Linux sagir-us1.hostever.us 5.14.0-570.51.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Wed Oct 8 09:41:34 EDT 2025 x86_64
LiteSpeed
Server IP : 104.247.108.91 & Your IP : 216.73.216.105
Domains : 74 Domain
User : georgeto
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
local /
apps /
openssl-30 /
share /
man /
man7 /
Delete
Unzip
Name
Size
Permission
Date
Action
EVP_ASYM_CIPHER-SM2.7ossl
5.33
KB
-rw-r--r--
2023-01-11 06:21
EVP_CIPHER-AES.7ossl
9.01
KB
-rw-r--r--
2023-01-11 06:21
EVP_CIPHER-ARIA.7ossl
6.98
KB
-rw-r--r--
2023-01-11 06:21
EVP_CIPHER-BLOWFISH.7ossl
5.11
KB
-rw-r--r--
2023-01-11 06:21
EVP_CIPHER-CAMELLIA.7ossl
6.88
KB
-rw-r--r--
2023-01-11 06:21
EVP_CIPHER-CAST.7ossl
5.72
KB
-rw-r--r--
2023-01-11 06:21
EVP_CIPHER-CHACHA.7ossl
5.01
KB
-rw-r--r--
2023-01-11 06:21
EVP_CIPHER-DES.7ossl
6.51
KB
-rw-r--r--
2023-01-11 06:21
EVP_CIPHER-IDEA.7ossl
5.24
KB
-rw-r--r--
2023-01-11 06:21
EVP_CIPHER-RC2.7ossl
5.53
KB
-rw-r--r--
2023-01-11 06:21
EVP_CIPHER-RC4.7ossl
5.08
KB
-rw-r--r--
2023-01-11 06:21
EVP_CIPHER-RC5.7ossl
5.28
KB
-rw-r--r--
2023-01-11 06:21
EVP_CIPHER-SEED.7ossl
5.29
KB
-rw-r--r--
2023-01-11 06:21
EVP_CIPHER-SM4.7ossl
5.39
KB
-rw-r--r--
2023-01-11 06:21
EVP_KDF-HKDF.7ossl
10.77
KB
-rw-r--r--
2023-01-11 06:21
EVP_KDF-KB.7ossl
11.58
KB
-rw-r--r--
2023-01-11 06:21
EVP_KDF-KRB5KDF.7ossl
8.39
KB
-rw-r--r--
2023-01-11 06:21
EVP_KDF-PBKDF1.7ossl
7.03
KB
-rw-r--r--
2023-01-11 06:21
EVP_KDF-PBKDF2.7ossl
7.9
KB
-rw-r--r--
2023-01-11 06:21
EVP_KDF-PKCS12KDF.7ossl
7.34
KB
-rw-r--r--
2023-01-11 06:21
EVP_KDF-SCRYPT.7ossl
10.39
KB
-rw-r--r--
2023-01-11 06:21
EVP_KDF-SS.7ossl
11.6
KB
-rw-r--r--
2023-01-11 06:21
EVP_KDF-SSHKDF.7ossl
10.38
KB
-rw-r--r--
2023-01-11 06:21
EVP_KDF-TLS13_KDF.7ossl
9.95
KB
-rw-r--r--
2023-01-11 06:21
EVP_KDF-TLS1_PRF.7ossl
8.06
KB
-rw-r--r--
2023-01-11 06:21
EVP_KDF-X942-ASN1.7ossl
10.87
KB
-rw-r--r--
2023-01-11 06:21
EVP_KDF-X942-CONCAT.7ossl
4.93
KB
-rw-r--r--
2023-01-11 06:21
EVP_KDF-X963.7ossl
7.78
KB
-rw-r--r--
2023-01-11 06:21
EVP_KEM-RSA.7ossl
5.78
KB
-rw-r--r--
2023-01-11 06:21
EVP_KEYEXCH-DH.7ossl
9.63
KB
-rw-r--r--
2023-01-11 06:21
EVP_KEYEXCH-ECDH.7ossl
9.37
KB
-rw-r--r--
2023-01-11 06:21
EVP_KEYEXCH-X25519.7ossl
5.36
KB
-rw-r--r--
2023-01-11 06:21
EVP_KEYEXCH-X448.7ossl
5.36
KB
-rw-r--r--
2023-01-11 06:21
EVP_KEYMGMT-CMAC.7ossl
7.85
KB
-rw-r--r--
2023-01-11 06:21
EVP_KEYMGMT-DH.7ossl
18.44
KB
-rw-r--r--
2023-01-11 06:21
EVP_KEYMGMT-DHX.7ossl
18.44
KB
-rw-r--r--
2023-01-11 06:21
EVP_KEYMGMT-DSA.7ossl
8.59
KB
-rw-r--r--
2023-01-11 06:21
EVP_KEYMGMT-EC.7ossl
18.48
KB
-rw-r--r--
2023-01-11 06:21
EVP_KEYMGMT-ED25519.7ossl
8.07
KB
-rw-r--r--
2023-01-11 06:21
EVP_KEYMGMT-ED448.7ossl
8.07
KB
-rw-r--r--
2023-01-11 06:21
EVP_KEYMGMT-HMAC.7ossl
7.85
KB
-rw-r--r--
2023-01-11 06:21
EVP_KEYMGMT-Poly1305.7ossl
7.85
KB
-rw-r--r--
2023-01-11 06:21
EVP_KEYMGMT-RSA.7ossl
21.25
KB
-rw-r--r--
2023-01-11 06:21
EVP_KEYMGMT-SM2.7ossl
7.66
KB
-rw-r--r--
2023-01-11 06:21
EVP_KEYMGMT-Siphash.7ossl
7.85
KB
-rw-r--r--
2023-01-11 06:21
EVP_KEYMGMT-X25519.7ossl
8.07
KB
-rw-r--r--
2023-01-11 06:21
EVP_KEYMGMT-X448.7ossl
8.07
KB
-rw-r--r--
2023-01-11 06:21
EVP_MAC-BLAKE2.7ossl
7.65
KB
-rw-r--r--
2023-01-11 06:21
EVP_MAC-BLAKE2BMAC.7ossl
7.65
KB
-rw-r--r--
2023-01-11 06:21
EVP_MAC-BLAKE2SMAC.7ossl
7.65
KB
-rw-r--r--
2023-01-11 06:21
EVP_MAC-CMAC.7ossl
7.09
KB
-rw-r--r--
2023-01-11 06:21
EVP_MAC-GMAC.7ossl
7
KB
-rw-r--r--
2023-01-11 06:21
EVP_MAC-HMAC.7ossl
8.09
KB
-rw-r--r--
2023-01-11 06:21
