Home
last modified time | relevance | path

Searched refs:curve25519 (Results 1 – 19 of 19) sorted by relevance

/freebsd/sys/contrib/libsodium/src/libsodium/
H A DMakefile.am58 crypto_scalarmult/curve25519/ref10/x25519_ref10.c \
59 crypto_scalarmult/curve25519/ref10/x25519_ref10.h \
60 crypto_scalarmult/curve25519/scalarmult_curve25519.c \
61 crypto_scalarmult/curve25519/scalarmult_curve25519.h \
125 crypto_scalarmult/curve25519/sandy2x/consts.S \
126 crypto_scalarmult/curve25519/sandy2x/fe51_mul.S \
127 crypto_scalarmult/curve25519/sandy2x/fe51_nsquare.S \
128 crypto_scalarmult/curve25519/sandy2x/fe51_pack.S \
129 crypto_scalarmult/curve25519/sandy2x/ladder.S \
130 crypto_scalarmult/curve25519/sandy2x/ladder_base.S
[all …]
/freebsd/sys/contrib/libsodium/test/default/
H A Ded25519_convert.exp1 curve25519 pk: [f1814f0e8ff1043d8a44d25babff3cedcae6c22c3edaa48f857ae70de2baae50]
2 curve25519 sk: [8052030376d47112be7f73ed7a019293dd12ad910b654455798b4667d73de166]
/freebsd/usr.bin/wg/
H A DMakefile16 SRCS+= curve25519.c
31 CWARNFLAGS.curve25519.c+= -Wno-shadow
/freebsd/sys/modules/crypto/
H A DMakefile18 .PATH: ${LIBSODIUM}/crypto_scalarmult/curve25519
19 .PATH: ${LIBSODIUM}/crypto_scalarmult/curve25519/ref10
95 SRCS += curve25519.c
96 CFLAGS.curve25519.c += -I${LIBSODIUM_INC} -I${LIBSODIUM_COMPAT}
/freebsd/sys/contrib/libsodium/
H A DAUTHORS19 curve25519 Daniel J. Bernstein
90 crypto_scalarmult/curve25519/ref10 Daniel J. Bernstein
92 crypto_scalarmult/curve25519/sandy2x Tung Chou
H A DChangeLog327 - NaCl's donna_c64 implementation of curve25519 was reading an extra byte
352 - ed25519 keys can be converted to curve25519 keys with
406 - The high bit in curve25519 is masked instead of processing the key as
408 - The curve25519 ref implementation was replaced by the latest ref10
485 - Optimized versions of curve25519 (curve25519_donna_c64), poly1305
/freebsd/contrib/wireguard-tools/
H A Dcurve25519.c92 curve25519(pub, secret, basepoint); in curve25519_generate_public()
95 void curve25519(uint8_t mypublic[static CURVE25519_KEY_SIZE], const uint8_t secret[static CURVE2551… in curve25519() function
H A Dcurve25519.h16 void curve25519(uint8_t mypublic[static CURVE25519_KEY_SIZE], const uint8_t secret[static CURVE2551…
/freebsd/sys/crypto/
H A Dcurve25519.c35 curve25519(uint8_t *public, const uint8_t *secret, in curve25519() function
H A Dcurve25519.h38 bool curve25519(uint8_t *public, const uint8_t *secret,
/freebsd/crypto/openssh/regress/
H A Drekey.sh76 kexs=`${SSH} -Q kex | grep -v curve25519-sha256@libssh.org`
/freebsd/crypto/openssl/crypto/ec/
H A Dbuild.info55 ecdsa_ossl.c ecdsa_sign.c ecdsa_vrf.c curve25519.c \
/freebsd/crypto/openssh/
H A DPROTOCOL99 1.8 transport: curve25519-sha256@libssh.org key exchange algorithm
103 http://git.libssh.org/users/aris/libssh.git/plain/doc/curve25519-sha256@libssh.org.txt?h=curve25519
105 This is identical to curve25519-sha256 as later published in RFC8731.
H A DChangeLog657 upstream: Use curve25519-sha256 kex where possible.
660 curve25519-sha256 since it's faster than the default and supported even
719 upstream: Remove duplicate curve25519-sha256 kex.
721 curve25519-sha256@libssh.org is the pre-standardization name for the same
/freebsd/sys/dev/wg/
H A Dwg_noise.c287 !curve25519(r->r_ss, l->l_private, r->r_public)) in noise_precompute_ss()
1280 if (!curve25519(dh, private, public)) in noise_mix_dh()
/freebsd/crypto/openssl/providers/
H A Dfips.module.sources150 crypto/ec/curve25519.c
H A Dfips-sources.checksums150 340336e01aa04fcde9bfd56536f90c9bc0ad56a002b6cfa321a1e421f1e93ceb crypto/ec/curve25519.c
/freebsd/secure/lib/libcrypto/
H A DMakefile211 SRCS+= curve25519.c curve448.c curve448_tables.c ec2_oct.c ec2_smpl.c
/freebsd/sys/conf/
H A Dfiles697 crypto/curve25519.c optional crypto \
5080 contrib/libsodium/src/libsodium/crypto_scalarmult/curve25519/scalarmult_curve25519.c \
5083 contrib/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/x25519_ref10.c \