/external/tpm2-tss/test/unit/ |
D | TPMU-marshal.c | 39 sig.ecdsa.hash = TPM2_ALG_SHA1; in tpmu_marshal_success() 40 sig.ecdsa.signatureR.size = 4; in tpmu_marshal_success() 41 sig.ecdsa.signatureR.buffer[0] = 'a'; in tpmu_marshal_success() 42 sig.ecdsa.signatureR.buffer[1] = 'b'; in tpmu_marshal_success() 43 sig.ecdsa.signatureR.buffer[2] = 'c'; in tpmu_marshal_success() 44 sig.ecdsa.signatureR.buffer[3] = 'd'; in tpmu_marshal_success() 45 sig.ecdsa.signatureS.size = 4; in tpmu_marshal_success() 46 sig.ecdsa.signatureS.buffer[0] = 'e'; in tpmu_marshal_success() 47 sig.ecdsa.signatureS.buffer[1] = 'd'; in tpmu_marshal_success() 48 sig.ecdsa.signatureS.buffer[2] = 'f'; in tpmu_marshal_success() [all …]
|
/external/openssh/regress/ |
D | keytype.sh | 16 ecdsa-sha2-nistp256) ktypes="$ktypes ecdsa-256" ;; 17 ecdsa-sha2-nistp384) ktypes="$ktypes ecdsa-384" ;; 18 ecdsa-sha2-nistp521) ktypes="$ktypes ecdsa-521" ;; 20 sk-ecdsa-sha2-nistp256*) ktypes="$ktypes ecdsa-sk" ;; 40 ecdsa-256) echo ecdsa-sha2-nistp256;; 41 ecdsa-384) echo ecdsa-sha2-nistp384;; 42 ecdsa-521) echo ecdsa-sha2-nistp521;; 46 ecdsa-sk) echo sk-ecdsa-sha2-nistp256@openssh.com;;
|
D | limit-keytype.sh | 19 ecdsa*) ktype3=ecdsa ;; # unused 22 sk-ecdsa-sha2-nistp256@openssh.com) ktype6=ecdsa-sk ;; 76 ecdsa) printf "ecdsa-sha2-*" ;; 80 sk-ecdsa) printf "sk-ecdsa-*" ;;
|
D | Makefile | 112 hkr.* host.ecdsa-sha2-nistp256 host.ecdsa-sha2-nistp384 \ 113 host.ecdsa-sha2-nistp521 host.ssh-dss host.ssh-ed25519 \ 115 key.dsa-* key.ecdsa-* key.ed25519-512 \ 186 ${TEST_SSH_SSHKEYGEN} -q -t ecdsa -N '' -f $@
|
/external/arm-trusted-firmware/drivers/auth/mbedtls/ |
D | mbedtls_common.mk | 44 ecdsa.c \ 58 ifeq (${KEY_ALG}, ecdsa) 59 TF_MBEDTLS_KEY_ALG := ecdsa 83 ifeq (${TF_MBEDTLS_KEY_ALG},ecdsa) 87 else ifeq (${TF_MBEDTLS_KEY_ALG},rsa+ecdsa)
|
/external/openssh/regress/unittests/hostkeys/testdata/ |
D | known_hosts | 3 sisyphus.example.com ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBF6yQE… 9 prometheus.example.com,192.0.2.1,2001:db8::1 ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAA… 15 *.example.com,192.0.2.*,2001:* ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYA… 21 |1|B7t/AYabn8zgwU47Cb4A/Nqt3eI=|arQPZyRphkzisr7w6wwikvhaOyE= ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYT… 28 |1|B8epmkLSni+vGZDijr/EwxeR2k4=|7ct8yzNOVJhKm3ZD2w0XIT7df8E= ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYT… 29 |1|JojD885UhYhbCu571rgyM/5PpYU=|BJaU2aE1FebQZy3B5tzTDRWFRG0= ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYT… 30 |1|5t7UDHDybVrDZVQPCpwdnr6nk4k=|EqJ73W/veIL3H2x+YWHcJxI5ETA= ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYT… 41 @cert-authority prometheus.example.com ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlz…
|
/external/python/cryptography/docs/development/custom-vectors/ |
D | secp256k1.rst | 12 The vectors are generated using a `pure Python ecdsa`_ implementation. The test 32 .. _`pure Python ecdsa`: https://pypi.org/project/ecdsa/
