/third_party/openssl/doc/man7/ |
D | EVP_PKEY-X25519.pod | 5 EVP_PKEY-X25519, EVP_PKEY-X448, EVP_PKEY-ED25519, EVP_PKEY-ED448, 6 EVP_KEYMGMT-X25519, EVP_KEYMGMT-X448, EVP_KEYMGMT-ED25519, EVP_KEYMGMT-ED448 7 - EVP_PKEY X25519, X448, ED25519 and ED448 keytype and algorithm support 11 The B<X25519>, B<X448>, B<ED25519> and B<ED448> keytypes are 19 =head2 Common X25519, X448, ED25519 and ED448 parameters 29 This is only supported by X25519 and X448. The group name must be "x25519" or 43 Used for getting and setting the encoding of a public key for the B<X25519> and 74 EVP_PKEY_CTX_new_from_name(NULL, "X25519", NULL); 85 An B<X25519> key can be generated like this: 87 pkey = EVP_PKEY_Q_keygen(NULL, NULL, "X25519"); [all …]
|
D | X25519.pod | 5 X25519, 7 - EVP_PKEY X25519 and X448 support 11 The B<X25519> and B<X448> EVP_PKEY implementation supports key generation and 12 key derivation using B<X25519> and B<X448>. It has associated private and public 22 A context for the B<X25519> algorithm can be obtained by calling: 30 X25519 or X448 private keys can be set directly using 36 X25519 or X448 public keys can be set directly using 42 This example generates an B<X25519> private key and writes it to standard 56 B<X25519> and B<X448>.
|
D | EVP_KEYEXCH-X25519.pod | 5 EVP_KEYEXCH-X25519, 7 - X25519 and X448 Key Exchange algorithm support 11 Key exchange support for the B<X25519> and B<X448> key types. 26 L<EVP_PKEY-X25519(7)/Examples>.
|
D | OSSL_PROVIDER-default.pod | 161 =item X25519, see L<EVP_KEYEXCH-X25519(7)> 217 =item X25519, see L<EVP_KEYMGMT-X25519(7)> 255 =item X25519, see L<OSSL_ENCODER-X25519(7)>
|
D | EVP_SIGNATURE-ED25519.pod | 23 See L<EVP_PKEY-X25519(7)> for information related to B<X25519> and B<X448> keys. 88 L<EVP_PKEY-X25519(7)>
|
D | OSSL_PROVIDER-base.pod | 76 =item X25519, see L<OSSL_ENCODER-X25519(7)>
|
D | OSSL_PROVIDER-FIPS.pod | 117 =item X25519, see L<EVP_KEYEXCH-X25519(7)> 129 =item X25519, see L<EVP_SIGNATURE-ED25519(7)> 169 =item X25519, see L<EVP_KEYMGMT-X25519(7)>
|
/third_party/openssl/test/ssl-tests/ |
D | 28-seclevel.cnf | 9 test-4 = 4-SECLEVEL 3 with P-384 key, X25519 ECDHE 105 [4-SECLEVEL 3 with P-384 key, X25519 ECDHE] 106 ssl_conf = 4-SECLEVEL 3 with P-384 key, X25519 ECDHE-ssl 108 [4-SECLEVEL 3 with P-384 key, X25519 ECDHE-ssl] 109 server = 4-SECLEVEL 3 with P-384 key, X25519 ECDHE-server 110 client = 4-SECLEVEL 3 with P-384 key, X25519 ECDHE-client 112 [4-SECLEVEL 3 with P-384 key, X25519 ECDHE-server] 115 Groups = X25519 118 [4-SECLEVEL 3 with P-384 key, X25519 ECDHE-client]
|
D | 28-seclevel.cnf.in | 61 name => "SECLEVEL 3 with P-384 key, X25519 ECDHE", 65 "Groups" => "X25519" },
|
/third_party/openssl/test/recipes/30-test_evp_data/ |
D | evppkey_ecx.txt | 19 Title = X25519 test vectors (from RFC7748 6.1) 45 PrivateKeyRaw=Alice-25519-Raw:X25519:77076d0a7318a57d3c16c17251b26645df4c2f87ebc0992ab177fba51db92c… 47 PublicKeyRaw=Alice-25519-PUBLIC-Raw:X25519:8520f0098930a754748b7ddcb43ef75a0dbf3a0d26381af4eba4a98e… 51 PrivateKeyRaw=Bob-25519-Raw:X25519:5dab087e624a8a4b79e17f8b83800ee66f3bb1292618b6fd1c2f8b27ff88e0eb 53 PublicKeyRaw=Bob-25519-PUBLIC-Raw:X25519:de9edb7d7b7dc1b4d35b61c2ece435373f8343c85b78674dadfc7e146f… 75 # Illegal sign/verify operations with X25519 key 534 PrivateKeyRaw = WychePRIVATE0:X25519:288796bc5aff4b81a37501757bc0753a3c21964790d38699308debc17a6eaf… 536 PublicKeyRaw = WychePUBLIC0:X25519:f0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f 542 PrivateKeyRaw = WychePRIVATE1:X25519:60887b3dc72443026ebedbbbb70665f42b87add1440e7768fbd7e8e2ce5f63… 544 PublicKeyRaw = WychePUBLIC1:X25519:f0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff [all …]
|
/third_party/openssl/doc/man3/ |
