/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_PKEY-SM2.pod | 5 EVP_PKEY-SM2, EVP_KEYMGMT-SM2, SM2 6 - EVP_PKEY keytype support for the Chinese SM2 signature and encryption algorithms 10 The B<SM2> algorithm was first defined by the Chinese national standard GM/T 11 0003-2012 and was later standardized by ISO as ISO/IEC 14888. B<SM2> is actually 15 When doing the B<SM2> signature algorithm, it requires a distinguishing identifier 18 =head2 Common SM2 parameters 20 SM2 uses the parameters defined in L<EVP_PKEY-EC(7)/Common EC parameters>. 27 This parameter is ignored for B<SM2> [all...] |
H A D | EVP_ASYM_CIPHER-SM2.pod | 5 EVP_ASYM_CIPHER-SM2 6 - SM2 Asymmetric Cipher algorithm support 10 Asymmetric Cipher support for the B<SM2> key type. 12 =head2 SM2 Asymmetric Cipher parameters 26 L<EVP_PKEY-SM2(7)>,
|
H A D | OSSL_PROVIDER-default.pod | 191 =item SM2, see L<EVP_ASYM_CIPHER-SM2(7)>
|
H A D | migration_guide.pod | 397 =head4 SM2 key changes 399 EC EVP_PKEYs with the SM2 curve have been reworked to automatically become 403 call C<EVP_PKEY_set_alias_type(pkey, EVP_PKEY_SM2)> to get SM2 computations. 407 SM2 keys directly and must not create an EVP_PKEY_EC key first. It is no longer 408 possible to import an SM2 key with domain parameters other than the SM2 elliptic 411 Validation of SM2 keys has been separated from the validation of regular EC 412 keys, allowing to improve the SM2 validation process to reject loaded private 413 keys that are not conforming to the SM2 ISO standard.
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_sm2.txt | 19 Title = SM2 tests 66 Output = "Some longer plaintext for testing SM2 decryption. Blah blah blah blah blah blah blah blah… 68 # This is a "fake" test as it does only verify that the SM2 EVP_PKEY interface 78 Title = SM2 key generation tests 80 KeyGen = SM2 83 KeyGen = SM2
|
/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | Makefile | 2 MAN+= EVP_ASYM_CIPHER-SM2.7 63 MAN+= EVP_PKEY-SM2.7 138 MLINKS+= EVP_PKEY-SM2.7 EVP_KEYMGMT-SM2.7 163 MLINKS+= EVP_PKEY-SM2.7 SM2.7
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | X509_get0_distinguishing_id.pod | 31 The SM2 signature algorithm requires a Distinguishing ID value when generating 33 In the context of SM2, the Distinguishing ID is often referred to as the "SM2 62 L<X509_verify(3)>, L<SM2(7)>
|
H A D | EVP_PKEY_get_group_name.pod | 26 SM2 keys. Other providers may support this for additional key types.
|
H A D | EVP_PKEY_get_field_type.pod | 29 SM2 keys. Other providers may support this for additional key types.
|
H A D | EVP_PKEY_set1_RSA.pod | 173 the passed B<EC_KEY> is an L<SM2(7)> key, and will set the B<EVP_PKEY> 207 L<EVP_PKEY_new(3)>, L<SM2(7)>
|
/freebsd/contrib/llvm-project/clang/lib/Basic/ |
H A D | Cuda.cpp | 82 #define SM2(sm, ca) {OffloadArch::SM_##sm, "sm_" #sm, ca} macro 83 #define SM(sm) SM2(sm, "compute_" #sm) 88 SM2(20, "compute_20"), SM2(21, "compute_20"), // Fermi 154 #undef SM2
|
/freebsd/crypto/openssl/providers/ |
H A D | encoders.inc | 65 ENCODER_TEXT("SM2", sm2, no), 114 ENCODER_w_structure("SM2", sm2, no, der, type_specific_no_pub), 115 ENCODER_w_structure("SM2", sm2, no, pem, type_specific_no_pub), 116 ENCODER("SM2", sm2, no, blob), 213 ENCODER_w_structure("SM2", sm2, no, der, EncryptedPrivateKeyInfo), 214 ENCODER_w_structure("SM2", sm2, no, pem, EncryptedPrivateKeyInfo), 215 ENCODER_w_structure("SM2", sm2, no, der, PrivateKeyInfo), 216 ENCODER_w_structure("SM2", sm2, no, pem, PrivateKeyInfo), 217 ENCODER_w_structure("SM2", sm2, no, der, SubjectPublicKeyInfo), 218 ENCODER_w_structure("SM2", sm2, no, pem, SubjectPublicKeyInfo),
