/openssl/crypto/ec/ |
H A D | ecdsa_ossl.c | 140 const BIGNUM *order; in ecdsa_sign_setup() local 186 order_bits = BN_num_bits(order); in ecdsa_sign_setup() 232 if (!BN_nnmod(r, X, order, ctx)) { in ecdsa_sign_setup() 277 const BIGNUM *order, *ckinv; in ossl_ecdsa_simple_sign_sig() local 324 i = BN_num_bits(order); in ossl_ecdsa_simple_sign_sig() 449 const BIGNUM *order; in ossl_ecdsa_simple_verify_sig() local 482 order = EC_GROUP_get0_order(group); in ossl_ecdsa_simple_verify_sig() 483 if (order == NULL) { in ossl_ecdsa_simple_verify_sig() 501 i = BN_num_bits(order); in ossl_ecdsa_simple_verify_sig() 517 if (!BN_mod_mul(u1, m, u2, order, ctx)) { in ossl_ecdsa_simple_verify_sig() [all …]
|
H A D | ec_check.c | 56 const BIGNUM *order; in EC_GROUP_check() 96 order = EC_GROUP_get0_order(group); in EC_GROUP_check() 97 if (order == NULL) in EC_GROUP_check() 99 if (BN_is_zero(order)) { in EC_GROUP_check() 104 if (!EC_POINT_mul(group, point, order, NULL, NULL, ctx)) in EC_GROUP_check()
|
H A D | ec_lib.c | 55 ret->order = BN_new(); in ossl_ec_group_new_ex() 56 if (ret->order == NULL) in ossl_ec_group_new_ex() 69 BN_free(ret->order); in ossl_ec_group_new_ex() 133 BN_free(group->order); in EC_GROUP_free() 242 if (!BN_copy(dest->order, src->order)) in EC_GROUP_copy() 386 if (order == NULL || BN_is_zero(order) || BN_is_negative(order) in EC_GROUP_set_generator() 410 if (!BN_copy(group->order, order)) in EC_GROUP_set_generator() 450 if (!BN_copy(order, group->order)) in EC_GROUP_get_order() 458 return group->order; in EC_GROUP_get0_order() 1597 if (order == NULL) { in EC_GROUP_new_from_params() [all …]
|
H A D | ec_key.c | 307 BIGNUM *order = NULL; in ec_generate_key() local 344 order = BN_new(); in ec_generate_key() 345 if (order == NULL || !BN_sub(order, tmp, BN_value_one())) in ec_generate_key() 348 order = BN_dup(tmp); in ec_generate_key() 349 if (order == NULL) in ec_generate_key() 401 BN_free(order); in ec_generate_key() 565 const BIGNUM *order = NULL; in ossl_ec_key_public_check() local 580 order = eckey->group->order; in ossl_ec_key_public_check() 581 if (BN_is_zero(order)) { in ossl_ec_key_public_check() 793 const BIGNUM *order = NULL; in EC_KEY_set_private_key() local [all …]
|
H A D | eck_prn.c | 77 const BIGNUM *order = NULL, *cofactor = NULL; in ECPKParameters_print() local 143 order = EC_GROUP_get0_order(x); in ECPKParameters_print() 145 if (order == NULL) { in ECPKParameters_print() 205 if ((order != NULL) && !ASN1_bn_print(bp, "Order: ", order, NULL, off)) in ECPKParameters_print()
|
H A D | ec_mult.c | 155 if (BN_is_zero(group->order)) { in ossl_ec_scalar_mul_ladder() 196 if (!BN_mul(cardinality, group->order, group->cofactor, ctx)) { in ossl_ec_scalar_mul_ladder() 432 if (!BN_is_zero(group->order) && !BN_is_zero(group->cofactor)) { in ossl_ec_wNAF_mul() 438 if ((scalar != group->order) && (scalar != NULL) && (num == 0)) { in ossl_ec_wNAF_mul() 449 if ((scalar == NULL) && (num == 1) && (scalars[0] != group->order)) { in ossl_ec_wNAF_mul() 823 const BIGNUM *order; in ossl_ec_wNAF_precompute_mult() local 854 order = EC_GROUP_get0_order(group); in ossl_ec_wNAF_precompute_mult() 855 if (order == NULL) in ossl_ec_wNAF_precompute_mult() 857 if (BN_is_zero(order)) { in ossl_ec_wNAF_precompute_mult() 862 bits = BN_num_bits(order); in ossl_ec_wNAF_precompute_mult()
