HomeSort by: relevance | last modified time | path
    Searched defs:curve (Results 1 - 25 of 39) sorted by relevancy

1 2

  /src/sys/external/bsd/drm2/dist/drm/amd/display/dc/dce110/
amdgpu_dce110_opp_regamma_v.c 125 * build regamma curve by using predefined hw points
140 const struct gamma_curve *curve; local
199 curve = params->arr_curve_points;
205 curve[0].offset,
211 curve[0].segments_num,
217 curve[1].offset,
223 curve[1].segments_num,
233 curve += 2;
238 curve[0].offset,
244 curve[0].segments_num
    [all...]
  /src/crypto/external/bsd/openssh/dist/
ssh-ecdsa.c 229 char *curve = NULL; local
235 if ((r = sshbuf_get_cstring(b, &curve, NULL)) != 0)
237 if (key->ecdsa_nid != sshkey_curve_name_to_nid(curve)) {
273 free(curve);
  /src/sys/external/bsd/drm2/dist/drm/amd/display/dc/dcn20/
amdgpu_dcn20_dpp_cm.c 584 const struct gamma_curve *curve; local
609 curve = params->arr_curve_points;
611 CM_SHAPER_RAMA_EXP_REGION0_LUT_OFFSET, curve[0].offset,
612 CM_SHAPER_RAMA_EXP_REGION0_NUM_SEGMENTS, curve[0].segments_num,
613 CM_SHAPER_RAMA_EXP_REGION1_LUT_OFFSET, curve[1].offset,
614 CM_SHAPER_RAMA_EXP_REGION1_NUM_SEGMENTS, curve[1].segments_num);
616 curve += 2;
618 CM_SHAPER_RAMA_EXP_REGION2_LUT_OFFSET, curve[0].offset,
619 CM_SHAPER_RAMA_EXP_REGION2_NUM_SEGMENTS, curve[0].segments_num,
620 CM_SHAPER_RAMA_EXP_REGION3_LUT_OFFSET, curve[1].offset
734 const struct gamma_curve *curve; local
    [all...]
  /src/crypto/external/apache2/openssl/dist/providers/implementations/kem/
ec_kem.c 99 /* Returns NULL if the curve is not supported */
119 const char *curve = ec_curvename_get0(ec); local
121 if (curve == NULL)
123 ctx->info = ossl_HPKE_KEM_INFO_find_curve(curve);
392 const char *curve = ec_curvename_get0(ec); local
395 if (curve == NULL)
398 info = ossl_HPKE_KEM_INFO_find_curve(curve);
495 * that it only uses one of the approved curve names when the key was set.
  /src/crypto/external/bsd/openssl/dist/ssl/
t1_trce.c 1194 int curve; local
1197 curve = (msg[1] << 8) | msg[2];
1199 ssl_trace_str(curve, ssl_groups_tbl), curve);
1205 BIO_printf(bio, "UNKNOWN CURVE PARAMETER TYPE %d\n", msg[0]);
  /src/crypto/external/bsd/openssl.old/dist/ssl/
t1_trce.c 1172 int curve; local
1175 curve = (msg[1] << 8) | msg[2];
1177 ssl_trace_str(curve, ssl_groups_tbl), curve);
1183 BIO_printf(bio, "UNKNOWN CURVE PARAMETER TYPE %d\n", msg[0]);
  /src/external/bsd/wpa/dist/src/common/
dpp_pkex.c 37 const struct dpp_curve_params *curve = pkex->own_bi->curve; local
43 Qi = dpp_pkex_derive_Qi(curve, v2 ? NULL : pkex->own_mac, pkex->code,
59 pkex->x = dpp_gen_keypair(curve);
62 pkex->x = dpp_gen_keypair(curve);
86 attr_len += 4 + 2 * curve->prime_len;
111 wpabuf_put_le16(msg, curve->ike_group);
133 wpabuf_put_le16(msg, 2 * curve->prime_len);
138 if (dpp_test_gen_invalid_key(msg, curve) < 0)
144 Mx = wpabuf_put(msg, curve->prime_len)
222 const struct dpp_curve_params *curve = pkex->own_bi->curve; local
351 const struct dpp_curve_params *curve = bi->curve; local
588 const struct dpp_curve_params *curve = pkex->own_bi->curve; local
705 const struct dpp_curve_params *curve = pkex->own_bi->curve; local
909 const struct dpp_curve_params *curve = pkex->own_bi->curve; local
1022 const struct dpp_curve_params *curve = pkex->own_bi->curve; local
1203 const struct dpp_curve_params *curve = pkex->own_bi->curve; local
    [all...]
