/openssl-master/crypto/ec/ |
A D | ecx_s390x.c | 193 } ed448; in s390x_ed448_mul() member 200 memcpy(param.ed448.x_src, x_src, 57); in s390x_ed448_mul() 201 memcpy(param.ed448.y_src, y_src, 57); in s390x_ed448_mul() 202 memcpy(param.ed448.d_src, d_src, 57); in s390x_ed448_mul() 203 s390x_flip_endian64(param.ed448.x_src, param.ed448.x_src); in s390x_ed448_mul() 204 s390x_flip_endian64(param.ed448.y_src, param.ed448.y_src); in s390x_ed448_mul() 205 s390x_flip_endian64(param.ed448.d_src, param.ed448.d_src); in s390x_ed448_mul() 209 s390x_flip_endian64(param.ed448.x_dst, param.ed448.x_dst); in s390x_ed448_mul() 210 s390x_flip_endian64(param.ed448.y_dst, param.ed448.y_dst); in s390x_ed448_mul() 211 memcpy(x_dst, param.ed448.x_dst, 57); in s390x_ed448_mul() [all …]
|
A D | ecx_meth.c | 1217 } ed448; in s390x_pkey_ecd_digestsign448() member 1237 OPENSSL_cleanse(param.ed448.priv, sizeof(param.ed448.priv)); in s390x_pkey_ecd_digestsign448() 1241 s390x_flip_endian64(param.ed448.sig, param.ed448.sig); in s390x_pkey_ecd_digestsign448() 1242 s390x_flip_endian64(param.ed448.sig + 64, param.ed448.sig + 64); in s390x_pkey_ecd_digestsign448() 1243 memcpy(sig, param.ed448.sig, 57); in s390x_pkey_ecd_digestsign448() 1244 memcpy(sig + 57, param.ed448.sig + 64, 57); in s390x_pkey_ecd_digestsign448() 1287 } ed448; in s390x_pkey_ecd_digestverify448() member 1296 memcpy(param.ed448.sig, sig, 57); in s390x_pkey_ecd_digestverify448() 1297 s390x_flip_endian64(param.ed448.sig, param.ed448.sig); in s390x_pkey_ecd_digestverify448() 1299 s390x_flip_endian64(param.ed448.sig + 64, param.ed448.sig + 64); in s390x_pkey_ecd_digestverify448() [all …]
|
/openssl-master/providers/implementations/signature/ |
A D | eddsa_sig.c | 383 } ed448; in s390x_ed448_digestsign() member 391 OPENSSL_cleanse(param.ed448.priv, sizeof(param.ed448.priv)); in s390x_ed448_digestsign() 395 s390x_flip_endian64(param.ed448.sig, param.ed448.sig); in s390x_ed448_digestsign() 396 s390x_flip_endian64(param.ed448.sig + 64, param.ed448.sig + 64); in s390x_ed448_digestsign() 397 memcpy(sig, param.ed448.sig, 57); in s390x_ed448_digestsign() 398 memcpy(sig + 57, param.ed448.sig + 64, 57); in s390x_ed448_digestsign() 432 } ed448; in s390x_ed448_digestverify() member 437 memcpy(param.ed448.sig, sig, 57); in s390x_ed448_digestverify() 438 s390x_flip_endian64(param.ed448.sig, param.ed448.sig); in s390x_ed448_digestverify() 440 s390x_flip_endian64(param.ed448.sig + 64, param.ed448.sig + 64); in s390x_ed448_digestverify() [all …]
|
/openssl-master/test/ssl-tests/ |
A D | 28-seclevel.cnf.in | 30 "Certificate" => test_pem("server-ed448-cert.pem"), 31 "PrivateKey" => test_pem("server-ed448-key.pem") }, 33 "VerifyCAFile" => test_pem("root-ed448-cert.pem") }, 43 "Certificate" => test_pem("server-ed448-cert.pem"), 44 "PrivateKey" => test_pem("server-ed448-key.pem") }, 46 "VerifyCAFile" => test_pem("root-ed448-cert.pem") }, 54 "Certificate" => test_pem("server-ed448-cert.pem"), 55 "PrivateKey" => test_pem("server-ed448-key.pem") }, 57 "VerifyCAFile" => test_pem("root-ed448-cert.pem") }, 76 "Certificate" => test_pem("server-ed448-cert.pem"), [all …]
|
A D | 28-seclevel.cnf | 44 Certificate = ${ENV::TEST_CERTS_DIR}/server-ed448-cert.pem 46 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem 50 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem 67 Certificate = ${ENV::TEST_CERTS_DIR}/server-ed448-cert.pem 69 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem 73 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem 90 Certificate = ${ENV::TEST_CERTS_DIR}/server-ed448-cert.pem 92 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem 96 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem 140 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem [all …]
