/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_PKEY-X25519.pod | 5 EVP_PKEY-X25519, EVP_PKEY-X448, EVP_PKEY-ED25519, EVP_PKEY-ED448, 6 EVP_KEYMGMT-X25519, EVP_KEYMGMT-X448, EVP_KEYMGMT-ED25519, EVP_KEYMGMT-ED448 7 - EVP_PKEY X25519, X448, ED25519 and ED448 keytype and algorithm support 11 The B<X25519>, B<X448>, B<ED25519> and B<ED448> keytypes are 19 =head2 Common X25519, X448, ED25519 and ED448 parameters 29 This is only supported by X25519 and X448. The group name must be "x25519" or 44 B<X448> key types. Public keys are expected be encoded in a format as defined by 77 EVP_PKEY_CTX_new_from_name(NULL, "X448", NULL); 89 An B<X448>, B<ED25519>, or B<ED448> key can be generated likewise. 94 L<EVP_KEYEXCH-X25519(7)>, L<EVP_KEYEXCH-X448(7)>,
|
H A D | X25519.pod | 6 X448 7 - EVP_PKEY X25519 and X448 support 11 The B<X25519> and B<X448> EVP_PKEY implementation supports key generation and 12 key derivation using B<X25519> and B<X448>. It has associated private and public 26 For the B<X448> algorithm a context can be obtained by calling: 30 X25519 or X448 private keys can be set directly using 36 X25519 or X448 public keys can be set directly using 56 B<X25519> and B<X448>.
|
H A D | EVP_KEYEXCH-X25519.pod | 6 EVP_KEYEXCH-X448 7 - X25519 and X448 Key Exchange algorithm support 11 Key exchange support for the B<X25519> and B<X448> key types.
|
H A D | OSSL_PROVIDER-default.pod | 163 =item X448, see L<EVP_KEYEXCH-X448(7)> 219 =item X448, see L<EVP_KEYMGMT-X448(7)> 257 =item X448, see L<OSSL_ENCODER-X448(7)>
|
H A D | OSSL_PROVIDER-base.pod | 78 =item X448, see L<OSSL_ENCODER-X448(7)>
|
H A D | OSSL_PROVIDER-FIPS.pod | 119 =item X448, see L<EVP_KEYEXCH-X448(7)> 131 =item X448, see L<EVP_SIGNATURE-ED448(7)> 171 =item X448, see L<EVP_KEYMGMT-X448(7)>
|
H A D | EVP_SIGNATURE-ED25519.pod | 23 See L<EVP_PKEY-X25519(7)> for information related to B<X25519> and B<X448> keys.
|
/freebsd/crypto/libecc/src/tests/ |
H A D | x448_test_vectors.h | 32 .ecdh_type = X448, 63 .ecdh_type = X448,
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_PKEY_fromdata.pod | 43 L<B<EVP_PKEY-ED448>(7)|EVP_PKEY-ED448(7)/Common X25519, X448, ED25519 and ED448 parameters>, 44 L<B<EVP_PKEY-X25519>(7)|EVP_PKEY-X25519(7)/Common X25519, X448, ED25519 and ED448 parameters>, 45 L<B<EVP_PKEY-X448>(7)|EVP_PKEY-X448(7)/Common X25519, X448, ED25519 and ED448 parameters>, 46 and L<B<EVP_PKEY-ED25519>(7)|EVP_PKEY-ED25519(7)/Common X25519, X448, ED25519 and ED448 parameters>… 263 L<EVP_PKEY-ED448(7)>, L<EVP_PKEY-X25519(7)>, L<EVP_PKEY-X448(7)>,
|
H A D | EVP_PKEY_set1_encoded_public_key.pod | 40 Curve Cryptography") standard. For X25519 and X448 it should be encoded in a 122 L<EVP_PKEY-DH(7)>, L<EVP_PKEY-EC(7)>, L<EVP_PKEY-X25519(7)>, L<EVP_PKEY-X448(7)>
|
H A D | EVP_PKEY_todata.pod | 47 L<EVP_PKEY-ED448(7)>, L<EVP_PKEY-X25519(7)>, L<EVP_PKEY-X448(7)>,
|
H A D | EVP_PKEY_CTX_set_params.pod | 59 L<EVP_PKEY-X25519(7)/Common X25519, X448, ED25519 and ED448 parameters>
|
H A D | EVP_PKEY_new.pod | 98 "X25519", "ED25519", "X448" or "ED448". I<key> points to the raw private key 122 "X25519", "ED25519", "X448" or "ED448".
