/third_party/openssl/test/ssl-tests/ |
D | 14-curves.cnf | 5 test-0 = 0-curve-prime256v1 6 test-1 = 1-curve-secp384r1 7 test-2 = 2-curve-secp521r1 8 test-3 = 3-curve-X25519 9 test-4 = 4-curve-X448 10 test-5 = 5-curve-sect233k1 11 test-6 = 6-curve-sect233r1 12 test-7 = 7-curve-sect283k1 13 test-8 = 8-curve-sect283r1 14 test-9 = 9-curve-sect409k1 [all …]
|
D | 14-curves.cnf.in | 34 my $curve = $curves[$_]; 36 name => "curve-${curve}", 38 "Curves" => $curve, 44 "Curves" => $curve 47 "ExpectedTmpKeyType" => $curve, 54 my $curve = $curves_tls_1_2[$_]; 56 name => "curve-${curve}", 58 "Curves" => $curve, 64 "Curves" => $curve 67 "ExpectedTmpKeyType" => $curve, [all …]
|
/third_party/skia/src/pathops/ |
D | SkOpEdgeBuilder.cpp | 33 static bool can_add_curve(SkPath::Verb verb, SkPoint* curve) { in can_add_curve() argument 38 curve[index] = force_small_to_zero(curve[index]); in can_add_curve() 40 return SkPath::kLine_Verb != verb || !SkDPoint::ApproximatelyEqual(curve[0], curve[1]); in can_add_curve() 89 SkPoint curve[4]; in preFetch() local 96 closeContour(curve[0], curveStart); in preFetch() 99 curve[0] = force_small_to_zero(pts[0]); in preFetch() 100 *fPathPts.append() = curve[0]; in preFetch() 101 curveStart = curve[0]; in preFetch() 105 curve[1] = force_small_to_zero(pts[1]); in preFetch() 106 if (SkDPoint::ApproximatelyEqual(curve[0], curve[1])) { in preFetch() [all …]
|
D | SkPathOpsRect.h | 52 void setBounds(const SkDConic& curve) { in setBounds() 53 setBounds(curve, curve, 0, 1); in setBounds() 56 void setBounds(const SkDConic& curve, const SkDConic& sub, double tStart, double tEnd); 58 void setBounds(const SkDCubic& curve) { in setBounds() 59 setBounds(curve, curve, 0, 1); in setBounds() 62 void setBounds(const SkDCubic& curve, const SkDCubic& sub, double tStart, double tEnd); 64 void setBounds(const SkDQuad& curve) { in setBounds() 65 setBounds(curve, curve, 0, 1); in setBounds() 68 void setBounds(const SkDQuad& curve, const SkDQuad& sub, double tStart, double tEnd); 70 void setBounds(const SkTCurve& curve);
|
D | SkPathOpsRect.cpp | 13 void SkDRect::setBounds(const SkDQuad& curve, const SkDQuad& sub, double startT, double endT) { in setBounds() argument 26 add(curve.ptAtT(t)); in setBounds() 30 void SkDRect::setBounds(const SkDConic& curve, const SkDConic& sub, double startT, double endT) { in setBounds() argument 43 add(curve.ptAtT(t)); in setBounds() 47 void SkDRect::setBounds(const SkDCubic& curve, const SkDCubic& sub, double startT, double endT) { in setBounds() argument 60 add(curve.ptAtT(t)); in setBounds() 64 void SkDRect::setBounds(const SkTCurve& curve) { in setBounds() argument 65 curve.setBounds(this); in setBounds()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
D | dpp_pkex.c | 38 const struct dpp_curve_params *curve = pkex->own_bi->curve; in dpp_pkex_build_exchange_req() local 44 Qi = dpp_pkex_derive_Qi(curve, v2 ? NULL : pkex->own_mac, pkex->code, in dpp_pkex_build_exchange_req() 60 pkex->x = dpp_gen_keypair(curve); in dpp_pkex_build_exchange_req() 63 pkex->x = dpp_gen_keypair(curve); in dpp_pkex_build_exchange_req() 87 attr_len += 4 + 2 * curve->prime_len; in dpp_pkex_build_exchange_req() 112 wpabuf_put_le16(msg, curve->ike_group); in dpp_pkex_build_exchange_req() 134 wpabuf_put_le16(msg, 2 * curve->prime_len); in dpp_pkex_build_exchange_req() 139 if (dpp_test_gen_invalid_key(msg, curve) < 0) in dpp_pkex_build_exchange_req() 145 Mx = wpabuf_put(msg, curve->prime_len); in dpp_pkex_build_exchange_req() 146 My = wpabuf_put(msg, curve->prime_len); in dpp_pkex_build_exchange_req() [all …]
