Home
last modified time | relevance | path

Searched refs:ed25519 (Results 1 – 22 of 22) sorted by relevance

/third_party/openssl/crypto/ec/
Decx_s390x.c159 } ed25519; in s390x_ed25519_mul() member
166 s390x_flip_endian32(param.ed25519.x_src, x_src); in s390x_ed25519_mul()
167 s390x_flip_endian32(param.ed25519.y_src, y_src); in s390x_ed25519_mul()
168 s390x_flip_endian32(param.ed25519.d_src, d_src); in s390x_ed25519_mul()
170 rc = s390x_pcc(S390X_SCALAR_MULTIPLY_ED25519, &param.ed25519) ? 0 : 1; in s390x_ed25519_mul()
172 s390x_flip_endian32(x_dst, param.ed25519.x_dst); in s390x_ed25519_mul()
173 s390x_flip_endian32(y_dst, param.ed25519.y_dst); in s390x_ed25519_mul()
176 OPENSSL_cleanse(param.ed25519.d_src, sizeof(param.ed25519.d_src)); in s390x_ed25519_mul()
Decx_meth.c1193 } ed25519; in s390x_pkey_ecd_digestsign25519() member
1215 memcpy(param.ed25519.priv, edkey->privkey, sizeof(param.ed25519.priv)); in s390x_pkey_ecd_digestsign25519()
1217 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED25519, &param.ed25519, tbs, tbslen); in s390x_pkey_ecd_digestsign25519()
1218 OPENSSL_cleanse(param.ed25519.priv, sizeof(param.ed25519.priv)); in s390x_pkey_ecd_digestsign25519()
1222 s390x_flip_endian32(sig, param.ed25519.sig); in s390x_pkey_ecd_digestsign25519()
1223 s390x_flip_endian32(sig + 32, param.ed25519.sig + 32); in s390x_pkey_ecd_digestsign25519()
1286 } ed25519; in s390x_pkey_ecd_digestverify25519() member
1300 s390x_flip_endian32(param.ed25519.sig, sig); in s390x_pkey_ecd_digestverify25519()
1301 s390x_flip_endian32(param.ed25519.sig + 32, sig + 32); in s390x_pkey_ecd_digestverify25519()
1302 s390x_flip_endian32(param.ed25519.pub, edkey->pubkey); in s390x_pkey_ecd_digestverify25519()
[all …]
/third_party/openssl/providers/implementations/signature/
Deddsa_sig.c370 } ed25519; in s390x_ed25519_digestsign() member
375 memcpy(param.ed25519.priv, edkey->privkey, sizeof(param.ed25519.priv)); in s390x_ed25519_digestsign()
377 rc = s390x_kdsa(S390X_EDDSA_SIGN_ED25519, &param.ed25519, tbs, tbslen); in s390x_ed25519_digestsign()
378 OPENSSL_cleanse(param.ed25519.priv, sizeof(param.ed25519.priv)); in s390x_ed25519_digestsign()
382 s390x_flip_endian32(sig, param.ed25519.sig); in s390x_ed25519_digestsign()
383 s390x_flip_endian32(sig + 32, param.ed25519.sig + 32); in s390x_ed25519_digestsign()
422 } ed25519; in s390x_ed25519_digestverify() member
427 s390x_flip_endian32(param.ed25519.sig, sig); in s390x_ed25519_digestverify()
428 s390x_flip_endian32(param.ed25519.sig + 32, sig + 32); in s390x_ed25519_digestverify()
429 s390x_flip_endian32(param.ed25519.pub, edkey->pubkey); in s390x_ed25519_digestverify()
[all …]
/third_party/openssl/test/ssl-tests/
D20-cert-select.cnf76 Ed25519.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed25519-cert.pem
77 Ed25519.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed25519-key.pem
174 Ed25519.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed25519-cert.pem
175 Ed25519.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed25519-key.pem
207 Ed25519.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed25519-cert.pem
208 Ed25519.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed25519-key.pem
217 SignatureAlgorithms = ECDSA+SHA256:ed25519
267 Ed25519.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed25519-cert.pem
268 Ed25519.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed25519-key.pem
301 Ed25519.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed25519-cert.pem
[all …]
D20-cert-select.cnf.in18 "Ed25519.Certificate" => test_pem("server-ed25519-cert.pem"),
19 "Ed25519.PrivateKey" => test_pem("server-ed25519-key.pem"),
30 "Ed25519.Certificate" => test_pem("server-ed25519-cert.pem"),
31 "Ed25519.PrivateKey" => test_pem("server-ed25519-key.pem"),
