Searched refs:curve (Results 1 - 16 of 16) sorted by relevance

/freebsd-11-stable/crypto/openssh/
H A Dbufec.c32 buffer_put_ecpoint_ret(Buffer *buffer, const EC_GROUP *curve, argument
37 if ((ret = sshbuf_put_ec(buffer, point, curve)) != 0) {
45 buffer_put_ecpoint(Buffer *buffer, const EC_GROUP *curve, argument
48 if (buffer_put_ecpoint_ret(buffer, curve, point) == -1)
53 buffer_get_ecpoint_ret(Buffer *buffer, const EC_GROUP *curve, argument
58 if ((ret = sshbuf_get_ec(buffer, point, curve)) != 0) {
66 buffer_get_ecpoint(Buffer *buffer, const EC_GROUP *curve, argument
69 if (buffer_get_ecpoint_ret(buffer, curve, point) == -1)
H A Dopacket.c100 ssh_packet_put_ecpoint(struct ssh *ssh, const EC_GROUP *curve, argument
105 if ((r = sshpkt_put_ec(ssh, point, curve)) != 0)
176 ssh_packet_get_ecpoint(struct ssh *ssh, const EC_GROUP *curve, EC_POINT *point) argument
180 if ((r = sshpkt_get_ec(ssh, point, curve)) != 0)
H A Dsshkey.c1965 char *ktype = NULL, *curve = NULL; local
2053 if (sshbuf_get_cstring(b, &curve, NULL) != 0) {
2057 if (key->ecdsa_nid != sshkey_curve_name_to_nid(curve)) {
2141 free(curve);
2681 char *tname = NULL, *curve = NULL; local
2725 if ((r = sshbuf_get_cstring(buf, &curve, NULL)) != 0)
2727 if (k->ecdsa_nid != sshkey_curve_name_to_nid(curve)) {
2847 free(curve);
2875 * point lies on the curve. This is done by EC_POINT_oct2point()
/freebsd-11-stable/sys/dev/syscons/dragon/
H A Ddragon_saver.c66 static int curve; variable
137 if (curve > CURVE) {
149 curve = 0;
154 ++curve;
158 switch (curve) {
169 (void)gdraw(dx, dy, curve); out = 0;
190 if (gdraw(dx, dy, curve)) {
195 order = ORDER; /* force to terminate this curve */
212 curve = CURVE + 1;
/freebsd-11-stable/contrib/wpa/wpa_supplicant/examples/
H A Ddpp-qrcode.py75 def dpp_display(curve):
90 if curve:
91 cmd += " curve=" + curve
115 parser.add_argument('--curve', '-c',
116 help='set a specific curve (P-256, P-384, P-521, BP-256R1, BP-384R1, BP-512R1) for key generation')
127 dpp_display(args.curve)
/freebsd-11-stable/contrib/wpa/src/common/
H A Ddpp.c48 const struct dpp_curve_params *curve);
135 /* The mandatory to support and the default NIST P-256 curve needs to
391 static int dpp_hash_vector(const struct dpp_curve_params *curve, argument
395 if (curve->hash_len == 32)
397 if (curve->hash_len == 48)
399 if (curve->hash_len == 64)
1073 bi->curve = dpp_get_curve_oid(poid);
1074 if (!bi->curve) {
1076 "DPP: Unsupported SubjectPublicKeyInfo curve: %s",
1222 static EVP_PKEY * dpp_gen_keypair(const struct dpp_curve_params *curve) argument
1300 dpp_set_keypair(const struct dpp_curve_params **curve, const u8 *privkey, size_t privkey_len) argument
1454 dpp_keygen(struct dpp_bootstrap_info *bi, const char *curve, const u8 *privkey, size_t privkey_len) argument
4517 dpp_build_jwk(struct wpabuf *buf, const char *name, EVP_PKEY *key, const char *kid, const struct dpp_curve_params *curve) argument
4589 const struct dpp_curve_params *curve; local
5101 dpp_parse_jws_prot_hdr(const struct dpp_curve_params *curve, const u8 *prot_hdr, u16 prot_hdr_len, const EVP_MD **ret_md) argument
5231 const struct dpp_curve_params *curve; local
5392 const struct dpp_curve_params *curve; local
5570 const struct dpp_curve_params *curve; local
6187 dpp_keygen_configurator(const char *curve, const u8 *privkey, size_t privkey_len) argument
6249 dpp_configurator_own_config(struct dpp_authentication *auth, const char *curve, int ap) argument
6404 dpp_derive_pmkid(const struct dpp_curve_params *curve, EVP_PKEY *own_key, EVP_PKEY *peer_key, u8 *pmkid) argument
6456 const struct dpp_curve_params *curve, *own_curve; local
6614 dpp_pkex_get_role_elem(const struct dpp_curve_params *curve, int init) argument
6660 dpp_pkex_derive_Qi(const struct dpp_curve_params *curve, const u8 *mac_init, const char *code, const char *identifier, BN_CTX *bnctx, EC_GROUP **ret_group) argument
6744 dpp_pkex_derive_Qr(const struct dpp_curve_params *curve, const u8 *mac_resp, const char *code, const char *identifier, BN_CTX *bnctx, EC_GROUP **ret_group) argument
6829 dpp_test_gen_invalid_key(struct wpabuf *msg, const struct dpp_curve_params *curve) argument
6906 const struct dpp_curve_params *curve = pkex->own_bi->curve; local
7085 const struct dpp_curve_params *curve = pkex->own_bi->curve; local
7262 const struct dpp_curve_params *curve = bi->curve; local
7486 const struct dpp_curve_params *curve = pkex->own_bi->curve; local
7604 const struct dpp_curve_params *curve = pkex->own_bi->curve; local
7787 const struct dpp_curve_params *curve = pkex->own_bi->curve; local
7900 const struct dpp_curve_params *curve = pkex->own_bi->curve; local
8064 const struct dpp_curve_params *curve = pkex->own_bi->curve; local
8403 char *chan = NULL, *mac = NULL, *info = NULL, *pk = NULL, *curve = NULL; local
8633 char *curve = NULL; local
[all...]
