Searched +full:- +full:duser_nn_bit_len (Results 1 – 8 of 8) sorted by relevance
/freebsd/crypto/libecc/.github/workflows/ |
H A D | libecc_examples.yml | 8 runs-on: ubuntu-22.04 10 #max-parallel: 10 17 - name: checkout repository 21 - name: libecc examples tests 32 sudo apt-get update; 33 sudo apt-get -y install libomp-dev; 36 …-DUSER_NN_BIT_LEN=4096" make && cd src/examples/ && EXTRA_CFLAGS="-DUSER_NN_BIT_LEN=4096" make && … 37 …/sss/sss && ./basic/curve_basic_examples && ./basic/curve_ecdh && make clean && cd - && make clean; 38 …/sss/sss && ./basic/curve_basic_examples && ./basic/curve_ecdh && make clean && cd - && make clean; 39 continue-on-error: false
|
/freebsd/crypto/libecc/scripts/ |
H A D | crossbuild.sh | 2 # * Copyright (C) 2017 - This file is part of libecc project 7 # * Jean-Pierre FLORI <jean-pierre.flori@ssi.gouv.fr> 21 if [ -e $1 ] 58 mkdir -p $ROOT_DIR 60 cp -r $SRC_DIR/src/ $ROOT_DIR/ 61 cp -r $SRC_DIR/include/ $ROOT_DIR/ 64 mkdir -p $ROOT_DIR/build 65 mkdir -p $CROSSBUILD_OUTPUT/compilation_log 66 mkdir -p $CROSSBUILD_OUTPUT/error_log 69 …64 bit triplets, multiarch/crossbuild docker's gcc 4.9 has a bug handling loop unrolling in -O3 and [all …]
|
/freebsd/crypto/libecc/src/examples/sig/sdsa/ |
H A D | sdsa.c | 2 * Copyright (C) 2021 - This file is part of libecc project 27 * one corresponding to SDSA as described in the ISO14888-3 standard. 46 * All-in-all, this piece of code can be useful in some contexts, or risky to 47 * use in other sensitive ones where advanced side-channels or fault attacks 122 p = &(priv->p); in sdsa_sign() 123 q = &(priv->q); in sdsa_sign() 124 g = &(priv->g); in sdsa_sign() 125 x = &(priv->x); in sdsa_sign() 201 * In case of blinding, we compute b^-1 with in sdsa_sign() 223 ret = _i2osp(&s, sig + hlen, (u16)(siglen - hlen)); EG(ret, err); in sdsa_sign() [all …]
|
/freebsd/crypto/libecc/src/examples/sig/gostr34_10_94/ |
H A D | gostr34_10_94.c | 2 * Copyright (C) 2021 - This file is part of libecc project 24 * The purpose of this example is to implement the GOSTR34-10-94 44 * All-in-all, this piece of code can be useful in some contexts, or risky to 45 * use in other sensitive ones where advanced side-channels or fault attacks 115 p = &(priv->p); in gostr34_10_94_sign() 116 q = &(priv->q); in gostr34_10_94_sign() 117 g = &(priv->g); in gostr34_10_94_sign() 118 x = &(priv->x); in gostr34_10_94_sign() 177 rshift = (bitcnt_t)((hlen * 8) - N); in gostr34_10_94_sign() 199 * In case of blinding, we compute b^-1 with in gostr34_10_94_sign() [all …]
|
/freebsd/crypto/libecc/src/examples/sig/dsa/ |
H A D | dsa.c | 2 * Copyright (C) 2021 - This file is part of libecc project 25 * related algorithms as per FIPS 186-4 based on libecc arithmetic 35 * FIPS 186-4 rather than a production code. Use it at your own risk! 45 * All-in-all, this piece of code can be useful in some contexts, or risky to 46 * use in other sensitive ones where advanced side-channels or fault attacks 65 ret = _os2ip(&(priv->p), p, plen); EG(ret, err); in dsa_import_priv_key() 66 ret = _os2ip(&(priv->q), q, qlen); EG(ret, err); in dsa_import_priv_key() 67 ret = _os2ip(&(priv->g), g, glen); EG(ret, err); in dsa_import_priv_key() 68 ret = _os2ip(&(priv->x), x, xlen); EG(ret, err); in dsa_import_priv_key() 71 ret = nn_cmp(&(priv->q), &(priv->p), &cmp); EG(ret, err); in dsa_import_priv_key() [all …]
|
/freebsd/crypto/libecc/src/examples/sig/kcdsa/ |
H A D | kcdsa.c | 2 * Copyright (C) 2021 - This file is part of libecc project 24 * based on libecc arithmetic primitives, as described in the ISO14888-3 44 * All-in-all, this piece of code can be useful in some contexts, or risky to 45 * use in other sensitive ones where advanced side-channels or fault attacks 113 buf[i - shift] = buf[i]; in buf_lshift() 118 buf[buflen - i] = 0; in buf_lshift() 170 p = &(priv->p); in kcdsa_sign() 171 q = &(priv->q); in kcdsa_sign() 172 g = &(priv->g); in kcdsa_sign() 173 x = &(priv->x); in kcdsa_sign() [all …]
|
/freebsd/crypto/libecc/src/examples/sig/rsa/ |
H A D | rsa.c | 2 * Copyright (C) 2021 - This file is part of libecc project 27 * related algorithms as per RFC 8017 and ISO/IEC 9796-2 based 44 * against elaborate microarchitectural side-channels and so on). The modular exponentation 55 * Padding oracles (Bleichenbacher, Manger) in RSA PKCS#1 v1.5 and RSA-OAEP decryption 75 * All-in-all, this piece of code can be useful in some contexts, or risky to 76 * use in other sensitive ones where advanced side-channels or fault attacks 89 ret = nn_init_from_buf(&(pub->n), n, nlen); EG(ret, err); in rsa_import_pub_key() 90 ret = nn_init_from_buf(&(pub->e), e, elen); in rsa_import_pub_key() 112 priv->type = RSA_SIMPLE; in rsa_import_simple_priv_key() 113 ret = nn_init_from_buf(&(priv->key.s.n), n, nlen); EG(ret, err); in rsa_import_simple_priv_key() [all …]
|
/freebsd/crypto/libecc/ |
H A D | README.md | 11 Copyright (C) 2017-2023 20 * Jean-Pierre FLORI (<mailto:jpflori@gmail.com>) 30 in the [ISO 14888-3:2018](https://www.iso.org/standard/76382.html) 34 * Core ISO 14888-3:2018 algorithms: ECDSA, ECKCDSA, ECGDSA, ECRDSA, EC{,O}SDSA, ECFSDSA, SM2. 36 …* BIGN (as standardized in [STB 34.101.45-2013](https://github.com/bcrypto/bign)). We allow a more… 38 … "Schnorr" Bitcoin proposal, as specified in [bip-0340](https://github.com/bitcoin/bips/blob/maste… 39 …tandard as we allow any curve and any hash function (the standard mandates SECP256K1 with SHA-256). 42 …-CDH (Elliptic Curve Cryptography Cofactor Diffie-Hellman) as described in [section 5.7.1.2 of the… 45 …STR3410-2001-CryptoPro{A,B,C,XchA,XchB,Test}-ParamSet, GOSTR3410-2012-{256,512}-ParamSet{A,B,C}, G… 47 * **Hash functions**: SHA-2 and SHA-3 hash functions (224, 256, 384, 512), SM3, RIPEMD-160, [all …]
|