dpp_reconfig.c 138 4 + auth->curve->nonce_len;
175 wpabuf_put_le16(msg, auth->curve->nonce_len);
176 wpabuf_put_data(msg, auth->c_nonce, auth->curve->nonce_len);
188 const struct dpp_curve_params *curve)
197 "DPP: Sign own Configurator Connector for reconfiguration with curve %s",
198 conf->curve->name);
199 conf->connector_key = dpp_gen_keypair(curve);
204 dppcon = wpabuf_alloc(1000 + 2 * curve->prime_len * 4 / 3);
217 curve) < 0) {
244 const struct dpp_curve_params *curve; local
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/ec/
ec_asn1.c 72 X9_62_CURVE *curve; member in struct:ec_parameters_st
144 = { ASN1_EMBED(ECPARAMETERS, version, INT32), ASN1_SIMPLE(ECPARAMETERS, fieldID, X9_62_FIELDID), ASN1_SIMPLE(ECPARAMETERS, curve, X9_62_CURVE), ASN1_SIMPLE(ECPARAMETERS, base, ASN1_OCTET_STRING), ASN1_SIMPLE(ECPARAMETERS, order, ASN1_INTEGER), ASN1_OPT(ECPARAMETERS, cofactor, ASN1_INTEGER) } ASN1_SEQUENCE_END(ECPARAMETERS)
301 static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve)
308 if (!group || !curve || !curve->a || !curve->b)
323 * Per SEC 1, the curve coefficients must be padded up to size. See C.2's
324 * definition of Curve, C.1's definition of FieldElement, and 2.3.5's
338 if (!ASN1_OCTET_STRING_set(curve->a, a_buf, len)
339 || !ASN1_OCTET_STRING_set(curve->b, b_buf, len))
    [all...]
ec_curve.c 1936 * recommended (Weil-descent). As the group order is not a prime this curve
1967 * recommended (Weil-descent). As the group order is not a prime this curve
2720 "NIST/SECG curve over a 224 bit prime field" },
2730 "NIST/SECG curve over a 384 bit prime field" },
2740 "NIST/SECG curve over a 521 bit prime field" },
2744 "NIST/X9.62/SECG curve over a 192 bit prime field" },
2755 "X9.62/SECG curve over a 256 bit prime field" },
2761 "NIST/SECG/WTLS curve over a 163 bit binary field" },
2763 "NIST/SECG curve over a 163 bit binary field" },
2765 "NIST/SECG/WTLS curve over a 233 bit binary field" }
3192 const ec_list_element *curve; local
3317 const ec_list_element curve = curve_list[i]; local
    [all...]
  /src/crypto/external/apache2/openssl/dist/ssl/
t1_trce.c 1266 int curve; local
1269 curve = (msg[1] << 8) | msg[2];
1271 ssl_trace_str(curve, ssl_groups_tbl), curve);
1277 BIO_printf(bio, "UNKNOWN CURVE PARAMETER TYPE %d\n", msg[0]);
  /src/crypto/external/apache2/openssl/dist/test/
evp_pkey_dhkem_test.c 45 TEST_note("Test %s %s Decapsulate", t->curve,
48 if (!TEST_ptr(rpub = new_raw_public_key(t->curve, t->rpub, t->rpublen)))
52 if (!TEST_ptr(spriv = new_raw_private_key(t->curve,
71 TEST_note("Test %s %s Decapsulate", t->curve, t->spub != NULL ? "Auth" : "");
73 if (!TEST_ptr(rpriv = new_raw_private_key(t->curve, t->rpriv, t->rprivlen,
77 if (!TEST_ptr(spub = new_raw_public_key(t->curve, t->spub, t->spublen)))
125 /* Check non nist curve fails */
138 /* Fail if curve is not one of P-256, P-384 or P-521 */
248 /* Fail if the auth key has a different curve */
307 ret = TEST_ptr(key = new_raw_private_key(t->curve, t->rpriv, t->rprivlen
528 const char *curve; local
    [all...]
