Home | History | Annotate | Download | only in test

Lines Matching refs:curves

36 static EC_builtin_curve *curves = NULL;
1116 int nid = curves[n].nid;
1134 int r, nid = curves[n].nid;
1184 * several NIST curves with characteristic > 3.
1912 nid = curves[id].nid;
1958 /* Only NIST curves pass */
2098 nid = curves[id].nid;
2209 * EC_GROUP for built-in curves.
2236 nid = curves[id].nid;
2333 * match with the built-in curves
2601 * Test two random 256-bit explicit parameters curves with absent cofactor.
2602 * The two curves are chosen to roughly straddle the bounds at which the lib
2608 * For standards-compliant curves, cofactor is chosen as small as possible.
2609 * So you can see neither of these curves are fit for cryptographic use.
2613 * will always succeed in computing the cofactor. Neither of these curves
2639 * For named curves, test that:
2647 int nid = curves[n].nid;
2736 || !TEST_ptr(key = EC_KEY_new_by_curve_name(curves[id].nid))
2754 /* test for binary curves */
2760 /* test for prime curves */
2840 nid = curves[id].nid;
3111 nid = curves[id].nid;
3187 * check creation of curves from explicit params through the public API
3211 nid = curves[id].nid;
3234 ret = TEST_skip("binary curves not supported in this build");
3519 if (!TEST_ptr(curves = OPENSSL_malloc(sizeof(*curves) * crv_len))
3520 || !TEST_true(EC_get_builtin_curves(curves, crv_len)))
3550 OPENSSL_free(curves);