EVP_MAC-KMAC.7ossl
9.92
KB
-rw-r--r--
2023-01-11 06:21
EVP_MAC-KMAC128.7ossl
9.92
KB
-rw-r--r--
2023-01-11 06:21
EVP_MAC-KMAC256.7ossl
9.92
KB
-rw-r--r--
2023-01-11 06:21
EVP_MAC-Poly1305.7ossl
6.23
KB
-rw-r--r--
2023-01-11 06:21
EVP_MAC-Siphash.7ossl
6.53
KB
-rw-r--r--
2023-01-11 06:21
EVP_MD-BLAKE2.7ossl
5.09
KB
-rw-r--r--
2023-01-11 06:21
EVP_MD-KECCAK-KMAC.7ossl
6.8
KB
-rw-r--r--
2023-01-11 06:21
EVP_MD-MD2.7ossl
4.84
KB
-rw-r--r--
2023-01-11 06:21
EVP_MD-MD4.7ossl
4.84
KB
-rw-r--r--
2023-01-11 06:21
EVP_MD-MD5-SHA1.7ossl
5.92
KB
-rw-r--r--
2023-01-11 06:21
EVP_MD-MD5.7ossl
4.84
KB
-rw-r--r--
2023-01-11 06:21
EVP_MD-MDC2.7ossl
5.53
KB
-rw-r--r--
2023-01-11 06:21
EVP_MD-RIPEMD160.7ossl
5.07
KB
-rw-r--r--
2023-01-11 06:21
EVP_MD-SHA1.7ossl
5.92
KB
-rw-r--r--
2023-01-11 06:21
EVP_MD-SHA2.7ossl
5.84
KB
-rw-r--r--
2023-01-11 06:21
EVP_MD-SHA3.7ossl
5.26
KB
-rw-r--r--
2023-01-11 06:21
EVP_MD-SHAKE.7ossl
6.8
KB
-rw-r--r--
2023-01-11 06:21
EVP_MD-SM3.7ossl
4.84
KB
-rw-r--r--
2023-01-11 06:21
EVP_MD-WHIRLPOOL.7ossl
4.87
KB
-rw-r--r--
2023-01-11 06:21
EVP_MD-common.7ossl
6.01
KB
-rw-r--r--
2023-01-11 06:21
EVP_PKEY-CMAC.7ossl
7.85
KB
-rw-r--r--
2023-01-11 06:21
EVP_PKEY-DH.7ossl
18.44
KB
-rw-r--r--
2023-01-11 06:21
EVP_PKEY-DHX.7ossl
18.44
KB
-rw-r--r--
2023-01-11 06:21
EVP_PKEY-DSA.7ossl
8.59
KB
-rw-r--r--
2023-01-11 06:21
EVP_PKEY-EC.7ossl
18.48
KB
-rw-r--r--
2023-01-11 06:21
EVP_PKEY-ED25519.7ossl
8.07
KB
-rw-r--r--
2023-01-11 06:21
EVP_PKEY-ED448.7ossl
8.07
KB
-rw-r--r--
2023-01-11 06:21
EVP_PKEY-FFC.7ossl
15.62
KB
-rw-r--r--
2023-01-11 06:21
EVP_PKEY-HMAC.7ossl
7.85
KB
-rw-r--r--
2023-01-11 06:21
EVP_PKEY-Poly1305.7ossl
7.85
KB
-rw-r--r--
2023-01-11 06:21
EVP_PKEY-RSA.7ossl
21.25
KB
-rw-r--r--
2023-01-11 06:21
EVP_PKEY-SM2.7ossl
7.66
KB
-rw-r--r--
2023-01-11 06:21
EVP_PKEY-Siphash.7ossl
7.85
KB
-rw-r--r--
2023-01-11 06:21
EVP_PKEY-X25519.7ossl
8.07
KB
-rw-r--r--
2023-01-11 06:21
EVP_PKEY-X448.7ossl
8.07
KB
-rw-r--r--
2023-01-11 06:21
EVP_RAND-CTR-DRBG.7ossl
9.75
KB
-rw-r--r--
2023-01-11 06:21
EVP_RAND-HASH-DRBG.7ossl
9.31
KB
-rw-r--r--
2023-01-11 06:21
EVP_RAND-HMAC-DRBG.7ossl
9.59
KB
-rw-r--r--
2023-01-11 06:21
EVP_RAND-SEED-SRC.7ossl
6.89
KB
-rw-r--r--
2023-01-11 06:21
EVP_RAND-TEST-RAND.7ossl
10.11
KB
-rw-r--r--
2023-01-11 06:21
EVP_RAND.7ossl
17.49
KB
-rw-r--r--
2023-01-11 06:21
EVP_SIGNATURE-CMAC.7ossl
5.68
KB
-rw-r--r--
2023-01-11 06:21
EVP_SIGNATURE-DSA.7ossl
6.2
KB
-rw-r--r--
2023-01-11 06:21
EVP_SIGNATURE-ECDSA.7ossl
6.21
KB
-rw-r--r--
2023-01-11 06:21
EVP_SIGNATURE-ED25519.7ossl
7.81
KB
-rw-r--r--
2023-01-11 06:21
EVP_SIGNATURE-ED448.7ossl
7.81
KB
-rw-r--r--
2023-01-11 06:21
EVP_SIGNATURE-HMAC.7ossl
5.68
KB
-rw-r--r--
2023-01-11 06:21
EVP_SIGNATURE-Poly1305.7ossl
5.68
KB
-rw-r--r--
2023-01-11 06:21
EVP_SIGNATURE-RSA.7ossl
9.96
KB
-rw-r--r--
2023-01-11 06:21
EVP_SIGNATURE-Siphash.7ossl
5.68
KB
-rw-r--r--
2023-01-11 06:21
Ed25519.7ossl
7.81
KB
-rw-r--r--
2023-01-11 06:21
Ed448.7ossl
7.81
KB
-rw-r--r--
2023-01-11 06:21
OPENSSL_API_COMPAT.7ossl
7.27
KB
-rw-r--r--
2023-01-11 06:21
OPENSSL_NO_DEPRECATED.7ossl
7.27
KB
-rw-r--r--
2023-01-11 06:21
OSSL_PROVIDER-FIPS.7ossl
23.82
KB
-rw-r--r--
2023-01-11 06:21
OSSL_PROVIDER-base.7ossl
6.82
KB
-rw-r--r--
2023-01-11 06:21
OSSL_PROVIDER-default.7ossl
13.35
KB
-rw-r--r--
2023-01-11 06:21
OSSL_PROVIDER-legacy.7ossl
7.33
KB
-rw-r--r--
2023-01-11 06:21
OSSL_PROVIDER-null.7ossl
4.8
KB
-rw-r--r--
2023-01-11 06:21
RAND.7ossl
7.46
KB
-rw-r--r--
2023-01-11 06:21
RSA-PSS.7ossl
6.06
