/mbedtls-3.7.0/tests/suites/ |
D | test_suite_psa_crypto_not_supported.generated.data | 203 PSA import ECC_KEY_PAIR(BRAINPOOL_P_R1) 160-bit curve not supported 207 PSA generate ECC_KEY_PAIR(BRAINPOOL_P_R1) 160-bit curve not supported 211 PSA import ECC_KEY_PAIR(BRAINPOOL_P_R1) 192-bit curve not supported 215 PSA generate ECC_KEY_PAIR(BRAINPOOL_P_R1) 192-bit curve not supported 219 PSA import ECC_KEY_PAIR(BRAINPOOL_P_R1) 224-bit curve not supported 223 PSA generate ECC_KEY_PAIR(BRAINPOOL_P_R1) 224-bit curve not supported 227 PSA import ECC_KEY_PAIR(BRAINPOOL_P_R1) 256-bit curve not supported 231 PSA generate ECC_KEY_PAIR(BRAINPOOL_P_R1) 256-bit curve not supported 235 PSA import ECC_KEY_PAIR(BRAINPOOL_P_R1) 320-bit curve not supported 239 PSA generate ECC_KEY_PAIR(BRAINPOOL_P_R1) 320-bit curve not supported [all …]
|
D | test_suite_ecjpake.data | 67 ECJPAKE round one: KKP1: X not on the curve 115 ECJPAKE round one: KKP2: X not on the curve 130 ECJPAKE round two client: ECParams not named curve 133 ECJPAKE round two client: ECParams wrong curve 181 ECJPAKE round two client: X not on the curve 235 ECJPAKE round two server: X not on curve
|
D | test_suite_ecdsa.data | 365 ECDSA verify invalid pub key (not on curve), zero bytes of data 369 ECDSA verify invalid pub key (not on curve), one byte of data 373 ECDSA verify invalid pub key (not on curve), r=1, s=1 377 ECDSA verify invalid pub key (also not on curve), r=1, s=1 381 ECDSA verify invalid pub key (not on curve), r=12345, s=1 385 ECDSA verify invalid pub key (not on curve), r=1, s=12345
|
D | test_suite_random.function | 192 void mbedtls_psa_get_random_ecdsa_sign(int curve) 204 TEST_EQUAL(0, mbedtls_ecp_group_load(&grp, curve));
|
D | test_suite_psa_crypto_metadata.function | 688 psa_ecc_family_t curve = curve_arg; 689 psa_key_type_t public_type = PSA_KEY_TYPE_ECC_PUBLIC_KEY(curve); 690 psa_key_type_t pair_type = PSA_KEY_TYPE_ECC_KEY_PAIR(curve); 692 TEST_PARITY(curve); 697 TEST_EQUAL(PSA_KEY_TYPE_ECC_GET_FAMILY(public_type), curve); 698 TEST_EQUAL(PSA_KEY_TYPE_ECC_GET_FAMILY(pair_type), curve);
|
D | test_suite_ecp.data | 4 ECP curve info #1 8 ECP curve info #2 12 ECP curve info #3 16 ECP curve info #4 20 ECP curve info #5 24 ECP curve info #6 28 ECP curve info #7 32 ECP curve info #8 164 ECP check pubkey Koblitz #1 (point not on curve) 410 ECP tls read group #3 (unknown curve) [all …]
|
D | test_suite_pk.function | 54 /* Pick an elliptic curve that's supported by PSA. Note that the curve is 57 * This should always find a curve if ECC is enabled in the build, except in 59 * where the only legacy curve is secp224k1, which is not supported in PSA, 61 * support any curve. 66 * This way, if ECDSA is enabled then the curve that's selected here will 120 #endif /* curve selection */ 126 /* Pick a second curve, for tests that need two supported curves of the 194 psa_ecc_family_t curve = mbedtls_ecc_group_to_psa(grp_id, &curve_bits); 197 if (curve == 0) { 201 psa_set_key_type(&key_attr, PSA_KEY_TYPE_ECC_KEY_PAIR(curve)); [all …]
|
D | test_suite_pk.data | 1237 PSA import into PSA: ECKEY pair to different curve (bad) 1241 PSA import into PSA: ECKEY_DH pair to different curve (bad) 1245 PSA import into PSA: ECDSA pair to different curve (bad) 1249 PSA import into PSA: ECKEY pair to public, different curve (bad) 1253 PSA import into PSA: ECKEY_DH pair to public, different curve (bad) 1257 PSA import into PSA: ECDSA pair to public, different curve (bad) 1261 PSA import into PSA: ECKEY public to different curve (bad) 1265 PSA import into PSA: ECKEY_DH public to different curve (bad) 1269 PSA import into PSA: ECDSA public to different curve (bad) 1551 # as there is any curve supported either builtin or in a driver. In a scenario
