/third_party/openssl/providers/common/der/ |
D | EC.asn1 | 21 ecdsa-with-SHA1 OBJECT IDENTIFIER ::= { id-ecSigType 1 } 69 ecdsa-with-SHA224 OBJECT IDENTIFIER ::= { iso(1) member-body(2) 70 us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 1 } 72 ecdsa-with-SHA256 OBJECT IDENTIFIER ::= { iso(1) member-body(2) 73 us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 2 } 75 ecdsa-with-SHA384 OBJECT IDENTIFIER ::= { iso(1) member-body(2) 76 us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 3 } 78 ecdsa-with-SHA512 OBJECT IDENTIFIER ::= { iso(1) member-body(2) 79 us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 4 } 86 id-ecdsa-with-sha3-224 OBJECT IDENTIFIER ::= { sigAlgs 9 } [all …]
|
/third_party/openssl/test/ssl-tests/ |
D | 20-cert-select.cnf.in | 16 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"), 17 "ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"), 28 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"), 29 "ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"), 83 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"), 84 "ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"), 107 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"), 108 "ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"), 409 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"), 410 "ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"), [all …]
|
D | 20-cert-select.cnf | 74 ECDSA.Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem 75 ECDSA.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem 109 ECDSA.Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem 110 ECDSA.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem 142 ECDSA.Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem 143 ECDSA.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem 172 ECDSA.Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem 173 ECDSA.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem 205 ECDSA.Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem 206 ECDSA.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem [all …]
|
/third_party/node/test/parallel/ |
D | test-tls-multi-key.js | 152 const ecdsa = tls.connect(this.address().port, { 158 assert.deepStrictEqual(ecdsa.getCipher(), { 163 assert.strictEqual(ecdsa.getPeerCertificate().subject.CN, eccCN); 164 assert.strictEqual(ecdsa.getPeerCertificate().asn1Curve, 'prime256v1'); 165 ecdsa.end();
|
D | test-tls-multi-pfx.js | 25 const ecdsa = tls.connect(this.address().port, { 29 ciphers.push(ecdsa.getCipher()); 35 ecdsa.end();
|
/third_party/mbedtls/tests/scripts/ |
D | curves.pl | 101 my $ecdsa = $curve_supports_ecdsa{$curve} ? "set" : "unset"; 105 system( "scripts/config.pl $ecdsa $dep" ) 106 and abort "Failed to $ecdsa $dep\n";
|
/third_party/mbedtls/programs/test/ |
D | benchmark.c | 543 rsa, dhm, ecdsa, ecdh; member 623 todo.ecdsa = 1; in main() 1064 if( todo.ecdsa ) in main() 1066 mbedtls_ecdsa_context ecdsa; in main() local 1079 mbedtls_ecdsa_init( &ecdsa ); in main() 1081 if( mbedtls_ecdsa_genkey( &ecdsa, curve_info->grp_id, myrand, NULL ) != 0 ) in main() 1083 ecp_clear_precomputed( &ecdsa.grp ); in main() 1088 … ret = mbedtls_ecdsa_write_signature( &ecdsa, MBEDTLS_MD_SHA256, buf, curve_info->bit_size, in main() 1091 mbedtls_ecdsa_free( &ecdsa ); in main() 1101 mbedtls_ecdsa_init( &ecdsa ); in main() [all …]
|
/third_party/mbedtls/library/ |