KB
-rw-r--r--
2023-01-11 06:21
RSA.7ossl
21.25
KB
-rw-r--r--
2023-01-11 06:21
SM2.7ossl
7.66
KB
-rw-r--r--
2023-01-11 06:21
X25519.7ossl
6.33
KB
-rw-r--r--
2023-01-11 06:21
X448.7ossl
6.33
KB
-rw-r--r--
2023-01-11 06:21
bio.7ossl
7.08
KB
-rw-r--r--
2023-01-11 06:21
crypto.7ossl
27.17
KB
-rw-r--r--
2023-01-11 06:21
ct.7ossl
5.52
KB
-rw-r--r--
2023-01-11 06:21
des_modes.7ossl
10.48
KB
-rw-r--r--
2023-01-11 06:21
evp.7ossl
9.5
KB
-rw-r--r--
2023-01-11 06:21
fips_module.7ossl
24.37
KB
-rw-r--r--
2023-01-11 06:21
life_cycle-cipher.7ossl
13.68
KB
-rw-r--r--
2023-01-11 06:21
life_cycle-digest.7ossl
8.58
KB
-rw-r--r--
2023-01-11 06:21
life_cycle-kdf.7ossl
7.15
KB
-rw-r--r--
2023-01-11 06:21
life_cycle-mac.7ossl
7.85
KB
-rw-r--r--
2023-01-11 06:21
life_cycle-pkey.7ossl
19.27
KB
-rw-r--r--
2023-01-11 06:21
life_cycle-rand.7ossl
7.82
KB
-rw-r--r--
2023-01-11 06:21
migration_guide.7ossl
98.63
KB
-rw-r--r--
2023-01-11 06:21
openssl-core.h.7ossl
8.71
KB
-rw-r--r--
2023-01-11 06:21
openssl-core_dispatch.h.7ossl
5.39
KB
-rw-r--r--
2023-01-11 06:21
openssl-core_names.h.7ossl
5.49
KB
-rw-r--r--
2023-01-11 06:21
openssl-env.7ossl
7.61
KB
-rw-r--r--
2023-01-11 06:21
openssl-glossary.7ossl
11.9
KB
-rw-r--r--
2023-01-11 06:21
openssl-threads.7ossl
8.8
KB
-rw-r--r--
2023-01-11 06:21
openssl_user_macros.7ossl
7.27
KB
-rw-r--r--
2023-01-11 06:21
ossl_store-file.7ossl
6.3
KB
-rw-r--r--
2023-01-11 06:21
ossl_store.7ossl
6.69
KB
-rw-r--r--
2023-01-11 06:21
passphrase-encoding.7ossl
11.58
KB
-rw-r--r--
2023-01-11 06:21
property.7ossl
10.59
KB
-rw-r--r--
2023-01-11 06:21
provider-asym_cipher.7ossl
18.36
KB
-rw-r--r--
2023-01-11 06:21
provider-base.7ossl
42.32
KB
-rw-r--r--
2023-01-11 06:21
provider-cipher.7ossl
16.36
KB
-rw-r--r--
2023-01-11 06:21
provider-decoder.7ossl
16.28
KB
-rw-r--r--
2023-01-11 06:21
provider-digest.7ossl
17.04
KB
-rw-r--r--
2023-01-11 06:21
provider-encoder.7ossl
17.43
KB
-rw-r--r--
2023-01-11 06:21
provider-kdf.7ossl
21.8
KB
-rw-r--r--
2023-01-11 06:21
provider-kem.7ossl
13.66
KB
-rw-r--r--
2023-01-11 06:21
provider-keyexch.7ossl
15.76
KB
-rw-r--r--
2023-01-11 06:21
provider-keymgmt.7ossl
23.48
KB
-rw-r--r--
2023-01-11 06:21
provider-mac.7ossl
14.16
KB
-rw-r--r--
2023-01-11 06:21
provider-object.7ossl
11.31
KB
-rw-r--r--
2023-01-11 06:21
provider-rand.7ossl
19.56
KB
-rw-r--r--
2023-01-11 06:21
provider-signature.7ossl
28.33
KB
-rw-r--r--
2023-01-11 06:21
provider-storemgmt.7ossl
13.61
KB
-rw-r--r--
2023-01-11 06:21
provider.7ossl
13.54
KB
-rw-r--r--
2023-01-11 06:21
proxy-certificates.7ossl
16.89
KB
-rw-r--r--
2023-01-11 06:21
ssl.7ossl
8.14
KB
-rw-r--r--
2023-01-11 06:21
x509.7ossl
6.56
KB
-rw-r--r--
2023-01-11 06:21
Save
Rename
.\" Automatically generated by Pod::Man 2.27 (Pod::Simple 3.28) .\" .\" Standard preamble: .\" ======================================================================== .de Sp \" Vertical space (when we can't use .PP) .if t .sp .5v .if n .sp .. .de Vb \" Begin verbatim text .ft CW .nf .ne \\$1 .. .de Ve \" End verbatim text .ft R .fi .. .\" Set up some character translations and predefined strings. \*(-- will .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left .\" double quote, and \*(R" will give a right double quote. \*(C+ will .\" give a nicer C++. Capital omega is used to do unbreakable dashes and .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff, .\" nothing in troff, for use with C<>. .tr \(*W- .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p' .ie n \{\ . ds -- \(*W- . ds PI pi . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch . ds L" "" . ds R" "" . ds C` "" . ds C' "" 'br\} .el\{\ . ds -- \|\(em\| . ds PI \(*p . ds L" `` . ds R" '' . ds C` . ds C' 'br\} .\" .\" Escape single quotes in literal strings from groff's Unicode transform. .ie \n(.g .ds Aq \(aq .el .ds Aq ' .\" .\" If the F register is turned on, we'll generate index entries on stderr for .\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index .\" entries marked with X<> in POD. Of course, you'll have to process the .\" output yourself in some meaningful fashion. .\" .\" Avoid warning from groff about undefined register 'F'. .de IX .. .nr rF 0 .if \n(.g .if rF .nr rF 1 .if (\n(rF:(\n(.g==0)) \{ . if \nF \{ . de IX . tm Index:\\$1\t\\n%\t"\\$2" .. . if !\nF==2 \{ . nr % 0 . nr F 2 . \} . \} .\} .rr rF .\" .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2). .\" Fear. Run. Save yourself. No user-serviceable parts. . \" fudge factors for nroff and troff .if n \{\ . ds #H 0 . ds #V .8m . ds #F .3m . ds #[ \f1 . ds #] \fP .\} .if t \{\ . ds #H ((1u-(\\\\n(.fu%2u))*.13m) . ds #V .6m . ds #F 0 . ds #[ \& . ds #] \& .\} . \" simple accents for nroff and troff .if n \{\ . ds ' \& . ds ` \& . ds ^ \& . ds , \& . ds ~ ~ . ds / .\} .if t \{\ . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u' . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u' . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u' . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u' .\} . \" troff and (daisy-wheel) nroff accents .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V' .ds 8 \h'\*(#H'\(*b\h'-\*(#H' .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#] .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H' .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u' .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#] .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#] .ds ae a\h'-(\w'a'u*4/10)'e .ds Ae A\h'-(\w'A'u*4/10)'E . \" corrections for vroff .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u' .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u' . \" for low resolution devices (crt and lpr) .if \n(.H>23 .if \n(.V>19 \ \{\ . ds : e . ds 8 ss . ds o a . ds d- d\h'-1'\(ga . ds D- D\h'-1'\(hy . ds th \o'bp' . ds Th \o'LP' . ds ae ae . ds Ae AE .\} .rm #[ #] #H #V #F C .\" ======================================================================== .\" .IX Title "EVP_PKEY-EC 7ossl" .TH EVP_PKEY-EC 7ossl "2022-11-01" "3.0.7" "OpenSSL" .\" For nroff, turn off justification. Always turn off hyphenation; it makes .\" way too many mistakes in technical documents. .if n .ad l .nh .SH "NAME" EVP_PKEY\-EC, EVP_KEYMGMT\-EC \&\- EVP_PKEY EC keytype and algorithm support .SH "DESCRIPTION" .IX Header "DESCRIPTION" The \fB\s-1EC\s0\fR keytype is implemented in OpenSSL's default provider. .SS "Common \s-1EC\s0 parameters" .IX Subsection "Common EC parameters" The normal way of specifying domain parameters for an \s-1EC\s0 curve is via the curve name \*(L"group\*(R". For curves with no curve name, explicit parameters can be used that specify \*(L"field-type\*(R", \*(L"p\*(R", \*(L"a\*(R", \*(L"b\*(R", \*(L"generator\*(R" and \*(L"order\*(R". Explicit parameters are supported for backwards compability reasons, but they are not compliant with multiple standards (including \s-1RFC5915\s0) which only allow named curves. .PP The following KeyGen/Gettable/Import/Export types are available for the built-in \s-1EC\s0 