| /freebsd/crypto/libecc/include/libecc/ |
| H A D | meson.build | 20 'curves/aff_pt.h', 21 'curves/ec_shortw.h', 22 'curves/prj_pt.h', 23 'curves/ec_edwards.h', 24 'curves/known/ec_params_bign384v1.h', 25 'curves/known/ec_params_brainpoolp224t1.h', 26 'curves/known/ec_params_external.h', 27 'curves/known/ec_params_gost_R3410_2001_CryptoPro_A_ParamSet.h', 28 'curves/known/ec_params_brainpoolp192t1.h', 29 'curves/known/ec_params_sm2p256v1.h', [all …]
|
| /freebsd/crypto/libecc/scripts/ |
| H A D | test_ec_utils.sh | 26 curves=("FRP256V1" "SECP192R1" "SECP224R1" "SECP256R1" "SECP384R1" "SECP521R1" "BRAINPOOLP192R1" "B… 51 $EC_UTILS gen_keys ${curves[c]} ${signatures[s]} test_key || exit 0 70 …$EC_UTILS sign ${curves[c]} ${signatures[s]} ${hashes[h]} $EC_UTILS test_key_private_key.bin signe… 72 …$EC_UTILS verify ${curves[c]} ${signatures[s]} ${hashes[h]} $EC_UTILS test_key_public_key.bin sign… 75 …$EC_UTILS struct_sign ${curves[c]} ${signatures[s]} ${hashes[h]} $EC_UTILS test_key_private_key.bi… 77 …$EC_UTILS struct_verify ${curves[c]} ${signatures[s]} ${hashes[h]} signed_file.bin.signed test_key…
|
| /freebsd/crypto/openssl/test/ssl-tests/ |
| H A D | 14-curves.cnf.in | 16 my @curves = ("prime256v1", "secp384r1", "secp521r1"); 20 push @curves, @curves_no_fips if !$fips_mode; 29 push @curves, @curves_tls_1_3; 64 foreach (0..$#curves) { 65 my $curve = $curves[$_]; 165 #These curves are only suitable for TLSv1.3 so we expect the 184 #These curves are only suitable for TLSv1.3. We expect TLSv1.2
|
| /freebsd/crypto/openssl/apps/ |
| H A D | ecparam.c | 83 EC_builtin_curve *curves = NULL; in list_builtin_curves() local 86 curves = app_malloc((int)sizeof(*curves) * crv_len, "list curves"); in list_builtin_curves() 87 EC_get_builtin_curves(curves, crv_len); in list_builtin_curves() 90 const char *comment = curves[n].comment; in list_builtin_curves() 91 const char *sname = OBJ_nid2sn(curves[n].nid); in list_builtin_curves() 101 OPENSSL_free(curves); in list_builtin_curves()
|
| /freebsd/contrib/bearssl/tools/ |
| H A D | names.c | 326 } curves[] = { variable 560 for (u = 0; curves[u].name; u ++) { in get_curve_name() 561 if (curves[u].id == id) { in get_curve_name() 562 return curves[u].name; in get_curve_name() 676 for (u = 0; curves[u].name; u ++) { in list_curves() 679 for (v = 0; curves[u].sid[v]; v ++) { in list_curves() 687 printf("%s", curves[u].sid[v]); in list_curves() 1031 for (u = 0; curves[u].name; u ++) { in get_curve_by_name() 1032 for (v = 0; curves[u].sid[v]; v ++) { in get_curve_by_name() 1033 if (eqstr(curves[u].sid[v], str)) { in get_curve_by_name() [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | EC_GFp_simple_method.pod | 38 For F2^m curves there is only one implementation choice, i.e. EC_GF2_simple_method. 40 For Fp curves the lowest common denominator implementation is the EC_GFp_simple_method implementati… 43 offers an implementation optimised for use with NIST recommended curves (NIST curves are available … 47 optimised implementations for the NIST P224, P256 and P521 curves respectively. Note, however, that…
|
| H A D | EC_GROUP_new.pod | 93 B<irreducible polynomial>. All such curves with OpenSSL use a trinomial or a 151 above, there are also a number of predefined curves that are available. In order 152 to obtain a list of all of the predefined curves, call the function 155 I<r> array with information about the built-in curves. If I<nitems> is less than 156 the total number of curves available, then the first I<nitems> curves will be 157 returned. Otherwise the total number of curves will be provided. The return 158 value is the total number of curves available (whether that number has been 160 do nothing other than return the total number of curves available. 198 EC_get_builtin_curves() returns the number of built-in curves that are
|
| H A D | EC_GROUP_copy.pod | 147 built-in curves within the library provide seed values that can be obtained. It is also possible to… 159 … the discriminant is given by the formula 4*a^3 + 27*b^2 whilst for F2^m curves the discriminant is 167 …() determines if the group's domain parameters match one of the built-in curves supported by the l… 170 … lookup the name of the curve that matches the group domain parameters. The built-in curves contain 171 aliases, so that multiple NID's can map to the same domain parameters. For such curves it is unspec… 173 …nist_only> is 1 it will only look for NIST approved curves, otherwise it searches all built-in cur… 179 …C_GROUP_get_trinomial_basis() and EC_GROUP_get_pentanomial_basis() should only be called for curves 218 EC_GROUP_get_field_type() returns either B<NID_X9_62_prime_field> for prime curves 219 or B<NID_X9_62_characteristic_two_field> for binary curves; 227 …eturns an internal pointer to the group field. For curves over GF(p), this is the modulus; for cur… [all …]
|
| H A D | EVP_PKEY_get_field_type.pod | 20 for prime curves or B<NID_X9_62_characteristic_two_field> for binary curves;
