Home
last modified time | relevance | path

Searched refs:X448 (Results 1 – 25 of 53) sorted by relevance

123

/freebsd/crypto/openssl/doc/man7/
H A DEVP_PKEY-X25519.pod5 EVP_PKEY-X25519, EVP_PKEY-X448, EVP_PKEY-ED25519, EVP_PKEY-ED448,
6 EVP_KEYMGMT-X25519, EVP_KEYMGMT-X448, EVP_KEYMGMT-ED25519, EVP_KEYMGMT-ED448
7 - EVP_PKEY X25519, X448, ED25519 and ED448 keytype and algorithm support
11 The B<X25519>, B<X448>, B<ED25519> and B<ED448> keytypes are
25 It should have a length of at least 32 for X25519, and 56 for X448.
26 This is only supported by X25519 and X448.
30 This getter is only supported by X25519 and X448 for the FIPS provider.
31 Since X25519 and X448 are unapproved in FIPS 140-3 this getter return 0.
39 =head2 Common X25519, X448, ED25519 and ED448 parameters
49 This is only supported by X25519 and X448. The group name must be "x25519" or
[all …]
H A DX25519.pod6 X448
7 - EVP_PKEY X25519 and X448 support
11 The B<X25519> and B<X448> EVP_PKEY implementation supports key generation and
12 key derivation using B<X25519> and B<X448>. It has associated private and public
26 For the B<X448> algorithm a context can be obtained by calling:
30 X25519 or X448 private keys can be set directly using
36 X25519 or X448 public keys can be set directly using
56 B<X25519> and B<X448>.
H A DEVP_KEM-X25519.pod5 EVP_KEM-X25519, EVP_KEM-X448
6 - EVP_KEM X25519 and EVP_KEM X448 keytype and algorithm support
10 The B<X25519> and <X448> keytype and its parameters are described in
14 =head2 X25519 and X448 KEM parameters
20 The OpenSSL X25519 and X448 Key Encapsulation Mechanisms only support the
28 by doing an X25519 or X448 key exchange using the ephemeral private key and a
46 It should have a length of at least 32 for X25519, and 56 for X448.
H A DEVP_KEYEXCH-X25519.pod6 EVP_KEYEXCH-X448
7 - X25519 and X448 Key Exchange algorithm support
11 Key exchange support for the B<X25519> and B<X448> key types.
21 B<X25519> and B<X448> are not FIPS approved in FIPS 140-3.
H A DOSSL_PROVIDER-default.pod168 =item X448, see L<EVP_KEYEXCH-X448(7)>
258 =item X448, see L<EVP_KEM-X448(7)>
294 =item X448, see L<EVP_KEYMGMT-X448(7)>
391 =item X448
459 =item X448
H A DOSSL_PROVIDER-base.pod95 =item X448
163 =item X448
H A DOSSL_PROVIDER-FIPS.pod136 =item X448, see L<EVP_KEYEXCH-X448(7)>
220 =item X448, see L<EVP_KEYMGMT-X448(7)>
/freebsd/crypto/openssl/test/ssl-tests/
H A D28-seclevel.cnf.in30 "Groups" => "?X448:?secp521r1",
34 "Groups" => "?X448:?secp521r1",
45 "Groups" => "?X448:?secp521r1",
49 "Groups" => "?X448:?secp521r1",
58 "Groups" => "?X448:?secp521r1",
62 "Groups" => "?X448:?secp521r1",
H A D28-seclevel.cnf46 Groups = ?X448:?secp521r1
51 Groups = ?X448:?secp521r1
71 Groups = ?X448:?secp521r1
76 Groups = ?X448:?secp521r1
96 Groups = ?X448:?secp521r1
101 Groups = ?X448:?secp521r1
H A D14-curves.cnf.in18 my @curves_no_fips = ("X25519", "X448");
/freebsd/crypto/libecc/src/tests/
H A Dx448_test_vectors.h32 .ecdh_type = X448,
63 .ecdh_type = X448,
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devppkey_ecx_kem.txt22 Kem = X448
28 Kem = X448