|
/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | Makefile | 127 MLINKS+= EVP_KEYEXCH-X25519.7 EVP_KEYEXCH-X448.7 141 MLINKS+= EVP_PKEY-X25519.7 EVP_KEYMGMT-X448.7 153 MLINKS+= EVP_PKEY-X25519.7 EVP_PKEY-X448.7 164 MLINKS+= X25519.7 X448.7
|
/freebsd/crypto/openssl/providers/ |
H A D | encoders.inc | 63 ENCODER_TEXT("X448", x448, yes), 191 ENCODER_w_structure("X448", x448, yes, der, EncryptedPrivateKeyInfo), 192 ENCODER_w_structure("X448", x448, yes, pem, EncryptedPrivateKeyInfo), 193 ENCODER_w_structure("X448", x448, yes, der, PrivateKeyInfo), 194 ENCODER_w_structure("X448", x448, yes, pem, PrivateKeyInfo), 195 ENCODER_w_structure("X448", x448, yes, der, SubjectPublicKeyInfo), 196 ENCODER_w_structure("X448", x448, yes, pem, SubjectPublicKeyInfo),
|
H A D | decoders.inc | 67 DECODER_w_structure("X448", der, PrivateKeyInfo, x448, yes), 68 DECODER_w_structure("X448", der, SubjectPublicKeyInfo, x448, yes),
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_ecx.txt | 85 Title = X448 test vectors (from RFC7748 6.2) 117 PrivateKeyRaw=Alice-448-Raw:X448:9a8f4925d1519f5775cf46b04b5800d4ee9ee8bae8bc5565d498c28dd9c9baf574… 119 PublicKeyRaw=Alice-448-PUBLIC-Raw:X448:9b08f7cc31b7e3e67d22d5aea121074a273bd2b83de09c63faa73d2c22c5… 123 PrivateKeyRaw=Bob-448-Raw:X448:1c306a7ac2a0e2e0990b294470cba339e6453772b075811d8fad0d1d6927c120bb5e… 125 PublicKeyRaw=Bob-448-PUBLIC-Raw:X448:3eb7a829b0cd20f5bcfc0b599b6feccf6da4627107bdb0d4f345b43027d8b9… 129 PublicKeyRaw=Bob-448-PUBLIC-Raw-NonCanonical:X448:fffffffffffffffffffffffffffffffffffffffffffffffff… 152 # Illegal sign/verify operations with X448 key
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_pkey_provided/ |
H A D | X448.pub.txt | 1 X448 Public-Key:
|
H A D | X448.priv.txt | 1 X448 Private-Key:
|
/freebsd/crypto/libecc/src/wycheproof_tests/ |
H A D | libecc_wycheproof_tests.h | 623280 .xdh_alg = X448, 623307 .xdh_alg = X448, 623334 .xdh_alg = X448, 623361 .xdh_alg = X448, 623388 .xdh_alg = X448, 623415 .xdh_alg = X448, 623442 .xdh_alg = X448, 623469 .xdh_alg = X448, 623496 .xdh_alg = X448, 623523 .xdh_alg = X448, [all …]
|
/freebsd/crypto/openssl/providers/common/der/ |
H A D | ECX.asn1 | 15 id-X448 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 111 }
|
/freebsd/crypto/libecc/include/libecc/ |
H A D | lib_ecc_types.h | 68 X448 = 17, enumerator
|
/freebsd/crypto/openssl/test/ |
H A D | endecode_test.c | 1041 KEYS(X448); 1042 IMPLEMENT_TEST_SUITE(X448, "X448", 1) 1394 MAKE_KEYS(X448, "X448", NULL); in setup_tests() 1446 ADD_TEST_SUITE(X448); in setup_tests() 1506 FREE_KEYS(X448); in cleanup_tests()
|
/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 14-curves.cnf.in | 17 my @curves_no_fips = ("X25519", "X448");
|
H A D | 14-curves.cnf | 9 test-4 = 4-curve-X448 218 [4-curve-X448] 219 ssl_conf = 4-curve-X448-ssl 221 [4-curve-X448-ssl] 222 server = 4-curve-X448-server 223 client = 4-curve-X448-client 225 [4-curve-X448-server] 228 Curves = X448 232 [4-curve-X448-client] 234 Curves = X448 [all …]
|