Home
last modified time | relevance | path

Searched refs:ecdsa (Results 1 – 25 of 104) sorted by relevance

12345

/external/tpm2-tss/test/unit/
DTPMU-marshal.c39 sig.ecdsa.hash = TPM2_ALG_SHA1; in tpmu_marshal_success()
40 sig.ecdsa.signatureR.size = 4; in tpmu_marshal_success()
41 sig.ecdsa.signatureR.buffer[0] = 'a'; in tpmu_marshal_success()
42 sig.ecdsa.signatureR.buffer[1] = 'b'; in tpmu_marshal_success()
43 sig.ecdsa.signatureR.buffer[2] = 'c'; in tpmu_marshal_success()
44 sig.ecdsa.signatureR.buffer[3] = 'd'; in tpmu_marshal_success()
45 sig.ecdsa.signatureS.size = 4; in tpmu_marshal_success()
46 sig.ecdsa.signatureS.buffer[0] = 'e'; in tpmu_marshal_success()
47 sig.ecdsa.signatureS.buffer[1] = 'd'; in tpmu_marshal_success()
48 sig.ecdsa.signatureS.buffer[2] = 'f'; in tpmu_marshal_success()
[all …]
/external/openssh/regress/
Dkeytype.sh16 ecdsa-sha2-nistp256) ktypes="$ktypes ecdsa-256" ;;
17 ecdsa-sha2-nistp384) ktypes="$ktypes ecdsa-384" ;;
18 ecdsa-sha2-nistp521) ktypes="$ktypes ecdsa-521" ;;
20 sk-ecdsa-sha2-nistp256*) ktypes="$ktypes ecdsa-sk" ;;
40 ecdsa-256) echo ecdsa-sha2-nistp256;;
41 ecdsa-384) echo ecdsa-sha2-nistp384;;
42 ecdsa-521) echo ecdsa-sha2-nistp521;;
46 ecdsa-sk) echo sk-ecdsa-sha2-nistp256@openssh.com;;
Dlimit-keytype.sh19 ecdsa*) ktype3=ecdsa ;; # unused
22 sk-ecdsa-sha2-nistp256@openssh.com) ktype6=ecdsa-sk ;;
76 ecdsa) printf "ecdsa-sha2-*" ;;
80 sk-ecdsa) printf "sk-ecdsa-*" ;;
DMakefile112 hkr.* host.ecdsa-sha2-nistp256 host.ecdsa-sha2-nistp384 \
113 host.ecdsa-sha2-nistp521 host.ssh-dss host.ssh-ed25519 \
115 key.dsa-* key.ecdsa-* key.ed25519-512 \
186 ${TEST_SSH_SSHKEYGEN} -q -t ecdsa -N '' -f $@
/external/arm-trusted-firmware/drivers/auth/mbedtls/
Dmbedtls_common.mk44 ecdsa.c \
58 ifeq (${KEY_ALG}, ecdsa)
59 TF_MBEDTLS_KEY_ALG := ecdsa
83 ifeq (${TF_MBEDTLS_KEY_ALG},ecdsa)
87 else ifeq (${TF_MBEDTLS_KEY_ALG},rsa+ecdsa)
/external/openssh/regress/unittests/hostkeys/testdata/
Dknown_hosts3 sisyphus.example.com ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBF6yQE…
9 prometheus.example.com,192.0.2.1,2001:db8::1 ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAA…
15 *.example.com,192.0.2.*,2001:* ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYA…
21 |1|B7t/AYabn8zgwU47Cb4A/Nqt3eI=|arQPZyRphkzisr7w6wwikvhaOyE= ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYT…
28 |1|B8epmkLSni+vGZDijr/EwxeR2k4=|7ct8yzNOVJhKm3ZD2w0XIT7df8E= ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYT…
29 |1|JojD885UhYhbCu571rgyM/5PpYU=|BJaU2aE1FebQZy3B5tzTDRWFRG0= ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYT…
30 |1|5t7UDHDybVrDZVQPCpwdnr6nk4k=|EqJ73W/veIL3H2x+YWHcJxI5ETA= ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYT…
41 @cert-authority prometheus.example.com ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlz…
/external/python/cryptography/docs/development/custom-vectors/
