| /src/crypto/external/apache2/openssl/dist/test/recipes/ |
| 15-test_gensm2.t | 17 # These are special key generation tests for SM2 keys specifically, 23 plan skip_all => "This test is unsupported in a no-sm2 build" 24 if disabled("sm2"); 29 # generating an EC key with the named SM2 curve or generating 30 # an SM2 key should end up with the same encoding (apart from 40 .*?\Qprim: OBJECT :sm2\E\R 46 '-pkeyopt', 'ec_paramgen_curve:SM2', 48 my $cmd_gensm2 = app([ 'openssl', 'genpkey', '-algorithm', 'SM2' ]); 55 "Check that 'genpkey -algorithm EC' resulted in a correctly encoded SM2 key"); 61 "Check that 'genpkey -algorithm SM2' resulted in a correctly encoded SM2 key") [all...] |
| 15-test_ecparam.t | 29 if (disabled("sm2")) { 30 @valid = grep { !/sm2-.*\.pem/} @valid;
|
| /src/crypto/external/bsd/openssl/dist/test/recipes/ |
| 15-test_gensm2.t | 17 # These are special key generation tests for SM2 keys specifically, 23 plan skip_all => "This test is unsupported in a no-sm2 build" 24 if disabled("sm2"); 29 # generating an EC key with the named SM2 curve or generating 30 # an SM2 key should end up with the same encoding (apart from 40 .*?\Qprim: OBJECT :sm2\E\R 46 '-pkeyopt', 'ec_paramgen_curve:SM2', 48 my $cmd_gensm2 = app([ 'openssl', 'genpkey', '-algorithm', 'SM2' ]); 55 "Check that 'genpkey -algorithm EC' resulted in a correctly encoded SM2 key"); 61 "Check that 'genpkey -algorithm SM2' resulted in a correctly encoded SM2 key") [all...] |
| /src/crypto/external/bsd/openssl/dist/test/recipes/30-test_evp_data/ |
| evppkey_sm2.txt | 19 Title = SM2 tests 66 Output = "Some longer plaintext for testing SM2 decryption. Blah blah blah blah blah blah blah blah blah blah blah blah blah." 68 # This is a "fake" test as it does only verify that the SM2 EVP_PKEY interface 78 Title = SM2 key generation tests 80 KeyGen = SM2 83 KeyGen = SM2 84 Ctrl = group:sm2
|
| /src/crypto/external/apache2/openssl/dist/test/recipes/30-test_evp_data/ |
| evppkey_sm2.txt | 19 Title = SM2 tests 66 Output = "Some longer plaintext for testing SM2 decryption. Blah blah blah blah blah blah blah blah blah blah blah blah blah." 68 # This is a "fake" test as it does only verify that the SM2 EVP_PKEY interface 78 Title = SM2 key generation tests 80 KeyGen = SM2 83 KeyGen = SM2 84 Ctrl = group:sm2
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/encode_decode/ |
| encode_key2blob.c | 177 MAKE_BLOB_ENCODER(sm2, ec, PUBLIC_KEY);
|
| encode_key2any.c | 764 * Albeit SM2 is a slightly different algorithm than ECDSA, the key type 768 * This leaves the distinction of SM2 keys to the EC group (which is found 772 #define sm2_pem_type "SM2" 1480 MAKE_ENCODER(sm2, ec, type_specific_no_pub, der); 1499 MAKE_ENCODER(sm2, ec, type_specific_no_pub, pem); 1553 MAKE_ENCODER(sm2, ec, EncryptedPrivateKeyInfo, der); 1554 MAKE_ENCODER(sm2, ec, EncryptedPrivateKeyInfo, pem); 1555 MAKE_ENCODER(sm2, ec, PrivateKeyInfo, der); 1556 MAKE_ENCODER(sm2, ec, PrivateKeyInfo, pem); 1557 MAKE_ENCODER(sm2, ec, SubjectPublicKeyInfo, der) [all...] |
| decode_der2key.c | 143 /* Allow decoding sm2 private key with id_ecPublicKey */ 352 "SM2", 0); 484 int sm2 = (EC_KEY_get_flags(key) & EC_FLAG_SM2_RANGE) != 0; local 486 if (sm2) 1250 MAKE_DECODER("SM2", sm2, ec, PrivateKeyInfo); 1251 MAKE_DECODER("SM2", sm2, ec, SubjectPublicKeyInfo); 1252 MAKE_DECODER("SM2", sm2, sm2, type_specific_no_pub) [all...] |
| encode_key2text.c | 708 MAKE_TEXT_ENCODER(sm2, ec);
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/encode_decode/ |
| encode_key2blob.c | 177 MAKE_BLOB_ENCODER(sm2, ec, PUBLIC_KEY);
|
| encode_key2any.c | 744 * Albeit SM2 is a slightly different algorithm than ECDSA, the key type 748 * This leaves the distinction of SM2 keys to the EC group (which is found 752 # define sm2_input_type "SM2" 753 # define sm2_pem_type "SM2" 1327 MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, type_specific_no_pub, der); 1346 MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, type_specific_no_pub, pem); 1400 MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, EncryptedPrivateKeyInfo, der); 1401 MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, EncryptedPrivateKeyInfo, pem); 1402 MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, PrivateKeyInfo, der); 1403 MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, PrivateKeyInfo, pem) [all...] |
