| /src/crypto/external/apache2/openssl/dist/crypto/ec/ |
| ec_key.c | 310 int sm2 = EC_KEY_get_flags(eckey) & EC_FLAG_SM2_RANGE ? 1 : 0; local 341 /* range of SM2 private key is [1, n-1) */ 342 if (sm2) {
|
| /src/crypto/external/bsd/openssl/dist/crypto/ec/ |
| ec_key.c | 260 int sm2 = EC_KEY_get_flags(eckey) & EC_FLAG_SM2_RANGE ? 1 : 0; local 291 /* range of SM2 private key is [1, n-1) */ 292 if (sm2) {
|
| /src/sys/altq/ |
| altq_hfsc.h | 206 u_int64_t sm2; /* scaled slope of the 2nd segment */ member in struct:internal_sc 218 u_int64_t sm2; /* scaled slope of the 2nd segment */ member in struct:runtime_sc
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/encode_decode/ |
| decode_der2key.c | 112 /* Allow decoding sm2 private key with id_ecPublicKey */ 299 "SM2", 0); 426 int sm2 = (EC_KEY_get_flags(key) & EC_FLAG_SM2_RANGE) != 0; local 428 if (sm2) 807 MAKE_DECODER("SM2", sm2, ec, PrivateKeyInfo); 808 MAKE_DECODER("SM2", sm2, ec, SubjectPublicKeyInfo);
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/encode_decode/ |
| decode_der2key.c | 143 /* Allow decoding sm2 private key with id_ecPublicKey */ 352 "SM2", 0); 484 int sm2 = (EC_KEY_get_flags(key) & EC_FLAG_SM2_RANGE) != 0; local 486 if (sm2) 1250 MAKE_DECODER("SM2", sm2, ec, PrivateKeyInfo); 1251 MAKE_DECODER("SM2", sm2, ec, SubjectPublicKeyInfo); 1252 MAKE_DECODER("SM2", sm2, sm2, type_specific_no_pub) [all...] |
| /src/crypto/external/bsd/openssl/dist/apps/ |
| speed.c | 96 int sm2; member in struct:openssl_speed_sec_st 1166 BIO_printf(bio_err, "SM2 init sign failure\n"); 1174 BIO_printf(bio_err, "SM2 sign failure\n"); 1199 BIO_printf(bio_err, "SM2 verify init failure\n"); 1207 BIO_printf(bio_err, "SM2 verify failure\n"); 1569 /* SM2 */ 1715 = seconds.sm2 = seconds.ffdh = atoi(opt_arg()); 1823 if (strcmp(algo, "sm2") == 0) { 3091 BIO_printf(bio_err, "SM2 init failure.\n"); 3096 /* Perform SM2 signature test * [all...] |
| /src/crypto/external/apache2/openssl/dist/apps/ |
| speed.c | 111 int sm2; member in struct:openssl_speed_sec_st 1435 BIO_printf(bio_err, "SM2 init sign failure\n"); 1443 BIO_printf(bio_err, "SM2 sign failure\n"); 1468 BIO_printf(bio_err, "SM2 verify init failure\n"); 1476 BIO_printf(bio_err, "SM2 verify failure\n"); 2085 /* SM2 */ 2249 = seconds.sm2 = seconds.ffdh 2360 else if (strncmp(sig_name, "RSA", 3) && strncmp(sig_name, "DSA", 3) && strncmp(sig_name, "ED25519", 7) && strncmp(sig_name, "ED448", 5) && strncmp(sig_name, "ECDSA", 5) && strcmp(sig_name, "HMAC") && strcmp(sig_name, "SIPHASH") && strcmp(sig_name, "POLY1305") && strcmp(sig_name, "CMAC") && strcmp(sig_name, "SM2")) { /* skip alg */ 2474 if (strcmp(algo, "sm2") == 0) { 3868 BIO_printf(bio_err, "SM2 init failure.\n") [all...] |