Home
last modified time | relevance | path

Searched refs:X448 (Results 1 – 25 of 46) sorted by relevance

12

/openssl/doc/man7/
H A DEVP_PKEY-X25519.pod5 EVP_PKEY-X25519, EVP_PKEY-X448, EVP_PKEY-ED25519, EVP_PKEY-ED448,
6 EVP_KEYMGMT-X25519, EVP_KEYMGMT-X448, EVP_KEYMGMT-ED25519, EVP_KEYMGMT-ED448
7 - EVP_PKEY X25519, X448, ED25519 and ED448 keytype and algorithm support
11 The B<X25519>, B<X448>, B<ED25519> and B<ED448> keytypes are
25 It should have a length of at least 32 for X25519, and 56 for X448.
26 This is only supported by X25519 and X448.
30 This getter is only supported by X25519 and X448 for the FIPS provider.
39 =head2 Common X25519, X448, ED25519 and ED448 parameters
97 EVP_PKEY_CTX_new_from_name(NULL, "X448", NULL);
109 An B<X448>, B<ED25519>, or B<ED448> key can be generated likewise.
[all …]
H A DX25519.pod6 X448
7 - EVP_PKEY X25519 and X448 support
11 The B<X25519> and B<X448> EVP_PKEY implementation supports key generation and
12 key derivation using B<X25519> and B<X448>. It has associated private and public
26 For the B<X448> algorithm a context can be obtained by calling:
30 X25519 or X448 private keys can be set directly using
36 X25519 or X448 public keys can be set directly using
56 B<X25519> and B<X448>.
H A DEVP_KEM-X25519.pod5 EVP_KEM-X25519, EVP_KEM-X448
6 - EVP_KEM X25519 and EVP_KEM X448 keytype and algorithm support
10 The B<X25519> and <X448> keytype and its parameters are described in
14 =head2 X25519 and X448 KEM parameters
20 The OpenSSL X25519 and X448 Key Encapsulation Mechanisms only support the
28 by doing an X25519 or X448 key exchange using the ephemeral private key and a
46 It should have a length of at least 32 for X25519, and 56 for X448.
H A DEVP_KEYEXCH-X25519.pod6 EVP_KEYEXCH-X448
7 - X25519 and X448 Key Exchange algorithm support
11 Key exchange support for the B<X25519> and B<X448> key types.
21 B<X25519> and B<X448> are not FIPS approved in FIPS 140-3.
H A DOSSL_PROVIDER-default.pod168 =item X448, see L<EVP_KEYEXCH-X448(7)>
222 =item X448, see L<EVP_KEM-X448(7)>
246 =item X448, see L<EVP_KEYMGMT-X448(7)>
313 =item X448
345 =item X448
H A DOSSL_PROVIDER-base.pod95 =item X448
127 =item X448
H A DOSSL_PROVIDER-FIPS.pod141 =item X448, see L<EVP_KEYEXCH-X448(7)>
209 =item X448, see L<EVP_KEYMGMT-X448(7)>
/openssl/doc/man3/
H A DEVP_PKEY_fromdata.pod43 L<B<EVP_PKEY-ED448>(7)|EVP_PKEY-ED448(7)/Common X25519, X448, ED25519 and ED448 parameters>,
44 L<B<EVP_PKEY-X25519>(7)|EVP_PKEY-X25519(7)/Common X25519, X448, ED25519 and ED448 parameters>,
45 L<B<EVP_PKEY-X448>(7)|EVP_PKEY-X448(7)/Common X25519, X448, ED25519 and ED448 parameters>,
46 and L<B<EVP_PKEY-ED25519>(7)|EVP_PKEY-ED25519(7)/Common X25519, X448, ED25519 and ED448 parameters>…
263 L<EVP_PKEY-ED448(7)>, L<EVP_PKEY-X25519(7)>, L<EVP_PKEY-X448(7)>,
H A DEVP_PKEY_set1_encoded_public_key.pod40 Curve Cryptography") standard. For X25519 and X448 it should be encoded in a
122 L<EVP_PKEY-DH(7)>, L<EVP_PKEY-EC(7)>, L<EVP_PKEY-X25519(7)>, L<EVP_PKEY-X448(7)>
H A DEVP_PKEY_todata.pod47 L<EVP_PKEY-ED448(7)>, L<EVP_PKEY-X25519(7)>, L<EVP_PKEY-X448(7)>,
