Home
last modified time | relevance | path

Searched refs:curve (Results 1 – 25 of 42) sorted by relevance

12

/mbedtls-3.7.0/tests/suites/
Dtest_suite_psa_crypto_not_supported.generated.data203 PSA import ECC_KEY_PAIR(BRAINPOOL_P_R1) 160-bit curve not supported
207 PSA generate ECC_KEY_PAIR(BRAINPOOL_P_R1) 160-bit curve not supported
211 PSA import ECC_KEY_PAIR(BRAINPOOL_P_R1) 192-bit curve not supported
215 PSA generate ECC_KEY_PAIR(BRAINPOOL_P_R1) 192-bit curve not supported
219 PSA import ECC_KEY_PAIR(BRAINPOOL_P_R1) 224-bit curve not supported
223 PSA generate ECC_KEY_PAIR(BRAINPOOL_P_R1) 224-bit curve not supported
227 PSA import ECC_KEY_PAIR(BRAINPOOL_P_R1) 256-bit curve not supported
231 PSA generate ECC_KEY_PAIR(BRAINPOOL_P_R1) 256-bit curve not supported
235 PSA import ECC_KEY_PAIR(BRAINPOOL_P_R1) 320-bit curve not supported
239 PSA generate ECC_KEY_PAIR(BRAINPOOL_P_R1) 320-bit curve not supported
[all …]
Dtest_suite_ecjpake.data67 ECJPAKE round one: KKP1: X not on the curve
115 ECJPAKE round one: KKP2: X not on the curve
130 ECJPAKE round two client: ECParams not named curve
133 ECJPAKE round two client: ECParams wrong curve
181 ECJPAKE round two client: X not on the curve
235 ECJPAKE round two server: X not on curve
Dtest_suite_ecdsa.data365 ECDSA verify invalid pub key (not on curve), zero bytes of data
369 ECDSA verify invalid pub key (not on curve), one byte of data
373 ECDSA verify invalid pub key (not on curve), r=1, s=1
377 ECDSA verify invalid pub key (also not on curve), r=1, s=1
381 ECDSA verify invalid pub key (not on curve), r=12345, s=1
385 ECDSA verify invalid pub key (not on curve), r=1, s=12345
Dtest_suite_random.function192 void mbedtls_psa_get_random_ecdsa_sign(int curve)
204 TEST_EQUAL(0, mbedtls_ecp_group_load(&grp, curve));
Dtest_suite_psa_crypto_metadata.function688 psa_ecc_family_t curve = curve_arg;
689 psa_key_type_t public_type = PSA_KEY_TYPE_ECC_PUBLIC_KEY(curve);
690 psa_key_type_t pair_type = PSA_KEY_TYPE_ECC_KEY_PAIR(curve);
692 TEST_PARITY(curve);
697 TEST_EQUAL(PSA_KEY_TYPE_ECC_GET_FAMILY(public_type), curve);
698 TEST_EQUAL(PSA_KEY_TYPE_ECC_GET_FAMILY(pair_type), curve);
Dtest_suite_ecp.data4 ECP curve info #1
8 ECP curve info #2
12 ECP curve info #3
16 ECP curve info #4
20 ECP curve info #5
24 ECP curve info #6
28 ECP curve info #7
32 ECP curve info #8
164 ECP check pubkey Koblitz #1 (point not on curve)
410 ECP tls read group #3 (unknown curve)
[all …]
Dtest_suite_pk.function54 /* Pick an elliptic curve that's supported by PSA. Note that the curve is
57 * This should always find a curve if ECC is enabled in the build, except in
59 * where the only legacy curve is secp224k1, which is not supported in PSA,
61 * support any curve.
