Home
last modified time | relevance | path

Searched refs:SM2 (Results 1 – 25 of 50) sorted by relevance

12

/src/crypto/openssl/doc/man7/
H A DEVP_PKEY-SM2.pod5 EVP_PKEY-SM2, EVP_KEYMGMT-SM2, SM2
6 - EVP_PKEY keytype support for the Chinese SM2 signature and encryption algorithms
10 The B<SM2> algorithm was first defined by the Chinese national standard GM/T
11 0003-2012 and was later standardized by ISO as ISO/IEC 14888. B<SM2> is actually
15 When doing the B<SM2> signature algorithm, it requires a distinguishing identifier
18 =head2 Common SM2 parameters
20 SM2 uses the parameters defined in L<EVP_PKEY-EC(7)/Common EC parameters>.
27 This parameter is ignored for B<SM2>.
38 B<SM2> signatures can be generated by using the 'DigestSign' series of APIs, for
41 Note that the SM2 algorithm requires the presence of the public key for signatures,
[all …]
H A DEVP_ASYM_CIPHER-SM2.pod5 EVP_ASYM_CIPHER-SM2
6 - SM2 Asymmetric Cipher algorithm support
10 Asymmetric Cipher support for the B<SM2> key type.
12 =head2 SM2 Asymmetric Cipher parameters
26 L<EVP_PKEY-SM2(7)>,
H A DOSSL_PROVIDER-default.pod198 =item SM2
246 =item SM2, see L<EVP_ASYM_CIPHER-SM2(7)>
286 =item SM2, see L<EVP_KEYMGMT-SM2(7)>
393 =item SM2
461 =item SM2
H A DOSSL_PROVIDER-base.pod97 =item SM2
165 =item SM2
/src/crypto/openssl/test/recipes/30-test_evp_data/
H A Devppkey_sm2.txt19 Title = SM2 tests
66 Output = "Some longer plaintext for testing SM2 decryption. Blah blah blah blah blah blah blah blah…
68 # This is a "fake" test as it does only verify that the SM2 EVP_PKEY interface
78 Title = SM2 key generation tests
80 KeyGen = SM2
83 KeyGen = SM2
/src/crypto/openssl/test/recipes/15-test_ecparam_data/valid/
H A Dsm2-named.pem1 -----BEGIN SM2 PARAMETERS-----
3 -----END SM2 PARAMETERS-----
H A Dsm2-explicit.pem1 -----BEGIN SM2 PARAMETERS-----
7 -----END SM2 PARAMETERS-----
/src/crypto/openssl/doc/man3/
H A DX509_get0_distinguishing_id.pod31 The SM2 signature algorithm requires a Distinguishing ID value when generating
33 In the context of SM2, the Distinguishing ID is often referred to as the "SM2
62 L<X509_verify(3)>, L<SM2(7)>
H A DEVP_PKEY_get_group_name.pod26 SM2 keys. Other providers may support this for additional key types.
H A DEVP_PKEY_get_field_type.pod29 SM2 keys. Other providers may support this for additional key types.
/src/crypto/openssl/test/
H A Dtestec-sm2.pem1 -----BEGIN SM2 PRIVATE KEY-----
5 -----END SM2 PRIVATE KEY-----
H A Dendecode_test.c1028 KEYS(SM2);
1029 IMPLEMENT_TEST_SUITE(SM2, "SM2", 0)
1495 MAKE_KEYS(SM2, "SM2", NULL); in setup_tests()
1580 ADD_TEST_SUITE(SM2); in setup_tests()
1675 FREE_KEYS(SM2); in cleanup_tests()
/src/contrib/llvm-project/clang/lib/Basic/
H A DCuda.cpp82 #define SM2(sm, ca) {OffloadArch::SM_##sm, "sm_" #sm, ca} macro
83 #define SM(sm) SM2(sm, "compute_" #sm)
88 SM2(20, "compute_20"), SM2(21, "compute_20"), // Fermi
154 #undef SM2
/src/crypto/openssl/providers/common/der/
H A DSM2.asn112 -- OID for SM2 signatures with SM3
16 -- Named Elliptic Curves of SM2
