/third_party/openssl/crypto/ec/ |
D | ecx_s390x.c | 159 } ed25519; in s390x_ed25519_mul() member 166 s390x_flip_endian32(param.ed25519.x_src, x_src); in s390x_ed25519_mul() 167 s390x_flip_endian32(param.ed25519.y_src, y_src); in s390x_ed25519_mul() 168 s390x_flip_endian32(param.ed25519.d_src, d_src); in s390x_ed25519_mul() 170 rc = s390x_pcc(S390X_SCALAR_MULTIPLY_ED25519, ¶m.ed25519) ? 0 : 1; in s390x_ed25519_mul() 172 s390x_flip_endian32(x_dst, param.ed25519.x_dst); in s390x_ed25519_mul() 173 s390x_flip_endian32(y_dst, param.ed25519.y_dst); in s390x_ed25519_mul() 176 OPENSSL_cleanse(param.ed25519.d_src, sizeof(param.ed25519.d_src)); in s390x_ed25519_mul()
|
D | ecx_meth.c | 1193 } ed25519; in s390x_pkey_ecd_digestsign25519() member 1215 memcpy(param.ed25519.priv, edkey->privkey, sizeof(param.ed25519.priv)); in s390x_pkey_ecd_digestsign25519() 1217 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED25519, ¶m.ed25519, tbs, tbslen); in s390x_pkey_ecd_digestsign25519() 1218 OPENSSL_cleanse(param.ed25519.priv, sizeof(param.ed25519.priv)); in s390x_pkey_ecd_digestsign25519() 1222 s390x_flip_endian32(sig, param.ed25519.sig); in s390x_pkey_ecd_digestsign25519() 1223 s390x_flip_endian32(sig + 32, param.ed25519.sig + 32); in s390x_pkey_ecd_digestsign25519() 1286 } ed25519; in s390x_pkey_ecd_digestverify25519() member 1300 s390x_flip_endian32(param.ed25519.sig, sig); in s390x_pkey_ecd_digestverify25519() 1301 s390x_flip_endian32(param.ed25519.sig + 32, sig + 32); in s390x_pkey_ecd_digestverify25519() 1302 s390x_flip_endian32(param.ed25519.pub, edkey->pubkey); in s390x_pkey_ecd_digestverify25519() [all …]
|
/third_party/openssl/providers/implementations/signature/ |
D | eddsa_sig.c | 370 } ed25519; in s390x_ed25519_digestsign() member 375 memcpy(param.ed25519.priv, edkey->privkey, sizeof(param.ed25519.priv)); in s390x_ed25519_digestsign() 377 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED25519, ¶m.ed25519, tbs, tbslen); in s390x_ed25519_digestsign() 378 OPENSSL_cleanse(param.ed25519.priv, sizeof(param.ed25519.priv)); in s390x_ed25519_digestsign() 382 s390x_flip_endian32(sig, param.ed25519.sig); in s390x_ed25519_digestsign() 383 s390x_flip_endian32(sig + 32, param.ed25519.sig + 32); in s390x_ed25519_digestsign() 422 } ed25519; in s390x_ed25519_digestverify() member 427 s390x_flip_endian32(param.ed25519.sig, sig); in s390x_ed25519_digestverify() 428 s390x_flip_endian32(param.ed25519.sig + 32, sig + 32); in s390x_ed25519_digestverify() 429 s390x_flip_endian32(param.ed25519.pub, edkey->pubkey); in s390x_ed25519_digestverify() [all …]
|
/third_party/openssl/test/ssl-tests/ |
D | 20-cert-select.cnf | 76 Ed25519.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed25519-cert.pem 77 Ed25519.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed25519-key.pem 174 Ed25519.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed25519-cert.pem 175 Ed25519.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed25519-key.pem 207 Ed25519.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed25519-cert.pem 208 Ed25519.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed25519-key.pem 217 SignatureAlgorithms = ECDSA+SHA256:ed25519 267 Ed25519.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed25519-cert.pem 268 Ed25519.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed25519-key.pem 301 Ed25519.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed25519-cert.pem [all …]
|
D | 20-cert-select.cnf.in | 18 "Ed25519.Certificate" => test_pem("server-ed25519-cert.pem"), 19 "Ed25519.PrivateKey" => test_pem("server-ed25519-key.pem"), 30 "Ed25519.Certificate" => test_pem("server-ed25519-cert.pem"), 31 "Ed25519.PrivateKey" => test_pem("server-ed25519-key.pem"), 143 "SignatureAlgorithms" => "ECDSA+SHA256:ed25519", 302 "SignatureAlgorithms" => "ed25519:ECDSA+SHA256", 337 "SignatureAlgorithms" => "ECDSA+SHA256:ed25519", 373 "Ed25519.Certificate" => test_pem("client-ed25519-cert.pem"), 374 "Ed25519.PrivateKey" => test_pem("client-ed25519-key.pem"), 411 "Ed25519.Certificate" => test_pem("server-ed25519-cert.pem"), [all …]
