|
@@ -16,61 +16,60 @@ cipherblowfish.c:62: 8,
|
|
|
cipherrc4.c:21: setupRC4state(&cs->state, c->s2cek, 16);
|
|
|
cipherrc4.c:23: setupRC4state(&cs->state, c->c2sek, 16);
|
|
|
cipherrc4.c:41: 8,
|
|
|
-dh.c:21: "29024E088A67CC74020BBEA63B139B22514A08798E3404DD"
|
|
|
-dh.c:28: * 2048-bit MODP group (id 14) from RFC 3526
|
|
|
-dh.c:32: "29024E088A67CC74020BBEA63B139B22514A08798E3404DD"
|
|
|
-dh.c:37: "83655D23DCA3AD961C62F356208552BB9ED529077096966D"
|
|
|
-dh.c:38: "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B"
|
|
|
-dh.c:41: "15728E5A8AACAA68FFFFFFFFFFFFFFFF";
|
|
|
-dh.c:60: two = strtomp("2", nil, 10, nil);
|
|
|
-dh.c:61: p1 = strtomp(group1p, nil, 16, nil);
|
|
|
-dh.c:62: p14 = strtomp(group14p, nil, 16, nil);
|
|
|
-dh.c:103: myrsakey.pub.n = strtomp(p+3, nil, 16, nil);
|
|
|
-dh.c:114: myrsakey.pub.ek = strtomp(p+4, nil, 16, nil);
|
|
|
-dh.c:127: myrsakey.dk = strtomp(p+5, nil, 16, nil);
|
|
|
-dh.c:170: mydsskey.pub.p = strtomp(p+3, nil, 16, nil);
|
|
|
-dh.c:177: mydsskey.pub.q = strtomp(p+3, nil, 16, nil);
|
|
|
-dh.c:184: mydsskey.pub.alpha = strtomp(p+7, nil, 16, nil);
|
|
|
-dh.c:191: mydsskey.pub.key = strtomp(p+5, nil, 16, nil);
|
|
|
-dh.c:202: mydsskey.secret = strtomp(p+9, nil, 16, nil);
|
|
|
-dh.c:233: n = nb - (nelem(sha1der) + SHA1dlen) - 3;
|
|
|
-dh.c:257: n = (nbit + 7) / 8;
|
|
|
-dh.c:260: /* Compute s: RFC 3447 */
|
|
|
-dh.c:276: auth_rpc(ar, "start", "role=sign proto=rsa", 19) != ARok ||
|
|
|
-dh.c:319: n = (nbit + 7) / 8;
|
|
|
-dh.c:321: /* Compute s: RFC 3447 */
|
|
|
-dh.c:324: s = mpnew(1024);
|
|
|
-dh.c:341: buf = emalloc9p(Blobsz / 2);
|
|
|
-dh.c:343: p = (char *)get_string(nil, (uchar *)sig, buf, Blobsz / 2, nil);
|
|
|
-dh.c:397: uchar sstr[2*SHA1dlen];
|
|
|
-dh.c:415: auth_rpc(ar, "start", "role=sign proto=dsa", 19) != ARok ||
|
|
|
-dh.c:427: add_block(sig, sstr, 2*SHA1dlen);
|
|
|
-dh.c:442: return dh_server(c, pack1, p1, 1024);
|
|
|
-dh.c:448: return dh_server(c, pack1, p14, 2048);
|
|
|
-dh.c:465: y = mprand(nbit / 8, genrandom, nil);
|
|
|
-dh.c:482: /* Compute H: RFC 4253 */
|
|
|
-dh.c:561: c->e = mpnew(1024);
|
|
|
-dh.c:566: c->x = mprand(128, genrandom, nil);
|
|
|
-dh.c:588: keymbox.msg = smprint("b%04ld%s", strlen(newkey), newkey);
|
|
|
-dh.c:597: keymbox.msg = smprint("%c%04ld%s", n == NoKeyFile || n == NoKey?
