/openssl/test/ssl-tests/ |
H A D | 14-curves.cnf | 5 test-0 = 0-curve-prime256v1 6 test-1 = 1-curve-secp384r1 7 test-2 = 2-curve-secp521r1 8 test-3 = 3-curve-X25519 9 test-4 = 4-curve-X448 10 test-5 = 5-curve-ffdhe2048 11 test-6 = 6-curve-ffdhe3072 12 test-7 = 7-curve-ffdhe4096 198 [3-curve-X25519] 227 [4-curve-X448] [all …]
|
H A D | 14-curves.cnf.in | 59 my $curve = $curves[$_]; 61 name => "curve-${curve}", 63 "Curves" => $curve, 70 "Curves" => $curve 82 name => "curve-${curve}", 84 "Curves" => $curve, 91 "Curves" => $curve 103 name => "curve-${curve}-tls12-in-tls13", 127 name => "curve-${curve}-tls13", 146 name => "curve-${curve}-tls13-in-tls12", [all …]
|
/openssl/doc/man3/ |
H A D | EC_GROUP_copy.pod | 83 EC_GROUP_set_generator() sets curve parameters that must be agreed by all participants using the cu… 102 The asn1_flag value is used to determine whether the curve encoding uses 105 named curve form is used and the parameters must have a corresponding 106 named curve NID set. If asn1_flags is B<OPENSSL_EC_EXPLICIT_CURVE> the 112 applications would have to explicitly set the named curve form) in OpenSSL 113 1.1.0 and later the named curve form is the default. 140 for the curve respectively. 169 If the curve name of the given group is B<NID_undef> (e.g. it has been created by using explicit pa… 172 returned if the curve name of the given group is NID_undef. 199 EC_GROUP_dup() returns a pointer to the duplicated curve, or NULL on error. [all …]
|
H A D | EC_GROUP_new.pod | 79 Within the library there are two forms of elliptic curve that are of interest. 82 elliptic curve equation as follows: 88 curve equation is modified to: 97 a new curve can be constructed by calling EC_GROUP_new(), using the 102 It is then necessary to call EC_GROUP_set_curve() to set the curve parameters. 115 describing a named or explicit curve depending on the EC_GROUP. 128 EC_GROUP_set_curve() sets the curve parameters I<p>, I<a> and I<b>. For a curve 136 EC_group_get_curve() obtains the previously set curve parameters. 169 readable comment string describing the curve. 171 In order to construct a built-in curve use the function [all …]
|
H A D | EC_KEY_new.pod | 24 EVP_PKEY *EVP_EC_gen(const char *curve); 71 EVP_EC_gen() generates a new EC key pair on the given I<curve>. 79 A new EC_KEY with no associated curve can be constructed by calling 86 A curve can be associated with the EC_KEY by calling 94 curve, the library context to be used I<ctx> (see L<OSSL_LIB_CTX(3)>) and any 98 See L<EC_GROUP_new(3)> for a description of curve names. 124 an EC_POINT on the curve calculated by multiplying the generator for the 125 curve by the private key.
|
H A D | ECPKParameters_print.pod | 6 encoding ASN1 representations of elliptic curve entities 25 B<EC_GROUP> structure, which represents a curve.
|
H A D | EC_POINT_new.pod | 104 An B<EC_POINT> structure represents a point on a curve. A new point is 124 A valid point on a curve is the special point at infinity. A point is set to 129 coordinates for the point B<p> defined over the curve given in B<group>. The 160 point (x, y), for any given value for x such that the point is on the curve 184 The function EC_POINT_point2oct() encodes the given curve point B<p> as an 189 Similarly the function EC_POINT_oct2point() decodes a curve point into B<p> from 201 at infinity for a given curve is fixed to a single octet of value zero and that,
|
H A D | EC_GFp_simple_method.pod | 33 When constructing a curve using EC_GROUP_new (see L<EC_GROUP_new(3)>) an 36 type for the form of curve selected is used.