H A DEVP_PKEY_CTX_set_params.pod59 L<EVP_PKEY-X25519(7)/Common X25519, X448, ED25519 and ED448 parameters>
H A DEVP_PKEY_new.pod98 "X25519", "ED25519", "X448" or "ED448". I<key> points to the raw private key
122 "X25519", "ED25519", "X448" or "ED448".
H A DOPENSSL_s390xcap.pod165 # 81 1<<46 PCC-Scalar-Multiply-X448
/openssl/providers/
H A Dencoders.inc64 ENCODER_TEXT("X448", x448, yes),
194 ENCODER_w_structure("X448", x448, yes, der, EncryptedPrivateKeyInfo),
195 ENCODER_w_structure("X448", x448, yes, pem, EncryptedPrivateKeyInfo),
196 ENCODER_w_structure("X448", x448, yes, der, PrivateKeyInfo),
197 ENCODER_w_structure("X448", x448, yes, pem, PrivateKeyInfo),
198 ENCODER_w_structure("X448", x448, yes, der, SubjectPublicKeyInfo),
199 ENCODER_w_structure("X448", x448, yes, pem, SubjectPublicKeyInfo),
H A Ddecoders.inc68 DECODER_w_structure("X448", der, PrivateKeyInfo, x448, yes),
69 DECODER_w_structure("X448", der, SubjectPublicKeyInfo, x448, yes),
/openssl/test/recipes/30-test_evp_data/
H A Devppkey_ecx.txt98 Title = X448 test vectors (from RFC7748 6.2)
130 PrivateKeyRaw=Alice-448-Raw:X448:9a8f4925d1519f5775cf46b04b5800d4ee9ee8bae8bc5565d498c28dd9c9baf574…
132 PublicKeyRaw=Alice-448-PUBLIC-Raw:X448:9b08f7cc31b7e3e67d22d5aea121074a273bd2b83de09c63faa73d2c22c5…
136 PrivateKeyRaw=Bob-448-Raw:X448:1c306a7ac2a0e2e0990b294470cba339e6453772b075811d8fad0d1d6927c120bb5e…
138 PublicKeyRaw=Bob-448-PUBLIC-Raw:X448:3eb7a829b0cd20f5bcfc0b599b6feccf6da4627107bdb0d4f345b43027d8b9…
142 PublicKeyRaw=Bob-448-PUBLIC-Raw-NonCanonical:X448:fffffffffffffffffffffffffffffffffffffffffffffffff…
149 # Test that X448 Key exchange is not FIPS approved
178 # Illegal sign/verify operations with X448 key
960 # Test that X448 KeyGen is not FIPS approved
963 KeyGen = X448
/openssl/test/recipes/30-test_evp_pkey_provided/
H A DX448.pub.txt1 X448 Public-Key:
H A DX448.priv.txt1 X448 Private-Key:
/openssl/providers/common/der/
H A DECX.asn115 id-X448 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 111 }
/openssl/test/
H A Dendecode_test.c1045 KEYS(X448);
1046 IMPLEMENT_TEST_SUITE(X448, "X448", 1)
1408 MAKE_KEYS(X448, "X448", NULL); in setup_tests()
1460 ADD_TEST_SUITE(X448); in setup_tests()
1520 FREE_KEYS(X448); in cleanup_tests()
/openssl/test/ssl-tests/
H A D14-curves.cnf.in17 my @curves_no_fips = ("X25519", "X448");
H A D14-curves.cnf9 test-4 = 4-curve-X448
227 [4-curve-X448]
228 ssl_conf = 4-curve-X448-ssl
230 [4-curve-X448-ssl]
231 server = 4-curve-X448-server
232 client = 4-curve-X448-client
234 [4-curve-X448-server]
237 Curves = X448
241 [4-curve-X448-client]
243 Curves = X448
[all …]
/openssl/doc/HOWTO/
H A Dkeys.txt101 For X25519 and X448, it's treated as a distinct algorithm but not as one of
/openssl/doc/man1/
H A Dopenssl-genpkey.pod.in88 X25519, X448, ED25519 and ED448.
138 below. There are no key generation options defined for the X25519, X448, ED25519
509 The ability to generate X448, ED25519 and ED448 keys was added in OpenSSL 1.1.1.
H A Dopenssl-pkeyutl.pod.in181 L<EVP_KEM-X448(7)>.
361 =head1 X25519 AND X448 ALGORITHMS
363 The X25519 and X448 algorithms support key derivation only. Currently there are

Completed in 43 milliseconds

12