/freebsd/crypto/libecc/include/libecc/ |
H A D | meson.build | 20 'curves/aff_pt.h', 21 'curves/ec_shortw.h', 22 'curves/prj_pt.h', 23 'curves/ec_edwards.h', 24 'curves/known/ec_params_bign384v1.h', 25 'curves/known/ec_params_brainpoolp224t1.h', 26 'curves/known/ec_params_external.h', 27 'curves/known/ec_params_gost_R3410_2001_CryptoPro_A_ParamSet.h', 28 'curves/known/ec_params_brainpoolp192t1.h', 29 'curves/known/ec_params_sm2p256v1.h', [all …]
|
H A D | libec.h | 22 #include <libecc/curves/curves.h> 23 #include <libecc/curves/curves_list.h> 24 #include <libecc/curves/ec_shortw.h> 25 #include <libecc/curves/prj_pt.h> 26 #include <libecc/curves/aff_pt.h>
|
H A D | lib_ecc_config.h | 21 * what will be built in the library (supported curves, hash 27 * this is done, it is expected that the user defines the curves, 37 /* Supported curves */ 82 /* ADD curves define here */
|
/freebsd/crypto/libecc/include/libecc/curves/ |
H A D | curves_list.h | 22 #include <libecc/curves/known/ec_params_brainpoolp192r1.h> 23 #include <libecc/curves/known/ec_params_brainpoolp224r1.h> 24 #include <libecc/curves/known/ec_params_brainpoolp256r1.h> 25 #include <libecc/curves/known/ec_params_brainpoolp384r1.h> 26 #include <libecc/curves/known/ec_params_brainpoolp512r1.h> 27 #include <libecc/curves/known/ec_params_secp192r1.h> 28 #include <libecc/curves/known/ec_params_secp224r1.h> 29 #include <libecc/curves/known/ec_params_secp256r1.h> 30 #include <libecc/curves/known/ec_params_secp384r1.h> 31 #include <libecc/curves/known/ec_params_secp521r1.h> [all …]
|
H A D | ec_params.h | 19 #include <libecc/curves/prj_pt.h> 20 #include <libecc/curves/known/ec_params_external.h> 24 * through preprocessing of the curves at compile time. 26 #include <libecc/curves/curves_list.h> 27 /* These default sizes should be enough for the known curves */ 47 * Elliptic curves parameters. We only support 48 * curves defined on prime fields (i.e. Fp, 72 /* Optional transfer coefficients with Montgomery curves */ 75 /* Optional transfer coefficient with Edwards curves */
|
H A D | aff_pt.h | 21 #include <libecc/curves/ec_shortw.h> 22 #include <libecc/curves/ec_montgomery.h> 23 #include <libecc/curves/ec_edwards.h> 53 /*** Edwards curves related ***/ 94 /*** Montgomery curves related ***/
|
/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 14-curves.cnf.in | 15 my @curves = ("prime256v1", "secp384r1", "secp521r1"); 19 push @curves, @curves_no_fips if !$fips_mode; 21 #Curves *only* suitable for use in TLSv1.3 25 push @curves, @curves_tls_1_3; 55 foreach (0..$#curves) { 56 my $curve = $curves[$_]; 60 "Curves" => $curve, 66 "Curves" => $curve 80 "Curves" => $curve, 86 "Curves" [all...] |
H A D | 14-curves.cnf | 112 Curves = prime256v1 118 Curves = prime256v1 141 Curves = secp384r1 147 Curves = secp384r1 170 Curves = secp521r1 176 Curves = secp521r1 199 Curves = X25519 205 Curves = X25519 228 Curves = X448 234 Curves = X448 [all …]
|
/freebsd/crypto/libecc/scripts/ |
H A D | test_ec_utils.sh | 26 curves=("FRP256V1" "SECP192R1" "SECP224R1" "SECP256R1" "SECP384R1" "SECP521R1" "BRAINPOOLP192R1" "B… 30 for c in "${!curves[@]}" 35 # NOTE: EDDSA family only accepts WEI curves 38 if [[ "${curves[c]}" != "WEI25519" ]] 45 if [[ "${curves[c]}" != "WEI448" ]] 50 echo "===== ${curves[c]} ${signatures[s]}" 51 $EC_UTILS gen_keys ${curves[c]} ${signatures[s]} test_key || exit 0 68 echo "========= TESTING ${curves[c]} ${signatures[s]} ${hashes[h]}" 70 …$EC_UTILS sign ${curves[c]} ${signatures[s]} ${hashes[h]} $EC_UTILS test_key_private_key.bin signe… 72 …$EC_UTILS verify ${curves[c]} ${signatures[s]} ${hashes[h]} $EC_UTILS test_key_public_key.bin sign… [all …]
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | ec_support.c | 21 /* prime field curves */ 22 /* secg curves */ 36 /* X9.62 curves */ 44 /* characteristic two field curves */ 45 /* NIST/SECG curves */ 64 /* X9.62 curves */ 82 * the WAP/WTLS curves [unlike SECG, spec has its own OIDs for curves 96 /* IPSec curves */ 99 /* brainpool curves */
|
/freebsd/crypto/libecc/ |