|
/openssl/providers/common/der/ |
H A D | ECX.asn1 | 12 id-edwards-curve-algs OBJECT IDENTIFIER ::= { 1 3 101 } 14 id-X25519 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 110 } 15 id-X448 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 111 } 16 id-Ed25519 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 112 } 17 id-Ed448 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 113 }
|
/openssl/test/ |
H A D | evp_pkey_dhkem_test.c | 45 TEST_note("Test %s %s Decapsulate", t->curve, in test_dhkem_encapsulate() 52 if (!TEST_ptr(spriv = new_raw_private_key(t->curve, in test_dhkem_encapsulate() 403 TEST_note("%s %s", t->curve, encap ? "Encap" : "Decap"); in test_nopublic() 438 TEST_note("%s %s", t->curve, encap ? "Encap" : "Decap"); in test_noauthpublic() 519 const char *curve; in test_ec_noikme() local 527 curve = dhkem_supported_curves[tstid]; in test_ec_noikme() 528 TEST_note("testing encap/decap of curve %s%s\n", curve, in test_ec_noikme() 531 if (curve[0] == 'X') { in test_ec_noikme() 572 static int do_ec_curve_failtest(const char *curve) in do_ec_curve_failtest() argument 609 TEST_note("%s %s", t->curve, encap ? "Encap" : "Decap"); in test_ec_badpublic() [all …]
|
/openssl/crypto/ec/ |
H A D | ec_asn1.c | 72 X9_62_CURVE *curve; member 317 if (!group || !curve || !curve->a || !curve->b) in ec_asn1_group2curve() 355 if (!curve->seed) in ec_asn1_group2curve() 367 ASN1_BIT_STRING_free(curve->seed); in ec_asn1_group2curve() 368 curve->seed = NULL; in ec_asn1_group2curve() 543 if (params->curve == NULL in EC_GROUP_new_from_ecparameters() 544 || params->curve->a == NULL || params->curve->a->data == NULL in EC_GROUP_new_from_ecparameters() 545 || params->curve->b == NULL || params->curve->b->data == NULL) { in EC_GROUP_new_from_ecparameters() 549 a = BN_bin2bn(params->curve->a->data, params->curve->a->length, NULL); in EC_GROUP_new_from_ecparameters() 554 b = BN_bin2bn(params->curve->b->data, params->curve->b->length, NULL); in EC_GROUP_new_from_ecparameters() [all …]
|
H A D | ec_curve.c | 3166 if (curve.data == NULL) in ec_group_new_from_data() 3168 curve.meth != NULL ? curve.meth() : NULL); in ec_group_new_from_data() 3175 data = curve.data; in ec_group_new_from_data() 3180 if (curve.meth != NULL) { in ec_group_new_from_data() 3181 meth = curve.meth(); in ec_group_new_from_data() 3228 EC_GROUP_set_curve_name(group, curve.nid); in ec_group_new_from_data() 3317 const ec_list_element *curve; in EC_GROUP_new_by_curve_name_ex() local 3319 if ((curve = ec_curve_nid2curve(nid)) == NULL in EC_GROUP_new_by_curve_name_ex() 3444 data = curve.data; in ossl_ec_curve_nid_from_params() 3452 && (nid <= 0 || nid == curve.nid) in ossl_ec_curve_nid_from_params() [all …]
|
/openssl/doc/man7/ |
H A D | EVP_PKEY-EC.pod | 15 The normal way of specifying domain parameters for an EC curve is via the 16 curve name "group". For curves with no curve name, explicit parameters can be 29 The curve name. 38 For a curve over Fp I<p> is the prime for the field. For a curve over F2^m I<p> 49 I<a> and I<b> represents the coefficients of the curve 63 The I<generator> is a well defined point on the curve chosen for cryptographic 69 I<order> multiplied by the I<cofactor> gives the number of points on the curve. 74 curve parameters. Set to 1 if so or 0 if a named curve was used. 80 EC curve's cofactor (note for some curves the cofactor is 1). 102 "named-nist" is similar but also checks that the named curve is a nist curve. [all …]
|
H A D | EVP_PKEY-SM2.pod | 12 an elliptic curve based algorithm. The current implementation in OpenSSL supports 62 parameters specify the SM2 elliptic curve.
|
H A D | EVP_KEYEXCH-ECDH.pod | 62 the EC curve has a cofactor that is not 1, and the cofactor is not used. 75 L<EVP_PKEY-EC(7)/Examples> using the same curve name.