|
/third_party/openssl/providers/ |
D | encoders.inc | 60 ENCODER_TEXT("ED25519", ed25519, yes), 198 ENCODER_w_structure("ED25519", ed25519, yes, der, EncryptedPrivateKeyInfo), 199 ENCODER_w_structure("ED25519", ed25519, yes, pem, EncryptedPrivateKeyInfo), 200 ENCODER_w_structure("ED25519", ed25519, yes, der, PrivateKeyInfo), 201 ENCODER_w_structure("ED25519", ed25519, yes, pem, PrivateKeyInfo), 202 ENCODER_w_structure("ED25519", ed25519, yes, der, SubjectPublicKeyInfo), 203 ENCODER_w_structure("ED25519", ed25519, yes, pem, SubjectPublicKeyInfo),
|
D | decoders.inc | 61 DECODER_w_structure("ED25519", der, PrivateKeyInfo, ed25519, yes), 62 DECODER_w_structure("ED25519", der, SubjectPublicKeyInfo, ed25519, yes),
|
/third_party/openssl/providers/implementations/encode_decode/ |
D | encode_key2any.c | 1396 MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, EncryptedPrivateKeyInfo, der); 1397 MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, EncryptedPrivateKeyInfo, pem); 1398 MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, PrivateKeyInfo, der); 1399 MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, PrivateKeyInfo, pem); 1400 MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, SubjectPublicKeyInfo, der); 1401 MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, SubjectPublicKeyInfo, pem);
|
D | decode_der2key.c | 779 MAKE_DECODER("ED25519", ed25519, ecx, PrivateKeyInfo); 780 MAKE_DECODER("ED25519", ed25519, ecx, SubjectPublicKeyInfo);
|
D | encode_key2text.c | 883 MAKE_TEXT_ENCODER(ed25519, ecx);
|
/third_party/ltp/testcases/network/stress/ssh/ |
D | ssh-stress.sh | 66 ssh-keygen -q -N "" -t ed25519 -f $TST_TMPDIR/ssh_host_ed25519_key
|
/third_party/openssl/doc/man7/ |
D | EVP_SIGNATURE-ED25519.pod | 62 Valid algorithm names are B<ed25519>, B<ed448> and B<eddsa>. If B<eddsa> is
|
/third_party/openssl/test/certs/ |
D | mkcert.sh | 57 ed25519) ;;
|
/third_party/libwebsockets/plugins/ |
D | CMakeLists.txt | 197 …telnet.c;ssh-base/kex-25519.c" "ssh-base/crypto/chacha.c;ssh-base/crypto/ed25519.c;ssh-base/crypto…
|
/third_party/node/deps/npm/node_modules/sshpk/ |
D | README.md | 248 and `'ed25519'` 326 only supported to change between `ed25519` and `curve25519` keys which are 332 - `newType` -- String, type of key to derive, either `ed25519` or `curve25519`
|
/third_party/node/deps/npm/node_modules/tweetnacl/ |
D | README.md | 209 Implements [ed25519](http://ed25519.cr.yp.to).
|
/third_party/openssl/providers/implementations/keymgmt/ |
D | ecx_kmgmt.c | 822 MAKE_KEYMGMT_FUNCTIONS(ed25519) in MAKE_KEYMGMT_FUNCTIONS()
|
/third_party/openssl/doc/man3/ |
D | SSL_CONF_cmd.pod | 117 B<ed25519>, or B<rsa_pss_pss_sha256>. 350 specified using the IETF name, e.g., B<ecdsa_secp256r1_sha256>, B<ed25519>,
|
/third_party/node/doc/api/ |
D | crypto.md | 1264 description: Added support for `'ed25519'` and `'ed448'`. 1278 * `'ed25519'` (OID 1.3.101.112) 2153 * `type`: {string} Must be `'rsa'`, `'dsa'`, `'ec'`, `'ed25519'`, `'ed448'`, 2223 * `type`: {string} Must be `'rsa'`, `'dsa'`, `'ec'`, `'ed25519'`, `'ed448'`,
|
/third_party/libwebsockets/plugins/ssh-base/crypto/ |
D | ge25519_base.data | 6 * Copied from supercop-20130419/crypto_sign/ed25519/ref/ge25519_base.data
|
/third_party/node/doc/changelogs/ |
D | CHANGELOG_V12.md | 2910 * [[`adb0197d6d`](https://github.com/nodejs/node/commit/adb0197d6d)] - **test**: move ed25519 keypa… 2936 * [[`1f2de2fbe1`](https://github.com/nodejs/node/commit/1f2de2fbe1)] - **test**: move ed25519 keypa…
|
/third_party/openssl/ |
D | CHANGES.md | 2325 * Check that ed25519 and ed448 are allowed by the security level. Previously
|