Home
last modified time | relevance | path

Searched refs:ed448 (Results 1 – 22 of 22) sorted by relevance

/openssl/crypto/ec/
H A Decx_s390x.c193 } ed448; in s390x_ed448_mul() member
200 memcpy(param.ed448.x_src, x_src, 57); in s390x_ed448_mul()
201 memcpy(param.ed448.y_src, y_src, 57); in s390x_ed448_mul()
202 memcpy(param.ed448.d_src, d_src, 57); in s390x_ed448_mul()
203 s390x_flip_endian64(param.ed448.x_src, param.ed448.x_src); in s390x_ed448_mul()
204 s390x_flip_endian64(param.ed448.y_src, param.ed448.y_src); in s390x_ed448_mul()
205 s390x_flip_endian64(param.ed448.d_src, param.ed448.d_src); in s390x_ed448_mul()
209 s390x_flip_endian64(param.ed448.x_dst, param.ed448.x_dst); in s390x_ed448_mul()
210 s390x_flip_endian64(param.ed448.y_dst, param.ed448.y_dst); in s390x_ed448_mul()
211 memcpy(x_dst, param.ed448.x_dst, 57); in s390x_ed448_mul()
[all …]
H A Decx_meth.c1241 } ed448; in s390x_pkey_ecd_digestsign448() member
1266 OPENSSL_cleanse(param.ed448.priv, sizeof(param.ed448.priv)); in s390x_pkey_ecd_digestsign448()
1270 s390x_flip_endian64(param.ed448.sig, param.ed448.sig); in s390x_pkey_ecd_digestsign448()
1271 s390x_flip_endian64(param.ed448.sig + 64, param.ed448.sig + 64); in s390x_pkey_ecd_digestsign448()
1272 memcpy(sig, param.ed448.sig, 57); in s390x_pkey_ecd_digestsign448()
1273 memcpy(sig + 57, param.ed448.sig + 64, 57); in s390x_pkey_ecd_digestsign448()
1321 } ed448; in s390x_pkey_ecd_digestverify448() member
1335 memcpy(param.ed448.sig, sig, 57); in s390x_pkey_ecd_digestverify448()
1336 s390x_flip_endian64(param.ed448.sig, param.ed448.sig); in s390x_pkey_ecd_digestverify448()
1338 s390x_flip_endian64(param.ed448.sig + 64, param.ed448.sig + 64); in s390x_pkey_ecd_digestverify448()
[all …]
/openssl/test/ssl-tests/
H A D28-seclevel.cnf.in30 "Certificate" => test_pem("server-ed448-cert.pem"),
31 "PrivateKey" => test_pem("server-ed448-key.pem") },
33 "VerifyCAFile" => test_pem("root-ed448-cert.pem") },
43 "Certificate" => test_pem("server-ed448-cert.pem"),
44 "PrivateKey" => test_pem("server-ed448-key.pem") },
46 "VerifyCAFile" => test_pem("root-ed448-cert.pem") },
54 "Certificate" => test_pem("server-ed448-cert.pem"),
55 "PrivateKey" => test_pem("server-ed448-key.pem") },
57 "VerifyCAFile" => test_pem("root-ed448-cert.pem") },
79 "Certificate" => test_pem("server-ed448-cert.pem"),
[all …]
H A D28-seclevel.cnf44 Certificate = ${ENV::TEST_CERTS_DIR}/server-ed448-cert.pem
46 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem
50 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem
67 Certificate = ${ENV::TEST_CERTS_DIR}/server-ed448-cert.pem
69 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem
73 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem
90 Certificate = ${ENV::TEST_CERTS_DIR}/server-ed448-cert.pem
92 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem
96 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem
140 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem
[all …]
H A D20-cert-select.cnf.in20 "Ed448.Certificate" => test_pem("server-ed448-cert.pem"),
21 "Ed448.PrivateKey" => test_pem("server-ed448-key.pem"),
32 "Ed448.Certificate" => test_pem("server-ed448-cert.pem"),
33 "Ed448.PrivateKey" => test_pem("server-ed448-key.pem"),
319 "SignatureAlgorithms" => "ed448:ECDSA+SHA256",
320 "RequestCAFile" => test_pem("root-ed448-cert.pem"),
321 "VerifyCAFile" => test_pem("root-ed448-cert.pem"),
437 "SignatureAlgorithms" => "ECDSA+SHA256:ed448",
438 "VerifyCAFile" => test_pem("root-ed448-cert.pem"),
824 "SignatureAlgorithms" => "ed448",
[all …]
H A D20-cert-select.cnf79 Ed448.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem
177 Ed448.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem
210 Ed448.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem
591 RequestCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem
592 SignatureAlgorithms = ed448:ECDSA+SHA256
593 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem
789 SignatureAlgorithms = ECDSA+SHA256:ed448
790 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem
1566 SignatureAlgorithms = ed448
1567 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem
[all …]
/openssl/providers/implementations/signature/
H A Deddsa_sig.c1038 IMPL_EDDSA_DISPATCH(ed448,ed448);
1039 IMPL_EDDSA_DISPATCH(ed448ph,ed448);
1076 } ed448; in s390x_ed448_digestsign() member
1084 OPENSSL_cleanse(param.ed448.priv, sizeof(param.ed448.priv)); in s390x_ed448_digestsign()
1088 s390x_flip_endian64(param.ed448.sig, param.ed448.sig); in s390x_ed448_digestsign()
1089 s390x_flip_endian64(param.ed448.sig + 64, param.ed448.sig + 64); in s390x_ed448_digestsign()
1090 memcpy(sig, param.ed448.sig, 57); in s390x_ed448_digestsign()
1125 } ed448; in s390x_ed448_digestverify() member
1131 s390x_flip_endian64(param.ed448.sig, param.ed448.sig); in s390x_ed448_digestverify()
1133 s390x_flip_endian64(param.ed448.sig + 64, param.ed448.sig + 64); in s390x_ed448_digestverify()
[all …]
/openssl/test/recipes/95-test_external_tlsfuzzer_data/
H A Dcert.json.in14 …"-s", "ecdsa_secp256r1_sha256 ecdsa_secp384r1_sha384 ecdsa_secp521r1_sha512 ed25519 ed448 8+26 8+2…
19 …"-s", "ecdsa_secp256r1_sha256 ecdsa_secp384r1_sha384 ecdsa_secp521r1_sha512 ed25519 ed448 8+26 8+2…
/openssl/providers/
H A Dencoders.inc62 ENCODER_TEXT("ED448", ed448, yes),
208 ENCODER_w_structure("ED448", ed448, yes, der, EncryptedPrivateKeyInfo),
209 ENCODER_w_structure("ED448", ed448, yes, pem, EncryptedPrivateKeyInfo),
210 ENCODER_w_structure("ED448", ed448, yes, der, PrivateKeyInfo),
211 ENCODER_w_structure("ED448", ed448, yes, pem, PrivateKeyInfo),
212 ENCODER_w_structure("ED448", ed448, yes, der, SubjectPublicKeyInfo),
213 ENCODER_w_structure("ED448", ed448, yes, pem, SubjectPublicKeyInfo),
H A Ddecoders.inc64 DECODER_w_structure("ED448", der, PrivateKeyInfo, ed448, yes),
65 DECODER_w_structure("ED448", der, SubjectPublicKeyInfo, ed448, yes),
H A Dfips.module.sources170 crypto/ec/curve448/ed448.h
H A Dfips-sources.checksums170 4a45e7828831fbe9f282f933cda54b12cd393ec9bffe5c0ace8e4d1c4d5d6358 crypto/ec/curve448/ed448.h
/openssl/test/certs/
H A Dsetup.sh459 OPENSSL_SIGALG= OPENSSL_KEYALG=ed448 ./mkcert.sh genroot "Root Ed448" \
460 root-ed448-key root-ed448-cert
461 OPENSSL_SIGALG=ED448 OPENSSL_KEYALG=ed448 ./mkcert.sh genee ed448 \
462 server-ed448-key server-ed448-cert root-ed448-key root-ed448-cert
H A Dmkcert.sh58 ed448) ;;
/openssl/providers/implementations/encode_decode/
H A Dencode_key2any.c1412 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, EncryptedPrivateKeyInfo, der);
1413 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, EncryptedPrivateKeyInfo, pem);
1414 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, PrivateKeyInfo, der);
1415 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, PrivateKeyInfo, pem);
1416 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, SubjectPublicKeyInfo, der);
1417 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, SubjectPublicKeyInfo, pem);
H A Ddecode_der2key.c845 MAKE_DECODER("ED448", ed448, ecx, PrivateKeyInfo);
846 MAKE_DECODER("ED448", ed448, ecx, SubjectPublicKeyInfo);
H A Dencode_key2text.c874 MAKE_TEXT_ENCODER(ed448, ecx);
/openssl/doc/man7/
H A DEVP_SIGNATURE-ED25519.pod134 Valid algorithm names are B<ed25519>, B<ed448> and B<eddsa>. If B<eddsa> is
/openssl/test/recipes/75-test_quicapi_data/
H A Dssltraceref-zlib.txt47 ed448 (0x0808)
H A Dssltraceref.txt47 ed448 (0x0808)
/openssl/providers/implementations/keymgmt/
H A Decx_kmgmt.c1023 MAKE_KEYMGMT_FUNCTIONS(ed448) in MAKE_KEYMGMT_FUNCTIONS()
/openssl/
H A DCHANGES.md3641 * Check that ed25519 and ed448 are allowed by the security level. Previously

Completed in 109 milliseconds