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_ecdsa_sigalg.txt | 163 # Test that a nist curve with < 112 bits is allowed in fips mode for verifying 169 # Test that a nist curve with SHA3 is allowed in fips mode 176 # Test that a explicit curve that is a named curve is allowed in fips mode 184 # Test that a explicit curve is not allowed in fips mode 191 # Test that a curve with < 112 bits is not allowed in fips mode for signing 199 # Test that a non nist curve is not allowed in fips mode
|
H A D | evppkey_ecdsa.txt | 164 # Test that a nist curve with < 112 bits is allowed in fips mode for verifying 170 # Test that a nist curve with SHA3 is allowed in fips mode 177 # Test that a explicit curve that is a named curve is allowed in fips mode 185 # Test that a explicit curve is not allowed in fips mode 192 # Test that a curve with < 112 bits is not allowed in fips mode for signing 200 # Test that a non nist curve is not allowed in fips mode
|
H A D | evppkey_ecc.txt | 14 Title=c2pnb163v1 curve tests 92 Title=c2pnb163v2 curve tests 170 Title=c2pnb163v3 curve tests 248 Title=c2pnb176v1 curve tests 326 Title=c2pnb208w1 curve tests 406 Title=c2pnb272w1 curve tests 486 Title=c2pnb304w1 curve tests 566 Title=c2pnb368w1 curve tests 649 Title=c2tnb191v1 curve tests 729 Title=c2tnb191v2 curve tests [all …]
|
H A D | evppkey_brainpool.txt | 14 Title=brainpoolP160r1 curve tests 52 Title=brainpoolP160t1 curve tests 90 Title=brainpoolP192r1 curve tests 130 Title=brainpoolP192t1 curve tests 170 Title=brainpoolP224r1 curve tests 210 Title=brainpoolP224t1 curve tests 250 Title=brainpoolP256r1 curve tests 290 Title=brainpoolP256t1 curve tests 330 Title=brainpoolP320r1 curve tests 370 Title=brainpoolP320t1 curve tests [all …]
|
/openssl/doc/man1/ |
H A D | openssl-ecparam.pod.in | 79 Validate the elliptic curve parameters. 83 Validate the elliptic name curve parameters by checking if the curve parameters 97 This specifies how the points on the elliptic curve are converted 107 This specifies how the elliptic curve parameters are encoded.
|
H A D | openssl-pkey.pod.in | 163 This option only applies to elliptic-curve based keys. 165 This specifies how the points on the elliptic curve are converted 175 This option only applies to elliptic curve based public and private keys. 177 This specifies how the elliptic curve parameters are encoded.
|
H A D | openssl-ec.pod.in | 105 Print the elliptic curve parameters. 121 This specifies how the points on the elliptic curve are converted 131 This specifies how the elliptic curve parameters are encoded.
|
/openssl/providers/implementations/kem/ |
H A D | ec_kem.c | 119 const char *curve = ec_curvename_get0(ec); in recipient_key_set() local 121 if (curve == NULL) in recipient_key_set() 123 ctx->info = ossl_HPKE_KEM_INFO_find_curve(curve); in recipient_key_set() 391 const char *curve = ec_curvename_get0(ec); in ossl_ec_dhkem_derive_private() local 394 if (curve == NULL) in ossl_ec_dhkem_derive_private() 397 info = ossl_HPKE_KEM_INFO_find_curve(curve); in ossl_ec_dhkem_derive_private()
|
/openssl/ssl/ |
H A D | t1_lib.c | 1638 cache[cache_idx].curve = NID_undef; in ssl_setup_sigalgs() 1947 && lu->curve != NID_undef in tls_check_sigalg_curve() 1948 && curve == lu->curve) in tls_check_sigalg_curve() 2076 int curve = ssl_get_EC_curve_nid(pkey); in tls12_check_peer_sigalg() local 2078 if (lu->curve != NID_undef && curve != lu->curve) { in tls12_check_peer_sigalg() 3843 int curve = -1; in find_sig_alg() local 3868 if (curve == -1) in find_sig_alg() 3869 curve = ssl_get_EC_curve_nid(tmppkey); in find_sig_alg() 3870 if (lu->curve != NID_undef && curve != lu->curve) in find_sig_alg() 3924 int curve = -1; in tls_choose_sigalg() local [all …]
|
/openssl/include/internal/ |
H A D | hpke_util.h | 63 const OSSL_HPKE_KEM_INFO *ossl_HPKE_KEM_INFO_find_curve(const char *curve);
|