| /src/sys/external/bsd/drm2/dist/drm/amd/display/dc/dce110/ |
| amdgpu_dce110_opp_regamma_v.c | 125 * build regamma curve by using predefined hw points 140 const struct gamma_curve *curve; local 199 curve = params->arr_curve_points; 205 curve[0].offset, 211 curve[0].segments_num, 217 curve[1].offset, 223 curve[1].segments_num, 233 curve += 2; 238 curve[0].offset, 244 curve[0].segments_num [all...] |
| /src/crypto/external/bsd/openssh/dist/ |
| ssh-ecdsa.c | 229 char *curve = NULL; local 235 if ((r = sshbuf_get_cstring(b, &curve, NULL)) != 0) 237 if (key->ecdsa_nid != sshkey_curve_name_to_nid(curve)) { 273 free(curve);
|
| /src/sys/external/bsd/drm2/dist/drm/amd/display/dc/dcn20/ |
| amdgpu_dcn20_dpp_cm.c | 584 const struct gamma_curve *curve; local 609 curve = params->arr_curve_points; 611 CM_SHAPER_RAMA_EXP_REGION0_LUT_OFFSET, curve[0].offset, 612 CM_SHAPER_RAMA_EXP_REGION0_NUM_SEGMENTS, curve[0].segments_num, 613 CM_SHAPER_RAMA_EXP_REGION1_LUT_OFFSET, curve[1].offset, 614 CM_SHAPER_RAMA_EXP_REGION1_NUM_SEGMENTS, curve[1].segments_num); 616 curve += 2; 618 CM_SHAPER_RAMA_EXP_REGION2_LUT_OFFSET, curve[0].offset, 619 CM_SHAPER_RAMA_EXP_REGION2_NUM_SEGMENTS, curve[0].segments_num, 620 CM_SHAPER_RAMA_EXP_REGION3_LUT_OFFSET, curve[1].offset 734 const struct gamma_curve *curve; local [all...] |
| /src/crypto/external/apache2/openssl/dist/providers/implementations/kem/ |
| ec_kem.c | 99 /* Returns NULL if the curve is not supported */ 119 const char *curve = ec_curvename_get0(ec); local 121 if (curve == NULL) 123 ctx->info = ossl_HPKE_KEM_INFO_find_curve(curve); 392 const char *curve = ec_curvename_get0(ec); local 395 if (curve == NULL) 398 info = ossl_HPKE_KEM_INFO_find_curve(curve); 495 * that it only uses one of the approved curve names when the key was set.
|
| /src/crypto/external/bsd/openssl/dist/ssl/ |
| t1_trce.c | 1194 int curve; local 1197 curve = (msg[1] << 8) | msg[2]; 1199 ssl_trace_str(curve, ssl_groups_tbl), curve); 1205 BIO_printf(bio, "UNKNOWN CURVE PARAMETER TYPE %d\n", msg[0]);
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| t1_trce.c | 1172 int curve; local 1175 curve = (msg[1] << 8) | msg[2]; 1177 ssl_trace_str(curve, ssl_groups_tbl), curve); 1183 BIO_printf(bio, "UNKNOWN CURVE PARAMETER TYPE %d\n", msg[0]);
|
| /src/external/bsd/wpa/dist/src/common/ |
| dpp_pkex.c | 37 const struct dpp_curve_params *curve = pkex->own_bi->curve; local 43 Qi = dpp_pkex_derive_Qi(curve, v2 ? NULL : pkex->own_mac, pkex->code, 59 pkex->x = dpp_gen_keypair(curve); 62 pkex->x = dpp_gen_keypair(curve); 86 attr_len += 4 + 2 * curve->prime_len; 111 wpabuf_put_le16(msg, curve->ike_group); 133 wpabuf_put_le16(msg, 2 * curve->prime_len); 138 if (dpp_test_gen_invalid_key(msg, curve) < 0) 144 Mx = wpabuf_put(msg, curve->prime_len) 222 const struct dpp_curve_params *curve = pkex->own_bi->curve; local 351 const struct dpp_curve_params *curve = bi->curve; local 588 const struct dpp_curve_params *curve = pkex->own_bi->curve; local 705 const struct dpp_curve_params *curve = pkex->own_bi->curve; local 909 const struct dpp_curve_params *curve = pkex->own_bi->curve; local 1022 const struct dpp_curve_params *curve = pkex->own_bi->curve; local 1203 const struct dpp_curve_params *curve = pkex->own_bi->curve; local [all...] |