D | pk_wrap.c | 260 mbedtls_ecdsa_context ecdsa; in eckey_verify_wrap() local 262 mbedtls_ecdsa_init( &ecdsa ); in eckey_verify_wrap() 264 if( ( ret = mbedtls_ecdsa_from_keypair( &ecdsa, ctx ) ) == 0 ) in eckey_verify_wrap() 265 ret = ecdsa_verify_wrap( &ecdsa, md_alg, hash, hash_len, sig, sig_len ); in eckey_verify_wrap() 267 mbedtls_ecdsa_free( &ecdsa ); in eckey_verify_wrap() 278 mbedtls_ecdsa_context ecdsa; in eckey_sign_wrap() local 280 mbedtls_ecdsa_init( &ecdsa ); in eckey_sign_wrap() 282 if( ( ret = mbedtls_ecdsa_from_keypair( &ecdsa, ctx ) ) == 0 ) in eckey_sign_wrap() 283 ret = ecdsa_sign_wrap( &ecdsa, md_alg, hash, hash_len, in eckey_sign_wrap() 287 mbedtls_ecdsa_free( &ecdsa ); in eckey_sign_wrap()
|
/third_party/openssl/test/certs/ |
D | embeddedSCTs3.sct | 7 Signature : ecdsa-with-SHA256 19 Signature : ecdsa-with-SHA256 31 Signature : ecdsa-with-SHA256
|
D | embeddedSCTs1.sct | 7 Signature : ecdsa-with-SHA256
|
/third_party/libwebsockets/lib/tls/mbedtls/ |
D | lws-genec.c | 242 mbedtls_ecdsa_context ecdsa; in lws_genecdh_new_keypair() local 258 mbedtls_ecdsa_init(&ecdsa); in lws_genecdh_new_keypair() 259 n = mbedtls_ecdsa_genkey(&ecdsa, (mbedtls_ecp_group_id)curve->tls_lib_nid, in lws_genecdh_new_keypair() 267 kp = (mbedtls_ecp_keypair *)&ecdsa; in lws_genecdh_new_keypair() 304 mbedtls_ecdsa_free(&ecdsa); in lws_genecdh_new_keypair() 313 mbedtls_ecdsa_free(&ecdsa); in lws_genecdh_new_keypair()
|
/third_party/libwebsockets/lib/cose/ |
D | cose_sign_alg.c | 52 goto ecdsa; in lws_cose_sign_alg_create() 57 goto ecdsa; in lws_cose_sign_alg_create() 62 ecdsa: in lws_cose_sign_alg_create()
|
D | cose_validate_alg.c | 52 goto ecdsa; in lws_cose_val_alg_create() 57 goto ecdsa; in lws_cose_val_alg_create() 62 ecdsa: in lws_cose_val_alg_create()
|
/third_party/mbedtls/programs/ |
D | Makefile | 89 pkey/ecdsa \ 222 pkey/ecdsa$(EXEXT): pkey/ecdsa.c $(DEP) 224 $(CC) $(LOCAL_CFLAGS) $(CFLAGS) pkey/ecdsa.c $(LOCAL_LDFLAGS) $(LDFLAGS) -o $@
|
D | .gitignore | 25 pkey/ecdsa
|
D | README.md | 32 * [`pkey/ecdsa.c`](pkey/ecdsa.c): generates an ECDSA key, signs a fixed message and verifies the si…
|
/third_party/node/deps/npm/node_modules/sshpk/ |
D | README.md | 147 String, the type of key. Valid options are `rsa`, `dsa`, `ecdsa`. 160 Only present if `this.type === 'ecdsa'`, string containing the name of the 214 or a close analogue (i.e. `dsa`, `ecdsa` and `curve25519` keys). An attempt 247 - `type` -- String, type of key to generate. Currently supported are `'ecdsa'` 250 - `curve` -- optional String, for `'ecdsa'` keys, specifies the curve to use. 265 String, the type of key. Valid options are `rsa`, `dsa`, `ecdsa`. 274 Only present if `this.type === 'ecdsa'`, string containing the name of the 393 are `rsa`, `dsa`, `ecdsa`
|
/third_party/openssl/test/ct/ |
D | tls1.sct | 7 Signature : ecdsa-with-SHA256
|
/third_party/mbedtls/programs/pkey/ |
D | CMakeLists.txt | 15 ecdsa
|
/third_party/openssl/crypto/objects/ |
D | objects.txt | 94 X9-62_id-ecSigType 1 : ecdsa-with-SHA1 95 X9-62_id-ecSigType 2 : ecdsa-with-Recommended 96 X9-62_id-ecSigType 3 : ecdsa-with-Specified 97 ecdsa-with-Specified 1 : ecdsa-with-SHA224 98 ecdsa-with-Specified 2 : ecdsa-with-SHA256 99 ecdsa-with-Specified 3 : ecdsa-with-SHA384 100 ecdsa-with-Specified 4 : ecdsa-with-SHA512 1031 sigAlgs 9 : id-ecdsa-with-sha3-224 : ecdsa_with_SHA3-224 1032 sigAlgs 10 : id-ecdsa-with-sha3-256 : ecdsa_with_SHA3-256 1033 sigAlgs 11 : id-ecdsa-with-sha3-384 : ecdsa_with_SHA3-384 [all …]
|
/third_party/rust/crates/rust-openssl/openssl/src/ |
D | lib.rs | 151 pub mod ecdsa; module
|
/third_party/openssl/test/recipes/30-test_evp_data/ |
D | evpmd_sm3.txt | 16 # From https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02
|
/third_party/ltp/testcases/network/stress/ssh/ |
D | ssh-stress.sh | 65 ssh-keygen -q -N "" -t ecdsa -f $TST_TMPDIR/ssh_host_ecdsa_key
|
/third_party/openssl/doc/man3/ |
D | SSL_CTX_config.pod | 50 ECDSA.Certificate = server-ecdsa.pem
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_random.function | 7 #include "mbedtls/ecdsa.h"
|