|
/external/openssh/ |
D | sshkey.c | 553 k->ecdsa = NULL; in sshkey_new() 638 EC_KEY_free(k->ecdsa); in sshkey_free() 639 k->ecdsa = NULL; in sshkey_free() 747 if (a->ecdsa == NULL || b->ecdsa == NULL || in sshkey_equal_public() 748 EC_KEY_get0_public_key(a->ecdsa) == NULL || in sshkey_equal_public() 749 EC_KEY_get0_public_key(b->ecdsa) == NULL) in sshkey_equal_public() 751 if (EC_GROUP_cmp(EC_KEY_get0_group(a->ecdsa), in sshkey_equal_public() 752 EC_KEY_get0_group(b->ecdsa), NULL) != 0 || in sshkey_equal_public() 753 EC_POINT_cmp(EC_KEY_get0_group(a->ecdsa), in sshkey_equal_public() 754 EC_KEY_get0_public_key(a->ecdsa), in sshkey_equal_public() [all …]
|
D | ssh-ecdsa.c | 66 if (key == NULL || key->ecdsa == NULL || in ssh_ecdsa_sign() 77 if ((sig = ECDSA_do_sign(digest, dlen, key->ecdsa)) == NULL) { in ssh_ecdsa_sign() 127 if (key == NULL || key->ecdsa == NULL || in ssh_ecdsa_verify() 177 switch (ECDSA_do_verify(digest, dlen, sig, key->ecdsa)) { in ssh_ecdsa_verify()
|
D | PROTOCOL.certkeys | 36 ecdsa-sha2-nistp256-cert-v01@openssh.com 37 ecdsa-sha2-nistp384-cert-v01@openssh.com 38 ecdsa-sha2-nistp521-cert-v01@openssh.com 116 string "ecdsa-sha2-nistp256-cert-v01@openssh.com" | 117 "ecdsa-sha2-nistp384-cert-v01@openssh.com" | 118 "ecdsa-sha2-nistp521-cert-v01@openssh.com" 210 ssh-dss, ssh-ed25519 and the ECDSA types ecdsa-sha2-nistp256, 211 ecdsa-sha2-nistp384, ecdsa-sha2-nistp521. "Chained" certificates, where
|
D | PROTOCOL.u2f | 47 sk-ecdsa-sha2-nistp256@openssh.com 48 sk-ecdsa-sha2-nistp256-cert-v01@openssh.com 52 While each uses ecdsa-sha256-nistp256 as the underlying signature primitive, 55 the existing ecdsa-sha2-nistp* key types. 57 The format of a sk-ecdsa-sha2-nistp256@openssh.com public key is: 59 string "sk-ecdsa-sha2-nistp256@openssh.com" 66 string "sk-ecdsa-sha2-nistp256@openssh.com" 92 string "sk-ecdsa-sha2-nistp256-cert-v01@openssh.com" 187 string "sk-ecdsa-sha2-nistp256@openssh.com"
|
/external/boringssl/src/ssl/test/runner/ |
D | sign.go | 143 ecdsaKey, ok := key.(*ecdsa.PrivateKey) 166 ecdsaKey, ok := key.(*ecdsa.PrivateKey) 178 r, s, err := ecdsa.Sign(config.rand(), ecdsaKey, digest) 189 ecdsaKey, ok := key.(*ecdsa.PublicKey) 207 if !ecdsa.Verify(ecdsaKey, h.Sum(nil), ecdsaSig.R, ecdsaSig.S) { 282 case *ecdsa.PrivateKey, *ecdsa.PublicKey:
|
D | tls.go | 242 case *ecdsa.PublicKey: 243 priv, ok := cert.PrivateKey.(*ecdsa.PrivateKey) 280 case *rsa.PrivateKey, *ecdsa.PrivateKey, ed25519.PrivateKey:
|
/external/boringssl/src/crypto/x509/test/ |
D | make_invalid_extensions.go | 49 var leafKey, intermediateKey, rootKey *ecdsa.PrivateKey 59 key *ecdsa.PrivateKey 174 func ecdsaKeyFromPEMOrPanic(in string) *ecdsa.PrivateKey { 183 return key.(*ecdsa.PrivateKey)
|
D | make_basic_constraints.go | 90 func ecdsaKeyFromPEMOrPanic(in string) *ecdsa.PrivateKey { 99 return key.(*ecdsa.PrivateKey)
