| /src/tests/crypto/libcrypto/ecdh/ |
| Makefile | 4 HELPER_DIR= ecdh
|
| /src/crypto/external/apache2/openssl/dist/demos/keyexch/ |
| Makefile | 7 TESTS = x25519 ecdh 16 ecdh: ecdh.o
|
| /src/crypto/external/apache2/openssl/dist/crypto/ec/ |
| ecdh_ossl.c | 12 * ECDH low level APIs are deprecated for public use, but still ok for 29 const EC_POINT *pub_key, const EC_KEY *ecdh) 31 if (ecdh->group->meth->ecdh_compute_key == NULL) { 36 return ecdh->group->meth->ecdh_compute_key(psec, pseclen, pub_key, ecdh); 50 const EC_POINT *pub_key, const EC_KEY *ecdh) 61 if ((ctx = BN_CTX_new_ex(ecdh->libctx)) == NULL) 70 priv_key = EC_KEY_get0_private_key(ecdh); 76 group = EC_KEY_get0_group(ecdh); 82 if (EC_KEY_get_flags(ecdh) & EC_FLAG_COFACTOR_ECDH) [all...] |
| ec_kmeth.c | 11 * ECDH and ECDSA low level APIs are deprecated for public use, but still ok 222 const EC_KEY *ecdh)) 295 const EC_KEY *ecdh))
|
| /src/crypto/external/bsd/openssl/dist/crypto/ec/ |
| ecdh_ossl.c | 12 * ECDH low level APIs are deprecated for public use, but still ok for 29 const EC_POINT *pub_key, const EC_KEY *ecdh) 31 if (ecdh->group->meth->ecdh_compute_key == NULL) { 36 return ecdh->group->meth->ecdh_compute_key(psec, pseclen, pub_key, ecdh); 50 const EC_POINT *pub_key, const EC_KEY *ecdh) 61 if ((ctx = BN_CTX_new_ex(ecdh->libctx)) == NULL) 70 priv_key = EC_KEY_get0_private_key(ecdh); 76 group = EC_KEY_get0_group(ecdh); 82 if (EC_KEY_get_flags(ecdh) & EC_FLAG_COFACTOR_ECDH) [all...] |
| ec_kmeth.c | 11 * ECDH and ECDSA low level APIs are deprecated for public use, but still ok 228 const EC_KEY *ecdh)) 302 const EC_KEY *ecdh))
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/ec/ |
| ecdh_ossl.c | 23 const EC_POINT *pub_key, const EC_KEY *ecdh) 25 if (ecdh->group->meth->ecdh_compute_key == NULL) { 30 return ecdh->group->meth->ecdh_compute_key(psec, pseclen, pub_key, ecdh); 39 const EC_POINT *pub_key, const EC_KEY *ecdh) 59 priv_key = EC_KEY_get0_private_key(ecdh); 65 group = EC_KEY_get0_group(ecdh); 67 if (EC_KEY_get_flags(ecdh) & EC_FLAG_COFACTOR_ECDH) {
|
| ec_kmeth.c | 201 const EC_KEY *ecdh)) 275 const EC_KEY *ecdh))
|
| /src/external/bsd/libfido2/dist/src/ |
| pin.c | 152 ctap20_uv_token_tx(fido_dev_t *dev, const char *pin, const fido_blob_t *ecdh, 177 if ((r = pin_sha256_enc(dev, ecdh, p, &phe)) != FIDO_OK) { 209 ctap21_uv_token_tx(fido_dev_t *dev, const char *pin, const fido_blob_t *ecdh, 229 if ((r = pin_sha256_enc(dev, ecdh, p, &phe)) != FIDO_OK) { 287 uv_token_rx(fido_dev_t *dev, const fido_blob_t *ecdh, fido_blob_t *token, 317 if (aes256_cbc_dec(dev, ecdh, aes_token, token) < 0) { 333 const fido_blob_t *ecdh, const es256_pk_t *pk, const char *rpid, 338 if (ecdh == NULL || pk == NULL) 341 r = ctap21_uv_token_tx(dev, pin, ecdh, pk, cmd, rpid, ms); 343 r = ctap20_uv_token_tx(dev, pin, ecdh, pk, ms) 364 fido_blob_t *ecdh = NULL; local 435 fido_blob_t *ecdh = NULL; local [all...] |
| ecdh.c | 117 fido_blob_t **ecdh) 125 *ecdh = NULL; 127 (*ecdh = fido_blob_new()) == NULL) 146 if (kdf(fido_dev_get_pin_protocol(dev), *ecdh, secret) < 0) { 160 fido_blob_free(ecdh); 168 fido_do_ecdh(fido_dev_t *dev, es256_pk_t **pk, fido_blob_t **ecdh, int *ms) 175 *ecdh = NULL; 191 if (do_ecdh(dev, sk, ak, ecdh) < 0) { 204 fido_blob_free(ecdh);
|
| config.c | 49 fido_blob_t *ecdh = NULL, f, hmac; local 77 if ((r = fido_do_ecdh(dev, &pk, &ecdh, ms)) != FIDO_OK) { 81 if ((r = cbor_add_uv_params(dev, cmd, &hmac, pk, ecdh, pin, 100 fido_blob_free(&ecdh);
|
