/freebsd/crypto/openssl/crypto/ec/ |
H A D | ecx_s390x.c | 193 } ed448; in s390x_ed448_mul() member 200 memcpy(param.ed448.x_src, x_src, 57); in s390x_ed448_mul() 201 memcpy(param.ed448.y_src, y_src, 57); in s390x_ed448_mul() 202 memcpy(param.ed448.d_src, d_src, 57); in s390x_ed448_mul() 203 s390x_flip_endian64(param.ed448.x_src, param.ed448.x_src); in s390x_ed448_mul() 204 s390x_flip_endian64(param.ed448.y_src, param.ed448.y_src); in s390x_ed448_mul() 205 s390x_flip_endian64(param.ed448.d_src, param.ed448.d_src); in s390x_ed448_mul() 207 rc = s390x_pcc(S390X_SCALAR_MULTIPLY_ED448, ¶m.ed448) ? 0 : 1; in s390x_ed448_mul() 209 s390x_flip_endian64(param.ed448.x_dst, param.ed448.x_dst); in s390x_ed448_mul() 210 s390x_flip_endian64(param.ed448.y_dst, param.ed448.y_dst); in s390x_ed448_mul() [all …]
|
H A D | ecx_meth.c | 1238 } ed448; in s390x_pkey_ecd_digestsign448() member 1260 memcpy(param.ed448.priv + 64 - 57, edkey->privkey, 57); in s390x_pkey_ecd_digestsign448() 1262 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED448, ¶m.ed448, tbs, tbslen); in s390x_pkey_ecd_digestsign448() 1263 OPENSSL_cleanse(param.ed448.priv, sizeof(param.ed448.priv)); in s390x_pkey_ecd_digestsign448() 1267 s390x_flip_endian64(param.ed448.sig, param.ed448.sig); in s390x_pkey_ecd_digestsign448() 1268 s390x_flip_endian64(param.ed448.sig + 64, param.ed448.sig + 64); in s390x_pkey_ecd_digestsign448() 1269 memcpy(sig, param.ed448.sig, 57); in s390x_pkey_ecd_digestsign448() 1270 memcpy(sig + 57, param.ed448.sig + 64, 57); in s390x_pkey_ecd_digestsign448() 1318 } ed448; in s390x_pkey_ecd_digestverify448() member 1332 memcpy(param.ed448.sig, sig, 57); in s390x_pkey_ecd_digestverify448() [all …]
|
/freebsd/crypto/openssl/providers/implementations/signature/ |
H A D | eddsa_sig.c | 404 } ed448; in s390x_ed448_digestsign() member 409 memcpy(param.ed448.priv + 64 - 57, edkey->privkey, 57); in s390x_ed448_digestsign() 411 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED448, ¶m.ed448, tbs, tbslen); in s390x_ed448_digestsign() 412 OPENSSL_cleanse(param.ed448.priv, sizeof(param.ed448.priv)); in s390x_ed448_digestsign() 416 s390x_flip_endian64(param.ed448.sig, param.ed448.sig); in s390x_ed448_digestsign() 417 s390x_flip_endian64(param.ed448.sig + 64, param.ed448.sig + 64); in s390x_ed448_digestsign() 418 memcpy(sig, param.ed448.sig, 57); in s390x_ed448_digestsign() 419 memcpy(sig + 57, param.ed448.sig + 64, 57); in s390x_ed448_digestsign() 453 } ed448; in s390x_ed448_digestverify() member 458 memcpy(param.ed448.sig, sig, 57); in s390x_ed448_digestverify() [all …]
|
/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 28-seclevel.cnf.in | 30 "Certificate" => test_pem("server-ed448-cert.pem"), 31 "PrivateKey" => test_pem("server-ed448-key.pem") }, 33 "VerifyCAFile" => test_pem("root-ed448-cert.pem") }, 43 "Certificate" => test_pem("server-ed448-cert.pem"), 44 "PrivateKey" => test_pem("server-ed448-key.pem") }, 46 "VerifyCAFile" => test_pem("root-ed448-cert.pem") }, 54 "Certificate" => test_pem("server-ed448-cert.pem"), 55 "PrivateKey" => test_pem("server-ed448-key.pem") }, 57 "VerifyCAFile" => test_pem("root-ed448-cert.pem") }, 79 "Certificate" => test_pem("server-ed448 [all...] |
H A D | 28-seclevel.cnf | 44 Certificate = ${ENV::TEST_CERTS_DIR}/server-ed448-cert.pem 46 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem 50 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem 67 Certificate = ${ENV::TEST_CERTS_DIR}/server-ed448-cert.pem 69 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem 73 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem 90 Certificate = ${ENV::TEST_CERTS_DIR}/server-ed448-cert.pem 92 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem 96 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem 137 Certificate = ${ENV::TEST_CERTS_DIR}/server-ed448-cert.pem [all …]
|
H A D | 20-cert-select.cnf.in | 20 "Ed448.Certificate" => test_pem("server-ed448-cert.pem"), 21 "Ed448.PrivateKey" => test_pem("server-ed448-key.pem"), 32 "Ed448.Certificate" => test_pem("server-ed448-cert.pem"), 33 "Ed448.PrivateKey" => test_pem("server-ed448-key.pem"), 319 "SignatureAlgorithms" => "ed448:ECDSA+SHA256", 320 "RequestCAFile" => test_pem("root-ed448-cert.pem"), 321 "VerifyCAFile" => test_pem("root-ed448-cert.pem"), 356 "Ed448.Certificate" => test_pem("client-ed448-cert.pem"), 357 "Ed448.PrivateKey" => test_pem("client-ed448-key.pem"), 378 "Ed448.Certificate" => test_pem("server-ed448 [all...] |
