Lines Matching refs:curves
164 changed: curves and hashes weaker than 255 bits are no longer accepted
165 by default. The default order in TLS now favors faster curves over larger
166 curves.
257 now determined automatically based on supported curves.
306 private keys and of blinding values for DHM and elliptic curves (ECP)
688 "x25519" and "x448". These curves support ECDH but not ECDSA. If you need
689 only the curves that support ECDSA, filter the list with
823 * Fix build errors when the only enabled elliptic curves are Montgomery
824 curves. Raised by signpainter in #941 and by Taiki-San in #1412. This
1056 * Change the encoding of key types and curves in the PSA API. The new
1228 list all curves for which at least one of ECDH or ECDSA is supported, not
1229 just curves for which both are supported. Call mbedtls_ecdsa_can_do() or
1257 * Enable Suite B with subset of ECP curves. Make sure the code compiles even
1258 if some curves are not defined. Fixes #1591 reported by dbedev.
1897 curves as well as RSA. Fixes #777 found by dbedev.
2033 for Curve25519 (other curves had it already). Contributed by Nicholas
2454 reflect bad EC curves within verification result.
2698 * Fix issue that caused a crash if invalid curves were passed to
2919 which algorithms and key sizes (curves for ECDSA) are acceptable.
3458 * EC curves constants, which should be only in ROM since 1.3.3, were also
3524 * Support for the Koblitz curves: secp192k1, secp224k1, secp256k1
3558 * Split off curves from ecp.c into ecp_curves.c
3584 * Added optional optimization for NIST MODP curves (POLARSSL_ECP_NIST_OPTIM)
3606 * Support for Brainpool curves and TLS ciphersuites (RFC 7027)