HomeSort by: relevance | last modified time | path
    Searched refs:ecdh (Results 1 - 25 of 62) sorted by relevancy

1 2 3

  /src/tests/crypto/libcrypto/ecdh/
Makefile 4 HELPER_DIR= ecdh
  /src/crypto/external/apache2/openssl/dist/demos/keyexch/
Makefile 7 TESTS = x25519 ecdh
16 ecdh: ecdh.o
  /src/crypto/external/apache2/openssl/dist/crypto/ec/
ecdh_ossl.c 12 * ECDH low level APIs are deprecated for public use, but still ok for
29 const EC_POINT *pub_key, const EC_KEY *ecdh)
31 if (ecdh->group->meth->ecdh_compute_key == NULL) {
36 return ecdh->group->meth->ecdh_compute_key(psec, pseclen, pub_key, ecdh);
50 const EC_POINT *pub_key, const EC_KEY *ecdh)
61 if ((ctx = BN_CTX_new_ex(ecdh->libctx)) == NULL)
70 priv_key = EC_KEY_get0_private_key(ecdh);
76 group = EC_KEY_get0_group(ecdh);
82 if (EC_KEY_get_flags(ecdh) & EC_FLAG_COFACTOR_ECDH)
    [all...]
ec_kmeth.c 11 * ECDH and ECDSA low level APIs are deprecated for public use, but still ok
222 const EC_KEY *ecdh))
295 const EC_KEY *ecdh))
  /src/crypto/external/bsd/openssl/dist/crypto/ec/
ecdh_ossl.c 12 * ECDH low level APIs are deprecated for public use, but still ok for
29 const EC_POINT *pub_key, const EC_KEY *ecdh)
31 if (ecdh->group->meth->ecdh_compute_key == NULL) {
36 return ecdh->group->meth->ecdh_compute_key(psec, pseclen, pub_key, ecdh);
50 const EC_POINT *pub_key, const EC_KEY *ecdh)
61 if ((ctx = BN_CTX_new_ex(ecdh->libctx)) == NULL)
70 priv_key = EC_KEY_get0_private_key(ecdh);
76 group = EC_KEY_get0_group(ecdh);
82 if (EC_KEY_get_flags(ecdh) & EC_FLAG_COFACTOR_ECDH)
    [all...]
ec_kmeth.c 11 * ECDH and ECDSA low level APIs are deprecated for public use, but still ok
228 const EC_KEY *ecdh))
302 const EC_KEY *ecdh))
  /src/crypto/external/bsd/openssl.old/dist/crypto/ec/
ecdh_ossl.c 23 const EC_POINT *pub_key, const EC_KEY *ecdh)
25 if (ecdh->group->meth->ecdh_compute_key == NULL) {
30 return ecdh->group->meth->ecdh_compute_key(psec, pseclen, pub_key, ecdh);
39 const EC_POINT *pub_key, const EC_KEY *ecdh)
59 priv_key = EC_KEY_get0_private_key(ecdh);
65 group = EC_KEY_get0_group(ecdh);
67 if (EC_KEY_get_flags(ecdh) & EC_FLAG_COFACTOR_ECDH) {
ec_kmeth.c 201 const EC_KEY *ecdh))
275 const EC_KEY *ecdh))
  /src/external/bsd/libfido2/dist/src/
pin.c 152 ctap20_uv_token_tx(fido_dev_t *dev, const char *pin, const fido_blob_t *ecdh,
177 if ((r = pin_sha256_enc(dev, ecdh, p, &phe)) != FIDO_OK) {
209 ctap21_uv_token_tx(fido_dev_t *dev, const char *pin, const fido_blob_t *ecdh,
229 if ((r = pin_sha256_enc(dev, ecdh, p, &phe)) != FIDO_OK) {
287 uv_token_rx(fido_dev_t *dev, const fido_blob_t *ecdh, fido_blob_t *token,
317 if (aes256_cbc_dec(dev, ecdh, aes_token, token) < 0) {
333 const fido_blob_t *ecdh, const es256_pk_t *pk, const char *rpid,
338 if (ecdh == NULL || pk == NULL)
341 r = ctap21_uv_token_tx(dev, pin, ecdh, pk, cmd, rpid, ms);
343 r = ctap20_uv_token_tx(dev, pin, ecdh, pk, ms)
364 fido_blob_t *ecdh = NULL; local
435 fido_blob_t *ecdh = NULL; local
    [all...]
ecdh.c 117 fido_blob_t **ecdh)
125 *ecdh = NULL;
127 (*ecdh = fido_blob_new()) == NULL)
146 if (kdf(fido_dev_get_pin_protocol(dev), *ecdh, secret) < 0) {
160 fido_blob_free(ecdh);
168 fido_do_ecdh(fido_dev_t *dev, es256_pk_t **pk, fido_blob_t **ecdh, int *ms)
175 *ecdh = NULL;
191 if (do_ecdh(dev, sk, ak, ecdh) < 0) {
204 fido_blob_free(ecdh);
config.c 49 fido_blob_t *ecdh = NULL, f, hmac; local
77 if ((r = fido_do_ecdh(dev, &pk, &ecdh, ms)) != FIDO_OK) {
81 if ((r = cbor_add_uv_params(dev, cmd, &hmac, pk, ecdh, pin,
100 fido_blob_free(&ecdh);
assert.c 86 const es256_pk_t *pk, const fido_blob_t *ecdh, const char *pin, int *ms)