|
A D | 20-cert-select.cnf.in | 20 "Ed448.Certificate" => test_pem("server-ed448-cert.pem"), 21 "Ed448.PrivateKey" => test_pem("server-ed448-key.pem"), 32 "Ed448.Certificate" => test_pem("server-ed448-cert.pem"), 33 "Ed448.PrivateKey" => test_pem("server-ed448-key.pem"), 319 "SignatureAlgorithms" => "ed448:ECDSA+SHA256", 320 "RequestCAFile" => test_pem("root-ed448-cert.pem"), 321 "VerifyCAFile" => test_pem("root-ed448-cert.pem"), 354 "SignatureAlgorithms" => "ECDSA+SHA256:ed448", 355 "VerifyCAFile" => test_pem("root-ed448-cert.pem"), 819 "SignatureAlgorithms" => "ed448", [all …]
|
A D | 20-cert-select.cnf | 79 Ed448.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem 177 Ed448.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem 210 Ed448.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem 591 RequestCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem 592 SignatureAlgorithms = ed448:ECDSA+SHA256 593 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem 663 SignatureAlgorithms = ECDSA+SHA256:ed448 664 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem 1566 SignatureAlgorithms = ed448 1567 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem [all …]
|
/openssl-master/providers/ |
A D | encoders.inc | 61 ENCODER_TEXT("ED448", ed448, yes), 205 ENCODER_w_structure("ED448", ed448, yes, der, EncryptedPrivateKeyInfo), 206 ENCODER_w_structure("ED448", ed448, yes, pem, EncryptedPrivateKeyInfo), 207 ENCODER_w_structure("ED448", ed448, yes, der, PrivateKeyInfo), 208 ENCODER_w_structure("ED448", ed448, yes, pem, PrivateKeyInfo), 209 ENCODER_w_structure("ED448", ed448, yes, der, SubjectPublicKeyInfo), 210 ENCODER_w_structure("ED448", ed448, yes, pem, SubjectPublicKeyInfo),
|
A D | decoders.inc | 63 DECODER_w_structure("ED448", der, PrivateKeyInfo, ed448, yes), 64 DECODER_w_structure("ED448", der, SubjectPublicKeyInfo, ed448, yes),
|
A D | fips.module.sources | 154 crypto/ec/curve448/ed448.h
|
A D | fips-sources.checksums | 154 4a45e7828831fbe9f282f933cda54b12cd393ec9bffe5c0ace8e4d1c4d5d6358 crypto/ec/curve448/ed448.h
|
/openssl-master/test/certs/ |
A D | setup.sh | 413 OPENSSL_SIGALG= OPENSSL_KEYALG=ed448 ./mkcert.sh genroot "Root Ed448" \ 414 root-ed448-key root-ed448-cert 415 OPENSSL_SIGALG=ED448 OPENSSL_KEYALG=ed448 ./mkcert.sh genee ed448 \ 416 server-ed448-key server-ed448-cert root-ed448-key root-ed448-cert
|
A D | mkcert.sh | 58 ed448) ;;
|
/openssl-master/providers/implementations/encode_decode/ |
A D | encode_key2any.c | 1402 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, EncryptedPrivateKeyInfo, der); 1403 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, EncryptedPrivateKeyInfo, pem); 1404 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, PrivateKeyInfo, der); 1405 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, PrivateKeyInfo, pem); 1406 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, SubjectPublicKeyInfo, der); 1407 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, SubjectPublicKeyInfo, pem);
|
A D | decode_der2key.c | 768 MAKE_DECODER("ED448", ed448, ecx, PrivateKeyInfo); 769 MAKE_DECODER("ED448", ed448, ecx, SubjectPublicKeyInfo);
|
A D | encode_key2text.c | 875 MAKE_TEXT_ENCODER(ed448, ecx);
|
/openssl-master/doc/man7/ |
A D | EVP_SIGNATURE-ED25519.pod | 62 Valid algorithm names are B<ed25519>, B<ed448> and B<eddsa>. If B<eddsa> is
|
/openssl-master/providers/implementations/keymgmt/ |
A D | ecx_kmgmt.c | 806 MAKE_KEYMGMT_FUNCTIONS(ed448) in MAKE_KEYMGMT_FUNCTIONS()
|
/openssl-master/ |
A D | CHANGES.md | 1761 * Check that ed25519 and ed448 are allowed by the security level. Previously
|