HomeSort by: relevance | last modified time | path
    Searched refs:ed25519 (Results 1 - 25 of 25) sorted by relevancy

  /src/crypto/external/bsd/openssh/dist/
ed25519.sh 2 # $OpenBSD: ed25519.sh,v 1.2 2024/05/17 02:39:11 jsg Exp $
5 AUTHOR="supercop-20221122/crypto_sign/ed25519/ref/implementors"
8 supercop-20221122/crypto_sign/ed25519/ref/fe25519.h
9 supercop-20221122/crypto_sign/ed25519/ref/fe25519.c
10 supercop-20221122/crypto_sign/ed25519/ref/sc25519.h
11 supercop-20221122/crypto_sign/ed25519/ref/sc25519.c
12 supercop-20221122/crypto_sign/ed25519/ref/ge25519.h
13 supercop-20221122/crypto_sign/ed25519/ref/ge25519.c
14 supercop-20221122/crypto_sign/ed25519/ref/keypair.c
15 supercop-20221122/crypto_sign/ed25519/ref/sign.
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/ec/
ecx_s390x.c 159 } ed25519; member in union:__anon210
166 s390x_flip_endian32(param.ed25519.x_src, x_src);
167 s390x_flip_endian32(param.ed25519.y_src, y_src);
168 s390x_flip_endian32(param.ed25519.d_src, d_src);
170 rc = s390x_pcc(S390X_SCALAR_MULTIPLY_ED25519, &param.ed25519) ? 0 : 1;
172 s390x_flip_endian32(x_dst, param.ed25519.x_dst);
173 s390x_flip_endian32(y_dst, param.ed25519.y_dst);
176 OPENSSL_cleanse(param.ed25519.d_src, sizeof(param.ed25519.d_src));
ecx_meth.c 548 /* Sanity check: make sure it is ED25519/ED448 with absent parameters */
614 "ED25519",
615 "OpenSSL ED25519 algorithm",
1229 } ed25519; member in union:__anon198
1251 memcpy(param.ed25519.priv, edkey->privkey, sizeof(param.ed25519.priv));
1253 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED25519, &param.ed25519, tbs, tbslen);
1254 OPENSSL_cleanse(param.ed25519.priv, sizeof(param.ed25519.priv));
1258 s390x_flip_endian32(sig, param.ed25519.sig)
1322 } ed25519; member in union:__anon202
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/ec/
ecx_s390x.c 159 } ed25519; member in union:__anon1322
166 s390x_flip_endian32(param.ed25519.x_src, x_src);
167 s390x_flip_endian32(param.ed25519.y_src, y_src);
168 s390x_flip_endian32(param.ed25519.d_src, d_src);
170 rc = s390x_pcc(S390X_SCALAR_MULTIPLY_ED25519, &param.ed25519) ? 0 : 1;
172 s390x_flip_endian32(x_dst, param.ed25519.x_dst);
173 s390x_flip_endian32(y_dst, param.ed25519.y_dst);
176 OPENSSL_cleanse(param.ed25519.d_src, sizeof(param.ed25519.d_src));
ecx_meth.c 550 /* Sanity check: make sure it is ED25519/ED448 with absent parameters */
615 "ED25519",
616 "OpenSSL ED25519 algorithm",
1193 } ed25519; member in union:__anon1310
1215 memcpy(param.ed25519.priv, edkey->privkey, sizeof(param.ed25519.priv));
1217 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED25519, &param.ed25519, tbs, tbslen);
1218 OPENSSL_cleanse(param.ed25519.priv, sizeof(param.ed25519.priv));
1222 s390x_flip_endian32(sig, param.ed25519.sig)
1286 } ed25519; member in union:__anon1314
    [all...]
  /src/crypto/external/bsd/openssl/dist/providers/implementations/signature/
eddsa_sig.c 173 if (S390X_CAN_SIGN(ED25519)) {
243 if (S390X_CAN_SIGN(ED25519))
379 } ed25519; member in union:__anon1625
384 memcpy(param.ed25519.priv, edkey->privkey, sizeof(param.ed25519.priv));
386 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED25519, &param.ed25519, tbs, tbslen);
387 OPENSSL_cleanse(param.ed25519.priv, sizeof(param.ed25519.priv));
391 s390x_flip_endian32(sig, param.ed25519.sig);
392 s390x_flip_endian32(sig + 32, param.ed25519.sig + 32)
431 } ed25519; member in union:__anon1629
    [all...]
  /src/crypto/external/apache2/openssl/dist/providers/implementations/signature/
eddsa_sig.c 56 #define SN_Ed25519 "Ed25519"
93 Ed25519
101 For Ed25519, dom2(f,c) is the empty string. The phflag value is
103 causes the scheme to be one and the same with the Ed25519 scheme
109 is hashed using SHA-512 before signing with Ed25519.
124 Ed25519. Otherwise, the octet string: "SigEd25519 no
125 Ed25519 collisions" || octet(x) || octet(OLEN(y)) ||
127 of at most 255 octets. "SigEd25519 no Ed25519
321 * This supports using ED25519 with EVP_PKEY_{sign,verify}_init_ex() and
414 if (S390X_CAN_SIGN(ED25519)
1063 } ed25519; member in union:__anon584
1115 } ed25519; member in union:__anon588
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/
20-cert-select.conf 8 test-3 = 3-Ed25519 CipherString and Signature Algorithm Selection
14 test-9 = 9-Ed25519 CipherString and Curves Selection
37 test-32 = 32-TLS 1.2 Ed25519 Client Auth
48 test-43 = 43-TLS 1.3 Ed25519 Signature Algorithm Selection
50 test-45 = 45-TLS 1.3 Ed25519 CipherString and Groups Selection
55 test-50 = 50-TLS 1.3 Ed25519 Client Auth
75 Ed25519.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed25519-cert.pem
76 Ed25519.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed25519-key.pe
    [all...]