|
D | dpp_crypto.c | 99 static int dpp_hash_vector(const struct dpp_curve_params *curve, in dpp_hash_vector() argument 103 if (curve->hash_len == 32) in dpp_hash_vector() 105 if (curve->hash_len == 48) in dpp_hash_vector() 107 if (curve->hash_len == 64) in dpp_hash_vector() 249 struct crypto_ec_key * dpp_gen_keypair(const struct dpp_curve_params *curve) in dpp_gen_keypair() argument 255 key = crypto_ec_key_gen(curve->ike_group); in dpp_gen_keypair() 263 struct crypto_ec_key * dpp_set_keypair(const struct dpp_curve_params **curve, in dpp_set_keypair() argument 281 *curve = dpp_get_curve_ike_group(group); in dpp_set_keypair() 282 if (!*curve) { in dpp_set_keypair() 312 int dpp_keygen(struct dpp_bootstrap_info *bi, const char *curve, in dpp_keygen() argument [all …]
|
D | dpp_reconfig.c | 137 4 + auth->curve->nonce_len; in dpp_reconfig_build_req() 159 wpabuf_put_le16(msg, auth->curve->nonce_len); in dpp_reconfig_build_req() 160 wpabuf_put_data(msg, auth->c_nonce, auth->curve->nonce_len); in dpp_reconfig_build_req() 172 const struct dpp_curve_params *curve) in dpp_configurator_build_own_connector() argument 182 conf->curve->name); in dpp_configurator_build_own_connector() 183 conf->connector_key = dpp_gen_keypair(curve); in dpp_configurator_build_own_connector() 188 dppcon = wpabuf_alloc(1000 + 2 * curve->prime_len * 4 / 3); in dpp_configurator_build_own_connector() 201 curve) < 0) { in dpp_configurator_build_own_connector() 228 const struct dpp_curve_params *curve; in dpp_reconfig_init() local 232 curve = dpp_get_curve_ike_group(group); in dpp_reconfig_init() [all …]
|
D | dpp_auth.c | 205 if (aes_siv_encrypt(auth->k1, auth->curve->hash_len, clear, siv_len, in dpp_auth_build_req() 391 if (aes_siv_encrypt(siv_key, auth->curve->hash_len, clear, siv_len, in dpp_auth_build_resp() 443 nonce_len = auth->curve->nonce_len; in dpp_auth_build_resp_ok() 451 nonce_len = auth->curve->nonce_len; in dpp_auth_build_resp_ok() 470 auth->own_protocol_key = dpp_gen_keypair(auth->curve); in dpp_auth_build_resp_ok() 473 auth->own_protocol_key = dpp_gen_keypair(auth->curve); in dpp_auth_build_resp_ok() 492 auth->curve->hash_len) < 0) in dpp_auth_build_resp_ok() 506 WPA_PUT_LE16(&r_auth[2], auth->curve->hash_len); in dpp_auth_build_resp_ok() 512 r_auth[4 + auth->curve->hash_len / 2] ^= 0x01; in dpp_auth_build_resp_ok() 515 if (aes_siv_encrypt(auth->ke, auth->curve->hash_len, in dpp_auth_build_resp_ok() [all …]
|
D | dpp_i.h | 42 const struct dpp_curve_params *curve); 96 int dpp_keygen(struct dpp_bootstrap_info *bi, const char *curve, 98 struct crypto_ec_key * dpp_set_keypair(const struct dpp_curve_params **curve, 100 struct crypto_ec_key * dpp_gen_keypair(const struct dpp_curve_params *curve); 109 int dpp_derive_pmkid(const struct dpp_curve_params *curve, 113 dpp_pkex_derive_Qi(const struct dpp_curve_params *curve, const u8 *mac_init, 117 dpp_pkex_derive_Qr(const struct dpp_curve_params *curve, const u8 *mac_resp, 140 const struct dpp_curve_params *curve);