H A Dbuild.info100 #----- SM2
107 DEPEND[$DER_SM2_GEN]=oids_to_c.pm SM2.asn1
112 DEPEND[$DER_SM2_H]=oids_to_c.pm SM2.asn1
H A Dder_sm2_gen.c.in17 $OUT = oids_to_c::process_leaves('providers/common/der/SM2.asn1',
/src/crypto/openssl/providers/
H A Dencoders.inc67 ENCODER_TEXT("SM2", sm2, no),
140 ENCODER_w_structure("SM2", sm2, no, der, type_specific_no_pub),
141 ENCODER_w_structure("SM2", sm2, no, pem, type_specific_no_pub),
142 ENCODER("SM2", sm2, no, blob),
211 ENCODER_w_structure("SM2", sm2, no, der, EncryptedPrivateKeyInfo),
212 ENCODER_w_structure("SM2", sm2, no, pem, EncryptedPrivateKeyInfo),
213 ENCODER_w_structure("SM2", sm2, no, der, PrivateKeyInfo),
214 ENCODER_w_structure("SM2", sm2, no, pem, PrivateKeyInfo),
215 ENCODER_w_structure("SM2", sm2, no, der, SubjectPublicKeyInfo),
216 ENCODER_w_structure("SM2", sm2, no, pem, SubjectPublicKeyInfo),
H A Ddecoders.inc72 DECODER_w_structure("SM2", der, PrivateKeyInfo, sm2, no),
73 DECODER_w_structure("SM2", der, SubjectPublicKeyInfo, sm2, no),
74 DECODER_w_structure("SM2", der, type_specific_no_pub, sm2, no),
/src/crypto/libecc/src/sig/
H A Dsm2.c43 ret = priv_key_check_initialized_and_type(priv_key, SM2); EG(ret, err); in sm2_gen_priv_key()
65 ret = priv_key_check_initialized_and_type(in_priv, SM2); EG(ret, err); in sm2_init_pub_key()
86 out_pub->key_type = SM2; in sm2_init_pub_key()
152 ret = pub_key_check_initialized_and_type(pub_key, SM2); EG(ret, err); in sm2_compute_Z()
257 ret = key_pair_check_initialized_and_type(ctx->key_pair, SM2); EG(ret, err); in _sm2_sign_init()
533 ret = pub_key_check_initialized_and_type(ctx->pub_key, SM2); EG(ret, err); in _sm2_verify_init()
/src/crypto/openssl/providers/common/include/prov/
H A Dder_sm2.h.in18 $OUT = oids_to_c::process_leaves('providers/common/der/SM2.asn1',
/src/secure/lib/libcrypto/man/man7/
H A DMakefile2 MAN+= EVP_ASYM_CIPHER-SM2.7
73 MAN+= EVP_PKEY-SM2.7
/src/crypto/libecc/include/libecc/
H A Dlib_ecc_types.h46 SM2 = 8, enumerator
/src/crypto/openssl/doc/man1/
H A Dopenssl-pkeyutl.pod.in73 the default digest algorithm is SHA256. For SM2, it is SM3.
566 =head1 SM2 chapter
568 The SM2 algorithm supports sign, verify, encrypt and decrypt operations. For
569 the sign and verify operations, SM2 requires an Distinguishing ID string to
576 This sets the ID string used in SM2 sign or verify operations. While verifying
577 an SM2 signature, the ID string must be the same one used when signing the data.
582 This sets the ID string used in SM2 sign or verify operations. While verifying
583 an SM2 signature, the ID string must be the same one used when signing the data.
627 Sign some data using an L<SM2(7)> private key and a specific ID:
632 Verify some data using an L<SM2(7)> certificate and a specific ID:
/src/sys/contrib/device-tree/src/arm64/freescale/
H A Dimx8mp-msc-sm2s-ep1.dts13 model = "MSC SM2-MB-EP1 Carrier Board with SM2S-IMX8PLUS-QC6-14N0600E SoM";
/src/sys/contrib/device-tree/Bindings/regulator/
H A Dtps6586x.txt18 - vin-sm2-supply: The input supply for the SM2.

12