/openssl/crypto/ec/ |
H A D | ecx_s390x.c | 193 } ed448; in s390x_ed448_mul() member 200 memcpy(param.ed448.x_src, x_src, 57); in s390x_ed448_mul() 201 memcpy(param.ed448.y_src, y_src, 57); in s390x_ed448_mul() 202 memcpy(param.ed448.d_src, d_src, 57); in s390x_ed448_mul() 203 s390x_flip_endian64(param.ed448.x_src, param.ed448.x_src); in s390x_ed448_mul() 204 s390x_flip_endian64(param.ed448.y_src, param.ed448.y_src); in s390x_ed448_mul() 205 s390x_flip_endian64(param.ed448.d_src, param.ed448.d_src); in s390x_ed448_mul() 209 s390x_flip_endian64(param.ed448.x_dst, param.ed448.x_dst); in s390x_ed448_mul() 210 s390x_flip_endian64(param.ed448.y_dst, param.ed448.y_dst); in s390x_ed448_mul() 211 memcpy(x_dst, param.ed448.x_dst, 57); in s390x_ed448_mul() [all …]
|
H A D | ecx_meth.c | 1241 } ed448; in s390x_pkey_ecd_digestsign448() member 1266 OPENSSL_cleanse(param.ed448.priv, sizeof(param.ed448.priv)); in s390x_pkey_ecd_digestsign448() 1270 s390x_flip_endian64(param.ed448.sig, param.ed448.sig); in s390x_pkey_ecd_digestsign448() 1271 s390x_flip_endian64(param.ed448.sig + 64, param.ed448.sig + 64); in s390x_pkey_ecd_digestsign448() 1272 memcpy(sig, param.ed448.sig, 57); in s390x_pkey_ecd_digestsign448() 1273 memcpy(sig + 57, param.ed448.sig + 64, 57); in s390x_pkey_ecd_digestsign448() 1321 } ed448; in s390x_pkey_ecd_digestverify448() member 1335 memcpy(param.ed448.sig, sig, 57); in s390x_pkey_ecd_digestverify448() 1336 s390x_flip_endian64(param.ed448.sig, param.ed448.sig); in s390x_pkey_ecd_digestverify448() 1338 s390x_flip_endian64(param.ed448.sig + 64, param.ed448.sig + 64); in s390x_pkey_ecd_digestverify448() [all …]
|
/openssl/test/ssl-tests/ |
H A D | 28-seclevel.cnf.in | 30 "Certificate" => test_pem("server-ed448-cert.pem"), 31 "PrivateKey" => test_pem("server-ed448-key.pem") }, 33 "VerifyCAFile" => test_pem("root-ed448-cert.pem") }, 43 "Certificate" => test_pem("server-ed448-cert.pem"), 44 "PrivateKey" => test_pem("server-ed448-key.pem") }, 46 "VerifyCAFile" => test_pem("root-ed448-cert.pem") }, 54 "Certificate" => test_pem("server-ed448-cert.pem"), 55 "PrivateKey" => test_pem("server-ed448-key.pem") }, 57 "VerifyCAFile" => test_pem("root-ed448-cert.pem") }, 79 "Certificate" => test_pem("server-ed448-cert.pem"), [all …]
|
H A D | 28-seclevel.cnf | 44 Certificate = ${ENV::TEST_CERTS_DIR}/server-ed448-cert.pem 46 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem 50 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem 67 Certificate = ${ENV::TEST_CERTS_DIR}/server-ed448-cert.pem 69 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem 73 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem 90 Certificate = ${ENV::TEST_CERTS_DIR}/server-ed448-cert.pem 92 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem 96 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem 140 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem [all …]
|
H A D | 20-cert-select.cnf.in | 20 "Ed448.Certificate" => test_pem("server-ed448-cert.pem"), 21 "Ed448.PrivateKey" => test_pem("server-ed448-key.pem"), 32 "Ed448.Certificate" => test_pem("server-ed448-cert.pem"), 33 "Ed448.PrivateKey" => test_pem("server-ed448-key.pem"), 319 "SignatureAlgorithms" => "ed448:ECDSA+SHA256", 320 "RequestCAFile" => test_pem("root-ed448-cert.pem"), 321 "VerifyCAFile" => test_pem("root-ed448-cert.pem"), 437 "SignatureAlgorithms" => "ECDSA+SHA256:ed448", 438 "VerifyCAFile" => test_pem("root-ed448-cert.pem"), 824 "SignatureAlgorithms" => "ed448", [all …]
|
H A D | 20-cert-select.cnf | 79 Ed448.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem 177 Ed448.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem 210 Ed448.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem 591 RequestCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem 592 SignatureAlgorithms = ed448:ECDSA+SHA256 593 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem 789 SignatureAlgorithms = ECDSA+SHA256:ed448 790 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem 1566 SignatureAlgorithms = ed448 1567 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem [all …]
