cjson
fuzzing
inputs
test1 test10 test11 test2 test3 test3.bu test3.uf test3.uu test4 test5 test6 test7 test8 test9library_config
cJSONConfig.cmake.in cJSONConfigVersion.cmake.in libcjson.pc.in libcjson_utils.pc.in uninstall.cmaketests
inputs
test1 test1.expected test10 test10.expected test11 test11.expected test2 test2.expected test3 test3.expected test4 test4.expected test5 test5.expected test6 test7 test7.expected test8 test8.expected test9 test9.expectedjson-patch-tests
.editorconfig .gitignore .npmignore README.md cjson-utils-tests.json package.json spec_tests.json tests.jsonunity
auto
colour_prompt.rb colour_reporter.rb generate_config.yml generate_module.rb generate_test_runner.rb parse_output.rb stylize_as_junit.rb test_file_filter.rb type_sanitizer.rb unity_test_summary.py unity_test_summary.rb unity_to_junit.pydocs
ThrowTheSwitchCodingStandard.md UnityAssertionsCheatSheetSuitableforPrintingandPossiblyFraming.pdf UnityAssertionsReference.md UnityConfigurationGuide.md UnityGettingStartedGuide.md UnityHelperScriptsGuide.md license.txtexamples
unity_config.hcurl
.github
scripts
cleancmd.pl cmp-config.pl cmp-pkg-config.sh codespell-ignore.words codespell.sh distfiles.sh pyspelling.words pyspelling.yaml randcurl.pl requirements-docs.txt requirements-proselint.txt requirements.txt shellcheck-ci.sh shellcheck.sh spellcheck.curl trimmarkdownheader.pl typos.sh typos.toml verify-examples.pl verify-synopsis.pl yamlcheck.sh yamlcheck.yamlworkflows
appveyor-status.yml checkdocs.yml checksrc.yml checkurls.yml codeql.yml configure-vs-cmake.yml curl-for-win.yml distcheck.yml fuzz.yml http3-linux.yml label.yml linux-old.yml linux.yml macos.yml non-native.yml windows.ymlCMake
CurlSymbolHiding.cmake CurlTests.c FindBrotli.cmake FindCares.cmake FindGSS.cmake FindGnuTLS.cmake FindLDAP.cmake FindLibbacktrace.cmake FindLibgsasl.cmake FindLibidn2.cmake FindLibpsl.cmake FindLibssh.cmake FindLibssh2.cmake FindLibuv.cmake FindMbedTLS.cmake FindNGHTTP2.cmake FindNGHTTP3.cmake FindNGTCP2.cmake FindNettle.cmake FindQuiche.cmake FindRustls.cmake FindWolfSSL.cmake FindZstd.cmake Macros.cmake OtherTests.cmake PickyWarnings.cmake Utilities.cmake cmake_uninstall.in.cmake curl-config.in.cmake unix-cache.cmake win32-cache.cmakedocs
cmdline-opts
.gitignore CMakeLists.txt MANPAGE.md Makefile.am Makefile.inc _AUTHORS.md _BUGS.md _DESCRIPTION.md _ENVIRONMENT.md _EXITCODES.md _FILES.md _GLOBBING.md _NAME.md _OPTIONS.md _OUTPUT.md _PROGRESS.md _PROTOCOLS.md _PROXYPREFIX.md _SEEALSO.md _SYNOPSIS.md _URL.md _VARIABLES.md _VERSION.md _WWW.md abstract-unix-socket.md alt-svc.md anyauth.md append.md aws-sigv4.md basic.md ca-native.md cacert.md capath.md cert-status.md cert-type.md cert.md ciphers.md compressed-ssh.md compressed.md config.md connect-timeout.md connect-to.md continue-at.md cookie-jar.md cookie.md create-dirs.md create-file-mode.md crlf.md crlfile.md curves.md data-ascii.md data-binary.md data-raw.md data-urlencode.md data.md delegation.md digest.md disable-eprt.md disable-epsv.md disable.md disallow-username-in-url.md dns-interface.md dns-ipv4-addr.md dns-ipv6-addr.md dns-servers.md doh-cert-status.md doh-insecure.md doh-url.md dump-ca-embed.md dump-header.md ech.md egd-file.md engine.md etag-compare.md etag-save.md expect100-timeout.md fail-early.md fail-with-body.md fail.md false-start.md follow.md form-escape.md form-string.md form.md ftp-account.md ftp-alternative-to-user.md ftp-create-dirs.md ftp-method.md ftp-pasv.md ftp-port.md ftp-pret.md ftp-skip-pasv-ip.md ftp-ssl-ccc-mode.md ftp-ssl-ccc.md ftp-ssl-control.md get.md globoff.md happy-eyeballs-timeout-ms.md haproxy-clientip.md haproxy-protocol.md head.md header.md help.md hostpubmd5.md hostpubsha256.md hsts.md http0.9.md http1.0.md http1.1.md http2-prior-knowledge.md http2.md http3-only.md http3.md ignore-content-length.md insecure.md interface.md ip-tos.md ipfs-gateway.md ipv4.md ipv6.md json.md junk-session-cookies.md keepalive-cnt.md keepalive-time.md key-type.md key.md knownhosts.md krb.md libcurl.md limit-rate.md list-only.md local-port.md location-trusted.md location.md login-options.md mail-auth.md mail-from.md mail-rcpt-allowfails.md mail-rcpt.md mainpage.idx manual.md max-filesize.md max-redirs.md max-time.md metalink.md mptcp.md negotiate.md netrc-file.md netrc-optional.md netrc.md next.md no-alpn.md no-buffer.md no-clobber.md no-keepalive.md no-npn.md no-progress-meter.md no-sessionid.md noproxy.md ntlm-wb.md ntlm.md oauth2-bearer.md out-null.md output-dir.md output.md parallel-immediate.md parallel-max-host.md parallel-max.md parallel.md pass.md path-as-is.md pinnedpubkey.md post301.md post302.md post303.md preproxy.md progress-bar.md proto-default.md proto-redir.md proto.md proxy-anyauth.md proxy-basic.md proxy-ca-native.md proxy-cacert.md proxy-capath.md proxy-cert-type.md proxy-cert.md proxy-ciphers.md proxy-crlfile.md proxy-digest.md proxy-header.md proxy-http2.md proxy-insecure.md proxy-key-type.md proxy-key.md proxy-negotiate.md proxy-ntlm.md proxy-pass.md proxy-pinnedpubkey.md proxy-service-name.md proxy-ssl-allow-beast.md proxy-ssl-auto-client-cert.md proxy-tls13-ciphers.md proxy-tlsauthtype.md proxy-tlspassword.md proxy-tlsuser.md proxy-tlsv1.md proxy-user.md proxy.md proxy1.0.md proxytunnel.md pubkey.md quote.md random-file.md range.md rate.md raw.md referer.md remote-header-name.md remote-name-all.md remote-name.md remote-time.md remove-on-error.md request-target.md request.md resolve.md retry-all-errors.md retry-connrefused.md retry-delay.md retry-max-time.md retry.md sasl-authzid.md sasl-ir.md service-name.md show-error.md show-headers.md sigalgs.md silent.md skip-existing.md socks4.md socks4a.md socks5-basic.md socks5-gssapi-nec.md socks5-gssapi-service.md socks5-gssapi.md socks5-hostname.md socks5.md speed-limit.md speed-time.md ssl-allow-beast.md ssl-auto-client-cert.md ssl-no-revoke.md ssl-reqd.md ssl-revoke-best-effort.md ssl-sessions.md ssl.md sslv2.md sslv3.md stderr.md styled-output.md suppress-connect-headers.md tcp-fastopen.md tcp-nodelay.md telnet-option.md tftp-blksize.md tftp-no-options.md time-cond.md tls-earlydata.md tls-max.md tls13-ciphers.md tlsauthtype.md tlspassword.md tlsuser.md tlsv1.0.md tlsv1.1.md tlsv1.2.md tlsv1.3.md tlsv1.md tr-encoding.md trace-ascii.md trace-config.md trace-ids.md trace-time.md trace.md unix-socket.md upload-file.md upload-flags.md url-query.md url.md use-ascii.md user-agent.md user.md variable.md verbose.md version.md vlan-priority.md write-out.md xattr.mdexamples
.checksrc .gitignore 10-at-a-time.c CMakeLists.txt Makefile.am Makefile.example Makefile.inc README.md adddocsref.pl address-scope.c altsvc.c anyauthput.c block_ip.c cacertinmem.c certinfo.c chkspeed.c connect-to.c cookie_interface.c crawler.c debug.c default-scheme.c ephiperfifo.c evhiperfifo.c externalsocket.c fileupload.c ftp-delete.c ftp-wildcard.c ftpget.c ftpgetinfo.c ftpgetresp.c ftpsget.c ftpupload.c ftpuploadfrommem.c ftpuploadresume.c getinfo.c getinmemory.c getredirect.c getreferrer.c ghiper.c headerapi.c hiperfifo.c hsts-preload.c htmltidy.c htmltitle.cpp http-options.c http-post.c http2-download.c http2-pushinmemory.c http2-serverpush.c http2-upload.c http3-present.c http3.c httpcustomheader.c httpput-postfields.c httpput.c https.c imap-append.c imap-authzid.c imap-copy.c imap-create.c imap-delete.c imap-examine.c imap-fetch.c imap-list.c imap-lsub.c imap-multi.c imap-noop.c imap-search.c imap-ssl.c imap-store.c imap-tls.c interface.c ipv6.c keepalive.c localport.c log_failed_transfers.c maxconnects.c multi-app.c multi-debugcallback.c multi-double.c multi-event.c multi-formadd.c multi-legacy.c multi-post.c multi-single.c multi-uv.c netrc.c parseurl.c persistent.c pop3-authzid.c pop3-dele.c pop3-list.c pop3-multi.c pop3-noop.c pop3-retr.c pop3-ssl.c pop3-stat.c pop3-tls.c pop3-top.c pop3-uidl.c post-callback.c postinmemory.c postit2-formadd.c postit2.c progressfunc.c protofeats.c range.c resolve.c rtsp-options.c sendrecv.c sepheaders.c sessioninfo.c sftpget.c sftpuploadresume.c shared-connection-cache.c simple.c simplepost.c simplessl.c smooth-gtk-thread.c smtp-authzid.c smtp-expn.c smtp-mail.c smtp-mime.c smtp-multi.c smtp-ssl.c smtp-tls.c smtp-vrfy.c sslbackend.c synctime.c threaded.c unixsocket.c url2file.c urlapi.c usercertinmem.c version-check.pl websocket-cb.c websocket-updown.c websocket.c xmlstream.cinternals
BUFQ.md BUFREF.md CHECKSRC.md CLIENT-READERS.md CLIENT-WRITERS.md CODE_STYLE.md CONNECTION-FILTERS.md CREDENTIALS.md CURLX.md DYNBUF.md HASH.md LLIST.md MID.md MQTT.md MULTI-EV.md NEW-PROTOCOL.md PEERS.md PORTING.md RATELIMITS.md README.md SCORECARD.md SPLAY.md STRPARSE.md THRDPOOL-AND-QUEUE.md TIME-KEEPING.md TLS-SESSIONS.md UINT_SETS.md WEBSOCKET.mdlibcurl
opts
CMakeLists.txt CURLINFO_ACTIVESOCKET.md CURLINFO_APPCONNECT_TIME.md CURLINFO_APPCONNECT_TIME_T.md CURLINFO_CAINFO.md CURLINFO_CAPATH.md CURLINFO_CERTINFO.md CURLINFO_CONDITION_UNMET.md CURLINFO_CONNECT_TIME.md CURLINFO_CONNECT_TIME_T.md CURLINFO_CONN_ID.md CURLINFO_CONTENT_LENGTH_DOWNLOAD.md CURLINFO_CONTENT_LENGTH_DOWNLOAD_T.md CURLINFO_CONTENT_LENGTH_UPLOAD.md CURLINFO_CONTENT_LENGTH_UPLOAD_T.md CURLINFO_CONTENT_TYPE.md CURLINFO_COOKIELIST.md CURLINFO_EARLYDATA_SENT_T.md CURLINFO_EFFECTIVE_METHOD.md CURLINFO_EFFECTIVE_URL.md CURLINFO_FILETIME.md CURLINFO_FILETIME_T.md CURLINFO_FTP_ENTRY_PATH.md CURLINFO_HEADER_SIZE.md CURLINFO_HTTPAUTH_AVAIL.md CURLINFO_HTTPAUTH_USED.md CURLINFO_HTTP_CONNECTCODE.md CURLINFO_HTTP_VERSION.md CURLINFO_LASTSOCKET.md CURLINFO_LOCAL_IP.md CURLINFO_LOCAL_PORT.md CURLINFO_NAMELOOKUP_TIME.md CURLINFO_NAMELOOKUP_TIME_T.md CURLINFO_NUM_CONNECTS.md CURLINFO_OS_ERRNO.md CURLINFO_POSTTRANSFER_TIME_T.md CURLINFO_PRETRANSFER_TIME.md CURLINFO_PRETRANSFER_TIME_T.md CURLINFO_PRIMARY_IP.md CURLINFO_PRIMARY_PORT.md CURLINFO_PRIVATE.md CURLINFO_PROTOCOL.md CURLINFO_PROXYAUTH_AVAIL.md CURLINFO_PROXYAUTH_USED.md CURLINFO_PROXY_ERROR.md CURLINFO_PROXY_SSL_VERIFYRESULT.md CURLINFO_QUEUE_TIME_T.md CURLINFO_REDIRECT_COUNT.md CURLINFO_REDIRECT_TIME.md CURLINFO_REDIRECT_TIME_T.md CURLINFO_REDIRECT_URL.md CURLINFO_REFERER.md CURLINFO_REQUEST_SIZE.md CURLINFO_RESPONSE_CODE.md CURLINFO_RETRY_AFTER.md CURLINFO_RTSP_CLIENT_CSEQ.md CURLINFO_RTSP_CSEQ_RECV.md CURLINFO_RTSP_SERVER_CSEQ.md CURLINFO_RTSP_SESSION_ID.md CURLINFO_SCHEME.md CURLINFO_SIZE_DELIVERED.md CURLINFO_SIZE_DOWNLOAD.md CURLINFO_SIZE_DOWNLOAD_T.md CURLINFO_SIZE_UPLOAD.md CURLINFO_SIZE_UPLOAD_T.md CURLINFO_SPEED_DOWNLOAD.md CURLINFO_SPEED_DOWNLOAD_T.md CURLINFO_SPEED_UPLOAD.md CURLINFO_SPEED_UPLOAD_T.md CURLINFO_SSL_ENGINES.md CURLINFO_SSL_VERIFYRESULT.md CURLINFO_STARTTRANSFER_TIME.md CURLINFO_STARTTRANSFER_TIME_T.md CURLINFO_TLS_SESSION.md CURLINFO_TLS_SSL_PTR.md CURLINFO_TOTAL_TIME.md CURLINFO_TOTAL_TIME_T.md CURLINFO_USED_PROXY.md CURLINFO_XFER_ID.md CURLMINFO_XFERS_ADDED.md CURLMINFO_XFERS_CURRENT.md CURLMINFO_XFERS_DONE.md CURLMINFO_XFERS_PENDING.md CURLMINFO_XFERS_RUNNING.md CURLMOPT_CHUNK_LENGTH_PENALTY_SIZE.md CURLMOPT_CONTENT_LENGTH_PENALTY_SIZE.md CURLMOPT_MAXCONNECTS.md CURLMOPT_MAX_CONCURRENT_STREAMS.md CURLMOPT_MAX_HOST_CONNECTIONS.md CURLMOPT_MAX_PIPELINE_LENGTH.md CURLMOPT_MAX_TOTAL_CONNECTIONS.md CURLMOPT_NETWORK_CHANGED.md CURLMOPT_NOTIFYDATA.md CURLMOPT_NOTIFYFUNCTION.md CURLMOPT_PIPELINING.md CURLMOPT_PIPELINING_SERVER_BL.md CURLMOPT_PIPELINING_SITE_BL.md CURLMOPT_PUSHDATA.md CURLMOPT_PUSHFUNCTION.md CURLMOPT_QUICK_EXIT.md CURLMOPT_RESOLVE_THREADS_MAX.md CURLMOPT_SOCKETDATA.md CURLMOPT_SOCKETFUNCTION.md CURLMOPT_TIMERDATA.md CURLMOPT_TIMERFUNCTION.md CURLOPT_ABSTRACT_UNIX_SOCKET.md CURLOPT_ACCEPTTIMEOUT_MS.md CURLOPT_ACCEPT_ENCODING.md CURLOPT_ADDRESS_SCOPE.md CURLOPT_ALTSVC.md CURLOPT_ALTSVC_CTRL.md CURLOPT_APPEND.md CURLOPT_AUTOREFERER.md CURLOPT_AWS_SIGV4.md CURLOPT_BUFFERSIZE.md CURLOPT_CAINFO.md CURLOPT_CAINFO_BLOB.md CURLOPT_CAPATH.md CURLOPT_CA_CACHE_TIMEOUT.md CURLOPT_CERTINFO.md CURLOPT_CHUNK_BGN_FUNCTION.md CURLOPT_CHUNK_DATA.md CURLOPT_CHUNK_END_FUNCTION.md CURLOPT_CLOSESOCKETDATA.md CURLOPT_CLOSESOCKETFUNCTION.md CURLOPT_CONNECTTIMEOUT.md CURLOPT_CONNECTTIMEOUT_MS.md CURLOPT_CONNECT_ONLY.md CURLOPT_CONNECT_TO.md CURLOPT_CONV_FROM_NETWORK_FUNCTION.md CURLOPT_CONV_FROM_UTF8_FUNCTION.md CURLOPT_CONV_TO_NETWORK_FUNCTION.md CURLOPT_COOKIE.md CURLOPT_COOKIEFILE.md CURLOPT_COOKIEJAR.md CURLOPT_COOKIELIST.md CURLOPT_COOKIESESSION.md CURLOPT_COPYPOSTFIELDS.md CURLOPT_CRLF.md CURLOPT_CRLFILE.md CURLOPT_CURLU.md CURLOPT_CUSTOMREQUEST.md CURLOPT_DEBUGDATA.md CURLOPT_DEBUGFUNCTION.md CURLOPT_DEFAULT_PROTOCOL.md CURLOPT_DIRLISTONLY.md CURLOPT_DISALLOW_USERNAME_IN_URL.md CURLOPT_DNS_CACHE_TIMEOUT.md CURLOPT_DNS_INTERFACE.md CURLOPT_DNS_LOCAL_IP4.md CURLOPT_DNS_LOCAL_IP6.md CURLOPT_DNS_SERVERS.md CURLOPT_DNS_SHUFFLE_ADDRESSES.md CURLOPT_DNS_USE_GLOBAL_CACHE.md CURLOPT_DOH_SSL_VERIFYHOST.md CURLOPT_DOH_SSL_VERIFYPEER.md CURLOPT_DOH_SSL_VERIFYSTATUS.md CURLOPT_DOH_URL.md CURLOPT_ECH.md CURLOPT_EGDSOCKET.md CURLOPT_ERRORBUFFER.md CURLOPT_EXPECT_100_TIMEOUT_MS.md CURLOPT_FAILONERROR.md CURLOPT_FILETIME.md CURLOPT_FNMATCH_DATA.md CURLOPT_FNMATCH_FUNCTION.md CURLOPT_FOLLOWLOCATION.md CURLOPT_FORBID_REUSE.md CURLOPT_FRESH_CONNECT.md CURLOPT_FTPPORT.md CURLOPT_FTPSSLAUTH.md CURLOPT_FTP_ACCOUNT.md CURLOPT_FTP_ALTERNATIVE_TO_USER.md CURLOPT_FTP_CREATE_MISSING_DIRS.md CURLOPT_FTP_FILEMETHOD.md CURLOPT_FTP_SKIP_PASV_IP.md CURLOPT_FTP_SSL_CCC.md CURLOPT_FTP_USE_EPRT.md CURLOPT_FTP_USE_EPSV.md CURLOPT_FTP_USE_PRET.md CURLOPT_GSSAPI_DELEGATION.md CURLOPT_HAPPY_EYEBALLS_TIMEOUT_MS.md CURLOPT_HAPROXYPROTOCOL.md CURLOPT_HAPROXY_CLIENT_IP.md CURLOPT_HEADER.md CURLOPT_HEADERDATA.md CURLOPT_HEADERFUNCTION.md CURLOPT_HEADEROPT.md CURLOPT_HSTS.md CURLOPT_HSTSREADDATA.md CURLOPT_HSTSREADFUNCTION.md CURLOPT_HSTSWRITEDATA.md CURLOPT_HSTSWRITEFUNCTION.md CURLOPT_HSTS_CTRL.md CURLOPT_HTTP09_ALLOWED.md CURLOPT_HTTP200ALIASES.md CURLOPT_HTTPAUTH.md CURLOPT_HTTPGET.md CURLOPT_HTTPHEADER.md CURLOPT_HTTPPOST.md CURLOPT_HTTPPROXYTUNNEL.md CURLOPT_HTTP_CONTENT_DECODING.md CURLOPT_HTTP_TRANSFER_DECODING.md CURLOPT_HTTP_VERSION.md CURLOPT_IGNORE_CONTENT_LENGTH.md CURLOPT_INFILESIZE.md CURLOPT_INFILESIZE_LARGE.md CURLOPT_INTERFACE.md CURLOPT_INTERLEAVEDATA.md CURLOPT_INTERLEAVEFUNCTION.md CURLOPT_IOCTLDATA.md CURLOPT_IOCTLFUNCTION.md CURLOPT_IPRESOLVE.md CURLOPT_ISSUERCERT.md CURLOPT_ISSUERCERT_BLOB.md CURLOPT_KEEP_SENDING_ON_ERROR.md CURLOPT_KEYPASSWD.md CURLOPT_KRBLEVEL.md CURLOPT_LOCALPORT.md CURLOPT_LOCALPORTRANGE.md CURLOPT_LOGIN_OPTIONS.md CURLOPT_LOW_SPEED_LIMIT.md CURLOPT_LOW_SPEED_TIME.md CURLOPT_MAIL_AUTH.md CURLOPT_MAIL_FROM.md CURLOPT_MAIL_RCPT.md CURLOPT_MAIL_RCPT_ALLOWFAILS.md CURLOPT_MAXAGE_CONN.md CURLOPT_MAXCONNECTS.md CURLOPT_MAXFILESIZE.md CURLOPT_MAXFILESIZE_LARGE.md CURLOPT_MAXLIFETIME_CONN.md CURLOPT_MAXREDIRS.md CURLOPT_MAX_RECV_SPEED_LARGE.md CURLOPT_MAX_SEND_SPEED_LARGE.md CURLOPT_MIMEPOST.md CURLOPT_MIME_OPTIONS.md CURLOPT_NETRC.md CURLOPT_NETRC_FILE.md CURLOPT_NEW_DIRECTORY_PERMS.md CURLOPT_NEW_FILE_PERMS.md CURLOPT_NOBODY.md CURLOPT_NOPROGRESS.md CURLOPT_NOPROXY.md CURLOPT_NOSIGNAL.md CURLOPT_OPENSOCKETDATA.md CURLOPT_OPENSOCKETFUNCTION.md CURLOPT_PASSWORD.md CURLOPT_PATH_AS_IS.md CURLOPT_PINNEDPUBLICKEY.md CURLOPT_PIPEWAIT.md CURLOPT_PORT.md CURLOPT_POST.md CURLOPT_POSTFIELDS.md CURLOPT_POSTFIELDSIZE.md CURLOPT_POSTFIELDSIZE_LARGE.md CURLOPT_POSTQUOTE.md CURLOPT_POSTREDIR.md CURLOPT_PREQUOTE.md CURLOPT_PREREQDATA.md CURLOPT_PREREQFUNCTION.md CURLOPT_PRE_PROXY.md CURLOPT_PRIVATE.md CURLOPT_PROGRESSDATA.md CURLOPT_PROGRESSFUNCTION.md CURLOPT_PROTOCOLS.md CURLOPT_PROTOCOLS_STR.md CURLOPT_PROXY.md CURLOPT_PROXYAUTH.md CURLOPT_PROXYHEADER.md CURLOPT_PROXYPASSWORD.md CURLOPT_PROXYPORT.md CURLOPT_PROXYTYPE.md CURLOPT_PROXYUSERNAME.md CURLOPT_PROXYUSERPWD.md CURLOPT_PROXY_CAINFO.md CURLOPT_PROXY_CAINFO_BLOB.md CURLOPT_PROXY_CAPATH.md CURLOPT_PROXY_CRLFILE.md CURLOPT_PROXY_ISSUERCERT.md CURLOPT_PROXY_ISSUERCERT_BLOB.md CURLOPT_PROXY_KEYPASSWD.md CURLOPT_PROXY_PINNEDPUBLICKEY.md CURLOPT_PROXY_SERVICE_NAME.md CURLOPT_PROXY_SSLCERT.md CURLOPT_PROXY_SSLCERTTYPE.md CURLOPT_PROXY_SSLCERT_BLOB.md CURLOPT_PROXY_SSLKEY.md CURLOPT_PROXY_SSLKEYTYPE.md CURLOPT_PROXY_SSLKEY_BLOB.md CURLOPT_PROXY_SSLVERSION.md CURLOPT_PROXY_SSL_CIPHER_LIST.md CURLOPT_PROXY_SSL_OPTIONS.md CURLOPT_PROXY_SSL_VERIFYHOST.md CURLOPT_PROXY_SSL_VERIFYPEER.md CURLOPT_PROXY_TLS13_CIPHERS.md CURLOPT_PROXY_TLSAUTH_PASSWORD.md CURLOPT_PROXY_TLSAUTH_TYPE.md CURLOPT_PROXY_TLSAUTH_USERNAME.md CURLOPT_PROXY_TRANSFER_MODE.md CURLOPT_PUT.md CURLOPT_QUICK_EXIT.md CURLOPT_QUOTE.md CURLOPT_RANDOM_FILE.md CURLOPT_RANGE.md CURLOPT_READDATA.md CURLOPT_READFUNCTION.md CURLOPT_REDIR_PROTOCOLS.md CURLOPT_REDIR_PROTOCOLS_STR.md CURLOPT_REFERER.md CURLOPT_REQUEST_TARGET.md CURLOPT_RESOLVE.md CURLOPT_RESOLVER_START_DATA.md CURLOPT_RESOLVER_START_FUNCTION.md CURLOPT_RESUME_FROM.md CURLOPT_RESUME_FROM_LARGE.md CURLOPT_RTSP_CLIENT_CSEQ.md CURLOPT_RTSP_REQUEST.md CURLOPT_RTSP_SERVER_CSEQ.md CURLOPT_RTSP_SESSION_ID.md CURLOPT_RTSP_STREAM_URI.md CURLOPT_RTSP_TRANSPORT.md CURLOPT_SASL_AUTHZID.md CURLOPT_SASL_IR.md CURLOPT_SEEKDATA.md CURLOPT_SEEKFUNCTION.md CURLOPT_SERVER_RESPONSE_TIMEOUT.md CURLOPT_SERVER_RESPONSE_TIMEOUT_MS.md CURLOPT_SERVICE_NAME.md CURLOPT_SHARE.md CURLOPT_SOCKOPTDATA.md CURLOPT_SOCKOPTFUNCTION.md CURLOPT_SOCKS5_AUTH.md CURLOPT_SOCKS5_GSSAPI_NEC.md CURLOPT_SOCKS5_GSSAPI_SERVICE.md CURLOPT_SSH_AUTH_TYPES.md CURLOPT_SSH_COMPRESSION.md CURLOPT_SSH_HOSTKEYDATA.md CURLOPT_SSH_HOSTKEYFUNCTION.md CURLOPT_SSH_HOST_PUBLIC_KEY_MD5.md CURLOPT_SSH_HOST_PUBLIC_KEY_SHA256.md CURLOPT_SSH_KEYDATA.md CURLOPT_SSH_KEYFUNCTION.md CURLOPT_SSH_KNOWNHOSTS.md CURLOPT_SSH_PRIVATE_KEYFILE.md CURLOPT_SSH_PUBLIC_KEYFILE.md CURLOPT_SSLCERT.md CURLOPT_SSLCERTTYPE.md CURLOPT_SSLCERT_BLOB.md CURLOPT_SSLENGINE.md CURLOPT_SSLENGINE_DEFAULT.md CURLOPT_SSLKEY.md CURLOPT_SSLKEYTYPE.md CURLOPT_SSLKEY_BLOB.md CURLOPT_SSLVERSION.md CURLOPT_SSL_CIPHER_LIST.md CURLOPT_SSL_CTX_DATA.md CURLOPT_SSL_CTX_FUNCTION.md CURLOPT_SSL_EC_CURVES.md CURLOPT_SSL_ENABLE_ALPN.md CURLOPT_SSL_ENABLE_NPN.md CURLOPT_SSL_FALSESTART.md CURLOPT_SSL_OPTIONS.md CURLOPT_SSL_SESSIONID_CACHE.md CURLOPT_SSL_SIGNATURE_ALGORITHMS.md CURLOPT_SSL_VERIFYHOST.md CURLOPT_SSL_VERIFYPEER.md CURLOPT_SSL_VERIFYSTATUS.md CURLOPT_STDERR.md CURLOPT_STREAM_DEPENDS.md CURLOPT_STREAM_DEPENDS_E.md CURLOPT_STREAM_WEIGHT.md CURLOPT_SUPPRESS_CONNECT_HEADERS.md CURLOPT_TCP_FASTOPEN.md CURLOPT_TCP_KEEPALIVE.md CURLOPT_TCP_KEEPCNT.md CURLOPT_TCP_KEEPIDLE.md CURLOPT_TCP_KEEPINTVL.md CURLOPT_TCP_NODELAY.md CURLOPT_TELNETOPTIONS.md CURLOPT_TFTP_BLKSIZE.md CURLOPT_TFTP_NO_OPTIONS.md CURLOPT_TIMECONDITION.md CURLOPT_TIMEOUT.md CURLOPT_TIMEOUT_MS.md CURLOPT_TIMEVALUE.md CURLOPT_TIMEVALUE_LARGE.md CURLOPT_TLS13_CIPHERS.md CURLOPT_TLSAUTH_PASSWORD.md CURLOPT_TLSAUTH_TYPE.md CURLOPT_TLSAUTH_USERNAME.md CURLOPT_TRAILERDATA.md CURLOPT_TRAILERFUNCTION.md CURLOPT_TRANSFERTEXT.md CURLOPT_TRANSFER_ENCODING.md CURLOPT_UNIX_SOCKET_PATH.md CURLOPT_UNRESTRICTED_AUTH.md CURLOPT_UPKEEP_INTERVAL_MS.md CURLOPT_UPLOAD.md CURLOPT_UPLOAD_BUFFERSIZE.md CURLOPT_UPLOAD_FLAGS.md CURLOPT_URL.md CURLOPT_USERAGENT.md CURLOPT_USERNAME.md CURLOPT_USERPWD.md CURLOPT_USE_SSL.md CURLOPT_VERBOSE.md CURLOPT_WILDCARDMATCH.md CURLOPT_WRITEDATA.md CURLOPT_WRITEFUNCTION.md CURLOPT_WS_OPTIONS.md CURLOPT_XFERINFODATA.md CURLOPT_XFERINFOFUNCTION.md CURLOPT_XOAUTH2_BEARER.md CURLSHOPT_LOCKFUNC.md CURLSHOPT_SHARE.md CURLSHOPT_UNLOCKFUNC.md CURLSHOPT_UNSHARE.md CURLSHOPT_USERDATA.md Makefile.am Makefile.incinclude
curl
Makefile.am curl.h curlver.h easy.h header.h mprintf.h multi.h options.h stdcheaders.h system.h typecheck-gcc.h urlapi.h websockets.hlib
curlx
base64.c base64.h basename.c basename.h dynbuf.c dynbuf.h fopen.c fopen.h inet_ntop.c inet_ntop.h inet_pton.c inet_pton.h multibyte.c multibyte.h nonblock.c nonblock.h snprintf.c snprintf.h strcopy.c strcopy.h strdup.c strdup.h strerr.c strerr.h strparse.c strparse.h timediff.c timediff.h timeval.c timeval.h version_win32.c version_win32.h wait.c wait.h warnless.c warnless.h winapi.c winapi.hvauth
cleartext.c cram.c digest.c digest.h digest_sspi.c gsasl.c krb5_gssapi.c krb5_sspi.c ntlm.c ntlm_sspi.c oauth2.c spnego_gssapi.c spnego_sspi.c vauth.c vauth.hvquic
curl_ngtcp2.c curl_ngtcp2.h curl_quiche.c curl_quiche.h vquic-tls.c vquic-tls.h vquic.c vquic.h vquic_int.hvtls