|
H A D | decoders.inc | 70 DECODER_w_structure("SM2", der, PrivateKeyInfo, sm2, no), 71 DECODER_w_structure("SM2", der, SubjectPublicKeyInfo, sm2, no),
|
/freebsd/crypto/openssl/providers/common/der/ |
H A D | SM2.asn1 | 12 -- OID for SM2 signatures with SM3 16 -- Named Elliptic Curves of SM2
|
H A D | build.info | 85 #----- SM2 92 DEPEND[$DER_SM2_GEN]=oids_to_c.pm SM2.asn1 97 DEPEND[$DER_SM2_H]=oids_to_c.pm SM2.asn1
|
H A D | der_sm2_gen.c.in | 16 $OUT = oids_to_c::process_leaves('providers/common/der/SM2.asn1',
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-pkeyutl.pod.in | 69 the default digest algorithm is SHA-256. For SM2, it is SM3. 361 =head1 SM2 chapter 363 The SM2 algorithm supports sign, verify, encrypt and decrypt operations. For 364 the sign and verify operations, SM2 requires an Distinguishing ID string to 371 This sets the ID string used in SM2 sign or verify operations. While verifying 372 an SM2 signature, the ID string must be the same one used when signing the data. 377 This sets the ID string used in SM2 sign or verify operations. While verifying 378 an SM2 signature, the ID string must be the same one used when signing the data. 422 Sign some data using an L<SM2(7)> private key and a specific ID: 427 Verify some data using an L<SM2(7)> certificate and a specific ID:
|
/freebsd/crypto/libecc/src/sig/ |
H A D | sm2.c | 43 ret = priv_key_check_initialized_and_type(priv_key, SM2); EG(ret, err); in sm2_gen_priv_key() 65 ret = priv_key_check_initialized_and_type(in_priv, SM2); EG(ret, err); in sm2_init_pub_key() 86 out_pub->key_type = SM2; in sm2_init_pub_key() 152 ret = pub_key_check_initialized_and_type(pub_key, SM2); EG(ret, err); in sm2_compute_Z() 257 ret = key_pair_check_initialized_and_type(ctx->key_pair, SM2); EG(ret, err); in _sm2_sign_init() 533 ret = pub_key_check_initialized_and_type(ctx->pub_key, SM2); EG(ret, err); in _sm2_verify_init()
|
/freebsd/crypto/openssl/providers/common/include/prov/ |
H A D | der_sm2.h.in | 17 $OUT = oids_to_c::process_leaves('providers/common/der/SM2.asn1',
|
/freebsd/crypto/libecc/include/libecc/ |
H A D | lib_ecc_types.h | 46 SM2 = 8, enumerator
|
/freebsd/crypto/openssl/test/ |
H A D | endecode_test.c | 1032 KEYS(SM2); 1033 IMPLEMENT_TEST_SUITE(SM2, "SM2", 0) 1389 MAKE_KEYS(SM2, "SM2", NULL); in setup_tests() 1440 ADD_TEST_SUITE(SM2); in setup_tests() 1501 FREE_KEYS(SM2); in cleanup_tests()
|
/freebsd/sys/contrib/device-tree/src/arm64/freescale/ |
H A D | imx8mp-msc-sm2s-ep1.dts | 13 model = "MSC SM2-MB-EP1 Carrier Board with SM2S-IMX8PLUS-QC6-14N0600E SoM";
|
/freebsd/sys/contrib/device-tree/Bindings/regulator/ |
H A D | tps6586x.txt | 18 - vin-sm2-supply: The input supply for the SM2.
|
/freebsd/crypto/openssl/crypto/err/ |
H A D | openssl.ec | 39 L SM2 NONE crypto/sm2/sm2_err.c include/crypto/sm2err.h
|
/freebsd/crypto/libecc/src/tests/ |
H A D | ec_self_tests_core.c | 1402 if(sig->type == SM2) 1405 if((sig->type == EDDSA25519CTX) || (sig->type == SM2)) 1834 if(sig->type == SM2) 1837 if((sig->type == EDDSA25519CTX) || (sig->type == SM2))
|