Home
last modified time | relevance | path

Searched refs:curve (Results 1 – 25 of 63) sorted by relevance

123

/openssl/test/ssl-tests/
H A D14-curves.cnf5 test-0 = 0-curve-prime256v1
6 test-1 = 1-curve-secp384r1
7 test-2 = 2-curve-secp521r1
8 test-3 = 3-curve-X25519
9 test-4 = 4-curve-X448
10 test-5 = 5-curve-ffdhe2048
11 test-6 = 6-curve-ffdhe3072
12 test-7 = 7-curve-ffdhe4096
198 [3-curve-X25519]
227 [4-curve-X448]
[all …]
H A D14-curves.cnf.in59 my $curve = $curves[$_];
61 name => "curve-${curve}",
63 "Curves" => $curve,
70 "Curves" => $curve
82 name => "curve-${curve}",
84 "Curves" => $curve,
91 "Curves" => $curve
103 name => "curve-${curve}-tls12-in-tls13",
127 name => "curve-${curve}-tls13",
146 name => "curve-${curve}-tls13-in-tls12",
[all …]
/openssl/doc/man3/
H A DEC_GROUP_copy.pod83 EC_GROUP_set_generator() sets curve parameters that must be agreed by all participants using the cu…
102 The asn1_flag value is used to determine whether the curve encoding uses
105 named curve form is used and the parameters must have a corresponding
106 named curve NID set. If asn1_flags is B<OPENSSL_EC_EXPLICIT_CURVE> the
112 applications would have to explicitly set the named curve form) in OpenSSL
113 1.1.0 and later the named curve form is the default.
140 for the curve respectively.
169 If the curve name of the given group is B<NID_undef> (e.g. it has been created by using explicit pa…
172 returned if the curve name of the given group is NID_undef.
199 EC_GROUP_dup() returns a pointer to the duplicated curve, or NULL on error.
[all …]
H A DEC_GROUP_new.pod79 Within the library there are two forms of elliptic curve that are of interest.
82 elliptic curve equation as follows:
88 curve equation is modified to:
97 a new curve can be constructed by calling EC_GROUP_new(), using the
102 It is then necessary to call EC_GROUP_set_curve() to set the curve parameters.
115 describing a named or explicit curve depending on the EC_GROUP.
128 EC_GROUP_set_curve() sets the curve parameters I<p>, I<a> and I<b>. For a curve
136 EC_group_get_curve() obtains the previously set curve parameters.
169 readable comment string describing the curve.
171 In order to construct a built-in curve use the function
[all …]
H A DEC_KEY_new.pod24 EVP_PKEY *EVP_EC_gen(const char *curve);
71 EVP_EC_gen() generates a new EC key pair on the given I<curve>.
79 A new EC_KEY with no associated curve can be constructed by calling
86 A curve can be associated with the EC_KEY by calling
94 curve, the library context to be used I<ctx> (see L<OSSL_LIB_CTX(3)>) and any
98 See L<EC_GROUP_new(3)> for a description of curve names.
124 an EC_POINT on the curve calculated by multiplying the generator for the
125 curve by the private key.
H A DECPKParameters_print.pod6 encoding ASN1 representations of elliptic curve entities
25 B<EC_GROUP> structure, which represents a curve.
H A DEC_POINT_new.pod104 An B<EC_POINT> structure represents a point on a curve. A new point is
124 A valid point on a curve is the special point at infinity. A point is set to
129 coordinates for the point B<p> defined over the curve given in B<group>. The
160 point (x, y), for any given value for x such that the point is on the curve
184 The function EC_POINT_point2oct() encodes the given curve point B<p> as an
189 Similarly the function EC_POINT_oct2point() decodes a curve point into B<p> from
201 at infinity for a given curve is fixed to a single octet of value zero and that,
H A DEC_GFp_simple_method.pod33 When constructing a curve using EC_GROUP_new (see L<EC_GROUP_new(3)>) an
36 type for the form of curve selected is used.
/openssl/providers/common/der/
H A DECX.asn112 id-edwards-curve-algs OBJECT IDENTIFIER ::= { 1 3 101 }
