Lines Matching refs:curves
36 static EC_builtin_curve *curves = NULL;
1140 int nid = curves[n].nid;
1158 int r, nid = curves[n].nid;
1209 * several NIST curves with characteristic > 3.
1514 nid = curves[id].nid;
1562 /* Only NIST curves pass */
1702 nid = curves[id].nid;
1814 * EC_GROUP for built-in curves.
1841 nid = curves[id].nid;
1942 * match with the built-in curves
2110 * Test two random 256-bit explicit parameters curves with absent cofactor.
2111 * The two curves are chosen to roughly straddle the bounds at which the lib
2117 * For standards-compliant curves, cofactor is chosen as small as possible.
2118 * So you can see neither of these curves are fit for cryptographic use.
2122 * will always succeed in computing the cofactor. Neither of these curves
2148 * For named curves, test that:
2156 int nid = curves[n].nid;
2247 || !TEST_ptr(key = EC_KEY_new_by_curve_name(curves[id].nid))
2264 /* test for binary curves */
2270 /* test for prime curves */
2351 nid = curves[id].nid;
2621 nid = curves[id].nid;
2693 * check creation of curves from explicit params through the public API
2717 nid = curves[id].nid;
2740 ret = TEST_skip("binary curves not supported in this build");
3013 if (!TEST_ptr(curves = OPENSSL_malloc(sizeof(*curves) * crv_len))
3014 || !TEST_true(EC_get_builtin_curves(curves, crv_len)))
3043 OPENSSL_free(curves);