/third_party/node/test/parallel/ |
D | test-tls-multi-key.js | 152 const ecdsa = tls.connect(this.address().port, { 158 assert.deepStrictEqual(ecdsa.getCipher(), { 163 assert.strictEqual(ecdsa.getPeerCertificate().subject.CN, eccCN); 164 assert.strictEqual(ecdsa.getPeerCertificate().asn1Curve, 'prime256v1'); 165 ecdsa.end();
|
D | test-tls-multi-pfx.js | 25 const ecdsa = tls.connect(this.address().port, { 29 ciphers.push(ecdsa.getCipher()); 35 ecdsa.end();
|
/third_party/openssl/test/ssl-tests/ |
D | 20-cert-select.conf | 73 ECDSA.Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem 74 ECDSA.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem 108 ECDSA.Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem 109 ECDSA.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem 141 ECDSA.Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem 142 ECDSA.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem 171 ECDSA.Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem 172 ECDSA.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem 207 ECDSA.Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem 208 ECDSA.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem [all …]
|
D | 20-cert-select.conf.in | 13 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"), 14 "ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"), 25 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"), 26 "ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"), 72 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"), 73 "ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"), 96 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"), 97 "ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"), 151 "Certificate" => test_pem("server-ecdsa-brainpoolP256r1-cert.pem"), 152 "PrivateKey" => test_pem("server-ecdsa-brainpoolP256r1-key.pem"), [all …]
|
/third_party/mbedtls/tests/scripts/ |
D | curves.pl | 101 my $ecdsa = $curve_supports_ecdsa{$curve} ? "set" : "unset"; 105 system( "scripts/config.pl $ecdsa $dep" ) 106 and abort "Failed to $ecdsa $dep\n";
|
/third_party/mbedtls/programs/test/ |
D | benchmark.c | 543 rsa, dhm, ecdsa, ecdh; member 623 todo.ecdsa = 1; in main() 1064 if( todo.ecdsa ) in main() 1066 mbedtls_ecdsa_context ecdsa; in main() local 1079 mbedtls_ecdsa_init( &ecdsa ); in main() 1081 if( mbedtls_ecdsa_genkey( &ecdsa, curve_info->grp_id, myrand, NULL ) != 0 ) in main() 1083 ecp_clear_precomputed( &ecdsa.grp ); in main() 1088 … ret = mbedtls_ecdsa_write_signature( &ecdsa, MBEDTLS_MD_SHA256, buf, curve_info->bit_size, in main() 1091 mbedtls_ecdsa_free( &ecdsa ); in main() 1101 mbedtls_ecdsa_init( &ecdsa ); in main() [all …]
|
/third_party/openssl/test/certs/ |
D | embeddedSCTs3.sct | 7 Signature : ecdsa-with-SHA256 19 Signature : ecdsa-with-SHA256 31 Signature : ecdsa-with-SHA256
|
D | embeddedSCTs1.sct | 7 Signature : ecdsa-with-SHA256
|
/third_party/mbedtls/library/ |
D | pk_wrap.c | 260 mbedtls_ecdsa_context ecdsa; in eckey_verify_wrap() local 262 mbedtls_ecdsa_init( &ecdsa ); in eckey_verify_wrap() 264 if( ( ret = mbedtls_ecdsa_from_keypair( &ecdsa, ctx ) ) == 0 ) in eckey_verify_wrap() 265 ret = ecdsa_verify_wrap( &ecdsa, md_alg, hash, hash_len, sig, sig_len ); in eckey_verify_wrap() 267 mbedtls_ecdsa_free( &ecdsa ); in eckey_verify_wrap() 278 mbedtls_ecdsa_context ecdsa; in eckey_sign_wrap() local 280 mbedtls_ecdsa_init( &ecdsa ); in eckey_sign_wrap() 282 if( ( ret = mbedtls_ecdsa_from_keypair( &ecdsa, ctx ) ) == 0 ) in eckey_sign_wrap() 283 ret = ecdsa_sign_wrap( &ecdsa, md_alg, hash, hash_len, in eckey_sign_wrap() 287 mbedtls_ecdsa_free( &ecdsa ); in eckey_sign_wrap()
|
/third_party/libwebsockets/lib/tls/mbedtls/ |
