| /src/crypto/external/apache2/openssl/dist/crypto/ec/ |
| ecx_s390x.c | 193 } ed448; member in union:__anon212 200 memcpy(param.ed448.x_src, x_src, 57); 201 memcpy(param.ed448.y_src, y_src, 57); 202 memcpy(param.ed448.d_src, d_src, 57); 203 s390x_flip_endian64(param.ed448.x_src, param.ed448.x_src); 204 s390x_flip_endian64(param.ed448.y_src, param.ed448.y_src); 205 s390x_flip_endian64(param.ed448.d_src, param.ed448.d_src) [all...] |
| ecx_meth.c | 548 /* Sanity check: make sure it is ED25519/ED448 with absent parameters */ 667 "ED448", 668 "OpenSSL ED448 algorithm", 1274 } ed448; member in union:__anon200 1296 memcpy(param.ed448.priv + 64 - 57, edkey->privkey, 57); 1298 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED448, ¶m.ed448, tbs, tbslen); 1299 OPENSSL_cleanse(param.ed448.priv, sizeof(param.ed448.priv)); 1303 s390x_flip_endian64(param.ed448.sig, param.ed448.sig) 1357 } ed448; member in union:__anon204 [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/ec/ |
| ecx_s390x.c | 193 } ed448; member in union:__anon1324 200 memcpy(param.ed448.x_src, x_src, 57); 201 memcpy(param.ed448.y_src, y_src, 57); 202 memcpy(param.ed448.d_src, d_src, 57); 203 s390x_flip_endian64(param.ed448.x_src, param.ed448.x_src); 204 s390x_flip_endian64(param.ed448.y_src, param.ed448.y_src); 205 s390x_flip_endian64(param.ed448.d_src, param.ed448.d_src) [all...] |
| ecx_meth.c | 550 /* Sanity check: make sure it is ED25519/ED448 with absent parameters */ 668 "ED448", 669 "OpenSSL ED448 algorithm", 1238 } ed448; member in union:__anon1312 1260 memcpy(param.ed448.priv + 64 - 57, edkey->privkey, 57); 1262 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED448, ¶m.ed448, tbs, tbslen); 1263 OPENSSL_cleanse(param.ed448.priv, sizeof(param.ed448.priv)); 1267 s390x_flip_endian64(param.ed448.sig, param.ed448.sig) 1318 } ed448; member in union:__anon1316 [all...] |
| /src/crypto/external/bsd/openssl/dist/providers/implementations/signature/ |
| eddsa_sig.c | 214 if (S390X_CAN_SIGN(ED448)) { 262 if (S390X_CAN_SIGN(ED448)) 404 } ed448; member in union:__anon1627 409 memcpy(param.ed448.priv + 64 - 57, edkey->privkey, 57); 411 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED448, ¶m.ed448, tbs, tbslen); 412 OPENSSL_cleanse(param.ed448.priv, sizeof(param.ed448.priv)); 416 s390x_flip_endian64(param.ed448.sig, param.ed448.sig); 417 s390x_flip_endian64(param.ed448.sig + 64, param.ed448.sig + 64) 453 } ed448; member in union:__anon1631 [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/ |
| 28-seclevel.conf | 6 test-1 = 1-SECLEVEL 4 with ED448 key 7 test-2 = 2-SECLEVEL 5 server with ED448 key 8 test-3 = 3-SECLEVEL 5 client with ED448 key 10 test-5 = 5-SECLEVEL 3 with ED448 key, TLSv1.2 36 [1-SECLEVEL 4 with ED448 key] 37 ssl_conf = 1-SECLEVEL 4 with ED448 key-ssl 39 [1-SECLEVEL 4 with ED448 key-ssl] 40 server = 1-SECLEVEL 4 with ED448 key-server 41 client = 1-SECLEVEL 4 with ED448 key-client 43 [1-SECLEVEL 4 with ED448 key-server [all...] |
| 20-cert-select.conf | 9 test-4 = 4-Ed448 CipherString and Signature Algorithm Selection 15 test-10 = 10-Ed448 CipherString and Curves Selection 38 test-33 = 33-TLS 1.2 Ed448 Client Auth 49 test-44 = 44-TLS 1.3 Ed448 Signature Algorithm Selection 51 test-46 = 46-TLS 1.3 Ed448 CipherString and Groups Selection 56 test-51 = 51-TLS 1.3 Ed448 Client Auth 77 Ed448.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed448-cert.pem 78 Ed448.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pe [all...] |
| /src/crypto/external/apache2/openssl/dist/providers/implementations/signature/ |
| eddsa_sig.c | 59 #define SN_Ed448 "Ed448" 96 Ed448 114 being 1, i.e., the input is hashed before signing with Ed448 with a 367 * This supports using ED448 with EVP_PKEY_{sign,verify}_init_ex() and 523 if (S390X_CAN_SIGN(ED448) 645 if (S390X_CAN_SIGN(ED448) 789 static const char *keytypes[] = { "ED448", NULL }; 937 * Ed448 can be used with: 1050 IMPL_EDDSA_DISPATCH(ed448, ed448); 1088 } ed448; member in union:__anon586 1140 } ed448; member in union:__anon590 [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/certs/ |
