/openssl/doc/man7/ |
H A D | EVP_PKEY-X25519.pod | 5 EVP_PKEY-X25519, EVP_PKEY-X448, EVP_PKEY-ED25519, EVP_PKEY-ED448, 6 EVP_KEYMGMT-X25519, EVP_KEYMGMT-X448, EVP_KEYMGMT-ED25519, EVP_KEYMGMT-ED448 7 - EVP_PKEY X25519, X448, ED25519 and ED448 keytype and algorithm support 11 The B<X25519>, B<X448>, B<ED25519> and B<ED448> keytypes are 25 It should have a length of at least 32 for X25519, and 56 for X448. 26 This is only supported by X25519 and X448. 30 This getter is only supported by X25519 and X448 for the FIPS provider. 39 =head2 Common X25519, X448, ED25519 and ED448 parameters 97 EVP_PKEY_CTX_new_from_name(NULL, "X448", NULL); 109 An B<X448>, B<ED25519>, or B<ED448> key can be generated likewise. [all …]
|
H A D | X25519.pod | 6 X448 7 - EVP_PKEY X25519 and X448 support 11 The B<X25519> and B<X448> EVP_PKEY implementation supports key generation and 12 key derivation using B<X25519> and B<X448>. It has associated private and public 26 For the B<X448> algorithm a context can be obtained by calling: 30 X25519 or X448 private keys can be set directly using 36 X25519 or X448 public keys can be set directly using 56 B<X25519> and B<X448>.
|
H A D | EVP_KEM-X25519.pod | 5 EVP_KEM-X25519, EVP_KEM-X448 6 - EVP_KEM X25519 and EVP_KEM X448 keytype and algorithm support 10 The B<X25519> and <X448> keytype and its parameters are described in 14 =head2 X25519 and X448 KEM parameters 20 The OpenSSL X25519 and X448 Key Encapsulation Mechanisms only support the 28 by doing an X25519 or X448 key exchange using the ephemeral private key and a 46 It should have a length of at least 32 for X25519, and 56 for X448.
|
H A D | EVP_KEYEXCH-X25519.pod | 6 EVP_KEYEXCH-X448 7 - X25519 and X448 Key Exchange algorithm support 11 Key exchange support for the B<X25519> and B<X448> key types. 21 B<X25519> and B<X448> are not FIPS approved in FIPS 140-3.
|
H A D | OSSL_PROVIDER-default.pod | 168 =item X448, see L<EVP_KEYEXCH-X448(7)> 222 =item X448, see L<EVP_KEM-X448(7)> 246 =item X448, see L<EVP_KEYMGMT-X448(7)> 313 =item X448 345 =item X448
|
H A D | OSSL_PROVIDER-base.pod | 95 =item X448 127 =item X448
|
H A D | OSSL_PROVIDER-FIPS.pod | 141 =item X448, see L<EVP_KEYEXCH-X448(7)> 209 =item X448, see L<EVP_KEYMGMT-X448(7)>
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_fromdata.pod | 43 L<B<EVP_PKEY-ED448>(7)|EVP_PKEY-ED448(7)/Common X25519, X448, ED25519 and ED448 parameters>, 44 L<B<EVP_PKEY-X25519>(7)|EVP_PKEY-X25519(7)/Common X25519, X448, ED25519 and ED448 parameters>, 45 L<B<EVP_PKEY-X448>(7)|EVP_PKEY-X448(7)/Common X25519, X448, ED25519 and ED448 parameters>, 46 and L<B<EVP_PKEY-ED25519>(7)|EVP_PKEY-ED25519(7)/Common X25519, X448, ED25519 and ED448 parameters>… 263 L<EVP_PKEY-ED448(7)>, L<EVP_PKEY-X25519(7)>, L<EVP_PKEY-X448(7)>,
|
H A D | EVP_PKEY_set1_encoded_public_key.pod | 40 Curve Cryptography") standard. For X25519 and X448 it should be encoded in a 122 L<EVP_PKEY-DH(7)>, L<EVP_PKEY-EC(7)>, L<EVP_PKEY-X25519(7)>, L<EVP_PKEY-X448(7)>
|
H A D | EVP_PKEY_todata.pod | 47 L<EVP_PKEY-ED448(7)>, L<EVP_PKEY-X25519(7)>, L<EVP_PKEY-X448(7)>,
|
H A D | EVP_PKEY_CTX_set_params.pod | 59 L<EVP_PKEY-X25519(7)/Common X25519, X448, ED25519 and ED448 parameters>
|
H A D | EVP_PKEY_new.pod | 98 "X25519", "ED25519", "X448" or "ED448". I<key> points to the raw private key 122 "X25519", "ED25519", "X448" or "ED448".