|
D | test_suite_ecp.function | 884 // Load curve info and compare with known values 890 // Load curve from TLS ID and name, and compare IDs 913 // Check curve type, and if it can be used for ECDH/ECDSA 927 // Check curve is in curve list and group ID list 1288 TEST_FAIL("Unknown ECP curve type");
|
/mbedtls-3.7.0/scripts/ |
D | ecp_comb_table.py | 185 def compute_curve(curve): argument 191 '-DCURVE_ID=MBEDTLS_ECP_DP_%s' % curve.upper(), 192 '-DCURVE_NAME="%s"' % curve.lower(), 232 for curve in sys.argv[1:]: 233 compute_curve(curve)
|
D | ecc-heap.sh | 56 // SECP "koblitz-like" curve >= 256 bits
|
/mbedtls-3.7.0/3rdparty/p256-m/p256-m/ |
D | README.md | 74 - "produce incorrect results for some rare curve points" - this is avoided by 76 - "leak secret data when the input isn't a curve point" - this is avoided by 77 validating that points lie on the curve every time a point is deserialized. 299 - TinyCrypt uses a specialised routine for reduction modulo the curve prime, 320 - Operations on curve points 347 associated to the curve's p and n are pre-computed and stored in static 355 - the curve's constants p and n (and associated Montgomery constants); 362 **Operations on curve points.** 373 - curve constants: b from the equation, the base point's coordinates; 374 - point validity check (on the curve and not 0); [all …]
|
/mbedtls-3.7.0/programs/psa/ |
D | psa_constant_names.c | 67 static const char *psa_ecc_family_name(psa_ecc_family_t curve); 74 psa_ecc_family_t curve) in append_with_curve() argument 76 const char *family_name = psa_ecc_family_name(curve); in append_with_curve() 84 "0x%02x", curve); in append_with_curve() 144 psa_ecc_family_t curve) in psa_snprint_ecc_curve() argument 146 const char *name = psa_ecc_family_name(curve); in psa_snprint_ecc_curve() 148 return snprintf(buffer, buffer_size, "0x%02x", (unsigned) curve); in psa_snprint_ecc_curve()
|
D | psa_constant_names_generated.c | 33 static const char *psa_ecc_family_name(psa_ecc_family_t curve) in psa_ecc_family_name() argument 35 switch (curve) { in psa_ecc_family_name()
|
/mbedtls-3.7.0/library/ |
D | pk_internal.h | 94 psa_ecc_family_t curve; in mbedtls_pk_get_ec_group_id() local 100 curve = PSA_KEY_TYPE_ECC_GET_FAMILY(opaque_key_type); in mbedtls_pk_get_ec_group_id() 101 id = mbedtls_ecc_group_from_psa(curve, psa_get_key_bits(&opaque_attrs)); in mbedtls_pk_get_ec_group_id()
|
D | pk_wrap.c | 539 psa_ecc_family_t curve, size_t curve_bits, in ecdsa_verify_psa() argument 553 if (curve == 0) { in ecdsa_verify_psa() 557 psa_set_key_type(&attributes, PSA_KEY_TYPE_ECC_PUBLIC_KEY(curve)); in ecdsa_verify_psa() 611 psa_ecc_family_t curve; in ecdsa_opaque_verify_wrap() local 619 curve = PSA_KEY_TYPE_ECC_GET_FAMILY(psa_get_key_type(&key_attr)); in ecdsa_opaque_verify_wrap() 628 return ecdsa_verify_psa(key, key_len, curve, curve_bits, in ecdsa_opaque_verify_wrap() 639 psa_ecc_family_t curve = pk->ec_family; in ecdsa_verify_wrap() local 642 return ecdsa_verify_psa(pk->pub_raw, pk->pub_raw_len, curve, curve_bits, in ecdsa_verify_wrap() 657 psa_ecc_family_t curve = mbedtls_ecc_group_to_psa(ctx->grp.id, &curve_bits); in ecdsa_verify_wrap() local 666 return ecdsa_verify_psa(key, key_len, curve, curve_bits, in ecdsa_verify_wrap() [all …]
