Home
last modified time | relevance | path

Searched refs:X448 (Results 1 – 25 of 49) sorted by relevance

12

/freebsd/crypto/openssl/doc/man7/
H A DEVP_PKEY-X25519.pod5 EVP_PKEY-X25519, EVP_PKEY-X448, EVP_PKEY-ED25519, EVP_PKEY-ED448,
6 EVP_KEYMGMT-X25519, EVP_KEYMGMT-X448, EVP_KEYMGMT-ED25519, EVP_KEYMGMT-ED448
7 - EVP_PKEY X25519, X448, ED25519 and ED448 keytype and algorithm support
11 The B<X25519>, B<X448>, B<ED25519> and B<ED448> keytypes are
19 =head2 Common X25519, X448, ED25519 and ED448 parameters
29 This is only supported by X25519 and X448. The group name must be "x25519" or
44 B<X448> key types. Public keys are expected be encoded in a format as defined by
77 EVP_PKEY_CTX_new_from_name(NULL, "X448", NULL);
89 An B<X448>, B<ED25519>, or B<ED448> key can be generated likewise.
94 L<EVP_KEYEXCH-X25519(7)>, L<EVP_KEYEXCH-X448(7)>,
H A DX25519.pod6 X448
7 - EVP_PKEY X25519 and X448 support
11 The B<X25519> and B<X448> EVP_PKEY implementation supports key generation and
12 key derivation using B<X25519> and B<X448>. It has associated private and public
26 For the B<X448> algorithm a context can be obtained by calling:
30 X25519 or X448 private keys can be set directly using
36 X25519 or X448 public keys can be set directly using
56 B<X25519> and B<X448>.
H A DEVP_KEYEXCH-X25519.pod6 EVP_KEYEXCH-X448
7 - X25519 and X448 Key Exchange algorithm support
11 Key exchange support for the B<X25519> and B<X448> key types.
H A DOSSL_PROVIDER-default.pod163 =item X448, see L<EVP_KEYEXCH-X448(7)>
219 =item X448, see L<EVP_KEYMGMT-X448(7)>
257 =item X448, see L<OSSL_ENCODER-X448(7)>
H A DOSSL_PROVIDER-base.pod78 =item X448, see L<OSSL_ENCODER-X448(7)>
H A DOSSL_PROVIDER-FIPS.pod119 =item X448, see L<EVP_KEYEXCH-X448(7)>
131 =item X448, see L<EVP_SIGNATURE-ED448(7)>
171 =item X448, see L<EVP_KEYMGMT-X448(7)>
H A DEVP_SIGNATURE-ED25519.pod23 See L<EVP_PKEY-X25519(7)> for information related to B<X25519> and B<X448> keys.
/freebsd/crypto/libecc/src/tests/
H A Dx448_test_vectors.h32 .ecdh_type = X448,
63 .ecdh_type = X448,
/freebsd/crypto/openssl/doc/man3/
H A DEVP_PKEY_fromdata.pod43 L<B<EVP_PKEY-ED448>(7)|EVP_PKEY-ED448(7)/Common X25519, X448, ED25519 and ED448 parameters>,
44 L<B<EVP_PKEY-X25519>(7)|EVP_PKEY-X25519(7)/Common X25519, X448, ED25519 and ED448 parameters>,
45 L<B<EVP_PKEY-X448>(7)|EVP_PKEY-X448(7)/Common X25519, X448, ED25519 and ED448 parameters>,
46 and L<B<EVP_PKEY-ED25519>(7)|EVP_PKEY-ED25519(7)/Common X25519, X448, ED25519 and ED448 parameters>…
263 L<EVP_PKEY-ED448(7)>, L<EVP_PKEY-X25519(7)>, L<EVP_PKEY-X448(7)>,
H A DEVP_PKEY_set1_encoded_public_key.pod40 Curve Cryptography") standard. For X25519 and X448 it should be encoded in a
122 L<EVP_PKEY-DH(7)>, L<EVP_PKEY-EC(7)>, L<EVP_PKEY-X25519(7)>, L<EVP_PKEY-X448(7)>
H A DEVP_PKEY_todata.pod47 L<EVP_PKEY-ED448(7)>, L<EVP_PKEY-X25519(7)>, L<EVP_PKEY-X448(7)>,
H A DEVP_PKEY_CTX_set_params.pod59 L<EVP_PKEY-X25519(7)/Common X25519, X448, ED25519 and ED448 parameters>
