Home
last modified time | relevance | path

Searched full:curves (Results 1 – 25 of 273) sorted by relevance

1234567891011

/freebsd/crypto/libecc/include/libecc/
H A Dmeson.build20 'curves/aff_pt.h',
21 'curves/ec_shortw.h',
22 'curves/prj_pt.h',
23 'curves/ec_edwards.h',
24 'curves/known/ec_params_bign384v1.h',
25 'curves/known/ec_params_brainpoolp224t1.h',
26 'curves/known/ec_params_external.h',
27 'curves/known/ec_params_gost_R3410_2001_CryptoPro_A_ParamSet.h',
28 'curves/known/ec_params_brainpoolp192t1.h',
29 'curves/known/ec_params_sm2p256v1.h',
[all …]
H A Dlibec.h22 #include <libecc/curves/curves.h>
23 #include <libecc/curves/curves_list.h>
24 #include <libecc/curves/ec_shortw.h>
25 #include <libecc/curves/prj_pt.h>
26 #include <libecc/curves/aff_pt.h>
H A Dlib_ecc_config.h21 * what will be built in the library (supported curves, hash
27 * this is done, it is expected that the user defines the curves,
37 /* Supported curves */
82 /* ADD curves define here */
/freebsd/crypto/libecc/include/libecc/curves/
H A Dcurves_list.h22 #include <libecc/curves/known/ec_params_brainpoolp192r1.h>
23 #include <libecc/curves/known/ec_params_brainpoolp224r1.h>
24 #include <libecc/curves/known/ec_params_brainpoolp256r1.h>
25 #include <libecc/curves/known/ec_params_brainpoolp384r1.h>
26 #include <libecc/curves/known/ec_params_brainpoolp512r1.h>
27 #include <libecc/curves/known/ec_params_secp192r1.h>
28 #include <libecc/curves/known/ec_params_secp224r1.h>
29 #include <libecc/curves/known/ec_params_secp256r1.h>
30 #include <libecc/curves/known/ec_params_secp384r1.h>
31 #include <libecc/curves/known/ec_params_secp521r1.h>
[all …]
H A Dec_params.h19 #include <libecc/curves/prj_pt.h>
20 #include <libecc/curves/known/ec_params_external.h>
24 * through preprocessing of the curves at compile time.
26 #include <libecc/curves/curves_list.h>
27 /* These default sizes should be enough for the known curves */
47 * Elliptic curves parameters. We only support
48 * curves defined on prime fields (i.e. Fp,
72 /* Optional transfer coefficients with Montgomery curves */
75 /* Optional transfer coefficient with Edwards curves */
H A Daff_pt.h21 #include <libecc/curves/ec_shortw.h>
22 #include <libecc/curves/ec_montgomery.h>
23 #include <libecc/curves/ec_edwards.h>
53 /*** Edwards curves related ***/
94 /*** Montgomery curves related ***/
/freebsd/crypto/openssl/test/ssl-tests/
H A D14-curves.cnf.in15 my @curves = ("prime256v1", "secp384r1", "secp521r1");
19 push @curves, @curves_no_fips if !$fips_mode;
21 #Curves *only* suitable for use in TLSv1.3
25 push @curves, @curves_tls_1_3;
55 foreach (0..$#curves) {
56 my $curve = $curves[$_];
60 "Curves" => $curve,
66 "Curves" => $curve
80 "Curves" => $curve,
86 "Curves"
[all...]
H A D14-curves.cnf112 Curves = prime256v1
118 Curves = prime256v1
141 Curves = secp384r1
147 Curves = secp384r1
170 Curves = secp521r1
176 Curves = secp521r1
199 Curves = X25519
205 Curves = X25519
228 Curves = X448
234 Curves = X448
[all …]
/freebsd/crypto/libecc/scripts/
H A Dtest_ec_utils.sh26 curves=("FRP256V1" "SECP192R1" "SECP224R1" "SECP256R1" "SECP384R1" "SECP521R1" "BRAINPOOLP192R1" "B…
30 for c in "${!curves[@]}"
35 # NOTE: EDDSA family only accepts WEI curves
38 if [[ "${curves[c]}" != "WEI25519" ]]
45 if [[ "${curves[c]}" != "WEI448" ]]
50 echo "===== ${curves[c]} ${signatures[s]}"
51 $EC_UTILS gen_keys ${curves[c]} ${signatures[s]} test_key || exit 0
68 echo "========= TESTING ${curves[c]} ${signatures[s]} ${hashes[h]}"
70 …$EC_UTILS sign ${curves[c]} ${signatures[s]} ${hashes[h]} $EC_UTILS test_key_private_key.bin signe…
72 …$EC_UTILS verify ${curves[c]} ${signatures[s]} ${hashes[h]} $EC_UTILS test_key_public_key.bin sign…
[all …]
/freebsd/crypto/openssl/crypto/evp/
H A Dec_support.c21 /* prime field curves */
22 /* secg curves */
36 /* X9.62 curves */
44 /* characteristic two field curves */
45 /* NIST/SECG curves */
64 /* X9.62 curves */
82 * the WAP/WTLS curves [unlike SECG, spec has its own OIDs for curves
96 /* IPSec curves */
99 /* brainpool curves */
/freebsd/crypto/libecc/
H A DREADME.md28 This software implements a library for elliptic curves based
31 …ature algorithms as well as ECDH primitives, with the following specific curves and hash functions:
44 …* **Curves**: SECP{192,224,256,384,521}R1, SECP{192,224,256}K1, BRAINPOOLP{192,224,256,320,384,512…
46 user defined curves using a standalone helper script.
