/freebsd/crypto/libecc/include/libecc/ |
H A D | meson.build | 20 'curves/aff_pt.h', 21 'curves/ec_shortw.h', 22 'curves/prj_pt.h', 23 'curves/ec_edwards.h', 24 'curves/known/ec_params_bign384v1.h', 25 'curves/known/ec_params_brainpoolp224t1.h', 26 'curves/known/ec_params_external.h', 27 'curves/known/ec_params_gost_R3410_2001_CryptoPro_A_ParamSet.h', 28 'curves/known/ec_params_brainpoolp192t1.h', 29 'curves/known/ec_params_sm2p256v1.h', [all …]
|
/freebsd/crypto/libecc/scripts/ |
H A D | test_ec_utils.sh | 26 curves=("FRP256V1" "SECP192R1" "SECP224R1" "SECP256R1" "SECP384R1" "SECP521R1" "BRAINPOOLP192R1" "B… 51 $EC_UTILS gen_keys ${curves[c]} ${signatures[s]} test_key || exit 0 70 …$EC_UTILS sign ${curves[c]} ${signatures[s]} ${hashes[h]} $EC_UTILS test_key_private_key.bin signe… 72 …$EC_UTILS verify ${curves[c]} ${signatures[s]} ${hashes[h]} $EC_UTILS test_key_public_key.bin sign… 75 …$EC_UTILS struct_sign ${curves[c]} ${signatures[s]} ${hashes[h]} $EC_UTILS test_key_private_key.bi… 77 …$EC_UTILS struct_verify ${curves[c]} ${signatures[s]} ${hashes[h]} signed_file.bin.signed test_key…
|
/freebsd/crypto/openssl/apps/ |
H A D | ecparam.c | 71 EC_builtin_curve *curves = NULL; in list_builtin_curves() local 74 curves = app_malloc((int)sizeof(*curves) * crv_len, "list curves"); in list_builtin_curves() 75 if (!EC_get_builtin_curves(curves, crv_len)) in list_builtin_curves() 79 const char *comment = curves[n].comment; in list_builtin_curves() 80 const char *sname = OBJ_nid2sn(curves[n].nid); in list_builtin_curves() 92 OPENSSL_free(curves); in list_builtin_curves()
|
/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 14-curves.cnf.in | 15 my @curves = ("prime256v1", "secp384r1", "secp521r1"); 19 push @curves, @curves_no_fips if !$fips_mode; 25 push @curves, @curves_tls_1_3; 55 foreach (0..$#curves) { 56 my $curve = $curves[$_]; 152 #These curves are only suitable for TLSv1.3 so we expect the 171 #These curves are only suitable for TLSv1.3. We expect TLSv1.2
|
/freebsd/contrib/bearssl/tools/ |
H A D | names.c | 326 } curves[] = { variable 560 for (u = 0; curves[u].name; u ++) { in get_curve_name() 561 if (curves[u].id == id) { in get_curve_name() 562 return curves[u].name; in get_curve_name() 676 for (u = 0; curves[u].name; u ++) { in list_curves() 679 for (v = 0; curves[u].sid[v]; v ++) { in list_curves() 687 printf("%s", curves[u].sid[v]); in list_curves() 1031 for (u = 0; curves[u].name; u ++) { in get_curve_by_name() 1032 for (v = 0; curves[u].sid[v]; v ++) { in get_curve_by_name() 1033 if (eqstr(curves[u].sid[v], str)) { in get_curve_by_name() [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EC_GFp_simple_method.pod | 38 For F2^m curves there is only one implementation choice, i.e. EC_GF2_simple_method. 40 For Fp curves the lowest common denominator implementation is the EC_GFp_simple_method implementati… 43 offers an implementation optimised for use with NIST recommended curves (NIST curves are available … 47 optimised implementations for the NIST P224, P256 and P521 curves respectively. Note, however, that…
|
H A D | EC_GROUP_new.pod | 90 B<irreducible polynomial>. All such curves with OpenSSL use a trinomial or a 138 above, there are also a number of predefined curves that are available. In order 139 to obtain a list of all of the predefined curves, call the function 142 I<r> array with information about the built-in curves. If I<nitems> is less than 143 the total number of curves available, then the first I<nitems> curves will be 144 returned. Otherwise the total number of curves will be provided. The return 145 value is the total number of curves available (whether that number has been 147 do nothing other than return the total number of curves available. 185 EC_get_builtin_curves() returns the number of built-in curves that are
|
H A D | EC_GROUP_copy.pod | 147 built-in curves within the library provide seed values that can be obtained. It is also possible to… 159 … the discriminant is given by the formula 4*a^3 + 27*b^2 whilst for F2^m curves the discriminant is 167 …() determines if the group's domain parameters match one of the built-in curves supported by the l… 170 … lookup the name of the curve that matches the group domain parameters. The built-in curves contain 171 aliases, so that multiple NID's can map to the same domain parameters. For such curves it is unspec… 173 …nist_only> is 1 it will only look for NIST approved curves, otherwise it searches all built-in cur… 179 …C_GROUP_get_trinomial_basis() and EC_GROUP_get_pentanomial_basis() should only be called for curves 218 EC_GROUP_get_field_type() returns either B<NID_X9_62_prime_field> for prime curves 219 or B<NID_X9_62_characteristic_two_field> for binary curves; 227 …eturns an internal pointer to the group field. For curves over GF(p), this is the modulus; for cur… [all …]
|
H A D | EVP_PKEY_get_field_type.pod | 20 for prime curves or B<NID_X9_62_characteristic_two_field> for binary curves;
|
