/dports/devel/dtool/dtool-0.11.0/cargo-crates/p384-0.8.0/ |
H A D | Cargo.toml | 6 # to registry (e.g., crates.io) dependencies 18 description = "NIST P-384 (secp384r1) elliptic curve" 21 keywords = ["crypto", "ecc", "nist", "secp384r1"]
|
/dports/lang/erlang-runtime24/otp-OTP-24.1.7/lib/asn1/test/asn1_SUITE_data/rfcs/ |
H A D | PKIXAlgs-2009.asn1 | 116 g INTEGER 137 g INTEGER, -- generator, g 150 DHPublicKey ::= INTEGER -- public key, y = g^x mod p 243 { ID secp384r1 } | { ID sect409k1 } | { ID sect409r1 } | 257 -- secp224r1 as P-224, secp256r1 as P-256, secp384r1 as P-384, 289 secp384r1 OBJECT IDENTIFIER ::= {
|
/dports/lang/erlang-runtime23/otp-OTP-23.3.4.10/lib/asn1/test/asn1_SUITE_data/rfcs/ |
H A D | PKIXAlgs-2009.asn1 | 116 g INTEGER 137 g INTEGER, -- generator, g 150 DHPublicKey ::= INTEGER -- public key, y = g^x mod p 243 { ID secp384r1 } | { ID sect409k1 } | { ID sect409r1 } | 257 -- secp224r1 as P-224, secp256r1 as P-256, secp384r1 as P-384, 289 secp384r1 OBJECT IDENTIFIER ::= {
|
/dports/lang/erlang-runtime22/otp-OTP-22.3.4.24/lib/asn1/test/asn1_SUITE_data/rfcs/ |
H A D | PKIXAlgs-2009.asn1 | 116 g INTEGER 137 g INTEGER, -- generator, g 150 DHPublicKey ::= INTEGER -- public key, y = g^x mod p 243 { ID secp384r1 } | { ID sect409k1 } | { ID sect409r1 } | 257 -- secp224r1 as P-224, secp256r1 as P-256, secp384r1 as P-384, 289 secp384r1 OBJECT IDENTIFIER ::= {
|
/dports/lang/erlang-wx/otp-OTP-24.1.7/lib/asn1/test/asn1_SUITE_data/rfcs/ |
H A D | PKIXAlgs-2009.asn1 | 116 g INTEGER 137 g INTEGER, -- generator, g 150 DHPublicKey ::= INTEGER -- public key, y = g^x mod p 243 { ID secp384r1 } | { ID sect409k1 } | { ID sect409r1 } | 257 -- secp224r1 as P-224, secp256r1 as P-256, secp384r1 as P-384, 289 secp384r1 OBJECT IDENTIFIER ::= {
|
/dports/lang/erlang/otp-OTP-24.1.7/lib/asn1/test/asn1_SUITE_data/rfcs/ |
H A D | PKIXAlgs-2009.asn1 | 116 g INTEGER 137 g INTEGER, -- generator, g 150 DHPublicKey ::= INTEGER -- public key, y = g^x mod p 243 { ID secp384r1 } | { ID sect409k1 } | { ID sect409r1 } | 257 -- secp224r1 as P-224, secp256r1 as P-256, secp384r1 as P-384, 289 secp384r1 OBJECT IDENTIFIER ::= {
|
/dports/lang/erlang-java/otp-OTP-24.1.7/lib/asn1/test/asn1_SUITE_data/rfcs/ |
H A D | PKIXAlgs-2009.asn1 | 116 g INTEGER 137 g INTEGER, -- generator, g 150 DHPublicKey ::= INTEGER -- public key, y = g^x mod p 243 { ID secp384r1 } | { ID sect409k1 } | { ID sect409r1 } | 257 -- secp224r1 as P-224, secp256r1 as P-256, secp384r1 as P-384, 289 secp384r1 OBJECT IDENTIFIER ::= {
|
/dports/lang/erlang-runtime21/otp-OTP-21.3.8.24/lib/asn1/test/asn1_SUITE_data/rfcs/ |
H A D | PKIXAlgs-2009.asn1 | 116 g INTEGER 137 g INTEGER, -- generator, g 150 DHPublicKey ::= INTEGER -- public key, y = g^x mod p 243 { ID secp384r1 } | { ID sect409k1 } | { ID sect409r1 } | 257 -- secp224r1 as P-224, secp256r1 as P-256, secp384r1 as P-384, 289 secp384r1 OBJECT IDENTIFIER ::= {