| setup.sh | 404 OPENSSL_SIGALG=ED448 OPENSSL_KEYALG=ed448 ./mkcert.sh genroot "Root Ed448" \ 405 root-ed448-key root-ed448-cert 406 OPENSSL_SIGALG=ED448 OPENSSL_KEYALG=ed448 ./mkcert.sh genee ed448 \ 407 server-ed448-key server-ed448-cert root-ed448-key root-ed448-cer [all...] |
| mkcert.sh | 58 ed448) ;;
|
| /src/crypto/external/apache2/openssl/dist/test/certs/ |
| setup.sh | 471 OPENSSL_SIGALG= OPENSSL_KEYALG=ed448 ./mkcert.sh genroot "Root Ed448" \ 472 root-ed448-key root-ed448-cert 473 OPENSSL_SIGALG=ED448 OPENSSL_KEYALG=ed448 ./mkcert.sh genee ed448 \ 474 server-ed448-key server-ed448-cert root-ed448-key root-ed448-cer [all...] |
| mkcert.sh | 58 ed448) ;;
|
| /src/crypto/external/bsd/openssl/dist/test/certs/ |
| setup.sh | 430 OPENSSL_SIGALG= OPENSSL_KEYALG=ed448 ./mkcert.sh genroot "Root Ed448" \ 431 root-ed448-key root-ed448-cert 432 OPENSSL_SIGALG=ED448 OPENSSL_KEYALG=ed448 ./mkcert.sh genee ed448 \ 433 server-ed448-key server-ed448-cert root-ed448-key root-ed448-cer [all...] |
| mkcert.sh | 58 ed448) ;;
|
| /src/external/ibm-public/postfix/dist/src/tls/ |
| mkcert.sh | 60 ed448) ;;
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/encode_decode/ |
| encode_key2any.c | 809 * ED25519, ED448, X25519 and X448 only has PKCS#8 / SubjectPublicKeyInfo 820 # define ed448_input_type "ED448" 824 # define ed448_pem_type "ED448" 1231 * the key type. For example, ed25519, ed448, x25519 and x448 1413 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, EncryptedPrivateKeyInfo, der); 1414 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, EncryptedPrivateKeyInfo, pem); 1415 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, PrivateKeyInfo, der); 1416 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, PrivateKeyInfo, pem); 1417 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, SubjectPublicKeyInfo, der); 1418 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, SubjectPublicKeyInfo, pem) [all...] |
| decode_der2key.c | 443 * ED25519, ED448, X25519, X448 only implement PKCS#8 and SubjectPublicKeyInfo, 738 * as keytype. For example, the key types ed25519, ed448, 804 MAKE_DECODER("ED448", ed448, ecx, PrivateKeyInfo); 805 MAKE_DECODER("ED448", ed448, ecx, SubjectPublicKeyInfo);
|
| encode_key2text.c | 590 type_label = "ED448"; 622 # define ed448_input_type "ED448" 872 MAKE_TEXT_ENCODER(ed448, ecx);
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/encode_decode/ |
| encode_key2any.c | 828 * ED25519, ED448, X25519 and X448 only has PKCS#8 / SubjectPublicKeyInfo 839 #define ed448_pem_type "ED448" 1387 * the key type. For example, ed25519, ed448, x25519 and x448 1567 MAKE_ENCODER(ed448, ecx, EncryptedPrivateKeyInfo, der); 1568 MAKE_ENCODER(ed448, ecx, EncryptedPrivateKeyInfo, pem); 1569 MAKE_ENCODER(ed448, ecx, PrivateKeyInfo, der); 1570 MAKE_ENCODER(ed448, ecx, PrivateKeyInfo, pem); 1571 MAKE_ENCODER(ed448, ecx, SubjectPublicKeyInfo, der); 1572 MAKE_ENCODER(ed448, ecx, SubjectPublicKeyInfo, pem); 1690 * ED25519, ED448, X25519 or X448, and they therefore only have PKCS# [all...] |
| decode_der2key.c | 502 * ED25519, ED448, X25519, X448 only implement PKCS#8 and SubjectPublicKeyInfo, 514 D2I_PUBKEY_NOCTX(ed448, ossl_d2i_ED448_PUBKEY) 1175 * as keytype. For example, the key types ed25519, ed448, 1246 MAKE_DECODER("ED448", ed448, ecx, PrivateKeyInfo); 1247 MAKE_DECODER("ED448", ed448, ecx, SubjectPublicKeyInfo);
|
| encode_key2text.c | 408 type_label = "ED448"; 712 MAKE_TEXT_ENCODER(ed448, ecx);
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/keymgmt/ |
| ecx_kmgmt.c | 826 MAKE_KEYMGMT_FUNCTIONS(ed448)
|
| /src/external/mpl/bind/dist/bin/tests/system/kasp/ns3/ |
| setup.sh | 86 setup "ed448.kasp" 88 cat ed448.conf >>named.conf
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/keymgmt/ |
| ecx_kmgmt.c | 515 /* X25519/X448 are not FIPS approved, (ED25519/ED448 are approved) */ 1039 MAKE_KEYMGMT_FUNCTIONS(ed448)
|
| /src/external/bsd/unbound/dist/ |
| configure | 1628 --disable-ed448 Disable ED448 support 22957 # Check whether --enable-ed448 was given. 22987 e) if test "x$enable_ed448" = "xyes"; then as_fn_error $? "OpenSSL does not support ED448 and you used --enable-ed448." "$LINENO" 5
|