66 * This way, if ECDSA is enabled then the curve that's selected here will
120 #endif /* curve selection */
126 /* Pick a second curve, for tests that need two supported curves of the
194 psa_ecc_family_t curve = mbedtls_ecc_group_to_psa(grp_id, &curve_bits);
197 if (curve == 0) {
201 psa_set_key_type(&key_attr, PSA_KEY_TYPE_ECC_KEY_PAIR(curve));
[all …]
Dtest_suite_pk.data1237 PSA import into PSA: ECKEY pair to different curve (bad)
1241 PSA import into PSA: ECKEY_DH pair to different curve (bad)
1245 PSA import into PSA: ECDSA pair to different curve (bad)
1249 PSA import into PSA: ECKEY pair to public, different curve (bad)
1253 PSA import into PSA: ECKEY_DH pair to public, different curve (bad)
1257 PSA import into PSA: ECDSA pair to public, different curve (bad)
1261 PSA import into PSA: ECKEY public to different curve (bad)
1265 PSA import into PSA: ECKEY_DH public to different curve (bad)
1269 PSA import into PSA: ECDSA public to different curve (bad)
1551 # as there is any curve supported either builtin or in a driver. In a scenario
Dtest_suite_ecp.function884 // Load curve info and compare with known values
890 // Load curve from TLS ID and name, and compare IDs
913 // Check curve type, and if it can be used for ECDH/ECDSA
927 // Check curve is in curve list and group ID list
1288 TEST_FAIL("Unknown ECP curve type");
/mbedtls-3.7.0/scripts/
Decp_comb_table.py185 def compute_curve(curve): argument
191 '-DCURVE_ID=MBEDTLS_ECP_DP_%s' % curve.upper(),
192 '-DCURVE_NAME="%s"' % curve.lower(),
232 for curve in sys.argv[1:]:
233 compute_curve(curve)
Decc-heap.sh56 // SECP "koblitz-like" curve >= 256 bits
/mbedtls-3.7.0/3rdparty/p256-m/p256-m/
DREADME.md74 - "produce incorrect results for some rare curve points" - this is avoided by
76 - "leak secret data when the input isn't a curve point" - this is avoided by
77 validating that points lie on the curve every time a point is deserialized.
299 - TinyCrypt uses a specialised routine for reduction modulo the curve prime,
320 - Operations on curve points
347 associated to the curve's p and n are pre-computed and stored in static
355 - the curve's constants p and n (and associated Montgomery constants);
362 **Operations on curve points.**
373 - curve constants: b from the equation, the base point's coordinates;
374 - point validity check (on the curve and not 0);
[all …]
/mbedtls-3.7.0/programs/psa/
Dpsa_constant_names.c67 static const char *psa_ecc_family_name(psa_ecc_family_t curve);
74 psa_ecc_family_t curve) in append_with_curve() argument
76 const char *family_name = psa_ecc_family_name(curve); in append_with_curve()
84 "0x%02x", curve); in append_with_curve()
144 psa_ecc_family_t curve) in psa_snprint_ecc_curve() argument
146 const char *name = psa_ecc_family_name(curve); in psa_snprint_ecc_curve()
148 return snprintf(buffer, buffer_size, "0x%02x", (unsigned) curve); in psa_snprint_ecc_curve()
Dpsa_constant_names_generated.c33 static const char *psa_ecc_family_name(psa_ecc_family_t curve) in psa_ecc_family_name() argument
35 switch (curve) { in psa_ecc_family_name()
/mbedtls-3.7.0/library/
Dpk_internal.h94 psa_ecc_family_t curve; in mbedtls_pk_get_ec_group_id() local
100 curve = PSA_KEY_TYPE_ECC_GET_FAMILY(opaque_key_type); in mbedtls_pk_get_ec_group_id()
101 id = mbedtls_ecc_group_from_psa(curve, psa_get_key_bits(&opaque_attrs)); in mbedtls_pk_get_ec_group_id()
Dpk_wrap.c539 psa_ecc_family_t curve, size_t curve_bits, in ecdsa_verify_psa() argument
553 if (curve == 0) { in ecdsa_verify_psa()
557 psa_set_key_type(&attributes, PSA_KEY_TYPE_ECC_PUBLIC_KEY(curve)); in ecdsa_verify_psa()
611 psa_ecc_family_t curve; in ecdsa_opaque_verify_wrap() local
619 curve = PSA_KEY_TYPE_ECC_GET_FAMILY(psa_get_key_type(&key_attr)); in ecdsa_opaque_verify_wrap()
