Home
last modified time | relevance | path

Searched refs:ed448 (Results 1 – 19 of 19) sorted by relevance

/openssl-master/crypto/ec/
A Decx_s390x.c193 } ed448; in s390x_ed448_mul() member
200 memcpy(param.ed448.x_src, x_src, 57); in s390x_ed448_mul()
201 memcpy(param.ed448.y_src, y_src, 57); in s390x_ed448_mul()
202 memcpy(param.ed448.d_src, d_src, 57); in s390x_ed448_mul()
203 s390x_flip_endian64(param.ed448.x_src, param.ed448.x_src); in s390x_ed448_mul()
204 s390x_flip_endian64(param.ed448.y_src, param.ed448.y_src); in s390x_ed448_mul()
205 s390x_flip_endian64(param.ed448.d_src, param.ed448.d_src); in s390x_ed448_mul()
209 s390x_flip_endian64(param.ed448.x_dst, param.ed448.x_dst); in s390x_ed448_mul()
210 s390x_flip_endian64(param.ed448.y_dst, param.ed448.y_dst); in s390x_ed448_mul()
211 memcpy(x_dst, param.ed448.x_dst, 57); in s390x_ed448_mul()
[all …]
A Decx_meth.c1217 } ed448; in s390x_pkey_ecd_digestsign448() member
1237 OPENSSL_cleanse(param.ed448.priv, sizeof(param.ed448.priv)); in s390x_pkey_ecd_digestsign448()
1241 s390x_flip_endian64(param.ed448.sig, param.ed448.sig); in s390x_pkey_ecd_digestsign448()
1242 s390x_flip_endian64(param.ed448.sig + 64, param.ed448.sig + 64); in s390x_pkey_ecd_digestsign448()
1243 memcpy(sig, param.ed448.sig, 57); in s390x_pkey_ecd_digestsign448()
1244 memcpy(sig + 57, param.ed448.sig + 64, 57); in s390x_pkey_ecd_digestsign448()
1287 } ed448; in s390x_pkey_ecd_digestverify448() member
1296 memcpy(param.ed448.sig, sig, 57); in s390x_pkey_ecd_digestverify448()
1297 s390x_flip_endian64(param.ed448.sig, param.ed448.sig); in s390x_pkey_ecd_digestverify448()
1299 s390x_flip_endian64(param.ed448.sig + 64, param.ed448.sig + 64); in s390x_pkey_ecd_digestverify448()
[all …]
/openssl-master/providers/implementations/signature/
A Deddsa_sig.c383 } ed448; in s390x_ed448_digestsign() member
391 OPENSSL_cleanse(param.ed448.priv, sizeof(param.ed448.priv)); in s390x_ed448_digestsign()
395 s390x_flip_endian64(param.ed448.sig, param.ed448.sig); in s390x_ed448_digestsign()
396 s390x_flip_endian64(param.ed448.sig + 64, param.ed448.sig + 64); in s390x_ed448_digestsign()
397 memcpy(sig, param.ed448.sig, 57); in s390x_ed448_digestsign()
398 memcpy(sig + 57, param.ed448.sig + 64, 57); in s390x_ed448_digestsign()
432 } ed448; in s390x_ed448_digestverify() member
437 memcpy(param.ed448.sig, sig, 57); in s390x_ed448_digestverify()
438 s390x_flip_endian64(param.ed448.sig, param.ed448.sig); in s390x_ed448_digestverify()
440 s390x_flip_endian64(param.ed448.sig + 64, param.ed448.sig + 64); in s390x_ed448_digestverify()
[all …]
/openssl-master/test/ssl-tests/
A D28-seclevel.cnf.in30 "Certificate" => test_pem("server-ed448-cert.pem"),
31 "PrivateKey" => test_pem("server-ed448-key.pem") },
33 "VerifyCAFile" => test_pem("root-ed448-cert.pem") },
43 "Certificate" => test_pem("server-ed448-cert.pem"),
44 "PrivateKey" => test_pem("server-ed448-key.pem") },
46 "VerifyCAFile" => test_pem("root-ed448-cert.pem") },
54 "Certificate" => test_pem("server-ed448-cert.pem"),
55 "PrivateKey" => test_pem("server-ed448-key.pem") },
57 "VerifyCAFile" => test_pem("root-ed448-cert.pem") },
76 "Certificate" => test_pem("server-ed448-cert.pem"),
[all …]
A D28-seclevel.cnf44 Certificate = ${ENV::TEST_CERTS_DIR}/server-ed448-cert.pem
46 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem
50 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem
67 Certificate = ${ENV::TEST_CERTS_DIR}/server-ed448-cert.pem
69 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem
73 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem
90 Certificate = ${ENV::TEST_CERTS_DIR}/server-ed448-cert.pem
92 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem
96 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem
140 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem
[all …]
A D20-cert-select.cnf.in20 "Ed448.Certificate" => test_pem("server-ed448-cert.pem"),
21 "Ed448.PrivateKey" => test_pem("server-ed448-key.pem"),
32 "Ed448.Certificate" => test_pem("server-ed448-cert.pem"),
33 "Ed448.PrivateKey" => test_pem("server-ed448-key.pem"),
319 "SignatureAlgorithms" => "ed448:ECDSA+SHA256",
320 "RequestCAFile" => test_pem("root-ed448-cert.pem"),
321 "VerifyCAFile" => test_pem("root-ed448-cert.pem"),
354 "SignatureAlgorithms" => "ECDSA+SHA256:ed448",
355 "VerifyCAFile" => test_pem("root-ed448-cert.pem"),
819 "SignatureAlgorithms" => "ed448",
[all …]
A D20-cert-select.cnf79 Ed448.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem
177 Ed448.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem
210 Ed448.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem
591 RequestCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem
592 SignatureAlgorithms = ed448:ECDSA+SHA256
593 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem
663 SignatureAlgorithms = ECDSA+SHA256:ed448
664 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem
1566 SignatureAlgorithms = ed448
1567 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem
[all …]
/openssl-master/providers/
A Dencoders.inc61 ENCODER_TEXT("ED448", ed448, yes),
205 ENCODER_w_structure("ED448", ed448, yes, der, EncryptedPrivateKeyInfo),
206 ENCODER_w_structure("ED448", ed448, yes, pem, EncryptedPrivateKeyInfo),
207 ENCODER_w_structure("ED448", ed448, yes, der, PrivateKeyInfo),
208 ENCODER_w_structure("ED448", ed448, yes, pem, PrivateKeyInfo),
209 ENCODER_w_structure("ED448", ed448, yes, der, SubjectPublicKeyInfo),
210 ENCODER_w_structure("ED448", ed448, yes, pem, SubjectPublicKeyInfo),
A Ddecoders.inc63 DECODER_w_structure("ED448", der, PrivateKeyInfo, ed448, yes),
64 DECODER_w_structure("ED448", der, SubjectPublicKeyInfo, ed448, yes),
A Dfips.module.sources154 crypto/ec/curve448/ed448.h
A Dfips-sources.checksums154 4a45e7828831fbe9f282f933cda54b12cd393ec9bffe5c0ace8e4d1c4d5d6358 crypto/ec/curve448/ed448.h
/openssl-master/test/certs/
A Dsetup.sh413 OPENSSL_SIGALG= OPENSSL_KEYALG=ed448 ./mkcert.sh genroot "Root Ed448" \
414 root-ed448-key root-ed448-cert
415 OPENSSL_SIGALG=ED448 OPENSSL_KEYALG=ed448 ./mkcert.sh genee ed448 \
416 server-ed448-key server-ed448-cert root-ed448-key root-ed448-cert
A Dmkcert.sh58 ed448) ;;
/openssl-master/providers/implementations/encode_decode/
A Dencode_key2any.c1402 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, EncryptedPrivateKeyInfo, der);
1403 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, EncryptedPrivateKeyInfo, pem);
1404 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, PrivateKeyInfo, der);
1405 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, PrivateKeyInfo, pem);
1406 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, SubjectPublicKeyInfo, der);
1407 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, SubjectPublicKeyInfo, pem);
A Ddecode_der2key.c768 MAKE_DECODER("ED448", ed448, ecx, PrivateKeyInfo);
769 MAKE_DECODER("ED448", ed448, ecx, SubjectPublicKeyInfo);
A Dencode_key2text.c875 MAKE_TEXT_ENCODER(ed448, ecx);
/openssl-master/doc/man7/
A DEVP_SIGNATURE-ED25519.pod62 Valid algorithm names are B<ed25519>, B<ed448> and B<eddsa>. If B<eddsa> is
/openssl-master/providers/implementations/keymgmt/
A Decx_kmgmt.c806 MAKE_KEYMGMT_FUNCTIONS(ed448) in MAKE_KEYMGMT_FUNCTIONS()
/openssl-master/
A DCHANGES.md1761 * Check that ed25519 and ed448 are allowed by the security level. Previously

Completed in 54 milliseconds