HomeSort by: relevance | last modified time | path
    Searched refs:ED448 (Results 1 - 17 of 17) sorted by relevancy

  /src/crypto/external/apache2/openssl/dist/test/recipes/30-test_evp_data/
evppkey_ecx_sigalg.txt 153 Title = ED448 tests from RFC8032
155 PrivateKey=ED448-1
161 PrivateKey=ED448-2
167 PrivateKey=ED448-3
173 PrivateKey=ED448-4
179 PrivateKey=ED448-5
185 PrivateKey=ED448-6
191 PrivateKey=ED448-7
197 PrivateKey=ED448-8
203 PublicKey=ED448-1-PUBLI
    [all...]
evppkey_ecx.txt 341 Title = ED448 tests from RFC8032
343 PrivateKey=ED448-1
349 PrivateKey=ED448-2
355 PrivateKey=ED448-3
361 PrivateKey=ED448-4
367 PrivateKey=ED448-5
373 PrivateKey=ED448-6
379 PrivateKey=ED448-7
385 PrivateKey=ED448-8
391 PublicKey=ED448-1-PUBLI
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/
28-seclevel.conf 6 test-1 = 1-SECLEVEL 4 with ED448 key
7 test-2 = 2-SECLEVEL 5 server with ED448 key
8 test-3 = 3-SECLEVEL 5 client with ED448 key
10 test-5 = 5-SECLEVEL 3 with ED448 key, TLSv1.2
36 [1-SECLEVEL 4 with ED448 key]
37 ssl_conf = 1-SECLEVEL 4 with ED448 key-ssl
39 [1-SECLEVEL 4 with ED448 key-ssl]
40 server = 1-SECLEVEL 4 with ED448 key-server
41 client = 1-SECLEVEL 4 with ED448 key-client
43 [1-SECLEVEL 4 with ED448 key-server
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/recipes/30-test_evp_data/
evppkey_ecx.txt 315 Title = ED448 tests from RFC8032
317 PrivateKey=ED448-1
323 PrivateKey=ED448-2
329 PrivateKey=ED448-3
335 PrivateKey=ED448-4
341 PrivateKey=ED448-5
347 PrivateKey=ED448-6
353 PrivateKey=ED448-7
359 PrivateKey=ED448-8
365 PublicKey=ED448-1-PUBLI
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/eddsa/ns1/
sign.sh 34 zsk448=$($KEYGEN -q -a ED448 -n zone "$zone")
35 ksk448=$($KEYGEN -q -a ED448 -n zone -f KSK "$zone")
  /src/external/mpl/bind/dist/bin/tests/system/isctest/vars/
algorithms.py 81 ED448 = Algorithm("ED448", 16, 456)
90 ED448,
104 ED448,
  /src/crypto/external/bsd/openssl/dist/providers/implementations/signature/
eddsa_sig.c 214 if (S390X_CAN_SIGN(ED448)) {
262 if (S390X_CAN_SIGN(ED448))
404 } ed448; member in union:__anon1627
409 memcpy(param.ed448.priv + 64 - 57, edkey->privkey, 57);
411 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED448, &param.ed448, tbs, tbslen);
412 OPENSSL_cleanse(param.ed448.priv, sizeof(param.ed448.priv));
416 s390x_flip_endian64(param.ed448.sig, param.ed448.sig);
417 s390x_flip_endian64(param.ed448.sig + 64, param.ed448.sig + 64)
453 } ed448; member in union:__anon1631
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/
endecode_test.c 1034 * ED25519, ED448, X25519 and X448 have no support for
1039 KEYS(ED448);
1040 IMPLEMENT_TEST_SUITE(ED448, "ED448", 1)
1500 MAKE_KEYS(ED448, "ED448", NULL);
1586 ADD_TEST_SUITE(ED448);
1590 * ED25519, ED448, X25519 and X448 have no support for
1680 FREE_KEYS(ED448);
  /src/crypto/external/bsd/openssl/dist/test/
endecode_test.c 1037 KEYS(ED448);
1038 IMPLEMENT_TEST_SUITE(ED448, "ED448", 1)
1044 * ED25519, ED448, X25519 and X448 have no support for
1392 MAKE_KEYS(ED448, "ED448", NULL);
1444 ADD_TEST_SUITE(ED448);
1448 * ED25519, ED448, X25519 and X448 have no support for
1504 FREE_KEYS(ED448);
  /src/crypto/external/bsd/openssl.old/dist/test/certs/
setup.sh 404 OPENSSL_SIGALG=ED448 OPENSSL_KEYALG=ed448 ./mkcert.sh genroot "Root Ed448" \
405 root-ed448-key root-ed448-cert
406 OPENSSL_SIGALG=ED448 OPENSSL_KEYALG=ed448 ./mkcert.sh genee ed448 \
407 server-ed448-key server-ed448-cert root-ed448-key root-ed448-cer
    [all...]
  /src/crypto/external/apache2/openssl/dist/providers/implementations/signature/
eddsa_sig.c 59 #define SN_Ed448 "Ed448"
96 Ed448
114 being 1, i.e., the input is hashed before signing with Ed448 with a
367 * This supports using ED448 with EVP_PKEY_{sign,verify}_init_ex() and
523 if (S390X_CAN_SIGN(ED448)
645 if (S390X_CAN_SIGN(ED448)
789 static const char *keytypes[] = { "ED448", NULL };
937 * Ed448 can be used with:
1050 IMPL_EDDSA_DISPATCH(ed448, ed448);
1088 } ed448; member in union:__anon586
1140 } ed448; member in union:__anon590
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/test/recipes/30-test_evp_data/
evppkey.txt 17612 Title = ED448 tests from RFC8032
17614 PrivateKey=ED448-1
17620 PrivateKey=ED448-2
17626 PrivateKey=ED448-3
17632 PrivateKey=ED448-4
17638 PrivateKey=ED448-5
17644 PrivateKey=ED448-6
17650 PrivateKey=ED448-7
17656 PrivateKey=ED448-8
17662 PublicKey=ED448-1-PUBLI
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/certs/
setup.sh 471 OPENSSL_SIGALG= OPENSSL_KEYALG=ed448 ./mkcert.sh genroot "Root Ed448" \
472 root-ed448-key root-ed448-cert
473 OPENSSL_SIGALG=ED448 OPENSSL_KEYALG=ed448 ./mkcert.sh genee ed448 \
474 server-ed448-key server-ed448-cert root-ed448-key root-ed448-cer
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/certs/
setup.sh 430 OPENSSL_SIGALG= OPENSSL_KEYALG=ed448 ./mkcert.sh genroot "Root Ed448" \
431 root-ed448-key root-ed448-cert
432 OPENSSL_SIGALG=ED448 OPENSSL_KEYALG=ed448 ./mkcert.sh genee ed448 \
433 server-ed448-key server-ed448-cert root-ed448-key root-ed448-cer
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/evp/
p_lib.c 948 IMPLEMENT_ECX_VARIANT(ED448)
1061 { EVP_PKEY_ED448, "ED448" },
  /src/crypto/external/bsd/openssl/dist/crypto/evp/
p_lib.c 904 IMPLEMENT_ECX_VARIANT(ED448)
1012 { EVP_PKEY_ED448, "ED448" },
  /src/external/bsd/unbound/dist/
configure 1628 --disable-ed448 Disable ED448 support
22957 # Check whether --enable-ed448 was given.
22987 e) if test "x$enable_ed448" = "xyes"; then as_fn_error $? "OpenSSL does not support ED448 and you used --enable-ed448." "$LINENO" 5

Completed in 132 milliseconds