H A DEVP_PKEY_new.pod98 "X25519", "ED25519", "X448" or "ED448". I<key> points to the raw private key
122 "X25519", "ED25519", "X448" or "ED448".
/freebsd/secure/lib/libcrypto/man/man7/
H A DMakefile127 MLINKS+= EVP_KEYEXCH-X25519.7 EVP_KEYEXCH-X448.7
141 MLINKS+= EVP_PKEY-X25519.7 EVP_KEYMGMT-X448.7
153 MLINKS+= EVP_PKEY-X25519.7 EVP_PKEY-X448.7
164 MLINKS+= X25519.7 X448.7
/freebsd/crypto/openssl/providers/
H A Dencoders.inc63 ENCODER_TEXT("X448", x448, yes),
191 ENCODER_w_structure("X448", x448, yes, der, EncryptedPrivateKeyInfo),
192 ENCODER_w_structure("X448", x448, yes, pem, EncryptedPrivateKeyInfo),
193 ENCODER_w_structure("X448", x448, yes, der, PrivateKeyInfo),
194 ENCODER_w_structure("X448", x448, yes, pem, PrivateKeyInfo),
195 ENCODER_w_structure("X448", x448, yes, der, SubjectPublicKeyInfo),
196 ENCODER_w_structure("X448", x448, yes, pem, SubjectPublicKeyInfo),
H A Ddecoders.inc67 DECODER_w_structure("X448", der, PrivateKeyInfo, x448, yes),
68 DECODER_w_structure("X448", der, SubjectPublicKeyInfo, x448, yes),
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devppkey_ecx.txt85 Title = X448 test vectors (from RFC7748 6.2)
117 PrivateKeyRaw=Alice-448-Raw:X448:9a8f4925d1519f5775cf46b04b5800d4ee9ee8bae8bc5565d498c28dd9c9baf574…
119 PublicKeyRaw=Alice-448-PUBLIC-Raw:X448:9b08f7cc31b7e3e67d22d5aea121074a273bd2b83de09c63faa73d2c22c5…
123 PrivateKeyRaw=Bob-448-Raw:X448:1c306a7ac2a0e2e0990b294470cba339e6453772b075811d8fad0d1d6927c120bb5e…
125 PublicKeyRaw=Bob-448-PUBLIC-Raw:X448:3eb7a829b0cd20f5bcfc0b599b6feccf6da4627107bdb0d4f345b43027d8b9…
129 PublicKeyRaw=Bob-448-PUBLIC-Raw-NonCanonical:X448:fffffffffffffffffffffffffffffffffffffffffffffffff…
152 # Illegal sign/verify operations with X448 key
/freebsd/crypto/openssl/test/recipes/30-test_evp_pkey_provided/
H A DX448.pub.txt1 X448 Public-Key:
H A DX448.priv.txt1 X448 Private-Key:
/freebsd/crypto/libecc/src/wycheproof_tests/
H A Dlibecc_wycheproof_tests.h623280 .xdh_alg = X448,
623307 .xdh_alg = X448,
623334 .xdh_alg = X448,
623361 .xdh_alg = X448,
623388 .xdh_alg = X448,
623415 .xdh_alg = X448,
623442 .xdh_alg = X448,
623469 .xdh_alg = X448,
623496 .xdh_alg = X448,
623523 .xdh_alg = X448,
[all …]
/freebsd/crypto/openssl/providers/common/der/
H A DECX.asn115 id-X448 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 111 }
/freebsd/crypto/libecc/include/libecc/
H A Dlib_ecc_types.h68 X448 = 17, enumerator
/freebsd/crypto/openssl/test/
H A Dendecode_test.c1041 KEYS(X448);
1042 IMPLEMENT_TEST_SUITE(X448, "X448", 1)
1394 MAKE_KEYS(X448, "X448", NULL); in setup_tests()
1446 ADD_TEST_SUITE(X448); in setup_tests()
1506 FREE_KEYS(X448); in cleanup_tests()
/freebsd/crypto/openssl/test/ssl-tests/
H A D14-curves.cnf.in17 my @curves_no_fips = ("X25519", "X448");
H A D14-curves.cnf9 test-4 = 4-curve-X448
218 [4-curve-X448]
219 ssl_conf = 4-curve-X448-ssl
221 [4-curve-X448-ssl]
222 server = 4-curve-X448-server
223 client = 4-curve-X448-client
225 [4-curve-X448-server]
228 Curves = X448
232 [4-curve-X448-client]
234 Curves = X448
[all …]

12