acvp_test.c 360 const char *curve = "K-283"; /* A curve that has a cofactor that it not 1 */ local
370 if (!TEST_ptr(peer1 = EVP_PKEY_Q_keygen(libctx, NULL, "EC", curve)))
371 return TEST_skip("Curve %s not supported by the FIPS provider", curve);
373 if (!TEST_ptr(peer2 = EVP_PKEY_Q_keygen(libctx, NULL, "EC", curve)))
evp_pkey_provided_test.c 1608 const char *curve = "prime256v1"; local
1609 const char bad_curve[] = "nonexistent-curve";
1659 curve, 0)
1683 /* try importing parameters with bad curve first */
1722 if (!TEST_ptr(group = EC_GROUP_new_by_curve_name(OBJ_sn2nid(curve)))
1751 || !TEST_str_eq(out_curve_name, curve)
  /src/crypto/external/bsd/openssl/dist/crypto/ec/
ec_asn1.c 71 X9_62_CURVE *curve; member in struct:ec_parameters_st
148 ASN1_SIMPLE(ECPARAMETERS, curve, X9_62_CURVE),
309 static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve)
316 if (!group || !curve || !curve->a || !curve->b)
331 * Per SEC 1, the curve coefficients must be padded up to size. See C.2's
332 * definition of Curve, C.1's definition of FieldElement, and 2.3.5's
348 if (!ASN1_OCTET_STRING_set(curve->a, a_buf, len)
349 || !ASN1_OCTET_STRING_set(curve->b, b_buf, len))
    [all...]
ec_curve.c 2160 * recommended (Weil-descent). As the group order is not a prime this curve
2195 * recommended (Weil-descent). As the group order is not a prime this curve
2836 "NIST/SECG curve over a 224 bit prime field"},
2844 "NIST/SECG curve over a 384 bit prime field"},
2854 "NIST/SECG curve over a 521 bit prime field"},
2858 "NIST/X9.62/SECG curve over a 192 bit prime field"},
2869 "X9.62/SECG curve over a 256 bit prime field"},
2875 "NIST/SECG/WTLS curve over a 163 bit binary field"},
2877 "NIST/SECG curve over a 163 bit binary field"},
2879 "NIST/SECG/WTLS curve over a 233 bit binary field"}
3284 const ec_list_element *curve; local
3409 const ec_list_element curve = curve_list[i]; local
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/crypto/ec/
ec_asn1.c 134 X9_62_CURVE *curve; member in struct:ec_parameters_st
211 ASN1_SIMPLE(ECPARAMETERS, curve, X9_62_CURVE),
372 static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve)
379 if (!group || !curve || !curve->a || !curve->b)
394 * Per SEC 1, the curve coefficients must be padded up to size. See C.2's
395 * definition of Curve, C.1's definition of FieldElement, and 2.3.5's
411 if (!ASN1_OCTET_STRING_set(curve->a, a_buf, len)
412 || !ASN1_OCTET_STRING_set(curve->b, b_buf, len))
    [all...]
ec_curve.c 2137 * recommended (Weil-descent). As the group order is not a prime this curve
2172 * recommended (Weil-descent). As the group order is not a prime this curve
2805 "SECG/WTLS curve over a 112 bit prime field"},
2807 "SECG curve over a 112 bit prime field"},
2809 "SECG curve over a 128 bit prime field"},
2811 "SECG curve over a 128 bit prime field"},
2813 "SECG curve over a 160 bit prime field"},
2815 "SECG curve over a 160 bit prime field"},
2817 "SECG/WTLS curve over a 160 bit prime field"},
2820 "SECG curve over a 192 bit prime field"}
3307 const ec_list_element curve = curve_list[i]; local
    [all...]