|
/openssl/providers/implementations/signature/ |
H A D | eddsa_sig.c | 1042 IMPL_EDDSA_DISPATCH(ed448,ed448); 1043 IMPL_EDDSA_DISPATCH(ed448ph,ed448); 1080 } ed448; in s390x_ed448_digestsign() member 1088 OPENSSL_cleanse(param.ed448.priv, sizeof(param.ed448.priv)); in s390x_ed448_digestsign() 1092 s390x_flip_endian64(param.ed448.sig, param.ed448.sig); in s390x_ed448_digestsign() 1093 s390x_flip_endian64(param.ed448.sig + 64, param.ed448.sig + 64); in s390x_ed448_digestsign() 1094 memcpy(sig, param.ed448.sig, 57); in s390x_ed448_digestsign() 1129 } ed448; in s390x_ed448_digestverify() member 1135 s390x_flip_endian64(param.ed448.sig, param.ed448.sig); in s390x_ed448_digestverify() 1137 s390x_flip_endian64(param.ed448.sig + 64, param.ed448.sig + 64); in s390x_ed448_digestverify() [all …]
|
/openssl/providers/ |
H A D | encoders.inc | 62 ENCODER_TEXT("ED448", ed448, yes), 208 ENCODER_w_structure("ED448", ed448, yes, der, EncryptedPrivateKeyInfo), 209 ENCODER_w_structure("ED448", ed448, yes, pem, EncryptedPrivateKeyInfo), 210 ENCODER_w_structure("ED448", ed448, yes, der, PrivateKeyInfo), 211 ENCODER_w_structure("ED448", ed448, yes, pem, PrivateKeyInfo), 212 ENCODER_w_structure("ED448", ed448, yes, der, SubjectPublicKeyInfo), 213 ENCODER_w_structure("ED448", ed448, yes, pem, SubjectPublicKeyInfo),
|
H A D | decoders.inc | 64 DECODER_w_structure("ED448", der, PrivateKeyInfo, ed448, yes), 65 DECODER_w_structure("ED448", der, SubjectPublicKeyInfo, ed448, yes),
|
H A D | fips.module.sources | 170 crypto/ec/curve448/ed448.h
|
H A D | fips-sources.checksums | 170 4a45e7828831fbe9f282f933cda54b12cd393ec9bffe5c0ace8e4d1c4d5d6358 crypto/ec/curve448/ed448.h
|
/openssl/test/recipes/95-test_external_tlsfuzzer_data/ |
H A D | cert.json.in | 15 …sa_secp256r1_sha256 ecdsa_secp384r1_sha384 ecdsa_secp521r1_sha512 ed25519 ed448 8+26 8+27 8+28 rsa… 20 …sa_secp256r1_sha256 ecdsa_secp384r1_sha384 ecdsa_secp521r1_sha512 ed25519 ed448 8+26 8+27 8+28 rsa…
|
/openssl/test/certs/ |
H A D | setup.sh | 459 OPENSSL_SIGALG= OPENSSL_KEYALG=ed448 ./mkcert.sh genroot "Root Ed448" \ 460 root-ed448-key root-ed448-cert 461 OPENSSL_SIGALG=ED448 OPENSSL_KEYALG=ed448 ./mkcert.sh genee ed448 \ 462 server-ed448-key server-ed448-cert root-ed448-key root-ed448-cert
|
H A D | mkcert.sh | 58 ed448) ;;
|
/openssl/providers/implementations/encode_decode/ |
H A D | encode_key2any.c | 1412 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, EncryptedPrivateKeyInfo, der); 1413 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, EncryptedPrivateKeyInfo, pem); 1414 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, PrivateKeyInfo, der); 1415 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, PrivateKeyInfo, pem); 1416 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, SubjectPublicKeyInfo, der); 1417 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, SubjectPublicKeyInfo, pem);
|
H A D | decode_der2key.c | 845 MAKE_DECODER("ED448", ed448, ecx, PrivateKeyInfo); 846 MAKE_DECODER("ED448", ed448, ecx, SubjectPublicKeyInfo);
|
H A D | encode_key2text.c | 875 MAKE_TEXT_ENCODER(ed448, ecx);
|
/openssl/doc/man7/ |
H A D | EVP_SIGNATURE-ED25519.pod | 134 Valid algorithm names are B<ed25519>, B<ed448> and B<eddsa>. If B<eddsa> is
|
/openssl/test/recipes/75-test_quicapi_data/ |
H A D | ssltraceref-zlib.txt | 47 ed448 (0x0808)
|
H A D | ssltraceref.txt | 47 ed448 (0x0808)
|
/openssl/providers/implementations/keymgmt/ |
H A D | ecx_kmgmt.c | 1023 MAKE_KEYMGMT_FUNCTIONS(ed448) in MAKE_KEYMGMT_FUNCTIONS()
|
/openssl/ |
H A D | CHANGES.md | 3706 * Check that ed25519 and ed448 are allowed by the security level. Previously
|