|
/external/libwebsockets/lib/tls/mbedtls/ |
D | lws-genec.c | 229 mbedtls_ecdsa_context ecdsa; in lws_genecdh_new_keypair() local 245 mbedtls_ecdsa_init(&ecdsa); in lws_genecdh_new_keypair() 246 n = mbedtls_ecdsa_genkey(&ecdsa, curve->tls_lib_nid, in lws_genecdh_new_keypair() 254 kp = (mbedtls_ecp_keypair *)&ecdsa; in lws_genecdh_new_keypair() 291 mbedtls_ecdsa_free(&ecdsa); in lws_genecdh_new_keypair() 300 mbedtls_ecdsa_free(&ecdsa); in lws_genecdh_new_keypair()
|
/external/rust/crates/ring/ |
D | Cargo.toml | 20 …ecdsa/ecdsa_verify_tests.txt", "crypto/fipsmodule/modes/asm/aesni-gcm-x86_64.pl", "crypto/fipsmodu…
|
D | Cargo.toml.orig | 69 "crypto/fipsmodule/ecdsa/ecdsa_verify_tests.txt", 157 "src/ec/suite_b/ecdsa/digest_scalar.rs", 158 "src/ec/suite_b/ecdsa.rs", 159 "src/ec/suite_b/ecdsa/signing.rs", 160 "src/ec/suite_b/ecdsa/verification.rs", 161 "src/ec/suite_b/ecdsa/ecdsa_digest_scalar_tests.txt", 162 "src/ec/suite_b/ecdsa/ecPublicKey_p256_pkcs8_v1_template.der", 163 "src/ec/suite_b/ecdsa/ecPublicKey_p384_pkcs8_v1_template.der", 164 "src/ec/suite_b/ecdsa/ecdsa_sign_asn1_tests.txt", 165 "src/ec/suite_b/ecdsa/ecdsa_sign_fixed_tests.txt",
|
/external/openssh/regress/unittests/hostkeys/ |
D | mktestdata.sh | 8 rm -f rsa* dsa* ecdsa* ed25519* 18 ssh-keygen -qt ecdsa -b $_ecdsa_bits -C "ECDSA #$_n" -N "" -f ecdsa_$_n
|
D | Makefile | 9 SRCS+=ssh-dss.c ssh-ecdsa.c ssh-ed25519.c mac.c umac.c umac128.c hmac.c misc.c 13 SRCS+=cipher-chachapoly.c chacha.c poly1305.c ssh-ecdsa-sk.c ssh-sk.c
|
/external/openssh/regress/unittests/sshkey/ |
D | test_sshkey.c | 220 ASSERT_PTR_EQ(k1->ecdsa, NULL); /* Can't allocate without NID */ in sshkey_tests() 286 ASSERT_PTR_NE(ke->ecdsa, NULL); in sshkey_tests() 287 ASSERT_PTR_NE(EC_KEY_get0_public_key(ke->ecdsa), NULL); in sshkey_tests() 288 ASSERT_PTR_NE(EC_KEY_get0_private_key(ke->ecdsa), NULL); in sshkey_tests() 339 ASSERT_PTR_NE(k1->ecdsa, NULL); in sshkey_tests() 341 ASSERT_PTR_NE(EC_KEY_get0_public_key(ke->ecdsa), NULL); in sshkey_tests() 342 ASSERT_PTR_EQ(EC_KEY_get0_private_key(k1->ecdsa), NULL); in sshkey_tests()
|
D | Makefile | 9 SRCS+=ssh-dss.c ssh-ecdsa.c ssh-ed25519.c mac.c umac.c umac128.c hmac.c misc.c 13 SRCS+=cipher-chachapoly.c chacha.c poly1305.c ssh-ecdsa-sk.c ssh-sk.c
|
/external/openssh/regress/unittests/authopt/ |
D | Makefile | 11 SRCS+=ssh-dss.c ssh-ecdsa.c ssh-ed25519.c mac.c umac.c umac128.c hmac.c misc.c 15 SRCS+=cipher-chachapoly.c chacha.c poly1305.c ssh-ecdsa-sk.c ssh-sk.c
|
/external/python/cryptography/docs/development/custom-vectors/secp256k1/ |
D | generate_secp256k1.py | 8 from ecdsa import SECP256k1, SigningKey 9 from ecdsa.util import sigdecode_der, sigencode_der
|
/external/openssh/regress/unittests/kex/ |
D | Makefile | 9 SRCS+=ssh-dss.c ssh-ecdsa.c ssh-ed25519.c mac.c umac.c umac128.c hmac.c misc.c 13 SRCS+=cipher-chachapoly.c chacha.c poly1305.c ssh-ecdsa-sk.c ssh-sk.c
|