| /src/external/bsd/libfido2/dist/src/ |
| config.c | 49 fido_blob_t *ecdh = NULL, f, hmac; local 77 if ((r = fido_do_ecdh(dev, &pk, &ecdh, ms)) != FIDO_OK) { 81 if ((r = cbor_add_uv_params(dev, cmd, &hmac, pk, ecdh, pin, 100 fido_blob_free(&ecdh);
|
| pin.c | 152 ctap20_uv_token_tx(fido_dev_t *dev, const char *pin, const fido_blob_t *ecdh, 177 if ((r = pin_sha256_enc(dev, ecdh, p, &phe)) != FIDO_OK) { 209 ctap21_uv_token_tx(fido_dev_t *dev, const char *pin, const fido_blob_t *ecdh, 229 if ((r = pin_sha256_enc(dev, ecdh, p, &phe)) != FIDO_OK) { 287 uv_token_rx(fido_dev_t *dev, const fido_blob_t *ecdh, fido_blob_t *token, 317 if (aes256_cbc_dec(dev, ecdh, aes_token, token) < 0) { 333 const fido_blob_t *ecdh, const es256_pk_t *pk, const char *rpid, 338 if (ecdh == NULL || pk == NULL) 341 r = ctap21_uv_token_tx(dev, pin, ecdh, pk, cmd, rpid, ms); 343 r = ctap20_uv_token_tx(dev, pin, ecdh, pk, ms) 364 fido_blob_t *ecdh = NULL; local 435 fido_blob_t *ecdh = NULL; local [all...] |
| bio.c | 75 fido_blob_t *ecdh = NULL; local 103 if ((r = fido_do_ecdh(dev, &pk, &ecdh, ms)) != FIDO_OK) { 107 if ((r = cbor_add_uv_params(dev, cmd, &hmac, pk, ecdh, pin, 132 fido_blob_free(&ecdh); 479 fido_blob_t *ecdh = NULL; local 492 if ((r = fido_do_ecdh(dev, &pk, &ecdh, &ms)) != FIDO_OK) { 497 if ((r = fido_dev_get_uv_token(dev, CTAP_CBOR_BIO_ENROLL_PRE, pin, ecdh, 507 fido_blob_free(&ecdh);
|
| credman.c | 128 fido_blob_t *ecdh = NULL; local 157 if ((r = fido_do_ecdh(dev, &pk, &ecdh, ms)) != FIDO_OK) { 161 if ((r = cbor_add_uv_params(dev, cmd, &hmac, pk, ecdh, pin, 179 fido_blob_free(&ecdh);
|
| largeblob.c | 553 fido_blob_t *ecdh = NULL; local 558 if ((r = fido_do_ecdh(dev, &pk, &ecdh, ms)) != FIDO_OK) { 562 if ((r = fido_dev_get_uv_token(dev, CTAP_CBOR_LARGEBLOB, pin, ecdh, pk, 573 fido_blob_free(&ecdh);
|
| assert.c | 86 const es256_pk_t *pk, const fido_blob_t *ecdh, const char *pin, int *ms) 123 if ((argv[3] = cbor_encode_assert_ext(dev, &assert->ext, ecdh, 133 if ((r = cbor_add_uv_params(dev, cmd, &assert->cdh, pk, ecdh, 269 const es256_pk_t *pk, const fido_blob_t *ecdh, const char *pin, int *ms) 273 if ((r = fido_dev_get_assert_tx(dev, assert, pk, ecdh, pin, 311 fido_blob_t *ecdh = NULL; local 336 if ((r = fido_do_ecdh(dev, &pk, &ecdh, &ms)) != FIDO_OK) { 342 r = fido_dev_get_assert_wait(dev, assert, pk, ecdh, pin, &ms); 344 if (decrypt_hmac_secrets(dev, assert, ecdh) < 0) { 352 fido_blob_free(&ecdh); [all...] |
| cred.c | 57 fido_blob_t *ecdh = NULL; local 103 if ((r = fido_do_ecdh(dev, &pk, &ecdh, ms)) != FIDO_OK) { 107 if ((r = cbor_add_uv_params(dev, cmd, &cred->cdh, pk, ecdh, 143 fido_blob_free(&ecdh);
