HomeSort by: relevance | last modified time | path
    Searched defs:ecdh (Results 1 - 21 of 21) sorted by relevancy

  /src/external/bsd/libfido2/dist/src/
config.c 49 fido_blob_t *ecdh = NULL, f, hmac; local
77 if ((r = fido_do_ecdh(dev, &pk, &ecdh, ms)) != FIDO_OK) {
81 if ((r = cbor_add_uv_params(dev, cmd, &hmac, pk, ecdh, pin,
100 fido_blob_free(&ecdh);
pin.c 152 ctap20_uv_token_tx(fido_dev_t *dev, const char *pin, const fido_blob_t *ecdh,
177 if ((r = pin_sha256_enc(dev, ecdh, p, &phe)) != FIDO_OK) {
209 ctap21_uv_token_tx(fido_dev_t *dev, const char *pin, const fido_blob_t *ecdh,
229 if ((r = pin_sha256_enc(dev, ecdh, p, &phe)) != FIDO_OK) {
287 uv_token_rx(fido_dev_t *dev, const fido_blob_t *ecdh, fido_blob_t *token,
317 if (aes256_cbc_dec(dev, ecdh, aes_token, token) < 0) {
333 const fido_blob_t *ecdh, const es256_pk_t *pk, const char *rpid,
338 if (ecdh == NULL || pk == NULL)
341 r = ctap21_uv_token_tx(dev, pin, ecdh, pk, cmd, rpid, ms);
343 r = ctap20_uv_token_tx(dev, pin, ecdh, pk, ms)
364 fido_blob_t *ecdh = NULL; local
435 fido_blob_t *ecdh = NULL; local
    [all...]
bio.c 75 fido_blob_t *ecdh = NULL; local
103 if ((r = fido_do_ecdh(dev, &pk, &ecdh, ms)) != FIDO_OK) {
107 if ((r = cbor_add_uv_params(dev, cmd, &hmac, pk, ecdh, pin,
132 fido_blob_free(&ecdh);
479 fido_blob_t *ecdh = NULL; local
492 if ((r = fido_do_ecdh(dev, &pk, &ecdh, &ms)) != FIDO_OK) {
497 if ((r = fido_dev_get_uv_token(dev, CTAP_CBOR_BIO_ENROLL_PRE, pin, ecdh,
507 fido_blob_free(&ecdh);
credman.c 128 fido_blob_t *ecdh = NULL; local
157 if ((r = fido_do_ecdh(dev, &pk, &ecdh, ms)) != FIDO_OK) {
161 if ((r = cbor_add_uv_params(dev, cmd, &hmac, pk, ecdh, pin,
179 fido_blob_free(&ecdh);
largeblob.c 553 fido_blob_t *ecdh = NULL; local
558 if ((r = fido_do_ecdh(dev, &pk, &ecdh, ms)) != FIDO_OK) {
562 if ((r = fido_dev_get_uv_token(dev, CTAP_CBOR_LARGEBLOB, pin, ecdh, pk,
573 fido_blob_free(&ecdh);
assert.c 86 const es256_pk_t *pk, const fido_blob_t *ecdh, const char *pin, int *ms)
123 if ((argv[3] = cbor_encode_assert_ext(dev, &assert->ext, ecdh,
133 if ((r = cbor_add_uv_params(dev, cmd, &assert->cdh, pk, ecdh,
269 const es256_pk_t *pk, const fido_blob_t *ecdh, const char *pin, int *ms)
273 if ((r = fido_dev_get_assert_tx(dev, assert, pk, ecdh, pin,
311 fido_blob_t *ecdh = NULL; local
336 if ((r = fido_do_ecdh(dev, &pk, &ecdh, &ms)) != FIDO_OK) {
342 r = fido_dev_get_assert_wait(dev, assert, pk, ecdh, pin, &ms);
344 if (decrypt_hmac_secrets(dev, assert, ecdh) < 0) {
352 fido_blob_free(&ecdh);
    [all...]
