| /src/crypto/external/bsd/openssh/dist/ |
| ed25519.sh | 2 # $OpenBSD: ed25519.sh,v 1.2 2024/05/17 02:39:11 jsg Exp $ 5 AUTHOR="supercop-20221122/crypto_sign/ed25519/ref/implementors" 8 supercop-20221122/crypto_sign/ed25519/ref/fe25519.h 9 supercop-20221122/crypto_sign/ed25519/ref/fe25519.c 10 supercop-20221122/crypto_sign/ed25519/ref/sc25519.h 11 supercop-20221122/crypto_sign/ed25519/ref/sc25519.c 12 supercop-20221122/crypto_sign/ed25519/ref/ge25519.h 13 supercop-20221122/crypto_sign/ed25519/ref/ge25519.c 14 supercop-20221122/crypto_sign/ed25519/ref/keypair.c 15 supercop-20221122/crypto_sign/ed25519/ref/sign. [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/ec/ |
| ecx_s390x.c | 159 } ed25519; member in union:__anon210 166 s390x_flip_endian32(param.ed25519.x_src, x_src); 167 s390x_flip_endian32(param.ed25519.y_src, y_src); 168 s390x_flip_endian32(param.ed25519.d_src, d_src); 170 rc = s390x_pcc(S390X_SCALAR_MULTIPLY_ED25519, ¶m.ed25519) ? 0 : 1; 172 s390x_flip_endian32(x_dst, param.ed25519.x_dst); 173 s390x_flip_endian32(y_dst, param.ed25519.y_dst); 176 OPENSSL_cleanse(param.ed25519.d_src, sizeof(param.ed25519.d_src));
|
| ecx_meth.c | 548 /* Sanity check: make sure it is ED25519/ED448 with absent parameters */ 614 "ED25519", 615 "OpenSSL ED25519 algorithm", 1229 } ed25519; member in union:__anon198 1251 memcpy(param.ed25519.priv, edkey->privkey, sizeof(param.ed25519.priv)); 1253 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED25519, ¶m.ed25519, tbs, tbslen); 1254 OPENSSL_cleanse(param.ed25519.priv, sizeof(param.ed25519.priv)); 1258 s390x_flip_endian32(sig, param.ed25519.sig) 1322 } ed25519; member in union:__anon202 [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/ec/ |
| ecx_s390x.c | 159 } ed25519; member in union:__anon1322 166 s390x_flip_endian32(param.ed25519.x_src, x_src); 167 s390x_flip_endian32(param.ed25519.y_src, y_src); 168 s390x_flip_endian32(param.ed25519.d_src, d_src); 170 rc = s390x_pcc(S390X_SCALAR_MULTIPLY_ED25519, ¶m.ed25519) ? 0 : 1; 172 s390x_flip_endian32(x_dst, param.ed25519.x_dst); 173 s390x_flip_endian32(y_dst, param.ed25519.y_dst); 176 OPENSSL_cleanse(param.ed25519.d_src, sizeof(param.ed25519.d_src));
|
| ecx_meth.c | 550 /* Sanity check: make sure it is ED25519/ED448 with absent parameters */ 615 "ED25519", 616 "OpenSSL ED25519 algorithm", 1193 } ed25519; member in union:__anon1310 1215 memcpy(param.ed25519.priv, edkey->privkey, sizeof(param.ed25519.priv)); 1217 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED25519, ¶m.ed25519, tbs, tbslen); 1218 OPENSSL_cleanse(param.ed25519.priv, sizeof(param.ed25519.priv)); 1222 s390x_flip_endian32(sig, param.ed25519.sig) 1286 } ed25519; member in union:__anon1314 [all...] |
| /src/crypto/external/bsd/openssl/dist/providers/implementations/signature/ |
| eddsa_sig.c | 173 if (S390X_CAN_SIGN(ED25519)) { 243 if (S390X_CAN_SIGN(ED25519)) 379 } ed25519; member in union:__anon1625 384 memcpy(param.ed25519.priv, edkey->privkey, sizeof(param.ed25519.priv)); 386 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED25519, ¶m.ed25519, tbs, tbslen); 387 OPENSSL_cleanse(param.ed25519.priv, sizeof(param.ed25519.priv)); 391 s390x_flip_endian32(sig, param.ed25519.sig); 392 s390x_flip_endian32(sig + 32, param.ed25519.sig + 32) 431 } ed25519; member in union:__anon1629 [all...] |
| /src/crypto/external/apache2/openssl/dist/providers/implementations/signature/ |
| eddsa_sig.c | 56 #define SN_Ed25519 "Ed25519" 93 Ed25519 101 For Ed25519, dom2(f,c) is the empty string. The phflag value is 103 causes the scheme to be one and the same with the Ed25519 scheme 109 is hashed using SHA-512 before signing with Ed25519. 124 Ed25519. Otherwise, the octet string: "SigEd25519 no 125 Ed25519 collisions" || octet(x) || octet(OLEN(y)) || 127 of at most 255 octets. "SigEd25519 no Ed25519 321 * This supports using ED25519 with EVP_PKEY_{sign,verify}_init_ex() and 414 if (S390X_CAN_SIGN(ED25519) 1063 } ed25519; member in union:__anon584 1115 } ed25519; member in union:__anon588 [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/ |