apple.c apple.h cipher_suite.c cipher_suite.h gtls.c gtls.h hostcheck.c hostcheck.h keylog.c keylog.h mbedtls.c mbedtls.h openssl.c openssl.h rustls.c rustls.h schannel.c schannel.h schannel_int.h schannel_verify.c vtls.c vtls.h vtls_int.h vtls_scache.c vtls_scache.h vtls_spack.c vtls_spack.h wolfssl.c wolfssl.h x509asn1.c x509asn1.hm4
.gitignore curl-amissl.m4 curl-apple-sectrust.m4 curl-compilers.m4 curl-confopts.m4 curl-functions.m4 curl-gnutls.m4 curl-mbedtls.m4 curl-openssl.m4 curl-override.m4 curl-reentrant.m4 curl-rustls.m4 curl-schannel.m4 curl-sysconfig.m4 curl-wolfssl.m4 xc-am-iface.m4 xc-cc-check.m4 xc-lt-iface.m4 xc-val-flgs.m4 zz40-xc-ovr.m4 zz50-xc-ovr.m4projects
OS400
.checksrc README.OS400 ccsidcurl.c ccsidcurl.h config400.default curl.cmd curl.inc.in curlcl.c curlmain.c initscript.sh make-docs.sh make-include.sh make-lib.sh make-src.sh make-tests.sh makefile.sh os400sys.c os400sys.hWindows
tmpl
.gitattributes README.txt curl-all.sln curl.sln curl.vcxproj curl.vcxproj.filters libcurl.sln libcurl.vcxproj libcurl.vcxproj.filtersvms
Makefile.am backup_gnv_curl_src.com build_curl-config_script.com build_gnv_curl.com build_gnv_curl_pcsi_desc.com build_gnv_curl_pcsi_text.com build_gnv_curl_release_notes.com build_libcurl_pc.com build_vms.com clean_gnv_curl.com compare_curl_source.com config_h.com curl_crtl_init.c curl_gnv_build_steps.txt curl_release_note_start.txt curl_startup.com curlmsg.h curlmsg.msg curlmsg.sdl curlmsg_vms.h generate_config_vms_h_curl.com generate_vax_transfer.com gnv_conftest.c_first gnv_curl_configure.sh gnv_libcurl_symbols.opt gnv_link_curl.com macro32_exactcase.patch make_gnv_curl_install.sh make_pcsi_curl_kit_name.com pcsi_gnv_curl_file_list.txt pcsi_product_gnv_curl.com readme report_openssl_version.c setup_gnv_curl_build.com stage_curl_install.com vms_eco_level.hscripts
.checksrc CMakeLists.txt Makefile.am badwords badwords-all badwords.txt cd2cd cd2nroff cdall checksrc-all.pl checksrc.pl cmakelint.sh completion.pl contributors.sh contrithanks.sh coverage.sh delta dmaketgz extract-unit-protos firefox-db2pem.sh installcheck.sh maketgz managen mdlinkcheck mk-ca-bundle.pl mk-unity.pl nroff2cd perlcheck.sh pythonlint.sh randdisable release-notes.pl release-tools.sh schemetable.c singleuse.pl spacecheck.pl top-complexity top-length verify-release wcurlsrc
.checksrc .gitignore CMakeLists.txt Makefile.am Makefile.inc config2setopts.c config2setopts.h curl.rc curlinfo.c mk-file-embed.pl mkhelp.pl slist_wc.c slist_wc.h terminal.c terminal.h tool_cb_dbg.c tool_cb_dbg.h tool_cb_hdr.c tool_cb_hdr.h tool_cb_prg.c tool_cb_prg.h tool_cb_rea.c tool_cb_rea.h tool_cb_see.c tool_cb_see.h tool_cb_soc.c tool_cb_soc.h tool_cb_wrt.c tool_cb_wrt.h tool_cfgable.c tool_cfgable.h tool_dirhie.c tool_dirhie.h tool_doswin.c tool_doswin.h tool_easysrc.c tool_easysrc.h tool_filetime.c tool_filetime.h tool_findfile.c tool_findfile.h tool_formparse.c tool_formparse.h tool_getparam.c tool_getparam.h tool_getpass.c tool_getpass.h tool_help.c tool_help.h tool_helpers.c tool_helpers.h tool_hugehelp.h tool_ipfs.c tool_ipfs.h tool_libinfo.c tool_libinfo.h tool_listhelp.c tool_main.c tool_main.h tool_msgs.c tool_msgs.h tool_operate.c tool_operate.h tool_operhlp.c tool_operhlp.h tool_paramhlp.c tool_paramhlp.h tool_parsecfg.c tool_parsecfg.h tool_progress.c tool_progress.h tool_sdecls.h tool_setopt.c tool_setopt.h tool_setup.h tool_ssls.c tool_ssls.h tool_stderr.c tool_stderr.h tool_urlglob.c tool_urlglob.h tool_util.c tool_util.h tool_version.h tool_vms.c tool_vms.h tool_writeout.c tool_writeout.h tool_writeout_json.c tool_writeout_json.h tool_xattr.c tool_xattr.h var.c var.htests
certs
.gitignore CMakeLists.txt Makefile.am Makefile.inc genserv.pl srp-verifier-conf srp-verifier-db test-ca.cnf test-ca.prm test-client-cert.prm test-client-eku-only.prm test-localhost-san-first.prm test-localhost-san-last.prm test-localhost.nn.prm test-localhost.prm test-localhost0h.prmdata
.gitignore DISABLED Makefile.am data-xml1 data1400.c data1401.c data1402.c data1403.c data1404.c data1405.c data1406.c data1407.c data1420.c data1461.txt data1463.txt data1465.c data1481.c data1705-1.md data1705-2.md data1705-3.md data1705-4.md data1705-stdout.1 data1706-1.md data1706-2.md data1706-3.md data1706-4.md data1706-stdout.txt data320.html test1 test10 test100 test1000 test1001 test1002 test1003 test1004 test1005 test1006 test1007 test1008 test1009 test101 test1010 test1011 test1012 test1013 test1014 test1015 test1016 test1017 test1018 test1019 test102 test1020 test1021 test1022 test1023 test1024 test1025 test1026 test1027 test1028 test1029 test103 test1030 test1031 test1032 test1033 test1034 test1035 test1036 test1037 test1038 test1039 test104 test1040 test1041 test1042 test1043 test1044 test1045 test1046 test1047 test1048 test1049 test105 test1050 test1051 test1052 test1053 test1054 test1055 test1056 test1057 test1058 test1059 test106 test1060 test1061 test1062 test1063 test1064 test1065 test1066 test1067 test1068 test1069 test107 test1070 test1071 test1072 test1073 test1074 test1075 test1076 test1077 test1078 test1079 test108 test1080 test1081 test1082 test1083 test1084 test1085 test1086 test1087 test1088 test1089 test109 test1090 test1091 test1092 test1093 test1094 test1095 test1096 test1097 test1098 test1099 test11 test110 test1100 test1101 test1102 test1103 test1104 test1105 test1106 test1107 test1108 test1109 test111 test1110 test1111 test1112 test1113 test1114 test1115 test1116 test1117 test1118 test1119 test112 test1120 test1121 test1122 test1123 test1124 test1125 test1126 test1127 test1128 test1129 test113 test1130 test1131 test1132 test1133 test1134 test1135 test1136 test1137 test1138 test1139 test114 test1140 test1141 test1142 test1143 test1144 test1145 test1146 test1147 test1148 test1149 test115 test1150 test1151 test1152 test1153 test1154 test1155 test1156 test1157 test1158 test1159 test116 test1160 test1161 test1162 test1163 test1164 test1165 test1166 test1167 test1168 test1169 test117 test1170 test1171 test1172 test1173 test1174 test1175 test1176 test1177 test1178 test1179 test118 test1180 test1181 test1182 test1183 test1184 test1185 test1186 test1187 test1188 test1189 test119 test1190 test1191 test1192 test1193 test1194 test1195 test1196 test1197 test1198 test1199 test12 test120 test1200 test1201 test1202 test1203 test1204 test1205 test1206 test1207 test1208 test1209 test121 test1210 test1211 test1212 test1213 test1214 test1215 test1216 test1217 test1218 test1219 test122 test1220 test1221 test1222 test1223 test1224 test1225 test1226 test1227 test1228 test1229 test123 test1230 test1231 test1232 test1233 test1234 test1235 test1236 test1237 test1238 test1239 test124 test1240 test1241 test1242 test1243 test1244 test1245 test1246 test1247 test1248 test1249 test125 test1250 test1251 test1252 test1253 test1254 test1255 test1256 test1257 test1258 test1259 test126 test1260 test1261 test1262 test1263 test1264 test1265 test1266 test1267 test1268 test1269 test127 test1270 test1271 test1272 test1273 test1274 test1275 test1276 test1277 test1278 test1279 test128 test1280 test1281 test1282 test1283 test1284 test1285 test1286 test1287 test1288 test1289 test129 test1290 test1291 test1292 test1293 test1294 test1295 test1296 test1297 test1298 test1299 test13 test130 test1300 test1301 test1302 test1303 test1304 test1305 test1306 test1307 test1308 test1309 test131 test1310 test1311 test1312 test1313 test1314 test1315 test1316 test1317 test1318 test1319 test132 test1320 test1321 test1322 test1323 test1324 test1325 test1326 test1327 test1328 test1329 test133 test1330 test1331 test1332 test1333 test1334 test1335 test1336 test1337 test1338 test1339 test134 test1340 test1341 test1342 test1343 test1344 test1345 test1346 test1347 test1348 test1349 test135 test1350 test1351 test1352 test1353 test1354 test1355 test1356 test1357 test1358 test1359 test136 test1360 test1361 test1362 test1363 test1364 test1365 test1366 test1367 test1368 test1369 test137 test1370 test1371 test1372 test1373 test1374 test1375 test1376 test1377 test1378 test1379 test138 test1380 test1381 test1382 test1383 test1384 test1385 test1386 test1387 test1388 test1389 test139 test1390 test1391 test1392 test1393 test1394 test1395 test1396 test1397 test1398 test1399 test14 test140 test1400 test1401 test1402 test1403 test1404 test1405 test1406 test1407 test1408 test1409 test141 test1410 test1411 test1412 test1413 test1414 test1415 test1416 test1417 test1418 test1419 test142 test1420 test1421 test1422 test1423 test1424 test1425 test1426 test1427 test1428 test1429 test143 test1430 test1431 test1432 test1433 test1434 test1435 test1436 test1437 test1438 test1439 test144 test1440 test1441 test1442 test1443 test1444 test1445 test1446 test1447 test1448 test1449 test145 test1450 test1451 test1452 test1453 test1454 test1455 test1456 test1457 test1458 test1459 test146 test1460 test1461 test1462 test1463 test1464 test1465 test1466 test1467 test1468 test1469 test147 test1470 test1471 test1472 test1473 test1474 test1475 test1476 test1477 test1478 test1479 test148 test1480 test1481 test1482 test1483 test1484 test1485 test1486 test1487 test1488 test1489 test149 test1490 test1491 test1492 test1493 test1494 test1495 test1496 test1497 test1498 test1499 test15 test150 test1500 test1501 test1502 test1503 test1504 test1505 test1506 test1507 test1508 test1509 test151 test1510 test1511 test1512 test1513 test1514 test1515 test1516 test1517 test1518 test1519 test152 test1520 test1521 test1522 test1523 test1524 test1525 test1526 test1527 test1528 test1529 test153 test1530 test1531 test1532 test1533 test1534 test1535 test1536 test1537 test1538 test1539 test154 test1540 test1541 test1542 test1543 test1544 test1545 test1546 test1547 test1548 test1549 test155 test1550 test1551 test1552 test1553 test1554 test1555 test1556 test1557 test1558 test1559 test156 test1560 test1561 test1562 test1563 test1564 test1565 test1566 test1567 test1568 test1569 test157 test1570 test1571 test1572 test1573 test1574 test1575 test1576 test1577 test1578 test1579 test158 test1580 test1581 test1582 test1583 test1584 test1585 test1586 test1587 test1588 test1589 test159 test1590 test1591 test1592 test1593 test1594 test1595 test1596 test1597 test1598 test1599 test16 test160 test1600 test1601 test1602 test1603 test1604 test1605 test1606 test1607 test1608 test1609 test161 test1610 test1611 test1612 test1613 test1614 test1615 test1616 test1617 test1618 test1619 test162 test1620 test1621 test1622 test1623 test1624 test1625 test1626 test1627 test1628 test1629 test163 test1630 test1631 test1632 test1633 test1634 test1635 test1636 test1637 test1638 test1639 test164 test1640 test1641 test1642 test1643 test1644 test1645 test165 test1650 test1651 test1652 test1653 test1654 test1655 test1656 test1657 test1658 test1659 test166 test1660 test1661 test1662 test1663 test1664 test1665 test1666 test1667 test1668 test1669 test167 test1670 test1671 test1672 test1673 test1674 test1675 test1676 test168 test1680 test1681 test1682 test1683 test1684 test1685 test169 test17 test170 test1700 test1701 test1702 test1703 test1704 test1705 test1706 test1707 test1708 test1709 test171 test1710 test1711 test1712 test1713 test1714 test1715 test172 test1720 test1721 test173 test174 test175 test176 test177 test178 test179 test18 test180 test1800 test1801 test1802 test181 test182 test183 test184 test1847 test1848 test1849 test185 test1850 test1851 test186 test187 test188 test189 test19 test190 test1900 test1901 test1902 test1903 test1904 test1905 test1906 test1907 test1908 test1909 test191 test1910 test1911 test1912 test1913 test1914 test1915 test1916 test1917 test1918 test1919 test192 test1920 test1921 test193 test1933 test1934 test1935 test1936 test1937 test1938 test1939 test194 test1940 test1941 test1942 test1943 test1944 test1945 test1946 test1947 test1948 test195 test1955 test1956 test1957 test1958 test1959 test196 test1960 test1964 test1965 test1966 test197 test1970 test1971 test1972 test1973 test1974 test1975 test1976 test1977 test1978 test1979 test198 test1980 test1981 test1982 test1983 test1984 test199 test2 test20 test200 test2000 test2001 test2002 test2003 test2004 test2005 test2006 test2007 test2008 test2009 test201 test2010 test2011 test2012 test2013 test2014 test202 test2023 test2024 test2025 test2026 test2027 test2028 test2029 test203 test2030 test2031 test2032 test2033 test2034 test2035 test2037 test2038 test2039 test204 test2040 test2041 test2042 test2043 test2044 test2045 test2046 test2047 test2048 test2049 test205 test2050 test2051 test2052 test2053 test2054 test2055 test2056 test2057 test2058 test2059 test206 test2060 test2061 test2062 test2063 test2064 test2065 test2066 test2067 test2068 test2069 test207 test2070 test2071 test2072 test2073 test2074 test2075 test2076 test2077 test2078 test2079 test208 test2080 test2081 test2082 test2083 test2084 test2085 test2086 test2087 test2088 test2089 test209 test2090 test2091 test2092 test21 test210 test2100 test2101 test2102 test2103 test2104 test211 test212 test213 test214 test215 test216 test217 test218 test219 test22 test220 test2200 test2201 test2202 test2203 test2204 test2205 test2206 test2207 test221 test222 test223 test224 test225 test226 test227 test228 test229 test23 test230 test2300 test2301 test2302 test2303 test2304 test2306 test2307 test2308 test2309 test231 test232 test233 test234 test235 test236 test237 test238 test239 test24 test240 test2400 test2401 test2402 test2403 test2404 test2405 test2406 test2407 test2408 test2409 test241 test2410 test2411 test242 test243 test244 test245 test246 test247 test248 test249 test25 test250 test2500 test2501 test2502 test2503 test2504 test2505 test2506 test251 test252 test253 test254 test255 test256 test257 test258 test259 test26 test260 test2600 test2601 test2602 test2603 test2604 test2605 test261 test262 test263 test264 test265 test266 test267 test268 test269 test27 test270 test2700 test2701 test2702 test2703 test2704 test2705 test2706 test2707 test2708 test2709 test271 test2710 test2711 test2712 test2713 test2714 test2715 test2716 test2717 test2718 test2719 test272 test2720 test2721 test2722 test2723 test273 test274 test275 test276 test277 test278 test279 test28 test280 test281 test282 test283 test284 test285 test286 test287 test288 test289 test29 test290 test291 test292 test293 test294 test295 test296 test297 test298 test299 test3 test30 test300 test3000 test3001 test3002 test3003 test3004 test3005 test3006 test3007 test3008 test3009 test301 test3010 test3011 test3012 test3013 test3014 test3015 test3016 test3017 test3018 test3019 test302 test3020 test3021 test3022 test3023 test3024 test3025 test3026 test3027 test3028 test3029 test303 test3030 test3031 test3032 test3033 test3034 test3035 test3036 test304 test305 test306 test307 test308 test309 test31 test310 test3100 test3101 test3102 test3103 test3104 test3105 test3106 test311 test312 test313 test314 test315 test316 test317 test318 test319 test32 test320 test3200 test3201 test3202 test3203 test3204 test3205 test3206 test3207 test3208 test3209 test321 test3210 test3211 test3212 test3213 test3214 test3215 test3216 test3217 test3218 test3219 test322 test3220 test323 test324 test325 test326 test327 test328 test329 test33 test330 test3300 test3301 test3302 test331 test332 test333 test334 test335 test336 test337 test338 test339 test34 test340 test341 test342 test343 test344 test345 test346 test347 test348 test349 test35 test350 test351 test352 test353 test354 test355 test356 test357 test358 test359 test36 test360 test361 test362 test363 test364 test365 test366 test367 test368 test369 test37 test370 test371 test372 test373 test374 test375 test376 test378 test379 test38 test380 test381 test383 test384 test385 test386 test387 test388 test389 test39 test390 test391 test392 test393 test394 test395 test396 test397 test398 test399 test4 test40 test400 test4000 test4001 test401 test402 test403 test404 test405 test406 test407 test408 test409 test41 test410 test411 test412 test413 test414 test415 test416 test417 test418 test419 test42 test420 test421 test422 test423 test424 test425 test426 test427 test428 test429 test43 test430 test431 test432 test433 test434 test435 test436 test437 test438 test439 test44 test440 test441 test442 test443 test444 test445 test446 test447 test448 test449 test45 test450 test451 test452 test453 test454 test455 test456 test457 test458 test459 test46 test460 test461 test462 test463 test467 test468 test469 test47 test470 test471 test472 test473 test474 test475 test476 test477 test478 test479 test48 test480 test481 test482 test483 test484 test485 test486 test487 test488 test489 test49 test490 test491 test492 test493 test494 test495 test496 test497 test498 test499 test5 test50 test500 test501 test502 test503 test504 test505 test506 test507 test508 test509 test51 test510 test511 test512 test513 test514 test515 test516 test517 test518 test519 test52 test520 test521 test522 test523 test524 test525 test526 test527 test528 test529 test53 test530 test531 test532 test533 test534 test535 test536 test537 test538 test539 test54 test540 test541 test542 test543 test544 test545 test546 test547 test548 test549 test55 test550 test551 test552 test553 test554 test555 test556 test557 test558 test559 test56 test560 test561 test562 test563 test564 test565 test566 test567 test568 test569 test57 test570 test571 test572 test573 test574 test575 test576 test577 test578 test579 test58 test580 test581 test582 test583 test584 test585 test586 test587 test588 test589 test59 test590 test591 test592 test593 test594 test595 test596 test597 test598 test599 test6 test60 test600 test601 test602 test603 test604 test605 test606 test607 test608 test609 test61 test610 test611 test612 test613 test614 test615 test616 test617 test618 test619 test62 test620 test621 test622 test623 test624 test625 test626 test627 test628 test629 test63 test630 test631 test632 test633 test634 test635 test636 test637 test638 test639 test64 test640 test641 test642 test643 test644 test645 test646 test647 test648 test649 test65 test650 test651 test652 test653 test654 test655 test656 test658 test659 test66 test660 test661 test662 test663 test664 test665 test666 test667 test668 test669 test67 test670 test671 test672 test673 test674 test675 test676 test677 test678 test679 test68 test680 test681 test682 test683 test684 test685 test686 test687 test688 test689 test69 test690 test691 test692 test693 test694 test695 test696 test697 test698 test699 test7 test70 test700 test701 test702 test703 test704 test705 test706 test707 test708 test709 test71 test710 test711 test712 test713 test714 test715 test716 test717 test718 test719 test72 test720 test721 test722 test723 test724 test725 test726 test727 test728 test729 test73 test730 test731 test732 test733 test734 test735 test736 test737 test738 test739 test74 test740 test741 test742 test743 test744 test745 test746 test747 test748 test749 test75 test750 test751 test752 test753 test754 test755 test756 test757 test758 test759 test76 test760 test761 test762 test763 test764 test765 test766 test767 test768 test769 test77 test770 test771 test772 test773 test774 test775 test776 test777 test778 test779 test78 test780 test781 test782 test783 test784 test785 test786 test787 test788 test789 test79 test790 test791 test792 test793 test794 test795 test796 test797 test798 test799 test8 test80 test800 test801 test802 test803 test804 test805 test806 test807 test808 test809 test81 test810 test811 test812 test813 test814 test815 test816 test817 test818 test819 test82 test820 test821 test822 test823 test824 test825 test826 test827 test828 test829 test83 test830 test831 test832 test833 test834 test835 test836 test837 test838 test839 test84 test840 test841 test842 test843 test844 test845 test846 test847 test848 test849 test85 test850 test851 test852 test853 test854 test855 test856 test857 test858 test859 test86 test860 test861 test862 test863 test864 test865 test866 test867 test868 test869 test87 test870 test871 test872 test873 test874 test875 test876 test877 test878 test879 test88 test880 test881 test882 test883 test884 test885 test886 test887 test888 test889 test89 test890 test891 test892 test893 test894 test895 test896 test897 test898 test899 test9 test90 test900 test901 test902 test903 test904 test905 test906 test907 test908 test909 test91 test910 test911 test912 test913 test914 test915 test916 test917 test918 test919 test92 test920 test921 test922 test923 test924 test925 test926 test927 test928 test929 test93 test930 test931 test932 test933 test934 test935 test936 test937 test938 test939 test94 test940 test941 test942 test943 test944 test945 test946 test947 test948 test949 test95 test950 test951 test952 test953 test954 test955 test956 test957 test958 test959 test96 test960 test961 test962 test963 test964 test965 test966 test967 test968 test969 test97 test970 test971 test972 test973 test974 test975 test976 test977 test978 test979 test98 test980 test981 test982 test983 test984 test985 test986 test987 test988 test989 test99 test990 test991 test992 test993 test994 test995 test996 test997 test998 test999http