algorithm: .ie n .IP """group"" (\fB\s-1OSSL_PKEY_PARAM_GROUP_NAME\s0\fR) <\s-1UTF8\s0 string>" 4 .el .IP "``group'' (\fB\s-1OSSL_PKEY_PARAM_GROUP_NAME\s0\fR) <\s-1UTF8\s0 string>" 4 .IX Item "group (OSSL_PKEY_PARAM_GROUP_NAME) <UTF8 string>" The curve name. .ie n .IP """field-type"" (\fB\s-1OSSL_PKEY_PARAM_EC_FIELD_TYPE\s0\fR) <\s-1UTF8\s0 string>" 4 .el .IP "``field-type'' (\fB\s-1OSSL_PKEY_PARAM_EC_FIELD_TYPE\s0\fR) <\s-1UTF8\s0 string>" 4 .IX Item "field-type (OSSL_PKEY_PARAM_EC_FIELD_TYPE) <UTF8 string>" The value should be either \*(L"prime-field\*(R" or \*(L"characteristic-two-field\*(R", which correspond to prime field Fp and binary field F2^m. .ie n .IP """p"" (\fB\s-1OSSL_PKEY_PARAM_EC_P\s0\fR) <unsigned integer>" 4 .el .IP "``p'' (\fB\s-1OSSL_PKEY_PARAM_EC_P\s0\fR) <unsigned integer>" 4 .IX Item "p (OSSL_PKEY_PARAM_EC_P) <unsigned integer>" For a curve over Fp \fIp\fR is the prime for the field. For a curve over F2^m \fIp\fR represents the irreducible polynomial \- each bit represents a term in the polynomial. Therefore, there will either be three or five bits set dependent on whether the polynomial is a trinomial or a pentanomial. .ie n .IP """a"" (\fB\s-1OSSL_PKEY_PARAM_EC_A\s0\fR) <unsigned integer>" 4 .el .IP "``a'' (\fB\s-1OSSL_PKEY_PARAM_EC_A\s0\fR) <unsigned integer>" 4 .IX Item "a (OSSL_PKEY_PARAM_EC_A) <unsigned integer>" .PD 0 .ie n .IP """b"" (\fB\s-1OSSL_PKEY_PARAM_EC_B\s0\fR) <unsigned integer>" 4 .el .IP "``b'' (\fB\s-1OSSL_PKEY_PARAM_EC_B\s0\fR) <unsigned integer>" 4 .IX Item "b (OSSL_PKEY_PARAM_EC_B) <unsigned integer>" .ie n .IP """seed"" (\fB\s-1OSSL_PKEY_PARAM_EC_SEED\s0\fR) <octet string>" 4 .el .IP "``seed'' (\fB\s-1OSSL_PKEY_PARAM_EC_SEED\s0\fR) <octet string>" 4 .IX Item "seed (OSSL_PKEY_PARAM_EC_SEED) <octet string>" .PD \&\fIa\fR and \fIb\fR represents the coefficients of the curve For Fp: y^2 mod p = x^3 +ax + b mod p \s-1OR\s0 For F2^m: y^2 + xy = x^3 + ax^2 + b .Sp \&\fIseed\fR is an optional value that is for information purposes only. It represents the random number seed used to generate the coefficient \fIb\fR from a random number. .ie n .IP """generator"" (\fB\s-1OSSL_PKEY_PARAM_EC_GENERATOR\s0\fR) <octet string>" 4 .el .IP "``generator'' (\fB\s-1OSSL_PKEY_PARAM_EC_GENERATOR\s0\fR) <octet string>" 4 .IX Item "generator (OSSL_PKEY_PARAM_EC_GENERATOR) <octet string>" .PD 0 .ie n .IP """order"" (\fB\s-1OSSL_PKEY_PARAM_EC_ORDER\s0\fR) <unsigned integer>" 4 .el .IP "``order'' (\fB\s-1OSSL_PKEY_PARAM_EC_ORDER\s0\fR) <unsigned integer>" 4 .IX Item "order (OSSL_PKEY_PARAM_EC_ORDER) <unsigned integer>" .ie n .IP """cofactor"" (\fB\s-1OSSL_PKEY_PARAM_EC_COFACTOR\s0\fR) <unsigned integer>" 4 .el .IP "``cofactor'' (\fB\s-1OSSL_PKEY_PARAM_EC_COFACTOR\s0\fR) <unsigned integer>" 4 .IX Item "cofactor (OSSL_PKEY_PARAM_EC_COFACTOR) <unsigned integer>" .PD The \fIgenerator\fR is a well defined point on the curve chosen for cryptographic operations. The encoding conforms with Sec. 2.3.3 of the \s-1SECG SEC 1 \s0(\*(L"Elliptic Curve Cryptography\*(R") standard. See \fIEC_POINT_oct2point()\fR. Integers used for point multiplications will be between 0 and \&\fIorder\fR \- 1. \&\fIcofactor\fR is an optional value. \&\fIorder\fR multiplied by the \fIcofactor\fR gives the number of points on the curve. .ie n .IP """decoded-from-explicit"" (\fB\s-1OSSL_PKEY_PARAM_EC_DECODED_FROM_EXPLICIT_PARAMS\s0\fR) <integer>" 4 .el .IP "``decoded-from-explicit'' (\fB\s-1OSSL_PKEY_PARAM_EC_DECODED_FROM_EXPLICIT_PARAMS\s0\fR) <integer>" 