Searched refs:curve (Results 51 – 61 of 61) sorted by relevance
123
91 such as minimum security strength of keys and approved curve names are used.
672 Specifies the elliptic curve to use. NOTE: this is single curve, not a list.
122 EC (Elliptic curve) key processing.
544 =head2 Elliptic curve cipher suites
661 Specifies the list of supported curves to be sent by the client. The curve is
1606 static EVP_PKEY *get_ecdsa(const EC_CURVE *curve) in get_ecdsa() argument1626 kctx = EVP_PKEY_CTX_new_id(curve->nid, NULL); in get_ecdsa()1655 curve->nid) <= 0 in get_ecdsa()
1811 elliptic curve public keys in compressed form or explicit elliptic curve1815 has invalid explicit curve parameters.1821 elliptic curve parameters.1829 - Anything else which parses ASN.1 elliptic curve parameters1973 For example when setting an unsupported curve with2642 * Reworked the treatment of EC EVP_PKEYs with the SM2 curve to4913 Even then only clients that chose the curve will be affected.5619 curve you want to support using SSL_{CTX_}set1_curves().12387 curve secp160r1 to the tests.12941 SECG, and WAP/WTLS. Each curve can be obtained from the new[all …]
420 EC EVP_PKEYs with the SM2 curve have been reworked to automatically become430 curve ones.512 For example when setting an unsupported curve with
24 const char *curve;
2708 # Negative test: A weak curve with a strength < 112 fails in FIPS mode.
2659 /* Sanity check of curve server selects */
Completed in 100 milliseconds