  /src/etc/rc.d/
sshd 65 ed25519 -1 ssh_host_ed25519_key
  /src/crypto/external/bsd/openssh/lib/
Makefile 39 ed25519.c \
66 ssh-ed25519.c \
67 ssh-ed25519-sk.c \
  /src/sys/rump/kern/lib/libcrypto/
Makefile 26 ${SODIUM_DIR}/crypto_core/ed25519/ref10 \
  /src/external/ibm-public/postfix/dist/src/tls/
mkcert.sh 59 ed25519) ;;
  /src/crypto/external/bsd/openssl/dist/providers/implementations/encode_decode/
encode_key2any.c 809 * ED25519, ED448, X25519 and X448 only has PKCS#8 / SubjectPublicKeyInfo
819 # define ed25519_input_type "ED25519"
823 # define ed25519_pem_type "ED25519"
1231 * the key type. For example, ed25519, ed448, x25519 and x448
1407 MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, EncryptedPrivateKeyInfo, der);
1408 MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, EncryptedPrivateKeyInfo, pem);
1409 MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, PrivateKeyInfo, der);
1410 MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, PrivateKeyInfo, pem);
1411 MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, SubjectPublicKeyInfo, der);
1412 MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, SubjectPublicKeyInfo, pem)
    [all...]
decode_der2key.c 443 * ED25519, ED448, X25519, X448 only implement PKCS#8 and SubjectPublicKeyInfo,
738 * as keytype. For example, the key types ed25519, ed448,
802 MAKE_DECODER("ED25519", ed25519, ecx, PrivateKeyInfo);
803 MAKE_DECODER("ED25519", ed25519, ecx, SubjectPublicKeyInfo);
encode_key2text.c 587 type_label = "ED25519";
621 # define ed25519_input_type "ED25519"
871 MAKE_TEXT_ENCODER(ed25519, ecx);
  /src/crypto/external/bsd/openssl.old/dist/test/certs/
mkcert.sh 57 ed25519) ;;
  /src/crypto/external/apache2/openssl/dist/providers/implementations/encode_decode/
encode_key2any.c 828 * ED25519, ED448, X25519 and X448 only has PKCS#8 / SubjectPublicKeyInfo
838 #define ed25519_pem_type "ED25519"
1387 * the key type. For example, ed25519, ed448, x25519 and x448
1561 MAKE_ENCODER(ed25519, ecx, EncryptedPrivateKeyInfo, der);
1562 MAKE_ENCODER(ed25519, ecx, EncryptedPrivateKeyInfo, pem);
1563 MAKE_ENCODER(ed25519, ecx, PrivateKeyInfo, der);
1564 MAKE_ENCODER(ed25519, ecx, PrivateKeyInfo, pem);
1565 MAKE_ENCODER(ed25519, ecx, SubjectPublicKeyInfo, der);
1566 MAKE_ENCODER(ed25519, ecx, SubjectPublicKeyInfo, pem);
1690 * ED25519, ED448, X25519 or X448, and they therefore only have PKCS#
    [all...]
decode_der2key.c 502 * ED25519, ED448, X25519, X448 only implement PKCS#8 and SubjectPublicKeyInfo,
513 D2I_PUBKEY_NOCTX(ed25519, ossl_d2i_ED25519_PUBKEY)
1175 * as keytype. For example, the key types ed25519, ed448,
1244 MAKE_DECODER("ED25519", ed25519, ecx, PrivateKeyInfo);
1245 MAKE_DECODER("ED25519", ed25519, ecx, SubjectPublicKeyInfo);
encode_key2text.c 405 type_label = "ED25519";
711 MAKE_TEXT_ENCODER(ed25519, ecx);
  /src/crypto/external/apache2/openssl/dist/test/certs/
mkcert.sh 57 ed25519) ;;
  /src/crypto/external/bsd/openssl/dist/test/certs/
mkcert.sh 57 ed25519) ;;
  /src/crypto/external/bsd/openssl/dist/providers/implementations/keymgmt/
ecx_kmgmt.c 825 MAKE_KEYMGMT_FUNCTIONS(ed25519)
  /src/external/mpl/bind/dist/bin/tests/system/kasp/ns3/
setup.sh 80 setup "ed25519.kasp"
82 cat ed25519.conf >>named.conf
  /src/crypto/external/apache2/openssl/dist/providers/implementations/keymgmt/
ecx_kmgmt.c 515 /* X25519/X448 are not FIPS approved, (ED25519/ED448 are approved) */
1038 MAKE_KEYMGMT_FUNCTIONS(ed25519)
  /src/external/bsd/unbound/dist/
configure 1627 --disable-ed25519 Disable ED25519 support
22900 # Check whether --enable-ed25519 was given.
22930 e) if test "x$enable_ed25519" = "xyes"; then as_fn_error $? "OpenSSL does not support ED25519 and you used --enable-ed25519." "$LINENO" 5

Completed in 60 milliseconds