HomeSort by: relevance | last modified time | path
    Searched refs:sm2 (Results 1 - 23 of 23) sorted by relevancy

  /src/crypto/external/apache2/openssl/dist/test/recipes/
15-test_gensm2.t 17 # These are special key generation tests for SM2 keys specifically,
23 plan skip_all => "This test is unsupported in a no-sm2 build"
24 if disabled("sm2");
29 # generating an EC key with the named SM2 curve or generating
30 # an SM2 key should end up with the same encoding (apart from
40 .*?\Qprim: OBJECT :sm2\E\R
46 '-pkeyopt', 'ec_paramgen_curve:SM2',
48 my $cmd_gensm2 = app([ 'openssl', 'genpkey', '-algorithm', 'SM2' ]);
55 "Check that 'genpkey -algorithm EC' resulted in a correctly encoded SM2 key");
61 "Check that 'genpkey -algorithm SM2' resulted in a correctly encoded SM2 key")
    [all...]
15-test_ecparam.t 29 if (disabled("sm2")) {
30 @valid = grep { !/sm2-.*\.pem/} @valid;
  /src/crypto/external/bsd/openssl/dist/test/recipes/
15-test_gensm2.t 17 # These are special key generation tests for SM2 keys specifically,
23 plan skip_all => "This test is unsupported in a no-sm2 build"
24 if disabled("sm2");
29 # generating an EC key with the named SM2 curve or generating
30 # an SM2 key should end up with the same encoding (apart from
40 .*?\Qprim: OBJECT :sm2\E\R
46 '-pkeyopt', 'ec_paramgen_curve:SM2',
48 my $cmd_gensm2 = app([ 'openssl', 'genpkey', '-algorithm', 'SM2' ]);
55 "Check that 'genpkey -algorithm EC' resulted in a correctly encoded SM2 key");
61 "Check that 'genpkey -algorithm SM2' resulted in a correctly encoded SM2 key")
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/recipes/30-test_evp_data/
evppkey_sm2.txt 19 Title = SM2 tests
66 Output = "Some longer plaintext for testing SM2 decryption. Blah blah blah blah blah blah blah blah blah blah blah blah blah."
68 # This is a "fake" test as it does only verify that the SM2 EVP_PKEY interface
78 Title = SM2 key generation tests
80 KeyGen = SM2
83 KeyGen = SM2
84 Ctrl = group:sm2
  /src/crypto/external/apache2/openssl/dist/test/recipes/30-test_evp_data/
evppkey_sm2.txt 19 Title = SM2 tests
66 Output = "Some longer plaintext for testing SM2 decryption. Blah blah blah blah blah blah blah blah blah blah blah blah blah."
68 # This is a "fake" test as it does only verify that the SM2 EVP_PKEY interface
78 Title = SM2 key generation tests
80 KeyGen = SM2
83 KeyGen = SM2
84 Ctrl = group:sm2
  /src/crypto/external/apache2/openssl/dist/providers/implementations/encode_decode/
encode_key2blob.c 177 MAKE_BLOB_ENCODER(sm2, ec, PUBLIC_KEY);
encode_key2any.c 764 * Albeit SM2 is a slightly different algorithm than ECDSA, the key type
768 * This leaves the distinction of SM2 keys to the EC group (which is found
772 #define sm2_pem_type "SM2"
1480 MAKE_ENCODER(sm2, ec, type_specific_no_pub, der);
1499 MAKE_ENCODER(sm2, ec, type_specific_no_pub, pem);
1553 MAKE_ENCODER(sm2, ec, EncryptedPrivateKeyInfo, der);
1554 MAKE_ENCODER(sm2, ec, EncryptedPrivateKeyInfo, pem);
1555 MAKE_ENCODER(sm2, ec, PrivateKeyInfo, der);
1556 MAKE_ENCODER(sm2, ec, PrivateKeyInfo, pem);
1557 MAKE_ENCODER(sm2, ec, SubjectPublicKeyInfo, der)
    [all...]
decode_der2key.c 143 /* Allow decoding sm2 private key with id_ecPublicKey */
352 "SM2", 0);
484 int sm2 = (EC_KEY_get_flags(key) & EC_FLAG_SM2_RANGE) != 0; local
486 if (sm2)
1250 MAKE_DECODER("SM2", sm2, ec, PrivateKeyInfo);
1251 MAKE_DECODER("SM2", sm2, ec, SubjectPublicKeyInfo);
1252 MAKE_DECODER("SM2", sm2, sm2, type_specific_no_pub)
    [all...]
encode_key2text.c 708 MAKE_TEXT_ENCODER(sm2, ec);
  /src/crypto/external/bsd/openssl/dist/providers/implementations/encode_decode/
encode_key2blob.c 177 MAKE_BLOB_ENCODER(sm2, ec, PUBLIC_KEY);
encode_key2any.c 744 * Albeit SM2 is a slightly different algorithm than ECDSA, the key type
748 * This leaves the distinction of SM2 keys to the EC group (which is found
752 # define sm2_input_type "SM2"
753 # define sm2_pem_type "SM2"
1327 MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, type_specific_no_pub, der);
1346 MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, type_specific_no_pub, pem);
1400 MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, EncryptedPrivateKeyInfo, der);
1401 MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, EncryptedPrivateKeyInfo, pem);
1402 MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, PrivateKeyInfo, der);
1403 MAKE_ENCODER(sm2, ec, EVP_PKEY_EC, PrivateKeyInfo, pem)
    [all...]