testenv
__init__.py caddy.py certs.py client.py curl.py dante.py dnsd.py env.py httpd.py nghttpx.py ports.py sshd.py vsftpd.py ws_echo_server.pylibtest
.gitignore CMakeLists.txt Makefile.am Makefile.inc cli_ftp_upload.c cli_h2_pausing.c cli_h2_serverpush.c cli_h2_upgrade_extreme.c cli_hx_download.c cli_hx_upload.c cli_tls_session_reuse.c cli_upload_pausing.c cli_ws_data.c cli_ws_pingpong.c first.c first.h lib1156.c lib1301.c lib1308.c lib1485.c lib1500.c lib1501.c lib1502.c lib1506.c lib1507.c lib1508.c lib1509.c lib1510.c lib1511.c lib1512.c lib1513.c lib1514.c lib1515.c lib1517.c lib1518.c lib1520.c lib1522.c lib1523.c lib1525.c lib1526.c lib1527.c lib1528.c lib1529.c lib1530.c lib1531.c lib1532.c lib1533.c lib1534.c lib1535.c lib1536.c lib1537.c lib1538.c lib1540.c lib1541.c lib1542.c lib1545.c lib1549.c lib1550.c lib1551.c lib1552.c lib1553.c lib1554.c lib1555.c lib1556.c lib1557.c lib1558.c lib1559.c lib1560.c lib1564.c lib1565.c lib1567.c lib1568.c lib1569.c lib1571.c lib1576.c lib1582.c lib1587.c lib1588.c lib1589.c lib1591.c lib1592.c lib1593.c lib1594.c lib1597.c lib1598.c lib1599.c lib1662.c lib1900.c lib1901.c lib1902.c lib1903.c lib1905.c lib1906.c lib1907.c lib1908.c lib1910.c lib1911.c lib1912.c lib1913.c lib1915.c lib1916.c lib1918.c lib1919.c lib1920.c lib1921.c lib1933.c lib1934.c lib1935.c lib1936.c lib1937.c lib1938.c lib1939.c lib1940.c lib1945.c lib1947.c lib1948.c lib1955.c lib1956.c lib1957.c lib1958.c lib1959.c lib1960.c lib1964.c lib1965.c lib1970.c lib1971.c lib1972.c lib1973.c lib1974.c lib1975.c lib1977.c lib1978.c lib2023.c lib2032.c lib2082.c lib2301.c lib2302.c lib2304.c lib2306.c lib2308.c lib2309.c lib2402.c lib2404.c lib2405.c lib2502.c lib2504.c lib2505.c lib2506.c lib2700.c lib3010.c lib3025.c lib3026.c lib3027.c lib3033.c lib3034.c lib3100.c lib3101.c lib3102.c lib3103.c lib3104.c lib3105.c lib3207.c lib3208.c lib500.c lib501.c lib502.c lib503.c lib504.c lib505.c lib506.c lib507.c lib508.c lib509.c lib510.c lib511.c lib512.c lib513.c lib514.c lib515.c lib516.c lib517.c lib518.c lib519.c lib520.c lib521.c lib523.c lib524.c lib525.c lib526.c lib530.c lib533.c lib536.c lib537.c lib539.c lib540.c lib541.c lib542.c lib543.c lib544.c lib547.c lib549.c lib552.c lib553.c lib554.c lib555.c lib556.c lib557.c lib558.c lib559.c lib560.c lib562.c lib564.c lib566.c lib567.c lib568.c lib569.c lib570.c lib571.c lib572.c lib573.c lib574.c lib575.c lib576.c lib578.c lib579.c lib582.c lib583.c lib586.c lib589.c lib590.c lib591.c lib597.c lib598.c lib599.c lib643.c lib650.c lib651.c lib652.c lib653.c lib654.c lib655.c lib658.c lib659.c lib661.c lib666.c lib667.c lib668.c lib670.c lib674.c lib676.c lib677.c lib678.c lib694.c lib695.c lib751.c lib753.c lib757.c lib758.c lib766.c memptr.c mk-lib1521.pl test1013.pl test1022.pl test307.pl test610.pl test613.pl testtrace.c testtrace.h testutil.c testutil.h unitcheck.hserver
.checksrc .gitignore CMakeLists.txt Makefile.am Makefile.inc dnsd.c first.c first.h getpart.c mqttd.c resolve.c rtspd.c sockfilt.c socksd.c sws.c tftpd.c util.ctunit
.gitignore CMakeLists.txt Makefile.am Makefile.inc README.md tool1394.c tool1604.c tool1621.c tool1622.c tool1623.c tool1720.cunit
.gitignore CMakeLists.txt Makefile.am Makefile.inc README.md unit1300.c unit1302.c unit1303.c unit1304.c unit1305.c unit1307.c unit1309.c unit1323.c unit1330.c unit1395.c unit1396.c unit1397.c unit1398.c unit1399.c unit1600.c unit1601.c unit1602.c unit1603.c unit1605.c unit1606.c unit1607.c unit1608.c unit1609.c unit1610.c unit1611.c unit1612.c unit1614.c unit1615.c unit1616.c unit1620.c unit1625.c unit1626.c unit1627.c unit1636.c unit1650.c unit1651.c unit1652.c unit1653.c unit1654.c unit1655.c unit1656.c unit1657.c unit1658.c unit1660.c unit1661.c unit1663.c unit1664.c unit1666.c unit1667.c unit1668.c unit1669.c unit1674.c unit1675.c unit1676.c unit1979.c unit1980.c unit2600.c unit2601.c unit2602.c unit2603.c unit2604.c unit2605.c unit3200.c unit3205.c unit3211.c unit3212.c unit3213.c unit3214.c unit3216.c unit3219.c unit3300.c unit3301.c unit3302.cexamples
.env config.ini crypto_test.lua env_test.lua fs_example.lua http_server.lua https_test.lua ini_example.lua json.lua log.lua path_fs_example.lua process_example.lua request_download.lua request_test.lua run_all.lua sqlite_example.lua sqlite_http_template.lua stash_test.lua template_test.lua timer.lua websocket.luainiparser
example
iniexample.c iniwrite.c parse.c twisted-errors.ini twisted-genhuge.py twisted-ofkey.ini twisted-ofval.ini twisted.initest
CMakeLists.txt test_dictionary.c test_iniparser.c unity-config.yml unity_config.hjinjac
libjinjac
src
CMakeLists.txt ast.c ast.h block_statement.c block_statement.h buffer.c buffer.h buildin.c buildin.h common.h convert.c convert.h flex_decl.h jfunction.c jfunction.h jinja_expression.l jinja_expression.y jinjac_parse.c jinjac_parse.h jinjac_stream.c jinjac_stream.h jlist.c jlist.h jobject.c jobject.h parameter.c parameter.h str_obj.c str_obj.h trace.c trace.htest
.gitignore CMakeLists.txt autotest.rb test_01.expected test_01.jinja test_01b.expected test_01b.jinja test_01c.expected test_01c.jinja test_01d.expected test_01d.jinja test_02.expected test_02.jinja test_03.expected test_03.jinja test_04.expected test_04.jinja test_05.expected test_05.jinja test_06.expected test_06.jinja test_07.expected test_07.jinja test_08.expected test_08.jinja test_08b.expected test_08b.jinja test_09.expected test_09.jinja test_10.expected test_10.jinja test_11.expected test_11.jinja test_12.expected test_12.jinja test_13.expected test_13.jinja test_14.expected test_14.jinja test_15.expected test_15.jinja test_16.expected test_16.jinja test_17.expected test_17.jinja test_18.expected test_18.jinja test_18b.expected test_18b.jinja test_18c.expected test_18c.jinja test_19.expected test_19.jinja test_19b.expected test_19b.jinja test_19c.expected test_19c.jinja test_19d.expected test_19d.jinja test_19e.expected test_19e.jinja test_19f.expected test_19f.jinja test_20.expected test_20.jinja test_21.expected test_21.jinja test_22.expected test_22.jinja test_22a.expected test_22a.jinja test_22b.expected test_22b.jinja test_23.expected test_23.jinja test_24.expected test_24.jinjalibev
Changes LICENSE Makefile Makefile.am Makefile.in README Symbols.ev Symbols.event aclocal.m4 autogen.sh compile config.guess config.h config.h.in config.status config.sub configure configure.ac depcomp ev++.h ev.3 ev.c ev.h ev.pod ev_epoll.c ev_kqueue.c ev_poll.c ev_port.c ev_select.c ev_vars.h ev_win32.c ev_wrap.h event.c event.h install-sh libev.m4 libtool ltmain.sh missing mkinstalldirs stamp-h1luajit
doc
bluequad-print.css bluequad.css contact.html ext_buffer.html ext_c_api.html ext_ffi.html ext_ffi_api.html ext_ffi_semantics.html ext_ffi_tutorial.html ext_jit.html ext_profiler.html extensions.html install.html luajit.html running.htmldynasm
dasm_arm.h dasm_arm.lua dasm_arm64.h dasm_arm64.lua dasm_mips.h dasm_mips.lua dasm_mips64.lua dasm_ppc.h dasm_ppc.lua dasm_proto.h dasm_x64.lua dasm_x86.h dasm_x86.lua dynasm.luasrc
host
.gitignore README buildvm.c buildvm.h buildvm_asm.c buildvm_fold.c buildvm_lib.c buildvm_libbc.h buildvm_peobj.c genlibbc.lua genminilua.lua genversion.lua minilua.cjit
.gitignore bc.lua bcsave.lua dis_arm.lua dis_arm64.lua dis_arm64be.lua dis_mips.lua dis_mips64.lua dis_mips64el.lua dis_mips64r6.lua dis_mips64r6el.lua dis_mipsel.lua dis_ppc.lua dis_x64.lua dis_x86.lua dump.lua p.lua v.lua zone.luawolfssl
.github
workflows
ada.yml arduino.yml async-examples.yml async.yml atecc608-sim.yml bind.yml cmake-autoconf.yml cmake.yml codespell.yml coverity-scan-fixes.yml cryptocb-only.yml curl.yml cyrus-sasl.yml disable-pk-algs.yml docker-Espressif.yml docker-OpenWrt.yml emnet-nonblock.yml fil-c.yml freertos-mem-track.yml gencertbuf.yml grpc.yml haproxy.yml hostap-vm.yml intelasm-c-fallback.yml ipmitool.yml jwt-cpp.yml krb5.yml libspdm.yml libssh2.yml libvncserver.yml linuxkm.yml macos-apple-native-cert-validation.yml mbedtls.sh mbedtls.yml membrowse-comment.yml membrowse-onboard.yml membrowse-report.yml memcached.sh memcached.yml mono.yml mosquitto.yml msmtp.yml msys2.yml multi-arch.yml multi-compiler.yml net-snmp.yml nginx.yml no-malloc.yml no-tls.yml nss.sh nss.yml ntp.yml ocsp.yml openldap.yml openssh.yml openssl-ech.yml opensslcoexist.yml openvpn.yml os-check.yml packaging.yml pam-ipmi.yml pq-all.yml pr-commit-check.yml psk.yml puf.yml python.yml rng-tools.yml rust-wrapper.yml se050-sim.yml smallStackSize.yml socat.yml softhsm.yml sssd.yml stm32-sim.yml stsafe-a120-sim.yml stunnel.yml symbol-prefixes.yml threadx.yml tls-anvil.yml trackmemory.yml watcomc.yml win-csharp-test.yml wolfCrypt-Wconversion.yml wolfboot-integration.yml wolfsm.yml xcode.yml zephyr-4.x.yml zephyr.ymlIDE
ARDUINO
Arduino_README_prepend.md README.md include.am keywords.txt library.properties.template wolfssl-arduino.cpp wolfssl-arduino.sh wolfssl.hECLIPSE
Espressif
ESP-IDF
examples
template
CMakeLists.txt Makefile README.md partitions_singleapp_large.csv sdkconfig.defaults sdkconfig.defaults.esp8266wolfssl_benchmark
VisualGDB
wolfssl_benchmark_IDF_v4.4_ESP32.sln wolfssl_benchmark_IDF_v4.4_ESP32.vgdbproj wolfssl_benchmark_IDF_v5_ESP32.sln wolfssl_benchmark_IDF_v5_ESP32.vgdbproj wolfssl_benchmark_IDF_v5_ESP32C3.sln wolfssl_benchmark_IDF_v5_ESP32C3.vgdbproj wolfssl_benchmark_IDF_v5_ESP32S3.sln wolfssl_benchmark_IDF_v5_ESP32S3.vgdbprojwolfssl_client
CMakeLists.txt Makefile README.md README_server_sm.md partitions_singleapp_large.csv sdkconfig.defaults sdkconfig.defaults.esp32c2 sdkconfig.defaults.esp8266 wolfssl_client_ESP8266.vgdbprojwolfssl_server
CMakeLists.txt Makefile README.md README_server_sm.md partitions_singleapp_large.csv sdkconfig.defaults sdkconfig.defaults.esp32c2 sdkconfig.defaults.esp8266 wolfssl_server_ESP8266.vgdbprojwolfssl_test
VisualGDB
wolfssl_test-IDF_v5_ESP32.sln wolfssl_test-IDF_v5_ESP32.vgdbproj wolfssl_test-IDF_v5_ESP32C3.sln wolfssl_test-IDF_v5_ESP32C3.vgdbproj wolfssl_test-IDF_v5_ESP32C6.sln wolfssl_test-IDF_v5_ESP32C6.vgdbproj wolfssl_test_IDF_v5_ESP32S3.sln wolfssl_test_IDF_v5_ESP32S3.vgdbprojGCC-ARM
Makefile Makefile.bench Makefile.client Makefile.common Makefile.server Makefile.static Makefile.test README.md include.am linker.ld linker_fips.ldIAR-EWARM
embOS
SAMV71_XULT
embOS_SAMV71_XULT_user_settings
user_settings.h user_settings_simple_example.h user_settings_verbose_example.hembOS_wolfcrypt_benchmark_SAMV71_XULT
README_wolfcrypt_benchmark wolfcrypt_benchmark.ewd wolfcrypt_benchmark.ewpINTIME-RTOS
Makefile README.md include.am libwolfssl.c libwolfssl.vcxproj user_settings.h wolfExamples.c wolfExamples.h wolfExamples.sln wolfExamples.vcxproj wolfssl-lib.sln wolfssl-lib.vcxprojMQX
Makefile README-jp.md README.md client-tls.c include.am server-tls.c user_config.h user_settings.hMSVS-2019-AZSPHERE
wolfssl_new_azsphere
.gitignore CMakeLists.txt CMakeSettings.json app_manifest.json applibs_versions.h launch.vs.json main.cNETOS
Makefile.wolfcrypt.inc README.md include.am user_settings.h user_settings.h-cert2425 user_settings.h-cert3389 wolfssl_netos_custom.cPlatformIO
examples
wolfssl_benchmark
CMakeLists.txt README.md platformio.ini sdkconfig.defaults wolfssl_benchmark.code-workspaceROWLEY-CROSSWORKS-ARM
Kinetis_FlashPlacement.xml README.md arm_startup.c benchmark_main.c hw.h include.am kinetis_hw.c retarget.c test_main.c user_settings.h wolfssl.hzp wolfssl_ltc.hzpRenesas
e2studio
RA6M3
README.md README_APRA6M_en.md README_APRA6M_jp.md include.amRX72N
EnvisionKit
Simple
README_EN.md README_JP.mdwolfssl_demo
key_data.c key_data.h user_settings.h wolfssl_demo.c wolfssl_demo.h wolfssl_tsip_unit_test.cSTM32Cube
README.md STM32_Benchmarks.md default_conf.ftl include.am main.c wolfssl_example.c wolfssl_example.hWIN
README.txt include.am test.vcxproj user_settings.h user_settings_dtls.h wolfssl-fips.sln wolfssl-fips.vcxprojWIN-SRTP-KDF-140-3
README.txt include.am resource.h test.vcxproj user_settings.h wolfssl-fips.rc wolfssl-fips.sln wolfssl-fips.vcxprojWIN10
README.txt include.am resource.h test.vcxproj user_settings.h wolfssl-fips.rc wolfssl-fips.sln wolfssl-fips.vcxprojXCODE
Benchmark
include.amXilinxSDK
README.md bench.sh combine.sh eclipse_formatter_profile.xml graph.sh include.am user_settings.h wolfssl_example.capple-universal
wolfssl-multiplatform
iotsafe
Makefile README.md ca-cert.c devices.c devices.h include.am main.c memory-tls.c startup.c target.ld user_settings.hmynewt
README.md apps.wolfcrypttest.pkg.yml crypto.wolfssl.pkg.yml crypto.wolfssl.syscfg.yml include.am setup.shcerts
1024
ca-cert.der ca-cert.pem ca-key.der ca-key.pem client-cert.der client-cert.pem client-key.der client-key.pem client-keyPub.der dh1024.der dh1024.pem dsa-pub-1024.pem dsa1024.der dsa1024.pem include.am rsa1024.der server-cert.der server-cert.pem server-key.der server-key.pemcrl
extra-crls
ca-int-cert-revoked.pem claim-root.pem crl_critical_entry.pem crlnum_57oct.pem crlnum_64oct.pem general-server-crl.pem large_crlnum.pem large_crlnum2.pemdilithium
bench_dilithium_level2_key.der bench_dilithium_level3_key.der bench_dilithium_level5_key.der include.amecc
bp256r1-key.der bp256r1-key.pem ca-secp256k1-cert.pem ca-secp256k1-key.pem client-bp256r1-cert.der client-bp256r1-cert.pem client-secp256k1-cert.der client-secp256k1-cert.pem genecc.sh include.am secp256k1-key.der secp256k1-key.pem secp256k1-param.pem secp256k1-privkey.der secp256k1-privkey.pem server-bp256r1-cert.der server-bp256r1-cert.pem server-secp256k1-cert.der server-secp256k1-cert.pem server2-secp256k1-cert.der server2-secp256k1-cert.pem wolfssl.cnf wolfssl_384.cnfed25519
ca-ed25519-key.der ca-ed25519-key.pem ca-ed25519-priv.der ca-ed25519-priv.pem ca-ed25519.der ca-ed25519.pem client-ed25519-key.der client-ed25519-key.pem client-ed25519-priv.der client-ed25519-priv.pem client-ed25519.der client-ed25519.pem eddsa-ed25519.der eddsa-ed25519.pem gen-ed25519-certs.sh gen-ed25519-keys.sh gen-ed25519.sh include.am root-ed25519-key.der root-ed25519-key.pem root-ed25519-priv.der root-ed25519-priv.pem root-ed25519.der root-ed25519.pem server-ed25519-cert.pem server-ed25519-key.der server-ed25519-key.pem server-ed25519-priv.der server-ed25519-priv.pem server-ed25519.der server-ed25519.pemed448
ca-ed448-key.der ca-ed448-key.pem ca-ed448-priv.der ca-ed448-priv.pem ca-ed448.der ca-ed448.pem client-ed448-key.der client-ed448-key.pem client-ed448-priv.der client-ed448-priv.pem client-ed448.der client-ed448.pem gen-ed448-certs.sh gen-ed448-keys.sh include.am root-ed448-key.der root-ed448-key.pem root-ed448-priv.der root-ed448-priv.pem root-ed448.der root-ed448.pem server-ed448-cert.pem server-ed448-key.der server-ed448-key.pem server-ed448-priv.der server-ed448-priv.pem server-ed448.der server-ed448.pemexternal
DigiCertGlobalRootCA.pem README.txt ca-digicert-ev.pem ca-globalsign-root.pem ca-google-root.pem ca_collection.pem include.amintermediate
ca_false_intermediate
gentestcert.sh int_ca.key server.key test_ca.key test_ca.pem test_int_not_cacert.pem test_sign_bynoca_srv.pem wolfssl_base.conf wolfssl_srv.conflms
bc_hss_L2_H5_W8_root.der bc_hss_L3_H5_W4_root.der bc_lms_chain_ca.der bc_lms_chain_leaf.der bc_lms_native_bc_root.der bc_lms_sha256_h10_w8_root.der bc_lms_sha256_h5_w4_root.der include.ammldsa
README.txt include.am mldsa44-cert.der mldsa44-cert.pem mldsa44-key.pem mldsa44_bare-priv.der mldsa44_bare-seed.der mldsa44_oqskeypair.der mldsa44_priv-only.der mldsa44_pub-spki.der mldsa44_seed-only.der mldsa44_seed-priv.der mldsa65-cert.der mldsa65-cert.pem mldsa65-key.pem mldsa65_bare-priv.der mldsa65_bare-seed.der mldsa65_oqskeypair.der mldsa65_priv-only.der mldsa65_pub-spki.der mldsa65_seed-only.der mldsa65_seed-priv.der mldsa87-cert.der mldsa87-cert.pem mldsa87-key.pem mldsa87_bare-priv.der mldsa87_bare-seed.der mldsa87_oqskeypair.der mldsa87_priv-only.der mldsa87_pub-spki.der mldsa87_seed-only.der mldsa87_seed-priv.derocsp
imposter-root-ca-cert.der imposter-root-ca-cert.pem imposter-root-ca-key.der imposter-root-ca-key.pem include.am index-ca-and-intermediate-cas.txt index-ca-and-intermediate-cas.txt.attr index-intermediate1-ca-issued-certs.txt index-intermediate1-ca-issued-certs.txt.attr index-intermediate2-ca-issued-certs.txt index-intermediate2-ca-issued-certs.txt.attr index-intermediate3-ca-issued-certs.txt index-intermediate3-ca-issued-certs.txt.attr intermediate1-ca-cert.der intermediate1-ca-cert.pem intermediate1-ca-key.der intermediate1-ca-key.pem intermediate2-ca-cert.der intermediate2-ca-cert.pem intermediate2-ca-key.der intermediate2-ca-key.pem intermediate3-ca-cert.der intermediate3-ca-cert.pem intermediate3-ca-key.der intermediate3-ca-key.pem ocsp-responder-cert.der ocsp-responder-cert.pem ocsp-responder-key.der ocsp-responder-key.pem openssl.cnf renewcerts-for-test.sh renewcerts.sh root-ca-cert.der root-ca-cert.pem root-ca-crl.pem root-ca-key.der root-ca-key.pem server1-cert.der server1-cert.pem server1-chain-noroot.pem server1-key.der server1-key.pem server2-cert.der server2-cert.pem server2-key.der server2-key.pem server3-cert.der server3-cert.pem server3-key.der server3-key.pem server4-cert.der server4-cert.pem server4-key.der server4-key.pem server5-cert.der server5-cert.pem server5-key.der server5-key.pem test-leaf-response.der test-multi-response.der test-response-nointern.der test-response-rsapss.der test-response.derp521
ca-p521-key.der ca-p521-key.pem ca-p521-priv.der ca-p521-priv.pem ca-p521.der ca-p521.pem client-p521-key.der client-p521-key.pem client-p521-priv.der client-p521-priv.pem client-p521.der client-p521.pem gen-p521-certs.sh gen-p521-keys.sh include.am root-p521-key.der root-p521-key.pem root-p521-priv.der root-p521-priv.pem root-p521.der root-p521.pem server-p521-cert.pem server-p521-key.der server-p521-key.pem server-p521-priv.der server-p521-priv.pem server-p521.der server-p521.pemrpk
client-cert-rpk.der client-ecc-cert-rpk.der include.am server-cert-rpk.der server-ecc-cert-rpk.derrsapss
ca-3072-rsapss-key.der ca-3072-rsapss-key.pem ca-3072-rsapss-priv.der ca-3072-rsapss-priv.pem ca-3072-rsapss.der ca-3072-rsapss.pem ca-rsapss-key.der ca-rsapss-key.pem ca-rsapss-priv.der ca-rsapss-priv.pem ca-rsapss.der ca-rsapss.pem client-3072-rsapss-key.der client-3072-rsapss-key.pem client-3072-rsapss-priv.der client-3072-rsapss-priv.pem client-3072-rsapss.der client-3072-rsapss.pem client-rsapss-key.der client-rsapss-key.pem client-rsapss-priv.der client-rsapss-priv.pem client-rsapss.der client-rsapss.pem gen-rsapss-keys.sh include.am renew-rsapss-certs.sh root-3072-rsapss-key.der root-3072-rsapss-key.pem root-3072-rsapss-priv.der root-3072-rsapss-priv.pem root-3072-rsapss.der root-3072-rsapss.pem root-rsapss-key.der root-rsapss-key.pem root-rsapss-priv.der root-rsapss-priv.pem root-rsapss.der root-rsapss.pem server-3072-rsapss-cert.pem server-3072-rsapss-key.der server-3072-rsapss-key.pem server-3072-rsapss-priv.der server-3072-rsapss-priv.pem server-3072-rsapss.der server-3072-rsapss.pem server-mix-rsapss-cert.pem server-rsapss-cert.pem server-rsapss-key.der server-rsapss-key.pem server-rsapss-priv.der server-rsapss-priv.pem server-rsapss.der server-rsapss.pemslhdsa
bench_slhdsa_sha2_128f_key.der bench_slhdsa_sha2_128s_key.der bench_slhdsa_sha2_192f_key.der bench_slhdsa_sha2_192s_key.der bench_slhdsa_sha2_256f_key.der bench_slhdsa_sha2_256s_key.der bench_slhdsa_shake128f_key.der bench_slhdsa_shake128s_key.der bench_slhdsa_shake192f_key.der bench_slhdsa_shake192s_key.der bench_slhdsa_shake256f_key.der bench_slhdsa_shake256s_key.der client-mldsa44-priv.pem client-mldsa44-sha2.der client-mldsa44-sha2.pem client-mldsa44-shake.der client-mldsa44-shake.pem gen-slhdsa-mldsa-certs.sh include.am root-slhdsa-sha2-128s-priv.der root-slhdsa-sha2-128s-priv.pem root-slhdsa-sha2-128s.der root-slhdsa-sha2-128s.pem root-slhdsa-shake-128s-priv.der root-slhdsa-shake-128s-priv.pem root-slhdsa-shake-128s.der root-slhdsa-shake-128s.pem server-mldsa44-priv.pem server-mldsa44-sha2.der server-mldsa44-sha2.pem server-mldsa44-shake.der server-mldsa44-shake.pemsm2