|
/dports/security/openvpn-devel/openvpn-0033811e0215af76f469d78912c95a2f59813454/ |
H A D | README.ec | 13 for ECDH too. When autodetection fails (e.g. when using RSA certificates) 15 secp384r1 curve. The list of groups/curves that the crypto library will choose
|
/dports/security/dehydrated/dehydrated-0.7.0/ |
H A D | README.md | 8 Dehydrated is a client for signing certificates with an ACME-server (e.g. Let's Encrypt) implemente… 43 Have a look at [docs/examples/config](docs/examples/config) to get started, copy it to e.g. `/etc/d… 75 …--keep-going (-g) Keep going after encountering an error while creating/renewing mu… 88 …--algo (-a) rsa|prime256v1|secp384r1 Which public key algorithm should be used? Supported: rsa, pr… 101 If you have hardware laying around that you think I'd enjoy playing with (e.g. decommissioned but s…
|
H A D | dehydrated | 52 …grep -E '^\['"$(json_path "${1:-}" "${2:-}")"',[0-9]*\]' | sed -e 's/\[[^\]*\][[:space:]]*//g' -e … 348 KEY_ALGO=secp384r1 1285 chmod g+r "${alpncertdir}/${altname}.key.pem" "${alpncertdir}/${altname}.crt.pem" 1318 prime256v1|secp384r1) _openssl ecparam -genkey -name "${KEY_ALGO}" -out "${tmp_privkey}";; 1335 …prime256v1|secp384r1) _openssl ecparam -genkey -name "${KEY_ALGO}" -out "${certdir}/privkey.roll.p… 1652 …certnames="$("${OPENSSL}" x509 -in "${cert}" -text -noout | grep DNS: | _sed 's/DNS://g' | tr -d '… 1719 …er "HOST" "$(echo "${ocsp_url}" | _sed -e 's/^http(s?):\/\///' -e 's/\/.*$//g')" 2>&1)" || _exiter…
|
/dports/java/openjdk16/jdk16u-jdk-16.0.2-7-1/src/java.base/share/classes/sun/security/util/ |
H A D | CurveDB.java | 125 ECPoint g = new ECPoint(bi(x), bi(y)); in add() local 128 NamedCurve params = new NamedCurve(o, curve, g, bi(n), h); in add() 267 add(KnownOIDs.secp384r1, PD, in add() argument
|
/dports/java/openjdk17/jdk17u-jdk-17.0.1-12-1/src/java.base/share/classes/sun/security/util/ |
H A D | CurveDB.java | 125 ECPoint g = new ECPoint(bi(x), bi(y)); in add() local 128 NamedCurve params = new NamedCurve(o, curve, g, bi(n), h); in add() 267 add(KnownOIDs.secp384r1, PD, in add() argument
|
/dports/java/openjdk15/jdk15u-jdk-15.0.6-1-1/src/java.base/share/classes/sun/security/util/ |
H A D | CurveDB.java | 130 ECPoint g = new ECPoint(bi(x), bi(y)); in add() local 133 NamedCurve params = new NamedCurve(o, curve, g, bi(n), h); in add() 272 add(KnownOIDs.secp384r1, PD, in add() argument
|
/dports/lang/seed7/seed7/lib/ |
