/freebsd-11-stable/crypto/openssh/ |
H A D | bufec.c | 32 buffer_put_ecpoint_ret(Buffer *buffer, const EC_GROUP *curve, argument 37 if ((ret = sshbuf_put_ec(buffer, point, curve)) != 0) { 45 buffer_put_ecpoint(Buffer *buffer, const EC_GROUP *curve, argument 48 if (buffer_put_ecpoint_ret(buffer, curve, point) == -1) 53 buffer_get_ecpoint_ret(Buffer *buffer, const EC_GROUP *curve, argument 58 if ((ret = sshbuf_get_ec(buffer, point, curve)) != 0) { 66 buffer_get_ecpoint(Buffer *buffer, const EC_GROUP *curve, argument 69 if (buffer_get_ecpoint_ret(buffer, curve, point) == -1)
|
H A D | opacket.c | 100 ssh_packet_put_ecpoint(struct ssh *ssh, const EC_GROUP *curve, argument 105 if ((r = sshpkt_put_ec(ssh, point, curve)) != 0) 176 ssh_packet_get_ecpoint(struct ssh *ssh, const EC_GROUP *curve, EC_POINT *point) argument 180 if ((r = sshpkt_get_ec(ssh, point, curve)) != 0)
|
H A D | sshkey.c | 1965 char *ktype = NULL, *curve = NULL; local 2053 if (sshbuf_get_cstring(b, &curve, NULL) != 0) { 2057 if (key->ecdsa_nid != sshkey_curve_name_to_nid(curve)) { 2141 free(curve); 2681 char *tname = NULL, *curve = NULL; local 2725 if ((r = sshbuf_get_cstring(buf, &curve, NULL)) != 0) 2727 if (k->ecdsa_nid != sshkey_curve_name_to_nid(curve)) { 2847 free(curve); 2875 * point lies on the curve. This is done by EC_POINT_oct2point()
|
/freebsd-11-stable/sys/dev/syscons/dragon/ |
H A D | dragon_saver.c | 66 static int curve; variable 137 if (curve > CURVE) { 149 curve = 0; 154 ++curve; 158 switch (curve) { 169 (void)gdraw(dx, dy, curve); out = 0; 190 if (gdraw(dx, dy, curve)) { 195 order = ORDER; /* force to terminate this curve */ 212 curve = CURVE + 1;
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/examples/ |
H A D | dpp-qrcode.py | 75 def dpp_display(curve): 90 if curve: 91 cmd += " curve=" + curve 115 parser.add_argument('--curve', '-c', 116 help='set a specific curve (P-256, P-384, P-521, BP-256R1, BP-384R1, BP-512R1) for key generation') 127 dpp_display(args.curve)
|
/freebsd-11-stable/contrib/wpa/src/common/ |
H A D | dpp.c | 48 const struct dpp_curve_params *curve); 135 /* The mandatory to support and the default NIST P-256 curve needs to 391 static int dpp_hash_vector(const struct dpp_curve_params *curve, argument 395 if (curve->hash_len == 32) 397 if (curve->hash_len == 48) 399 if (curve->hash_len == 64) 1073 bi->curve = dpp_get_curve_oid(poid); 1074 if (!bi->curve) { 1076 "DPP: Unsupported SubjectPublicKeyInfo curve: %s", 1222 static EVP_PKEY * dpp_gen_keypair(const struct dpp_curve_params *curve) argument 1300 dpp_set_keypair(const struct dpp_curve_params **curve, const u8 *privkey, size_t privkey_len) argument 1454 dpp_keygen(struct dpp_bootstrap_info *bi, const char *curve, const u8 *privkey, size_t privkey_len) argument 4517 dpp_build_jwk(struct wpabuf *buf, const char *name, EVP_PKEY *key, const char *kid, const struct dpp_curve_params *curve) argument 4589 const struct dpp_curve_params *curve; local 5101 dpp_parse_jws_prot_hdr(const struct dpp_curve_params *curve, const u8 *prot_hdr, u16 prot_hdr_len, const EVP_MD **ret_md) argument 5231 const struct dpp_curve_params *curve; local 5392 const struct dpp_curve_params *curve; local 5570 const struct dpp_curve_params *curve; local 6187 dpp_keygen_configurator(const char *curve, const u8 *privkey, size_t privkey_len) argument 6249 dpp_configurator_own_config(struct dpp_authentication *auth, const char *curve, int ap) argument 6404 dpp_derive_pmkid(const struct dpp_curve_params *curve, EVP_PKEY *own_key, EVP_PKEY *peer_key, u8 *pmkid) argument 6456 const struct dpp_curve_params *curve, *own_curve; local 6614 dpp_pkex_get_role_elem(const struct dpp_curve_params *curve, int init) argument 6660 dpp_pkex_derive_Qi(const struct dpp_curve_params *curve, const u8 *mac_init, const char *code, const char *identifier, BN_CTX *bnctx, EC_GROUP **ret_group) argument 6744 dpp_pkex_derive_Qr(const struct dpp_curve_params *curve, const u8 *mac_resp, const char *code, const char *identifier, BN_CTX *bnctx, EC_GROUP **ret_group) argument 6829 dpp_test_gen_invalid_key(struct wpabuf *msg, const struct dpp_curve_params *curve) argument 6906 const struct