Dsecp256k1.rst12 The vectors are generated using a `pure Python ecdsa`_ implementation. The test
32 .. _`pure Python ecdsa`: https://pypi.org/project/ecdsa/
/external/openssh/
Dsshkey.c553 k->ecdsa = NULL; in sshkey_new()
638 EC_KEY_free(k->ecdsa); in sshkey_free()
639 k->ecdsa = NULL; in sshkey_free()
747 if (a->ecdsa == NULL || b->ecdsa == NULL || in sshkey_equal_public()
748 EC_KEY_get0_public_key(a->ecdsa) == NULL || in sshkey_equal_public()
749 EC_KEY_get0_public_key(b->ecdsa) == NULL) in sshkey_equal_public()
751 if (EC_GROUP_cmp(EC_KEY_get0_group(a->ecdsa), in sshkey_equal_public()
752 EC_KEY_get0_group(b->ecdsa), NULL) != 0 || in sshkey_equal_public()
753 EC_POINT_cmp(EC_KEY_get0_group(a->ecdsa), in sshkey_equal_public()
754 EC_KEY_get0_public_key(a->ecdsa), in sshkey_equal_public()
[all …]
Dssh-ecdsa.c66 if (key == NULL || key->ecdsa == NULL || in ssh_ecdsa_sign()
77 if ((sig = ECDSA_do_sign(digest, dlen, key->ecdsa)) == NULL) { in ssh_ecdsa_sign()
127 if (key == NULL || key->ecdsa == NULL || in ssh_ecdsa_verify()
177 switch (ECDSA_do_verify(digest, dlen, sig, key->ecdsa)) { in ssh_ecdsa_verify()
DPROTOCOL.certkeys36 ecdsa-sha2-nistp256-cert-v01@openssh.com
37 ecdsa-sha2-nistp384-cert-v01@openssh.com
38 ecdsa-sha2-nistp521-cert-v01@openssh.com
116 string "ecdsa-sha2-nistp256-cert-v01@openssh.com" |
117 "ecdsa-sha2-nistp384-cert-v01@openssh.com" |
118 "ecdsa-sha2-nistp521-cert-v01@openssh.com"
210 ssh-dss, ssh-ed25519 and the ECDSA types ecdsa-sha2-nistp256,
211 ecdsa-sha2-nistp384, ecdsa-sha2-nistp521. "Chained" certificates, where
DPROTOCOL.u2f47 sk-ecdsa-sha2-nistp256@openssh.com
48 sk-ecdsa-sha2-nistp256-cert-v01@openssh.com
52 While each uses ecdsa-sha256-nistp256 as the underlying signature primitive,
55 the existing ecdsa-sha2-nistp* key types.
57 The format of a sk-ecdsa-sha2-nistp256@openssh.com public key is:
59 string "sk-ecdsa-sha2-nistp256@openssh.com"
66 string "sk-ecdsa-sha2-nistp256@openssh.com"
92 string "sk-ecdsa-sha2-nistp256-cert-v01@openssh.com"
187 string "sk-ecdsa-sha2-nistp256@openssh.com"
/external/boringssl/src/ssl/test/runner/
Dsign.go143 ecdsaKey, ok := key.(*ecdsa.PrivateKey)
166 ecdsaKey, ok := key.(*ecdsa.PrivateKey)
178 r, s, err := ecdsa.Sign(config.rand(), ecdsaKey, digest)
189 ecdsaKey, ok := key.(*ecdsa.PublicKey)
207 if !ecdsa.Verify(ecdsaKey, h.Sum(nil), ecdsaSig.R, ecdsaSig.S) {
282 case *ecdsa.PrivateKey, *ecdsa.PublicKey:
Dtls.go242 case *ecdsa.PublicKey:
243 priv, ok := cert.PrivateKey.(*ecdsa.PrivateKey)
280 case *rsa.PrivateKey, *ecdsa.PrivateKey, ed25519.PrivateKey:
/external/boringssl/src/crypto/x509/test/
Dmake_invalid_extensions.go49 var leafKey, intermediateKey, rootKey *ecdsa.PrivateKey
59 key *ecdsa.PrivateKey
174 func ecdsaKeyFromPEMOrPanic(in string) *ecdsa.PrivateKey {
183 return key.(*ecdsa.PrivateKey)
Dmake_basic_constraints.go90 func ecdsaKeyFromPEMOrPanic(in string) *ecdsa.PrivateKey {