decode_der2key.c 112 /* Allow decoding sm2 private key with id_ecPublicKey */
299 "SM2", 0);
426 int sm2 = (EC_KEY_get_flags(key) & EC_FLAG_SM2_RANGE) != 0; local
428 if (sm2)
807 MAKE_DECODER("SM2", sm2, ec, PrivateKeyInfo);
808 MAKE_DECODER("SM2", sm2, ec, SubjectPublicKeyInfo);
encode_key2text.c 562 # define sm2_input_type "SM2"
869 MAKE_TEXT_ENCODER(sm2, ec);
  /src/sys/altq/
altq_hfsc.h 206 u_int64_t sm2; /* scaled slope of the 2nd segment */ member in struct:internal_sc
218 u_int64_t sm2; /* scaled slope of the 2nd segment */ member in struct:runtime_sc
altq_hfsc.c 939 if (cl->cl_rsc->sm1 <= cl->cl_rsc->sm2) {
1484 isc->sm2 = m2sm(sc->m2);
1502 rtsc->sm2 = isc->sm2;
1544 + seg_x2y(x - rtsc->x - rtsc->dx, rtsc->sm2);
1558 if (isc->sm1 <= isc->sm2) {
1595 * seg_x2y(dx, sm1) == seg_x2y(dx, sm2) + (y1 - y)
1597 dx = ((y1 - y) << SM_SHIFT) / (isc->sm1 - isc->sm2);
1622 sp->rsc.m2 = sm2m(cl->cl_rsc->sm2);
1631 sp->fsc.m2 = sm2m(cl->cl_fsc->sm2);
    [all...]
  /src/crypto/external/apache2/openssl/dist/providers/implementations/keymgmt/
ec_kmgmt.c 35 #include "crypto/sm2.h"
99 return "SM2";
376 * sm2_wanted: import the keys or domparams only on SM2 Curve
377 * !sm2_wanted: import the keys or domparams only not on SM2 Curve
619 static int common_get_params(void *key, OSSL_PARAM params[], int sm2)
698 if (!sm2) {
708 /* SM2 doesn't support this PARAM */
709 if (!sm2) {
1001 if ((gctx->group_name = OPENSSL_strdup("sm2")) != NULL)
  /src/crypto/external/bsd/openssl/dist/providers/implementations/keymgmt/
ec_kmgmt.c 32 # include "crypto/sm2.h"
96 return "SM2";
380 * sm2_wanted: import the keys or domparams only on SM2 Curve
381 * !sm2_wanted: import the keys or domparams only not on SM2 Curve
636 int common_get_params(void *key, OSSL_PARAM params[], int sm2)
715 if (!sm2) {
725 /* SM2 doesn't support this PARAM */
726 if (!sm2) {
1025 if ((gctx->group_name = OPENSSL_strdup("sm2")) != NULL)
  /src/crypto/external/apache2/openssl/dist/crypto/ec/
ec_key.c 310 int sm2 = EC_KEY_get_flags(eckey) & EC_FLAG_SM2_RANGE ? 1 : 0; local
341 /* range of SM2 private key is [1, n-1) */
342 if (sm2) {
  /src/crypto/external/bsd/openssl/dist/crypto/ec/
ec_key.c 260 int sm2 = EC_KEY_get_flags(eckey) & EC_FLAG_SM2_RANGE ? 1 : 0; local
291 /* range of SM2 private key is [1, n-1) */
292 if (sm2) {
  /src/crypto/external/bsd/openssl.old/dist/
config 862 for i in aes aria bf camellia cast des dh dsa ec hmac idea md2 md5 mdc2 rc2 rc4 rc5 ripemd rsa seed sha sm2 sm3 sm4
  /src/crypto/external/bsd/openssl/dist/apps/
speed.c 96 int sm2; member in struct:openssl_speed_sec_st
1166 BIO_printf(bio_err, "SM2 init sign failure\n");
1174 BIO_printf(bio_err, "SM2 sign failure\n");
1199 BIO_printf(bio_err, "SM2 verify init failure\n");
1207 BIO_printf(bio_err, "SM2 verify failure\n");
1569 /* SM2 */
1715 = seconds.sm2 = seconds.ffdh = atoi(opt_arg());
1823 if (strcmp(algo, "sm2") == 0) {
3091 BIO_printf(bio_err, "SM2 init failure.\n");
3096 /* Perform SM2 signature test *
    [all...]
  /src/crypto/external/apache2/openssl/dist/apps/
speed.c 111 int sm2; member in struct:openssl_speed_sec_st
1435 BIO_printf(bio_err, "SM2 init sign failure\n");
1443 BIO_printf(bio_err, "SM2 sign failure\n");
1468 BIO_printf(bio_err, "SM2 verify init failure\n");
1476 BIO_printf(bio_err, "SM2 verify failure\n");
2085 /* SM2 */
2249 = seconds.sm2 = seconds.ffdh
2360 else if (strncmp(sig_name, "RSA", 3) && strncmp(sig_name, "DSA", 3) && strncmp(sig_name, "ED25519", 7) && strncmp(sig_name, "ED448", 5) && strncmp(sig_name, "ECDSA", 5) && strcmp(sig_name, "HMAC") && strcmp(sig_name, "SIPHASH") && strcmp(sig_name, "POLY1305") && strcmp(sig_name, "CMAC") && strcmp(sig_name, "SM2")) { /* skip alg */
2474 if (strcmp(algo, "sm2") == 0) {
3868 BIO_printf(bio_err, "SM2 init failure.\n")
    [all...]
  /src/crypto/external/apache2/openssl/dist/
Configure 332 'sm2', 'sm3', 'sm4') ) {
528 "sm2",
529 "sm2-precomp",
655 "ec" => [ qw(ec2m ecdsa ecdh sm2 gost ecx tls-deprecated-ec) ],
699 "sm3" => [ "sm2" ],

Completed in 56 milliseconds