4 .IX Item "decoded-from-explicit (OSSL_PKEY_PARAM_EC_DECODED_FROM_EXPLICIT_PARAMS) <integer>" Gets a flag indicating wether the key or parameters were decoded from explicit curve parameters. Set to 1 if so or 0 if a named curve was used. .ie n .IP """use-cofactor-flag"" (\fB\s-1OSSL_PKEY_PARAM_USE_COFACTOR_ECDH\s0\fR) <integer>" 4 .el .IP "``use-cofactor-flag'' (\fB\s-1OSSL_PKEY_PARAM_USE_COFACTOR_ECDH\s0\fR) <integer>" 4 .IX Item "use-cofactor-flag (OSSL_PKEY_PARAM_USE_COFACTOR_ECDH) <integer>" Enable Cofactor \s-1DH \s0(\s-1ECC CDH\s0) if this value is 1, otherwise it uses normal \s-1EC DH\s0 if the value is zero. The cofactor variant multiplies the shared secret by the \&\s-1EC\s0 curve's cofactor (note for some curves the cofactor is 1). .ie n .IP """encoding"" (\fB\s-1OSSL_PKEY_PARAM_EC_ENCODING\s0\fR) <\s-1UTF8\s0 string>" 4 .el .IP "``encoding'' (\fB\s-1OSSL_PKEY_PARAM_EC_ENCODING\s0\fR) <\s-1UTF8\s0 string>" 4 .IX Item "encoding (OSSL_PKEY_PARAM_EC_ENCODING) <UTF8 string>" Set the format used for serializing the \s-1EC\s0 group parameters. Valid values are \*(L"explicit\*(R" or \*(L"named_curve\*(R". The default value is \*(L"named_curve\*(R". .ie n .IP """point-format"" (\fB\s-1OSSL_PKEY_PARAM_EC_POINT_CONVERSION_FORMAT\s0\fR) <\s-1UTF8\s0 string>" 4 .el .IP "``point-format'' (\fB\s-1OSSL_PKEY_PARAM_EC_POINT_CONVERSION_FORMAT\s0\fR) <\s-1UTF8\s0 string>" 4 .IX Item "point-format (OSSL_PKEY_PARAM_EC_POINT_CONVERSION_FORMAT) <UTF8 string>" Sets or gets the point_conversion_form for the \fIkey\fR. For a description of point_conversion_forms please see \fIEC_POINT_new\fR\|(3). Valid values are \&\*(L"uncompressed\*(R" or \*(L"compressed\*(R". The default value is \*(L"uncompressed\*(R". .ie n .IP """group-check"" (\fB\s-1OSSL_PKEY_PARAM_EC_GROUP_CHECK_TYPE\s0\fR) <\s-1UTF8\s0 string>" 4 .el .IP "``group-check'' (\fB\s-1OSSL_PKEY_PARAM_EC_GROUP_CHECK_TYPE\s0\fR) <\s-1UTF8\s0 string>" 4 .IX Item "group-check (OSSL_PKEY_PARAM_EC_GROUP_CHECK_TYPE) <UTF8 string>" Sets or Gets the type of group check done when \fIEVP_PKEY_param_check()\fR is called. Valid values are \*(L"default\*(R", \*(L"named\*(R" and \*(L"named-nist\*(R". The \*(L"named\*(R" type checks that the domain parameters match the inbuilt curve parameters, \&\*(L"named-nist\*(R" is similiar but also checks that the named curve is a nist curve. The \*(L"default\*(R" type does domain parameter validation for the OpenSSL default provider, but is equivalent to \*(L"named-nist\*(R" for the OpenSSL \s-1FIPS\s0 provider. .ie n .IP """include-public"" (\fB\s-1OSSL_PKEY_PARAM_EC_INCLUDE_PUBLIC\s0\fR) <integer>" 4 .el .IP "``include-public'' (\fB\s-1OSSL_PKEY_PARAM_EC_INCLUDE_PUBLIC\s0\fR) <integer>" 4 .IX Item "include-public (OSSL_PKEY_PARAM_EC_INCLUDE_PUBLIC) <integer>" Setting this value to 0 indicates that the public key should not be included when encoding the private key. The default value of 1 will include the public key. .Sp See also \s-1\fIEVP_KEYEXCH\-ECDH\s0\fR\|(7) for the related \&\fB\s-1OSSL_EXCHANGE_PARAM_EC_ECDH_COFACTOR_MODE\s0\fR parameter that can be set on a per-operation basis. .ie n .IP """pub"" (\fB\s-1OSSL_PKEY_PARAM_PUB_KEY\s0\fR) <octet string>" 4 .el .IP "``pub'' (\fB\s-1OSSL_PKEY_PARAM_PUB_KEY\s0\fR) <octet string>" 4 .IX Item "pub (OSSL_PKEY_PARAM_PUB_KEY) <octet string>" The public key value in encoded \s-1EC\s0 point format. This parameter is used when importing or exporting the public key value with