ca-sm2-key.der ca-sm2-key.pem ca-sm2-priv.der ca-sm2-priv.pem ca-sm2.der ca-sm2.pem client-sm2-key.der client-sm2-key.pem client-sm2-priv.der client-sm2-priv.pem client-sm2.der client-sm2.pem fix_sm2_spki.py gen-sm2-certs.sh gen-sm2-keys.sh include.am root-sm2-key.der root-sm2-key.pem root-sm2-priv.der root-sm2-priv.pem root-sm2.der root-sm2.pem self-sm2-cert.pem self-sm2-key.pem self-sm2-priv.pem server-sm2-cert.der server-sm2-cert.pem server-sm2-key.der server-sm2-key.pem server-sm2-priv.der server-sm2-priv.pem server-sm2.der server-sm2.pemstatickeys
dh-ffdhe2048-params.pem dh-ffdhe2048-pub.der dh-ffdhe2048-pub.pem dh-ffdhe2048.der dh-ffdhe2048.pem ecc-secp256r1.der ecc-secp256r1.pem gen-static.sh include.am x25519-pub.der x25519-pub.pem x25519.der x25519.pemtest
catalog.txt cert-bad-neg-int.der cert-bad-oid.der cert-bad-utf8.der cert-ext-ia.cfg cert-ext-ia.der cert-ext-ia.pem cert-ext-joi.cfg cert-ext-joi.der cert-ext-joi.pem cert-ext-mnc.der cert-ext-multiple.cfg cert-ext-multiple.der cert-ext-multiple.pem cert-ext-nc-combined.der cert-ext-nc-combined.pem cert-ext-nc.cfg cert-ext-nc.der cert-ext-nc.pem cert-ext-ncdns.der cert-ext-ncdns.pem cert-ext-ncip.der cert-ext-ncip.pem cert-ext-ncmixed.der cert-ext-ncmulti.der cert-ext-ncmulti.pem cert-ext-ncrid.der cert-ext-ncrid.pem cert-ext-nct.cfg cert-ext-nct.der cert-ext-nct.pem cert-ext-ndir-exc.cfg cert-ext-ndir-exc.der cert-ext-ndir-exc.pem cert-ext-ndir.cfg cert-ext-ndir.der cert-ext-ndir.pem cert-ext-ns.der cert-over-max-altnames.cfg cert-over-max-altnames.der cert-over-max-altnames.pem cert-over-max-nc.cfg cert-over-max-nc.der cert-over-max-nc.pem client-ecc-cert-ski.hex cn-ip-literal.der cn-ip-wildcard.der crit-cert.pem crit-key.pem dh1024.der dh1024.pem dh512.der dh512.pem digsigku.pem encrypteddata.msg gen-badsig.sh gen-ext-certs.sh gen-testcerts.sh include.am kari-keyid-cms.msg ktri-keyid-cms.msg ossl-trusted-cert.pem server-badaltname.der server-badaltname.pem server-badaltnull.der server-badaltnull.pem server-badcn.der server-badcn.pem server-badcnnull.der server-badcnnull.pem server-cert-ecc-badsig.der server-cert-ecc-badsig.pem server-cert-rsa-badsig.der server-cert-rsa-badsig.pem server-duplicate-policy.pem server-garbage.der server-garbage.pem server-goodalt.der server-goodalt.pem server-goodaltwild.der server-goodaltwild.pem server-goodcn.der server-goodcn.pem server-goodcnwild.der server-goodcnwild.pem server-localhost.der server-localhost.pem smime-test-canon.p7s smime-test-multipart-badsig.p7s smime-test-multipart.p7s smime-test.p7stest-pathlen
assemble-chains.sh chainA-ICA1-key.pem chainA-ICA1-pathlen0.pem chainA-assembled.pem chainA-entity-key.pem chainA-entity.pem chainB-ICA1-key.pem chainB-ICA1-pathlen0.pem chainB-ICA2-key.pem chainB-ICA2-pathlen1.pem chainB-assembled.pem chainB-entity-key.pem chainB-entity.pem chainC-ICA1-key.pem chainC-ICA1-pathlen1.pem chainC-assembled.pem chainC-entity-key.pem chainC-entity.pem chainD-ICA1-key.pem chainD-ICA1-pathlen127.pem chainD-assembled.pem chainD-entity-key.pem chainD-entity.pem chainE-ICA1-key.pem chainE-ICA1-pathlen128.pem chainE-assembled.pem chainE-entity-key.pem chainE-entity.pem chainF-ICA1-key.pem chainF-ICA1-pathlen1.pem chainF-ICA2-key.pem chainF-ICA2-pathlen0.pem chainF-assembled.pem chainF-entity-key.pem chainF-entity.pem chainG-ICA1-key.pem chainG-ICA1-pathlen0.pem chainG-ICA2-key.pem chainG-ICA2-pathlen1.pem chainG-ICA3-key.pem chainG-ICA3-pathlen99.pem chainG-ICA4-key.pem chainG-ICA4-pathlen5.pem chainG-ICA5-key.pem chainG-ICA5-pathlen20.pem chainG-ICA6-key.pem chainG-ICA6-pathlen10.pem chainG-ICA7-key.pem chainG-ICA7-pathlen100.pem chainG-assembled.pem chainG-entity-key.pem chainG-entity.pem chainH-ICA1-key.pem chainH-ICA1-pathlen0.pem chainH-ICA2-key.pem chainH-ICA2-pathlen2.pem chainH-ICA3-key.pem chainH-ICA3-pathlen2.pem chainH-ICA4-key.pem chainH-ICA4-pathlen2.pem chainH-assembled.pem chainH-entity-key.pem chainH-entity.pem chainI-ICA1-key.pem chainI-ICA1-no_pathlen.pem chainI-ICA2-key.pem chainI-ICA2-no_pathlen.pem chainI-ICA3-key.pem chainI-ICA3-pathlen2.pem chainI-assembled.pem chainI-entity-key.pem chainI-entity.pem chainJ-ICA1-key.pem chainJ-ICA1-no_pathlen.pem chainJ-ICA2-key.pem chainJ-ICA2-no_pathlen.pem chainJ-ICA3-key.pem chainJ-ICA3-no_pathlen.pem chainJ-ICA4-key.pem chainJ-ICA4-pathlen2.pem chainJ-assembled.pem chainJ-entity-key.pem chainJ-entity.pem include.am refreshkeys.shtest-serial0
ee_normal.pem ee_serial0.pem generate_certs.sh include.am intermediate_serial0.pem root_serial0.pem root_serial0_key.pem selfsigned_nonca_serial0.pemxmss
bc_xmss_chain_ca.der bc_xmss_chain_leaf.der bc_xmss_sha2_10_256_root.der bc_xmss_sha2_16_256_root.der bc_xmssmt_sha2_20_2_256_root.der bc_xmssmt_sha2_20_4_256_root.der bc_xmssmt_sha2_40_8_256_root.der include.amcmake
Config.cmake.in README.md config.in functions.cmake include.am options.h.in wolfssl-config-version.cmake.in wolfssl-targets.cmake.indebian
changelog.in control.in copyright include.am libwolfssl-dev.install libwolfssl.install rules.indoc
dox_comments
header_files
aes.h arc4.h ascon.h asn.h asn_public.h blake2.h bn.h camellia.h chacha.h chacha20_poly1305.h cmac.h coding.h compress.h cryptocb.h curve25519.h curve448.h des3.h dh.h doxygen_groups.h doxygen_pages.h dsa.h ecc.h eccsi.h ed25519.h ed448.h error-crypt.h evp.h hash.h hmac.h iotsafe.h kdf.h logging.h md2.h md4.h md5.h memory.h ocsp.h pem.h pkcs11.h pkcs7.h poly1305.h psa.h puf.h pwdbased.h quic.h random.h ripemd.h rsa.h sakke.h sha.h sha256.h sha3.h sha512.h signature.h siphash.h srp.h ssl.h tfm.h types.h wc_encrypt.h wc_port.h wc_she.h wc_slhdsa.h wolfio.hheader_files-ja
aes.h arc4.h ascon.h asn.h asn_public.h blake2.h bn.h camellia.h chacha.h chacha20_poly1305.h cmac.h coding.h compress.h cryptocb.h curve25519.h curve448.h des3.h dh.h doxygen_groups.h doxygen_pages.h dsa.h ecc.h eccsi.h ed25519.h ed448.h error-crypt.h evp.h hash.h hmac.h iotsafe.h kdf.h logging.h md2.h md4.h md5.h memory.h ocsp.h pem.h pkcs11.h pkcs7.h poly1305.h psa.h pwdbased.h quic.h random.h ripemd.h rsa.h sakke.h sha.h sha256.h sha3.h sha512.h signature.h siphash.h srp.h ssl.h tfm.h types.h wc_encrypt.h wc_port.h wolfio.hexamples
async
Makefile README.md async_client.c async_server.c async_tls.c async_tls.h include.am user_settings.hconfigs
README.md include.am user_settings_EBSnet.h user_settings_all.h user_settings_arduino.h user_settings_baremetal.h user_settings_ca.h user_settings_curve25519nonblock.h user_settings_dtls13.h user_settings_eccnonblock.h user_settings_espressif.h user_settings_fipsv2.h user_settings_fipsv5.h user_settings_min_ecc.h user_settings_openssl_compat.h user_settings_pkcs7.h user_settings_platformio.h user_settings_pq.h user_settings_rsa_only.h user_settings_stm32.h user_settings_template.h user_settings_tls12.h user_settings_tls13.h user_settings_wolfboot_keytools.h user_settings_wolfssh.h user_settings_wolftpm.hechoclient
echoclient.c echoclient.h echoclient.sln echoclient.vcproj echoclient.vcxproj include.am quitlinuxkm
Kbuild Makefile README.md get_thread_size.c include.am linuxkm-fips-hash-wrapper.sh linuxkm-fips-hash.c linuxkm_memory.c linuxkm_memory.h linuxkm_wc_port.h lkcapi_aes_glue.c lkcapi_dh_glue.c lkcapi_ecdh_glue.c lkcapi_ecdsa_glue.c lkcapi_glue.c lkcapi_rsa_glue.c lkcapi_sha_glue.c module_exports.c.template module_hooks.c pie_redirect_table.c wolfcrypt.lds x86_vector_register_glue.cm4
ax_add_am_macro.m4 ax_am_jobserver.m4 ax_am_macros.m4 ax_append_compile_flags.m4 ax_append_flag.m4 ax_append_link_flags.m4 ax_append_to_file.m4 ax_atomic.m4 ax_bsdkm.m4 ax_check_compile_flag.m4 ax_check_link_flag.m4 ax_compiler_version.m4 ax_count_cpus.m4 ax_create_generic_config.m4 ax_debug.m4 ax_file_escapes.m4 ax_harden_compiler_flags.m4 ax_linuxkm.m4 ax_print_to_file.m4 ax_pthread.m4 ax_require_defined.m4 ax_tls.m4 ax_vcs_checkout.m4 hexversion.m4 lib_socket_nsl.m4 visibility.m4mqx
wolfcrypt_benchmark
ReferencedRSESystems.xml wolfcrypt_benchmark_twrk70f120m_Int_Flash_DDRData_Debug_PnE_U-MultiLink.launch wolfcrypt_benchmark_twrk70f120m_Int_Flash_DDRData_Release_PnE_U-MultiLink.launch wolfcrypt_benchmark_twrk70f120m_Int_Flash_SramData_Debug_JTrace.jlink wolfcrypt_benchmark_twrk70f120m_Int_Flash_SramData_Debug_JTrace.launch wolfcrypt_benchmark_twrk70f120m_Int_Flash_SramData_Debug_PnE_U-MultiLink.launch wolfcrypt_benchmark_twrk70f120m_Int_Flash_SramData_Release_PnE_U-MultiLink.launchwolfcrypt_test
ReferencedRSESystems.xml wolfcrypt_test_twrk70f120m_Int_Flash_DDRData_Debug_PnE_U-MultiLink.launch wolfcrypt_test_twrk70f120m_Int_Flash_DDRData_Release_PnE_U-MultiLink.launch wolfcrypt_test_twrk70f120m_Int_Flash_SramData_Debug_JTrace.jlink wolfcrypt_test_twrk70f120m_Int_Flash_SramData_Debug_JTrace.launch wolfcrypt_test_twrk70f120m_Int_Flash_SramData_Debug_PnE_U-MultiLink.launch wolfcrypt_test_twrk70f120m_Int_Flash_SramData_Release_PnE_U-MultiLink.launchwolfssl_client
ReferencedRSESystems.xml wolfssl_client_twrk70f120m_Int_Flash_DDRData_Debug_PnE_U-MultiLink.launch wolfssl_client_twrk70f120m_Int_Flash_DDRData_Release_PnE_U-MultiLink.launch wolfssl_client_twrk70f120m_Int_Flash_SramData_Debug_JTrace.jlink wolfssl_client_twrk70f120m_Int_Flash_SramData_Debug_JTrace.launch wolfssl_client_twrk70f120m_Int_Flash_SramData_Debug_PnE_U-MultiLink.launch wolfssl_client_twrk70f120m_Int_Flash_SramData_Release_PnE_U-MultiLink.launchscripts
aria-cmake-build-test.sh asn1_oid_sum.pl benchmark.test benchmark_compare.sh cleanup_testfiles.sh crl-gen-openssl.test crl-revoked.test dertoc.pl dtls.test dtlscid.test external.test google.test include.am makedistsmall.sh memtest.sh ocsp-responder-openssl-interop.test ocsp-stapling-with-ca-as-responder.test ocsp-stapling-with-wolfssl-responder.test ocsp-stapling.test ocsp-stapling2.test ocsp-stapling_tls13multi.test ocsp.test openssl.test openssl_srtp.test pem.test ping.test pkcallbacks.test psk.test resume.test rsapss.test sniffer-gen.sh sniffer-ipv6.pcap sniffer-static-rsa.pcap sniffer-testsuite.test sniffer-tls12-keylog.out sniffer-tls12-keylog.pcap sniffer-tls12-keylog.sslkeylog sniffer-tls13-dh-resume.pcap sniffer-tls13-dh.pcap sniffer-tls13-ecc-resume.pcap sniffer-tls13-ecc.pcap sniffer-tls13-hrr.pcap sniffer-tls13-keylog.out sniffer-tls13-keylog.pcap sniffer-tls13-keylog.sslkeylog sniffer-tls13-x25519-resume.pcap sniffer-tls13-x25519.pcap stm32l4-v4_0_1_build.sh tls13.test trusted_peer.test unit.test.in user_settings_asm.shsrc
bio.c conf.c crl.c dtls.c dtls13.c include.am internal.c keys.c ocsp.c pk.c pk_ec.c pk_rsa.c quic.c sniffer.c ssl.c ssl_api_cert.c ssl_api_crl_ocsp.c ssl_api_pk.c ssl_asn1.c ssl_bn.c ssl_certman.c ssl_crypto.c ssl_ech.c ssl_load.c ssl_misc.c ssl_p7p12.c ssl_sess.c ssl_sk.c tls.c tls13.c wolfio.c x509.c x509_str.ctests
api
api.h api_decl.h create_ocsp_test_blobs.py include.am test_aes.c test_aes.h test_arc4.c test_arc4.h test_ascon.c test_ascon.h test_ascon_kats.h test_asn.c test_asn.h test_blake2.c test_blake2.h test_camellia.c test_camellia.h test_certman.c test_certman.h test_chacha.c test_chacha.h test_chacha20_poly1305.c test_chacha20_poly1305.h test_cmac.c test_cmac.h test_curve25519.c test_curve25519.h test_curve448.c test_curve448.h test_des3.c test_des3.h test_dh.c test_dh.h test_digest.h test_dsa.c test_dsa.h test_dtls.c test_dtls.h test_ecc.c test_ecc.h test_ed25519.c test_ed25519.h test_ed448.c test_ed448.h test_evp.c test_evp.h test_evp_cipher.c test_evp_cipher.h test_evp_digest.c test_evp_digest.h test_evp_pkey.c test_evp_pkey.h test_hash.c test_hash.h test_hmac.c test_hmac.h test_md2.c test_md2.h test_md4.c test_md4.h test_md5.c test_md5.h test_mldsa.c test_mldsa.h test_mlkem.c test_mlkem.h test_ocsp.c test_ocsp.h test_ocsp_test_blobs.h test_ossl_asn1.c test_ossl_asn1.h test_ossl_bio.c test_ossl_bio.h test_ossl_bn.c test_ossl_bn.h test_ossl_cipher.c test_ossl_cipher.h test_ossl_dgst.c test_ossl_dgst.h test_ossl_dh.c test_ossl_dh.h test_ossl_dsa.c test_ossl_dsa.h test_ossl_ec.c test_ossl_ec.h test_ossl_ecx.c test_ossl_ecx.h test_ossl_mac.c test_ossl_mac.h test_ossl_obj.c test_ossl_obj.h test_ossl_p7p12.c test_ossl_p7p12.h test_ossl_pem.c test_ossl_pem.h test_ossl_rand.c test_ossl_rand.h test_ossl_rsa.c test_ossl_rsa.h test_ossl_sk.c test_ossl_sk.h test_ossl_x509.c test_ossl_x509.h test_ossl_x509_acert.c test_ossl_x509_acert.h test_ossl_x509_crypto.c test_ossl_x509_crypto.h test_ossl_x509_ext.c test_ossl_x509_ext.h test_ossl_x509_info.c test_ossl_x509_info.h test_ossl_x509_io.c test_ossl_x509_io.h test_ossl_x509_lu.c test_ossl_x509_lu.h test_ossl_x509_name.c test_ossl_x509_name.h test_ossl_x509_pk.c test_ossl_x509_pk.h test_ossl_x509_str.c test_ossl_x509_str.h test_ossl_x509_vp.c test_ossl_x509_vp.h test_pkcs12.c test_pkcs12.h test_pkcs7.c test_pkcs7.h test_poly1305.c test_poly1305.h test_random.c test_random.h test_rc2.c test_rc2.h test_ripemd.c test_ripemd.h test_rsa.c test_rsa.h test_sha.c test_sha.h test_sha256.c test_sha256.h test_sha3.c test_sha3.h test_sha512.c test_sha512.h test_she.c test_she.h test_signature.c test_signature.h test_slhdsa.c test_slhdsa.h test_sm2.c test_sm2.h test_sm3.c test_sm3.h test_sm4.c test_sm4.h test_tls.c test_tls.h test_tls13.c test_tls13.h test_tls_ext.c test_tls_ext.h test_wc_encrypt.c test_wc_encrypt.h test_wolfmath.c test_wolfmath.h test_x509.c test_x509.hwolfcrypt
benchmark
README.md benchmark-VS2022.sln benchmark-VS2022.vcxproj benchmark-VS2022.vcxproj.user benchmark.c benchmark.h benchmark.sln benchmark.vcproj benchmark.vcxproj include.amsrc
port
Espressif
esp_crt_bundle
README.md cacrt_all.pem cacrt_deprecated.pem cacrt_local.pem esp_crt_bundle.c gen_crt_bundle.py pio_install_cryptography.pyRenesas
README.md renesas_common.c renesas_fspsm_aes.c renesas_fspsm_rsa.c renesas_fspsm_sha.c renesas_fspsm_util.c renesas_rx64_hw_sha.c renesas_rx64_hw_util.c renesas_tsip_aes.c renesas_tsip_rsa.c renesas_tsip_sha.c renesas_tsip_util.carm
armv8-32-aes-asm.S armv8-32-aes-asm_c.c armv8-32-chacha-asm.S armv8-32-chacha-asm_c.c armv8-32-curve25519.S armv8-32-curve25519_c.c armv8-32-mlkem-asm.S armv8-32-mlkem-asm_c.c armv8-32-poly1305-asm.S armv8-32-poly1305-asm_c.c armv8-32-sha256-asm.S armv8-32-sha256-asm_c.c armv8-32-sha3-asm.S armv8-32-sha3-asm_c.c armv8-32-sha512-asm.S armv8-32-sha512-asm_c.c armv8-aes-asm.S armv8-aes-asm_c.c armv8-aes.c armv8-chacha-asm.S armv8-chacha-asm_c.c armv8-curve25519.S armv8-curve25519_c.c armv8-mlkem-asm.S armv8-mlkem-asm_c.c armv8-poly1305-asm.S armv8-poly1305-asm_c.c armv8-sha256-asm.S armv8-sha256-asm_c.c armv8-sha256.c armv8-sha3-asm.S armv8-sha3-asm_c.c armv8-sha512-asm.S armv8-sha512-asm_c.c armv8-sha512.c cryptoCell.c cryptoCellHash.c thumb2-aes-asm.S thumb2-aes-asm_c.c thumb2-chacha-asm.S thumb2-chacha-asm_c.c thumb2-curve25519.S thumb2-curve25519_c.c thumb2-mlkem-asm.S thumb2-mlkem-asm_c.c thumb2-poly1305-asm.S thumb2-poly1305-asm_c.c thumb2-sha256-asm.S thumb2-sha256-asm_c.c thumb2-sha3-asm.S thumb2-sha3-asm_c.c thumb2-sha512-asm.S thumb2-sha512-asm_c.ccaam
README.md caam_aes.c caam_doc.pdf caam_driver.c caam_error.c caam_integrity.c caam_qnx.c caam_sha.c wolfcaam_aes.c wolfcaam_cmac.c wolfcaam_ecdsa.c wolfcaam_fsl_nxp.c wolfcaam_hash.c wolfcaam_hmac.c wolfcaam_init.c wolfcaam_qnx.c wolfcaam_rsa.c wolfcaam_seco.c wolfcaam_x25519.cdevcrypto
README.md devcrypto_aes.c devcrypto_ecdsa.c devcrypto_hash.c devcrypto_hmac.c devcrypto_rsa.c devcrypto_x25519.c wc_devcrypto.criscv
riscv-64-aes.c riscv-64-chacha.c riscv-64-poly1305.c riscv-64-sha256.c riscv-64-sha3.c riscv-64-sha512.cwolfssl
openssl
aes.h asn1.h asn1t.h bio.h bn.h buffer.h camellia.h cmac.h cms.h compat_types.h conf.h crypto.h des.h dh.h dsa.h ec.h ec25519.h ec448.h ecdh.h ecdsa.h ed25519.h ed448.h engine.h err.h evp.h fips_rand.h hmac.h include.am kdf.h lhash.h md4.h md5.h modes.h obj_mac.h objects.h ocsp.h opensslconf.h opensslv.h ossl_typ.h pem.h pkcs12.h pkcs7.h rand.h rc4.h ripemd.h rsa.h safestack.h sha.h sha3.h srp.h ssl.h ssl23.h stack.h tls1.h txt_db.h ui.h x509.h x509_vfy.h x509v3.hwolfcrypt
port
Renesas
renesas-fspsm-crypt.h renesas-fspsm-types.h renesas-rx64-hw-crypt.h renesas-tsip-crypt.h renesas_cmn.h renesas_fspsm_internal.h renesas_sync.h renesas_tsip_internal.h renesas_tsip_types.hcaam
caam_driver.h caam_error.h caam_qnx.h wolfcaam.h wolfcaam_aes.h wolfcaam_cmac.h wolfcaam_ecdsa.h wolfcaam_fsl_nxp.h wolfcaam_hash.h wolfcaam_qnx.h wolfcaam_rsa.h wolfcaam_seco.h wolfcaam_sha.h wolfcaam_x25519.hwrapper
Ada
examples
src
aes_verify_main.adb rsa_verify_main.adb sha256_main.adb spark_sockets.adb spark_sockets.ads spark_terminal.adb spark_terminal.ads tls_client.adb tls_client.ads tls_client_main.adb tls_server.adb tls_server.ads tls_server_main.adbtests
src
aes_bindings_tests.adb aes_bindings_tests.ads rsa_verify_bindings_tests.adb rsa_verify_bindings_tests.ads sha256_bindings_tests.adb sha256_bindings_tests.ads tests.adbCSharp
wolfSSL-Example-IOCallbacks
App.config wolfSSL-Example-IOCallbacks.cs wolfSSL-Example-IOCallbacks.csprojwolfSSL-TLS-ServerThreaded
App.config wolfSSL-TLS-ServerThreaded.cs wolfSSL-TLS-ServerThreaded.csprojrust
wolfssl-wolfcrypt
src
aes.rs blake2.rs chacha20_poly1305.rs cmac.rs cmac_mac.rs curve25519.rs dh.rs dilithium.rs ecc.rs ecdsa.rs ed25519.rs ed448.rs fips.rs hkdf.rs hmac.rs hmac_mac.rs kdf.rs lib.rs lms.rs mlkem.rs mlkem_kem.rs pbkdf2_password_hash.rs prf.rs random.rs rsa.rs rsa_pkcs1v15.rs sha.rs sha_digest.rs sys.rstests
test_aes.rs test_blake2.rs test_chacha20_poly1305.rs test_cmac.rs test_cmac_mac.rs test_curve25519.rs test_dh.rs test_dilithium.rs test_ecc.rs test_ecdsa.rs test_ed25519.rs test_ed448.rs test_hkdf.rs test_hmac.rs test_hmac_mac.rs test_kdf.rs test_lms.rs test_mlkem.rs test_mlkem_kem.rs test_pbkdf2_password_hash.rs test_prf.rs test_random.rs test_rsa.rs test_rsa_pkcs1v15.rs test_sha.rs test_sha_digest.rs test_wolfcrypt.rszephyr
samples
wolfssl_benchmark
CMakeLists.txt README install_test.sh prj.conf sample.yaml zephyr_legacy.conf zephyr_v4.1.confwolfssl_test
CMakeLists.txt README install_test.sh prj-no-malloc.conf prj.conf sample.yaml zephyr_legacy.conf zephyr_v4.1.conf
wolfssl/doc/dox_comments/header_files/ecc.h
raw
1/*!
2 \ingroup ECC
3
4 \brief This function generates a new ecc_key and stores it in key.
5
6 \return 0 Returned on success.
7 \return ECC_BAD_ARG_E Returned if rng or key evaluate to NULL
8 \return BAD_FUNC_ARG Returned if the specified key size is not in the
9 correct range of supported keys
10 \return MEMORY_E Returned if there is an error allocating memory while
11 computing the ecc key
12 \return MP_INIT_E may be returned if there is an error while computing
13 the ecc key
14 \return MP_READ_E may be returned if there is an error while computing
15 the ecc key
16 \return MP_CMP_E may be returned if there is an error while computing the
17 ecc key
18 \return MP_INVMOD_E may be returned if there is an error while computing
19 the ecc key
20 \return MP_EXPTMOD_E may be returned if there is an error while computing
21 the ecc key
22 \return MP_MOD_E may be returned if there is an error while computing the
23 ecc key
24 \return MP_MUL_E may be returned if there is an error while computing the
25 ecc key
26 \return MP_ADD_E may be returned if there is an error while computing the
27 ecc key
28 \return MP_MULMOD_E may be returned if there is an error while computing
29 the ecc key
30 \return MP_TO_E may be returned if there is an error while computing the
31 ecc key
32 \return MP_MEM may be returned if there is an error while computing the
33 ecc key
34
35 \param rng pointer to an initialized RNG object with which to generate
36 the key
37 \param keysize desired length for the ecc_key
38 \param key pointer to the ecc_key for which to generate a key
39
40 _Example_
41 \code
42 ecc_key key;
43 wc_ecc_init(&key);
44 WC_RNG rng;
45 wc_InitRng(&rng);
46 wc_ecc_make_key(&rng, 32, &key); // initialize 32 byte ecc key
47 \endcode
48
49 \sa wc_ecc_init
50 \sa wc_ecc_shared_secret
51*/
52
53int wc_ecc_make_key(WC_RNG* rng, int keysize, ecc_key* key);
54
55/*!
56 \ingroup ECC
57
58 \brief This function generates a new ecc_key and stores it in key.
59
60 \return 0 Returned on success.