  /src/sys/external/bsd/drm2/dist/drm/amd/display/dc/dce/
amdgpu_dce_transform.c 1217 const struct gamma_curve *curve; local
1233 curve = params->arr_curve_points;
1236 REGAMMA_CNTLA_EXP_REGION0_LUT_OFFSET, curve[0].offset,
1237 REGAMMA_CNTLA_EXP_REGION0_NUM_SEGMENTS, curve[0].segments_num,
1238 REGAMMA_CNTLA_EXP_REGION1_LUT_OFFSET, curve[1].offset,
1239 REGAMMA_CNTLA_EXP_REGION1_NUM_SEGMENTS, curve[1].segments_num);
1240 curve += 2;
1243 REGAMMA_CNTLA_EXP_REGION0_LUT_OFFSET, curve[0].offset,
1244 REGAMMA_CNTLA_EXP_REGION0_NUM_SEGMENTS, curve[0].segments_num,
1245 REGAMMA_CNTLA_EXP_REGION1_LUT_OFFSET, curve[1].offset
    [all...]
  /src/crypto/external/bsd/openssl/dist/ssl/statem/
statem_lib.c 1527 int curve; local
1564 * Prior to TLSv1.3 sig algs allowed any curve to be used. TLSv1.3 is
1568 curve = ssl_get_EC_curve_nid(s->cert->pkeys[SSL_PKEY_ECC].privatekey);
1569 if (tls_check_sigalg_curve(s, curve))
  /src/crypto/external/bsd/openssl/dist/test/
evp_pkey_provided_test.c 1188 const char *curve = "prime256v1"; local
1189 const char bad_curve[] = "nonexistent-curve";
1240 curve, 0) <= 0)
1262 /* try importing parameters with bad curve first */
1300 if (!TEST_ptr(group = EC_GROUP_new_by_curve_name(OBJ_sn2nid(curve)))
1329 || !TEST_str_eq(out_curve_name, curve)
  /src/crypto/external/bsd/openssl.old/dist/ssl/statem/
statem_lib.c 1514 int curve; local
1554 * Prior to TLSv1.3 sig algs allowed any curve to be used. TLSv1.3 is
1561 curve = EC_GROUP_get_curve_name(EC_KEY_get0_group(eckey));
1562 if (tls_check_sigalg_curve(s, curve))
  /src/sys/external/bsd/drm2/dist/drm/amd/display/modules/color/
amdgpu_color_gamma.c 1021 static bool build_degamma(struct pwl_float_data_ex *curve,
1042 curve[i].r = dc_fixpt_zero;
1043 curve[i].g = dc_fixpt_zero;
1044 curve[i].b = dc_fixpt_zero;
1049 curve[i].r = translate_to_linear_space_ex(
1051 curve[i].g = curve[i].r;
1052 curve[i].b = curve[i].r;
1056 curve[i].r = dc_fixpt_one
1796 struct pwl_float_data_ex *curve = NULL; local
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/evp/
p_lib.c 796 int curve = EC_GROUP_get_curve_name(group); local
799 * Regardless of what is requested the SM2 curve must be SM2 type,
802 if (curve == NID_sm2 && pktype == EVP_PKEY_EC)
804 else if (curve != NID_sm2 && pktype == EVP_PKEY_SM2)
  /src/crypto/external/apache2/openssl/dist/ssl/statem/
statem_lib.c 1926 int curve; local
1965 * Prior to TLSv1.3 sig algs allowed any curve to be used. TLSv1.3 is
1969 curve = ssl_get_EC_curve_nid(s->cert->pkeys[SSL_PKEY_ECC].privatekey);
1970 if (tls_check_sigalg_curve(s, curve))

Completed in 73 milliseconds

1 2