|
H A D | ec_backend.c | 211 const BIGNUM *order = EC_GROUP_get0_order(group); in ec_group_explicit_todata() local 213 if (order == NULL) { in ec_group_explicit_todata() 218 order)) { in ec_group_explicit_todata() 430 const BIGNUM *order; in ossl_ec_key_fromdata() local 465 order = EC_GROUP_get0_order(ecg); in ossl_ec_key_fromdata() 466 if (order == NULL || BN_is_zero(order)) in ossl_ec_key_fromdata() 469 fixed_words = bn_get_top(order) + 2; in ossl_ec_key_fromdata()
|
H A D | ecp_nistz256.c | 645 if (!BN_nnmod(mod, scalar[i], group->order, ctx)) { in ecp_nistz256_windowed_mul() 810 const BIGNUM *order; in ecp_nistz256_mult_precompute() local 848 order = EC_GROUP_get0_order(group); in ecp_nistz256_mult_precompute() 849 if (order == NULL) in ecp_nistz256_mult_precompute() 852 if (BN_is_zero(order)) { in ecp_nistz256_mult_precompute() 1021 if (!BN_nnmod(tmp_scalar, scalar, group->order, ctx)) { in ecp_nistz256_points_mul() 1315 || !BN_nnmod(tmp, x, group->order, ctx)) { in ecp_nistz256_inv_mod_ord() 1458 *order = NULL; in ecp_nistz256group_full_init() local 1540 if (!BN_copy(group->order, order)) in ecp_nistz256group_full_init() 1548 if (!ossl_bn_mont_ctx_set(ordmont, order, 256, params + 7 * param_len, in ecp_nistz256group_full_init() [all …]
|
H A D | ec_asn1.c | 74 ASN1_INTEGER *order; member 151 ASN1_SIMPLE(ECPARAMETERS, order, ASN1_INTEGER), 441 ret->order = BN_to_ASN1_INTEGER(tmp, orig = ret->order); in EC_GROUP_get_ecparameters() 442 if (ret->order == NULL) { in EC_GROUP_get_ecparameters() 443 ret->order = orig; in EC_GROUP_get_ecparameters() 706 if (params->order == NULL in EC_GROUP_new_from_ecparameters() 729 if (ASN1_INTEGER_to_BN(params->order, a) == NULL) { in EC_GROUP_new_from_ecparameters()
|
/openssl/crypto/objects/ |
H A D | objects.pl | 33 { die "$ARGV[1]:$o:There's already an object with NID ",$mynum," on line ",$order{$mynum},"\n"; } 35 …{ die "$ARGV[1]:$o:There's already an object with name ",$Cname," on line ",$order{$nid{$Cname}},"… 38 $order{$mynum} = $o; 67 $order{$Cname} = $o; 93 …ere's already an object with long name ",$ln{$module.$Cname}," on line ",$order{$module.$Cname},"\… 100 …re's already an object with short name ",$sn{$module.$Cname}," on line ",$order{$module.$Cname},"\… 109 …ere's already an object with long name ",$ln{$module.$Cname}," on line ",$order{$module.$Cname},"\… 115 $order{$Cname} = $o;
|
/openssl/crypto/sm2/ |
H A D | sm2_key.c | 27 const BIGNUM *priv_key = NULL, *order = NULL; in ossl_sm2_key_private_check() local 32 || (order = EC_GROUP_get0_order(group)) == NULL) { in ossl_sm2_key_private_check() 38 max = BN_dup(order); in ossl_sm2_key_private_check()
|
H A D | sm2_sign.c | 211 const BIGNUM *order = EC_GROUP_get0_order(group); in sm2_sig_gen() local 266 if (!BN_priv_rand_range_ex(k, order, 0, ctx)) { in sm2_sig_gen() 274 || !BN_mod_add(r, e, x1, order, ctx)) { in sm2_sig_gen() 288 if (BN_cmp(rk, order) == 0) in sm2_sig_gen() 293 || !BN_mod_mul(tmp, dA, r, order, ctx) in sm2_sig_gen() 295 || !BN_mod_mul(s, s, tmp, order, ctx)) { in sm2_sig_gen() 331 const BIGNUM *order = EC_GROUP_get0_order(group); in sm2_sig_verify() local 373 || BN_cmp(order, r) <= 0 in sm2_sig_verify() 374 || BN_cmp(order, s) <= 0) { in sm2_sig_verify() 379 if (!BN_mod_add(t, r, s, order, ctx)) { in sm2_sig_verify() [all …]