|
/third_party/skia/third_party/skcms/ |
D | skcms.cc | 233 static float eval_curve(const skcms_Curve* curve, float x) { in eval_curve() argument 234 if (curve->table_entries == 0) { in eval_curve() 235 return skcms_TransferFunction_eval(&curve->parametric, x); in eval_curve() 238 float ix = fmaxf_(0, fminf_(x, 1)) * (curve->table_entries - 1); in eval_curve() 244 if (curve->table_8) { in eval_curve() 245 l = curve->table_8[lo] * (1/255.0f); in eval_curve() 246 h = curve->table_8[hi] * (1/255.0f); in eval_curve() 249 memcpy(&be_l, curve->table_16 + 2*lo, 2); in eval_curve() 250 memcpy(&be_h, curve->table_16 + 2*hi, 2); in eval_curve() 259 float skcms_MaxRoundtripError(const skcms_Curve* curve, const skcms_TransferFunction* inv_tf) { in skcms_MaxRoundtripError() argument [all …]
|
/third_party/libwebsockets/lib/tls/mbedtls/ |
D | lws-genec.c | 58 const struct lws_ec_curves *curve; in lws_genec_keypair_import() local 71 curve = lws_genec_curve(ctx->curve_table, in lws_genec_keypair_import() 73 if (!curve) in lws_genec_keypair_import() 82 el[LWS_GENCRYPTO_EC_KEYEL_D].len != curve->key_bytes) || in lws_genec_keypair_import() 83 el[LWS_GENCRYPTO_EC_KEYEL_X].len != curve->key_bytes || in lws_genec_keypair_import() 84 el[LWS_GENCRYPTO_EC_KEYEL_Y].len != curve->key_bytes) in lws_genec_keypair_import() 89 (mbedtls_ecp_group_id)curve->tls_lib_nid)) in lws_genec_keypair_import() 241 const struct lws_ec_curves *curve; in lws_genecdh_new_keypair() local 250 curve = lws_genec_curve(ctx->curve_table, curve_name); in lws_genecdh_new_keypair() 251 if (!curve) { in lws_genecdh_new_keypair() [all …]
|
/third_party/gstreamer/gstplugins_base/ext/gl/effects/ |
D | gstgleffectrgbtocurve.c | 29 const GstGLEffectsCurve * curve, gint curve_index, GstGLMemory * in_tex, in gst_gl_effects_rgb_to_curve() argument 50 if (effects->curve[curve_index] == 0) { in gst_gl_effects_rgb_to_curve() 52 gl->GenTextures (1, &effects->curve[curve_index]); in gst_gl_effects_rgb_to_curve() 54 gl->BindTexture (GL_TEXTURE_2D, effects->curve[curve_index]); in gst_gl_effects_rgb_to_curve() 61 curve->width, 1, 0, GL_RGB, GL_UNSIGNED_BYTE, curve->pixel_data); in gst_gl_effects_rgb_to_curve() 66 gl->BindTexture (GL_TEXTURE_2D, effects->curve[curve_index]); in gst_gl_effects_rgb_to_curve()
|
D | gstgleffectlumatocurve.c | 29 const GstGLEffectsCurve * curve, gint curve_index, GstGLMemory * in_tex, in gst_gl_effects_luma_to_curve() argument 50 if (effects->curve[curve_index] == 0) { in gst_gl_effects_luma_to_curve() 52 gl->GenTextures (1, &effects->curve[curve_index]); in gst_gl_effects_luma_to_curve() 54 gl->BindTexture (GL_TEXTURE_2D, effects->curve[curve_index]); in gst_gl_effects_luma_to_curve() 61 curve->width, 1, 0, GL_RGB, GL_UNSIGNED_BYTE, curve->pixel_data); in gst_gl_effects_luma_to_curve() 66 gl->BindTexture (GL_TEXTURE_2D, effects->curve[curve_index]); in gst_gl_effects_luma_to_curve()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