|
D | psa_crypto_ecp.c | 327 psa_ecc_family_t curve = PSA_KEY_TYPE_ECC_GET_FAMILY( in mbedtls_psa_ecp_generate_key() local 330 mbedtls_ecc_group_from_psa(curve, attributes->bits); in mbedtls_psa_ecp_generate_key() 546 psa_ecc_family_t curve = mbedtls_ecc_group_to_psa(ecp->grp.id, &bits); in mbedtls_psa_key_agreement_ecdh() local 550 PSA_KEY_TYPE_ECC_PUBLIC_KEY(curve), in mbedtls_psa_key_agreement_ecdh()
|
D | pk_ecc.c | 108 psa_ecc_family_t curve = mbedtls_ecc_group_to_psa(eck->grp.id, &curve_bits); in mbedtls_pk_ecc_set_pubkey_from_prv() 113 psa_set_key_type(&key_attr, PSA_KEY_TYPE_ECC_KEY_PAIR(curve)); in mbedtls_pk_ecc_set_pubkey_from_prv()
|
D | ecjpake.c | 96 mbedtls_ecp_group_id curve, in mbedtls_ecjpake_setup() argument 114 MBEDTLS_MPI_CHK(mbedtls_ecp_group_load(&ctx->grp, curve)); in mbedtls_ecjpake_setup()
|
/mbedtls-3.7.0/docs/ |
D | psa-transition.md | 202 …EAD with AES-GCM, signature with deterministic ECDSA using SHA-256 on the curve secp256r1 using a … 657 …ion](#rsa-mechanism-selection)”), elliptic curve cryptography (see “[ECC mechanism selection](#ell… 668 …nism selection](#rsa-mechanism-selection)”, “[Elliptic curve mechanism selection](#elliptic-curve-… 670 …nism selection](#rsa-mechanism-selection)”, “[Elliptic curve mechanism selection](#elliptic-curve-… 697 …nism selection](#rsa-mechanism-selection)”, “[Elliptic curve mechanism selection](#elliptic-curve-… 723 #### Elliptic curve mechanism selection 725 …KEY`, `MBEDTLS_PK_ECKEY_DH` and `MBEDTLS_PK_ECDSA` correspond to elliptic-curve key types in the P… 727 …curve)`](https://mbed-tls.readthedocs.io/projects/api/en/development/api/group/group__crypto__type… 729 …curve)`](https://mbed-tls.readthedocs.io/projects/api/en/development/api/group/group__crypto__type… 732 …curve is fully determined by a curve family identifier and the private key size in bits. You can u… [all …]
|
D | driver-only-builds.md | 59 - elliptic-curve cryptography (ECC): ECDH, ECDSA, EC J-PAKE, ECC key types. 131 Elliptic-curve cryptography (ECC) 187 If you want to check at compile-time whether a certain curve is available in 210 curve is identified not by name, but by explicit parameters; 265 Support is pretty similar to the "Elliptic-curve cryptography (ECC)" section
|
/mbedtls-3.7.0/include/psa/ |
D | crypto_values.h | 559 #define PSA_KEY_TYPE_ECC_KEY_PAIR(curve) \ argument 560 (PSA_KEY_TYPE_ECC_KEY_PAIR_BASE | (curve)) 570 #define PSA_KEY_TYPE_ECC_PUBLIC_KEY(curve) \ argument 571 (PSA_KEY_TYPE_ECC_PUBLIC_KEY_BASE | (curve))
|
/mbedtls-3.7.0/include/mbedtls/ |
D | ecjpake.h | 114 mbedtls_ecp_group_id curve,
|
/mbedtls-3.7.0/docs/proposed/ |
D | psa-conditional-inclusion-c.md | 98 …curve key types, only the specified curves are included. To include a curve, include a symbol of t… 173 A mechanism similar to `mbedtls/check_config.h` detects errors such as enabling ECDSA but no curve. 213 The names of [elliptic curve symbols](#configuration-symbols-for-elliptic-curves) are a bit weird: …
|
/mbedtls-3.7.0/docs/architecture/psa-migration/ |
D | psa-legacy-bridges.md | 118 …the pk module. ECC keys can also be further classified according to their curve. The legacy API al… 125 …s internally: the EC-JPAKE interface only needs one piece of metadata, namely, to identify a curve. 129 * Selecting an **elliptic curve**. 192 … ASN.1 ECDSA signature to (r,s) requires the knowledge of the curve, or at least the curve's size.…
|