|
/openssl/test/ |
H A D | priority_queue_test.c | 51 static int test_size_t_priority_queue_int(int reserve, int order, int count, in test_size_t_priority_queue_int() argument 61 count, orders[order], reserve ? "reserve" : "grow", in test_size_t_priority_queue_int() 77 if (order == 1) in test_size_t_priority_queue_int() 79 else if (order == 2) in test_size_t_priority_queue_int() 135 int reserve, order, count, remove, random, popfree; in test_size_t_priority_queue() local 139 order = n % 3; in test_size_t_priority_queue() 150 return test_size_t_priority_queue_int(reserve, order, count, remove, in test_size_t_priority_queue()
|
H A D | sm2_internal_test.c | 86 BIGNUM *order = NULL; in create_EC_group() local 111 if (!TEST_true(BN_hex2bn(&order, order_hex)) in create_EC_group() 113 || !TEST_true(EC_GROUP_set_generator(group, generator, order, cof))) in create_EC_group() 124 BN_free(order); in create_EC_group()
|
H A D | ectest.c | 41 BIGNUM *n1 = NULL, *n2 = NULL, *order = NULL; in group_order_tests() local 49 || !TEST_ptr(order = BN_new()) in group_order_tests() 70 || !TEST_true(BN_sub(n1, order, n1)) in group_order_tests() 91 || !TEST_true(BN_sub(n1, n1, order)) in group_order_tests() 154 BN_free(order); in group_order_tests() 617 const char *order; member 824 || !TEST_true(BN_hex2bn(&z, test->order)) in char2_curve_test() 844 || !TEST_true(BN_hex2bn(&z, test->order)) in char2_curve_test() 1332 || !TEST_ptr(order = BN_new()) in nistp_single_test() 1359 || !TEST_true(BN_hex2bn(&order, test->order)) in nistp_single_test() [all …]
|
H A D | README.md | 159 variable which additionally randomises the order tests are run in (see below). 170 By default, the test harness will execute tests in the order they were added. 176 tests in the same order and will also seed the test random number generator. 184 To run the tests using the order defined by the random seed `42`:
|
/openssl/doc/man3/ |
H A D | SSL_CTX_set1_cert_comp_preference.pod | 45 algorithms in B<algs> are ignored. On an error, the preference order is left 60 The above is also the default preference order. If a preference order is not 61 specified, then the default preference order is sent to the peer and the 62 received peer's preference order will be used when compressing a certificate. 63 Otherwise, the configured preference order is sent to the peer and is used 64 to filter the peer's preference order. 90 preference order is used to determine what algorithm to use when sending a
|
H A D | SSL_CTX_set1_curves.pod | 57 extension. The extension's preference order, to be evaluated by the server, is 58 determined by the order of the elements in the array. 61 B<SSL_OP_CIPHER_SERVER_PREFERENCE> is set, the order of the elements in the 62 array determines the selected group. Otherwise, the order is ignored and the 63 client's order determines the selection. 71 preference order. If an application uses an external provider to extend OpenSSL 98 order. It can return zero if the client did not send a supported groups 104 is populated with the host-byte-order representation of the uint16_t group 105 identifiers, as assigned by IANA. The group list is returned in the same order 175 Earlier versions of this document described the list as a preference order.