| assert.c | 86 const es256_pk_t *pk, const fido_blob_t *ecdh, const char *pin, int *ms) 123 if ((argv[3] = cbor_encode_assert_ext(dev, &assert->ext, ecdh, 133 if ((r = cbor_add_uv_params(dev, cmd, &assert->cdh, pk, ecdh, 269 const es256_pk_t *pk, const fido_blob_t *ecdh, const char *pin, int *ms) 273 if ((r = fido_dev_get_assert_tx(dev, assert, pk, ecdh, pin, 311 fido_blob_t *ecdh = NULL; local 336 if ((r = fido_do_ecdh(dev, &pk, &ecdh, &ms)) != FIDO_OK) { 342 r = fido_dev_get_assert_wait(dev, assert, pk, ecdh, pin, &ms); 344 if (decrypt_hmac_secrets(dev, assert, ecdh) < 0) { 352 fido_blob_free(&ecdh); [all...] |
| bio.c | 75 fido_blob_t *ecdh = NULL; local 103 if ((r = fido_do_ecdh(dev, &pk, &ecdh, ms)) != FIDO_OK) { 107 if ((r = cbor_add_uv_params(dev, cmd, &hmac, pk, ecdh, pin, 132 fido_blob_free(&ecdh); 479 fido_blob_t *ecdh = NULL; local 492 if ((r = fido_do_ecdh(dev, &pk, &ecdh, &ms)) != FIDO_OK) { 497 if ((r = fido_dev_get_uv_token(dev, CTAP_CBOR_BIO_ENROLL_PRE, pin, ecdh, 507 fido_blob_free(&ecdh);
|
| credman.c | 128 fido_blob_t *ecdh = NULL; local 157 if ((r = fido_do_ecdh(dev, &pk, &ecdh, ms)) != FIDO_OK) { 161 if ((r = cbor_add_uv_params(dev, cmd, &hmac, pk, ecdh, pin, 179 fido_blob_free(&ecdh);
|
| /src/tests/crypto/libcrypto/ |
| Makefile | 9 SUBDIR+= ecdh ecdsa md2
|
| t_pubkey.sh | 71 atf_test_case ecdh 74 atf_set "descr" "Checks ECDH key agreement protocol" 108 # atf_add_test_case ecdh
|
| /src/external/bsd/libfido2/lib/ |
| Makefile | 31 ecdh.c \ 126 COPTS.ecdh.c+=-Wno-error=deprecated-declarations 127 COPTS.ecdh.c+=-Wno-error=pointer-sign
|
| /src/crypto/external/bsd/heimdal/dist/include/ |
| crypto-headers.h | 30 #include <openssl/ecdh.h>
|
| /src/external/bsd/wpa/dist/src/crypto/ |
| crypto_openssl.c | 2637 struct crypto_ecdh *ecdh; local 2640 ecdh = os_zalloc(sizeof(*ecdh)); 2641 if (!ecdh) 2644 ecdh->ec = crypto_ec_init(group); 2645 if (!ecdh->ec) 2648 name = OSSL_EC_curve_nid2name(ecdh->ec->nid); 2652 ecdh->pkey = EVP_EC_gen(name); 2653 if (!ecdh->pkey) 2657 return ecdh; 2724 struct crypto_ecdh *ecdh; local [all...] |
| crypto.h | 948 * Internal data structure for ECDH. The contents is specific to the used 958 * Returns: Pointer to ECDH context or %NULL on failure 968 * Returns: Pointer to ECDH context or %NULL on failure 974 * crypto_ecdh_get_pubkey - Retrieve public key from ECDH context 975 * @ecdh: ECDH context from crypto_ecdh_init() or crypto_ecdh_init2() 980 struct wpabuf * crypto_ecdh_get_pubkey(struct crypto_ecdh *ecdh, int inc_y); 983 * crypto_ecdh_set_peerkey - Compute ECDH secret 984 * @ecdh: ECDH context from crypto_ecdh_init() or crypto_ecdh_init2( [all...] |
| crypto_wolfssl.c | 2091 struct crypto_ecdh *ecdh = NULL; local 2096 ecdh = os_zalloc(sizeof(*ecdh)); 2097 if (!ecdh) { 2102 ecdh->rng = wc_rng_init(); 2103 if (!ecdh->rng) { 2108 ecdh->ec = crypto_ec_init(group); 2109 if (!ecdh->ec) { 2115 ret = wc_ecc_set_rng(ecdh->ec->key, ecdh->rng) [all...] |
| /src/crypto/external/apache2/openssl/dist/util/ |
| mk-fipsmodule-cnf.pl | 86 ecdh-cofactor-check = $ec_cofactor_check
|
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| pkinit-ec.c | 58 #include <openssl/ecdh.h> 163 N_("PKINIT: ECDH not supported", "")); 197 N_("PKINIT: Can't parse ECDH public key", "")); 217 N_("PKINIT: Can't compute ECDH public key", "")); 227 N_("PKINIT: ECDH not supported", ""));
|
| /src/crypto/external/bsd/openssh/dist/ |
| kexecdh.c | 38 #include <openssl/ecdh.h>
|
| /src/external/bsd/unbound/dist/testcode/ |
| petal.c | 261 EC_KEY *ecdh = EC_KEY_new_by_curve_name (NID_X9_62_prime256v1); local 262 if (!ecdh) { 265 if (1 != SSL_CTX_set_tmp_ecdh (ctx, ecdh)) { 268 EC_KEY_free(ecdh);
|