68 Since the core of the library supports short Weierstrass curves, and as
69 EdDSA uses instead Twisted Edwards curves with dedicated formulas, we use
72 curves models, allowing to implement operations on one model by operating with
75 and Curve25519 (Montgomery) curves. This, of course, induces overheads in computations
118 library. Classical ECDH over Weierstrass curves is implemented in the form
120 …v. 3](https://csrc.nist.gov/publications/detail/sp/800-56a/rev-3/final) standard. Montgomery curves
[all …]
H A Dmeson.options21 # about curves
28 # All the curves options
74 # ADD curves meson option here
79 value: [], description: 'enable a set of curves when override is set')
/freebsd/crypto/openssl/doc/man3/
H A DEC_GROUP_new.pod90 B<irreducible polynomial>. All such curves with OpenSSL use a trinomial or a
138 above, there are also a number of predefined curves that are available. In order
139 to obtain a list of all of the predefined curves, call the function
142 I<r> array with information about the built-in curves. If I<nitems> is less than
143 the total number of curves available, then the first I<nitems> curves will be
144 returned. Otherwise the total number of curves will be provided. The return
145 value is the total number of curves available (whether that number has been
147 do nothing other than return the total number of curves available.
185 EC_get_builtin_curves() returns the number of built-in curves that are
H A DEC_GROUP_copy.pod147 built-in curves within the library provide seed values that can be obtained. It is also possible to…
159 … the discriminant is given by the formula 4*a^3 + 27*b^2 whilst for F2^m curves the discriminant is
167 …() determines if the group's domain parameters match one of the built-in curves supported by the l…
170 … lookup the name of the curve that matches the group domain parameters. The built-in curves contain
171 aliases, so that multiple NID's can map to the same domain parameters. For such curves it is unspec…
173 …nist_only> is 1 it will only look for NIST approved curves, otherwise it searches all built-in cur…
179 …C_GROUP_get_trinomial_basis() and EC_GROUP_get_pentanomial_basis() should only be called for curves
218 EC_GROUP_get_field_type() returns either B<NID_X9_62_prime_field> for prime curves
219 or B<NID_X9_62_characteristic_two_field> for binary curves;
227 …eturns an internal pointer to the group field. For curves over GF(p), this is the modulus; for cur…
[all …]
H A DEC_GFp_simple_method.pod38 For F2^m curves there is only one implementation choice, i.e. EC_GF2_simple_method.
40 For Fp curves the lowest common denominator implementation is the EC_GFp_simple_method implementati…
43 offers an implementation optimised for use with NIST recommended curves (NIST curves are available …
47 optimised implementations for the NIST P224, P256 and P521 curves respectively. Note, however, that…
/freebsd/secure/lib/libcrypto/man/man3/
H A DEC_GROUP_new.3227 \&\fBirreducible polynomial\fR. All such curves with OpenSSL use a trinomial or a
275 above, there are also a number of predefined curves that are available. In order
276 to obtain a list of all of the predefined curves, call the function
279 \&\fIr\fR array with information about the built-in curves. If \fInitems\fR is less than
280 the total number of curves available, then the first \fInitems\fR curves will be
281 returned. Otherwise the total number of curves will be provided. The return
282 value is the total number of curves available (whether that number has been
284 do nothing other than return the total number of curves available.