| dpp_reconfig.c | 138 4 + auth->curve->nonce_len; 175 wpabuf_put_le16(msg, auth->curve->nonce_len); 176 wpabuf_put_data(msg, auth->c_nonce, auth->curve->nonce_len); 188 const struct dpp_curve_params *curve) 197 "DPP: Sign own Configurator Connector for reconfiguration with curve %s", 198 conf->curve->name); 199 conf->connector_key = dpp_gen_keypair(curve); 204 dppcon = wpabuf_alloc(1000 + 2 * curve->prime_len * 4 / 3); 217 curve) < 0) { 244 const struct dpp_curve_params *curve; local [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/ec/ |
| ec_asn1.c | 72 X9_62_CURVE *curve; member in struct:ec_parameters_st 144 = { ASN1_EMBED(ECPARAMETERS, version, INT32), ASN1_SIMPLE(ECPARAMETERS, fieldID, X9_62_FIELDID), ASN1_SIMPLE(ECPARAMETERS, curve, X9_62_CURVE), ASN1_SIMPLE(ECPARAMETERS, base, ASN1_OCTET_STRING), ASN1_SIMPLE(ECPARAMETERS, order, ASN1_INTEGER), ASN1_OPT(ECPARAMETERS, cofactor, ASN1_INTEGER) } ASN1_SEQUENCE_END(ECPARAMETERS) 301 static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve) 308 if (!group || !curve || !curve->a || !curve->b) 323 * Per SEC 1, the curve coefficients must be padded up to size. See C.2's 324 * definition of Curve, C.1's definition of FieldElement, and 2.3.5's 338 if (!ASN1_OCTET_STRING_set(curve->a, a_buf, len) 339 || !ASN1_OCTET_STRING_set(curve->b, b_buf, len)) [all...] |
| ec_curve.c | 1936 * recommended (Weil-descent). As the group order is not a prime this curve 1967 * recommended (Weil-descent). As the group order is not a prime this curve 2720 "NIST/SECG curve over a 224 bit prime field" }, 2730 "NIST/SECG curve over a 384 bit prime field" }, 2740 "NIST/SECG curve over a 521 bit prime field" }, 2744 "NIST/X9.62/SECG curve over a 192 bit prime field" }, 2755 "X9.62/SECG curve over a 256 bit prime field" }, 2761 "NIST/SECG/WTLS curve over a 163 bit binary field" }, 2763 "NIST/SECG curve over a 163 bit binary field" }, 2765 "NIST/SECG/WTLS curve over a 233 bit binary field" } 3192 const ec_list_element *curve; local 3317 const ec_list_element curve = curve_list[i]; local [all...] |
| /src/crypto/external/apache2/openssl/dist/ssl/ |
| t1_trce.c | 1266 int curve; local 1269 curve = (msg[1] << 8) | msg[2]; 1271 ssl_trace_str(curve, ssl_groups_tbl), curve); 1277 BIO_printf(bio, "UNKNOWN CURVE PARAMETER TYPE %d\n", msg[0]);
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| evp_pkey_dhkem_test.c | 45 TEST_note("Test %s %s Decapsulate", t->curve, 48 if (!TEST_ptr(rpub = new_raw_public_key(t->curve, t->rpub, t->rpublen))) 52 if (!TEST_ptr(spriv = new_raw_private_key(t->curve, 71 TEST_note("Test %s %s Decapsulate", t->curve, t->spub != NULL ? "Auth" : ""); 73 if (!TEST_ptr(rpriv = new_raw_private_key(t->curve, t->rpriv, t->rprivlen, 77 if (!TEST_ptr(spub = new_raw_public_key(t->curve, t->spub, t->spublen))) 125 /* Check non nist curve fails */ 138 /* Fail if curve is not one of P-256, P-384 or P-521 */ 248 /* Fail if the auth key has a different curve */ 307 ret = TEST_ptr(key = new_raw_private_key(t->curve, t->rpriv, t->rprivlen 528 const char *curve; local [all...] |