61 \return ECC_BAD_ARG_E Returned if rng or key evaluate to NULL
62 \return BAD_FUNC_ARG Returned if the specified key size is not in the
63 correct range of supported keys
64 \return MEMORY_E Returned if there is an error allocating memory while
65 computing the ecc key
66 \return MP_INIT_E may be returned if there is an error while computing
67 the ecc key
68 \return MP_READ_E may be returned if there is an error while computing
69 the ecc key
70 \return MP_CMP_E may be returned if there is an error while computing the
71 ecc key
72 \return MP_INVMOD_E may be returned if there is an error while computing
73 the ecc key
74 \return MP_EXPTMOD_E may be returned if there is an error while computing
75 the ecc key
76 \return MP_MOD_E may be returned if there is an error while computing the
77 ecc key
78 \return MP_MUL_E may be returned if there is an error while computing the
79 ecc key
80 \return MP_ADD_E may be returned if there is an error while computing the
81 ecc key
82 \return MP_MULMOD_E may be returned if there is an error while computing
83 the ecc key
84 \return MP_TO_E may be returned if there is an error while computing the
85 ecc key
86 \return MP_MEM may be returned if there is an error while computing the
87 ecc key
88
89 \param key Pointer to store the created key.
90 \param keysize size of key to be created in bytes, set based on curveId
91 \param rng Rng to be used in key creation
92 \param curve_id Curve to use for key
93
94 _Example_
95 \code
96 ecc_key key;
97 int ret;
98 WC_RNG rng;
99 wc_ecc_init(&key);
100 wc_InitRng(&rng);
101 int curveId = ECC_SECP521R1;
102 int keySize = wc_ecc_get_curve_size_from_id(curveId);
103 ret = wc_ecc_make_key_ex(&rng, keySize, &key, curveId);
104 if (ret != MP_OKAY) {
105 // error handling
106 }
107
108 \endcode
109
110 \sa wc_ecc_make_key
111 \sa wc_ecc_get_curve_size_from_id
112*/
113
114int wc_ecc_make_key_ex(WC_RNG* rng, int keysize, ecc_key* key, int curve_id);
115
116/*!
117 \ingroup ECC
118
119 \brief wc_ecc_make_pub computes the public component from an ecc_key with an
120 existing private component. If pubOut is supplied, the computed public key
121 is stored there, else it is stored in the supplied ecc_key public component
122 slot.
123
124 \return 0 Returned on success.
125 \return ECC_BAD_ARG_E Returned if key is NULL
126 \return BAD_FUNC_ARG Returned if the supplied key is not a valid ecc_key.
127 \return MEMORY_E Returned if there is an error allocating memory while
128 computing the public key
129 \return MP_INIT_E may be returned if there is an error while computing
130 the public key
131 \return MP_READ_E may be returned if there is an error while computing
132 the public key
133 \return MP_CMP_E may be returned if there is an error while computing the
134 public key
135 \return MP_INVMOD_E may be returned if there is an error while computing
136 the public key
137 \return MP_EXPTMOD_E may be returned if there is an error while computing
138 the public key
139 \return MP_MOD_E may be returned if there is an error while computing the
140 public key
141 \return MP_MUL_E may be returned if there is an error while computing the
142 public key
143 \return MP_ADD_E may be returned if there is an error while computing the
144 public key
145 \return MP_MULMOD_E may be returned if there is an error while computing
146 the public key
147 \return MP_TO_E may be returned if there is an error while computing the
148 public key
149 \return MP_MEM may be returned if there is an error while computing the
150 public key
151 \return ECC_OUT_OF_RANGE_E may be returned if there is an error while computing the
152 public key
153 \return ECC_PRIV_KEY_E may be returned if there is an error while computing the
154 public key
155 \return ECC_INF_E may be returned if there is an error while computing the
156 public key
157
158 \param key Pointer to an ecc_key containing a valid private component
159 \param pubOut Optional pointer to an ecc_point struct in which to store
160 the computed public key
161
162 \sa wc_ecc_make_pub_ex
163 \sa wc_ecc_make_key
164*/
165
166int wc_ecc_make_pub(ecc_key* key, ecc_point* pubOut);
167
168/*!
169 \ingroup ECC
170
171 \brief wc_ecc_make_pub_ex computes the public component from an ecc_key with
172 an existing private component. If pubOut is supplied, the computed public
173 key is stored there, else it is stored in the supplied ecc_key public
174 component slot. The supplied rng, if non-NULL, is used to blind the private
175 key value used in the computation.
176
177 \return 0 Returned on success.
178 \return ECC_BAD_ARG_E Returned if key is NULL
179 \return BAD_FUNC_ARG Returned if the supplied key is not a valid ecc_key.
180 \return MEMORY_E Returned if there is an error allocating memory while
181 computing the public key
182 \return MP_INIT_E may be returned if there is an error while computing
183 the public key
184 \return MP_READ_E may be returned if there is an error while computing
185 the public key
186 \return MP_CMP_E may be returned if there is an error while computing the
187 public key
188 \return MP_INVMOD_E may be returned if there is an error while computing
189 the public key
190 \return MP_EXPTMOD_E may be returned if there is an error while computing
191 the public key
192 \return MP_MOD_E may be returned if there is an error while computing the
193 public key
194 \return MP_MUL_E may be returned if there is an error while computing the
195 public key
196 \return MP_ADD_E may be returned if there is an error while computing the
197 public key
198 \return MP_MULMOD_E may be returned if there is an error while computing
199 the public key
200 \return MP_TO_E may be returned if there is an error while computing the
201 public key
202 \return MP_MEM may be returned if there is an error while computing the
203 public key
204 \return ECC_OUT_OF_RANGE_E may be returned if there is an error while computing the
205 public key
206 \return ECC_PRIV_KEY_E may be returned if there is an error while computing the
207 public key
208 \return ECC_INF_E may be returned if there is an error while computing the
209 public key
210
211 \param key Pointer to an ecc_key containing a valid private component
212 \param pubOut Optional pointer to an ecc_point struct in which to store
213 the computed public key
214 \param rng Rng to be used in the public key computation
215
216 \sa wc_ecc_make_pub
217 \sa wc_ecc_make_key
218 \sa wc_InitRng
219*/
220
221int wc_ecc_make_pub_ex(ecc_key* key, ecc_point* pubOut, WC_RNG* rng);
222
223/*!
224 \ingroup ECC
225
226 \brief Perform sanity checks on ecc key validity.
227
228 \return MP_OKAY Success, key is OK.
229 \return BAD_FUNC_ARG Returns if key is NULL.
230 \return ECC_INF_E Returns if wc_ecc_point_is_at_infinity returns 1.
231
232 \param key Pointer to key to check.
233
234 _Example_
235 \code
236 ecc_key key;
237 WC_RNG rng;
238 int check_result;
239 wc_ecc_init(&key);
240 wc_InitRng(&rng);
241 wc_ecc_make_key(&rng, 32, &key);
242 check_result = wc_ecc_check_key(&key);
243
244 if (check_result == MP_OKAY)
245 {
246 // key check succeeded
247 }
248 else
249 {
250 // key check failed
251 }
252 \endcode
253
254 \sa wc_ecc_point_is_at_infinity
255*/
256
257int wc_ecc_check_key(ecc_key* key);
258
259/*!
260 \ingroup ECC
261
262 \brief This function frees an ecc_key key after it has been used.
263
264
265 \param key pointer to the ecc_key structure to free
266
267 _Example_
268 \code
269 // initialize key and perform ECC operations
270 ...
271 wc_ecc_key_free(&key);
272 \endcode
273
274 \sa wc_ecc_key_new
275 \sa wc_ecc_init_ex
276*/
277
278void wc_ecc_key_free(ecc_key* key);
279
280/*!
281 \ingroup ECC
282
283 \brief This function generates a new secret key using a local private key
284 and a received public key. It stores this shared secret key in the buffer
285 out and updates outlen to hold the number of bytes written to the output
286 buffer.
287
288 \return 0 Returned upon successfully generating a shared secret key
289 \return BAD_FUNC_ARG Returned if any of the input parameters evaluate to
290 NULL
291 \return ECC_BAD_ARG_E Returned if the type of the private key given as
292 argument, private_key, is not ECC_PRIVATEKEY, or if the public and private
293 key types (given by ecc->dp) are not equivalent
294 \return MEMORY_E Returned if there is an error generating a new ecc point
295 \return BUFFER_E Returned if the generated shared secret key is too long
296 to store in the provided buffer
297 \return MP_INIT_E may be returned if there is an error while computing the
298 shared key
299 \return MP_READ_E may be returned if there is an error while computing the
300 shared key
301 \return MP_CMP_E may be returned if there is an error while computing the
302 shared key
303 \return MP_INVMOD_E may be returned if there is an error while computing
304 the shared key
305 \return MP_EXPTMOD_E may be returned if there is an error while computing
306 the shared key
307 \return MP_MOD_E may be returned if there is an error while computing the
308 shared key
309 \return MP_MUL_E may be returned if there is an error while computing the
310 shared key
311 \return MP_ADD_E may be returned if there is an error while computing the
312 shared key
313 \return MP_MULMOD_E may be returned if there is an error while computing
314 the shared key
315 \return MP_TO_E may be returned if there is an error while computing the
316 shared key
317 \return MP_MEM may be returned if there is an error while computing the
318 shared key
319
320 \param private_key pointer to the ecc_key structure containing the local
321 private key
322 \param public_key pointer to the ecc_key structure containing the received
323 public key
324 \param out pointer to an output buffer in which to store the generated
325 shared secret key
326 \param outlen pointer to the word32 object containing the length of the
327 output buffer. Will be overwritten with the length written to the output
328 buffer upon successfully generating a shared secret key
329
330 _Example_
331 \code
332 ecc_key priv, pub;
333 WC_RNG rng;
334 byte secret[1024]; // can hold 1024 byte shared secret key
335 word32 secretSz = sizeof(secret);
336 int ret;
337
338 wc_InitRng(&rng); // initialize rng
339 wc_ecc_init(&priv); // initialize key
340 wc_ecc_make_key(&rng, 32, &priv); // make public/private key pair
341 // receive public key, and initialise into pub
342 ret = wc_ecc_shared_secret(&priv, &pub, secret, &secretSz);
343 // generate secret key
344 if ( ret != 0 ) {
345 // error generating shared secret key
346 }
347 \endcode
348
349 \sa wc_ecc_init
350 \sa wc_ecc_make_key
351*/
352
353int wc_ecc_shared_secret(ecc_key* private_key, ecc_key* public_key, byte* out,
354 word32* outlen);
355
356/*!
357 \ingroup ECC
358
359 \brief Create an ECC shared secret between private key and public point.
360
361 \return MP_OKAY Indicates success.
362 \return BAD_FUNC_ARG Error returned when any arguments are null.
363 \return ECC_BAD_ARG_E Error returned if private_key->type is not
364 ECC_PRIVATEKEY or private_key->idx fails to validate.
365 \return BUFFER_E Error when outlen is too small.
366 \return MEMORY_E Error to create a new point.
367 \return MP_VAL possible when an initialization failure occurs.
368 \return MP_MEM possible when an initialization failure occurs.
369
370 \param private_key The private ECC key.
371 \param point The point to use (public key).
372 \param out Output destination of the shared secret. Conforms to
373 EC-DH from ANSI X9.63.
374 \param outlen Input the max size and output the resulting size of
375 the shared secret.
376
377 _Example_
378 \code
379 ecc_key key;
380 ecc_point* point;
381 byte shared_secret[];
382 int secret_size;
383 int result;
384
385 point = wc_ecc_new_point();
386
387 result = wc_ecc_shared_secret_ex(&key, point,
388 &shared_secret, &secret_size);
389
390 if (result != MP_OKAY)
391 {
392 // Handle error
393 }
394 \endcode
395
396 \sa wc_ecc_verify_hash_ex
397*/
398
399int wc_ecc_shared_secret_ex(ecc_key* private_key, ecc_point* point,
400 byte* out, word32 *outlen);
401
402/*!
403 \ingroup ECC
404
405 \brief This function signs a message digest using an ecc_key object to
406 guarantee authenticity.
407
408 \return 0 Returned upon successfully generating a signature for the
409 message digest
410 \return BAD_FUNC_ARG Returned if any of the input parameters evaluate to
411 NULL, or if the output buffer is too small to store the generated signature
412 \return ECC_BAD_ARG_E Returned if the input key is not a private key, or
413 if the ECC OID is invalid
414 \return RNG_FAILURE_E Returned if the rng cannot successfully generate a
415 satisfactory key
416 \return MP_INIT_E may be returned if there is an error while computing
417 the message signature
418 \return MP_READ_E may be returned if there is an error while computing
419 the message signature
420 \return MP_CMP_E may be returned if there is an error while computing the
421 message signature
422 \return MP_INVMOD_E may be returned if there is an error while computing
423 the message signature
424 \return MP_EXPTMOD_E may be returned if there is an error while computing
425 the message signature
426 \return MP_MOD_E may be returned if there is an error while computing the
427 message signature
428 \return MP_MUL_E may be returned if there is an error while computing the
429 message signature
430 \return MP_ADD_E may be returned if there is an error while computing the
431 message signature
432 \return MP_MULMOD_E may be returned if there is an error while computing
433 the message signature
434 \return MP_TO_E may be returned if there is an error while computing the
435 message signature
436 \return MP_MEM may be returned if there is an error while computing the
437 message signature
438
439 \param in pointer to the buffer containing the message hash to sign
440 \param inlen length of the message hash to sign
441 \param out buffer in which to store the generated signature
442 \param outlen max length of the output buffer. Will store the bytes
443 written to out upon successfully generating a message signature
444 \param key pointer to a private ECC key with which to generate the
445 signature
446
447 _Example_
448 \code
449 ecc_key key;
450 WC_RNG rng;
451 int ret, sigSz;
452
453 byte sig[512]; // will hold generated signature
454 sigSz = sizeof(sig);
455 byte digest[] = { // initialize with message hash };
456 wc_InitRng(&rng); // initialize rng
457 wc_ecc_init(&key); // initialize key
458 wc_ecc_make_key(&rng, 32, &key); // make public/private key pair
459 ret = wc_ecc_sign_hash(digest, sizeof(digest), sig, &sigSz, &key);
460 if ( ret != 0 ) {
461 // error generating message signature
462 }
463 \endcode
464
465 \sa wc_ecc_verify_hash
466*/
467
468int wc_ecc_sign_hash(const byte* in, word32 inlen, byte* out, word32 *outlen,
469 WC_RNG* rng, ecc_key* key);
470
471/*!
472 \ingroup ECC
473
474 \brief Sign a message digest.
475
476 \return MP_OKAY Returned upon successfully generating a signature for the
477 message digest
478 \return ECC_BAD_ARG_E Returned if the input key is not a private key, or
479 if the ECC IDX is invalid, or if any of the input parameters evaluate to
480 NULL, or if the output buffer is too small to store the generated signature
481 \return RNG_FAILURE_E Returned if the rng cannot successfully generate a
482 satisfactory key
483 \return MP_INIT_E may be returned if there is an error while computing the
484 message signature
485 \return MP_READ_E may be returned if there is an error while computing the
486 message signature
487 \return MP_CMP_E may be returned if there is an error while computing the
488 message signature
489 \return MP_INVMOD_E may be returned if there is an error while computing
490 the message signature
491 \return MP_EXPTMOD_E may be returned if there is an error while computing
492 the message signature
493 \return MP_MOD_E may be returned if there is an error while computing the
494 message signature
495 \return MP_MUL_E may be returned if there is an error while computing the
496 message signature
497 \return MP_ADD_E may be returned if there is an error while computing the
498 message signature
499 \return MP_MULMOD_E may be returned if there is an error while computing
500 the message signature
501 \return MP_TO_E may be returned if there is an error while computing the
502 message signature
503 \return MP_MEM may be returned if there is an error while computing the
504 message signature
505
506 \param in The message digest to sign.
507 \param inlen The length of the digest.
508 \param rng Pointer to WC_RNG struct.
509 \param key A private ECC key.
510 \param r The destination for r component of the signature.
511 \param s The destination for s component of the signature.
512
513 _Example_
514 \code
515 ecc_key key;
516 WC_RNG rng;
517 int ret, sigSz;
518 mp_int r; // destination for r component of signature.
519 mp_int s; // destination for s component of signature.
520
521 byte sig[512]; // will hold generated signature
522 sigSz = sizeof(sig);
523 byte digest[] = { initialize with message hash };
524 wc_InitRng(&rng); // initialize rng
525 wc_ecc_init(&key); // initialize key
526 mp_init(&r); // initialize r component
527 mp_init(&s); // initialize s component
528 wc_ecc_make_key(&rng, 32, &key); // make public/private key pair
529 ret = wc_ecc_sign_hash_ex(digest, sizeof(digest), &rng, &key, &r, &s);
530
531 if ( ret != MP_OKAY ) {
532 // error generating message signature
533 }
534 \endcode
535
536 \sa wc_ecc_verify_hash_ex
537*/
538
539int wc_ecc_sign_hash_ex(const byte* in, word32 inlen, WC_RNG* rng,
540 ecc_key* key, mp_int *r, mp_int *s);
541
542/*!
543 \ingroup ECC
544
545 \brief This function verifies the ECC signature of a hash to ensure
546 authenticity. It returns the answer through res, with 1 corresponding
547 to a valid signature, and 0 corresponding to an invalid signature.
548
549 \return 0 Returned upon successfully performing the signature
550 verification. Note: This does not mean that the signature is verified.
551 The authenticity information is stored instead in res
552 \return BAD_FUNC_ARG Returned any of the input parameters evaluate to NULL
553 \return MEMORY_E Returned if there is an error allocating memory
554 \return MP_INIT_E may be returned if there is an error while computing
555 the message signature
556 \return MP_READ_E may be returned if there is an error while computing
557 the message signature
558 \return MP_CMP_E may be returned if there is an error while computing
559 the message signature
560 \return MP_INVMOD_E may be returned if there is an error while computing
561 the message signature
562 \return MP_EXPTMOD_E may be returned if there is an error while
563 computing the message signature
564 \return MP_MOD_E may be returned if there is an error while computing
565 the message signature
566 \return MP_MUL_E may be returned if there is an error while computing
567 the message signature
568 \return MP_ADD_E may be returned if there is an error while computing
569 the message signature
570 \return MP_MULMOD_E may be returned if there is an error while computing
571 the message signature
572 \return MP_TO_E may be returned if there is an error while computing the
573 message signature
574 \return MP_MEM may be returned if there is an error while computing the
575 message signature
576
577 \param sig pointer to the buffer containing the signature to verify
578 \param siglen length of the signature to verify
579 \param hash pointer to the buffer containing the hash of the message
580 verified
581 \param hashlen length of the hash of the message verified
582 \param res pointer to the result of the verification. 1 indicates the
583 message was successfully verified
584 \param key pointer to a public ECC key with which to verify the signature
585
586 _Example_
587 \code
588 ecc_key key;
589 int ret, verified = 0;
590
591 byte sig[1024] { initialize with received signature };
592 byte digest[] = { initialize with message hash };
593 // initialize key with received public key
594 ret = wc_ecc_verify_hash(sig, sizeof(sig), digest,sizeof(digest),
595 &verified, &key);
596 if ( ret != 0 ) {
597 // error performing verification
598 } else if ( verified == 0 ) {
599 // the signature is invalid
600 }
601 \endcode
602
603 \sa wc_ecc_sign_hash
604 \sa wc_ecc_verify_hash_ex
605*/
606
607int wc_ecc_verify_hash(const byte* sig, word32 siglen, const byte* hash,
608 word32 hashlen, int* res, ecc_key* key);
609
610/*!
611 \ingroup ECC
612
613 \brief Verify an ECC signature. Result is written to res.
614 1 is valid, 0 is invalid.
615 Note: Do not use the return value to test for valid. Only use res.
616
617 \return MP_OKAY If successful (even if the signature is not valid)
618 \return ECC_BAD_ARG_E Returns if arguments are null or if
619 key-idx is invalid.
620 \return MEMORY_E Error allocating ints or points.
621
622 \param r The signature R component to verify
623 \param s The signature S component to verify
624 \param hash The hash (message digest) that was signed
625 \param hashlen The length of the hash (octets)
626 \param res Result of signature, 1==valid, 0==invalid
627 \param key The corresponding public ECC key
628
629 _Example_
630 \code
631 mp_int r;
632 mp_int s;
633 int res;
634 byte hash[] = { Some hash }
635 ecc_key key;
636
637 if(wc_ecc_verify_hash_ex(&r, &s, hash, hashlen, &res, &key) == MP_OKAY)
638 {
639 // Check res
640 }
641 \endcode
642
643 \sa wc_ecc_verify_hash
644*/
645
646int wc_ecc_verify_hash_ex(mp_int *r, mp_int *s, const byte* hash,
647 word32 hashlen, int* res, ecc_key* key);
648
649/*!
650 \ingroup ECC
651
652 \brief This function initializes an ecc_key object for future
653 use with message verification or key negotiation.
654
655 \return 0 Returned upon successfully initializing the ecc_key object
656 \return MEMORY_E Returned if there is an error allocating memory
657
658 \param key pointer to the ecc_key object to initialize
659
660 _Example_
661 \code
662 ecc_key key;
663 wc_ecc_init(&key);
664 \endcode
665
666 \sa wc_ecc_make_key
667 \sa wc_ecc_free
668*/
669
670int wc_ecc_init(ecc_key* key);
671
672/*!
673 \ingroup ECC
674
675 \brief This function initializes an ecc_key object for future
676 use with message verification or key negotiation.
677
678 \return 0 Returned upon successfully initializing the ecc_key object
679 \return MEMORY_E Returned if there is an error allocating memory
680
681 \param key pointer to the ecc_key object to initialize
682 \param heap pointer to a heap identifier
683 \param devId ID to use with crypto callbacks or async hardware. Set to INVALID_DEVID (-2) if not used
684
685 _Example_
686 \code
687 ecc_key key;
688 wc_ecc_init_ex(&key, heap, devId);
689 \endcode
690
691 \sa wc_ecc_make_key
692 \sa wc_ecc_free
693 \sa wc_ecc_init
694*/
695
696int wc_ecc_init_ex(ecc_key* key, void* heap, int devId);
697
698/*!
699 \ingroup ECC
700
701 \brief This function uses a user defined heap and allocates space for the
702 key structure.
703
704 \return 0 Returned upon successfully initializing the ecc_key object
705 \return MEMORY_E Returned if there is an error allocating memory
706
707
708 _Example_
709 \code
710 wc_ecc_key_new(&heap);
711 \endcode
712
713 \sa wc_ecc_make_key
714 \sa wc_ecc_key_free
715 \sa wc_ecc_init
716*/
717
718ecc_key* wc_ecc_key_new(void* heap);
719
720/*!
721 \ingroup ECC
722
723 \brief This function frees an ecc_key object after it has been used.
724
725 \return int integer returned indicating wolfSSL error or success status.
726
727 \param key pointer to the ecc_key object to free
728
729 _Example_
730 \code
731 // initialize key and perform secure exchanges
732 ...
733 wc_ecc_free(&key);
734 \endcode
735
736 \sa wc_ecc_init
737*/
738
739int wc_ecc_free(ecc_key* key);
740
741/*!
742 \ingroup ECC
743
744 \brief This function frees the fixed-point cache, which can be used
745 with ecc to speed up computation times. To use this functionality,
746 FP_ECC (fixed-point ecc), should be defined. Threaded applications should
747 call this function before exiting the thread.
748
749 \return none No returns.
750
751 \param none No parameters.
752
753 _Example_
754 \code
755 ecc_key key;
756 // initialize key and perform secure exchanges
757 ...
758
759 wc_ecc_fp_free();
760 \endcode
761
762 \sa wc_ecc_free
763*/
764
765void wc_ecc_fp_free(void);
766
767/*!
768 \ingroup ECC
769
770 \brief Checks if an ECC idx is valid.
771
772 \return 1 Return if valid.
773 \return 0 Return if not valid.
774
775 \param n The idx number to check.
776
777 _Example_
778 \code
779 ecc_key key;
780 WC_RNG rng;
781 int is_valid;
782 wc_ecc_init(&key);
783 wc_InitRng(&rng);
784 wc_ecc_make_key(&rng, 32, &key);
785 is_valid = wc_ecc_is_valid_idx(key.idx);
786 if (is_valid == 1)
787 {
788 // idx is valid
789 }
790 else if (is_valid == 0)
791 {
792 // idx is not valid
793 }
794 \endcode
795
796 \sa none
797*/
798
799int wc_ecc_is_valid_idx(int n);
800
801/*!
802 \ingroup ECC
803
804 \brief Allocate a new ECC point.
805
806 \return p A newly allocated point.
807 \return NULL Returns NULL on error.
808
809 \param none No parameters.
810
811 _Example_
812 \code
813 ecc_point* point;
814 point = wc_ecc_new_point();
815 if (point == NULL)
816 {
817 // Handle point creation error
818 }
819 // Do stuff with point
820 \endcode
821
822 \sa wc_ecc_del_point
823 \sa wc_ecc_cmp_point
824 \sa wc_ecc_copy_point
825*/
826
827ecc_point* wc_ecc_new_point(void);
828
829/*!
830 \ingroup ECC
831
832 \brief Free an ECC point from memory.
833
834 \return none No returns.
835
836 \param p The point to free.
837
838 _Example_
839 \code
840 ecc_point* point;
841 point = wc_ecc_new_point();
842 if (point == NULL)
843 {
844 // Handle point creation error
845 }
846 // Do stuff with point
847 wc_ecc_del_point(point);
848 \endcode
849
850 \sa wc_ecc_new_point
851 \sa wc_ecc_cmp_point
852 \sa wc_ecc_copy_point
853*/
854
855void wc_ecc_del_point(ecc_point* p);
856
857/*!
858 \ingroup ECC
859
860 \brief Copy the value of one point to another one.
861
862 \return ECC_BAD_ARG_E Error thrown when p or r is null.
863 \return MP_OKAY Point copied successfully
864 \return ret Error from internal functions. Can be...
865
866 \param p The point to copy.
867 \param r The created point.
868
869 _Example_
870 \code
871 ecc_point* point;
872 ecc_point* copied_point;
873 int copy_return;
874
875 point = wc_ecc_new_point();
876 copy_return = wc_ecc_copy_point(point, copied_point);
877 if (copy_return != MP_OKAY)
878 {
879 // Handle error
880 }
881 \endcode
882
883 \sa wc_ecc_new_point
884 \sa wc_ecc_cmp_point
885 \sa wc_ecc_del_point
886*/
887
888int wc_ecc_copy_point(const ecc_point* p, ecc_point *r);
889
890/*!
891 \ingroup ECC
892
893 \brief Compare the value of a point with another one.
894
895 \return BAD_FUNC_ARG One or both arguments are NULL.
896 \return MP_EQ The points are equal.
897 \return ret Either MP_LT or MP_GT and signifies that the
898 points are not equal.
899
900 \param a First point to compare.
901 \param b Second point to compare.
902
903 _Example_
904 \code
905 ecc_point* point;
906 ecc_point* point_to_compare;
907 int cmp_result;
908
909 point = wc_ecc_new_point();
910 point_to_compare = wc_ecc_new_point();
911 cmp_result = wc_ecc_cmp_point(point, point_to_compare);
912 if (cmp_result == BAD_FUNC_ARG)
913 {
914 // arguments are invalid
915 }
916 else if (cmp_result == MP_EQ)
917 {
918 // Points are equal
919 }
920 else
921 {
922 // Points are not equal
923 }
924 \endcode
925
926 \sa wc_ecc_new_point
927 \sa wc_ecc_del_point
928 \sa wc_ecc_copy_point
929*/
930
931int wc_ecc_cmp_point(ecc_point* a, ecc_point *b);
932
933/*!