the \fIEVP_PKEY_fromdata()\fR and \fIEVP_PKEY_todata()\fR functions. .ie n .IP """priv"" (\fB\s-1OSSL_PKEY_PARAM_PRIV_KEY\s0\fR) <unsigned integer>" 4 .el .IP "``priv'' (\fB\s-1OSSL_PKEY_PARAM_PRIV_KEY\s0\fR) <unsigned integer>" 4 .IX Item "priv (OSSL_PKEY_PARAM_PRIV_KEY) <unsigned integer>" The private key value. .ie n .IP """encoded-pub-key"" (\fB\s-1OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY\s0\fR) <octet string>" 4 .el .IP "``encoded-pub-key'' (\fB\s-1OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY\s0\fR) <octet string>" 4 .IX Item "encoded-pub-key (OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY) <octet string>" Used for getting and setting the encoding of an \s-1EC\s0 public key. The public key is expected to be a point conforming to Sec. 2.3.4 of the \s-1SECG SEC 1 \s0(\*(L"Elliptic Curve Cryptography\*(R") standard. .ie n .IP """qx"" (\fB\s-1OSSL_PKEY_PARAM_EC_PUB_X\s0\fR) <unsigned integer>" 4 .el .IP "``qx'' (\fB\s-1OSSL_PKEY_PARAM_EC_PUB_X\s0\fR) <unsigned integer>" 4 .IX Item "qx (OSSL_PKEY_PARAM_EC_PUB_X) <unsigned integer>" Used for getting the \s-1EC\s0 public key X component. .ie n .IP """qy"" (\fB\s-1OSSL_PKEY_PARAM_EC_PUB_Y\s0\fR) <unsigned integer>" 4 .el .IP "``qy'' (\fB\s-1OSSL_PKEY_PARAM_EC_PUB_Y\s0\fR) <unsigned integer>" 4 .IX Item "qy (OSSL_PKEY_PARAM_EC_PUB_Y) <unsigned integer>" Used for getting the \s-1EC\s0 public key Y component. .IP "(\fB\s-1OSSL_PKEY_PARAM_DEFAULT_DIGEST\s0\fR) <\s-1UTF8\s0 string>" 4 .IX Item "(OSSL_PKEY_PARAM_DEFAULT_DIGEST) <UTF8 string>" Getter that returns the default digest name. (Currently returns \*(L"\s-1SHA256\*(R"\s0 as of OpenSSL 3.0). .PP The following Gettable types are also available for the built-in \s-1EC\s0 algorithm: .ie n .IP """basis-type"" (\fB\s-1OSSL_PKEY_PARAM_EC_CHAR2_TYPE\s0\fR) <\s-1UTF8\s0 string>" 4 .el .IP "``basis-type'' (\fB\s-1OSSL_PKEY_PARAM_EC_CHAR2_TYPE\s0\fR) <\s-1UTF8\s0 string>" 4 .IX Item "basis-type (OSSL_PKEY_PARAM_EC_CHAR2_TYPE) <UTF8 string>" Supports the values \*(L"tpBasis\*(R" for a trinomial or \*(L"ppBasis\*(R" for a pentanomial. This field is only used for a binary field F2^m. .ie n .IP """m"" (\fB\s-1OSSL_PKEY_PARAM_EC_CHAR2_M\s0\fR) <integer>" 4 .el .IP "``m'' (\fB\s-1OSSL_PKEY_PARAM_EC_CHAR2_M\s0\fR) <integer>" 4 .IX Item "m (OSSL_PKEY_PARAM_EC_CHAR2_M) <integer>" .PD 0 .ie n .IP """tp"" (\fB\s-1OSSL_PKEY_PARAM_EC_CHAR2_TP_BASIS\s0\fR) <integer>" 4 .el .IP "``tp'' (\fB\s-1OSSL_PKEY_PARAM_EC_CHAR2_TP_BASIS\s0\fR) <integer>" 4 .IX Item "tp (OSSL_PKEY_PARAM_EC_CHAR2_TP_BASIS) <integer>" .ie n .IP """k1"" (\fB\s-1OSSL_PKEY_PARAM_EC_CHAR2_PP_K1\s0\fR) <integer>" 4 .el .IP "``k1'' (\fB\s-1OSSL_PKEY_PARAM_EC_CHAR2_PP_K1\s0\fR) <integer>" 4 .IX Item "k1 (OSSL_PKEY_PARAM_EC_CHAR2_PP_K1) <integer>" .ie n .IP """k2"" (\fB\s-1OSSL_PKEY_PARAM_EC_CHAR2_PP_K2\s0\fR) <integer>" 4 .el .IP "``k2'' (\fB\s-1OSSL_PKEY_PARAM_EC_CHAR2_PP_K2\s0\fR) <integer>" 4 .IX Item "k2 (OSSL_PKEY_PARAM_EC_CHAR2_PP_K2) <integer>" .ie n .IP """k3"" (\fB\s-1OSSL_PKEY_PARAM_EC_CHAR2_PP_K3\s0\fR) <integer>" 4 .el .IP "``k3'' (\fB\s-1OSSL_PKEY_PARAM_EC_CHAR2_PP_K3\s0\fR) <integer>" 4 .IX Item "k3 (OSSL_PKEY_PARAM_EC_CHAR2_PP_K3) <integer>" .PD These fields are only used for a binary field F2^m. \&\fIm\fR is the degree of the binary field. .Sp \&\fItp\fR is the middle bit of a trinomial so its value must be in the range m > tp > 0. .Sp \&\fIk1\fR, \fIk2\fR and \fIk3\fR are used to get the middle bits of a pentanomial such that m > k3 > k2 > k1 > 0 .SS "\s-1EC\s0 key validation" .IX Subsection "EC key validation" For \s-1EC\s0 keys, \fIEVP_PKEY_param_check\fR\|(3) behaves in the following way: For the OpenSSL default provider it uses either \&\fIEC_GROUP_check\fR\|(3) or \fIEC_GROUP_check_named_curve\fR\|(3) depending on the flag \&\s-1EC_FLAG_CHECK_NAMED_GROUP.