H A D | README.md | 28 This software implements a library for elliptic curves based 31 …ature algorithms as well as ECDH primitives, with the following specific curves and hash functions: 44 …* **Curves**: SECP{192,224,256,384,521}R1, SECP{192,224,256}K1, BRAINPOOLP{192,224,256,320,384,512… 46 user defined curves using a standalone helper script. 68 Since the core of the library supports short Weierstrass curves, and as 69 EdDSA uses instead Twisted Edwards curves with dedicated formulas, we use 72 curves models, allowing to implement operations on one model by operating with 75 and Curve25519 (Montgomery) curves. This, of course, induces overheads in computations 118 library. Classical ECDH over Weierstrass curves is implemented in the form 120 …v. 3](https://csrc.nist.gov/publications/detail/sp/800-56a/rev-3/final) standard. Montgomery curves [all …]
|
H A D | meson.options | 21 # about curves 28 # All the curves options 74 # ADD curves meson option here 79 value: [], description: 'enable a set of curves when override is set')
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EC_GROUP_new.pod | 90 B<irreducible polynomial>. All such curves with OpenSSL use a trinomial or a 138 above, there are also a number of predefined curves that are available. In order 139 to obtain a list of all of the predefined curves, call the function 142 I<r> array with information about the built-in curves. If I<nitems> is less than 143 the total number of curves available, then the first I<nitems> curves will be 144 returned. Otherwise the total number of curves will be provided. The return 145 value is the total number of curves available (whether that number has been 147 do nothing other than return the total number of curves available. 185 EC_get_builtin_curves() returns the number of built-in curves that are
|
H A D | EC_GROUP_copy.pod | 147 built-in curves within the library provide seed values that can be obtained. It is also possible to… 159 … the discriminant is given by the formula 4*a^3 + 27*b^2 whilst for F2^m curves the discriminant is 167 …() determines if the group's domain parameters match one of the built-in curves supported by the l… 170 … lookup the name of the curve that matches the group domain parameters. The built-in curves contain 171 aliases, so that multiple NID's can map to the same domain parameters. For such curves it is unspec… 173 …nist_only> is 1 it will only look for NIST approved curves, otherwise it searches all built-in cur… 179 …C_GROUP_get_trinomial_basis() and EC_GROUP_get_pentanomial_basis() should only be called for curves 218 EC_GROUP_get_field_type() returns either B<NID_X9_62_prime_field> for prime curves 219 or B<NID_X9_62_characteristic_two_field> for binary curves; 227 …eturns an internal pointer to the group field. For curves over GF(p), this is the modulus; for cur… [all …]
|
H A D | EC_GFp_simple_method.pod | 38 For F2^m curves there is only one implementation choice, i.e. EC_GF2_simple_method. 40 For Fp curves the lowest common denominator implementation is the EC_GFp_simple_method implementati… 43 offers an implementation optimised for use with NIST recommended curves (NIST curves are available … 47 optimised implementations for the NIST P224, P256 and P521 curves respectively. Note, however, that…
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | EC_GROUP_new.3 | 227 \&\fBirreducible polynomial\fR. All such curves with OpenSSL use a trinomial or a 275 above, there are also a number of predefined curves that are available. In order 276 to obtain a list of all of the predefined curves, call the function 279 \&\fIr\fR array with information about the built-in curves. If \fInitems\fR is less than 280 the total number of curves available, then the first \fInitems\fR curves will be 281 returned. Otherwise the total number of curves will be provided. The return 282 value is the total number of curves available (whether that number has been 284 do nothing other than return the total number of curves available. 323 \&\fBEC_get_builtin_curves()\fR returns the number of built-in curves that are
|
