| /src/crypto/external/apache2/openssl/dist/crypto/ec/ |
| ecx_s390x.c | 193 } ed448; member in union:__anon212 200 memcpy(param.ed448.x_src, x_src, 57); 201 memcpy(param.ed448.y_src, y_src, 57); 202 memcpy(param.ed448.d_src, d_src, 57); 203 s390x_flip_endian64(param.ed448.x_src, param.ed448.x_src); 204 s390x_flip_endian64(param.ed448.y_src, param.ed448.y_src); 205 s390x_flip_endian64(param.ed448.d_src, param.ed448.d_src) [all...] |
| ecx_meth.c | 548 /* Sanity check: make sure it is ED25519/ED448 with absent parameters */ 667 "ED448", 668 "OpenSSL ED448 algorithm", 1274 } ed448; member in union:__anon200 1296 memcpy(param.ed448.priv + 64 - 57, edkey->privkey, 57); 1298 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED448, ¶m.ed448, tbs, tbslen); 1299 OPENSSL_cleanse(param.ed448.priv, sizeof(param.ed448.priv)); 1303 s390x_flip_endian64(param.ed448.sig, param.ed448.sig) 1357 } ed448; member in union:__anon204 [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/ec/ |
| ecx_s390x.c | 193 } ed448; member in union:__anon1324 200 memcpy(param.ed448.x_src, x_src, 57); 201 memcpy(param.ed448.y_src, y_src, 57); 202 memcpy(param.ed448.d_src, d_src, 57); 203 s390x_flip_endian64(param.ed448.x_src, param.ed448.x_src); 204 s390x_flip_endian64(param.ed448.y_src, param.ed448.y_src); 205 s390x_flip_endian64(param.ed448.d_src, param.ed448.d_src) [all...] |
| ecx_meth.c | 550 /* Sanity check: make sure it is ED25519/ED448 with absent parameters */ 668 "ED448", 669 "OpenSSL ED448 algorithm", 1238 } ed448; member in union:__anon1312 1260 memcpy(param.ed448.priv + 64 - 57, edkey->privkey, 57); 1262 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED448, ¶m.ed448, tbs, tbslen); 1263 OPENSSL_cleanse(param.ed448.priv, sizeof(param.ed448.priv)); 1267 s390x_flip_endian64(param.ed448.sig, param.ed448.sig) 1318 } ed448; member in union:__anon1316 [all...] |
| /src/crypto/external/bsd/openssl/dist/providers/implementations/signature/ |
| eddsa_sig.c | 214 if (S390X_CAN_SIGN(ED448)) { 262 if (S390X_CAN_SIGN(ED448)) 404 } ed448; member in union:__anon1627 409 memcpy(param.ed448.priv + 64 - 57, edkey->privkey, 57); 411 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED448, ¶m.ed448, tbs, tbslen); 412 OPENSSL_cleanse(param.ed448.priv, sizeof(param.ed448.priv)); 416 s390x_flip_endian64(param.ed448.sig, param.ed448.sig); 417 s390x_flip_endian64(param.ed448.sig + 64, param.ed448.sig + 64) 453 } ed448; member in union:__anon1631 [all...] |
| /src/crypto/external/apache2/openssl/dist/providers/implementations/signature/ |
| eddsa_sig.c | 59 #define SN_Ed448 "Ed448" 96 Ed448 114 being 1, i.e., the input is hashed before signing with Ed448 with a 367 * This supports using ED448 with EVP_PKEY_{sign,verify}_init_ex() and 523 if (S390X_CAN_SIGN(ED448) 645 if (S390X_CAN_SIGN(ED448) 789 static const char *keytypes[] = { "ED448", NULL }; 937 * Ed448 can be used with: 1050 IMPL_EDDSA_DISPATCH(ed448, ed448); 1088 } ed448; member in union:__anon586 1140 } ed448; member in union:__anon590 [all...] |