| acvp_test.c | 360 const char *curve = "K-283"; /* A curve that has a cofactor that it not 1 */ local 370 if (!TEST_ptr(peer1 = EVP_PKEY_Q_keygen(libctx, NULL, "EC", curve))) 371 return TEST_skip("Curve %s not supported by the FIPS provider", curve); 373 if (!TEST_ptr(peer2 = EVP_PKEY_Q_keygen(libctx, NULL, "EC", curve)))
|
| evp_pkey_provided_test.c | 1608 const char *curve = "prime256v1"; local 1609 const char bad_curve[] = "nonexistent-curve"; 1659 curve, 0) 1683 /* try importing parameters with bad curve first */ 1722 if (!TEST_ptr(group = EC_GROUP_new_by_curve_name(OBJ_sn2nid(curve))) 1751 || !TEST_str_eq(out_curve_name, curve)
|
| /src/crypto/external/bsd/openssl/dist/crypto/ec/ |
| ec_asn1.c | 71 X9_62_CURVE *curve; member in struct:ec_parameters_st 148 ASN1_SIMPLE(ECPARAMETERS, curve, X9_62_CURVE), 309 static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve) 316 if (!group || !curve || !curve->a || !curve->b) 331 * Per SEC 1, the curve coefficients must be padded up to size. See C.2's 332 * definition of Curve, C.1's definition of FieldElement, and 2.3.5's 348 if (!ASN1_OCTET_STRING_set(curve->a, a_buf, len) 349 || !ASN1_OCTET_STRING_set(curve->b, b_buf, len)) [all...] |
| ec_curve.c | 2160 * recommended (Weil-descent). As the group order is not a prime this curve 2195 * recommended (Weil-descent). As the group order is not a prime this curve 2836 "NIST/SECG curve over a 224 bit prime field"}, 2844 "NIST/SECG curve over a 384 bit prime field"}, 2854 "NIST/SECG curve over a 521 bit prime field"}, 2858 "NIST/X9.62/SECG curve over a 192 bit prime field"}, 2869 "X9.62/SECG curve over a 256 bit prime field"}, 2875 "NIST/SECG/WTLS curve over a 163 bit binary field"}, 2877 "NIST/SECG curve over a 163 bit binary field"}, 2879 "NIST/SECG/WTLS curve over a 233 bit binary field"} 3284 const ec_list_element *curve; local 3409 const ec_list_element curve = curve_list[i]; local [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/ec/ |
| ec_asn1.c | 134 X9_62_CURVE *curve; member in struct:ec_parameters_st 211 ASN1_SIMPLE(ECPARAMETERS, curve, X9_62_CURVE), 372 static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve) 379 if (!group || !curve || !curve->a || !curve->b) 394 * Per SEC 1, the curve coefficients must be padded up to size. See C.2's 395 * definition of Curve, C.1's definition of FieldElement, and 2.3.5's 411 if (!ASN1_OCTET_STRING_set(curve->a, a_buf, len) 412 || !ASN1_OCTET_STRING_set(curve->b, b_buf, len)) [all...] |
