Searched refs:curves (Results 1 – 7 of 7) sorted by relevance
31 my @curves = split( /\s+/, `sed -n -e '$sed_cmd' $config_h` );39 for my $curve (@curves) {
308 tests/scripts/curves.pl
243 const mbedtls_ecp_curve_info *curve_info, **curves; in ssl_parse_supported_elliptic_curves() local254 if( ssl->handshake->curves != NULL ) in ssl_parse_supported_elliptic_curves()266 if( ( curves = mbedtls_calloc( our_size, sizeof( *curves ) ) ) == NULL ) in ssl_parse_supported_elliptic_curves()269 ssl->handshake->curves = curves; in ssl_parse_supported_elliptic_curves()278 *curves++ = curve_info; in ssl_parse_supported_elliptic_curves()586 const mbedtls_ecp_curve_info **curves ) in ssl_check_key_curve() argument588 const mbedtls_ecp_curve_info **crv = curves; in ssl_check_key_curve()660 ssl_check_key_curve( cur->key, ssl->handshake->curves ) != 0 ) in ssl_pick_cert()757 ( ssl->handshake->curves == NULL || in ssl_ciphersuite_match()758 ssl->handshake->curves[0] == NULL ) ) in ssl_ciphersuite_match()[all …]
6988 mbedtls_free( (void *) handshake->curves ); in mbedtls_ssl_handshake_free()
185 const mbedtls_ecp_curve_info **curves; /*!< Supported elliptic curves */ member
1759 const mbedtls_ecp_group_id *curves );
117 * Fix issue that caused a crash if invalid curves were passed to338 which algorithms and key sizes (curves for ECDSA) are acceptable.877 * EC curves constants, which should be only in ROM since 1.3.3, were also943 * Support for the Koblitz curves: secp192k1, secp224k1, secp256k1977 * Split off curves from ecp.c into ecp_curves.c1003 * Added optional optimization for NIST MODP curves (POLARSSL_ECP_NIST_OPTIM)1025 * Support for Brainpool curves and TLS ciphersuites (RFC 7027)