H A D | EC_GROUP_copy.3 | 286 built-in curves within the library provide seed values that can be obtained. It is also possible to… 298 … the discriminant is given by the formula 4*a^3 + 27*b^2 whilst for F2^m curves the discriminant is 306 …fR determines if the group's domain parameters match one of the built-in curves supported by the l… 309 … lookup the name of the curve that matches the group domain parameters. The built-in curves contain 310 aliases, so that multiple \s-1NID\s0's can map to the same domain parameters. For such curves it is… 312 …\fR is 1 it will only look for \s-1NIST\s0 approved curves, otherwise it searches all built-in cur… 318 …et_trinomial_basis()\fR and \fBEC_GROUP_get_pentanomial_basis()\fR should only be called for curves 356 \&\fBEC_GROUP_get_field_type()\fR returns either \fBNID_X9_62_prime_field\fR for prime curves 357 or \fBNID_X9_62_characteristic_two_field\fR for binary curves; 365 …rns an internal pointer to the group field. For curves over \s-1GF\s0(p), this is the modulus; for… [all …]
|
H A D | EC_GFp_simple_method.3 | 174 For F2^m curves there is only one implementation choice, i.e. EC_GF2_simple_method. 176 For Fp curves the lowest common denominator implementation is the EC_GFp_simple_method implementati… 179 offers an implementation optimised for use with \s-1NIST\s0 recommended curves (\s-1NIST\s0 curves … 183 optimised implementations for the \s-1NIST P224, P256\s0 and P521 curves respectively. Note, howeve…
|
/freebsd/crypto/openssl/apps/ |
H A D | ecparam.c | 71 EC_builtin_curve *curves = NULL; in list_builtin_curves() local 74 curves = app_malloc((int)sizeof(*curves) * crv_len, "list curves"); in list_builtin_curves() 75 if (!EC_get_builtin_curves(curves, crv_len)) in list_builtin_curves() 79 const char *comment = curves[n].comment; in list_builtin_curves() 80 const char *sname = OBJ_nid2sn(curves[n].nid); in list_builtin_curves() 92 OPENSSL_free(curves); in list_builtin_curves() 313 * for named curves. This can be achieved using: in ecparam_main()
|
/freebsd/crypto/openssl/test/ |
H A D | ecdsatest.c | 32 static EC_builtin_curve *curves = NULL; variable 101 return TEST_skip("skip non approved curves"); in x9_62_tests() 199 nid = curves[n].nid; in test_builtin() 201 /* skip built-in curves where ord(G) is not prime */ in test_builtin() 208 * skip SM2 curve if 'as' is equal to EVP_PKEY_EC or, skip all curves in test_builtin() 394 TEST_note("Elliptic curves are disabled."); in cleanup_tests() 400 /* get a list of all internal curves */ 402 if (!TEST_ptr(curves = OPENSSL_malloc(sizeof(*curves) * crv_len)) 403 || !TEST_true(EC_get_builtin_curves(curves, crv_le [all...] |
/freebsd/crypto/openssl/test/recipes/ |
H A D | 70-test_tls13hrr.t | 49 $proxy->serverflags("-curves ffdhe3072"); 51 $proxy->serverflags("-curves P-256"); 62 $proxy->serverflags("-curves ffdhe3072"); 64 $proxy->serverflags("-curves P-256"); 76 $proxy->serverflags("-curves ffdhe3072"); 78 $proxy->serverflags("-curves P-256");
|
H A D | 70-test_tls13cookie.t | 49 $proxy->serverflags("-curves X25519") if !disabled("ec"); 64 $proxy->clientflags("-curves ffdhe3072:ffdhe2048"); 65 $proxy->serverflags("-curves ffdhe2048"); 67 $proxy->clientflags("-curves P-256:X25519"); 68 $proxy->serverflags("-curves X25519");
|
H A D | 70-test_tls13psk.t | 69 $proxy->serverflags("-curves ffdhe3072"); 71 $proxy->serverflags("-curves P-256"); 88 $proxy->serverflags("-curves ffdhe3072"); 90 $proxy->serverflags("-curves P-256");
|
/freebsd/crypto/libecc/src/examples/basic/ |
H A D | curve_ecdh.c | 64 * all our curves). 73 * all our curves). 239 /* Traverse all the possible curves we have at our disposal (known curves and in main() 240 * user defined curves). in main() 245 /* All our possible curves are in ../curves/curves_list.h in main()
|
/freebsd/contrib/bearssl/src/ssl/ |
H A D | ssl_hs_client.t0 | 394 \ Length of Supported Curves extension. 395 : ext-supported-curves-length ( -- len ) 396 supported-curves dup if 407 supported-curves if 6 else 0 then ; 432 ext-supported-curves-length + ext-point-format-length + 517 \ TODO: add an API to specify preference order for curves. 518 \ Right now we send Curve25519 first, then other curves in 520 ext-supported-curves-length dup if 524 supported-curves 0 714 ext-supported-curves-length { ok-curves } [all …]
|