934 \ingroup ECC
935
936 \brief Checks if a point is at infinity. Returns 1 if point is
937 at infinity, 0 if not, < 0 on error
938
939 \return 1 p is at infinity.
940 \return 0 p is not at infinity.
941 \return <0 Error.
942
943 \param p The point to check.
944
945 _Example_
946 \code
947 ecc_point* point;
948 int is_infinity;
949 point = wc_ecc_new_point();
950
951 is_infinity = wc_ecc_point_is_at_infinity(point);
952 if (is_infinity < 0)
953 {
954 // Handle error
955 }
956 else if (is_infinity == 0)
957 {
958 // Point is not at infinity
959 }
960 else if (is_infinity == 1)
961 {
962 // Point is at infinity
963 }
964 \endcode
965
966 \sa wc_ecc_new_point
967 \sa wc_ecc_del_point
968 \sa wc_ecc_cmp_point
969 \sa wc_ecc_copy_point
970*/
971
972int wc_ecc_point_is_at_infinity(ecc_point *p);
973
974/*!
975 \ingroup ECC
976
977 \brief Perform ECC Fixed Point multiplication.
978
979 \return MP_OKAY Returns on successful operation.
980 \return MP_INIT_E Returned if there is an error initializing an integer
981 for use with the multiple precision integer (mp_int) library.
982
983 \param k The multiplicand.
984 \param G Base point to multiply.
985 \param R Destination of product.
986 \param a ECC curve parameter a.
987 \param modulus The modulus for the curve.
988 \param map If non-zero maps the point back to affine coordinates,
989 otherwise it's left in jacobian-montgomery form.
990
991 _Example_
992 \code
993 ecc_point* base;
994 ecc_point* destination;
995 // Initialize points
996 base = wc_ecc_new_point();
997 destination = wc_ecc_new_point();
998 // Setup other arguments
999 mp_int multiplicand;
1000 mp_int modulus;
1001 mp_int a;
1002 int map;
1003 int rc;
1004 rc = wc_ecc_mulmod(&multiplicand, base, destination, &a, &modulus, map);
1005 \endcode
1006
1007 \sa none
1008*/
1009
1010int wc_ecc_mulmod(const mp_int* k, ecc_point *G, ecc_point *R,
1011 mp_int* a, mp_int* modulus, int map);
1012
1013/*!
1014 \ingroup ECC
1015
1016 \brief This function exports the ECC key from the ecc_key structure,
1017 storing the result in out. The key will be stored in ANSI X9.63 format.
1018 It stores the bytes written to the output buffer in outLen.
1019
1020 \return 0 Returned on successfully exporting the ecc_key
1021 \return LENGTH_ONLY_E Returned if the output buffer evaluates to NULL,
1022 but the other two input parameters are valid. Indicates that the function
1023 is only returning the length required to store the key
1024 \return ECC_BAD_ARG_E Returned if any of the input parameters are NULL,
1025 or the key is unsupported (has an invalid index)
1026 \return BUFFER_E Returned if the output buffer is too small to store the
1027 ecc key. If the output buffer is too small, the size needed will be
1028 returned in outLen
1029 \return MEMORY_E Returned if there is an error allocating memory with
1030 XMALLOC
1031 \return MP_INIT_E may be returned if there is an error processing the
1032 ecc_key
1033 \return MP_READ_E may be returned if there is an error processing the
1034 ecc_key
1035 \return MP_CMP_E may be returned if there is an error processing the
1036 ecc_key
1037 \return MP_INVMOD_E may be returned if there is an error processing the
1038 ecc_key
1039 \return MP_EXPTMOD_E may be returned if there is an error processing the
1040 ecc_key
1041 \return MP_MOD_E may be returned if there is an error processing the
1042 ecc_key
1043 \return MP_MUL_E may be returned if there is an error processing the
1044 ecc_key
1045 \return MP_ADD_E may be returned if there is an error processing the
1046 ecc_key
1047 \return MP_MULMOD_E may be returned if there is an error processing the
1048 ecc_key
1049 \return MP_TO_E may be returned if there is an error processing the ecc_key
1050 \return MP_MEM may be returned if there is an error processing the ecc_key
1051
1052 \param key pointer to the ecc_key object to export
1053 \param out pointer to the buffer in which to store the ANSI X9.63
1054 formatted key
1055 \param outLen size of the output buffer. On successfully storing the
1056 key, will hold the bytes written to the output buffer
1057
1058 _Example_
1059 \code
1060 int ret;
1061 byte buff[1024];
1062 word32 buffSz = sizeof(buff);
1063
1064 ecc_key key;
1065 // initialize key, make key
1066 ret = wc_ecc_export_x963(&key, buff, &buffSz);
1067 if ( ret != 0) {
1068 // error exporting key
1069 }
1070 \endcode
1071
1072 \sa wc_ecc_export_x963_ex
1073 \sa wc_ecc_import_x963
1074 \sa wc_ecc_make_pub
1075*/
1076
1077int wc_ecc_export_x963(ecc_key* key, byte* out, word32* outLen);
1078
1079/*!
1080 \ingroup ECC
1081
1082 \brief This function exports the public key from the ecc_key structure,
1083 storing the result in out. The key will be stored in ANSI X9.63 format.
1084 It stores the bytes written to the output buffer in outLen. This function
1085 allows the additional option of compressing the certificate through the
1086 compressed parameter. When this parameter is true, the key will be stored
1087 in ANSI X9.63 compressed format.
1088
1089 \return 0 Returned on successfully exporting the ecc_key public component
1090 \return ECC_PRIVATEKEY_ONLY Returned if the ecc_key public component is
1091 missing
1092 \return NOT_COMPILED_IN Returned if the HAVE_COMP_KEY was not enabled at
1093 compile time, but the key was requested in compressed format
1094 \return LENGTH_ONLY_E Returned if the output buffer evaluates to NULL, but
1095 the other two input parameters are valid. Indicates that the function is
1096 only returning the length required to store the public key
1097 \return ECC_BAD_ARG_E Returned if any of the input parameters are NULL, or
1098 the key is unsupported (has an invalid index)
1099 \return BUFFER_E Returned if the output buffer is too small to store the
1100 public key. If the output buffer is too small, the size needed will be
1101 returned in outLen
1102 \return MEMORY_E Returned if there is an error allocating memory with
1103 XMALLOC
1104 \return MP_INIT_E may be returned if there is an error processing the
1105 ecc_key
1106 \return MP_READ_E may be returned if there is an error processing the
1107 ecc_key
1108 \return MP_CMP_E may be returned if there is an error processing the
1109 ecc_key
1110 \return MP_INVMOD_E may be returned if there is an error processing the
1111 ecc_key
1112 \return MP_EXPTMOD_E may be returned if there is an error processing
1113 the ecc_key
1114 \return MP_MOD_E may be returned if there is an error processing the
1115 ecc_key
1116 \return MP_MUL_E may be returned if there is an error processing the
1117 ecc_key
1118 \return MP_ADD_E may be returned if there is an error processing the
1119 ecc_key
1120 \return MP_MULMOD_E may be returned if there is an error processing
1121 the ecc_key
1122 \return MP_TO_E may be returned if there is an error processing the ecc_key
1123 \return MP_MEM may be returned if there is an error processing the ecc_key
1124
1125 \param key pointer to the ecc_key object to export
1126 \param out pointer to the buffer in which to store the ANSI X9.63
1127 formatted public key
1128 \param outLen size of the output buffer. On successfully storing the
1129 public key, will hold the bytes written to the output buffer
1130 \param compressed indicator of whether to store the key in compressed
1131 format. 1==compressed, 0==uncompressed
1132
1133 _Example_
1134 \code
1135 int ret;
1136 byte buff[1024];
1137 word32 buffSz = sizeof(buff);
1138 ecc_key key;
1139 // initialize key, make key
1140 ret = wc_ecc_export_x963_ex(&key, buff, &buffSz, 1);
1141 if ( ret != 0) {
1142 // error exporting key
1143 }
1144 \endcode
1145
1146 \sa wc_ecc_export_x963
1147 \sa wc_ecc_import_x963
1148 \sa wc_ecc_make_pub
1149*/
1150
1151int wc_ecc_export_x963_ex(ecc_key* key, byte* out, word32* outLen, int compressed);
1152
1153/*!
1154 \ingroup ECC
1155
1156 \brief This function imports a public ECC key from a buffer containing the
1157 key stored in ANSI X9.63 format. This function will handle both compressed
1158 and uncompressed keys, as long as compressed keys are enabled at compile
1159 time through the HAVE_COMP_KEY option.
1160
1161 \return 0 Returned on successfully importing the ecc_key
1162 \return NOT_COMPILED_IN Returned if the HAVE_COMP_KEY was not enabled at
1163 compile time, but the key is stored in compressed format
1164 \return ECC_BAD_ARG_E Returned if in or key evaluate to NULL, or the
1165 inLen is even (according to the x9.63 standard, the key must be odd)
1166 \return MEMORY_E Returned if there is an error allocating memory
1167 \return ASN_PARSE_E Returned if there is an error parsing the ECC key;
1168 may indicate that the ECC key is not stored in valid ANSI X9.63 format
1169 \return IS_POINT_E Returned if the public key exported is not a point
1170 on the ECC curve
1171 \return MP_INIT_E may be returned if there is an error processing the
1172 ecc_key
1173 \return MP_READ_E may be returned if there is an error processing the
1174 ecc_key
1175 \return MP_CMP_E may be returned if there is an error processing the
1176 ecc_key
1177 \return MP_INVMOD_E may be returned if there is an error processing the
1178 ecc_key
1179 \return MP_EXPTMOD_E may be returned if there is an error processing the
1180 ecc_key
1181 \return MP_MOD_E may be returned if there is an error processing the
1182 ecc_key
1183 \return MP_MUL_E may be returned if there is an error processing the
1184 ecc_key
1185 \return MP_ADD_E may be returned if there is an error processing the
1186 ecc_key
1187 \return MP_MULMOD_E may be returned if there is an error processing the
1188 ecc_key
1189 \return MP_TO_E may be returned if there is an error processing the ecc_key
1190 \return MP_MEM may be returned if there is an error processing the ecc_key
1191
1192 \param in pointer to the buffer containing the ANSI x9.63 formatted ECC key
1193 \param inLen length of the input buffer
1194 \param key pointer to the ecc_key object in which to store the imported key
1195
1196 _Example_
1197 \code
1198 int ret;
1199 byte buff[] = { initialize with ANSI X9.63 formatted key };
1200
1201 ecc_key pubKey;
1202 wc_ecc_init(&pubKey);
1203
1204 ret = wc_ecc_import_x963(buff, sizeof(buff), &pubKey);
1205 if ( ret != 0) {
1206 // error importing key
1207 }
1208 \endcode
1209
1210 \sa wc_ecc_export_x963
1211 \sa wc_ecc_import_private_key
1212*/
1213
1214int wc_ecc_import_x963(const byte* in, word32 inLen, ecc_key* key);
1215
1216/*!
1217 \ingroup ECC
1218
1219 \brief This function imports a public/private ECC key pair from a buffer
1220 containing the raw private key, and a second buffer containing the ANSI
1221 X9.63 formatted public key. This function will handle both compressed and
1222 uncompressed keys, as long as compressed keys are enabled at compile time
1223 through the HAVE_COMP_KEY option.
1224
1225 \return 0 Returned on successfully importing the ecc_key
1226 NOT_COMPILED_IN Returned if the HAVE_COMP_KEY was not enabled at compile
1227 time, but the key is stored in compressed format
1228 \return ECC_BAD_ARG_E Returned if in or key evaluate to NULL, or the
1229 inLen is even (according to the x9.63 standard, the key must be odd)
1230 \return MEMORY_E Returned if there is an error allocating memory
1231 \return ASN_PARSE_E Returned if there is an error parsing the ECC key;
1232 may indicate that the ECC key is not stored in valid ANSI X9.63 format
1233 \return IS_POINT_E Returned if the public key exported is not a point
1234 on the ECC curve
1235 \return MP_INIT_E may be returned if there is an error processing the
1236 ecc_key
1237 \return MP_READ_E may be returned if there is an error processing the
1238 ecc_key
1239 \return MP_CMP_E may be returned if there is an error processing the
1240 ecc_key
1241 \return MP_INVMOD_E may be returned if there is an error processing
1242 the ecc_key
1243 \return MP_EXPTMOD_E may be returned if there is an error processing
1244 the ecc_key
1245 \return MP_MOD_E may be returned if there is an error processing the
1246 ecc_key
1247 \return MP_MUL_E may be returned if there is an error processing the
1248 ecc_key
1249 \return MP_ADD_E may be returned if there is an error processing the
1250 ecc_key
1251 \return MP_MULMOD_E may be returned if there is an error processing
1252 the ecc_key
1253 \return MP_TO_E may be returned if there is an error processing the ecc_key
1254 \return MP_MEM may be returned if there is an error processing the ecc_key
1255
1256 \param priv pointer to the buffer containing the raw private key
1257 \param privSz size of the private key buffer
1258 \param pub pointer to the buffer containing the ANSI x9.63 formatted ECC
1259 public key
1260 \param pubSz length of the public key input buffer
1261 \param key pointer to the ecc_key object in which to store the imported
1262 private/public key pair
1263
1264 _Example_
1265 \code
1266 int ret;
1267 byte pub[] = { initialize with ANSI X9.63 formatted key };
1268 byte priv[] = { initialize with the raw private key };
1269
1270 ecc_key key;
1271 wc_ecc_init(&key);
1272 ret = wc_ecc_import_private_key(priv, sizeof(priv), pub, sizeof(pub),
1273 &key);
1274 if ( ret != 0) {
1275 // error importing key
1276 }
1277 \endcode
1278
1279 \sa wc_ecc_export_x963
1280 \sa wc_ecc_import_private_key
1281*/
1282
1283int wc_ecc_import_private_key(const byte* priv, word32 privSz, const byte* pub,
1284 word32 pubSz, ecc_key* key);
1285
1286/*!
1287 \ingroup ECC
1288
1289 \brief This function converts the R and S portions of an ECC signature
1290 into a DER-encoded ECDSA signature. This function also stores the length
1291 written to the output buffer, out, in outlen.
1292
1293 \return 0 Returned on successfully converting the signature
1294 \return ECC_BAD_ARG_E Returned if any of the input parameters evaluate
1295 to NULL, or if the input buffer is not large enough to hold the
1296 DER-encoded ECDSA signature
1297 \return MP_INIT_E may be returned if there is an error processing
1298 the ecc_key
1299 \return MP_READ_E may be returned if there is an error processing
1300 the ecc_key
1301 \return MP_CMP_E may be returned if there is an error processing
1302 the ecc_key
1303 \return MP_INVMOD_E may be returned if there is an error processing
1304 the ecc_key
1305 \return MP_EXPTMOD_E may be returned if there is an error processing
1306 the ecc_key
1307 \return MP_MOD_E may be returned if there is an error processing the
1308 ecc_key
1309 \return MP_MUL_E may be returned if there is an error processing the
1310 ecc_key
1311 \return MP_ADD_E may be returned if there is an error processing the
1312 ecc_key
1313 \return MP_MULMOD_E may be returned if there is an error processing
1314 the ecc_key
1315 \return MP_TO_E may be returned if there is an error processing the ecc_key
1316 \return MP_MEM may be returned if there is an error processing the ecc_key
1317
1318 \param r pointer to the buffer containing the R portion of the signature
1319 as a string
1320 \param s pointer to the buffer containing the S portion of the signature
1321 as a string
1322 \param out pointer to the buffer in which to store the DER-encoded ECDSA
1323 signature
1324 \param outlen length of the output buffer available. Will store the bytes
1325 written to the buffer after successfully converting the signature to
1326 ECDSA format
1327
1328 _Example_
1329 \code
1330 int ret;
1331 ecc_key key;
1332 // initialize key, generate R and S
1333
1334 char r[] = { initialize with R };
1335 char s[] = { initialize with S };
1336 byte sig[wc_ecc_sig_size(key)];
1337 // signature size will be 2 * ECC key size + ~10 bytes for ASN.1 overhead
1338 word32 sigSz = sizeof(sig);
1339 ret = wc_ecc_rs_to_sig(r, s, sig, &sigSz);
1340 if ( ret != 0) {
1341 // error converting parameters to signature
1342 }
1343 \endcode
1344
1345 \sa wc_ecc_sign_hash
1346 \sa wc_ecc_sig_size
1347*/
1348
1349int wc_ecc_rs_to_sig(const char* r, const char* s, byte* out, word32* outlen);
1350
1351/*!
1352 \ingroup ECC
1353
1354 \brief This function fills an ecc_key structure with the raw components
1355 of an ECC signature.
1356
1357 \return 0 Returned upon successfully importing into the ecc_key structure
1358 \return ECC_BAD_ARG_E Returned if any of the input values evaluate to NULL
1359 \return MEMORY_E Returned if there is an error initializing space to
1360 store the parameters of the ecc_key
1361 \return ASN_PARSE_E Returned if the input curveName is not defined
1362 in ecc_sets
1363 \return MP_INIT_E may be returned if there is an error processing the
1364 input parameters
1365 \return MP_READ_E may be returned if there is an error processing the
1366 input parameters
1367 \return MP_CMP_E may be returned if there is an error processing the
1368 input parameters
1369 \return MP_INVMOD_E may be returned if there is an error processing the
1370 input parameters
1371 \return MP_EXPTMOD_E may be returned if there is an error processing the
1372 input parameters
1373 \return MP_MOD_E may be returned if there is an error processing the
1374 input parameters
1375 \return MP_MUL_E may be returned if there is an error processing the
1376 input parameters
1377 \return MP_ADD_E may be returned if there is an error processing the
1378 input parameters
1379 \return MP_MULMOD_E may be returned if there is an error processing
1380 the input parameters
1381 \return MP_TO_E may be returned if there is an error processing the
1382 input parameters
1383 \return MP_MEM may be returned if there is an error processing the
1384 input parameters
1385
1386 \param key pointer to an ecc_key structure to fill
1387 \param qx pointer to a buffer containing the x component of the base
1388 point as an ASCII hex string
1389 \param qy pointer to a buffer containing the y component of the base
1390 point as an ASCII hex string
1391 \param d pointer to a buffer containing the private key as an ASCII
1392 hex string
1393 \param curveName pointer to a string containing the ECC curve name,
1394 as found in ecc_sets
1395
1396 _Example_
1397 \code
1398 int ret;
1399 ecc_key key;
1400 wc_ecc_init(&key);
1401
1402 char qx[] = { initialize with x component of base point };
1403 char qy[] = { initialize with y component of base point };
1404 char d[] = { initialize with private key };
1405 ret = wc_ecc_import_raw(&key,qx, qy, d, "ECC-256");
1406 if ( ret != 0) {
1407 // error initializing key with given inputs
1408 }
1409 \endcode
1410
1411 \sa wc_ecc_import_private_key
1412*/
1413
1414int wc_ecc_import_raw(ecc_key* key, const char* qx, const char* qy,
1415 const char* d, const char* curveName);
1416
1417/*!
1418 \ingroup ECC
1419
1420 \brief This function exports only the private key from an ecc_key
1421 structure. It stores the private key in the buffer out, and sets
1422 the bytes written to this buffer in outLen.
1423
1424 \return 0 Returned upon successfully exporting the private key
1425 \return ECC_BAD_ARG_E Returned if any of the input values evaluate to NULL
1426 \return MEMORY_E Returned if there is an error initializing space
1427 to store the parameters of the ecc_key
1428 \return ASN_PARSE_E Returned if the input curveName is not defined
1429 in ecc_sets
1430 \return MP_INIT_E may be returned if there is an error processing
1431 the input parameters
1432 \return MP_READ_E may be returned if there is an error processing the
1433 input parameters
1434 \return MP_CMP_E may be returned if there is an error processing the
1435 input parameters
1436 \return MP_INVMOD_E may be returned if there is an error processing
1437 the input parameters
1438 \return MP_EXPTMOD_E may be returned if there is an error processing
1439 the input parameters
1440 \return MP_MOD_E may be returned if there is an error processing the
1441 input parameters
1442 \return MP_MUL_E may be returned if there is an error processing the
1443 input parameters
1444 \return MP_ADD_E may be returned if there is an error processing the
1445 input parameters
1446 \return MP_MULMOD_E may be returned if there is an error processing
1447 the input parameters
1448 \return MP_TO_E may be returned if there is an error processing the
1449 input parameters
1450 \return MP_MEM may be returned if there is an error processing the
1451 input parameters
1452
1453 \param key pointer to an ecc_key structure from which to export the
1454 private key
1455 \param out pointer to the buffer in which to store the private key
1456 \param outLen pointer to a word32 object with the size available in
1457 out. Set with the number of bytes written to out after successfully
1458 exporting the private key
1459
1460 _Example_
1461 \code
1462 int ret;
1463 ecc_key key;
1464 // initialize key, make key
1465
1466 char priv[ECC_KEY_SIZE];
1467 word32 privSz = sizeof(priv);
1468 ret = wc_ecc_export_private_only(&key, priv, &privSz);
1469 if ( ret != 0) {
1470 // error exporting private key
1471 }
1472 \endcode
1473
1474 \sa wc_ecc_import_private_key
1475*/
1476
1477int wc_ecc_export_private_only(ecc_key* key, byte* out, word32* outLen);
1478
1479/*!
1480 \ingroup ECC
1481
1482 \brief Export point to der.
1483
1484 \return 0 Returned on success.
1485 \return ECC_BAD_ARG_E Returns if curve_idx is less than 0 or
1486 invalid. Also returns when
1487 \return LENGTH_ONLY_E outLen is set but nothing else.
1488 \return BUFFER_E Returns if outLen is less than 1 + 2 * the curve size.
1489 \return MEMORY_E Returns if there is a problem allocating memory.
1490
1491 \param curve_idx Index of the curve used from ecc_sets.
1492 \param point Point to export to der.
1493 \param out Destination for the output.
1494 \param outLen Maxsize allowed for output, destination for
1495 final size of output
1496
1497 _Example_
1498 \code
1499 int curve_idx;
1500 ecc_point* point;
1501 byte out[];
1502 word32 outLen;
1503 wc_ecc_export_point_der(curve_idx, point, out, &outLen);
1504 \endcode
1505
1506 \sa wc_ecc_import_point_der
1507*/
1508
1509int wc_ecc_export_point_der(const int curve_idx, ecc_point* point,
1510 byte* out, word32* outLen);
1511
1512/*!
1513 \ingroup ECC
1514
1515 \brief Import point from der format.
1516
1517 \return ECC_BAD_ARG_E Returns if any arguments are null or if
1518 inLen is even.
1519 \return MEMORY_E Returns if there is an error initializing
1520 \return NOT_COMPILED_IN Returned if HAVE_COMP_KEY is not true
1521 and in is a compressed cert
1522 \return MP_OKAY Successful operation.
1523
1524 \param in der buffer to import point from.
1525 \param inLen Length of der buffer.
1526 \param curve_idx Index of curve.
1527 \param point Destination for point.
1528
1529 _Example_
1530 \code
1531 byte in[];
1532 word32 inLen;
1533 int curve_idx;
1534 ecc_point* point;
1535 wc_ecc_import_point_der(in, inLen, curve_idx, point);
1536 \endcode
1537
1538 \sa wc_ecc_export_point_der
1539*/
1540
1541int wc_ecc_import_point_der(const byte* in, word32 inLen, const int curve_idx,
1542 ecc_point* point);
1543
1544/*!
1545 \ingroup ECC
1546
1547 \brief This function returns the key size of an ecc_key
1548 structure in octets.
1549
1550 \return Given a valid key, returns the key size in octets
1551 \return 0 Returned if the given key is NULL
1552
1553 \param key pointer to an ecc_key structure for which to get the key size
1554
1555 _Example_
1556 \code
1557 int keySz;
1558 ecc_key key;
1559 // initialize key, make key
1560 keySz = wc_ecc_size(&key);
1561 if ( keySz == 0) {
1562 // error determining key size
1563 }
1564 \endcode
1565
1566 \sa wc_ecc_make_key
1567*/
1568
1569int wc_ecc_size(ecc_key* key);
1570
1571/*!
1572 \ingroup ECC
1573
1574 \brief This function returns the worst case size for an ECC signature,
1575 given by: (keySz * 2) + SIG_HEADER_SZ + ECC_MAX_PAD_SZ.
1576 The actual signature size can be computed with wc_ecc_sign_hash.
1577
1578 \return returns the maximum signature
1579 size, in octets
1580
1581 \param key size
1582
1583 _Example_
1584 \code
1585 int sigSz = wc_ecc_sig_size_calc(32);
1586 if ( sigSz == 0) {
1587 // error determining sig size
1588 }
1589 \endcode
1590
1591 \sa wc_ecc_sign_hash
1592 \sa wc_ecc_sig_size
1593*/
1594
1595int wc_ecc_sig_size_calc(int sz);
1596
1597
1598/*!
1599 \ingroup ECC
1600
1601 \brief This function returns the worst case size for an ECC signature,
1602 given by: (keySz * 2) + SIG_HEADER_SZ + ECC_MAX_PAD_SZ.
1603 The actual signature size can be computed with wc_ecc_sign_hash.
1604
1605 \return Success Given a valid key, returns the maximum signature
1606 size, in octets
1607 \return 0 Returned if the given key is NULL
1608
1609 \param key pointer to an ecc_key structure for which to get the
1610 signature size
1611
1612 _Example_
1613 \code
1614 int sigSz;
1615 ecc_key key;
1616 // initialize key, make key
1617
1618 sigSz = wc_ecc_sig_size(&key);
1619 if ( sigSz == 0) {
1620 // error determining sig size
1621 }
1622 \endcode
1623
1624 \sa wc_ecc_sign_hash
1625 \sa wc_ecc_sig_size_calc
1626*/
1627
1628int wc_ecc_sig_size(const ecc_key* key);
1629
1630
1631/*!
1632 \ingroup ECC
1633
1634 \brief This function allocates and initializes space for a new ECC
1635 context object to allow secure message exchange with ECC.
1636
1637 \return Success On successfully generating a new ecEncCtx object,
1638 returns a pointer to that object
1639 \return NULL Returned if the function fails to generate a new
1640 ecEncCtx object
1641
1642 \param flags indicate whether this is a server or client context
1643 Options are: REQ_RESP_CLIENT, and REQ_RESP_SERVER
1644 \param rng pointer to a RNG object with which to generate a salt
1645
1646 _Example_
1647 \code
1648 ecEncCtx* ctx;
1649 WC_RNG rng;
1650 wc_InitRng(&rng);
1651 ctx = wc_ecc_ctx_new(REQ_RESP_CLIENT, &rng);
1652 if(ctx == NULL) {
1653 // error generating new ecEncCtx object
1654 }
1655 \endcode
1656
1657 \sa wc_ecc_encrypt
1658 \sa wc_ecc_encrypt_ex
1659 \sa wc_ecc_decrypt
1660*/
1661
1662ecEncCtx* wc_ecc_ctx_new(int flags, WC_RNG* rng);
1663
1664/*!
1665 \ingroup ECC
1666
1667 \brief This function frees the ecEncCtx object used for encrypting
1668 and decrypting messages.
1669
1670 \return none Returns.
