Searched refs:curve (Results 1 - 7 of 7) sorted by relevance

/freebsd-10.0-release/crypto/openssh/
H A Dbufec.c50 buffer_put_ecpoint_ret(Buffer *buffer, const EC_GROUP *curve, argument
61 len = EC_POINT_point2oct(curve, point, POINT_CONVERSION_UNCOMPRESSED,
70 if (EC_POINT_point2oct(curve, point, POINT_CONVERSION_UNCOMPRESSED,
88 buffer_put_ecpoint(Buffer *buffer, const EC_GROUP *curve, argument
91 if (buffer_put_ecpoint_ret(buffer, curve, point) == -1)
96 buffer_get_ecpoint_ret(Buffer *buffer, const EC_GROUP *curve, argument
125 if (EC_POINT_oct2point(curve, point, buf, len, bnctx) != 1) {
129 /* EC_POINT_oct2point verifies that the point is on the curve for us */
139 buffer_get_ecpoint(Buffer *buffer, const EC_GROUP *curve, argument
142 if (buffer_get_ecpoint_ret(buffer, curve, poin
[all...]
H A Dssh-agent.c493 char *curve; local
539 curve = buffer_get_string(&e->request, NULL);
540 if (k->ecdsa_nid != key_curve_name_to_nid(curve))
541 fatal("%s: curve names mismatch", __func__);
542 free(curve);
H A Dpacket.c650 packet_put_ecpoint(const EC_GROUP *curve, const EC_POINT *point) argument
652 buffer_put_ecpoint(&active_state->outgoing_packet, curve, point);
1581 packet_get_ecpoint(const EC_GROUP *curve, EC_POINT *point) argument
1583 buffer_get_ecpoint(&active_state->incoming_packet, curve, point);
H A Dkey.c716 debug("key_read: invalid curve");
759 error("key_read: type mismatch: EC curve mismatch");
1433 char *ktype = NULL, *curve = NULL; local
1499 if ((curve = buffer_get_string_ret(&b, NULL)) == NULL) {
1500 error("key_from_blob: can't read ecdsa curve");
1503 if (key->ecdsa_nid != key_curve_name_to_nid(curve)) {
1504 error("key_from_blob: ecdsa curve doesn't match type");
1545 free(curve);
2025 debug("%s: unsupported EC curve name \"%.100s\"", __func__, name);
2042 error("%s: unsupported EC curve ni
[all...]
/freebsd-10.0-release/sys/dev/syscons/dragon/
H A Ddragon_saver.c66 static int curve; variable
137 if (curve > CURVE) {
149 curve = 0;
154 ++curve;
158 switch (curve) {
169 (void)gdraw(dx, dy, curve); out = 0;
190 if (gdraw(dx, dy, curve)) {
195 order = ORDER; /* force to terminate this curve */
212 curve = CURVE + 1;
/freebsd-10.0-release/crypto/openssl/crypto/ec/
H A Dec_asn1.c176 X9_62_CURVE *curve; member in struct:ec_parameters_st
247 ASN1_SIMPLE(ECPARAMETERS, curve, X9_62_CURVE),
438 static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve) argument
447 if (!group || !curve || !curve->a || !curve->b)
525 if (!M_ASN1_OCTET_STRING_set(curve->a, a_buf, len_1) ||
526 !M_ASN1_OCTET_STRING_set(curve->b, b_buf, len_2))
535 if (!curve->seed)
536 if ((curve
[all...]
H A Dec_curve.c67 * The elliptic curve binary polynomial software is originally written by
819 /* The algorithm used to derive the curve parameters from
850 /* The seed here was used to created the curve parameters in normal
1768 * As the group order is not a prime this curve is not suitable
1796 * As the group order is not a prime this curve is not suitable
1835 { NID_secp112r1, &_EC_SECG_PRIME_112R1.h, 0, "SECG/WTLS curve over a 112 bit prime field" },
1836 { NID_secp112r2, &_EC_SECG_PRIME_112R2.h, 0, "SECG curve over a 112 bit prime field" },
1837 { NID_secp128r1, &_EC_SECG_PRIME_128R1.h, 0, "SECG curve over a 128 bit prime field" },
1838 { NID_secp128r2, &_EC_SECG_PRIME_128R2.h, 0, "SECG curve over a 128 bit prime field" },
1839 { NID_secp160k1, &_EC_SECG_PRIME_160K1.h, 0, "SECG curve ove
1935 ec_group_new_from_data(const ec_list_element curve) argument
[all...]

Completed in 147 milliseconds