|
|
|
-dh.c:607: keymbox.msg = smprint("f%04ld%s", strlen(newkey), newkey);
|
|
|
-dh.c:633: return -2;
|
|
|
-dh.c:679: char buf[10];
|
|
|
-dh.c:694: q += nhgetl(q) + 4;
|
|
|
-dh.c:697: k = mpnew(1024);
|
|
|
-dh.c:700: /* Compute H: RFC 4253 */
|
|
|
-dh.c:731: q += nhgetl(q) + 4;
|
|
|
-dh.c:743: case -2:
|
|
|
-dh.c:747: keymbox.msg = smprint("f%04ld%s", strlen(newkey), newkey);
|
|
|
-dh.c:751: keymbox.msg = smprint("f%04ld%s", strlen(newkey), newkey);
|
|
|
-dh.c:778: e = mpnew(2048);
|
|
|
-dh.c:779: x = mprand(256, genrandom, nil);
|
|
|
-dh.c:810: char buf[82], *bp, *be; /* magic 82 */
|
|
|
-dh.c:814: /* Compute 40 bytes (320 bits) of keys: each alg can use what it needs */
|
|
|
-dh.c:882: for (n = 0, bp = buf; n < SHA1dlen*2; ++n)
|
|
|
-dh.c:887: for (n = 0, bp = buf; n < SHA1dlen*2; ++n)
|
|
|
-dh.c:892: for (n = 0, bp = buf; n < SHA1dlen*2; ++n)
|
|
|
-dh.c:897: for (n = 0, bp = buf; n < SHA1dlen*2; ++n)
|
|
|
+dh.c:16: Errnokey = -2, /* no key on keyring */
|
|
|
+dh.c:30: "29024E088A67CC74020BBEA63B139B22514A08798E3404DD"
|
|
|
+dh.c:37: * 2048-bit MODP group (id 14) from RFC 3526
|
|
|
+dh.c:41: "29024E088A67CC74020BBEA63B139B22514A08798E3404DD"
|
|
|
+dh.c:46: "83655D23DCA3AD961C62F356208552BB9ED529077096966D"
|
|
|
+dh.c:47: "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B"
|
|
|
+dh.c:50: "15728E5A8AACAA68FFFFFFFFFFFFFFFF";
|
|
|
+dh.c:69: two = strtomp("2", nil, 10, nil);
|
|
|
+dh.c:70: p1 = strtomp(group1p, nil, 16, nil);
|
|
|
+dh.c:71: p14 = strtomp(group14p, nil, 16, nil);
|
|
|
+dh.c:112: myrsakey.pub.n = strtomp(p+3, nil, 16, nil);
|
|
|
+dh.c:123: myrsakey.pub.ek = strtomp(p+4, nil, 16, nil);
|
|
|
+dh.c:136: myrsakey.dk = strtomp(p+5, nil, 16, nil);
|
|
|
+dh.c:179: mydsskey.pub.p = strtomp(p+3, nil, 16, nil);
|
|
|
+dh.c:186: mydsskey.pub.q = strtomp(p+3, nil, 16, nil);
|
|
|
+dh.c:193: mydsskey.pub.alpha = strtomp(p+7, nil, 16, nil);
|
|
|
+dh.c:200: mydsskey.pub.key = strtomp(p+5, nil, 16, nil);
|
|
|
+dh.c:211: mydsskey.secret = strtomp(p+9, nil, 16, nil);
|
|
|
+dh.c:242: n = nb - (nelem(sha1der) + SHA1dlen) - 3;
|
|
|
+dh.c:266: n = (nbit + 7) / 8;
|
|
|
+dh.c:269: /* Compute s: RFC 3447 */
|
|
|
+dh.c:285: auth_rpc(ar, "start", "role=sign proto=rsa", 19) != ARok ||
|
|
|
+dh.c:328: n = (nbit + 7) / 8;
|
|
|
+dh.c:330: /* Compute s: RFC 3447 */
|
|
|
+dh.c:333: s = mpnew(1024);
|
|
|
+dh.c:350: buf = emalloc9p(Blobsz / 2);
|
|
|
+dh.c:352: p = (char *)get_string(nil, (uchar *)sig, buf, Blobsz / 2, nil);
|
|
|
+dh.c:406: uchar sstr[2*SHA1dlen];
|
|
|
+dh.c:424: auth_rpc(ar, "start", "role=sign proto=dsa", 19) != ARok ||
|
|
|
+dh.c:436: add_block(sig, sstr, 2*SHA1dlen);
|
|
|
+dh.c:451: return dh_server(c, pack1, p1, 1024);
|
|
|
+dh.c:457: return dh_server(c, pack1, p14, 2048);
|
|
|
+dh.c:474: y = mprand(nbit / 8, genrandom, nil);
|
|
|
+dh.c:491: /* Compute H: RFC 4253 */
|
|
|
+dh.c:570: c->e = mpnew(1024);
|
|
|
+dh.c:575: c->x = mprand(128, genrandom, nil);
|
|
|
+dh.c:597: keymbox.msg = smprint("b%04ld%s", strlen(newkey), newkey);
|
|
|
+dh.c:606: keymbox.msg = smprint("%c%04ld%s", n == NoKeyFile || n == NoKey?
|
|
|
+dh.c:616: keymbox.msg = smprint("f%04ld%s", strlen(newkey), newkey);
|
|
|
+dh.c:688: char buf[10];
|
|
|
+dh.c:703: q += nhgetl(q) + 4;
|
|
|
+dh.c:706: k = mpnew(1024);
|
|
|
+dh.c:709: /* Compute H: RFC 4253 */
|
|
|
+dh.c:740: q += nhgetl(q) + 4;
|
|
|
+dh.c:757: keymbox.msg = smprint("f%04ld%s", strlen(newkey), newkey);
|
|
|
+dh.c:761: keymbox.msg = smprint("f%04ld%s", strlen(newkey), newkey);
|
|
|
+dh.c:791: e = mpnew(2048);
|
|
|
+dh.c:792: x = mprand(256, genrandom, nil);
|
|
|
+dh.c:823: char buf[82], *bp, *be; /* magic 82 */
|
|
|
+dh.c:827: /* Compute 40 bytes (320 bits) of keys: each alg can use what it needs */
|
|
|
+dh.c:895: for (n = 0, bp = buf; n < SHA1dlen*2; ++n)
|
|
|
+dh.c:900: for (n = 0, bp = buf; n < SHA1dlen*2; ++n)
|
|
|
+dh.c:905: for (n = 0, bp = buf; n < SHA1dlen*2; ++n)
|
|
|
+dh.c:910: for (n = 0, bp = buf; n < SHA1dlen*2; ++n)
|
|
|
dial.c:14: Maxstring = 128,
|
|
|
dial.c:15: Maxpath = 256,
|
|
|
dial.c:17: Maxcsreply = 64*80, /* this is probably overly generous */
|