Searched refs:curve (Results 1 - 11 of 11) sorted by relevance

/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/
H A Dbufec.c48 buffer_put_ecpoint_ret(Buffer *buffer, const EC_GROUP *curve, argument
59 len = EC_POINT_point2oct(curve, point, POINT_CONVERSION_UNCOMPRESSED,
68 if (EC_POINT_point2oct(curve, point, POINT_CONVERSION_UNCOMPRESSED,
86 buffer_put_ecpoint(Buffer *buffer, const EC_GROUP *curve, argument
89 if (buffer_put_ecpoint_ret(buffer, curve, point) == -1)
94 buffer_get_ecpoint_ret(Buffer *buffer, const EC_GROUP *curve, argument
123 if (EC_POINT_oct2point(curve, point, buf, len, bnctx) != 1) {
127 /* EC_POINT_oct2point verifies that the point is on the curve for us */
137 buffer_get_ecpoint(Buffer *buffer, const EC_GROUP *curve, argument
140 if (buffer_get_ecpoint_ret(buffer, curve, poin
[all...]
H A Dpacket.c634 packet_put_ecpoint(const EC_GROUP *curve, const EC_POINT *point) argument
636 buffer_put_ecpoint(&active_state->outgoing_packet, curve, point);
1516 packet_get_ecpoint(const EC_GROUP *curve, EC_POINT *point) argument
1518 buffer_get_ecpoint(&active_state->incoming_packet, curve, point);
H A Dssh-agent.c458 char *type_name, *comment, *curve; local
505 curve = buffer_get_string(&e->request, NULL);
506 if (k->ecdsa_nid != key_curve_name_to_nid(curve))
507 fatal("%s: curve names mismatch", __func__);
508 xfree(curve);
H A Dkey.c699 debug("key_read: invalid curve");
740 error("key_read: type mismatch: EC curve mismatch");
1424 char *ktype = NULL, *curve = NULL; local
1484 if ((curve = buffer_get_string_ret(&b, NULL)) == NULL) {
1485 error("key_from_blob: can't read ecdsa curve");
1488 if (key->ecdsa_nid != key_curve_name_to_nid(curve)) {
1489 error("key_from_blob: ecdsa curve doesn't match type");
1530 if (curve != NULL)
1531 xfree(curve);
1987 debug("%s: unsupported EC curve nam
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/demos/ssltest-ecc/
H A Dssltest.sh72 for curve in $ELLIPTIC_CURVE_LIST
74 echo "Testing AECDH-NULL-SHA (with $curve)"
76 -named_curve $curve -cipher AECDH-NULL-SHA
79 for curve in $ELLIPTIC_CURVE_LIST
81 echo "Testing AECDH-RC4-SHA (with $curve)"
83 -named_curve $curve -cipher AECDH-RC4-SHA
127 for curve in $ELLIPTIC_CURVE_LIST
129 echo "Testing ECDHE-ECDSA-AES128-SHA (2-way auth with $curve)"
133 -cipher ECDHE-ECDSA-AES128-SHA -named_curve $curve
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/tls/
H A Dtls_dh.c37 /* context a suitable curve (corresponding to the specified
42 /* curve could not be used.
213 const char *curve; local
236 curve = var_tls_eecdh_strong;
239 curve = var_tls_eecdh_ultra;
247 * maximum interoperability. The recommended curve for 128-bit
252 if ((nid = OBJ_sn2nid(curve)) == NID_undef) {
253 msg_warn("unknown curve \"%s\": disabling EECDH support", curve);
259 msg_warn("unable to use curve \"
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/ec/
H A Dec_asn1.c176 X9_62_CURVE *curve; member in struct:ec_parameters_st
247 ASN1_SIMPLE(ECPARAMETERS, curve, X9_62_CURVE),
438 static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve) argument
447 if (!group || !curve || !curve->a || !curve->b)
525 if (!M_ASN1_OCTET_STRING_set(curve->a, a_buf, len_1) ||
526 !M_ASN1_OCTET_STRING_set(curve->b, b_buf, len_2))
535 if (!curve->seed)
536 if ((curve
[all...]
H A Dec_curve.c67 * The elliptic curve binary polynomial software is originally written by
819 /* The algorithm used to derive the curve parameters from
850 /* The seed here was used to created the curve parameters in normal
1768 * As the group order is not a prime this curve is not suitable
1796 * As the group order is not a prime this curve is not suitable
1835 { NID_secp112r1, &_EC_SECG_PRIME_112R1.h, 0, "SECG/WTLS curve over a 112 bit prime field" },
1836 { NID_secp112r2, &_EC_SECG_PRIME_112R2.h, 0, "SECG curve over a 112 bit prime field" },
1837 { NID_secp128r1, &_EC_SECG_PRIME_128R1.h, 0, "SECG curve over a 128 bit prime field" },
1838 { NID_secp128r2, &_EC_SECG_PRIME_128R2.h, 0, "SECG curve over a 128 bit prime field" },
1839 { NID_secp160k1, &_EC_SECG_PRIME_160K1.h, 0, "SECG curve ove
1935 ec_group_new_from_data(const ec_list_element curve) argument
[all...]
/netbsd-6-1-5-RELEASE/x11/lib/GLU/
H A DMakefile30 cachingeval.cc ccw.cc coveandtiler.cc curve.cc \
/netbsd-6-1-5-RELEASE/external/mit/xorg/lib/libGLU/
H A DMakefile31 cachingeval.cc ccw.cc coveandtiler.cc curve.cc \
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/hcrypto/libtommath/
H A Dtommath.tex239 curve cryptography (\textit{ECC}) is often implemented on smartcards by fixing the precision of the integers to the maximum
487 functions share the same parameter passing convention. The learning curve is fairly shallow with the API provided
3613 elliptic curve cryptographic algorithms. As will be discussed in the subsequent chapter there exist fast algorithms for computing modular

Completed in 281 milliseconds