HomeSort by: relevance | last modified time | path
    Searched refs:ed448 (Results 1 - 25 of 25) sorted by relevancy

  /src/crypto/external/apache2/openssl/dist/crypto/ec/
ecx_s390x.c 193 } ed448; member in union:__anon212
200 memcpy(param.ed448.x_src, x_src, 57);
201 memcpy(param.ed448.y_src, y_src, 57);
202 memcpy(param.ed448.d_src, d_src, 57);
203 s390x_flip_endian64(param.ed448.x_src, param.ed448.x_src);
204 s390x_flip_endian64(param.ed448.y_src, param.ed448.y_src);
205 s390x_flip_endian64(param.ed448.d_src, param.ed448.d_src)
    [all...]
ecx_meth.c 548 /* Sanity check: make sure it is ED25519/ED448 with absent parameters */
667 "ED448",
668 "OpenSSL ED448 algorithm",
1274 } ed448; member in union:__anon200
1296 memcpy(param.ed448.priv + 64 - 57, edkey->privkey, 57);
1298 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED448, &param.ed448, tbs, tbslen);
1299 OPENSSL_cleanse(param.ed448.priv, sizeof(param.ed448.priv));
1303 s390x_flip_endian64(param.ed448.sig, param.ed448.sig)
1357 } ed448; member in union:__anon204
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/ec/
ecx_s390x.c 193 } ed448; member in union:__anon1324
200 memcpy(param.ed448.x_src, x_src, 57);
201 memcpy(param.ed448.y_src, y_src, 57);
202 memcpy(param.ed448.d_src, d_src, 57);
203 s390x_flip_endian64(param.ed448.x_src, param.ed448.x_src);
204 s390x_flip_endian64(param.ed448.y_src, param.ed448.y_src);
205 s390x_flip_endian64(param.ed448.d_src, param.ed448.d_src)
    [all...]
ecx_meth.c 550 /* Sanity check: make sure it is ED25519/ED448 with absent parameters */
668 "ED448",
669 "OpenSSL ED448 algorithm",
1238 } ed448; member in union:__anon1312
1260 memcpy(param.ed448.priv + 64 - 57, edkey->privkey, 57);
1262 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED448, &param.ed448, tbs, tbslen);
1263 OPENSSL_cleanse(param.ed448.priv, sizeof(param.ed448.priv));
1267 s390x_flip_endian64(param.ed448.sig, param.ed448.sig)
1318 } ed448; member in union:__anon1316
    [all...]
  /src/crypto/external/bsd/openssl/dist/providers/implementations/signature/
eddsa_sig.c 214 if (S390X_CAN_SIGN(ED448)) {
262 if (S390X_CAN_SIGN(ED448))
404 } ed448; member in union:__anon1627
409 memcpy(param.ed448.priv + 64 - 57, edkey->privkey, 57);
411 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED448, &param.ed448, tbs, tbslen);
412 OPENSSL_cleanse(param.ed448.priv, sizeof(param.ed448.priv));
416 s390x_flip_endian64(param.ed448.sig, param.ed448.sig);
417 s390x_flip_endian64(param.ed448.sig + 64, param.ed448.sig + 64)
453 } ed448; member in union:__anon1631
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/
28-seclevel.conf 6 test-1 = 1-SECLEVEL 4 with ED448 key
7 test-2 = 2-SECLEVEL 5 server with ED448 key
8 test-3 = 3-SECLEVEL 5 client with ED448 key
10 test-5 = 5-SECLEVEL 3 with ED448 key, TLSv1.2
36 [1-SECLEVEL 4 with ED448 key]
37 ssl_conf = 1-SECLEVEL 4 with ED448 key-ssl
39 [1-SECLEVEL 4 with ED448 key-ssl]
40 server = 1-SECLEVEL 4 with ED448 key-server
41 client = 1-SECLEVEL 4 with ED448 key-client
43 [1-SECLEVEL 4 with ED448 key-server
    [all...]
20-cert-select.conf 9 test-4 = 4-Ed448 CipherString and Signature Algorithm Selection
15 test-10 = 10-Ed448 CipherString and Curves Selection
38 test-33 = 33-TLS 1.2 Ed448 Client Auth
49 test-44 = 44-TLS 1.3 Ed448 Signature Algorithm Selection
51 test-46 = 46-TLS 1.3 Ed448 CipherString and Groups Selection
56 test-51 = 51-TLS 1.3 Ed448 Client Auth
77 Ed448.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed448-cert.pem
78 Ed448.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pe
    [all...]
  /src/crypto/external/apache2/openssl/dist/providers/implementations/signature/
eddsa_sig.c 59 #define SN_Ed448 "Ed448"
96 Ed448
114 being 1, i.e., the input is hashed before signing with Ed448 with a
367 * This supports using ED448 with EVP_PKEY_{sign,verify}_init_ex() and
523 if (S390X_CAN_SIGN(ED448)
645 if (S390X_CAN_SIGN(ED448)
789 static const char *keytypes[] = { "ED448", NULL };
937 * Ed448 can be used with:
1050 IMPL_EDDSA_DISPATCH(ed448, ed448);
1088 } ed448; member in union:__anon586
1140 } ed448; member in union:__anon590
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/test/certs/
setup.sh 404 OPENSSL_SIGALG=ED448 OPENSSL_KEYALG=ed448 ./mkcert.sh genroot "Root Ed448" \
405 root-ed448-key root-ed448-cert
406 OPENSSL_SIGALG=ED448 OPENSSL_KEYALG=ed448 ./mkcert.sh genee ed448 \
407 server-ed448-key server-ed448-cert root-ed448-key root-ed448-cer
    [all...]