D | dpp.c | 48 const struct dpp_curve_params *curve); 391 static int dpp_hash_vector(const struct dpp_curve_params *curve, in dpp_hash_vector() argument 395 if (curve->hash_len == 32) in dpp_hash_vector() 397 if (curve->hash_len == 48) in dpp_hash_vector() 399 if (curve->hash_len == 64) in dpp_hash_vector() 1073 bi->curve = dpp_get_curve_oid(poid); in dpp_parse_uri_pk() 1074 if (!bi->curve) { in dpp_parse_uri_pk() 1222 static EVP_PKEY * dpp_gen_keypair(const struct dpp_curve_params *curve) in dpp_gen_keypair() argument 1231 nid = OBJ_txt2nid(curve->name); in dpp_gen_keypair() 1233 wpa_printf(MSG_INFO, "DPP: Unsupported curve %s", curve->name); in dpp_gen_keypair() [all …]
|
/third_party/skia/experimental/docs/ |
D | interpolatorFunctions.js | 23 var curve = path[cIndex][curveKey]; 27 var x1 = curve[0], y1 = curve[1], x2 = curve[2], y2 = curve[3]; 28 var x3 = curve[4], y3 = curve[5], x4 = curve[6], y4 = curve[7];
|
/third_party/skia/tests/ |
D | PathOpsThreeWayTest.cpp | 16 CubicPts curve; // largest can hold lines / quads/ cubics member 53 SkDLine oLine = {{ oTest.curve.fPts[0], oTest.curve.fPts[1] }}; in testSetTest() 54 SkDLine iLine = {{ iTest.curve.fPts[0], iTest.curve.fPts[1] }}; in testSetTest() 56 iCurve.debugSet(iTest.curve.fPts); in testSetTest() 57 oCurve.debugSet(oTest.curve.fPts); in testSetTest()
|
D | PathOpsBoundsTest.cpp | 65 SkDCurve curve; in DEF_TEST() local 66 curve.fQuad.set(curvePts); in DEF_TEST() 67 curve.setQuadBounds(curvePts, 1, 0, 1, &bounds); in DEF_TEST() 70 curve.fCubic.set(curvePts); in DEF_TEST() 71 curve.setCubicBounds(curvePts, 1, 0, 1, &bounds); in DEF_TEST()
|
/third_party/openssl/doc/man3/ |
D | EC_GROUP_copy.pod | 75 EC_GROUP_copy() copies the curve B<src> into B<dst>. Both B<src> and B<dst> must use the same EC_ME… 83 EC_GROUP_set_generator() sets curve parameters that must be agreed by all participants using the cu… 85 curve chosen for cryptographic operations. Integers used for point multiplications will be between … 86 …s the B<order>. The B<order> multiplied by the B<cofactor> gives the number of points on the curve. 98 …ROUP_set_curve_name() and EC_GROUP_get_curve_name(), set and get the NID for the curve respectively 99 (see L<EC_GROUP_new(3)>). If a curve does not have a NID associated with it, then EC_GROUP_get_curv… 102 The asn1_flag value is used to determine whether the curve encoding uses 103 explicit parameters or a named curve using an ASN1 OID: many applications only 105 named curve form is used and the parameters must have a corresponding 106 named curve NID set. If asn1_flags is B<OPENSSL_EC_EXPLICIT_CURVE> the [all …]
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/import_export/ |
D | ec_importKey.https.any.js | 69 curves.forEach(function(curve) { argument 76 var algorithm = {name: vector.name, namedCurve: curve}; 77 var data = keyData[curve]; 79 …data = {jwk: {kty: keyData[curve].jwk.kty, crv: keyData[curve].jwk.crv, x: keyData[curve].jwk.x, y… 82 testFormat(format, algorithm, data, curve, usages, extractable); 89 var algorithm = {name: vector.name, namedCurve: curve}; 90 var data = keyData[curve]; 92 testFormat(format, algorithm, data, curve, usages, extractable); 94 testEmptyUsages(format, algorithm, data, curve, extractable);
|
/third_party/openssl/crypto/ec/ |