99 return key.(*ecdsa.PrivateKey)
/external/libwebsockets/lib/tls/mbedtls/
Dlws-genec.c229 mbedtls_ecdsa_context ecdsa; in lws_genecdh_new_keypair() local
245 mbedtls_ecdsa_init(&ecdsa); in lws_genecdh_new_keypair()
246 n = mbedtls_ecdsa_genkey(&ecdsa, curve->tls_lib_nid, in lws_genecdh_new_keypair()
254 kp = (mbedtls_ecp_keypair *)&ecdsa; in lws_genecdh_new_keypair()
291 mbedtls_ecdsa_free(&ecdsa); in lws_genecdh_new_keypair()
300 mbedtls_ecdsa_free(&ecdsa); in lws_genecdh_new_keypair()
/external/rust/crates/ring/
DCargo.toml20ecdsa/ecdsa_verify_tests.txt", "crypto/fipsmodule/modes/asm/aesni-gcm-x86_64.pl", "crypto/fipsmodu…
DCargo.toml.orig69 "crypto/fipsmodule/ecdsa/ecdsa_verify_tests.txt",
157 "src/ec/suite_b/ecdsa/digest_scalar.rs",
158 "src/ec/suite_b/ecdsa.rs",
159 "src/ec/suite_b/ecdsa/signing.rs",
160 "src/ec/suite_b/ecdsa/verification.rs",
161 "src/ec/suite_b/ecdsa/ecdsa_digest_scalar_tests.txt",
162 "src/ec/suite_b/ecdsa/ecPublicKey_p256_pkcs8_v1_template.der",
163 "src/ec/suite_b/ecdsa/ecPublicKey_p384_pkcs8_v1_template.der",
164 "src/ec/suite_b/ecdsa/ecdsa_sign_asn1_tests.txt",
165 "src/ec/suite_b/ecdsa/ecdsa_sign_fixed_tests.txt",
/external/openssh/regress/unittests/hostkeys/
Dmktestdata.sh8 rm -f rsa* dsa* ecdsa* ed25519*
18 ssh-keygen -qt ecdsa -b $_ecdsa_bits -C "ECDSA #$_n" -N "" -f ecdsa_$_n
DMakefile9 SRCS+=ssh-dss.c ssh-ecdsa.c ssh-ed25519.c mac.c umac.c umac128.c hmac.c misc.c
13 SRCS+=cipher-chachapoly.c chacha.c poly1305.c ssh-ecdsa-sk.c ssh-sk.c
/external/openssh/regress/unittests/sshkey/
Dtest_sshkey.c220 ASSERT_PTR_EQ(k1->ecdsa, NULL); /* Can't allocate without NID */ in sshkey_tests()
286 ASSERT_PTR_NE(ke->ecdsa, NULL); in sshkey_tests()
287 ASSERT_PTR_NE(EC_KEY_get0_public_key(ke->ecdsa), NULL); in sshkey_tests()
288 ASSERT_PTR_NE(EC_KEY_get0_private_key(ke->ecdsa), NULL); in sshkey_tests()
339 ASSERT_PTR_NE(k1->ecdsa, NULL); in sshkey_tests()
341 ASSERT_PTR_NE(EC_KEY_get0_public_key(ke->ecdsa), NULL); in sshkey_tests()
342 ASSERT_PTR_EQ(EC_KEY_get0_private_key(k1->ecdsa), NULL); in sshkey_tests()
DMakefile9 SRCS+=ssh-dss.c ssh-ecdsa.c ssh-ed25519.c mac.c umac.c umac128.c hmac.c misc.c
13 SRCS+=cipher-chachapoly.c chacha.c poly1305.c ssh-ecdsa-sk.c ssh-sk.c
/external/openssh/regress/unittests/authopt/
DMakefile11 SRCS+=ssh-dss.c ssh-ecdsa.c ssh-ed25519.c mac.c umac.c umac128.c hmac.c misc.c
15 SRCS+=cipher-chachapoly.c chacha.c poly1305.c ssh-ecdsa-sk.c ssh-sk.c
/external/python/cryptography/docs/development/custom-vectors/secp256k1/
Dgenerate_secp256k1.py8 from ecdsa import SECP256k1, SigningKey
9 from ecdsa.util import sigdecode_der, sigencode_der
/external/openssh/regress/unittests/kex/
DMakefile9 SRCS+=ssh-dss.c ssh-ecdsa.c ssh-ed25519.c mac.c umac.c umac128.c hmac.c misc.c
13 SRCS+=cipher-chachapoly.c chacha.c poly1305.c ssh-ecdsa-sk.c ssh-sk.c

12345