/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/ |
H A D | bufec.c | 48 buffer_put_ecpoint_ret(Buffer *buffer, const EC_GROUP *curve, argument 59 len = EC_POINT_point2oct(curve, point, POINT_CONVERSION_UNCOMPRESSED, 68 if (EC_POINT_point2oct(curve, point, POINT_CONVERSION_UNCOMPRESSED, 86 buffer_put_ecpoint(Buffer *buffer, const EC_GROUP *curve, argument 89 if (buffer_put_ecpoint_ret(buffer, curve, point) == -1) 94 buffer_get_ecpoint_ret(Buffer *buffer, const EC_GROUP *curve, argument 123 if (EC_POINT_oct2point(curve, point, buf, len, bnctx) != 1) { 127 /* EC_POINT_oct2point verifies that the point is on the curve for us */ 137 buffer_get_ecpoint(Buffer *buffer, const EC_GROUP *curve, argument 140 if (buffer_get_ecpoint_ret(buffer, curve, poin [all...] |
H A D | packet.c | 634 packet_put_ecpoint(const EC_GROUP *curve, const EC_POINT *point) argument 636 buffer_put_ecpoint(&active_state->outgoing_packet, curve, point); 1516 packet_get_ecpoint(const EC_GROUP *curve, EC_POINT *point) argument 1518 buffer_get_ecpoint(&active_state->incoming_packet, curve, point);
|
H A D | ssh-agent.c | 458 char *type_name, *comment, *curve; local 505 curve = buffer_get_string(&e->request, NULL); 506 if (k->ecdsa_nid != key_curve_name_to_nid(curve)) 507 fatal("%s: curve names mismatch", __func__); 508 xfree(curve);
|
H A D | key.c | 699 debug("key_read: invalid curve"); 740 error("key_read: type mismatch: EC curve mismatch"); 1424 char *ktype = NULL, *curve = NULL; local 1484 if ((curve = buffer_get_string_ret(&b, NULL)) == NULL) { 1485 error("key_from_blob: can't read ecdsa curve"); 1488 if (key->ecdsa_nid != key_curve_name_to_nid(curve)) { 1489 error("key_from_blob: ecdsa curve doesn't match type"); 1530 if (curve != NULL) 1531 xfree(curve); 1987 debug("%s: unsupported EC curve nam [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/demos/ssltest-ecc/ |
H A D | ssltest.sh | 72 for curve in $ELLIPTIC_CURVE_LIST 74 echo "Testing AECDH-NULL-SHA (with $curve)" 76 -named_curve $curve -cipher AECDH-NULL-SHA 79 for curve in $ELLIPTIC_CURVE_LIST 81 echo "Testing AECDH-RC4-SHA (with $curve)" 83 -named_curve $curve -cipher AECDH-RC4-SHA 127 for curve in $ELLIPTIC_CURVE_LIST 129 echo "Testing ECDHE-ECDSA-AES128-SHA (2-way auth with $curve)" 133 -cipher ECDHE-ECDSA-AES128-SHA -named_curve $curve
|
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/tls/ |
H A D | tls_dh.c | 37 /* context a suitable curve (corresponding to the specified 42 /* curve could not be used. 213 const char *curve; local 236 curve = var_tls_eecdh_strong; 239 curve = var_tls_eecdh_ultra; 247 * maximum interoperability. The recommended curve for 128-bit 252 if ((nid = OBJ_sn2nid(curve)) == NID_undef) { 253 msg_warn("unknown curve \"%s\": disabling EECDH support", curve); 259 msg_warn("unable to use curve \" [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/ec/ |
H A D | ec_asn1.c | 176 X9_62_CURVE *curve; member in struct:ec_parameters_st 247 ASN1_SIMPLE(ECPARAMETERS, curve, X9_62_CURVE), 438 static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve) argument 447 if (!group || !curve || !curve->a || !curve->b) 525 if (!M_ASN1_OCTET_STRING_set(curve->a, a_buf, len_1) || 526 !M_ASN1_OCTET_STRING_set(curve->b, b_buf, len_2)) 535 if (!curve->seed) 536 if ((curve [all...] |
H A D | ec_curve.c | 67 * The elliptic curve binary polynomial software is originally written by 819 /* The algorithm used to derive the curve parameters from 850 /* The seed here was used to created the curve parameters in normal 1768 * As the group order is not a prime this curve is not suitable 1796 * As the group order is not a prime this curve is not suitable 1835 { NID_secp112r1, &_EC_SECG_PRIME_112R1.h, 0, "SECG/WTLS curve over a 112 bit prime field" }, 1836 { NID_secp112r2, &_EC_SECG_PRIME_112R2.h, 0, "SECG curve over a 112 bit prime field" }, 1837 { NID_secp128r1, &_EC_SECG_PRIME_128R1.h, 0, "SECG curve over a 128 bit prime field" }, 1838 { NID_secp128r2, &_EC_SECG_PRIME_128R2.h, 0, "SECG curve over a 128 bit prime field" }, 1839 { NID_secp160k1, &_EC_SECG_PRIME_160K1.h, 0, "SECG curve ove 1935 ec_group_new_from_data(const ec_list_element curve) argument [all...] |
/netbsd-6-1-5-RELEASE/x11/lib/GLU/ |
H A D | Makefile | 30 cachingeval.cc ccw.cc coveandtiler.cc curve.cc \
|
/netbsd-6-1-5-RELEASE/external/mit/xorg/lib/libGLU/ |
H A D | Makefile | 31 cachingeval.cc ccw.cc coveandtiler.cc curve.cc \
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/hcrypto/libtommath/ |
H A D | tommath.tex | 239 curve cryptography (\textit{ECC}) is often implemented on smartcards by fixing the precision of the integers to the maximum 487 functions share the same parameter passing convention. The learning curve is fairly shallow with the API provided 3613 elliptic curve cryptographic algorithms. As will be discussed in the subsequent chapter there exist fast algorithms for computing modular
|