Searched refs:curves (Results 1 – 15 of 15) sorted by relevance
/mbedtls-development/tests/scripts/ |
A D | curves.pl | 51 my @curves = split( /\s+/, `sed -n -e '$sed_cmd' $config_h` ); 81 for my $curve (@curves) { 90 for my $curve (@curves) { 121 for my $curve (@curves) {
|
A D | basic-in-docker.sh | 43 run_in_docker tests/scripts/curves.pl
|
A D | all.sh | 1450 tests/scripts/curves.pl 1456 tests/scripts/curves.pl
|
/mbedtls-development/library/ |
A D | ssl_srv.c | 324 const mbedtls_ecp_curve_info *curve_info, **curves; in ssl_parse_supported_elliptic_curves() local 343 if( ssl->handshake->curves != NULL ) in ssl_parse_supported_elliptic_curves() 357 if( ( curves = mbedtls_calloc( our_size, sizeof( *curves ) ) ) == NULL ) in ssl_parse_supported_elliptic_curves() 364 ssl->handshake->curves = curves; in ssl_parse_supported_elliptic_curves() 373 *curves++ = curve_info; in ssl_parse_supported_elliptic_curves() 886 const mbedtls_ecp_curve_info **curves ) in ssl_check_key_curve() argument 888 const mbedtls_ecp_curve_info **crv = curves; in ssl_check_key_curve() 962 ssl_check_key_curve( &cur->cert->pk, ssl->handshake->curves ) != 0 ) in ssl_pick_cert() 1056 ( ssl->handshake->curves == NULL || in ssl_ciphersuite_match() 1057 ssl->handshake->curves[0] == NULL ) ) in ssl_ciphersuite_match() [all …]
|
A D | ssl_misc.h | 573 const mbedtls_ecp_curve_info **curves; /*!< Supported elliptic curves */ member
|
A D | ssl_tls.c | 5499 mbedtls_free( (void *) handshake->curves ); in mbedtls_ssl_handshake_free()
|
/mbedtls-development/programs/ssl/ |
A D | ssl_client2.c | 491 const char *curves; /* list of supported elliptic curves */ member 860 opt.curves = DFL_CURVES; in main() 1091 opt.curves = q; in main() 1448 if( opt.curves != NULL ) in main() 1450 p = (char *) opt.curves; in main() 1889 if( opt.curves != NULL && in main() 1890 strcmp( opt.curves, "default" ) != 0 ) in main()
|
A D | ssl_server2.c | 614 const char *curves; /* list of supported elliptic curves */ member 1542 opt.curves = DFL_CURVES; in main() 1714 opt.curves = q; in main() 2192 if( opt.curves != NULL ) in main() 2194 p = (char *) opt.curves; in main() 2903 if( opt.curves != NULL && in main() 2904 strcmp( opt.curves, "default" ) != 0 ) in main()
|
/mbedtls-development/docs/ |
A D | 3.0-migration-guide.md | 185 enabled curves. For example, for P-256 the difference is 1KB; see the documentation 719 ### TLS now favors faster curves over larger curves 721 …curves in TLS now favors resource usage (performance and memory consumption) over size. The exact … 986 … changed. They are now aligned, except that the X.509 profile only lists curves that support signa… 988 …curves weaker than 255 bits (security strength less than 128 bits) are no longer accepted by defau… 994 … instead of `mbedtls_x509_crt_verify` and pass a profile that allows the curves and hashes you wan… 1000 If you still need to allow hashes and curves in TLS that have been removed from the default configu…
|
/mbedtls-development/docs/proposed/ |
A D | psa-conditional-inclusion-c.md | 87 #### Configuration symbols for elliptic curves 89 For elliptic curve key types, only the specified curves are included. To include a curve, include a… 91 …ified by the fact that it is very common to wish to include only certain curves in a family, and t… 204 The names of [elliptic curve symbols](#configuration-symbols-for-elliptic-curves) are a bit weird: …
|
A D | psa-driver-interface.md | 162 … be used instead of a curve or group to indicate that the capability concerns all curves or groups.
|
/mbedtls-development/docs/architecture/ |
A D | tls13-experimental.md | 138 allowed curves as defined by the configuration. The allowed curves are 143 specification. The list of allowed curves can be changed through the
|
/mbedtls-development/ |
A D | ChangeLog | 166 curves. 257 now determined automatically based on supported curves. 689 only the curves that support ECDSA, filter the list with 1258 if some curves are not defined. Fixes #1591 reported by dbedev. 1897 curves as well as RSA. Fixes #777 found by dbedev. 2454 reflect bad EC curves within verification result. 2698 * Fix issue that caused a crash if invalid curves were passed to 2919 which algorithms and key sizes (curves for ECDSA) are acceptable. 3524 * Support for the Koblitz curves: secp192k1, secp224k1, secp256k1 3558 * Split off curves from ecp.c into ecp_curves.c [all …]
|
/mbedtls-development/include/mbedtls/ |
A D | ssl.h | 3216 const mbedtls_ecp_group_id *curves );
|
/mbedtls-development/tests/suites/ |
A D | test_suite_x509parse.function | 19 /* Test-only profile allowing all digests, PK algorithms, and curves. */
|
Completed in 57 milliseconds