|
| /src/external/bsd/unbound/dist/testcode/ |
| petal.c | 261 EC_KEY *ecdh = EC_KEY_new_by_curve_name (NID_X9_62_prime256v1); local 262 if (!ecdh) { 265 if (1 != SSL_CTX_set_tmp_ecdh (ctx, ecdh)) { 268 EC_KEY_free(ecdh);
|
| /src/external/bsd/wpa/dist/src/pasn/ |
| pasn_common.h | 84 struct crypto_ecdh *ecdh; member in struct:pasn_data
|
| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| pkinit.c | 61 } ecdh; member in union:pk_client_params::__anon792 185 _kdc_pk_free_client_ec_param(context, cp->u.ecdh.key, 186 cp->u.ecdh.public_key); 247 if (client_params->u.ecdh.public_key == NULL) { 249 krb5_set_error_message(context, ret, "missing ECDH public_key"); 253 client_params->u.ecdh.public_key, 254 &client_params->u.ecdh.key, 751 &cp->u.ecdh.public_key); 1059 ret = _kdc_serialize_ecdh_key(context, cp->u.ecdh.key, &p, 1239 case USE_ECDH: type = "ecdh"; break [all...] |
| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| ssl_conf.c | 224 /* ECDH temporary parameters */ 228 EC_KEY *ecdh; local 245 ecdh = EC_KEY_new_by_curve_name(nid); 246 if (!ecdh) 249 rv = SSL_CTX_set_tmp_ecdh(cctx->ctx, ecdh); 251 rv = SSL_set_tmp_ecdh(cctx->ssl, ecdh); 252 EC_KEY_free(ecdh);
|
| /src/external/bsd/unbound/dist/util/ |
| net_help.c | 1325 EC_KEY *ecdh = EC_KEY_new_by_curve_name (NID_X9_62_prime256v1); local 1326 if (!ecdh) { 1329 if (1 != SSL_CTX_set_tmp_ecdh (ctx, ecdh)) { 1332 EC_KEY_free (ecdh);
|
| /src/external/bsd/wpa/dist/src/common/ |
| dpp_crypto.c | 505 struct crypto_ecdh *ecdh; local 511 ecdh = crypto_ecdh_init2(crypto_ec_key_group(own), own); 512 if (!ecdh) { 524 secret_buf = crypto_ecdh_set_peerkey(ecdh, 1, wpabuf_head(peer_pub), 532 wpa_printf(MSG_ERROR, "DPP: ECDH secret longer than expected"); 543 crypto_ecdh_deinit(ecdh); 2020 pfs->ecdh = crypto_ecdh_init(pfs->curve->ike_group); 2021 if (!pfs->ecdh) 2024 pub = crypto_ecdh_get_pubkey(pfs->ecdh, 0); 2058 pfs->secret = crypto_ecdh_set_peerkey(pfs->ecdh, 0, peer_ie + 2 [all...] |
| dpp.h | 700 struct crypto_ecdh *ecdh; member in struct:dpp_pfs
|
| /src/external/bsd/nsd/dist/ |
| server.c | 2092 EC_KEY *ecdh = EC_KEY_new_by_curve_name (NID_X9_62_prime256v1); local 2093 if (!ecdh) { 2096 if (1 != SSL_CTX_set_tmp_ecdh (ctx, ecdh)) { 2099 EC_KEY_free (ecdh);
|
| /src/external/bsd/wpa/dist/src/crypto/ |
| crypto_wolfssl.c | 2091 struct crypto_ecdh *ecdh = NULL; local 2096 ecdh = os_zalloc(sizeof(*ecdh)); 2097 if (!ecdh) { 2102 ecdh->rng = wc_rng_init(); 2103 if (!ecdh->rng) { 2108 ecdh->ec = crypto_ec_init(group); 2109 if (!ecdh->ec) { 2115 ret = wc_ecc_set_rng(ecdh->ec->key, ecdh->rng) [all...] |