D | ec_asn1.c | 71 X9_62_CURVE *curve; member 148 ASN1_SIMPLE(ECPARAMETERS, curve, X9_62_CURVE), 309 static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve) in ec_asn1_group2curve() argument 316 if (!group || !curve || !curve->a || !curve->b) in ec_asn1_group2curve() 348 if (!ASN1_OCTET_STRING_set(curve->a, a_buf, len) in ec_asn1_group2curve() 349 || !ASN1_OCTET_STRING_set(curve->b, b_buf, len)) { in ec_asn1_group2curve() 356 if (!curve->seed) in ec_asn1_group2curve() 357 if ((curve->seed = ASN1_BIT_STRING_new()) == NULL) { in ec_asn1_group2curve() 361 curve->seed->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07); in ec_asn1_group2curve() 362 curve->seed->flags |= ASN1_STRING_FLAG_BITS_LEFT; in ec_asn1_group2curve() [all …]
|
/third_party/node/deps/openssl/openssl/crypto/ec/ |
D | ec_asn1.c | 71 X9_62_CURVE *curve; member 148 ASN1_SIMPLE(ECPARAMETERS, curve, X9_62_CURVE), 309 static int ec_asn1_group2curve(const EC_GROUP *group, X9_62_CURVE *curve) in ec_asn1_group2curve() argument 316 if (!group || !curve || !curve->a || !curve->b) in ec_asn1_group2curve() 348 if (!ASN1_OCTET_STRING_set(curve->a, a_buf, len) in ec_asn1_group2curve() 349 || !ASN1_OCTET_STRING_set(curve->b, b_buf, len)) { in ec_asn1_group2curve() 356 if (!curve->seed) in ec_asn1_group2curve() 357 if ((curve->seed = ASN1_BIT_STRING_new()) == NULL) { in ec_asn1_group2curve() 361 curve->seed->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07); in ec_asn1_group2curve() 362 curve->seed->flags |= ASN1_STRING_FLAG_BITS_LEFT; in ec_asn1_group2curve() [all …]
|
/third_party/openssl/providers/common/der/ |
D | ECX.asn1 | 12 id-edwards-curve-algs OBJECT IDENTIFIER ::= { 1 3 101 } 14 id-X25519 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 110 } 15 id-X448 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 111 } 16 id-Ed25519 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 112 } 17 id-Ed448 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 113 }
|
/third_party/node/deps/openssl/openssl/providers/common/der/ |
D | ECX.asn1 | 12 id-edwards-curve-algs OBJECT IDENTIFIER ::= { 1 3 101 } 14 id-X25519 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 110 } 15 id-X448 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 111 } 16 id-Ed25519 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 112 } 17 id-Ed448 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 113 }
|
/third_party/libwebsockets/lib/tls/openssl/ |
D | lws-genec.c | 226 const struct lws_ec_curves *curve; in lws_genec_keypair_import() local 231 curve = lws_genec_curve(curve_table, in lws_genec_keypair_import() 233 if (!curve) in lws_genec_keypair_import() 237 el[LWS_GENCRYPTO_EC_KEYEL_D].len != curve->key_bytes) || in lws_genec_keypair_import() 238 el[LWS_GENCRYPTO_EC_KEYEL_X].len != curve->key_bytes || in lws_genec_keypair_import() 239 el[LWS_GENCRYPTO_EC_KEYEL_Y].len != curve->key_bytes) in lws_genec_keypair_import() 248 if (lws_genec_eckey_import(curve->tls_lib_nid, pkey, el)) { in lws_genec_keypair_import() 347 const struct lws_ec_curves *curve; in lws_genec_new_keypair() local 354 curve = lws_genec_curve(ctx->curve_table, curve_name); in lws_genec_new_keypair() 355 if (!curve) { in lws_genec_new_keypair() [all …]
|