Searched refs:curves (Results 1 – 8 of 8) sorted by relevance
374 const char *curves; /* list of supported elliptic curves */ member650 opt.curves = DFL_CURVES; in main()830 opt.curves = q; in main()1114 if( opt.curves != NULL ) in main()1116 p = (char *) opt.curves; in main()1476 if( opt.curves != NULL && in main()1477 strcmp( opt.curves, "default" ) != 0 ) in main()
492 const char *curves; /* list of supported elliptic curves */ member1367 opt.curves = DFL_CURVES; in main()1488 opt.curves = q; in main()1892 if( opt.curves != NULL ) in main()1894 p = (char *) opt.curves; in main()2493 if( opt.curves != NULL && in main()2494 strcmp( opt.curves, "default" ) != 0 ) in main()
287 const mbedtls_ecp_curve_info *curve_info, **curves; in ssl_parse_supported_elliptic_curves() local306 if( ssl->handshake->curves != NULL ) in ssl_parse_supported_elliptic_curves()320 if( ( curves = mbedtls_calloc( our_size, sizeof( *curves ) ) ) == NULL ) in ssl_parse_supported_elliptic_curves()327 ssl->handshake->curves = curves; in ssl_parse_supported_elliptic_curves()336 *curves++ = curve_info; in ssl_parse_supported_elliptic_curves()680 const mbedtls_ecp_curve_info **curves ) in ssl_check_key_curve() argument682 const mbedtls_ecp_curve_info **crv = curves; in ssl_check_key_curve()755 ssl_check_key_curve( &cur->cert->pk, ssl->handshake->curves ) != 0 ) in ssl_pick_cert()857 ( ssl->handshake->curves == NULL || in ssl_ciphersuite_match()858 ssl->handshake->curves[0] == NULL ) ) in ssl_ciphersuite_match()[all …]
8926 mbedtls_free( (void *) handshake->curves ); in mbedtls_ssl_handshake_free()
283 const mbedtls_ecp_curve_info **curves; /*!< Supported elliptic curves */ member
2242 const mbedtls_ecp_group_id *curves );
482 /* Support for Weierstrass curves with Jacobi representation */488 /* Support for curves with Montgomery arithmetic */692 * MBEDTLS_ECP_XXXX_ENABLED: Enables specific curves within the Elliptic Curve693 * module. By default all supported curves are enabled.718 * Comment this macro to disable NIST curves optimisation.
407 curves as well as RSA. Fixes #777 found by dbedev.543 for Curve25519 (other curves had it already). Contributed by Nicholas964 reflect bad EC curves within verification result.1208 * Fix issue that caused a crash if invalid curves were passed to1429 which algorithms and key sizes (curves for ECDSA) are acceptable.1968 * EC curves constants, which should be only in ROM since 1.3.3, were also2034 * Support for the Koblitz curves: secp192k1, secp224k1, secp256k12068 * Split off curves from ecp.c into ecp_curves.c2094 * Added optional optimization for NIST MODP curves (POLARSSL_ECP_NIST_OPTIM)2116 * Support for Brainpool curves and TLS ciphersuites (RFC 7027)
Completed in 45 milliseconds