| /src/crypto/external/apache2/openssl/dist/test/recipes/30-test_evp_data/ |
| evppkey_ecx_sigalg.txt | 153 Title = ED448 tests from RFC8032 155 PrivateKey=ED448-1 161 PrivateKey=ED448-2 167 PrivateKey=ED448-3 173 PrivateKey=ED448-4 179 PrivateKey=ED448-5 185 PrivateKey=ED448-6 191 PrivateKey=ED448-7 197 PrivateKey=ED448-8 203 PublicKey=ED448-1-PUBLI [all...] |
| evppkey_ecx.txt | 341 Title = ED448 tests from RFC8032 343 PrivateKey=ED448-1 349 PrivateKey=ED448-2 355 PrivateKey=ED448-3 361 PrivateKey=ED448-4 367 PrivateKey=ED448-5 373 PrivateKey=ED448-6 379 PrivateKey=ED448-7 385 PrivateKey=ED448-8 391 PublicKey=ED448-1-PUBLI [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/ |
| 28-seclevel.conf | 6 test-1 = 1-SECLEVEL 4 with ED448 key 7 test-2 = 2-SECLEVEL 5 server with ED448 key 8 test-3 = 3-SECLEVEL 5 client with ED448 key 10 test-5 = 5-SECLEVEL 3 with ED448 key, TLSv1.2 36 [1-SECLEVEL 4 with ED448 key] 37 ssl_conf = 1-SECLEVEL 4 with ED448 key-ssl 39 [1-SECLEVEL 4 with ED448 key-ssl] 40 server = 1-SECLEVEL 4 with ED448 key-server 41 client = 1-SECLEVEL 4 with ED448 key-client 43 [1-SECLEVEL 4 with ED448 key-server [all...] |
| /src/crypto/external/bsd/openssl/dist/test/recipes/30-test_evp_data/ |
| evppkey_ecx.txt | 315 Title = ED448 tests from RFC8032 317 PrivateKey=ED448-1 323 PrivateKey=ED448-2 329 PrivateKey=ED448-3 335 PrivateKey=ED448-4 341 PrivateKey=ED448-5 347 PrivateKey=ED448-6 353 PrivateKey=ED448-7 359 PrivateKey=ED448-8 365 PublicKey=ED448-1-PUBLI [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/eddsa/ns1/ |
| sign.sh | 34 zsk448=$($KEYGEN -q -a ED448 -n zone "$zone") 35 ksk448=$($KEYGEN -q -a ED448 -n zone -f KSK "$zone")
|
| /src/external/mpl/bind/dist/bin/tests/system/isctest/vars/ |
| algorithms.py | 81 ED448 = Algorithm("ED448", 16, 456) 90 ED448, 104 ED448,
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/signature/ |
| eddsa_sig.c | 214 if (S390X_CAN_SIGN(ED448)) { 262 if (S390X_CAN_SIGN(ED448)) 404 } ed448; member in union:__anon1627 409 memcpy(param.ed448.priv + 64 - 57, edkey->privkey, 57); 411 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED448, ¶m.ed448, tbs, tbslen); 412 OPENSSL_cleanse(param.ed448.priv, sizeof(param.ed448.priv)); 416 s390x_flip_endian64(param.ed448.sig, param.ed448.sig); 417 s390x_flip_endian64(param.ed448.sig + 64, param.ed448.sig + 64) 453 } ed448; member in union:__anon1631 [all...] |
| /src/crypto/external/apache2/openssl/dist/test/ |
| endecode_test.c | 1034 * ED25519, ED448, X25519 and X448 have no support for 1039 KEYS(ED448); 1040 IMPLEMENT_TEST_SUITE(ED448, "ED448", 1) 1500 MAKE_KEYS(ED448, "ED448", NULL); 1586 ADD_TEST_SUITE(ED448); 1590 * ED25519, ED448, X25519 and X448 have no support for 1680 FREE_KEYS(ED448);