H A Devppkey_ecx.txt98 Title = X448 test vectors (from RFC7748 6.2)
130 PrivateKeyRaw=Alice-448-Raw:X448:9a8f4925d1519f5775cf46b04b5800d4ee9ee8bae8bc5565d498c28dd9c9baf574…
132 PublicKeyRaw=Alice-448-PUBLIC-Raw:X448:9b08f7cc31b7e3e67d22d5aea121074a273bd2b83de09c63faa73d2c22c5…
136 PrivateKeyRaw=Bob-448-Raw:X448:1c306a7ac2a0e2e0990b294470cba339e6453772b075811d8fad0d1d6927c120bb5e…
138 PublicKeyRaw=Bob-448-PUBLIC-Raw:X448:3eb7a829b0cd20f5bcfc0b599b6feccf6da4627107bdb0d4f345b43027d8b9…
142 PublicKeyRaw=Bob-448-PUBLIC-Raw-NonCanonical:X448:fffffffffffffffffffffffffffffffffffffffffffffffff…
149 # Test that X448 Key exchange is not FIPS approved
178 # Illegal sign/verify operations with X448 key
960 # Test that X448 KeyGen is not FIPS approved
963 KeyGen = X448
/freebsd/crypto/openssl/doc/man3/
H A DEVP_PKEY_fromdata.pod43 L<B<EVP_PKEY-ED448>(7)|EVP_PKEY-ED448(7)/Common X25519, X448, ED25519 and ED448 parameters>,
44 L<B<EVP_PKEY-X25519>(7)|EVP_PKEY-X25519(7)/Common X25519, X448, ED25519 and ED448 parameters>,
45 L<B<EVP_PKEY-X448>(7)|EVP_PKEY-X448(7)/Common X25519, X448, ED25519 and ED448 parameters>,
46 L<B<EVP_PKEY-ED25519>(7)|EVP_PKEY-ED25519(7)/Common X25519, X448, ED25519 and ED448 parameters>,
276 L<EVP_PKEY-X448(7)>,
H A DEVP_PKEY_new.pod101 C<X448>,
136 B<X448>,
165 B<X448>,
193 B<X448>
259 L<EVP_PKEY-X448(7)>,
H A DEVP_PKEY_set1_encoded_public_key.pod43 Curve Cryptography") standard. For B<X25519> and B<X448> it should be encoded
133 L<EVP_PKEY-X448(7)>,
H A DEVP_PKEY_todata.pod54 L<EVP_PKEY-X448(7)>,
/freebsd/crypto/openssl/test/recipes/30-test_evp_pkey_provided/
H A DX448.pub.txt1 X448 Public-Key:
H A DX448.priv.txt1 X448 Private-Key:
/freebsd/crypto/libecc/src/wycheproof_tests/
H A Dlibecc_wycheproof_tests.h623280 .xdh_alg = X448,
623307 .xdh_alg = X448,
623334 .xdh_alg = X448,
623361 .xdh_alg = X448,
623388 .xdh_alg = X448,
623415 .xdh_alg = X448,
623442 .xdh_alg = X448,
623469 .xdh_alg = X448,
623496 .xdh_alg = X448,
623523 .xdh_alg = X448,
[all …]
/freebsd/crypto/openssl/providers/
H A Dencoders.inc64 ENCODER_TEXT("X448", x448, yes),
228 ENCODER_w_structure("X448", x448, yes, der, EncryptedPrivateKeyInfo),
229 ENCODER_w_structure("X448", x448, yes, pem, EncryptedPrivateKeyInfo),
230 ENCODER_w_structure("X448", x448, yes, der, PrivateKeyInfo),
231 ENCODER_w_structure("X448", x448, yes, pem, PrivateKeyInfo),
232 ENCODER_w_structure("X448", x448, yes, der, SubjectPublicKeyInfo),
233 ENCODER_w_structure("X448", x448, yes, pem, SubjectPublicKeyInfo),
H A Ddecoders.inc68 DECODER_w_structure("X448", der, PrivateKeyInfo, x448, yes),
69 DECODER_w_structure("X448", der, SubjectPublicKeyInfo, x448, yes),
/freebsd/crypto/openssl/providers/common/der/
H A DECX.asn115 id-X448 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 111 }
/freebsd/crypto/libecc/include/libecc/
H A Dlib_ecc_types.h68 X448 = 17, enumerator
/freebsd/crypto/openssl/test/
H A Dendecode_test.c1043 KEYS(X448);
1044 IMPLEMENT_TEST_SUITE(X448, "X448", 1)
1502 MAKE_KEYS(X448, "X448", NULL); in setup_tests()
1588 ADD_TEST_SUITE(X448); in setup_tests()
1682 FREE_KEYS(X448); in cleanup_tests()

123