1671
1672 \param ctx pointer to the ecEncCtx object to free
1673
1674 _Example_
1675 \code
1676 ecEncCtx* ctx;
1677 WC_RNG rng;
1678 wc_InitRng(&rng);
1679 ctx = wc_ecc_ctx_new(REQ_RESP_CLIENT, &rng);
1680 // do secure communication
1681 ...
1682 wc_ecc_ctx_free(&ctx);
1683 \endcode
1684
1685 \sa wc_ecc_ctx_new
1686*/
1687
1688void wc_ecc_ctx_free(ecEncCtx* ctx);
1689
1690/*!
1691 \ingroup ECC
1692
1693 \brief This function resets an ecEncCtx structure to avoid having
1694 to free and allocate a new context object.
1695
1696 \return 0 Returned if the ecEncCtx structure is successfully reset
1697 \return BAD_FUNC_ARG Returned if either rng or ctx is NULL
1698 \return RNG_FAILURE_E Returned if there is an error generating a
1699 new salt for the ECC object
1700
1701 \param ctx pointer to the ecEncCtx object to reset
1702 \param rng pointer to an RNG object with which to generate a new salt
1703
1704 _Example_
1705 \code
1706 ecEncCtx* ctx;
1707 WC_RNG rng;
1708 wc_InitRng(&rng);
1709 ctx = wc_ecc_ctx_new(REQ_RESP_CLIENT, &rng);
1710 // do secure communication
1711 ...
1712 wc_ecc_ctx_reset(&ctx, &rng);
1713 // do more secure communication
1714 \endcode
1715
1716 \sa wc_ecc_ctx_new
1717*/
1718
1719int wc_ecc_ctx_reset(ecEncCtx* ctx, WC_RNG* rng); /* reset for use again w/o alloc/free */
1720
1721/*!
1722 \ingroup ECC
1723
1724 \brief This function can optionally be called after
1725 wc_ecc_ctx_new. It sets the encryption, KDF, and MAC algorithms
1726 into an ecEncCtx object.
1727
1728 \return 0 Returned upon successfully setting the information
1729 for the ecEncCtx object.
1730 \return BAD_FUNC_ARG Returned if the given ecEncCtx object is
1731 NULL.
1732
1733 \param ctx pointer to the ecEncCtx for which to set the info
1734 \param encAlgo encryption algorithm to use.
1735 \param kdfAlgo KDF algorithm to use.
1736 \param macAlgo MAC algorithm to use.
1737
1738 _Example_
1739 \code
1740 ecEncCtx* ctx;
1741 // initialize ctx
1742 if(wc_ecc_ctx_set_algo(&ctx, ecAES_128_CTR, ecHKDF_SHA256, ecHMAC_SHA256))) {
1743 // error setting info
1744 }
1745 \endcode
1746
1747 \sa wc_ecc_ctx_new
1748*/
1749
1750int wc_ecc_ctx_set_algo(ecEncCtx* ctx, byte encAlgo, byte kdfAlgo,
1751 byte macAlgo);
1752
1753/*!
1754 \ingroup ECC
1755
1756 \brief This function returns the salt of an ecEncCtx object. This
1757 function should only be called when the ecEncCtx's state is
1758 ecSRV_INIT or ecCLI_INIT.
1759
1760 \return Success On success, returns the ecEncCtx salt
1761 \return NULL Returned if the ecEncCtx object is NULL, or the ecEncCtx's
1762 state is not ecSRV_INIT or ecCLI_INIT. In the latter two cases, this
1763 function also sets the ecEncCtx's state to ecSRV_BAD_STATE or
1764 ecCLI_BAD_STATE, respectively
1765
1766 \param ctx pointer to the ecEncCtx object from which to get the salt
1767
1768 _Example_
1769 \code
1770 ecEncCtx* ctx;
1771 WC_RNG rng;
1772 const byte* salt;
1773 wc_InitRng(&rng);
1774 ctx = wc_ecc_ctx_new(REQ_RESP_CLIENT, &rng);
1775 salt = wc_ecc_ctx_get_own_salt(&ctx);
1776 if(salt == NULL) {
1777 // error getting salt
1778 }
1779 \endcode
1780
1781 \sa wc_ecc_ctx_new
1782 \sa wc_ecc_ctx_set_peer_salt
1783 \sa wc_ecc_ctx_set_kdf_salt
1784*/
1785
1786const byte* wc_ecc_ctx_get_own_salt(ecEncCtx* ctx);
1787
1788/*!
1789 \ingroup ECC
1790
1791 \brief This function sets the peer salt of an ecEncCtx object.
1792
1793 \return 0 Returned upon successfully setting the peer salt for the
1794 ecEncCtx object.
1795 \return BAD_FUNC_ARG Returned if the given ecEncCtx object is NULL
1796 or has an invalid protocol, or if the given salt is NULL
1797 \return BAD_ENC_STATE_E Returned if the ecEncCtx's state is
1798 ecSRV_SALT_GET or ecCLI_SALT_GET. In the latter two cases, this
1799 function also sets the ecEncCtx's state to ecSRV_BAD_STATE or
1800 ecCLI_BAD_STATE, respectively
1801
1802 \param ctx pointer to the ecEncCtx for which to set the salt
1803 \param salt pointer to the peer's salt
1804
1805 _Example_
1806 \code
1807 ecEncCtx* cliCtx, srvCtx;
1808 WC_RNG rng;
1809 const byte* cliSalt, srvSalt;
1810 int ret;
1811
1812 wc_InitRng(&rng);
1813 cliCtx = wc_ecc_ctx_new(REQ_RESP_CLIENT, &rng);
1814 srvCtx = wc_ecc_ctx_new(REQ_RESP_SERVER, &rng);
1815
1816 cliSalt = wc_ecc_ctx_get_own_salt(&cliCtx);
1817 srvSalt = wc_ecc_ctx_get_own_salt(&srvCtx);
1818 ret = wc_ecc_ctx_set_peer_salt(&cliCtx, srvSalt);
1819 \endcode
1820
1821 \sa wc_ecc_ctx_get_own_salt
1822 \sa wc_ecc_ctx_set_kdf_salt
1823*/
1824
1825int wc_ecc_ctx_set_peer_salt(ecEncCtx* ctx, const byte* salt);
1826
1827/*!
1828 \ingroup ECC
1829
1830 \brief This function sets the salt pointer and length to use with KDF
1831 into the ecEncCtx object.
1832
1833 \return 0 Returned upon successfully setting the salt for the
1834 ecEncCtx object.
1835 \return BAD_FUNC_ARG Returned if the given ecEncCtx object is NULL
1836 or if the given salt is NULL and length is not NULL.
1837
1838 \param ctx pointer to the ecEncCtx for which to set the salt
1839 \param salt pointer to salt buffer
1840 \param sz length salt in bytes
1841
1842 _Example_
1843 \code
1844 ecEncCtx* srvCtx;
1845 WC_RNG rng;
1846 byte cliSalt[] = { fixed salt data };
1847 word32 cliSaltLen = (word32)sizeof(cliSalt);
1848 int ret;
1849
1850 wc_InitRng(&rng);
1851 cliCtx = wc_ecc_ctx_new(REQ_RESP_SERVER, &rng);
1852
1853 ret = wc_ecc_ctx_set_kdf_salt(&cliCtx, cliSalt, cliSaltLen);
1854 \endcode
1855
1856 \sa wc_ecc_ctx_get_own_salt
1857 \sa wc_ecc_ctx_get_peer_salt
1858*/
1859
1860int wc_ecc_ctx_set_kdf_salt(ecEncCtx* ctx, const byte* salt, word32 sz);
1861
1862/*!
1863 \ingroup ECC
1864
1865 \brief This function can optionally be called before or after
1866 wc_ecc_ctx_set_peer_salt. It sets optional information for
1867 an ecEncCtx object.
1868
1869 \return 0 Returned upon successfully setting the information
1870 for the ecEncCtx object.
1871 \return BAD_FUNC_ARG Returned if the given ecEncCtx object is
1872 NULL, the input info is NULL or it's size is invalid
1873
1874 \param ctx pointer to the ecEncCtx for which to set the info
1875 \param info pointer to a buffer containing the info to set
1876 \param sz size of the info buffer
1877
1878 _Example_
1879 \code
1880 ecEncCtx* ctx;
1881 byte info[] = { initialize with information };
1882 // initialize ctx, get salt,
1883 if(wc_ecc_ctx_set_info(&ctx, info, sizeof(info))) {
1884 // error setting info
1885 }
1886 \endcode
1887
1888 \sa wc_ecc_ctx_new
1889*/
1890
1891int wc_ecc_ctx_set_info(ecEncCtx* ctx, const byte* info, int sz);
1892
1893/*!
1894 \ingroup ECC
1895
1896 \brief This function encrypts the given input message from msg
1897 to out. This function takes an optional ctx object as parameter.
1898 When supplied, encryption proceeds based on the ecEncCtx's
1899 encAlgo, kdfAlgo, and macAlgo. If ctx is not supplied, processing
1900 completes with the default algorithms, ecAES_128_CBC,
1901 ecHKDF_SHA256 and ecHMAC_SHA256. This function requires that
1902 the messages are padded according to the encryption type specified by ctx.
1903
1904 \return 0 Returned upon successfully encrypting the input message
1905 \return BAD_FUNC_ARG Returned if privKey, pubKey, msg, msgSz, out,
1906 or outSz are NULL, or the ctx object specifies an unsupported
1907 encryption type
1908 \return BAD_ENC_STATE_E Returned if the ctx object given is in a
1909 state that is not appropriate for encryption
1910 \return BUFFER_E Returned if the supplied output buffer is too
1911 small to store the encrypted ciphertext
1912 \return MEMORY_E Returned if there is an error allocating memory
1913 for the shared secret key
1914
1915 \param privKey pointer to the ecc_key object containing the
1916 private key to use for encryption
1917 \param pubKey pointer to the ecc_key object containing the public
1918 key of the peer with whom one wishes to communicate
1919 \param msg pointer to the buffer holding the message to encrypt
1920 \param msgSz size of the buffer to encrypt
1921 \param out pointer to the buffer in which to store the encrypted
1922 ciphertext
1923 \param outSz pointer to a word32 object containing the available
1924 size in the out buffer. Upon successfully encrypting the message,
1925 holds the number of bytes written to the output buffer
1926 \param ctx Optional: pointer to an ecEncCtx object specifying different
1927 encryption algorithms to use
1928
1929 _Example_
1930 \code
1931 byte msg[] = { initialize with msg to encrypt. Ensure padded to block size };
1932 byte out[sizeof(msg)];
1933 word32 outSz = sizeof(out);
1934 int ret;
1935 ecc_key cli, serv;
1936 // initialize cli with private key
1937 // initialize serv with received public key
1938
1939 ecEncCtx* cliCtx, servCtx;
1940 // initialize cliCtx and servCtx
1941 // exchange salts
1942 ret = wc_ecc_encrypt(&cli, &serv, msg, sizeof(msg), out, &outSz, cliCtx);
1943 if(ret != 0) {
1944 // error encrypting message
1945 }
1946 \endcode
1947
1948 \sa wc_ecc_encrypt_ex
1949 \sa wc_ecc_decrypt
1950*/
1951
1952int wc_ecc_encrypt(ecc_key* privKey, ecc_key* pubKey, const byte* msg,
1953 word32 msgSz, byte* out, word32* outSz, ecEncCtx* ctx);
1954
1955/*!
1956 \ingroup ECC
1957
1958 \brief This function encrypts the given input message from msg
1959 to out. This function takes an optional ctx object as parameter.
1960 When supplied, encryption proceeds based on the ecEncCtx's
1961 encAlgo, kdfAlgo, and macAlgo. If ctx is not supplied, processing
1962 completes with the default algorithms, ecAES_128_CBC,
1963 ecHKDF_SHA256 and ecHMAC_SHA256. This function requires that
1964 the messages are padded according to the encryption type specified by ctx.
1965
1966 \return 0 Returned upon successfully encrypting the input message
1967 \return BAD_FUNC_ARG Returned if privKey, pubKey, msg, msgSz, out,
1968 or outSz are NULL, or the ctx object specifies an unsupported
1969 encryption type
1970 \return BAD_ENC_STATE_E Returned if the ctx object given is in a
1971 state that is not appropriate for encryption
1972 \return BUFFER_E Returned if the supplied output buffer is too
1973 small to store the encrypted ciphertext
1974 \return MEMORY_E Returned if there is an error allocating memory
1975 for the shared secret key
1976
1977 \param privKey pointer to the ecc_key object containing the
1978 private key to use for encryption
1979 \param pubKey pointer to the ecc_key object containing the public
1980 key of the peer with whom one wishes to communicate
1981 \param msg pointer to the buffer holding the message to encrypt
1982 \param msgSz size of the buffer to encrypt
1983 \param out pointer to the buffer in which to store the encrypted
1984 ciphertext
1985 \param outSz pointer to a word32 object containing the available
1986 size in the out buffer. Upon successfully encrypting the message,
1987 holds the number of bytes written to the output buffer
1988 \param ctx Optional: pointer to an ecEncCtx object specifying different
1989 encryption algorithms to use
1990 \param compressed Public key field is to be output in compressed format.
1991
1992 _Example_
1993 \code
1994 byte msg[] = { initialize with msg to encrypt. Ensure padded to block size };
1995 byte out[sizeof(msg)];
1996 word32 outSz = sizeof(out);
1997 int ret;
1998 ecc_key cli, serv;
1999 // initialize cli with private key
2000 // initialize serv with received public key
2001
2002 ecEncCtx* cliCtx, servCtx;
2003 // initialize cliCtx and servCtx
2004 // exchange salts
2005 ret = wc_ecc_encrypt_ex(&cli, &serv, msg, sizeof(msg), out, &outSz, cliCtx,
2006 1);
2007 if(ret != 0) {
2008 // error encrypting message
2009 }
2010 \endcode
2011
2012 \sa wc_ecc_encrypt
2013 \sa wc_ecc_decrypt
2014*/
2015
2016int wc_ecc_encrypt_ex(ecc_key* privKey, ecc_key* pubKey, const byte* msg,
2017 word32 msgSz, byte* out, word32* outSz, ecEncCtx* ctx, int compressed);
2018
2019/*!
2020 \ingroup ECC
2021
2022 \brief This function decrypts the ciphertext from msg to out. This
2023 function takes an optional ctx object as parameter. When supplied,
2024 encryption proceeds based on the ecEncCtx's encAlgo, kdfAlgo, and
2025 macAlgo. If ctx is not supplied, processing completes with the
2026 default algorithms, ecAES_128_CBC, ecHKDF_SHA256 and ecHMAC_SHA256.
2027 This function requires that the messages are padded according to
2028 the encryption type specified by ctx.
2029
2030 \return 0 Returned upon successfully decrypting the input message
2031 \return BAD_FUNC_ARG Returned if privKey, pubKey, msg, msgSz, out,
2032 or outSz are NULL, or the ctx object specifies an unsupported
2033 encryption type
2034 \return BAD_ENC_STATE_E Returned if the ctx object given is in
2035 a state that is not appropriate for decryption
2036 \return BUFFER_E Returned if the supplied output buffer is too
2037 small to store the decrypted plaintext
2038 \return MEMORY_E Returned if there is an error allocating memory
2039 for the shared secret key
2040
2041 \param privKey pointer to the ecc_key object containing the private
2042 key to use for decryption
2043 \param pubKey pointer to the ecc_key object containing the public
2044 key of the peer with whom one wishes to communicate
2045 \param msg pointer to the buffer holding the ciphertext to decrypt
2046 \param msgSz size of the buffer to decrypt
2047 \param out pointer to the buffer in which to store the decrypted plaintext
2048 \param outSz pointer to a word32 object containing the available
2049 size in the out buffer. Upon successfully decrypting the
2050 ciphertext, holds the number of bytes written to the output buffer
2051 \param ctx Optional: pointer to an ecEncCtx object specifying
2052 different decryption algorithms to use
2053
2054 _Example_
2055 \code
2056 byte cipher[] = { initialize with
2057 ciphertext to decrypt. Ensure padded to block size };
2058 byte plain[sizeof(cipher)];
2059 word32 plainSz = sizeof(plain);
2060 int ret;
2061 ecc_key cli, serv;
2062 // initialize cli with private key
2063 // initialize serv with received public key
2064 ecEncCtx* cliCtx, servCtx;
2065 // initialize cliCtx and servCtx
2066 // exchange salts
2067 ret = wc_ecc_decrypt(&cli, &serv, cipher, sizeof(cipher),
2068 plain, &plainSz, cliCtx);
2069
2070 if(ret != 0) {
2071 // error decrypting message
2072 }
2073 \endcode
2074
2075 \sa wc_ecc_encrypt
2076 \sa wc_ecc_encrypt_ex
2077*/
2078
2079int wc_ecc_decrypt(ecc_key* privKey, ecc_key* pubKey, const byte* msg,
2080 word32 msgSz, byte* out, word32* outSz, ecEncCtx* ctx);
2081
2082
2083/*!
2084 \ingroup ECC
2085
2086 \brief Enable ECC support for non-blocking operations. Supported for
2087 Single Precision (SP) math with the following build options:
2088 WOLFSSL_SP_NONBLOCK
2089 WOLFSSL_SP_SMALL
2090 WOLFSSL_SP_NO_MALLOC
2091 WC_ECC_NONBLOCK
2092
2093 \return 0 Returned upon successfully setting the callback context the input message
2094
2095 \param key pointer to the ecc_key object
2096 \param ctx pointer to ecc nb_ctx_t structure with stack data cache for SP
2097
2098 _Example_
2099 \code
2100 int ret;
2101 ecc_key ecc;
2102 ecc_nb_ctx_t nb_ctx;
2103
2104 ret = wc_ecc_init(&ecc);
2105 if (ret == 0) {
2106 ret = wc_ecc_set_nonblock(&ecc, &nb_ctx);
2107 if (ret == 0) {
2108 do {
2109 ret = wc_ecc_verify_hash_ex(
2110 &r, &s, // r/s as mp_int
2111 hash, hashSz, // computed hash digest
2112 &verify_res, // verification result 1=success
2113 &key
2114 );
2115
2116 // TODO: Real-time work can be called here
2117 } while (ret == FP_WOULDBLOCK);
2118 }
2119 wc_ecc_free(&key);
2120 }
2121 \endcode
2122*/
2123int wc_ecc_set_nonblock(ecc_key *key, ecc_nb_ctx_t* ctx);
2124
2125/*!
2126 \ingroup ECC
2127
2128 \brief Compare a curve which has larger key than specified size or the curve matched curve ID,
2129 set a curve with smaller key size to the key.
2130
2131 \return 0 Returned upon successfully setting the key
2132
2133 \param keysize Key size in bytes
2134 \param curve_id Curve ID
2135
2136 _Example_
2137 \code int ret;
2138 ecc_key ecc;
2139
2140 ret = wc_ecc_init(&ecc);
2141 if (ret != 0)
2142 return ret;
2143 ret = wc_ecc_set_curve(&ecc, 32, ECC_SECP256R1));
2144 if (ret != 0)
2145 return ret;
2146
2147 \endcode
2148*/
2149int wc_ecc_set_curve(ecc_key *key, int keysize, int curve_id);
2150
2151/*!
2152 \ingroup ECC
2153 \brief Gets private key mp_int from ECC key.
2154
2155 \return mp_int pointer on success
2156 \return NULL on failure
2157
2158 \param key ECC key structure
2159
2160 _Example_
2161 \code
2162 ecc_key key;
2163 mp_int* priv = wc_ecc_key_get_priv(&key);
2164 \endcode
2165
2166 \sa wc_ecc_init
2167*/
2168mp_int* wc_ecc_key_get_priv(ecc_key* key);
2169
2170/*!
2171 \ingroup ECC
2172 \brief Allocates and initializes new ECC key.
2173
2174 \return ecc_key pointer on success
2175 \return NULL on failure
2176
2177 \param heap Heap hint for memory allocation
2178
2179 _Example_
2180 \code
2181 ecc_key* key = wc_ecc_key_new(NULL);
2182 if (key != NULL) {
2183 // use key
2184 wc_ecc_key_free(key);
2185 }
2186 \endcode
2187
2188 \sa wc_ecc_key_free
2189*/
2190ecc_key* wc_ecc_key_new(void* heap);
2191
2192/*!
2193 \ingroup ECC
2194 \brief Returns number of supported ECC curve sets.
2195
2196 \return Number of curve sets
2197
2198 _Example_
2199 \code
2200 size_t count = wc_ecc_get_sets_count();
2201 \endcode
2202
2203 \sa wc_ecc_get_curve_params
2204*/
2205size_t wc_ecc_get_sets_count(void);
2206
2207/*!
2208 \ingroup ECC
2209 \brief Gets curve name from curve ID.
2210
2211 \return Curve name string on success
2212 \return NULL on failure
2213
2214 \param curve_id Curve identifier
2215
2216 _Example_
2217 \code
2218 const char* name = wc_ecc_get_name(ECC_SECP256R1);
2219 \endcode
2220
2221 \sa wc_ecc_get_curve_id
2222*/
2223const char* wc_ecc_get_name(int curve_id);
2224
2225/*!
2226 \ingroup ECC
2227 \brief Makes ECC key with extended options.
2228
2229 \return 0 on success
2230 \return negative on error
2231
2232 \param rng Random number generator
2233 \param keysize Key size in bytes
2234 \param key ECC key structure
2235 \param curve_id Curve identifier
2236 \param flags Additional flags
2237
2238 _Example_
2239 \code
2240 WC_RNG rng;
2241 ecc_key key;
2242 int ret = wc_ecc_make_key_ex2(&rng, 32, &key,
2243 ECC_SECP256R1, 0);
2244 \endcode
2245
2246 \sa wc_ecc_make_key_ex
2247*/
2248int wc_ecc_make_key_ex2(WC_RNG* rng, int keysize, ecc_key* key,
2249 int curve_id, int flags);
2250
2251/*!
2252 \ingroup ECC
2253 \brief Checks if point is on curve.
2254
2255 \return 1 if point is on curve
2256 \return 0 if not on curve
2257 \return negative on error
2258
2259 \param ecp ECC point
2260 \param a Curve parameter a
2261 \param b Curve parameter b
2262 \param prime Curve prime
2263
2264 _Example_
2265 \code
2266 ecc_point* point;
2267 mp_int a, b, prime;
2268 int ret = wc_ecc_is_point(point, &a, &b, &prime);
2269 \endcode
2270
2271 \sa wc_ecc_point_is_on_curve
2272*/
2273int wc_ecc_is_point(ecc_point* ecp, mp_int* a, mp_int* b,
2274 mp_int* prime);
2275
2276/*!
2277 \ingroup ECC
2278 \brief Gets generator point for curve.
2279
2280 \return 0 on success
2281 \return negative on error
2282
2283 \param ecp ECC point to store generator
2284 \param curve_idx Curve index
2285
2286 _Example_
2287 \code
2288 ecc_point* gen = wc_ecc_new_point();
2289 int ret = wc_ecc_get_generator(gen, 0);
2290 \endcode
2291
2292 \sa wc_ecc_get_curve_params
2293*/
2294int wc_ecc_get_generator(ecc_point* ecp, int curve_idx);
2295
2296/*!
2297 \ingroup ECC
2298 \brief Sets deterministic signing mode.
2299
2300 \return 0 on success
2301 \return negative on error
2302
2303 \param key ECC key
2304 \param flag Enable/disable flag
2305
2306 _Example_
2307 \code
2308 ecc_key key;
2309 int ret = wc_ecc_set_deterministic(&key, 1);
2310 \endcode
2311
2312 \sa wc_ecc_set_deterministic_ex
2313*/
2314int wc_ecc_set_deterministic(ecc_key* key, byte flag);
2315
2316/*!
2317 \ingroup ECC
2318 \brief Sets deterministic signing with hash type.
2319
2320 \return 0 on success
2321 \return negative on error
2322
2323 \param key ECC key
2324 \param flag Enable/disable flag
2325 \param hashType Hash algorithm type
2326
2327 _Example_
2328 \code
2329 ecc_key key;
2330 int ret = wc_ecc_set_deterministic_ex(&key, 1, WC_HASH_TYPE_SHA256);
2331 \endcode
2332
2333 \sa wc_ecc_set_deterministic
2334*/
2335int wc_ecc_set_deterministic_ex(ecc_key* key, byte flag,
2336 enum wc_HashType hashType);
2337
2338/*!
2339 \ingroup ECC
2340 \brief Generates deterministic k value for signing.
2341
2342 \return 0 on success
2343 \return negative on error
2344
2345 \param hash Hash value
2346 \param hashSz Hash size
2347 \param hashType Hash algorithm type
2348 \param priv Private key
2349 \param k Output k value
2350 \param order Curve order
2351 \param heap Heap hint
2352
2353 _Example_
2354 \code
2355 byte hash[32];
2356 mp_int priv, k, order;
2357 int ret = wc_ecc_gen_deterministic_k(hash, 32,
2358 WC_HASH_TYPE_SHA256,
2359 &priv, &k, &order, NULL);
2360 \endcode
2361
2362 \sa wc_ecc_sign_set_k
2363*/
2364int wc_ecc_gen_deterministic_k(const byte* hash, word32 hashSz,
2365 enum wc_HashType hashType, mp_int* priv, mp_int* k,
2366 mp_int* order, void* heap);
2367
2368/*!
2369 \ingroup ECC
2370 \brief Sets k value for signing.
2371
2372 \return 0 on success
2373 \return negative on error
2374
2375 \param k K value buffer
2376 \param klen K value length
2377 \param key ECC key
2378
2379 _Example_
2380 \code
2381 byte k[32];
2382 ecc_key key;
2383 int ret = wc_ecc_sign_set_k(k, sizeof(k), &key);
2384 \endcode
2385
2386 \sa wc_ecc_gen_deterministic_k
2387*/
2388int wc_ecc_sign_set_k(const byte* k, word32 klen, ecc_key* key);
2389
2390/*!
2391 \ingroup ECC
2392 \brief Initializes ECC key with ID.
2393
2394 \note This API is only available when WOLF_PRIVATE_KEY_ID is defined,
2395 which is set for PKCS11 support.
2396
2397 \return 0 on success
2398 \return negative on error
2399
2400 \param key ECC key
2401 \param id ID buffer
2402 \param len ID length
2403 \param heap Heap hint
2404 \param devId Device ID
2405
2406 _Example_
2407 \code
2408 ecc_key key;
2409 unsigned char id[] = "mykey";
2410 int ret = wc_ecc_init_id(&key, id, sizeof(id), NULL,
2411 INVALID_DEVID);
2412 \endcode
2413
2414 \sa wc_ecc_init_label
2415*/
2416int wc_ecc_init_id(ecc_key* key, unsigned char* id, int len,
2417 void* heap, int devId);
2418
2419/*!
2420 \ingroup ECC
2421 \brief Initializes ECC key with label.
2422
2423 \note This API is only available when WOLF_PRIVATE_KEY_ID is defined,
2424 which is set for PKCS11 support.
2425
2426 \return 0 on success
2427 \return negative on error
2428
2429 \param key ECC key
2430 \param label Label string
2431 \param heap Heap hint
2432 \param devId Device ID
2433
2434 _Example_
2435 \code
2436 ecc_key key;
2437 int ret = wc_ecc_init_label(&key, "mykey", NULL,
2438 INVALID_DEVID);
2439 \endcode
2440
2441 \sa wc_ecc_init_id
2442*/
2443int wc_ecc_init_label(ecc_key* key, const char* label, void* heap,
2444 int devId);
2445
2446/*!