/freebsd/crypto/libecc/ |
H A D | README.md | 28 This software implements a library for elliptic curves based 31 …ature algorithms as well as ECDH primitives, with the following specific curves and hash functions: 46 user defined curves using a standalone helper script. 68 Since the core of the library supports short Weierstrass curves, and as 69 EdDSA uses instead Twisted Edwards curves with dedicated formulas, we use 72 curves models, allowing to implement operations on one model by operating with 75 and Curve25519 (Montgomery) curves. This, of course, induces overheads in computations 118 library. Classical ECDH over Weierstrass curves is implemented in the form 120 …v. 3](https://csrc.nist.gov/publications/detail/sp/800-56a/rev-3/final) standard. Montgomery curves 124 handle Montgomery curves). This divergence does not impact the ECDH use case though. [all …]
|
H A D | meson.options | 21 # about curves 28 # All the curves options 74 # ADD curves meson option here 79 value: [], description: 'enable a set of curves when override is set')
|
/freebsd/crypto/openssl/test/ |
H A D | ecdsatest.c | 32 static EC_builtin_curve *curves = NULL; variable 101 return TEST_skip("skip non approved curves"); in x9_62_tests() 199 nid = curves[n].nid; in test_builtin() 201 /* skip built-in curves where ord(G) is not prime */ in test_builtin() 208 * skip SM2 curve if 'as' is equal to EVP_PKEY_EC or, skip all curves in test_builtin() 394 TEST_note("Elliptic curves are disabled."); in cleanup_tests() 400 /* get a list of all internal curves */ 402 if (!TEST_ptr(curves = OPENSSL_malloc(sizeof(*curves) * crv_len)) 403 || !TEST_true(EC_get_builtin_curves(curves, crv_le [all...] |
H A D | ec_internal_test.c | 22 static EC_builtin_curve *curves = NULL; variable 222 int nid = curves[n].nid; in field_tests_default() 450 int nid = curves[n].nid; in ecpkparams_i2d2i_test() 489 if (!TEST_ptr(curves = OPENSSL_malloc(sizeof(*curves) * crv_len)) in setup_tests() 490 || !TEST_true(EC_get_builtin_curves(curves, crv_len))) in setup_tests() 512 OPENSSL_free(curves); in cleanup_tests()
|
H A D | ectest.c | 36 static EC_builtin_curve *curves = NULL; variable 1140 int nid = curves[n].nid; in internal_curve_test() 1158 int r, nid = curves[n].nid; in internal_curve_test_method() 1514 nid = curves[id].nid; in check_named_curve_test() 1702 nid = curves[id].nid; in check_named_curve_lookup_test() 1841 nid = curves[id].nid; in check_named_curve_from_ecparameters() 2156 int nid = curves[n].nid; in cardinality_test() 2247 || !TEST_ptr(key = EC_KEY_new_by_curve_name(curves[id].nid)) in check_ec_key_field_public_range_test() 2351 nid = curves[id].nid; in ec_point_hex2point_test() 2621 nid = curves[id].nid; in custom_generator_test() [all …]
|
/freebsd/secure/lib/libpkgecc/ |
H A D | Makefile | 11 .PATH: $(SRCTOP)/crypto/libecc/src/curves 19 curves.c \
|
/freebsd/crypto/libecc/src/curves/ |
H A D | meson.build | 9 'curves.c',
|
/freebsd/crypto/openssl/demos/bio/ |
H A D | connect.cnf | 11 # Only support 3 curves
|
H A D | accept.cnf | 11 # Only support 3 curves
|
H A D | cmod.cnf | 21 # Only support 3 curves
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-ecparam.pod.in | 34 this command can only create EC parameters from known (named) curves. 82 match any built-in curves. 100 by default for binary curves and can be enabled by defining
|
/freebsd/contrib/bearssl/src/ssl/ |
H A D | ssl_hs_client.t0 | 395 : ext-supported-curves-length ( -- len ) 396 supported-curves dup if 407 supported-curves if 6 else 0 then ; 432 ext-supported-curves-length + ext-point-format-length + 517 \ TODO: add an API to specify preference order for curves. 518 \ Right now we send Curve25519 first, then other curves in 520 ext-supported-curves-length dup if 524 supported-curves 0 714 ext-supported-curves-length { ok-curves } 766 ok-curves ifnot [all …]
|
H A D | ssl_hs_server.t0 | 405 addr-ctx: curves 525 : read-supported-curves ( lim -- lim ) 532 \ Get all supported curves. 533 0 addr-curves set32 536 1 swap << addr-curves get32 or addr-curves set32 732 0x800000 addr-curves set32 757 read-supported-curves 842 \ Filter supported curves. If there is no common curve between 845 addr-curves get32 supported-curves and dup addr-curves set32 1006 \ We must select an appropriate curve among the curves that [all …]
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_PKEY-EC.pod | 16 curve name "group". For curves with no curve name, explicit parameters can be 20 named curves. 80 EC curve's cofactor (note for some curves the cofactor is 1). 250 * the behaviour. For many curves the cofactor is 1 - so setting this has
|
/freebsd/crypto/openssl/doc/HOWTO/ |
H A D | keys.txt | 72 parameters. You can use the following command to list all supported curves: 102 the curves listed with 'ecparam -list_curves' option. You can use
|
/freebsd/sys/contrib/device-tree/Bindings/iio/light/ |
H A D | cm3605.txt | 28 calibration curves for. If not supplied, 100 kOhm will be assumed
|