|
H A D | EC_GROUP_copy.pod | 27 const BIGNUM *order, const BIGNUM *cofactor); 30 int EC_GROUP_get_order(const EC_GROUP *group, BIGNUM *order, BN_CTX *ctx); 84 parameters include the B<generator>, the B<order> and the B<cofactor>. The B<generator> is a well d… 86 n-1 where n is the B<order>. The B<order> multiplied by the B<cofactor> gives the number of points … 90 EC_GROUP_get_order() retrieves the order of B<group> and copies its value into 91 B<order>. It fails in case B<group> is not fully initialized (i.e., its order 165 the correct order. For the OpenSSL FIPS provider it uses EC_GROUP_check_named_curve() to conform to… 205 EC_GROUP_get_order() returns 0 if the order is not set (or set to zero) for 206 B<group> or if copying into B<order> fails, 1 otherwise. 224 EC_GROUP_get0_order() returns an internal pointer to the group order. [all …]
|
H A D | BIO_ADDR.pod | 56 size B<wherelen> with an address in network byte order pointed at 57 by B<where> and a port number in network byte order in B<port> (except 76 order, most significant byte first. 83 The raw port will be in network byte order. 107 network byte order address of a specific site. Internally, those are
|
H A D | SSL_CTX_set_client_hello_cb.pod | 68 holding the numerical value of the TLS extension types in the order they appear 77 with the ExtensionType values in the order that the corresponding extensions 92 by the client in order to select an appropriate certificate to present, 100 not use a servername callback, in order to avoid unexpected behavior that 101 occurs due to the relative order of processing between things like session
|
/openssl/dev/ |
H A D | NEWS-FORMAT.md | 21 descending order of importance. Equally, list items within a block should be 22 listed in descending order of significance or severity. 60 <one or more blocks listed below as applicable, in order shown below> 134 List features in descending order of significance (approximately). 196 List CVE mitigations first in descending order of severity, followed by bugs in 197 (very rough) descending order of severity.
|
/openssl/providers/implementations/kem/ |
H A D | ec_kem.c | 84 const BIGNUM *order = EC_GROUP_get0_order(group); in eckey_check() local 89 if (order != NULL && rem != NULL && bnctx != NULL) { in eckey_check() 90 rv = BN_mod(rem, priv, order, bnctx) in eckey_check() 389 const BIGNUM *order; in ossl_ec_dhkem_derive_private() local 423 order = EC_GROUP_get0_order(EC_KEY_get0_group(ec)); in ossl_ec_dhkem_derive_private() 439 } while (BN_is_zero(priv) || BN_cmp(priv, order) >= 0); in ossl_ec_dhkem_derive_private()
|
/openssl/crypto/ec/curve448/ |
H A D | eddsa.c | 300 static const uint8_t order[] = { in ossl_c448_ed448_verify() local 316 if (signature[i + EDDSA_448_PUBLIC_BYTES] > order[i]) in ossl_c448_ed448_verify() 318 if (signature[i + EDDSA_448_PUBLIC_BYTES] < order[i]) in ossl_c448_ed448_verify()
|
/openssl/test/ssl-tests/ |
H A D | 28-seclevel.cnf.in | 38 # Because of the config order, the certificate is first loaded, and 40 # the order will be reversed and it will instead fail to load the key.
|