H A D | 20-cert-select.cnf | 78 Ed448.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed448-cert.pem 79 Ed448.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem 176 Ed448.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed448-cert.pem 177 Ed448.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem 209 Ed448.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed448-cert.pem 210 Ed448.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem 269 Ed448.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed448-cert.pem 270 Ed448.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem 303 Ed448.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed448-cert.pem 304 Ed448.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448 [all...] |
/freebsd/crypto/openssl/providers/ |
H A D | encoders.inc | 61 ENCODER_TEXT("ED448", ed448, yes), 205 ENCODER_w_structure("ED448", ed448, yes, der, EncryptedPrivateKeyInfo), 206 ENCODER_w_structure("ED448", ed448, yes, pem, EncryptedPrivateKeyInfo), 207 ENCODER_w_structure("ED448", ed448, yes, der, PrivateKeyInfo), 208 ENCODER_w_structure("ED448", ed448, yes, pem, PrivateKeyInfo), 209 ENCODER_w_structure("ED448", ed448, yes, der, SubjectPublicKeyInfo), 210 ENCODER_w_structure("ED448", ed448, yes, pem, SubjectPublicKeyInfo),
|
H A D | decoders.inc | 63 DECODER_w_structure("ED448", der, PrivateKeyInfo, ed448, yes), 64 DECODER_w_structure("ED448", der, SubjectPublicKeyInfo, ed448, yes),
|
H A D | fips.module.sources | 159 crypto/ec/curve448/ed448.h
|
H A D | fips-sources.checksums | 159 4a45e7828831fbe9f282f933cda54b12cd393ec9bffe5c0ace8e4d1c4d5d6358 crypto/ec/curve448/ed448.h
|
/freebsd/crypto/openssl/test/certs/ |
H A D | setup.sh | 430 OPENSSL_SIGALG= OPENSSL_KEYALG=ed448 ./mkcert.sh genroot "Root Ed448" \ 431 root-ed448-key root-ed448-cert 432 OPENSSL_SIGALG=ED448 OPENSSL_KEYALG=ed448 ./mkcert.sh genee ed448 \ 433 server-ed448-key server-ed448-cert root-ed448-key root-ed448-cert
|
H A D | mkcert.sh | 58 ed448) ;;
|
/freebsd/crypto/openssl/providers/implementations/encode_decode/ |
H A D | encode_key2any.c | 1413 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, EncryptedPrivateKeyInfo, der); 1414 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, EncryptedPrivateKeyInfo, pem); 1415 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, PrivateKeyInfo, der); 1416 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, PrivateKeyInfo, pem); 1417 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, SubjectPublicKeyInfo, der); 1418 MAKE_ENCODER(ed448, ecx, EVP_PKEY_ED448, SubjectPublicKeyInfo, pem);
|
H A D | decode_der2key.c | 804 MAKE_DECODER("ED448", ed448, ecx, PrivateKeyInfo); 805 MAKE_DECODER("ED448", ed448, ecx, SubjectPublicKeyInfo);
|
H A D | encode_key2text.c | 872 MAKE_TEXT_ENCODER(ed448, ecx);
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_SIGNATURE-ED25519.pod | 62 Valid algorithm names are B<ed25519>, B<ed448> and B<eddsa>. If B<eddsa> is
|
/freebsd/crypto/openssh/ |
H A D | PROTOCOL.sshsig | 48 draft-ietf-curdle-ssh-ed25519-ed448, etc.
|
/freebsd/contrib/ldns/ |
H A D | configure.ac | 599 AC_ARG_ENABLE(ed448, AC_HELP_STRING([--disable-ed448], [Disable (experimental) ED448 support. Defau… optenable 608 …e_ed448" = "xyes"; then AC_MSG_ERROR([OpenSSL does not support ED448 and you used --enable-ed448.])
|
H A D | Changelog | 131 OpenSSL. Disable with --disable-ed25519 and --disable-ed448.
|
H A D | configure | 1502 --disable-ed448 Disable (experimental) ED448 support. Default is
|
/freebsd/crypto/openssl/providers/implementations/keymgmt/ |
H A D | ecx_kmgmt.c | 826 MAKE_KEYMGMT_FUNCTIONS(ed448) in MAKE_KEYMGMT_FUNCTIONS()
|
/freebsd/contrib/unbound/ |
H A D | configure.ac | 1333 AC_ARG_ENABLE(ed448, AS_HELP_STRING([--disable-ed448],[Disable ED448 support])) optenable 1342 …e_ed448" = "xyes"; then AC_MSG_ERROR([OpenSSL does not support ED448 and you used --enable-ed448.])
|
H A D | configure | 1621 --disable-ed448 Disable ED448 support
|
/freebsd/crypto/openssl/ |
H A D | CHANGES.md | 2725 * Check that ed25519 and ed448 are allowed by the security level. Previously
|