/freebsd-10.0-release/crypto/openssh/ |
H A D | bufec.c | 50 buffer_put_ecpoint_ret(Buffer *buffer, const EC_GROUP *curve, argument 61 len = EC_POINT_point2oct(curve, point, POINT_CONVERSION_UNCOMPRESSED, 70 if (EC_POINT_point2oct(curve, point, POINT_CONVERSION_UNCOMPRESSED, 88 buffer_put_ecpoint(Buffer *buffer, const EC_GROUP *curve, argument 91 if (buffer_put_ecpoint_ret(buffer, curve, point) == -1) 96 buffer_get_ecpoint_ret(Buffer *buffer, const EC_GROUP *curve, argument 125 if (EC_POINT_oct2point(curve, point, buf, len, bnctx) != 1) { 129 /* EC_POINT_oct2point verifies that the point is on the curve for us */ 139 buffer_get_ecpoint(Buffer *buffer, const EC_GROUP *curve, argument 142 if (buffer_get_ecpoint_ret(buffer, curve, poin [all...] |
H A D | ssh-agent.c | 493 char *curve; local 539 curve = buffer_get_string(&e->request, NULL); 540 if (k->ecdsa_nid != key_curve_name_to_nid(curve)) 541 fatal("%s: curve names mismatch", __func__); 542 free(curve);
|
H A D | packet.c | 650 packet_put_ecpoint(const EC_GROUP *curve, const EC_POINT *point) argument 652 buffer_put_ecpoint(&active_state->outgoing_packet, curve, point); 1581 packet_get_ecpoint(const EC_GROUP *curve, EC_POINT *point) argument 1583 buffer_get_ecpoint(&active_state->incoming_packet, curve, point);
|
H A D | key.c | 716 debug("key_read: invalid curve"); 759 error("key_read: type mismatch: EC curve mismatch"); 1433 char *ktype = NULL, *curve = NULL; local 1499 if ((curve = buffer_get_string_ret(&b, NULL)) == NULL) { 1500 error("key_from_blob: can't read ecdsa curve"); 1503 if (key->ecdsa_nid != key_curve_name_to_nid(curve)) { 1504 error("key_from_blob: ecdsa curve doesn't match type"); 1545 free(curve); 2025 debug("%s: unsupported EC curve name \"%.100s\"", __func__, name); 2042 error("%s: unsupported EC curve ni [all...] |
/freebsd-10.0-release/sys/dev/syscons/dragon/ |
H A D | dragon_saver.c | 66 static int curve; variable 137 if (curve > CURVE) { 149 curve = 0; 154 ++curve; 158 switch (curve) { 169 (void)gdraw(dx, dy, curve); out = 0; 190 if (gdraw(dx, dy, curve)) { 195 order = ORDER; /* force to terminate this curve */ 212 curve = CURVE + 1;
|
/freebsd-10.0-release/crypto/openssl/crypto/ec/ |
H A D | ec_asn1.c | 176 X9_62_CURVE *curve; member in struct:ec_parameters_st 247 ASN1_SIMPLE(ECPARAMETERS, curve, X9_62_CURVE), 438 static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve) argument 447 if (!group || !curve || !curve->a || !curve->b) 525 if (!M_ASN1_OCTET_STRING_set(curve->a, a_buf, len_1) || 526 !M_ASN1_OCTET_STRING_set(curve->b, b_buf, len_2)) 535 if (!curve->seed) 536 if ((curve [all...] |
H A D | ec_curve.c | 67 * The elliptic curve binary polynomial software is originally written by 819 /* The algorithm used to derive the curve parameters from 850 /* The seed here was used to created the curve parameters in normal 1768 * As the group order is not a prime this curve is not suitable 1796 * As the group order is not a prime this curve is not suitable 1835 { NID_secp112r1, &_EC_SECG_PRIME_112R1.h, 0, "SECG/WTLS curve over a 112 bit prime field" }, 1836 { NID_secp112r2, &_EC_SECG_PRIME_112R2.h, 0, "SECG curve over a 112 bit prime field" }, 1837 { NID_secp128r1, &_EC_SECG_PRIME_128R1.h, 0, "SECG curve over a 128 bit prime field" }, 1838 { NID_secp128r2, &_EC_SECG_PRIME_128R2.h, 0, "SECG curve over a 128 bit prime field" }, 1839 { NID_secp160k1, &_EC_SECG_PRIME_160K1.h, 0, "SECG curve ove 1935 ec_group_new_from_data(const ec_list_element curve) argument [all...] |