cred.c 57 fido_blob_t *ecdh = NULL; local
103 if ((r = fido_do_ecdh(dev, &pk, &ecdh, ms)) != FIDO_OK) {
107 if ((r = cbor_add_uv_params(dev, cmd, &cred->cdh, pk, ecdh,
143 fido_blob_free(&ecdh);
  /src/external/bsd/unbound/dist/testcode/
petal.c 261 EC_KEY *ecdh = EC_KEY_new_by_curve_name (NID_X9_62_prime256v1); local
262 if (!ecdh) {
265 if (1 != SSL_CTX_set_tmp_ecdh (ctx, ecdh)) {
268 EC_KEY_free(ecdh);
  /src/external/bsd/wpa/dist/src/pasn/
pasn_common.h 84 struct crypto_ecdh *ecdh; member in struct:pasn_data
  /src/crypto/external/bsd/heimdal/dist/kdc/
pkinit.c 61 } ecdh; member in union:pk_client_params::__anon792
185 _kdc_pk_free_client_ec_param(context, cp->u.ecdh.key,
186 cp->u.ecdh.public_key);
247 if (client_params->u.ecdh.public_key == NULL) {
249 krb5_set_error_message(context, ret, "missing ECDH public_key");
253 client_params->u.ecdh.public_key,
254 &client_params->u.ecdh.key,
751 &cp->u.ecdh.public_key);
1059 ret = _kdc_serialize_ecdh_key(context, cp->u.ecdh.key, &p,
1239 case USE_ECDH: type = "ecdh"; break
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/ssl/
ssl_conf.c 224 /* ECDH temporary parameters */
228 EC_KEY *ecdh; local
245 ecdh = EC_KEY_new_by_curve_name(nid);
246 if (!ecdh)
249 rv = SSL_CTX_set_tmp_ecdh(cctx->ctx, ecdh);
251 rv = SSL_set_tmp_ecdh(cctx->ssl, ecdh);
252 EC_KEY_free(ecdh);
  /src/external/bsd/unbound/dist/util/
net_help.c 1325 EC_KEY *ecdh = EC_KEY_new_by_curve_name (NID_X9_62_prime256v1); local
1326 if (!ecdh) {
1329 if (1 != SSL_CTX_set_tmp_ecdh (ctx, ecdh)) {
1332 EC_KEY_free (ecdh);
  /src/external/bsd/wpa/dist/src/common/
dpp_crypto.c 505 struct crypto_ecdh *ecdh; local
511 ecdh = crypto_ecdh_init2(crypto_ec_key_group(own), own);
512 if (!ecdh) {
524 secret_buf = crypto_ecdh_set_peerkey(ecdh, 1, wpabuf_head(peer_pub),
532 wpa_printf(MSG_ERROR, "DPP: ECDH secret longer than expected");
543 crypto_ecdh_deinit(ecdh);
2020 pfs->ecdh = crypto_ecdh_init(pfs->curve->ike_group);
2021 if (!pfs->ecdh)
2024 pub = crypto_ecdh_get_pubkey(pfs->ecdh, 0);
2058 pfs->secret = crypto_ecdh_set_peerkey(pfs->ecdh, 0, peer_ie + 2
    [all...]
dpp.h 700 struct crypto_ecdh *ecdh; member in struct:dpp_pfs
  /src/external/bsd/nsd/dist/
server.c 2092 EC_KEY *ecdh = EC_KEY_new_by_curve_name (NID_X9_62_prime256v1); local
2093 if (!ecdh) {
2096 if (1 != SSL_CTX_set_tmp_ecdh (ctx, ecdh)) {
2099 EC_KEY_free (ecdh);
  /src/external/bsd/wpa/dist/src/crypto/
crypto_wolfssl.c 2091 struct crypto_ecdh *ecdh = NULL; local
2096 ecdh = os_zalloc(sizeof(*ecdh));
2097 if (!ecdh) {
2102 ecdh->rng = wc_rng_init();
2103 if (!ecdh->rng) {
2108 ecdh->ec = crypto_ec_init(group);
2109 if (!ecdh->ec) {
2115 ret = wc_ecc_set_rng(ecdh->ec->key, ecdh->rng)
    [all...]