323 \&\fBEC_get_builtin_curves()\fR returns the number of built-in curves that are
H A DEC_GROUP_copy.3286 built-in curves within the library provide seed values that can be obtained. It is also possible to…
298 … the discriminant is given by the formula 4*a^3 + 27*b^2 whilst for F2^m curves the discriminant is
306 …fR determines if the group's domain parameters match one of the built-in curves supported by the l…
309 … lookup the name of the curve that matches the group domain parameters. The built-in curves contain
310 aliases, so that multiple \s-1NID\s0's can map to the same domain parameters. For such curves it is…
312 …\fR is 1 it will only look for \s-1NIST\s0 approved curves, otherwise it searches all built-in cur…
318 …et_trinomial_basis()\fR and \fBEC_GROUP_get_pentanomial_basis()\fR should only be called for curves
356 \&\fBEC_GROUP_get_field_type()\fR returns either \fBNID_X9_62_prime_field\fR for prime curves
357 or \fBNID_X9_62_characteristic_two_field\fR for binary curves;
365 …rns an internal pointer to the group field. For curves over \s-1GF\s0(p), this is the modulus; for…
[all …]
H A DEC_GFp_simple_method.3174 For F2^m curves there is only one implementation choice, i.e. EC_GF2_simple_method.
176 For Fp curves the lowest common denominator implementation is the EC_GFp_simple_method implementati…
179 offers an implementation optimised for use with \s-1NIST\s0 recommended curves (\s-1NIST\s0 curves
183 optimised implementations for the \s-1NIST P224, P256\s0 and P521 curves respectively. Note, howeve…
/freebsd/crypto/openssl/apps/
H A Decparam.c71 EC_builtin_curve *curves = NULL; in list_builtin_curves() local
74 curves = app_malloc((int)sizeof(*curves) * crv_len, "list curves"); in list_builtin_curves()
75 if (!EC_get_builtin_curves(curves, crv_len)) in list_builtin_curves()
79 const char *comment = curves[n].comment; in list_builtin_curves()
80 const char *sname = OBJ_nid2sn(curves[n].nid); in list_builtin_curves()
92 OPENSSL_free(curves); in list_builtin_curves()
313 * for named curves. This can be achieved using: in ecparam_main()
/freebsd/crypto/openssl/test/
H A Decdsatest.c32 static EC_builtin_curve *curves = NULL; variable
101 return TEST_skip("skip non approved curves"); in x9_62_tests()
199 nid = curves[n].nid; in test_builtin()
201 /* skip built-in curves where ord(G) is not prime */ in test_builtin()
208 * skip SM2 curve if 'as' is equal to EVP_PKEY_EC or, skip all curves in test_builtin()
394 TEST_note("Elliptic curves are disabled."); in cleanup_tests()
400 /* get a list of all internal curves */
402 if (!TEST_ptr(curves = OPENSSL_malloc(sizeof(*curves) * crv_len))
403 || !TEST_true(EC_get_builtin_curves(curves, crv_le
[all...]
/freebsd/crypto/openssl/test/recipes/
H A D70-test_tls13hrr.t49 $proxy->serverflags("-curves ffdhe3072");
51 $proxy->serverflags("-curves P-256");
62 $proxy->serverflags("-curves ffdhe3072");
64 $proxy->serverflags("-curves P-256");
76 $proxy->serverflags("-curves ffdhe3072");
78 $proxy->serverflags("-curves P-256");
H A D70-test_tls13cookie.t49 $proxy->serverflags("-curves X25519") if !disabled("ec");
64 $proxy->clientflags("-curves ffdhe3072:ffdhe2048");
65 $proxy->serverflags("-curves ffdhe2048");
67 $proxy->clientflags("-curves P-256:X25519");
68 $proxy->serverflags("-curves X25519");
H A D70-test_tls13psk.t69 $proxy->serverflags("-curves ffdhe3072");
71 $proxy->serverflags("-curves P-256");
88 $proxy->serverflags("-curves ffdhe3072");
90 $proxy->serverflags("-curves P-256");
/freebsd/crypto/libecc/src/examples/basic/
H A Dcurve_ecdh.c64 * all our curves).
73 * all our curves).
239 /* Traverse all the possible curves we have at our disposal (known curves and in main()
240 * user defined curves). in main()
245 /* All our possible curves are in ../curves/curves_list.h in main()
/freebsd/contrib/bearssl/src/ssl/
H A Dssl_hs_client.t0394 \ Length of Supported Curves extension.
395 : ext-supported-curves-length ( -- len )
396 supported-curves dup if
407 supported-curves if 6 else 0 then ;
432 ext-supported-curves-length + ext-point-format-length +
517 \ TODO: add an API to specify preference order for curves.
518 \ Right now we send Curve25519 first, then other curves in
520 ext-supported-curves-length dup if
524 supported-curves 0
714 ext-supported-curves-length { ok-curves }
[all …]

1234567891011