D | EVP_PKEY_fromdata.pod | 43 L<B<EVP_PKEY-ED448>(7)|EVP_PKEY-ED448(7)/Common X25519, X448, ED25519 and ED448 parameters>, 44 L<B<EVP_PKEY-X25519>(7)|EVP_PKEY-X25519(7)/Common X25519, X448, ED25519 and ED448 parameters>, 45 L<B<EVP_PKEY-X448>(7)|EVP_PKEY-X448(7)/Common X25519, X448, ED25519 and ED448 parameters>, 46 and L<B<EVP_PKEY-ED25519>(7)|EVP_PKEY-ED25519(7)/Common X25519, X448, ED25519 and ED448 parameters>… 263 L<EVP_PKEY-ED448(7)>, L<EVP_PKEY-X25519(7)>, L<EVP_PKEY-X448(7)>,
|
D | EVP_PKEY_CTX_set_params.pod | 57 L<EVP_PKEY-X25519(7)/Common X25519, X448, ED25519 and ED448 parameters>
|
D | EVP_PKEY_set1_encoded_public_key.pod | 40 Curve Cryptography") standard. For X25519 and X448 it should be encoded in a 122 L<EVP_PKEY-DH(7)>, L<EVP_PKEY-EC(7)>, L<EVP_PKEY-X25519(7)>, L<EVP_PKEY-X448(7)>
|
/third_party/node/deps/openssl/openssl/providers/ |
D | encoders.inc | 62 ENCODER_TEXT("X25519", x25519, yes), 184 ENCODER_w_structure("X25519", x25519, yes, der, EncryptedPrivateKeyInfo), 185 ENCODER_w_structure("X25519", x25519, yes, pem, EncryptedPrivateKeyInfo), 186 ENCODER_w_structure("X25519", x25519, yes, der, PrivateKeyInfo), 187 ENCODER_w_structure("X25519", x25519, yes, pem, PrivateKeyInfo), 188 ENCODER_w_structure("X25519", x25519, yes, der, SubjectPublicKeyInfo), 189 ENCODER_w_structure("X25519", x25519, yes, pem, SubjectPublicKeyInfo),
|
D | decoders.inc | 65 DECODER_w_structure("X25519", der, PrivateKeyInfo, x25519, yes), 66 DECODER_w_structure("X25519", der, SubjectPublicKeyInfo, x25519, yes),
|
/third_party/openssl/providers/ |
D | encoders.inc | 62 ENCODER_TEXT("X25519", x25519, yes), 184 ENCODER_w_structure("X25519", x25519, yes, der, EncryptedPrivateKeyInfo), 185 ENCODER_w_structure("X25519", x25519, yes, pem, EncryptedPrivateKeyInfo), 186 ENCODER_w_structure("X25519", x25519, yes, der, PrivateKeyInfo), 187 ENCODER_w_structure("X25519", x25519, yes, pem, PrivateKeyInfo), 188 ENCODER_w_structure("X25519", x25519, yes, der, SubjectPublicKeyInfo), 189 ENCODER_w_structure("X25519", x25519, yes, pem, SubjectPublicKeyInfo),
|
D | decoders.inc | 65 DECODER_w_structure("X25519", der, PrivateKeyInfo, x25519, yes), 66 DECODER_w_structure("X25519", der, SubjectPublicKeyInfo, x25519, yes),
|
/third_party/curl/docs/cmdline-opts/ |
D | curves.md | 14 - --curves X25519 $URL 21 them with `:` (e.g. `X25519:P-521`). The parameter is available identically in
|
/third_party/openssl/test/certs/ |
D | ee-ed25519.pem | 12 Public Key Algorithm: X25519 13 X25519 Public-Key:
|
/third_party/node/doc/api/ |
D | webcrypto.md | 18 description: Added `'Ed25519'`, `'Ed448'`, `'X25519'`, and `'X448'` 26 description: Removed proprietary `'NODE-X25519'` and `'NODE-X448'` named 99 #### Ed25519/Ed448/X25519/X448 key pairs 114 name: 'X25519', 348 | `'X25519'` <span class="experimental-inline"></span>[^1] | ✔ | ✔ | ✔ … 489 | `'X25519'` <span class="experimental-inline"></span>[^1] | | | … 562 description: Added `'X25519'`, and `'X448'` algorithms. 582 generated. This is allowed for the `'ECDH'`, `'X25519'`, and `'X448'` 591 * `'X25519'` <span class="experimental-inline"></span>[^1] 603 description: Added `'X25519'`, and `'X448'` algorithms. [all …]
|
/third_party/openssl/doc/HOWTO/ |
D | keys.txt | 101 For X25519 and X448, it's treated as a distinct algorithm but not as one of 103 the following command to generate an X25519 key: 105 openssl genpkey -algorithm X25519 -out xkey.pem
|
/third_party/openssl/test/recipes/30-test_evp_pkey_provided/ |
D | X25519.pub.txt | 1 X25519 Public-Key:
|
D | X25519.priv.txt | 1 X25519 Private-Key:
|
/third_party/node/deps/openssl/openssl/providers/common/der/ |
D | ECX.asn1 | 14 id-X25519 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 110 }
|
/third_party/openssl/providers/common/der/ |
D | ECX.asn1 | 14 id-X25519 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 110 }
|