Lines Matching +full:gen +full:- +full:2
10 * 2. Redistributions in binary form must reproduce the above copyright
46 #include "openbsd-compat/openssl-compat.h"
64 char *strsize, *gen, *prime; in parse_prime() local
68 dhg->p = dhg->g = NULL; in parse_prime()
110 (dhg->size = (int)strtonum(strsize, 0, 64*1024, &errstr)) == 0 || in parse_prime()
116 dhg->size++; in parse_prime()
117 gen = strsep(&cp, " "); /* gen */ in parse_prime()
118 if (cp == NULL || *gen == '\0') in parse_prime()
127 if ((dhg->g = BN_new()) == NULL || in parse_prime()
128 (dhg->p = BN_new()) == NULL) { in parse_prime()
132 if (BN_hex2bn(&dhg->g, gen) == 0) { in parse_prime()
136 if (BN_hex2bn(&dhg->p, prime) == 0) { in parse_prime()
140 if (BN_num_bits(dhg->p) != dhg->size) { in parse_prime()
142 linenum, BN_num_bits(dhg->p), dhg->size - 1); in parse_prime()
145 if (BN_cmp(dhg->g, BN_value_one()) <= 0) { in parse_prime()
152 BN_clear_free(dhg->g); in parse_prime()
153 BN_clear_free(dhg->p); in parse_prime()
154 dhg->g = dhg->p = NULL; in parse_prime()
175 while (getline(&line, &linesize, f) != -1) { in choose_dh()
208 while (getline(&line, &linesize, f) != -1) { in choose_dh()
233 /* diffie-hellman-groupN-sha1 */
260 BN_cmp(dh_pub, tmp) != -1) { /* pub_exp > p-2 */ in dh_pub_is_valid()
262 logit("invalid public DH value: >= p-1"); in dh_pub_is_valid()
273 * if g==2 and bits_set==1 then computing log_g(dh_pub) is trivial in dh_pub_is_valid()
293 need > INT_MAX / 2 || 2 * need > pbits) in dh_gen_key()
301 if (!DH_set_length(dh, MINIMUM(need * 2, pbits - 1))) in dh_gen_key()
313 dh_new_group_asc(const char *gen, const char *modulus) in dh_new_group_asc() argument
321 BN_hex2bn(&dh_g, gen) == 0) in dh_new_group_asc()
338 dh_new_group(BIGNUM *gen, BIGNUM *modulus) in dh_new_group() argument
344 if (!DH_set0_pqg(dh, modulus, NULL, gen)) { in dh_new_group()
356 static char *gen = "2", *group1 = in dh_new_group1() local
364 return (dh_new_group_asc(gen, group1)); in dh_new_group1()
367 /* rfc3526 group 14 "2048-bit MODP Group" */
371 static char *gen = "2", *group14 = in dh_new_group14() local
379 "670C354E" "4ABC9804" "F1746C08" "CA18217C" "32905E46" "2E36CE3B" in dh_new_group14()
384 return (dh_new_group_asc(gen, group14)); in dh_new_group14()
387 /* rfc3526 group 16 "4096-bit MODP Group" */
391 static char *gen = "2", *group16 = in dh_new_group16() local
399 "670C354E" "4ABC9804" "F1746C08" "CA18217C" "32905E46" "2E36CE3B" in dh_new_group16()
409 "2583E9CA" "2AD44CE8" "DBBBC2DB" "04DE8EF9" "2E8EFC14" "1FBECAA6" in dh_new_group16()
415 return (dh_new_group_asc(gen, group16)); in dh_new_group16()
418 /* rfc3526 group 18 "8192-bit MODP Group" */
422 static char *gen = "2", *group18 = in dh_new_group18() local
430 "670C354E" "4ABC9804" "F1746C08" "CA18217C" "32905E46" "2E36CE3B" in dh_new_group18()
440 "2583E9CA" "2AD44CE8" "DBBBC2DB" "04DE8EF9" "2E8EFC14" "1FBECAA6" in dh_new_group18()
447 "DB7F1447" "E6CC254B" "33205151" "2BD7AF42" "6FB8F401" "378CD2BF" in dh_new_group18()
450 "23A97A7E" "36CC88BE" "0F1D45B7" "FF585AC5" "4BD407B2" "2B4154AA" in dh_new_group18()
453 "DA56C9EC" "2EF29632" "387FE8D7" "6E3C0468" "043E8F66" "3F4860EE" in dh_new_group18()
457 "3423B474" "2BF1C978" "238F16CB" "E39D652D" "E3FDB8BE" "FC848AD9" in dh_new_group18()
459 "4BCBC886" "2F8385DD" "FA9D4B7F" "A2C087E8" "79683303" "ED5BDD3A" in dh_new_group18()
467 return (dh_new_group_asc(gen, group18)); in dh_new_group18()
470 /* Select fallback group used by DH-GEX if moduli file cannot be read. */
476 debug3("using 2k bit group 14"); in dh_new_group_fallback()
487 * Estimates the group order for a Diffie-Hellman group that has an
488 * attack complexity approximately the same as O(2**bits).
489 * Values from NIST Special Publication 800-57: Recommendation for Key