123 if ((argv[3] = cbor_encode_assert_ext(dev, &assert->ext, ecdh,
133 if ((r = cbor_add_uv_params(dev, cmd, &assert->cdh, pk, ecdh,
269 const es256_pk_t *pk, const fido_blob_t *ecdh, const char *pin, int *ms)
273 if ((r = fido_dev_get_assert_tx(dev, assert, pk, ecdh, pin,
311 fido_blob_t *ecdh = NULL; local
336 if ((r = fido_do_ecdh(dev, &pk, &ecdh, &ms)) != FIDO_OK) {
342 r = fido_dev_get_assert_wait(dev, assert, pk, ecdh, pin, &ms);
344 if (decrypt_hmac_secrets(dev, assert, ecdh) < 0) {
352 fido_blob_free(&ecdh);
    [all...]
bio.c 75 fido_blob_t *ecdh = NULL; local
103 if ((r = fido_do_ecdh(dev, &pk, &ecdh, ms)) != FIDO_OK) {
107 if ((r = cbor_add_uv_params(dev, cmd, &hmac, pk, ecdh, pin,
132 fido_blob_free(&ecdh);
479 fido_blob_t *ecdh = NULL; local
492 if ((r = fido_do_ecdh(dev, &pk, &ecdh, &ms)) != FIDO_OK) {
497 if ((r = fido_dev_get_uv_token(dev, CTAP_CBOR_BIO_ENROLL_PRE, pin, ecdh,
507 fido_blob_free(&ecdh);
credman.c 128 fido_blob_t *ecdh = NULL; local
157 if ((r = fido_do_ecdh(dev, &pk, &ecdh, ms)) != FIDO_OK) {
161 if ((r = cbor_add_uv_params(dev, cmd, &hmac, pk, ecdh, pin,
179 fido_blob_free(&ecdh);
  /src/tests/crypto/libcrypto/
Makefile 9 SUBDIR+= ecdh ecdsa md2
t_pubkey.sh 71 atf_test_case ecdh
74 atf_set "descr" "Checks ECDH key agreement protocol"
108 # atf_add_test_case ecdh
  /src/external/bsd/libfido2/lib/
Makefile 31 ecdh.c \
126 COPTS.ecdh.c+=-Wno-error=deprecated-declarations
127 COPTS.ecdh.c+=-Wno-error=pointer-sign
  /src/crypto/external/bsd/heimdal/dist/include/
crypto-headers.h 30 #include <openssl/ecdh.h>
  /src/external/bsd/wpa/dist/src/crypto/
crypto_openssl.c 2637 struct crypto_ecdh *ecdh; local
2640 ecdh = os_zalloc(sizeof(*ecdh));
2641 if (!ecdh)
2644 ecdh->ec = crypto_ec_init(group);
2645 if (!ecdh->ec)
2648 name = OSSL_EC_curve_nid2name(ecdh->ec->nid);
2652 ecdh->pkey = EVP_EC_gen(name);
2653 if (!ecdh->pkey)
2657 return ecdh;
2724 struct crypto_ecdh *ecdh; local
    [all...]
crypto.h 948 * Internal data structure for ECDH. The contents is specific to the used
958 * Returns: Pointer to ECDH context or %NULL on failure
968 * Returns: Pointer to ECDH context or %NULL on failure
974 * crypto_ecdh_get_pubkey - Retrieve public key from ECDH context
975 * @ecdh: ECDH context from crypto_ecdh_init() or crypto_ecdh_init2()
980 struct wpabuf * crypto_ecdh_get_pubkey(struct crypto_ecdh *ecdh, int inc_y);
983 * crypto_ecdh_set_peerkey - Compute ECDH secret
984 * @ecdh: ECDH context from crypto_ecdh_init() or crypto_ecdh_init2(
    [all...]
crypto_wolfssl.c 2091 struct crypto_ecdh *ecdh = NULL; local
2096 ecdh = os_zalloc(sizeof(*ecdh));
2097 if (!ecdh) {
2102 ecdh->rng = wc_rng_init();
2103 if (!ecdh->rng) {
2108 ecdh->ec = crypto_ec_init(group);
2109 if (!ecdh->ec) {
2115 ret = wc_ecc_set_rng(ecdh->ec->key, ecdh->rng)
    [all...]
  /src/crypto/external/apache2/openssl/dist/util/
mk-fipsmodule-cnf.pl 86 ecdh-cofactor-check = $ec_cofactor_check
  /src/crypto/external/bsd/heimdal/dist/lib/krb5/
pkinit-ec.c 58 #include <openssl/ecdh.h>
163 N_("PKINIT: ECDH not supported", ""));
197 N_("PKINIT: Can't parse ECDH public key", ""));
217 N_("PKINIT: Can't compute ECDH public key", ""));
227 N_("PKINIT: ECDH not supported", ""));
  /src/crypto/external/bsd/openssh/dist/
kexecdh.c 38 #include <openssl/ecdh.h>
  /src/external/bsd/unbound/dist/testcode/
petal.c 261 EC_KEY *ecdh = EC_KEY_new_by_curve_name (NID_X9_62_prime256v1); local
262 if (!ecdh) {
265 if (1 != SSL_CTX_set_tmp_ecdh (ctx, ecdh)) {
268 EC_KEY_free(ecdh);

Completed in 44 milliseconds

1 2 3