|
| /freebsd/crypto/libecc/ |
| H A D | README.md | 28 This software implements a library for elliptic curves based 31 …ature algorithms as well as ECDH primitives, with the following specific curves and hash functions: 46 user defined curves using a standalone helper script. 68 Since the core of the library supports short Weierstrass curves, and as 69 EdDSA uses instead Twisted Edwards curves with dedicated formulas, we use 72 curves models, allowing to implement operations on one model by operating with 75 and Curve25519 (Montgomery) curves. This, of course, induces overheads in computations 118 library. Classical ECDH over Weierstrass curves is implemented in the form 120 …v. 3](https://csrc.nist.gov/publications/detail/sp/800-56a/rev-3/final) standard. Montgomery curves 124 handle Montgomery curves). This divergence does not impact the ECDH use case though. [all …]
|
| H A D | meson.options | 21 # about curves 28 # All the curves options 74 # ADD curves meson option here 79 value: [], description: 'enable a set of curves when override is set')
|
| /freebsd/crypto/openssl/test/ |
| H A D | ecdsatest.c | 32 static EC_builtin_curve *curves = NULL; variable 199 nid = curves[n].nid; in test_builtin() 408 if (!TEST_ptr(curves = OPENSSL_malloc(sizeof(*curves) * crv_len)) in setup_tests() 409 || !TEST_true(EC_get_builtin_curves(curves, crv_len))) { in setup_tests() 427 OPENSSL_free(curves); in cleanup_tests()
|
| H A D | ec_internal_test.c | 23 static EC_builtin_curve *curves = NULL; variable 218 int nid = curves[n].nid; in field_tests_default() 443 int nid = curves[n].nid; in ecpkparams_i2d2i_test() 543 if (!TEST_ptr(curves = OPENSSL_malloc(sizeof(*curves) * crv_len)) in setup_tests() 544 || !TEST_true(EC_get_builtin_curves(curves, crv_len))) in setup_tests() 567 OPENSSL_free(curves); in cleanup_tests()
|
| H A D | ectest.c | 36 static EC_builtin_curve *curves = NULL; variable 1116 int nid = curves[n].nid; in internal_curve_test() 1134 int r, nid = curves[n].nid; in internal_curve_test_method() 1912 nid = curves[id].nid; in check_named_curve_test() 2098 nid = curves[id].nid; in check_named_curve_lookup_test() 2236 nid = curves[id].nid; in check_named_curve_from_ecparameters() 2647 int nid = curves[n].nid; in cardinality_test() 2736 || !TEST_ptr(key = EC_KEY_new_by_curve_name(curves[id].nid)) in check_ec_key_field_public_range_test() 2840 nid = curves[id].nid; in ec_point_hex2point_test() 3111 nid = curves[id].nid; in custom_generator_test() [all …]
|
| /freebsd/secure/lib/libpkgecc/ |
| H A D | Makefile | 11 .PATH: $(SRCTOP)/crypto/libecc/src/curves 19 curves.c \
|
| /freebsd/crypto/libecc/src/curves/ |
| H A D | meson.build | 9 'curves.c',
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | EVP_PKEY-EC.pod | 16 curve name "group". For curves with no curve name, explicit parameters can be 20 named curves. 80 EC curve's cofactor (note for some curves the cofactor is 1). 155 for the curves "P-256", "P-384" and "P-521" and should have a length of at least 156 the size of the encoded private key (i.e. 32, 48 and 66 for the listed curves). 280 * the behaviour. For many curves the cofactor is 1 - so setting this has
|
| H A D | EVP_KEM-EC.pod | 45 It can only be used for the curves "P-256", "P-384" and "P-521" and should 47 (i.e. 32, 48 and 66 for the listed curves).
|
| /freebsd/crypto/openssl/demos/bio/ |
| H A D | connect.cnf | 11 # Only support 3 curves
|
| H A D | accept.cnf | 11 # Only support 3 curves
|
| H A D | cmod.cnf | 21 # Only support 3 curves
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-ecparam.pod.in | 34 this command can only create EC parameters from known (named) curves. 84 match any built-in curves. 102 by default for binary curves and can be enabled by defining
|
| /freebsd/contrib/bearssl/src/ssl/ |
| H A D | ssl_hs_client.t0 | 395 : ext-supported-curves-length ( -- len ) 396 supported-curves dup if 407 supported-curves if 6 else 0 then ; 432 ext-supported-curves-length + ext-point-format-length + 517 \ TODO: add an API to specify preference order for curves. 518 \ Right now we send Curve25519 first, then other curves in 520 ext-supported-curves-length dup if 524 supported-curves 0 714 ext-supported-curves-length { ok-curves } 766 ok-curves ifnot [all …]
|
| H A D | ssl_hs_server.t0 | 405 addr-ctx: curves 525 : read-supported-curves ( lim -- lim ) 532 \ Get all supported curves. 533 0 addr-curves set32 536 1 swap << addr-curves get32 or addr-curves set32 732 0x800000 addr-curves set32 757 read-supported-curves 842 \ Filter supported curves. If there is no common curve between 845 addr-curves get32 supported-curves and dup addr-curves set32 1006 \ We must select an appropriate curve among the curves that [all …]
|
| /freebsd/sys/contrib/device-tree/Bindings/iio/light/ |
| H A D | cm3605.txt | 28 calibration curves for. If not supplied, 100 kOhm will be assumed
|