143 "SignatureAlgorithms" => "ECDSA+SHA256:ed25519",
302 "SignatureAlgorithms" => "ed25519:ECDSA+SHA256",
337 "SignatureAlgorithms" => "ECDSA+SHA256:ed25519",
373 "Ed25519.Certificate" => test_pem("client-ed25519-cert.pem"),
374 "Ed25519.PrivateKey" => test_pem("client-ed25519-key.pem"),
411 "Ed25519.Certificate" => test_pem("server-ed25519-cert.pem"),
[all …]
/third_party/openssl/providers/
Dencoders.inc60 ENCODER_TEXT("ED25519", ed25519, yes),
198 ENCODER_w_structure("ED25519", ed25519, yes, der, EncryptedPrivateKeyInfo),
199 ENCODER_w_structure("ED25519", ed25519, yes, pem, EncryptedPrivateKeyInfo),
200 ENCODER_w_structure("ED25519", ed25519, yes, der, PrivateKeyInfo),
201 ENCODER_w_structure("ED25519", ed25519, yes, pem, PrivateKeyInfo),
202 ENCODER_w_structure("ED25519", ed25519, yes, der, SubjectPublicKeyInfo),
203 ENCODER_w_structure("ED25519", ed25519, yes, pem, SubjectPublicKeyInfo),
Ddecoders.inc61 DECODER_w_structure("ED25519", der, PrivateKeyInfo, ed25519, yes),
62 DECODER_w_structure("ED25519", der, SubjectPublicKeyInfo, ed25519, yes),
/third_party/openssl/providers/implementations/encode_decode/
Dencode_key2any.c1396 MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, EncryptedPrivateKeyInfo, der);
1397 MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, EncryptedPrivateKeyInfo, pem);
1398 MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, PrivateKeyInfo, der);
1399 MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, PrivateKeyInfo, pem);
1400 MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, SubjectPublicKeyInfo, der);
1401 MAKE_ENCODER(ed25519, ecx, EVP_PKEY_ED25519, SubjectPublicKeyInfo, pem);
Ddecode_der2key.c779 MAKE_DECODER("ED25519", ed25519, ecx, PrivateKeyInfo);
780 MAKE_DECODER("ED25519", ed25519, ecx, SubjectPublicKeyInfo);
Dencode_key2text.c883 MAKE_TEXT_ENCODER(ed25519, ecx);
/third_party/ltp/testcases/network/stress/ssh/
Dssh-stress.sh66 ssh-keygen -q -N "" -t ed25519 -f $TST_TMPDIR/ssh_host_ed25519_key
/third_party/openssl/doc/man7/
DEVP_SIGNATURE-ED25519.pod62 Valid algorithm names are B<ed25519>, B<ed448> and B<eddsa>. If B<eddsa> is
/third_party/openssl/test/certs/
Dmkcert.sh57 ed25519) ;;
/third_party/libwebsockets/plugins/
DCMakeLists.txt197 …telnet.c;ssh-base/kex-25519.c" "ssh-base/crypto/chacha.c;ssh-base/crypto/ed25519.c;ssh-base/crypto…
/third_party/node/deps/npm/node_modules/sshpk/
DREADME.md248 and `'ed25519'`
326 only supported to change between `ed25519` and `curve25519` keys which are
332 - `newType` -- String, type of key to derive, either `ed25519` or `curve25519`
/third_party/node/deps/npm/node_modules/tweetnacl/
DREADME.md209 Implements [ed25519](http://ed25519.cr.yp.to).
/third_party/openssl/providers/implementations/keymgmt/
Decx_kmgmt.c822 MAKE_KEYMGMT_FUNCTIONS(ed25519) in MAKE_KEYMGMT_FUNCTIONS()
/third_party/openssl/doc/man3/
DSSL_CONF_cmd.pod117 B<ed25519>, or B<rsa_pss_pss_sha256>.
350 specified using the IETF name, e.g., B<ecdsa_secp256r1_sha256>, B<ed25519>,
/third_party/node/doc/api/
Dcrypto.md1264 description: Added support for `'ed25519'` and `'ed448'`.
1278 * `'ed25519'` (OID 1.3.101.112)
2153 * `type`: {string} Must be `'rsa'`, `'dsa'`, `'ec'`, `'ed25519'`, `'ed448'`,
2223 * `type`: {string} Must be `'rsa'`, `'dsa'`, `'ec'`, `'ed25519'`, `'ed448'`,
/third_party/libwebsockets/plugins/ssh-base/crypto/
Dge25519_base.data6 * Copied from supercop-20130419/crypto_sign/ed25519/ref/ge25519_base.data
/third_party/node/doc/changelogs/
DCHANGELOG_V12.md2910 * [[`adb0197d6d`](https://github.com/nodejs/node/commit/adb0197d6d)] - **test**: move ed25519 keypa…
2936 * [[`1f2de2fbe1`](https://github.com/nodejs/node/commit/1f2de2fbe1)] - **test**: move ed25519 keypa…
/third_party/openssl/
DCHANGES.md2325 * Check that ed25519 and ed448 are allowed by the security level. Previously