EC_KEY *ecdh_a[EC_NUM], *ecdh_b[EC_NUM];
unsigned char secret_a[MAX_ECDH_SIZE], secret_b[MAX_ECDH_SIZE];
int secret_size_a, secret_size_b;
- int ecdh_check = 0;
+ int ecdh_checks = 0;
int secret_idx = 0;
long ecdh_c[EC_NUM][2];
#endif
ecdh_a[j]->pub_key,
ecdh_b[j]);
if (secret_size_a != secret_size_b)
- ecdh_check = 0;
+ ecdh_checks = 0;
else
- ecdh_check = 1;
+ ecdh_checks = 1;
for (secret_idx = 0;
- (secret_idx < secret_size_a) && (ecdh_check == 1);
+ (secret_idx < secret_size_a)
+ && (ecdh_checks == 1);
secret_idx++)
{
if (secret_a[secret_idx] != secret_b[secret_idx])
- ecdh_check = 0;
+ ecdh_checks = 0;
}
- if (ecdh_check == 0)
+ if (ecdh_checks == 0)
{
BIO_printf(bio_err,"ECDH computations don't match.\n");
ERR_print_errors(bio_err);
exit(1); \
} while (0)
+void prime_field_tests(void);
+void char2_field_tests(void);
+
#if 0
static void timings(EC_GROUP *group, int multi, BN_CTX *ctx)
{
static const char rnd_seed[] = "string to make the random number generator think it has entropy";
+int test_ecdh_curve(int , char *, BN_CTX *, BIO *);
int test_ecdh_curve(int nid, char *text, BN_CTX *ctx, BIO *out)
{
ECDSA_SIG* signatures[ECDSA_NIST_TESTS];
unsigned char digest[ECDSA_NIST_TESTS][20];
+/* some declarations */
+void clear_ecdsa(EC_KEY *);
+int set_p192_param(EC_KEY *);
+int set_p239_param(EC_KEY *);
+int test_sig_vrf(EC_KEY *, const unsigned char *);
+int test_x962_sig_vrf(EC_KEY *, const unsigned char *,
+ const char *, const char *, const char *);
+int ecdsa_cmp(const EC_KEY *, const EC_KEY *);
+
void clear_ecdsa(EC_KEY *ecdsa)
{
if (!ecdsa)
int ssl3_alert_code(int code);
int ssl_ok(SSL *s);
+int check_srvr_ecc_cert_and_alg(X509 *x, SSL_CIPHER *cs);
+
SSL_COMP *ssl3_comp_find(STACK_OF(SSL_COMP) *sk, int n);
STACK_OF(SSL_COMP) *SSL_COMP_get_compression_methods(void);