dpp_curve_params *curve = pkex->own_bi->curve; local 7085 const struct dpp_curve_params *curve = pkex->own_bi->curve; local 7262 const struct dpp_curve_params *curve = bi->curve; local 7486 const struct dpp_curve_params *curve = pkex->own_bi->curve; local 7604 const struct dpp_curve_params *curve = pkex->own_bi->curve; local 7787 const struct dpp_curve_params *curve = pkex->own_bi->curve; local 7900 const struct dpp_curve_params *curve = pkex->own_bi->curve; local 8064 const struct dpp_curve_params *curve = pkex->own_bi->curve; local 8403 char *chan = NULL, *mac = NULL, *info = NULL, *pk = NULL, *curve = NULL; local 8633 char *curve = NULL; local [all...] |
H A D | dpp.h | 119 const struct dpp_curve_params *curve; member in struct:dpp_bootstrap_info 180 const struct dpp_curve_params *curve; member in struct:dpp_authentication 255 const struct dpp_curve_params *curve; member in struct:dpp_configurator 395 char * dpp_keygen(struct dpp_bootstrap_info *bi, const char *curve, 452 dpp_keygen_configurator(const char *curve, const u8 *privkey, 455 const char *curve, int ap); 488 const struct dpp_curve_params *curve; member in struct:dpp_pfs
|
/freebsd-11-stable/crypto/openssl/crypto/ec/ |
H A D | ec_asn1.c | 184 X9_62_CURVE *curve; member in struct:ec_parameters_st 255 ASN1_SIMPLE(ECPARAMETERS, curve, X9_62_CURVE), 436 static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve) argument 445 if (!group || !curve || !curve->a || !curve->b) 507 if (!M_ASN1_OCTET_STRING_set(curve->a, a_buf, len_1) || 508 !M_ASN1_OCTET_STRING_set(curve->b, b_buf, len_2)) { 515 if (!curve->seed) 516 if ((curve [all...] |
H A D | ec_curve.c | 67 * The elliptic curve binary polynomial software is originally written by 1073 * The algorithm used to derive the curve parameters from the seed 1112 * The seed here was used to created the curve parameters in normal 2222 * recommended (Weil-descent). As the group order is not a prime this curve 2257 * recommended (Weil-descent). As the group order is not a prime this curve 2851 "SECG/WTLS curve over a 112 bit prime field"}, 2853 "SECG curve over a 112 bit prime field"}, 2855 "SECG curve over a 128 bit prime field"}, 2857 "SECG curve over a 128 bit prime field"}, 2859 "SECG curve ove 3053 ec_group_new_from_data(const ec_list_element curve) argument 3331 const ec_list_element curve = curve_list[i]; local [all...] |
/freebsd-11-stable/crypto/openssh/regress/unittests/sshkey/ |
H A D | mktestdata.sh | 77 sed 's/.*: //;s/ *$//' > ${_outbase}.curve 78 for x in priv pub curve ; do
|
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | dpp_hostapd.c | 426 if (peer_bi->curve != own_bi->curve) { 429 peer_bi->curve->name, own_bi->curve->name); 1498 char *curve = NULL; local 1504 curve = get_param(cmd, " curve="); 1508 dpp_configurator_own_config(auth, curve, 1) == 0) { 1514 os_free(curve);
|
H A D | ieee802_11.c | 3480 buflen += 5 + sta->dpp_pfs->curve->prime_len;
|
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | t1_trce.c | 919 int curve; local 922 curve = (msg[1] << 8) | msg[2]; 924 ssl_trace_str(curve, ssl_curve_tbl), curve);
|
H A D | t1_lib.c | 528 /* Check a curve is one of our preferences */ 536 /* Check curve matches Suite B preferences */ 560 * Return |nmatch|th shared curve or NID_undef if there is no match. 562 * For nmatch == -2, return the NID of the curve to use for 576 * For Suite B ciphersuite determines curve: we already know 587 /* If not Suite B just return first preference shared curve */ 642 * Bitmap of curves included to detect duplicates: only works while curve 647 EC_GROUP *curve; local 658 /* NB: 25 is last curve ID supported by FIPS module */ 665 curve [all...] |
/freebsd-11-stable/crypto/openssl/crypto/ecdh/ |
H A D | ecdhtest.c | 473 # define test_ecdh_kat(bio, curve, bits) \ 474 ecdh_kat(bio, curve, NID_brainpoolP##bits##r1, \
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | dpp_supplicant.c | 489 if (peer_bi->curve != own_bi->curve) { 492 peer_bi->curve->name, own_bi->curve->name); 1964 char *curve = NULL; local 1970 curve = get_param(cmd, " curve="); 1973 dpp_configurator_own_config(auth, curve, 0) == 0) 1977 os_free(curve);
|