|
H A D | OPENSSL_s390xcap.pod | 165 # 81 1<<46 PCC-Scalar-Multiply-X448
|
/openssl/providers/ |
H A D | encoders.inc | 64 ENCODER_TEXT("X448", x448, yes), 194 ENCODER_w_structure("X448", x448, yes, der, EncryptedPrivateKeyInfo), 195 ENCODER_w_structure("X448", x448, yes, pem, EncryptedPrivateKeyInfo), 196 ENCODER_w_structure("X448", x448, yes, der, PrivateKeyInfo), 197 ENCODER_w_structure("X448", x448, yes, pem, PrivateKeyInfo), 198 ENCODER_w_structure("X448", x448, yes, der, SubjectPublicKeyInfo), 199 ENCODER_w_structure("X448", x448, yes, pem, SubjectPublicKeyInfo),
|
H A D | decoders.inc | 68 DECODER_w_structure("X448", der, PrivateKeyInfo, x448, yes), 69 DECODER_w_structure("X448", der, SubjectPublicKeyInfo, x448, yes),
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_ecx.txt | 98 Title = X448 test vectors (from RFC7748 6.2) 130 PrivateKeyRaw=Alice-448-Raw:X448:9a8f4925d1519f5775cf46b04b5800d4ee9ee8bae8bc5565d498c28dd9c9baf574… 132 PublicKeyRaw=Alice-448-PUBLIC-Raw:X448:9b08f7cc31b7e3e67d22d5aea121074a273bd2b83de09c63faa73d2c22c5… 136 PrivateKeyRaw=Bob-448-Raw:X448:1c306a7ac2a0e2e0990b294470cba339e6453772b075811d8fad0d1d6927c120bb5e… 138 PublicKeyRaw=Bob-448-PUBLIC-Raw:X448:3eb7a829b0cd20f5bcfc0b599b6feccf6da4627107bdb0d4f345b43027d8b9… 142 PublicKeyRaw=Bob-448-PUBLIC-Raw-NonCanonical:X448:fffffffffffffffffffffffffffffffffffffffffffffffff… 149 # Test that X448 Key exchange is not FIPS approved 178 # Illegal sign/verify operations with X448 key 960 # Test that X448 KeyGen is not FIPS approved 963 KeyGen = X448
|
/openssl/test/recipes/30-test_evp_pkey_provided/ |
H A D | X448.pub.txt | 1 X448 Public-Key:
|
H A D | X448.priv.txt | 1 X448 Private-Key:
|
/openssl/providers/common/der/ |
H A D | ECX.asn1 | 15 id-X448 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 111 }
|
/openssl/test/ |
H A D | endecode_test.c | 1045 KEYS(X448); 1046 IMPLEMENT_TEST_SUITE(X448, "X448", 1) 1408 MAKE_KEYS(X448, "X448", NULL); in setup_tests() 1460 ADD_TEST_SUITE(X448); in setup_tests() 1520 FREE_KEYS(X448); in cleanup_tests()
|
/openssl/test/ssl-tests/ |
H A D | 14-curves.cnf.in | 17 my @curves_no_fips = ("X25519", "X448");
|
H A D | 14-curves.cnf | 9 test-4 = 4-curve-X448 227 [4-curve-X448] 228 ssl_conf = 4-curve-X448-ssl 230 [4-curve-X448-ssl] 231 server = 4-curve-X448-server 232 client = 4-curve-X448-client 234 [4-curve-X448-server] 237 Curves = X448 241 [4-curve-X448-client] 243 Curves = X448 [all …]
|
/openssl/doc/HOWTO/ |
H A D | keys.txt | 101 For X25519 and X448, it's treated as a distinct algorithm but not as one of
|
/openssl/doc/man1/ |
H A D | openssl-genpkey.pod.in | 88 X25519, X448, ED25519 and ED448. 138 below. There are no key generation options defined for the X25519, X448, ED25519 509 The ability to generate X448, ED25519 and ED448 keys was added in OpenSSL 1.1.1.
|
H A D | openssl-pkeyutl.pod.in | 217 L<EVP_KEM-X448(7)>. 398 =head1 X25519 AND X448 ALGORITHMS 400 The X25519 and X448 algorithms support key derivation only. Currently there are
|