14 id-X25519 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 110 }
15 id-X448 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 111 }
16 id-Ed25519 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 112 }
17 id-Ed448 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 113 }
/openssl/test/
H A Devp_pkey_dhkem_test.c45 TEST_note("Test %s %s Decapsulate", t->curve, in test_dhkem_encapsulate()
52 if (!TEST_ptr(spriv = new_raw_private_key(t->curve, in test_dhkem_encapsulate()
403 TEST_note("%s %s", t->curve, encap ? "Encap" : "Decap"); in test_nopublic()
438 TEST_note("%s %s", t->curve, encap ? "Encap" : "Decap"); in test_noauthpublic()
519 const char *curve; in test_ec_noikme() local
527 curve = dhkem_supported_curves[tstid]; in test_ec_noikme()
528 TEST_note("testing encap/decap of curve %s%s\n", curve, in test_ec_noikme()
531 if (curve[0] == 'X') { in test_ec_noikme()
572 static int do_ec_curve_failtest(const char *curve) in do_ec_curve_failtest() argument
609 TEST_note("%s %s", t->curve, encap ? "Encap" : "Decap"); in test_ec_badpublic()
[all …]
/openssl/crypto/ec/
H A Dec_asn1.c72 X9_62_CURVE *curve; member
317 if (!group || !curve || !curve->a || !curve->b) in ec_asn1_group2curve()
355 if (!curve->seed) in ec_asn1_group2curve()
367 ASN1_BIT_STRING_free(curve->seed); in ec_asn1_group2curve()
368 curve->seed = NULL; in ec_asn1_group2curve()
543 if (params->curve == NULL in EC_GROUP_new_from_ecparameters()
544 || params->curve->a == NULL || params->curve->a->data == NULL in EC_GROUP_new_from_ecparameters()
545 || params->curve->b == NULL || params->curve->b->data == NULL) { in EC_GROUP_new_from_ecparameters()
549 a = BN_bin2bn(params->curve->a->data, params->curve->a->length, NULL); in EC_GROUP_new_from_ecparameters()
554 b = BN_bin2bn(params->curve->b->data, params->curve->b->length, NULL); in EC_GROUP_new_from_ecparameters()
[all …]
H A Dec_curve.c3166 if (curve.data == NULL) in ec_group_new_from_data()
3168 curve.meth != NULL ? curve.meth() : NULL); in ec_group_new_from_data()
3175 data = curve.data; in ec_group_new_from_data()
3180 if (curve.meth != NULL) { in ec_group_new_from_data()
3181 meth = curve.meth(); in ec_group_new_from_data()
3228 EC_GROUP_set_curve_name(group, curve.nid); in ec_group_new_from_data()
3317 const ec_list_element *curve; in EC_GROUP_new_by_curve_name_ex() local
3319 if ((curve = ec_curve_nid2curve(nid)) == NULL in EC_GROUP_new_by_curve_name_ex()
3444 data = curve.data; in ossl_ec_curve_nid_from_params()
3452 && (nid <= 0 || nid == curve.nid) in ossl_ec_curve_nid_from_params()
[all …]
/openssl/doc/man7/
H A DEVP_PKEY-EC.pod15 The normal way of specifying domain parameters for an EC curve is via the
16 curve name "group". For curves with no curve name, explicit parameters can be
29 The curve name.
38 For a curve over Fp I<p> is the prime for the field. For a curve over F2^m I<p>
49 I<a> and I<b> represents the coefficients of the curve
63 The I<generator> is a well defined point on the curve chosen for cryptographic
69 I<order> multiplied by the I<cofactor> gives the number of points on the curve.
74 curve parameters. Set to 1 if so or 0 if a named curve was used.
80 EC curve's cofactor (note for some curves the cofactor is 1).
102 "named-nist" is similar but also checks that the named curve is a nist curve.
[all …]
H A DEVP_PKEY-SM2.pod12 an elliptic curve based algorithm. The current implementation in OpenSSL supports
62 parameters specify the SM2 elliptic curve.
H A DEVP_KEYEXCH-ECDH.pod62 the EC curve has a cofactor that is not 1, and the cofactor is not used.
75 L<EVP_PKEY-EC(7)/Examples> using the same curve name.
/openssl/test/recipes/30-test_evp_data/