628 return ecdsa_verify_psa(key, key_len, curve, curve_bits, in ecdsa_opaque_verify_wrap()
639 psa_ecc_family_t curve = pk->ec_family; in ecdsa_verify_wrap() local
642 return ecdsa_verify_psa(pk->pub_raw, pk->pub_raw_len, curve, curve_bits, in ecdsa_verify_wrap()
657 psa_ecc_family_t curve = mbedtls_ecc_group_to_psa(ctx->grp.id, &curve_bits); in ecdsa_verify_wrap() local
666 return ecdsa_verify_psa(key, key_len, curve, curve_bits, in ecdsa_verify_wrap()
[all …]
Dpsa_crypto_ecp.c327 psa_ecc_family_t curve = PSA_KEY_TYPE_ECC_GET_FAMILY( in mbedtls_psa_ecp_generate_key() local
330 mbedtls_ecc_group_from_psa(curve, attributes->bits); in mbedtls_psa_ecp_generate_key()
546 psa_ecc_family_t curve = mbedtls_ecc_group_to_psa(ecp->grp.id, &bits); in mbedtls_psa_key_agreement_ecdh() local
550 PSA_KEY_TYPE_ECC_PUBLIC_KEY(curve), in mbedtls_psa_key_agreement_ecdh()
Dpk_ecc.c108 psa_ecc_family_t curve = mbedtls_ecc_group_to_psa(eck->grp.id, &curve_bits); in mbedtls_pk_ecc_set_pubkey_from_prv()
113 psa_set_key_type(&key_attr, PSA_KEY_TYPE_ECC_KEY_PAIR(curve)); in mbedtls_pk_ecc_set_pubkey_from_prv()
Decjpake.c96 mbedtls_ecp_group_id curve, in mbedtls_ecjpake_setup() argument
114 MBEDTLS_MPI_CHK(mbedtls_ecp_group_load(&ctx->grp, curve)); in mbedtls_ecjpake_setup()
/mbedtls-3.7.0/docs/
Dpsa-transition.md202 …EAD with AES-GCM, signature with deterministic ECDSA using SHA-256 on the curve secp256r1 using a …
657 …ion](#rsa-mechanism-selection)”), elliptic curve cryptography (see “[ECC mechanism selection](#ell…
668 …nism selection](#rsa-mechanism-selection)”, “[Elliptic curve mechanism selection](#elliptic-curve-…
670 …nism selection](#rsa-mechanism-selection)”, “[Elliptic curve mechanism selection](#elliptic-curve-…
697 …nism selection](#rsa-mechanism-selection)”, “[Elliptic curve mechanism selection](#elliptic-curve-…
723 #### Elliptic curve mechanism selection
725 …KEY`, `MBEDTLS_PK_ECKEY_DH` and `MBEDTLS_PK_ECDSA` correspond to elliptic-curve key types in the P…
727curve)`](https://mbed-tls.readthedocs.io/projects/api/en/development/api/group/group__crypto__type…
729curve)`](https://mbed-tls.readthedocs.io/projects/api/en/development/api/group/group__crypto__type…
732curve is fully determined by a curve family identifier and the private key size in bits. You can u…
[all …]
Ddriver-only-builds.md59 - elliptic-curve cryptography (ECC): ECDH, ECDSA, EC J-PAKE, ECC key types.
131 Elliptic-curve cryptography (ECC)
187 If you want to check at compile-time whether a certain curve is available in
210 curve is identified not by name, but by explicit parameters;
265 Support is pretty similar to the "Elliptic-curve cryptography (ECC)" section
/mbedtls-3.7.0/include/psa/
Dcrypto_values.h559 #define PSA_KEY_TYPE_ECC_KEY_PAIR(curve) \ argument
560 (PSA_KEY_TYPE_ECC_KEY_PAIR_BASE | (curve))
570 #define PSA_KEY_TYPE_ECC_PUBLIC_KEY(curve) \ argument
571 (PSA_KEY_TYPE_ECC_PUBLIC_KEY_BASE | (curve))
/mbedtls-3.7.0/include/mbedtls/
Decjpake.h114 mbedtls_ecp_group_id curve,
/mbedtls-3.7.0/docs/proposed/
Dpsa-conditional-inclusion-c.md98curve key types, only the specified curves are included. To include a curve, include a symbol of t…
173 A mechanism similar to `mbedtls/check_config.h` detects errors such as enabling ECDSA but no curve.
213 The names of [elliptic curve symbols](#configuration-symbols-for-elliptic-curves) are a bit weird: …
/mbedtls-3.7.0/docs/architecture/psa-migration/
Dpsa-legacy-bridges.md118 …the pk module. ECC keys can also be further classified according to their curve. The legacy API al…
125 …s internally: the EC-JPAKE interface only needs one piece of metadata, namely, to identify a curve.
129 * Selecting an **elliptic curve**.
192 … ASN.1 ECDSA signature to (r,s) requires the knowledge of the curve, or at least the curve's size.…

12