\s0 The OpenSSL \s-1FIPS\s0 provider uses \fIEC_GROUP_check_named_curve\fR\|(3) in order to conform to SP800\-56Ar3 \fIAssurances of Domain-Parameter Validity\fR. .PP For \s-1EC\s0 keys, \fIEVP_PKEY_param_check_quick\fR\|(3) is equivalent to \&\fIEVP_PKEY_param_check\fR\|(3). .PP For \s-1EC\s0 keys, \fIEVP_PKEY_public_check\fR\|(3) and \fIEVP_PKEY_public_check_quick\fR\|(3) conform to SP800\-56Ar3 \fI\s-1ECC\s0 Full Public-Key Validation\fR and \&\fI\s-1ECC\s0 Partial Public-Key Validation\fR respectively. .PP For \s-1EC\s0 Keys, \fIEVP_PKEY_private_check\fR\|(3) and \fIEVP_PKEY_pairwise_check\fR\|(3) conform to SP800\-56Ar3 \fIPrivate key validity\fR and \&\fIOwner Assurance of Pair-wise Consistency\fR respectively. .SH "EXAMPLES" .IX Header "EXAMPLES" An \fB\s-1EVP_PKEY\s0\fR context can be obtained by calling: .PP .Vb 2 \& EVP_PKEY_CTX *pctx = \& EVP_PKEY_CTX_new_from_name(NULL, "EC", NULL); .Ve .PP An \fB\s-1EVP_PKEY\s0\fR \s-1ECDSA\s0 or \s-1ECDH\s0 key can be generated with a \*(L"P\-256\*(R" named group by calling: .PP .Vb 1 \& pkey = EVP_EC_gen("P\-256"); .Ve .PP or like this: .PP .Vb 4 \& EVP_PKEY *key = NULL; \& OSSL_PARAM params[2]; \& EVP_PKEY_CTX *gctx = \& EVP_PKEY_CTX_new_from_name(NULL, "EC", NULL); \& \& EVP_PKEY_keygen_init(gctx); \& \& params[0] = OSSL_PARAM_construct_utf8_string(OSSL_PKEY_PARAM_GROUP_NAME, \& "P\-256", 0); \& params[1] = OSSL_PARAM_construct_end(); \& EVP_PKEY_CTX_set_params(gctx, params); \& \& EVP_PKEY_generate(gctx, &key); \& \& EVP_PKEY_print_private(bio_out, key, 0, NULL); \& ... \& EVP_PKEY_free(key); \& EVP_PKEY_CTX_free(gctx); .Ve .PP An \fB\s-1EVP_PKEY\s0\fR \s-1EC CDH \s0(Cofactor Diffie-Hellman) key can be generated with a \&\*(L"K\-571\*(R" named group by calling: .PP .Vb 5 \& int use_cdh = 1; \& EVP_PKEY *key = NULL; \& OSSL_PARAM params[3]; \& EVP_PKEY_CTX *gctx = \& EVP_PKEY_CTX_new_from_name(NULL, "EC", NULL); \& \& EVP_PKEY_keygen_init(gctx); \& \& params[0] = OSSL_PARAM_construct_utf8_string(OSSL_PKEY_PARAM_GROUP_NAME, \& "K\-571", 0); \& /* \& * This curve has a cofactor that is not 1 \- so setting CDH mode changes \& * the behaviour. For many curves the cofactor is 1 \- so setting this has \& * no effect. \& */ \& params[1] = OSSL_PARAM_construct_int(OSSL_PKEY_PARAM_USE_COFACTOR_ECDH, \& &use_cdh); \& params[2] = OSSL_PARAM_construct_end(); \& EVP_PKEY_CTX_set_params(gctx, params); \& \& EVP_PKEY_generate(gctx, &key); \& EVP_PKEY_print_private(bio_out, key, 0, NULL); \& ... \& EVP_PKEY_free(key); \& EVP_PKEY_CTX_free(gctx); .Ve .SH "SEE ALSO" .IX Header "SEE ALSO" \&\fIEVP_EC_gen\fR\|(3), \&\s-1\fIEVP_KEYMGMT\s0\fR\|(3), \&\s-1\fIEVP_PKEY\s0\fR\|(3), \&\fIprovider\-keymgmt\fR\|(7), \&\s-1\fIEVP_SIGNATURE\-ECDSA\s0\fR\|(7), \&\s-1\fIEVP_KEYEXCH\-ECDH\s0\fR\|(7) .SH "COPYRIGHT" .IX Header "COPYRIGHT" Copyright 2020\-2022 The OpenSSL Project Authors. All Rights Reserved. .PP Licensed under the Apache License 2.0 (the \*(L"License\*(R"). You may not use this file except in compliance with the License. You can obtain a copy in the file \s-1LICENSE\s0 in the source distribution or at <https://www.openssl.org/source/license.html>.