D | lws-genec.c | 242 mbedtls_ecdsa_context ecdsa; in lws_genecdh_new_keypair() local 258 mbedtls_ecdsa_init(&ecdsa); in lws_genecdh_new_keypair() 259 n = mbedtls_ecdsa_genkey(&ecdsa, (mbedtls_ecp_group_id)curve->tls_lib_nid, in lws_genecdh_new_keypair() 267 kp = (mbedtls_ecp_keypair *)&ecdsa; in lws_genecdh_new_keypair() 304 mbedtls_ecdsa_free(&ecdsa); in lws_genecdh_new_keypair() 313 mbedtls_ecdsa_free(&ecdsa); in lws_genecdh_new_keypair()
|
/third_party/libwebsockets/lib/cose/ |
D | cose_sign_alg.c | 52 goto ecdsa; in lws_cose_sign_alg_create() 57 goto ecdsa; in lws_cose_sign_alg_create() 62 ecdsa: in lws_cose_sign_alg_create()
|
D | cose_validate_alg.c | 52 goto ecdsa; in lws_cose_val_alg_create() 57 goto ecdsa; in lws_cose_val_alg_create() 62 ecdsa: in lws_cose_val_alg_create()
|
/third_party/openssl/test/ct/ |
D | tls1.sct | 7 Signature : ecdsa-with-SHA256
|
/third_party/mbedtls/programs/pkey/ |
D | CMakeLists.txt | 15 ecdsa
|
/third_party/mbedtls/programs/ |
D | Makefile | 89 pkey/ecdsa \ 222 pkey/ecdsa$(EXEXT): pkey/ecdsa.c $(DEP) 224 $(CC) $(LOCAL_CFLAGS) $(CFLAGS) pkey/ecdsa.c $(LOCAL_LDFLAGS) $(LDFLAGS) -o $@
|
D | .gitignore | 25 pkey/ecdsa
|
D | README.md | 32 * [`pkey/ecdsa.c`](pkey/ecdsa.c): generates an ECDSA key, signs a fixed message and verifies the si…
|
/third_party/openssl/apps/ |
D | speed.c | 124 int ecdsa; member 620 EC_KEY *ecdsa[ECDSA_NUM]; member 1138 EC_KEY **ecdsa = tempargs->ecdsa; in ECDSA_sign_loop() local 1143 ret = ECDSA_sign(0, buf, 20, ecdsasig, ecdsasiglen, ecdsa[testnum]); in ECDSA_sign_loop() 1158 EC_KEY **ecdsa = tempargs->ecdsa; in ECDSA_verify_loop() local 1163 ret = ECDSA_verify(0, buf, 20, ecdsasig, ecdsasiglen, ecdsa[testnum]); in ECDSA_verify_loop() 1644 seconds.sym = seconds.rsa = seconds.dsa = seconds.ecdsa in speed_main() 2856 loopargs[i].ecdsa[testnum] = in speed_main() 2858 if (loopargs[i].ecdsa[testnum] == NULL) { in speed_main() 2869 EC_KEY_precompute_mult(loopargs[i].ecdsa[testnum], NULL); in speed_main() [all …]
|
/third_party/node/deps/npm/node_modules/sshpk/ |
D | README.md | 147 String, the type of key. Valid options are `rsa`, `dsa`, `ecdsa`. 160 Only present if `this.type === 'ecdsa'`, string containing the name of the 214 or a close analogue (i.e. `dsa`, `ecdsa` and `curve25519` keys). An attempt 247 - `type` -- String, type of key to generate. Currently supported are `'ecdsa'` 250 - `curve` -- optional String, for `'ecdsa'` keys, specifies the curve to use. 265 String, the type of key. Valid options are `rsa`, `dsa`, `ecdsa`. 274 Only present if `this.type === 'ecdsa'`, string containing the name of the 393 are `rsa`, `dsa`, `ecdsa`
|
/third_party/openssl/crypto/objects/ |
D | objects.txt | 91 X9-62_id-ecSigType 1 : ecdsa-with-SHA1 92 X9-62_id-ecSigType 2 : ecdsa-with-Recommended 93 X9-62_id-ecSigType 3 : ecdsa-with-Specified 94 ecdsa-with-Specified 1 : ecdsa-with-SHA224 95 ecdsa-with-Specified 2 : ecdsa-with-SHA256 96 ecdsa-with-Specified 3 : ecdsa-with-SHA384 97 ecdsa-with-Specified 4 : ecdsa-with-SHA512 992 sigAlgs 9 : id-ecdsa-with-sha3-224 : ecdsa_with_SHA3-224 993 sigAlgs 10 : id-ecdsa-with-sha3-256 : ecdsa_with_SHA3-256 994 sigAlgs 11 : id-ecdsa-with-sha3-384 : ecdsa_with_SHA3-384 [all …]
|
/third_party/openssl/doc/man3/ |
D | SSL_CTX_config.pod | 52 ECDSA.Certificate = server-ecdsa.pem
|
/third_party/ltp/testcases/network/stress/ssh/ |
D | ssh-stress.sh | 65 ssh-keygen -q -N "" -t ecdsa -f $TST_TMPDIR/ssh_host_ecdsa_key
|
/third_party/openssl/crypto/x509/ |
D | x_all.c | 336 int i2d_EC_PUBKEY_bio(BIO *bp, EC_KEY *ecdsa) in i2d_EC_PUBKEY_bio() argument 338 return ASN1_i2d_bio_of(EC_KEY, i2d_EC_PUBKEY, bp, ecdsa); in i2d_EC_PUBKEY_bio()
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_random.function | 7 #include "mbedtls/ecdsa.h"
|
/third_party/mbedtls/scripts/data_files/ |
D | query_config.fmt | 52 #include "mbedtls/ecdsa.h"
|