Home
last modified time | relevance | path

Searched refs:curves (Results 1 – 15 of 15) sorted by relevance

/mbedtls-development/tests/scripts/
A Dcurves.pl51 my @curves = split( /\s+/, `sed -n -e '$sed_cmd' $config_h` );
81 for my $curve (@curves) {
90 for my $curve (@curves) {
121 for my $curve (@curves) {
A Dbasic-in-docker.sh43 run_in_docker tests/scripts/curves.pl
A Dall.sh1450 tests/scripts/curves.pl
1456 tests/scripts/curves.pl
/mbedtls-development/library/
A Dssl_srv.c324 const mbedtls_ecp_curve_info *curve_info, **curves; in ssl_parse_supported_elliptic_curves() local
343 if( ssl->handshake->curves != NULL ) in ssl_parse_supported_elliptic_curves()
357 if( ( curves = mbedtls_calloc( our_size, sizeof( *curves ) ) ) == NULL ) in ssl_parse_supported_elliptic_curves()
364 ssl->handshake->curves = curves; in ssl_parse_supported_elliptic_curves()
373 *curves++ = curve_info; in ssl_parse_supported_elliptic_curves()
886 const mbedtls_ecp_curve_info **curves ) in ssl_check_key_curve() argument
888 const mbedtls_ecp_curve_info **crv = curves; in ssl_check_key_curve()
962 ssl_check_key_curve( &cur->cert->pk, ssl->handshake->curves ) != 0 ) in ssl_pick_cert()
1056 ( ssl->handshake->curves == NULL || in ssl_ciphersuite_match()
1057 ssl->handshake->curves[0] == NULL ) ) in ssl_ciphersuite_match()
[all …]
A Dssl_misc.h573 const mbedtls_ecp_curve_info **curves; /*!< Supported elliptic curves */ member
A Dssl_tls.c5499 mbedtls_free( (void *) handshake->curves ); in mbedtls_ssl_handshake_free()
/mbedtls-development/programs/ssl/
A Dssl_client2.c491 const char *curves; /* list of supported elliptic curves */ member
860 opt.curves = DFL_CURVES; in main()
1091 opt.curves = q; in main()
1448 if( opt.curves != NULL ) in main()
1450 p = (char *) opt.curves; in main()
1889 if( opt.curves != NULL && in main()
1890 strcmp( opt.curves, "default" ) != 0 ) in main()
A Dssl_server2.c614 const char *curves; /* list of supported elliptic curves */ member
1542 opt.curves = DFL_CURVES; in main()
1714 opt.curves = q; in main()
2192 if( opt.curves != NULL ) in main()
2194 p = (char *) opt.curves; in main()
2903 if( opt.curves != NULL && in main()
2904 strcmp( opt.curves, "default" ) != 0 ) in main()
/mbedtls-development/docs/
A D3.0-migration-guide.md185 enabled curves. For example, for P-256 the difference is 1KB; see the documentation
719 ### TLS now favors faster curves over larger curves
721curves in TLS now favors resource usage (performance and memory consumption) over size. The exact …
986 … changed. They are now aligned, except that the X.509 profile only lists curves that support signa…
988curves weaker than 255 bits (security strength less than 128 bits) are no longer accepted by defau…
994 … instead of `mbedtls_x509_crt_verify` and pass a profile that allows the curves and hashes you wan…
1000 If you still need to allow hashes and curves in TLS that have been removed from the default configu…
/mbedtls-development/docs/proposed/
A Dpsa-conditional-inclusion-c.md87 #### Configuration symbols for elliptic curves
89 For elliptic curve key types, only the specified curves are included. To include a curve, include a…
91 …ified by the fact that it is very common to wish to include only certain curves in a family, and t…
204 The names of [elliptic curve symbols](#configuration-symbols-for-elliptic-curves) are a bit weird: …
A Dpsa-driver-interface.md162 … be used instead of a curve or group to indicate that the capability concerns all curves or groups.
/mbedtls-development/docs/architecture/
A Dtls13-experimental.md138 allowed curves as defined by the configuration. The allowed curves are
143 specification. The list of allowed curves can be changed through the
/mbedtls-development/
A DChangeLog166 curves.
257 now determined automatically based on supported curves.
689 only the curves that support ECDSA, filter the list with
1258 if some curves are not defined. Fixes #1591 reported by dbedev.
1897 curves as well as RSA. Fixes #777 found by dbedev.
2454 reflect bad EC curves within verification result.
2698 * Fix issue that caused a crash if invalid curves were passed to
2919 which algorithms and key sizes (curves for ECDSA) are acceptable.
3524 * Support for the Koblitz curves: secp192k1, secp224k1, secp256k1
3558 * Split off curves from ecp.c into ecp_curves.c
[all …]
/mbedtls-development/include/mbedtls/
A Dssl.h3216 const mbedtls_ecp_group_id *curves );
/mbedtls-development/tests/suites/
A Dtest_suite_x509parse.function19 /* Test-only profile allowing all digests, PK algorithms, and curves. */

Completed in 57 milliseconds