mkcert.sh 58 ed448) ;;
  /src/crypto/external/apache2/openssl/dist/test/certs/
setup.sh 471 OPENSSL_SIGALG= OPENSSL_KEYALG=ed448 ./mkcert.sh genroot "Root Ed448" \
472 root-ed448-key root-ed448-cert
473 OPENSSL_SIGALG=ED448 OPENSSL_KEYALG=ed448 ./mkcert.sh genee ed448 \
474 server-ed448-key server-ed448-cert root-ed448-key root-ed448-cer
    [all...]
mkcert.sh 58 ed448) ;;
  /src/crypto/external/bsd/openssl/dist/test/certs/
setup.sh 430 OPENSSL_SIGALG= OPENSSL_KEYALG=ed448 ./mkcert.sh genroot "Root Ed448" \
431 root-ed448-key root-ed448-cert
432 OPENSSL_SIGALG=ED448 OPENSSL_KEYALG=ed448 ./mkcert.sh genee ed448 \
433 server-ed448-key server-ed448-cert root-ed448-key root-ed448-cer
    [all...]
mkcert.sh 58 ed448) ;;
  /src/external/ibm-public/postfix/dist/src/tls/
mkcert.sh 60 ed448) ;;
  /src/crypto/external/bsd/openssl/dist/providers/implementations/encode_decode/
encode_key2any.c 809 * ED25519, ED448, X25519 and X448 only has PKCS#8 / SubjectPublicKeyInfo
820 # define ed448_input_type "ED448"
824 # define ed448_pem_type "ED448"
1231 * the key type. For example, ed25519, ed448, x25519 and x448
1413 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, EncryptedPrivateKeyInfo, der);
1414 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, EncryptedPrivateKeyInfo, pem);
1415 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, PrivateKeyInfo, der);
1416 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, PrivateKeyInfo, pem);
1417 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, SubjectPublicKeyInfo, der);
1418 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, SubjectPublicKeyInfo, pem)
    [all...]
decode_der2key.c 443 * ED25519, ED448, X25519, X448 only implement PKCS#8 and SubjectPublicKeyInfo,
738 * as keytype. For example, the key types ed25519, ed448,
804 MAKE_DECODER("ED448", ed448, ecx, PrivateKeyInfo);
805 MAKE_DECODER("ED448", ed448, ecx, SubjectPublicKeyInfo);
encode_key2text.c 590 type_label = "ED448";
622 # define ed448_input_type "ED448"
872 MAKE_TEXT_ENCODER(ed448, ecx);
  /src/crypto/external/apache2/openssl/dist/providers/implementations/encode_decode/
encode_key2any.c 828 * ED25519, ED448, X25519 and X448 only has PKCS#8 / SubjectPublicKeyInfo
839 #define ed448_pem_type "ED448"
1387 * the key type. For example, ed25519, ed448, x25519 and x448
1567 MAKE_ENCODER(ed448, ecx, EncryptedPrivateKeyInfo, der);
1568 MAKE_ENCODER(ed448, ecx, EncryptedPrivateKeyInfo, pem);
1569 MAKE_ENCODER(ed448, ecx, PrivateKeyInfo, der);
1570 MAKE_ENCODER(ed448, ecx, PrivateKeyInfo, pem);
1571 MAKE_ENCODER(ed448, ecx, SubjectPublicKeyInfo, der);
1572 MAKE_ENCODER(ed448, ecx, SubjectPublicKeyInfo, pem);
1690 * ED25519, ED448, X25519 or X448, and they therefore only have PKCS#
    [all...]
decode_der2key.c 502 * ED25519, ED448, X25519, X448 only implement PKCS#8 and SubjectPublicKeyInfo,
514 D2I_PUBKEY_NOCTX(ed448, ossl_d2i_ED448_PUBKEY)
1175 * as keytype. For example, the key types ed25519, ed448,
1246 MAKE_DECODER("ED448", ed448, ecx, PrivateKeyInfo);
1247 MAKE_DECODER("ED448", ed448, ecx, SubjectPublicKeyInfo);
encode_key2text.c 408 type_label = "ED448";
712 MAKE_TEXT_ENCODER(ed448, ecx);
  /src/crypto/external/bsd/openssl/dist/providers/implementations/keymgmt/
ecx_kmgmt.c 826 MAKE_KEYMGMT_FUNCTIONS(ed448)
  /src/external/mpl/bind/dist/bin/tests/system/kasp/ns3/
setup.sh 86 setup "ed448.kasp"
88 cat ed448.conf >>named.conf
  /src/crypto/external/apache2/openssl/dist/providers/implementations/keymgmt/
ecx_kmgmt.c 515 /* X25519/X448 are not FIPS approved, (ED25519/ED448 are approved) */
1039 MAKE_KEYMGMT_FUNCTIONS(ed448)
  /src/external/bsd/unbound/dist/
configure 1628 --disable-ed448 Disable ED448 support
22957 # Check whether --enable-ed448 was given.
22987 e) if test "x$enable_ed448" = "xyes"; then as_fn_error $? "OpenSSL does not support ED448 and you used --enable-ed448." "$LINENO" 5

Completed in 94 milliseconds