HomeSort by: relevance | last modified time | path
    Searched defs:ed448 (Results 1 - 6 of 6) sorted by relevancy

  /src/crypto/external/apache2/openssl/dist/crypto/ec/
ecx_s390x.c 193 } ed448; member in union:__anon212
200 memcpy(param.ed448.x_src, x_src, 57);
201 memcpy(param.ed448.y_src, y_src, 57);
202 memcpy(param.ed448.d_src, d_src, 57);
203 s390x_flip_endian64(param.ed448.x_src, param.ed448.x_src);
204 s390x_flip_endian64(param.ed448.y_src, param.ed448.y_src);
205 s390x_flip_endian64(param.ed448.d_src, param.ed448.d_src)
    [all...]
ecx_meth.c 548 /* Sanity check: make sure it is ED25519/ED448 with absent parameters */
667 "ED448",
668 "OpenSSL ED448 algorithm",
1274 } ed448; member in union:__anon200
1296 memcpy(param.ed448.priv + 64 - 57, edkey->privkey, 57);
1298 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED448, &param.ed448, tbs, tbslen);
1299 OPENSSL_cleanse(param.ed448.priv, sizeof(param.ed448.priv));
1303 s390x_flip_endian64(param.ed448.sig, param.ed448.sig)
1357 } ed448; member in union:__anon204
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/ec/
ecx_s390x.c 193 } ed448; member in union:__anon1324
200 memcpy(param.ed448.x_src, x_src, 57);
201 memcpy(param.ed448.y_src, y_src, 57);
202 memcpy(param.ed448.d_src, d_src, 57);
203 s390x_flip_endian64(param.ed448.x_src, param.ed448.x_src);
204 s390x_flip_endian64(param.ed448.y_src, param.ed448.y_src);
205 s390x_flip_endian64(param.ed448.d_src, param.ed448.d_src)
    [all...]
ecx_meth.c 550 /* Sanity check: make sure it is ED25519/ED448 with absent parameters */
668 "ED448",
669 "OpenSSL ED448 algorithm",
1238 } ed448; member in union:__anon1312
1260 memcpy(param.ed448.priv + 64 - 57, edkey->privkey, 57);
1262 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED448, &param.ed448, tbs, tbslen);
1263 OPENSSL_cleanse(param.ed448.priv, sizeof(param.ed448.priv));
1267 s390x_flip_endian64(param.ed448.sig, param.ed448.sig)
1318 } ed448; member in union:__anon1316
    [all...]
  /src/crypto/external/bsd/openssl/dist/providers/implementations/signature/
eddsa_sig.c 214 if (S390X_CAN_SIGN(ED448)) {
262 if (S390X_CAN_SIGN(ED448))
404 } ed448; member in union:__anon1627
409 memcpy(param.ed448.priv + 64 - 57, edkey->privkey, 57);
411 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED448, &param.ed448, tbs, tbslen);
412 OPENSSL_cleanse(param.ed448.priv, sizeof(param.ed448.priv));
416 s390x_flip_endian64(param.ed448.sig, param.ed448.sig);
417 s390x_flip_endian64(param.ed448.sig + 64, param.ed448.sig + 64)
453 } ed448; member in union:__anon1631
    [all...]
  /src/crypto/external/apache2/openssl/dist/providers/implementations/signature/
eddsa_sig.c 59 #define SN_Ed448 "Ed448"
96 Ed448
114 being 1, i.e., the input is hashed before signing with Ed448 with a
367 * This supports using ED448 with EVP_PKEY_{sign,verify}_init_ex() and
523 if (S390X_CAN_SIGN(ED448)
645 if (S390X_CAN_SIGN(ED448)
789 static const char *keytypes[] = { "ED448", NULL };
937 * Ed448 can be used with:
1050 IMPL_EDDSA_DISPATCH(ed448, ed448);
1088 } ed448; member in union:__anon586
1140 } ed448; member in union:__anon590
    [all...]

Completed in 24 milliseconds