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| endecode_test.c | 1037 KEYS(ED448); 1038 IMPLEMENT_TEST_SUITE(ED448, "ED448", 1) 1044 * ED25519, ED448, X25519 and X448 have no support for 1392 MAKE_KEYS(ED448, "ED448", NULL); 1444 ADD_TEST_SUITE(ED448); 1448 * ED25519, ED448, X25519 and X448 have no support for 1504 FREE_KEYS(ED448);
|
| /src/crypto/external/bsd/openssl.old/dist/test/certs/ |
| setup.sh | 404 OPENSSL_SIGALG=ED448 OPENSSL_KEYALG=ed448 ./mkcert.sh genroot "Root Ed448" \ 405 root-ed448-key root-ed448-cert 406 OPENSSL_SIGALG=ED448 OPENSSL_KEYALG=ed448 ./mkcert.sh genee ed448 \ 407 server-ed448-key server-ed448-cert root-ed448-key root-ed448-cer [all...] |
| /src/crypto/external/apache2/openssl/dist/providers/implementations/signature/ |
| eddsa_sig.c | 59 #define SN_Ed448 "Ed448" 96 Ed448 114 being 1, i.e., the input is hashed before signing with Ed448 with a 367 * This supports using ED448 with EVP_PKEY_{sign,verify}_init_ex() and 523 if (S390X_CAN_SIGN(ED448) 645 if (S390X_CAN_SIGN(ED448) 789 static const char *keytypes[] = { "ED448", NULL }; 937 * Ed448 can be used with: 1050 IMPL_EDDSA_DISPATCH(ed448, ed448); 1088 } ed448; member in union:__anon586 1140 } ed448; member in union:__anon590 [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/recipes/30-test_evp_data/ |
| evppkey.txt | 17612 Title = ED448 tests from RFC8032 17614 PrivateKey=ED448-1 17620 PrivateKey=ED448-2 17626 PrivateKey=ED448-3 17632 PrivateKey=ED448-4 17638 PrivateKey=ED448-5 17644 PrivateKey=ED448-6 17650 PrivateKey=ED448-7 17656 PrivateKey=ED448-8 17662 PublicKey=ED448-1-PUBLI [all...] |
| /src/crypto/external/apache2/openssl/dist/test/certs/ |
| setup.sh | 471 OPENSSL_SIGALG= OPENSSL_KEYALG=ed448 ./mkcert.sh genroot "Root Ed448" \ 472 root-ed448-key root-ed448-cert 473 OPENSSL_SIGALG=ED448 OPENSSL_KEYALG=ed448 ./mkcert.sh genee ed448 \ 474 server-ed448-key server-ed448-cert root-ed448-key root-ed448-cer [all...] |
| /src/crypto/external/bsd/openssl/dist/test/certs/ |
| setup.sh | 430 OPENSSL_SIGALG= OPENSSL_KEYALG=ed448 ./mkcert.sh genroot "Root Ed448" \ 431 root-ed448-key root-ed448-cert 432 OPENSSL_SIGALG=ED448 OPENSSL_KEYALG=ed448 ./mkcert.sh genee ed448 \ 433 server-ed448-key server-ed448-cert root-ed448-key root-ed448-cer [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/evp/ |
| p_lib.c | 948 IMPLEMENT_ECX_VARIANT(ED448) 1061 { EVP_PKEY_ED448, "ED448" },
|
| /src/crypto/external/bsd/openssl/dist/crypto/evp/ |
| p_lib.c | 904 IMPLEMENT_ECX_VARIANT(ED448) 1012 { EVP_PKEY_ED448, "ED448" },
|
| /src/external/bsd/unbound/dist/ |
| configure | 1628 --disable-ed448 Disable ED448 support 22957 # Check whether --enable-ed448 was given. 22987 e) if test "x$enable_ed448" = "xyes"; then as_fn_error $? "OpenSSL does not support ED448 and you used --enable-ed448." "$LINENO" 5
|