crypto_openssl.c 2637 struct crypto_ecdh *ecdh; local
2640 ecdh = os_zalloc(sizeof(*ecdh));
2641 if (!ecdh)
2644 ecdh->ec = crypto_ec_init(group);
2645 if (!ecdh->ec)
2648 name = OSSL_EC_curve_nid2name(ecdh->ec->nid);
2652 ecdh->pkey = EVP_EC_gen(name);
2653 if (!ecdh->pkey)
2657 return ecdh;
2724 struct crypto_ecdh *ecdh; local
    [all...]
tls_openssl.c 3211 "OpenSSL: Override ciphers for Suite B (no ECDH): %s",
3222 EC_KEY *ecdh; local
3254 ecdh = EC_KEY_new_by_curve_name(NID_secp384r1);
3255 if (!ecdh || SSL_set_tmp_ecdh(ssl, ecdh) != 1) {
3256 EC_KEY_free(ecdh);
3258 "OpenSSL: Failed to set ECDH parameter");
3261 EC_KEY_free(ecdh);
5494 "OpenSSL: Failed to set ECDH curves to auto");
5503 "OpenSSL: ECDH configuration not supported")
    [all...]
  /src/crypto/external/bsd/openssl/dist/apps/
speed.c 94 int ecdh; member in struct:openssl_speed_sec_st
405 /* list of ecdh curves, extension of |ecdsa_choices| list above */
1558 /* Other and ECDH only ones */
1714 = seconds.ecdh = seconds.eddsa
1804 if (strncmp(algo, "ecdh", 4) == 0) {
1905 loopargs[i].secret_a = app_malloc(MAX_ECDH_SIZE, "ECDH secret a");
1906 loopargs[i].secret_b = app_malloc(MAX_ECDH_SIZE, "ECDH secret b");
2846 BIO_printf(bio_err, "ECDH key generation failure.\n");
2866 BIO_printf(bio_err, "ECDH computation failure.\n");
2876 BIO_printf(bio_err, "ECDH computations don't match.\n")
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/apps/
speed.c 125 int ecdh; member in struct:openssl_speed_sec_st
1530 /* Other and ECDH only ones */
1645 = seconds.ecdh = seconds.eddsa = atoi(opt_arg());
1720 if (strcmp(*argv, "ecdh") == 0) {
1807 loopargs[i].secret_a = app_malloc(MAX_ECDH_SIZE, "ECDH secret a");
1808 loopargs[i].secret_b = app_malloc(MAX_ECDH_SIZE, "ECDH secret b");
2980 "Unhandled error in the error queue during ECDH init.\n");
2997 BIO_printf(bio_err, "ECDH EC params init failure.\n");
3013 BIO_printf(bio_err, "ECDH keygen failure.\n");
3028 BIO_printf(bio_err, "ECDH key generation failure.\n")
    [all...]
  /src/crypto/external/apache2/openssl/dist/apps/
speed.c 109 int ecdh; member in struct:openssl_speed_sec_st
523 /* list of ecdh curves, extension of |ecdsa_choices| list above */
2071 /* Other and ECDH only ones */
2248 = seconds.ecdh = seconds.eddsa
2453 if (HAS_PREFIX(algo, "ecdh")) {
2454 if (algo[sizeof("ecdh") - 1] == '\0') {
2594 loopargs[i].secret_a = app_malloc(MAX_ECDH_SIZE, "ECDH secret a");
2595 loopargs[i].secret_b = app_malloc(MAX_ECDH_SIZE, "ECDH secret b");
3625 BIO_printf(bio_err, "ECDH key generation failure.\n");
3645 BIO_printf(bio_err, "ECDH computation failure.\n")
    [all...]

Completed in 62 milliseconds