv_len = dh->prime_len; in dh_init()
1213 if (crypto_dh_init(*dh->generator, dh->prime, dh->prime_len, in dh_init()
1221 wpabuf_put(*priv, dh->prime_len); in dh_init()
1222 wpabuf_put(pv, dh->prime_len); in dh_init()
1231 * dh_derive_shared - Derive shared Diffie-Hellman key
1232 * @peer_public: Diffie-Hellman public value from peer
1233 * @own_private: Diffie-Hellman private key from dh_init()
1234 * @dh: Selected Diffie-Hellman group
1235 * Returns: Diffie-Hellman shared key
1247 shared_len = dh->prime_len; in dh_derive_shared()
1251 if (crypto_dh_derive_secret(*dh->generator, dh->prime, dh->prime_len, in dh_derive_shared()
1252 dh->order, dh->order_len, in dh_derive_shared()