| crypto_openssl.c | 2637 struct crypto_ecdh *ecdh; local 2640 ecdh = os_zalloc(sizeof(*ecdh)); 2641 if (!ecdh) 2644 ecdh->ec = crypto_ec_init(group); 2645 if (!ecdh->ec) 2648 name = OSSL_EC_curve_nid2name(ecdh->ec->nid); 2652 ecdh->pkey = EVP_EC_gen(name); 2653 if (!ecdh->pkey) 2657 return ecdh; 2724 struct crypto_ecdh *ecdh; local [all...] |
| tls_openssl.c | 3211 "OpenSSL: Override ciphers for Suite B (no ECDH): %s", 3222 EC_KEY *ecdh; local 3254 ecdh = EC_KEY_new_by_curve_name(NID_secp384r1); 3255 if (!ecdh || SSL_set_tmp_ecdh(ssl, ecdh) != 1) { 3256 EC_KEY_free(ecdh); 3258 "OpenSSL: Failed to set ECDH parameter"); 3261 EC_KEY_free(ecdh); 5494 "OpenSSL: Failed to set ECDH curves to auto"); 5503 "OpenSSL: ECDH configuration not supported") [all...] |
| /src/crypto/external/bsd/openssl/dist/apps/ |
| speed.c | 94 int ecdh; member in struct:openssl_speed_sec_st 405 /* list of ecdh curves, extension of |ecdsa_choices| list above */ 1558 /* Other and ECDH only ones */ 1714 = seconds.ecdh = seconds.eddsa 1804 if (strncmp(algo, "ecdh", 4) == 0) { 1905 loopargs[i].secret_a = app_malloc(MAX_ECDH_SIZE, "ECDH secret a"); 1906 loopargs[i].secret_b = app_malloc(MAX_ECDH_SIZE, "ECDH secret b"); 2846 BIO_printf(bio_err, "ECDH key generation failure.\n"); 2866 BIO_printf(bio_err, "ECDH computation failure.\n"); 2876 BIO_printf(bio_err, "ECDH computations don't match.\n") [all...] |
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| speed.c | 125 int ecdh; member in struct:openssl_speed_sec_st 1530 /* Other and ECDH only ones */ 1645 = seconds.ecdh = seconds.eddsa = atoi(opt_arg()); 1720 if (strcmp(*argv, "ecdh") == 0) { 1807 loopargs[i].secret_a = app_malloc(MAX_ECDH_SIZE, "ECDH secret a"); 1808 loopargs[i].secret_b = app_malloc(MAX_ECDH_SIZE, "ECDH secret b"); 2980 "Unhandled error in the error queue during ECDH init.\n"); 2997 BIO_printf(bio_err, "ECDH EC params init failure.\n"); 3013 BIO_printf(bio_err, "ECDH keygen failure.\n"); 3028 BIO_printf(bio_err, "ECDH key generation failure.\n") [all...] |
| /src/crypto/external/apache2/openssl/dist/apps/ |
| speed.c | 109 int ecdh; member in struct:openssl_speed_sec_st 523 /* list of ecdh curves, extension of |ecdsa_choices| list above */ 2071 /* Other and ECDH only ones */ 2248 = seconds.ecdh = seconds.eddsa 2453 if (HAS_PREFIX(algo, "ecdh")) { 2454 if (algo[sizeof("ecdh") - 1] == '\0') { 2594 loopargs[i].secret_a = app_malloc(MAX_ECDH_SIZE, "ECDH secret a"); 2595 loopargs[i].secret_b = app_malloc(MAX_ECDH_SIZE, "ECDH secret b"); 3625 BIO_printf(bio_err, "ECDH key generation failure.\n"); 3645 BIO_printf(bio_err, "ECDH computation failure.\n") [all...] |