H A Devppkey_ecdsa_sigalg.txt163 # Test that a nist curve with < 112 bits is allowed in fips mode for verifying
169 # Test that a nist curve with SHA3 is allowed in fips mode
176 # Test that a explicit curve that is a named curve is allowed in fips mode
184 # Test that a explicit curve is not allowed in fips mode
191 # Test that a curve with < 112 bits is not allowed in fips mode for signing
199 # Test that a non nist curve is not allowed in fips mode
H A Devppkey_ecdsa.txt164 # Test that a nist curve with < 112 bits is allowed in fips mode for verifying
170 # Test that a nist curve with SHA3 is allowed in fips mode
177 # Test that a explicit curve that is a named curve is allowed in fips mode
185 # Test that a explicit curve is not allowed in fips mode
192 # Test that a curve with < 112 bits is not allowed in fips mode for signing
200 # Test that a non nist curve is not allowed in fips mode
H A Devppkey_ecc.txt14 Title=c2pnb163v1 curve tests
92 Title=c2pnb163v2 curve tests
170 Title=c2pnb163v3 curve tests
248 Title=c2pnb176v1 curve tests
326 Title=c2pnb208w1 curve tests
406 Title=c2pnb272w1 curve tests
486 Title=c2pnb304w1 curve tests
566 Title=c2pnb368w1 curve tests
649 Title=c2tnb191v1 curve tests
729 Title=c2tnb191v2 curve tests
[all …]
H A Devppkey_brainpool.txt14 Title=brainpoolP160r1 curve tests
52 Title=brainpoolP160t1 curve tests
90 Title=brainpoolP192r1 curve tests
130 Title=brainpoolP192t1 curve tests
170 Title=brainpoolP224r1 curve tests
210 Title=brainpoolP224t1 curve tests
250 Title=brainpoolP256r1 curve tests
290 Title=brainpoolP256t1 curve tests
330 Title=brainpoolP320r1 curve tests
370 Title=brainpoolP320t1 curve tests
[all …]
/openssl/doc/man1/
H A Dopenssl-ecparam.pod.in79 Validate the elliptic curve parameters.
83 Validate the elliptic name curve parameters by checking if the curve parameters
97 This specifies how the points on the elliptic curve are converted
107 This specifies how the elliptic curve parameters are encoded.
H A Dopenssl-pkey.pod.in163 This option only applies to elliptic-curve based keys.
165 This specifies how the points on the elliptic curve are converted
175 This option only applies to elliptic curve based public and private keys.
177 This specifies how the elliptic curve parameters are encoded.
H A Dopenssl-ec.pod.in105 Print the elliptic curve parameters.
121 This specifies how the points on the elliptic curve are converted
131 This specifies how the elliptic curve parameters are encoded.
/openssl/providers/implementations/kem/
H A Dec_kem.c119 const char *curve = ec_curvename_get0(ec); in recipient_key_set() local
121 if (curve == NULL) in recipient_key_set()
123 ctx->info = ossl_HPKE_KEM_INFO_find_curve(curve); in recipient_key_set()
391 const char *curve = ec_curvename_get0(ec); in ossl_ec_dhkem_derive_private() local
394 if (curve == NULL) in ossl_ec_dhkem_derive_private()
397 info = ossl_HPKE_KEM_INFO_find_curve(curve); in ossl_ec_dhkem_derive_private()
/openssl/ssl/
H A Dt1_lib.c1638 cache[cache_idx].curve = NID_undef; in ssl_setup_sigalgs()
1947 && lu->curve != NID_undef in tls_check_sigalg_curve()
1948 && curve == lu->curve) in tls_check_sigalg_curve()
2076 int curve = ssl_get_EC_curve_nid(pkey); in tls12_check_peer_sigalg() local
2078 if (lu->curve != NID_undef && curve != lu->curve) { in tls12_check_peer_sigalg()
3843 int curve = -1; in find_sig_alg() local
3868 if (curve == -1) in find_sig_alg()
3869 curve = ssl_get_EC_curve_nid(tmppkey); in find_sig_alg()
3870 if (lu->curve != NID_undef && curve != lu->curve) in find_sig_alg()
3924 int curve = -1; in tls_choose_sigalg() local
[all …]
/openssl/include/internal/
H A Dhpke_util.h63 const OSSL_HPKE_KEM_INFO *ossl_HPKE_KEM_INFO_find_curve(const char *curve);

Completed in 158 milliseconds

123