| ec_curve.c | 2137 * recommended (Weil-descent). As the group order is not a prime this curve 2172 * recommended (Weil-descent). As the group order is not a prime this curve 2805 "SECG/WTLS curve over a 112 bit prime field"}, 2807 "SECG curve over a 112 bit prime field"}, 2809 "SECG curve over a 128 bit prime field"}, 2811 "SECG curve over a 128 bit prime field"}, 2813 "SECG curve over a 160 bit prime field"}, 2815 "SECG curve over a 160 bit prime field"}, 2817 "SECG/WTLS curve over a 160 bit prime field"}, 2820 "SECG curve over a 192 bit prime field"} 3307 const ec_list_element curve = curve_list[i]; local [all...] |
| /src/sys/external/bsd/drm2/dist/drm/amd/display/dc/dce/ |
| amdgpu_dce_transform.c | 1217 const struct gamma_curve *curve; local 1233 curve = params->arr_curve_points; 1236 REGAMMA_CNTLA_EXP_REGION0_LUT_OFFSET, curve[0].offset, 1237 REGAMMA_CNTLA_EXP_REGION0_NUM_SEGMENTS, curve[0].segments_num, 1238 REGAMMA_CNTLA_EXP_REGION1_LUT_OFFSET, curve[1].offset, 1239 REGAMMA_CNTLA_EXP_REGION1_NUM_SEGMENTS, curve[1].segments_num); 1240 curve += 2; 1243 REGAMMA_CNTLA_EXP_REGION0_LUT_OFFSET, curve[0].offset, 1244 REGAMMA_CNTLA_EXP_REGION0_NUM_SEGMENTS, curve[0].segments_num, 1245 REGAMMA_CNTLA_EXP_REGION1_LUT_OFFSET, curve[1].offset [all...] |
| /src/crypto/external/bsd/openssl/dist/ssl/statem/ |
| statem_lib.c | 1527 int curve; local 1564 * Prior to TLSv1.3 sig algs allowed any curve to be used. TLSv1.3 is 1568 curve = ssl_get_EC_curve_nid(s->cert->pkeys[SSL_PKEY_ECC].privatekey); 1569 if (tls_check_sigalg_curve(s, curve))
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| evp_pkey_provided_test.c | 1188 const char *curve = "prime256v1"; local 1189 const char bad_curve[] = "nonexistent-curve"; 1240 curve, 0) <= 0) 1262 /* try importing parameters with bad curve first */ 1300 if (!TEST_ptr(group = EC_GROUP_new_by_curve_name(OBJ_sn2nid(curve))) 1329 || !TEST_str_eq(out_curve_name, curve)
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
| statem_lib.c | 1514 int curve; local 1554 * Prior to TLSv1.3 sig algs allowed any curve to be used. TLSv1.3 is 1561 curve = EC_GROUP_get_curve_name(EC_KEY_get0_group(eckey)); 1562 if (tls_check_sigalg_curve(s, curve))
|
| /src/sys/external/bsd/drm2/dist/drm/amd/display/modules/color/ |
| amdgpu_color_gamma.c | 1021 static bool build_degamma(struct pwl_float_data_ex *curve, 1042 curve[i].r = dc_fixpt_zero; 1043 curve[i].g = dc_fixpt_zero; 1044 curve[i].b = dc_fixpt_zero; 1049 curve[i].r = translate_to_linear_space_ex( 1051 curve[i].g = curve[i].r; 1052 curve[i].b = curve[i].r; 1056 curve[i].r = dc_fixpt_one 1796 struct pwl_float_data_ex *curve = NULL; local [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/evp/ |
| p_lib.c | 796 int curve = EC_GROUP_get_curve_name(group); local 799 * Regardless of what is requested the SM2 curve must be SM2 type, 802 if (curve == NID_sm2 && pktype == EVP_PKEY_EC) 804 else if (curve != NID_sm2 && pktype == EVP_PKEY_SM2)
|
| /src/crypto/external/apache2/openssl/dist/ssl/statem/ |
| statem_lib.c | 1926 int curve; local 1965 * Prior to TLSv1.3 sig algs allowed any curve to be used. TLSv1.3 is 1969 curve = ssl_get_EC_curve_nid(s->cert->pkeys[SSL_PKEY_ECC].privatekey); 1970 if (tls_check_sigalg_curve(s, curve))
|