H A Ddpp.h119 const struct dpp_curve_params *curve; member in struct:dpp_bootstrap_info
180 const struct dpp_curve_params *curve; member in struct:dpp_authentication
255 const struct dpp_curve_params *curve; member in struct:dpp_configurator
395 char * dpp_keygen(struct dpp_bootstrap_info *bi, const char *curve,
452 dpp_keygen_configurator(const char *curve, const u8 *privkey,
455 const char *curve, int ap);
488 const struct dpp_curve_params *curve; member in struct:dpp_pfs
/freebsd-11-stable/crypto/openssl/crypto/ec/
H A Dec_asn1.c184 X9_62_CURVE *curve; member in struct:ec_parameters_st
255 ASN1_SIMPLE(ECPARAMETERS, curve, X9_62_CURVE),
436 static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve) argument
445 if (!group || !curve || !curve->a || !curve->b)
507 if (!M_ASN1_OCTET_STRING_set(curve->a, a_buf, len_1) ||
508 !M_ASN1_OCTET_STRING_set(curve->b, b_buf, len_2)) {
515 if (!curve->seed)
516 if ((curve
[all...]
H A Dec_curve.c67 * The elliptic curve binary polynomial software is originally written by
1073 * The algorithm used to derive the curve parameters from the seed
1112 * The seed here was used to created the curve parameters in normal
2222 * recommended (Weil-descent). As the group order is not a prime this curve
2257 * recommended (Weil-descent). As the group order is not a prime this curve
2851 "SECG/WTLS curve over a 112 bit prime field"},
2853 "SECG curve over a 112 bit prime field"},
2855 "SECG curve over a 128 bit prime field"},
2857 "SECG curve over a 128 bit prime field"},
2859 "SECG curve ove
3053 ec_group_new_from_data(const ec_list_element curve) argument
3331 const ec_list_element curve = curve_list[i]; local
[all...]
/freebsd-11-stable/crypto/openssh/regress/unittests/sshkey/
H A Dmktestdata.sh77 sed 's/.*: //;s/ *$//' > ${_outbase}.curve
78 for x in priv pub curve ; do
/freebsd-11-stable/contrib/wpa/src/ap/
H A Ddpp_hostapd.c426 if (peer_bi->curve != own_bi->curve) {
429 peer_bi->curve->name, own_bi->curve->name);
1498 char *curve = NULL; local
1504 curve = get_param(cmd, " curve=");
1508 dpp_configurator_own_config(auth, curve, 1) == 0) {
1514 os_free(curve);
H A Dieee802_11.c3480 buflen += 5 + sta->dpp_pfs->curve->prime_len;
/freebsd-11-stable/crypto/openssl/ssl/
H A Dt1_trce.c919 int curve; local
922 curve = (msg[1] << 8) | msg[2];
924 ssl_trace_str(curve, ssl_curve_tbl), curve);
H A Dt1_lib.c528 /* Check a curve is one of our preferences */
536 /* Check curve matches Suite B preferences */
560 * Return |nmatch|th shared curve or NID_undef if there is no match.
562 * For nmatch == -2, return the NID of the curve to use for
576 * For Suite B ciphersuite determines curve: we already know
587 /* If not Suite B just return first preference shared curve */
642 * Bitmap of curves included to detect duplicates: only works while curve
647 EC_GROUP *curve; local
658 /* NB: 25 is last curve ID supported by FIPS module */
665 curve
[all...]
/freebsd-11-stable/crypto/openssl/crypto/ecdh/
H A Decdhtest.c473 # define test_ecdh_kat(bio, curve, bits) \
474 ecdh_kat(bio, curve, NID_brainpoolP##bits##r1, \
/freebsd-11-stable/contrib/wpa/wpa_supplicant/
H A Ddpp_supplicant.c489 if (peer_bi->curve != own_bi->curve) {
492 peer_bi->curve->name, own_bi->curve->name);
1964 char *curve = NULL; local
1970 curve = get_param(cmd, " curve=");
1973 dpp_configurator_own_config(auth, curve, 0) == 0)
1977 os_free(curve);

Completed in 230 milliseconds