| decode_der2key.c | 112 /* Allow decoding sm2 private key with id_ecPublicKey */ 299 "SM2", 0); 426 int sm2 = (EC_KEY_get_flags(key) & EC_FLAG_SM2_RANGE) != 0; local 428 if (sm2) 807 MAKE_DECODER("SM2", sm2, ec, PrivateKeyInfo); 808 MAKE_DECODER("SM2", sm2, ec, SubjectPublicKeyInfo);
|
| encode_key2text.c | 562 # define sm2_input_type "SM2" 869 MAKE_TEXT_ENCODER(sm2, ec);
|
| /src/sys/altq/ |
| altq_hfsc.h | 206 u_int64_t sm2; /* scaled slope of the 2nd segment */ member in struct:internal_sc 218 u_int64_t sm2; /* scaled slope of the 2nd segment */ member in struct:runtime_sc
|
| altq_hfsc.c | 939 if (cl->cl_rsc->sm1 <= cl->cl_rsc->sm2) { 1484 isc->sm2 = m2sm(sc->m2); 1502 rtsc->sm2 = isc->sm2; 1544 + seg_x2y(x - rtsc->x - rtsc->dx, rtsc->sm2); 1558 if (isc->sm1 <= isc->sm2) { 1595 * seg_x2y(dx, sm1) == seg_x2y(dx, sm2) + (y1 - y) 1597 dx = ((y1 - y) << SM_SHIFT) / (isc->sm1 - isc->sm2); 1622 sp->rsc.m2 = sm2m(cl->cl_rsc->sm2); 1631 sp->fsc.m2 = sm2m(cl->cl_fsc->sm2); [all...] |
| /src/crypto/external/apache2/openssl/dist/providers/implementations/keymgmt/ |
| ec_kmgmt.c | 35 #include "crypto/sm2.h" 99 return "SM2"; 376 * sm2_wanted: import the keys or domparams only on SM2 Curve 377 * !sm2_wanted: import the keys or domparams only not on SM2 Curve 619 static int common_get_params(void *key, OSSL_PARAM params[], int sm2) 698 if (!sm2) { 708 /* SM2 doesn't support this PARAM */ 709 if (!sm2) { 1001 if ((gctx->group_name = OPENSSL_strdup("sm2")) != NULL)
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/keymgmt/ |
| ec_kmgmt.c | 32 # include "crypto/sm2.h" 96 return "SM2"; 380 * sm2_wanted: import the keys or domparams only on SM2 Curve 381 * !sm2_wanted: import the keys or domparams only not on SM2 Curve 636 int common_get_params(void *key, OSSL_PARAM params[], int sm2) 715 if (!sm2) { 725 /* SM2 doesn't support this PARAM */ 726 if (!sm2) { 1025 if ((gctx->group_name = OPENSSL_strdup("sm2")) != NULL)
|
| /src/crypto/external/apache2/openssl/dist/crypto/ec/ |
| ec_key.c | 310 int sm2 = EC_KEY_get_flags(eckey) & EC_FLAG_SM2_RANGE ? 1 : 0; local 341 /* range of SM2 private key is [1, n-1) */ 342 if (sm2) {
|
| /src/crypto/external/bsd/openssl/dist/crypto/ec/ |
| ec_key.c | 260 int sm2 = EC_KEY_get_flags(eckey) & EC_FLAG_SM2_RANGE ? 1 : 0; local 291 /* range of SM2 private key is [1, n-1) */ 292 if (sm2) {
|
| /src/crypto/external/bsd/openssl.old/dist/ |
| config | 862 for i in aes aria bf camellia cast des dh dsa ec hmac idea md2 md5 mdc2 rc2 rc4 rc5 ripemd rsa seed sha sm2 sm3 sm4
|
| /src/crypto/external/bsd/openssl/dist/apps/ |
| speed.c | 96 int sm2; member in struct:openssl_speed_sec_st 1166 BIO_printf(bio_err, "SM2 init sign failure\n"); 1174 BIO_printf(bio_err, "SM2 sign failure\n"); 1199 BIO_printf(bio_err, "SM2 verify init failure\n"); 1207 BIO_printf(bio_err, "SM2 verify failure\n"); 1569 /* SM2 */ 1715 = seconds.sm2 = seconds.ffdh = atoi(opt_arg()); 1823 if (strcmp(algo, "sm2") == 0) { 3091 BIO_printf(bio_err, "SM2 init failure.\n"); 3096 /* Perform SM2 signature test * [all...] |
| /src/crypto/external/apache2/openssl/dist/apps/ |
| speed.c | 111 int sm2; member in struct:openssl_speed_sec_st 1435 BIO_printf(bio_err, "SM2 init sign failure\n"); 1443 BIO_printf(bio_err, "SM2 sign failure\n"); 1468 BIO_printf(bio_err, "SM2 verify init failure\n"); 1476 BIO_printf(bio_err, "SM2 verify failure\n"); 2085 /* SM2 */ 2249 = seconds.sm2 = seconds.ffdh 2360 else if (strncmp(sig_name, "RSA", 3) && strncmp(sig_name, "DSA", 3) && strncmp(sig_name, "ED25519", 7) && strncmp(sig_name, "ED448", 5) && strncmp(sig_name, "ECDSA", 5) && strcmp(sig_name, "HMAC") && strcmp(sig_name, "SIPHASH") && strcmp(sig_name, "POLY1305") && strcmp(sig_name, "CMAC") && strcmp(sig_name, "SM2")) { /* skip alg */ 2474 if (strcmp(algo, "sm2") == 0) { 3868 BIO_printf(bio_err, "SM2 init failure.\n") [all...] |
| /src/crypto/external/apache2/openssl/dist/ |
| Configure | 332 'sm2', 'sm3', 'sm4') ) { 528 "sm2", 529 "sm2-precomp", 655 "ec" => [ qw(ec2m ecdsa ecdh sm2 gost ecx tls-deprecated-ec) ], 699 "sm3" => [ "sm2" ],
|