H A D | elliptic.s7i | 104 var ecPoint: g is ecPoint.value; # Base point of the elliptic curve. 105 var bigInteger: n is 0_; # Order of g (mult(g, n) = neutralEcPoint). 117 * @param g Base point of the elliptic curve. 118 * @param n Order of g (mult(g, n) = neutralEcPoint). 130 curve.g := g; 199 * The elliptical curve secp384r1. 201 const ellipticCurve: secp384r1 is ellipticCurve( 202 384, "secp384r1", 536 keyPair.publicKey := multFast(curve, curve.g, keyPair.privateKey); 588 kg := multFast(curve, curve.g, k); [all …]
|
/dports/net/wireshark-lite/wireshark-3.6.1/epan/dissectors/asn1/pkcs1/ |
H A D | PKIXAlgs-2009.asn | 142 g INTEGER 163 g INTEGER, -- generator, g 174 DHPublicKey ::= INTEGER -- public key, y = g^x mod p 357 { ID secp384r1 } | { ID sect409k1 } | { ID sect409r1 } | 371 -- secp224r1 as P-224, secp256r1 as P-256, secp384r1 as P-384, 403 secp384r1 OBJECT IDENTIFIER ::= {
|
/dports/net/tshark-lite/wireshark-3.6.1/epan/dissectors/asn1/pkcs1/ |
H A D | PKIXAlgs-2009.asn | 142 g INTEGER 163 g INTEGER, -- generator, g 174 DHPublicKey ::= INTEGER -- public key, y = g^x mod p 357 { ID secp384r1 } | { ID sect409k1 } | { ID sect409r1 } | 371 -- secp224r1 as P-224, secp256r1 as P-256, secp384r1 as P-384, 403 secp384r1 OBJECT IDENTIFIER ::= {
|
/dports/net/tshark/wireshark-3.6.1/epan/dissectors/asn1/pkcs1/ |
H A D | PKIXAlgs-2009.asn | 142 g INTEGER 163 g INTEGER, -- generator, g 174 DHPublicKey ::= INTEGER -- public key, y = g^x mod p 357 { ID secp384r1 } | { ID sect409k1 } | { ID sect409r1 } | 371 -- secp224r1 as P-224, secp256r1 as P-256, secp384r1 as P-384, 403 secp384r1 OBJECT IDENTIFIER ::= {
|
/dports/net/wireshark/wireshark-3.6.1/epan/dissectors/asn1/pkcs1/ |
H A D | PKIXAlgs-2009.asn | 142 g INTEGER 163 g INTEGER, -- generator, g 174 DHPublicKey ::= INTEGER -- public key, y = g^x mod p 357 { ID secp384r1 } | { ID sect409k1 } | { ID sect409r1 } | 371 -- secp224r1 as P-224, secp256r1 as P-256, secp384r1 as P-384, 403 secp384r1 OBJECT IDENTIFIER ::= {
|
/dports/lang/erlang-runtime22/otp-OTP-22.3.4.24/lib/ssh/src/ |
H A D | ssh_transport.erl | 510 ssh_packet(#ssh_msg_kex_dh_gex_group{p = P, g = G}, Ssh0), 542 ssh_packet(#ssh_msg_kex_dh_gex_group{p = P, g = G}, Ssh0), 570 handle_kex_dh_gex_group(#ssh_msg_kex_dh_gex_group{p = P, g = G}, Ssh0) -> 804 extract_public_key(#'DSAPrivateKey'{y = Y, p = P, q = Q, g = G}) -> 805 {Y, #'Dss-Parms'{p=P, q=Q, g=G}}; 816 {Y, #'Dss-Parms'{p=P, q=Q, g=G}} 1842 sha('ecdsa-sha2-nistp384') -> sha(secp384r1); 1847 sha(secp384r1) -> sha384; 1857 sha(?'secp384r1') -> sha(secp384r1); 1860 sha('ecdh-sha2-nistp384') -> sha(secp384r1); [all …]
|
/dports/lang/erlang-runtime23/otp-OTP-23.3.4.10/lib/ssh/src/ |
