| Class | Description |
|---|---|
| DhGroup |
"When using the Diffie-Hellman key agreement method, implementations MUST
support Oakley 1024-bit Modular Exponential (MODP) well-known group 2
[RFC2412] and Oakley 2048-bit MODP well-known group 14 [RFC3526] and
SHOULD support Oakley 4096-bit MODP well-known group 16 [RFC3526]."
|
| DiffieHellmanClient |
The client-side of Diffie-Hellman key agreement for Kerberos PKINIT.
|
| DiffieHellmanServer |
The server-side of Diffie-Hellman key agreement for Kerberos PKINIT.
|
| OctetString2Key |
From RFC 4556:
Define the function octetstring2key() as follows:
octetstring2key(x) == random-to-key(K-truncate(
SHA1(0x00 | x) |
SHA1(0x01 | x) |
SHA1(0x02 | x) |
...
|
Copyright © 2014–2017 The Apache Software Foundation. All rights reserved.