Home
last modified time | relevance | path

Searched refs:curves (Results 1 – 7 of 7) sorted by relevance

/net-tools-3.7.0/mbedtls-2.4.0/tests/scripts/
Dcurves.pl31 my @curves = split( /\s+/, `sed -n -e '$sed_cmd' $config_h` );
39 for my $curve (@curves) {
Dall.sh308 tests/scripts/curves.pl
/net-tools-3.7.0/mbedtls-2.4.0/library/
Dssl_srv.c243 const mbedtls_ecp_curve_info *curve_info, **curves; in ssl_parse_supported_elliptic_curves() local
254 if( ssl->handshake->curves != NULL ) in ssl_parse_supported_elliptic_curves()
266 if( ( curves = mbedtls_calloc( our_size, sizeof( *curves ) ) ) == NULL ) in ssl_parse_supported_elliptic_curves()
269 ssl->handshake->curves = curves; in ssl_parse_supported_elliptic_curves()
278 *curves++ = curve_info; in ssl_parse_supported_elliptic_curves()
586 const mbedtls_ecp_curve_info **curves ) in ssl_check_key_curve() argument
588 const mbedtls_ecp_curve_info **crv = curves; in ssl_check_key_curve()
660 ssl_check_key_curve( cur->key, ssl->handshake->curves ) != 0 ) in ssl_pick_cert()
757 ( ssl->handshake->curves == NULL || in ssl_ciphersuite_match()
758 ssl->handshake->curves[0] == NULL ) ) in ssl_ciphersuite_match()
[all …]
Dssl_tls.c6988 mbedtls_free( (void *) handshake->curves ); in mbedtls_ssl_handshake_free()
/net-tools-3.7.0/mbedtls-2.4.0/include/mbedtls/
Dssl_internal.h185 const mbedtls_ecp_curve_info **curves; /*!< Supported elliptic curves */ member
Dssl.h1759 const mbedtls_ecp_group_id *curves );
/net-tools-3.7.0/mbedtls-2.4.0/
DChangeLog117 * Fix issue that caused a crash if invalid curves were passed to
338 which algorithms and key sizes (curves for ECDSA) are acceptable.
877 * EC curves constants, which should be only in ROM since 1.3.3, were also
943 * Support for the Koblitz curves: secp192k1, secp224k1, secp256k1
977 * Split off curves from ecp.c into ecp_curves.c
1003 * Added optional optimization for NIST MODP curves (POLARSSL_ECP_NIST_OPTIM)
1025 * Support for Brainpool curves and TLS ciphersuites (RFC 7027)