H A D | ssh_transport.erl | 597 ssh_packet(#ssh_msg_kex_dh_gex_group{p = P, g = G}, Ssh0), 629 ssh_packet(#ssh_msg_kex_dh_gex_group{p = P, g = G}, Ssh0), 657 handle_kex_dh_gex_group(#ssh_msg_kex_dh_gex_group{p = P, g = G}, Ssh0) -> 891 extract_public_key(#'DSAPrivateKey'{y = Y, p = P, q = Q, g = G}) -> 892 {Y, #'Dss-Parms'{p=P, q=Q, g=G}}; 903 {Y, #'Dss-Parms'{p=P, q=Q, g=G}} 2031 sha('ecdsa-sha2-nistp384') -> sha(secp384r1); 2036 sha(secp384r1) -> sha384; 2046 sha(?'secp384r1') -> sha(secp384r1); 2049 sha('ecdh-sha2-nistp384') -> sha(secp384r1); [all …]
|
/dports/lang/erlang-runtime24/otp-OTP-24.1.7/lib/ssh/src/ |
H A D | ssh_transport.erl | 605 ssh_packet(#ssh_msg_kex_dh_gex_group{p = P, g = G}, Ssh0), 637 ssh_packet(#ssh_msg_kex_dh_gex_group{p = P, g = G}, Ssh0), 665 handle_kex_dh_gex_group(#ssh_msg_kex_dh_gex_group{p = P, g = G}, Ssh0) -> 911 extract_public_key(#'DSAPrivateKey'{y = Y, p = P, q = Q, g = G}) -> 912 {Y, #'Dss-Parms'{p=P, q=Q, g=G}}; 923 {Y, #'Dss-Parms'{p=P, q=Q, g=G}} 2068 sha('ecdsa-sha2-nistp384') -> sha(secp384r1); 2073 sha(secp384r1) -> sha384; 2083 sha(?'secp384r1') -> sha(secp384r1); 2086 sha('ecdh-sha2-nistp384') -> sha(secp384r1); [all …]
|
/dports/lang/erlang-runtime21/otp-OTP-21.3.8.24/lib/ssh/src/ |
H A D | ssh_transport.erl | 512 ssh_packet(#ssh_msg_kex_dh_gex_group{p = P, g = G}, Ssh0), 544 ssh_packet(#ssh_msg_kex_dh_gex_group{p = P, g = G}, Ssh0), 572 handle_kex_dh_gex_group(#ssh_msg_kex_dh_gex_group{p = P, g = G}, Ssh0) -> 806 extract_public_key(#'DSAPrivateKey'{y = Y, p = P, q = Q, g = G}) -> 807 {Y, #'Dss-Parms'{p=P, q=Q, g=G}}; 818 {Y, #'Dss-Parms'{p=P, q=Q, g=G}} 1994 sha('ecdsa-sha2-nistp384') -> sha(secp384r1); 1999 sha(secp384r1) -> sha384; 2009 sha(?'secp384r1') -> sha(secp384r1); 2012 sha('ecdh-sha2-nistp384') -> sha(secp384r1); [all …]
|
/dports/lang/erlang-wx/otp-OTP-24.1.7/lib/ssh/src/ |
H A D | ssh_transport.erl | 605 ssh_packet(#ssh_msg_kex_dh_gex_group{p = P, g = G}, Ssh0), 637 ssh_packet(#ssh_msg_kex_dh_gex_group{p = P, g = G}, Ssh0), 665 handle_kex_dh_gex_group(#ssh_msg_kex_dh_gex_group{p = P, g = G}, Ssh0) -> 911 extract_public_key(#'DSAPrivateKey'{y = Y, p = P, q = Q, g = G}) -> 912 {Y, #'Dss-Parms'{p=P, q=Q, g=G}}; 923 {Y, #'Dss-Parms'{p=P, q=Q, g=G}} 2068 sha('ecdsa-sha2-nistp384') -> sha(secp384r1); 2073 sha(secp384r1) -> sha384; 2083 sha(?'secp384r1') -> sha(secp384r1); 2086 sha('ecdh-sha2-nistp384') -> sha(secp384r1); [all …]
|
/dports/lang/erlang/otp-OTP-24.1.7/lib/ssh/src/ |
H A D | ssh_transport.erl | 605 ssh_packet(#ssh_msg_kex_dh_gex_group{p = P, g = G}, Ssh0), 637 ssh_packet(#ssh_msg_kex_dh_gex_group{p = P, g = G}, Ssh0), 665 handle_kex_dh_gex_group(#ssh_msg_kex_dh_gex_group{p = P, g = G}, Ssh0) -> 911 extract_public_key(#'DSAPrivateKey'{y = Y, p = P, q = Q, g = G}) -> 912 {Y, #'Dss-Parms'{p=P, q=Q, g=G}}; 923 {Y, #'Dss-Parms'{p=P, q=Q, g=G}} 2068 sha('ecdsa-sha2-nistp384') -> sha(secp384r1); 2073 sha(secp384r1) -> sha384; 2083 sha(?'secp384r1') -> sha(secp384r1); 2086 sha('ecdh-sha2-nistp384') -> sha(secp384r1); [all …]
|