| 20-cert-select.conf | 8 test-3 = 3-Ed25519 CipherString and Signature Algorithm Selection 14 test-9 = 9-Ed25519 CipherString and Curves Selection 37 test-32 = 32-TLS 1.2 Ed25519 Client Auth 48 test-43 = 43-TLS 1.3 Ed25519 Signature Algorithm Selection 50 test-45 = 45-TLS 1.3 Ed25519 CipherString and Groups Selection 55 test-50 = 50-TLS 1.3 Ed25519 Client Auth 75 Ed25519.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed25519-cert.pem 76 Ed25519.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed25519-key.pe [all...] |
| /src/etc/rc.d/ |
| sshd | 65 ed25519 -1 ssh_host_ed25519_key
|
| /src/crypto/external/bsd/openssh/lib/ |
| Makefile | 39 ed25519.c \ 66 ssh-ed25519.c \ 67 ssh-ed25519-sk.c \
|
| /src/sys/rump/kern/lib/libcrypto/ |
| Makefile | 26 ${SODIUM_DIR}/crypto_core/ed25519/ref10 \
|
| /src/external/ibm-public/postfix/dist/src/tls/ |
| mkcert.sh | 59 ed25519) ;;
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/encode_decode/ |
| encode_key2any.c | 809 * ED25519, ED448, X25519 and X448 only has PKCS#8 / SubjectPublicKeyInfo 819 # define ed25519_input_type "ED25519" 823 # define ed25519_pem_type "ED25519" 1231 * the key type. For example, ed25519, ed448, x25519 and x448 1407 MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, EncryptedPrivateKeyInfo, der); 1408 MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, EncryptedPrivateKeyInfo, pem); 1409 MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, PrivateKeyInfo, der); 1410 MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, PrivateKeyInfo, pem); 1411 MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, SubjectPublicKeyInfo, der); 1412 MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, SubjectPublicKeyInfo, pem) [all...] |
| decode_der2key.c | 443 * ED25519, ED448, X25519, X448 only implement PKCS#8 and SubjectPublicKeyInfo, 738 * as keytype. For example, the key types ed25519, ed448, 802 MAKE_DECODER("ED25519", ed25519, ecx, PrivateKeyInfo); 803 MAKE_DECODER("ED25519", ed25519, ecx, SubjectPublicKeyInfo);
|
| encode_key2text.c | 587 type_label = "ED25519"; 621 # define ed25519_input_type "ED25519" 871 MAKE_TEXT_ENCODER(ed25519, ecx);
|
| /src/crypto/external/bsd/openssl.old/dist/test/certs/ |
| mkcert.sh | 57 ed25519) ;;
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/encode_decode/ |
| encode_key2any.c | 828 * ED25519, ED448, X25519 and X448 only has PKCS#8 / SubjectPublicKeyInfo 838 #define ed25519_pem_type "ED25519" 1387 * the key type. For example, ed25519, ed448, x25519 and x448 1561 MAKE_ENCODER(ed25519, ecx, EncryptedPrivateKeyInfo, der); 1562 MAKE_ENCODER(ed25519, ecx, EncryptedPrivateKeyInfo, pem); 1563 MAKE_ENCODER(ed25519, ecx, PrivateKeyInfo, der); 1564 MAKE_ENCODER(ed25519, ecx, PrivateKeyInfo, pem); 1565 MAKE_ENCODER(ed25519, ecx, SubjectPublicKeyInfo, der); 1566 MAKE_ENCODER(ed25519, ecx, SubjectPublicKeyInfo, pem); 1690 * ED25519, ED448, X25519 or X448, and they therefore only have PKCS# [all...] |
| decode_der2key.c | 502 * ED25519, ED448, X25519, X448 only implement PKCS#8 and SubjectPublicKeyInfo, 513 D2I_PUBKEY_NOCTX(ed25519, ossl_d2i_ED25519_PUBKEY) 1175 * as keytype. For example, the key types ed25519, ed448, 1244 MAKE_DECODER("ED25519", ed25519, ecx, PrivateKeyInfo); 1245 MAKE_DECODER("ED25519", ed25519, ecx, SubjectPublicKeyInfo);
|
| encode_key2text.c | 405 type_label = "ED25519"; 711 MAKE_TEXT_ENCODER(ed25519, ecx);
|
| /src/crypto/external/apache2/openssl/dist/test/certs/ |
| mkcert.sh | 57 ed25519) ;;
|
| /src/crypto/external/bsd/openssl/dist/test/certs/ |
| mkcert.sh | 57 ed25519) ;;
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/keymgmt/ |
| ecx_kmgmt.c | 825 MAKE_KEYMGMT_FUNCTIONS(ed25519)
|
| /src/external/mpl/bind/dist/bin/tests/system/kasp/ns3/ |
| setup.sh | 80 setup "ed25519.kasp" 82 cat ed25519.conf >>named.conf
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/keymgmt/ |
| ecx_kmgmt.c | 515 /* X25519/X448 are not FIPS approved, (ED25519/ED448 are approved) */ 1038 MAKE_KEYMGMT_FUNCTIONS(ed25519)
|
| /src/external/bsd/unbound/dist/ |
| configure | 1627 --disable-ed25519 Disable ED25519 support 22900 # Check whether --enable-ed25519 was given. 22930 e) if test "x$enable_ed25519" = "xyes"; then as_fn_error $? "OpenSSL does not support ED25519 and you used --enable-ed25519." "$LINENO" 5
|