2447 \ingroup ECC
2448 \brief Sets flags on ECC key.
2449
2450 \return 0 on success
2451 \return negative on error
2452
2453 \param key ECC key
2454 \param flags Flags to set
2455
2456 _Example_
2457 \code
2458 ecc_key key;
2459 int ret = wc_ecc_set_flags(&key, WC_ECC_FLAG_COFACTOR);
2460 \endcode
2461
2462 \sa wc_ecc_init
2463*/
2464int wc_ecc_set_flags(ecc_key* key, word32 flags);
2465
2466/*!
2467 \ingroup ECC
2468 \brief Initializes fixed-point cache.
2469
2470 \return none No returns
2471
2472 _Example_
2473 \code
2474 wc_ecc_fp_init();
2475 \endcode
2476
2477 \sa wc_ecc_init
2478*/
2479void wc_ecc_fp_init(void);
2480
2481/*!
2482 \ingroup ECC
2483 \brief Sets RNG for ECC key.
2484
2485 \return 0 on success
2486 \return negative on error
2487
2488 \param key ECC key
2489 \param rng Random number generator
2490
2491 _Example_
2492 \code
2493 ecc_key key;
2494 WC_RNG rng;
2495 int ret = wc_ecc_set_rng(&key, &rng);
2496 \endcode
2497
2498 \sa wc_ecc_make_key
2499*/
2500int wc_ecc_set_rng(ecc_key* key, WC_RNG* rng);
2501
2502/*!
2503 \ingroup ECC
2504 \brief Gets curve index from curve ID.
2505
2506 \return Curve index on success
2507 \return negative on error
2508
2509 \param curve_id Curve identifier
2510
2511 _Example_
2512 \code
2513 int idx = wc_ecc_get_curve_idx(ECC_SECP256R1);
2514 \endcode
2515
2516 \sa wc_ecc_get_curve_id
2517*/
2518int wc_ecc_get_curve_idx(int curve_id);
2519
2520/*!
2521 \ingroup ECC
2522 \brief Gets curve ID from curve index.
2523
2524 \return Curve ID on success
2525 \return negative on error
2526
2527 \param curve_idx Curve index
2528
2529 _Example_
2530 \code
2531 int id = wc_ecc_get_curve_id(0);
2532 \endcode
2533
2534 \sa wc_ecc_get_curve_idx
2535*/
2536int wc_ecc_get_curve_id(int curve_idx);
2537
2538/*!
2539 \ingroup ECC
2540 \brief Gets curve size from curve ID.
2541
2542 \return Key size in bytes on success
2543 \return negative on error
2544
2545 \param curve_id Curve identifier
2546
2547 _Example_
2548 \code
2549 int size = wc_ecc_get_curve_size_from_id(ECC_SECP256R1);
2550 \endcode
2551
2552 \sa wc_ecc_get_curve_id
2553*/
2554int wc_ecc_get_curve_size_from_id(int curve_id);
2555
2556/*!
2557 \ingroup ECC
2558 \brief Gets curve index from curve name.
2559
2560 \return Curve index on success
2561 \return negative on error
2562
2563 \param curveName Curve name string
2564
2565 _Example_
2566 \code
2567 int idx = wc_ecc_get_curve_idx_from_name("SECP256R1");
2568 \endcode
2569
2570 \sa wc_ecc_get_name
2571*/
2572int wc_ecc_get_curve_idx_from_name(const char* curveName);
2573
2574/*!
2575 \ingroup ECC
2576 \brief Gets curve size from curve name.
2577
2578 \return Key size in bytes on success
2579 \return negative on error
2580
2581 \param curveName Curve name string
2582
2583 _Example_
2584 \code
2585 int size = wc_ecc_get_curve_size_from_name("SECP256R1");
2586 \endcode
2587
2588 \sa wc_ecc_get_curve_idx_from_name
2589*/
2590int wc_ecc_get_curve_size_from_name(const char* curveName);
2591
2592/*!
2593 \ingroup ECC
2594 \brief Gets curve ID from curve name.
2595
2596 \return Curve ID on success
2597 \return negative on error
2598
2599 \param curveName Curve name string
2600
2601 _Example_
2602 \code
2603 int id = wc_ecc_get_curve_id_from_name("SECP256R1");
2604 \endcode
2605
2606 \sa wc_ecc_get_name
2607*/
2608int wc_ecc_get_curve_id_from_name(const char* curveName);
2609
2610/*!
2611 \ingroup ECC
2612 \brief Gets curve ID from curve parameters.
2613
2614 \return Curve ID on success
2615 \return negative on error
2616
2617 \param fieldSize Field size
2618 \param prime Prime modulus
2619 \param primeSz Prime size
2620 \param Af Curve parameter A
2621 \param AfSz A size
2622 \param Bf Curve parameter B
2623 \param BfSz B size
2624 \param order Curve order
2625 \param orderSz Order size
2626 \param Gx Generator X coordinate
2627 \param GxSz Gx size
2628 \param Gy Generator Y coordinate
2629 \param GySz Gy size
2630 \param cofactor Curve cofactor
2631
2632 _Example_
2633 \code
2634 int id = wc_ecc_get_curve_id_from_params(256, prime, 32,
2635 Af, 32, Bf, 32,
2636 order, 32, Gx, 32,
2637 Gy, 32, 1);
2638 \endcode
2639
2640 \sa wc_ecc_get_curve_params
2641*/
2642int wc_ecc_get_curve_id_from_params(int fieldSize,
2643 const byte* prime, word32 primeSz, const byte* Af, word32 AfSz,
2644 const byte* Bf, word32 BfSz, const byte* order, word32 orderSz,
2645 const byte* Gx, word32 GxSz, const byte* Gy, word32 GySz,
2646 int cofactor);
2647
2648/*!
2649 \ingroup ECC
2650 \brief Gets curve ID from domain parameters.
2651
2652 \return Curve ID on success
2653 \return negative on error
2654
2655 \param dp Domain parameters
2656
2657 _Example_
2658 \code
2659 const ecc_set_type* dp;
2660 int id = wc_ecc_get_curve_id_from_dp_params(dp);
2661 \endcode
2662
2663 \sa wc_ecc_get_curve_params
2664*/
2665int wc_ecc_get_curve_id_from_dp_params(const ecc_set_type* dp);
2666
2667/*!
2668 \ingroup ECC
2669 \brief Gets curve ID from OID.
2670
2671 \return Curve ID on success
2672 \return negative on error
2673
2674 \param oid OID buffer
2675 \param len OID length
2676
2677 _Example_
2678 \code
2679 byte oid[] = {0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x03, 0x01, 0x07};
2680 int id = wc_ecc_get_curve_id_from_oid(oid, sizeof(oid));
2681 \endcode
2682
2683 \sa wc_ecc_get_oid
2684*/
2685int wc_ecc_get_curve_id_from_oid(const byte* oid, word32 len);
2686
2687/*!
2688 \ingroup ECC
2689 \brief Gets curve parameters from curve index.
2690
2691 \return ecc_set_type pointer on success
2692 \return NULL on failure
2693
2694 \param curve_idx Curve index
2695
2696 _Example_
2697 \code
2698 const ecc_set_type* params = wc_ecc_get_curve_params(0);
2699 \endcode
2700
2701 \sa wc_ecc_get_curve_idx
2702*/
2703const ecc_set_type* wc_ecc_get_curve_params(int curve_idx);
2704
2705/*!
2706 \ingroup ECC
2707 \brief Allocates new ECC point.
2708
2709 \return ecc_point pointer on success
2710 \return NULL on failure
2711
2712 _Example_
2713 \code
2714 ecc_point* point = wc_ecc_new_point();
2715 if (point != NULL) {
2716 // use point
2717 wc_ecc_del_point(point);
2718 }
2719 \endcode
2720
2721 \sa wc_ecc_del_point
2722*/
2723ecc_point* wc_ecc_new_point(void);
2724
2725/*!
2726 \ingroup ECC
2727 \brief Allocates new ECC point with heap hint.
2728
2729 \return ecc_point pointer on success
2730 \return NULL on failure
2731
2732 \param h Heap hint
2733
2734 _Example_
2735 \code
2736 ecc_point* point = wc_ecc_new_point_h(NULL);
2737 if (point != NULL) {
2738 // use point
2739 wc_ecc_del_point_h(point, NULL);
2740 }
2741 \endcode
2742
2743 \sa wc_ecc_del_point_h
2744*/
2745ecc_point* wc_ecc_new_point_h(void* h);
2746
2747/*!
2748 \ingroup ECC
2749 \brief Frees ECC point with heap hint.
2750
2751 \return none No returns
2752
2753 \param p ECC point to free
2754 \param h Heap hint
2755
2756 _Example_
2757 \code
2758 ecc_point* point = wc_ecc_new_point_h(NULL);
2759 // use point
2760 wc_ecc_del_point_h(point, NULL);
2761 \endcode
2762
2763 \sa wc_ecc_new_point_h
2764*/
2765void wc_ecc_del_point_h(ecc_point* p, void* h);
2766
2767/*!
2768 \ingroup ECC
2769 \brief Securely zeros ECC point.
2770
2771 \return none No returns
2772
2773 \param p ECC point to zero
2774
2775 _Example_
2776 \code
2777 ecc_point* point;
2778 wc_ecc_forcezero_point(point);
2779 \endcode
2780
2781 \sa wc_ecc_del_point
2782*/
2783void wc_ecc_forcezero_point(ecc_point* p);
2784
2785/*!
2786 \ingroup ECC
2787 \brief Checks if point is on curve.
2788
2789 \return 1 if on curve
2790 \return 0 if not on curve
2791 \return negative on error
2792
2793 \param p ECC point
2794 \param curve_idx Curve index
2795
2796 _Example_
2797 \code
2798 ecc_point* point;
2799 int ret = wc_ecc_point_is_on_curve(point, 0);
2800 \endcode
2801
2802 \sa wc_ecc_is_point
2803*/
2804int wc_ecc_point_is_on_curve(ecc_point *p, int curve_idx);
2805
2806/*!
2807 \ingroup ECC
2808 \brief Imports X9.63 format with curve ID.
2809
2810 \return 0 on success
2811 \return negative on error
2812
2813 \param in Input buffer
2814 \param inLen Input length
2815 \param key ECC key
2816 \param curve_id Curve identifier
2817
2818 _Example_
2819 \code
2820 byte x963[65];
2821 ecc_key key;
2822 int ret = wc_ecc_import_x963_ex(x963, sizeof(x963), &key,
2823 ECC_SECP256R1);
2824 \endcode
2825
2826 \sa wc_ecc_import_x963
2827*/
2828int wc_ecc_import_x963_ex(const byte* in, word32 inLen,
2829 ecc_key* key, int curve_id);
2830
2831/*!
2832 \ingroup ECC
2833 \brief Imports private key with curve ID.
2834
2835 \return 0 on success
2836 \return negative on error
2837
2838 \param priv Private key buffer
2839 \param privSz Private key size
2840 \param pub Public key buffer
2841 \param pubSz Public key size
2842 \param key ECC key
2843 \param curve_id Curve identifier
2844
2845 _Example_
2846 \code
2847 byte priv[32], pub[65];
2848 ecc_key key;
2849 int ret = wc_ecc_import_private_key_ex(priv, 32, pub, 65,
2850 &key, ECC_SECP256R1);
2851 \endcode
2852
2853 \sa wc_ecc_import_private_key
2854*/
2855int wc_ecc_import_private_key_ex(const byte* priv, word32 privSz,
2856 const byte* pub, word32 pubSz, ecc_key* key, int curve_id);
2857
2858/*!
2859 \ingroup ECC
2860 \brief Converts raw r,s to signature.
2861
2862 \return 0 on success
2863 \return negative on error
2864
2865 \param r R value buffer
2866 \param rSz R value size
2867 \param s S value buffer
2868 \param sSz S value size
2869 \param out Output signature buffer
2870 \param outlen Output signature length
2871
2872 _Example_
2873 \code
2874 byte r[32], s[32], sig[72];
2875 word32 sigLen = sizeof(sig);
2876 int ret = wc_ecc_rs_raw_to_sig(r, 32, s, 32, sig, &sigLen);
2877 \endcode
2878
2879 \sa wc_ecc_sig_to_rs
2880*/
2881int wc_ecc_rs_raw_to_sig(const byte* r, word32 rSz, const byte* s,
2882 word32 sSz, byte* out, word32* outlen);
2883
2884/*!
2885 \ingroup ECC
2886 \brief Converts signature to raw r,s.
2887
2888 \return 0 on success
2889 \return negative on error
2890
2891 \param sig Signature buffer
2892 \param sigLen Signature length
2893 \param r R value buffer
2894 \param rLen R value length
2895 \param s S value buffer
2896 \param sLen S value length
2897
2898 _Example_
2899 \code
2900 byte sig[72], r[32], s[32];
2901 word32 rLen = 32, sLen = 32;
2902 int ret = wc_ecc_sig_to_rs(sig, 72, r, &rLen, s, &sLen);
2903 \endcode
2904
2905 \sa wc_ecc_rs_raw_to_sig
2906*/
2907int wc_ecc_sig_to_rs(const byte* sig, word32 sigLen, byte* r,
2908 word32* rLen, byte* s, word32* sLen);
2909
2910/*!
2911 \ingroup ECC
2912 \brief Imports raw key with curve ID.
2913
2914 \return 0 on success
2915 \return negative on error
2916
2917 \param key ECC key
2918 \param qx X coordinate string
2919 \param qy Y coordinate string
2920 \param d Private key string
2921 \param curve_id Curve identifier
2922
2923 _Example_
2924 \code
2925 ecc_key key;
2926 int ret = wc_ecc_import_raw_ex(&key, qxStr, qyStr, dStr,
2927 ECC_SECP256R1);
2928 \endcode
2929
2930 \sa wc_ecc_import_raw
2931*/
2932int wc_ecc_import_raw_ex(ecc_key* key, const char* qx,
2933 const char* qy, const char* d, int curve_id);
2934
2935/*!
2936 \ingroup ECC
2937 \brief Imports unsigned key with curve ID.
2938
2939 \return 0 on success
2940 \return negative on error
2941
2942 \param key ECC key
2943 \param qx X coordinate buffer
2944 \param qy Y coordinate buffer
2945 \param d Private key buffer
2946 \param curve_id Curve identifier
2947
2948 _Example_
2949 \code
2950 ecc_key key;
2951 byte qx[32], qy[32], d[32];
2952 int ret = wc_ecc_import_unsigned(&key, qx, qy, d,
2953 ECC_SECP256R1);
2954 \endcode
2955
2956 \sa wc_ecc_import_raw_ex
2957*/
2958int wc_ecc_import_unsigned(ecc_key* key, const byte* qx,
2959 const byte* qy, const byte* d, int curve_id);
2960
2961/*!
2962 \ingroup ECC
2963 \brief Exports key with encoding type.
2964
2965 \return 0 on success
2966 \return negative on error
2967
2968 \param key ECC key
2969 \param qx X coordinate buffer
2970 \param qxLen X coordinate length
2971 \param qy Y coordinate buffer
2972 \param qyLen Y coordinate length
2973 \param d Private key buffer
2974 \param dLen Private key length
2975 \param encType Encoding type
2976
2977 _Example_
2978 \code
2979 ecc_key key;
2980 byte qx[32], qy[32], d[32];
2981 word32 qxLen = 32, qyLen = 32, dLen = 32;
2982 int ret = wc_ecc_export_ex(&key, qx, &qxLen, qy, &qyLen,
2983 d, &dLen, 0);
2984 \endcode
2985
2986 \sa wc_ecc_export_public_raw
2987*/
2988int wc_ecc_export_ex(ecc_key* key, byte* qx, word32* qxLen,
2989 byte* qy, word32* qyLen, byte* d, word32* dLen, int encType);
2990
2991/*!
2992 \ingroup ECC
2993 \brief Exports public key in raw format.
2994
2995 \return 0 on success
2996 \return negative on error
2997
2998 \param key ECC key
2999 \param qx X coordinate buffer
3000 \param qxLen X coordinate length
3001 \param qy Y coordinate buffer
3002 \param qyLen Y coordinate length
3003
3004 _Example_
3005 \code
3006 ecc_key key;
3007 byte qx[32], qy[32];
3008 word32 qxLen = 32, qyLen = 32;
3009 int ret = wc_ecc_export_public_raw(&key, qx, &qxLen, qy,
3010 &qyLen);
3011 \endcode
3012
3013 \sa wc_ecc_export_private_raw
3014*/
3015int wc_ecc_export_public_raw(ecc_key* key, byte* qx,
3016 word32* qxLen, byte* qy, word32* qyLen);
3017
3018/*!
3019 \ingroup ECC
3020 \brief Exports private key in raw format.
3021
3022 \return 0 on success
3023 \return negative on error
3024
3025 \param key ECC key
3026 \param qx X coordinate buffer
3027 \param qxLen X coordinate length
3028 \param qy Y coordinate buffer
3029 \param qyLen Y coordinate length
3030 \param d Private key buffer
3031 \param dLen Private key length
3032
3033 _Example_
3034 \code
3035 ecc_key key;
3036 byte qx[32], qy[32], d[32];
3037 word32 qxLen = 32, qyLen = 32, dLen = 32;
3038 int ret = wc_ecc_export_private_raw(&key, qx, &qxLen, qy,
3039 &qyLen, d, &dLen);
3040 \endcode
3041
3042 \sa wc_ecc_export_public_raw
3043*/
3044int wc_ecc_export_private_raw(ecc_key* key, byte* qx,
3045 word32* qxLen, byte* qy, word32* qyLen, byte* d, word32* dLen);
3046
3047/*!
3048 \ingroup ECC
3049 \brief Exports point in DER format with compression.
3050
3051 \return Size on success
3052 \return negative on error
3053
3054 \param curve_idx Curve index
3055 \param point ECC point
3056 \param out Output buffer
3057 \param outLen Output length
3058 \param compressed Compression flag
3059
3060 _Example_
3061 \code
3062 ecc_point* point;
3063 byte out[65];
3064 word32 outLen = sizeof(out);
3065 int ret = wc_ecc_export_point_der_ex(0, point, out, &outLen,
3066 0);
3067 \endcode
3068
3069 \sa wc_ecc_export_point_der
3070*/
3071int wc_ecc_export_point_der_ex(const int curve_idx,
3072 ecc_point* point, byte* out, word32* outLen, int compressed);
3073
3074/*!
3075 \ingroup ECC
3076 \brief Imports point from DER format.
3077
3078 \return 0 on success
3079 \return negative on error
3080
3081 \param in Input buffer
3082 \param inLen Input length
3083 \param curve_idx Curve index
3084 \param point ECC point
3085 \param shortKeySize Short key size flag
3086
3087 _Example_
3088 \code
3089 byte der[65];
3090 ecc_point* point = wc_ecc_new_point();
3091 int ret = wc_ecc_import_point_der_ex(der, sizeof(der), 0,
3092 point, 0);
3093 \endcode
3094
3095 \sa wc_ecc_import_point_der
3096*/
3097int wc_ecc_import_point_der_ex(const byte* in, word32 inLen,
3098 const int curve_idx, ecc_point* point, int shortKeySize);
3099
3100/*!
3101 \ingroup ECC
3102 \brief Gets OID for curve.
3103
3104 \return 0 on success
3105 \return negative on error
3106
3107 \param oidSum OID sum
3108 \param oid OID buffer pointer
3109 \param oidSz OID size pointer
3110
3111 _Example_
3112 \code
3113 const byte* oid;
3114 word32 oidSz;
3115 int ret = wc_ecc_get_oid(0x2A8648CE3D030107, &oid, &oidSz);
3116 \endcode
3117
3118 \sa wc_ecc_get_curve_id_from_oid
3119*/
3120int wc_ecc_get_oid(word32 oidSum, const byte** oid, word32* oidSz);
3121
3122/*!
3123 \ingroup ECC
3124 \brief Sets custom curve parameters.
3125
3126 \return 0 on success
3127 \return negative on error
3128
3129 \param key ECC key
3130 \param dp Domain parameters
3131
3132 _Example_
3133 \code
3134 ecc_key key;
3135 ecc_set_type dp;
3136 int ret = wc_ecc_set_custom_curve(&key, &dp);
3137 \endcode
3138
3139 \sa wc_ecc_get_curve_params
3140*/
3141int wc_ecc_set_custom_curve(ecc_key* key, const ecc_set_type* dp);
3142
3143/*!
3144 \ingroup ECC
3145 \brief Creates new ECC encryption context.
3146
3147 \return ecEncCtx pointer on success
3148 \return NULL on failure
3149
3150 \param flags Context flags
3151 \param rng Random number generator
3152
3153 _Example_
3154 \code
3155 WC_RNG rng;
3156 ecEncCtx* ctx = wc_ecc_ctx_new(0, &rng);
3157 \endcode
3158
3159 \sa wc_ecc_ctx_free
3160*/
3161ecEncCtx* wc_ecc_ctx_new(int flags, WC_RNG* rng);
3162
3163/*!
3164 \ingroup ECC
3165 \brief Creates new ECC encryption context with heap.
3166
3167 \return ecEncCtx pointer on success
3168 \return NULL on failure
3169
3170 \param flags Context flags
3171 \param rng Random number generator
3172 \param heap Heap hint
3173
3174 _Example_
3175 \code
3176 WC_RNG rng;
3177 ecEncCtx* ctx = wc_ecc_ctx_new_ex(0, &rng, NULL);
3178 \endcode
3179
3180 \sa wc_ecc_ctx_new
3181*/
3182ecEncCtx* wc_ecc_ctx_new_ex(int flags, WC_RNG* rng, void* heap);
3183
3184/*!
3185 \ingroup ECC
3186 \brief Resets ECC encryption context.
3187
3188 \return 0 on success
3189 \return negative on error
3190
3191 \param ctx ECC encryption context
3192 \param rng Random number generator
3193
3194 _Example_
3195 \code
3196 ecEncCtx* ctx;
3197 WC_RNG rng;
3198 int ret = wc_ecc_ctx_reset(ctx, &rng);
3199 \endcode
3200
3201 \sa wc_ecc_ctx_new
3202*/
3203int wc_ecc_ctx_reset(ecEncCtx* ctx, WC_RNG* rng);
3204
3205/*!
3206 \ingroup ECC
3207 \brief Gets own salt from context.
3208
3209 \return Salt pointer on success
3210 \return NULL on failure
3211
3212 \param ctx ECC encryption context
3213
3214 _Example_
3215 \code
3216 ecEncCtx* ctx;
3217 const byte* salt = wc_ecc_ctx_get_own_salt(ctx);
3218 \endcode
3219
3220 \sa wc_ecc_ctx_set_own_salt
3221*/
3222const byte* wc_ecc_ctx_get_own_salt(ecEncCtx* ctx);
3223
3224/*!
3225 \ingroup ECC
3226 \brief Sets own salt in context.
3227
3228 \return 0 on success
3229 \return negative on error
3230
3231 \param ctx ECC encryption context
3232 \param salt Salt buffer
3233 \param sz Salt size
3234
3235 _Example_
3236 \code
3237 ecEncCtx* ctx;
3238 byte salt[16];
3239 int ret = wc_ecc_ctx_set_own_salt(ctx, salt, sizeof(salt));
3240 \endcode
3241
3242 \sa wc_ecc_ctx_get_own_salt
3243*/
3244int wc_ecc_ctx_set_own_salt(ecEncCtx* ctx, const byte* salt,
3245 word32 sz);
3246
3247/*!
3248 \ingroup ECC
3249 \brief X9.63 Key Derivation Function.
3250
3251 \return 0 on success
3252 \return negative on error
3253
3254 \param type Hash type
3255 \param secret Shared secret
3256 \param secretSz Secret size
3257 \param sinfo Shared info
3258 \param sinfoSz Shared info size
3259 \param out Output buffer
3260 \param outSz Output size
3261
3262 _Example_
3263 \code
3264 byte secret[32], sinfo[10], out[32];
3265 int ret = wc_X963_KDF(WC_HASH_TYPE_SHA256, secret, 32,
3266 sinfo, 10, out, 32);
3267 \endcode
3268
3269 \sa wc_ecc_shared_secret
3270*/
3271int wc_X963_KDF(enum wc_HashType type, const byte* secret,
3272 word32 secretSz, const byte* sinfo, word32 sinfoSz,
3273 byte* out, word32 outSz);
3274
3275/*!
3276 \ingroup ECC
3277 \brief Initializes curve cache.
3278
3279 \return 0 on success
3280 \return negative on error
3281
3282 _Example_
3283 \code
3284 int ret = wc_ecc_curve_cache_init();
3285 \endcode
3286
3287 \sa wc_ecc_curve_cache_free
3288*/
3289int wc_ecc_curve_cache_init(void);
3290
3291/*!
3292 \ingroup ECC
3293 \brief Frees curve cache.
3294
3295 \return none No returns
3296
3297 _Example_
3298 \code
3299 wc_ecc_curve_cache_free();
3300 \endcode
3301
3302 \sa wc_ecc_curve_cache_init
3303*/
3304void wc_ecc_curve_cache_free(void);
3305
3306/*!
3307 \ingroup ECC
3308 \brief Generates random k value.
3309
3310 \return 0 on success
3311 \return negative on error
3312
3313 \param rng Random number generator
3314 \param size Key size
3315 \param k Output k value
3316 \param order Curve order
3317
3318 _Example_
3319 \code
3320 WC_RNG rng;
3321 mp_int k, order;
3322 int ret = wc_ecc_gen_k(&rng, 32, &k, &order);
3323 \endcode
3324
3325 \sa wc_ecc_sign_hash
3326*/
3327int wc_ecc_gen_k(WC_RNG* rng, int size, mp_int* k, mp_int* order);
3328
3329/*!
3330 \ingroup ECC
3331 \brief Sets remote handle for hardware.
3332
3333 \return 0 on success
3334 \return negative on error
3335
3336 \param key ECC key
3337 \param handle Remote handle
3338
3339 _Example_
3340 \code
3341 ecc_key key;
3342 remote_handle64 handle = 0x1234;
3343 int ret = wc_ecc_set_handle(&key, handle);
3344 \endcode
3345
3346 \sa wc_ecc_init
3347*/
3348int wc_ecc_set_handle(ecc_key* key, remote_handle64 handle);
3349
3350/*!
3351 \ingroup ECC
3352 \brief Uses key ID for hardware.
3353
3354 \return 0 on success
3355 \return negative on error
3356
3357 \param key ECC key
3358 \param keyId Key identifier
3359 \param flags Flags
3360
3361 _Example_
3362 \code
3363 ecc_key key;
3364 int ret = wc_ecc_use_key_id(&key, 1, 0);
3365 \endcode
3366
3367 \sa wc_ecc_get_key_id
3368*/
3369int wc_ecc_use_key_id(ecc_key* key, word32 keyId, word32 flags);
3370
3371/*!
3372 \ingroup ECC
3373 \brief Gets key ID from hardware key.
3374
3375 \return 0 on success
3376 \return negative on error
3377
3378 \param key ECC key
3379 \param keyId Key identifier pointer
3380
3381 _Example_
3382 \code
3383 ecc_key key;
3384 word32 keyId;
3385 int ret = wc_ecc_get_key_id(&key, &keyId);
3386 \endcode
3387
3388 \sa wc_ecc_use_key_id
3389*/
3390int wc_ecc_get_key_id(ecc_key* key, word32* keyId);