/external/boringssl/src/crypto/ecdsa/ |
D | ecdsa.c | 97 OPENSSL_PUT_ERROR(ECDSA, ERR_R_INTERNAL_ERROR); in ECDSA_verify() 123 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB); in digest_to_bn() 130 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB); in digest_to_bn() 152 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_NOT_IMPLEMENTED); in ECDSA_do_verify() 160 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_MISSING_PARAMETERS); in ECDSA_do_verify() 166 OPENSSL_PUT_ERROR(ECDSA, ERR_R_MALLOC_FAILURE); in ECDSA_do_verify() 175 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB); in ECDSA_do_verify() 183 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_BAD_SIGNATURE); in ECDSA_do_verify() 189 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB); in ECDSA_do_verify() 197 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB); in ECDSA_do_verify() [all …]
|
D | ecdsa_asn1.c | 121 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_BAD_SIGNATURE); in ECDSA_SIG_parse() 133 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_BAD_SIGNATURE); in ECDSA_SIG_from_bytes() 146 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_ENCODE_ERROR); in ECDSA_SIG_marshal() 159 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_ENCODE_ERROR); in ECDSA_SIG_to_bytes() 225 OPENSSL_PUT_ERROR(ECDSA, ERR_R_OVERFLOW); in i2d_ECDSA_SIG()
|
/external/boringssl/src/crypto/err/ |
D | ecdsa.errordata | 1 ECDSA,100,BAD_SIGNATURE 2 ECDSA,105,ENCODE_ERROR 3 ECDSA,101,MISSING_PARAMETERS 4 ECDSA,102,NEED_NEW_SETUP_VALUES 5 ECDSA,103,NOT_IMPLEMENTED 6 ECDSA,104,RANDOM_NUMBER_GENERATION_FAILED
|
/external/bouncycastle/patches/ |
D | bcpkix.patch | 618 - addEntries(BSIObjectIdentifiers.ecdsa_plain_SHA1, "SHA1", "PLAIN-ECDSA"); 619 - addEntries(BSIObjectIdentifiers.ecdsa_plain_SHA224, "SHA224", "PLAIN-ECDSA"); 620 - addEntries(BSIObjectIdentifiers.ecdsa_plain_SHA256, "SHA256", "PLAIN-ECDSA"); 621 - addEntries(BSIObjectIdentifiers.ecdsa_plain_SHA384, "SHA384", "PLAIN-ECDSA"); 622 - addEntries(BSIObjectIdentifiers.ecdsa_plain_SHA512, "SHA512", "PLAIN-ECDSA"); 623 - addEntries(BSIObjectIdentifiers.ecdsa_plain_RIPEMD160, "RIPEMD160", "PLAIN-ECDSA"); 625 + // addEntries(BSIObjectIdentifiers.ecdsa_plain_SHA1, "SHA1", "PLAIN-ECDSA"); 626 + // addEntries(BSIObjectIdentifiers.ecdsa_plain_SHA224, "SHA224", "PLAIN-ECDSA"); 627 + // addEntries(BSIObjectIdentifiers.ecdsa_plain_SHA256, "SHA256", "PLAIN-ECDSA"); 628 + // addEntries(BSIObjectIdentifiers.ecdsa_plain_SHA384, "SHA384", "PLAIN-ECDSA"); [all …]
|
D | bcprov.patch | 1440 - provider.addAlgorithm("KeyFactory.ECDSA", PREFIX + "KeyFactorySpi$ECDSA"); 1445 + // provider.addAlgorithm("KeyFactory.ECDSA", PREFIX + "KeyFactorySpi$ECDSA"); 1452 - provider.addAlgorithm("KeyPairGenerator.ECDSA", PREFIX + "KeyPairGeneratorSpi$ECDSA"); 1469 + // provider.addAlgorithm("KeyPairGenerator.ECDSA", PREFIX + "KeyPairGeneratorSpi$ECDSA… 1487 provider.addAlgorithm("Signature.ECDSA", PREFIX + "SignatureSpi$ecDSA"); 1490 provider.addAlgorithm("Alg.Alias.Signature.SHA1WithECDSA", "ECDSA"); 1491 provider.addAlgorithm("Alg.Alias.Signature.ECDSAWithSHA1", "ECDSA"); 1492 provider.addAlgorithm("Alg.Alias.Signature.1.2.840.10045.4.1", "ECDSA"); 1493 …provider.addAlgorithm("Alg.Alias.Signature." + TeleTrusTObjectIdentifiers.ecSignWithSha1, "ECDSA"); 1502 …provider.addAlgorithm("Alg.Alias.Signature." + TeleTrusTObjectIdentifiers.ecSignWithSha1, "ECDSA"); [all …]
|
/external/webrtc/webrtc/base/ |
D | rtccertificate_unittests.cc | 78 params.key_params = KeyParams::ECDSA(); in GenerateCertificateWithExpires() 89 SSLIdentity::Generate(kTestCertCommonName, KeyParams::ECDSA())); in TEST_F()
|
D | ssladapter_unittest.cc | 357 : SSLAdapterTestBase(rtc::SSL_MODE_TLS, rtc::KeyParams::ECDSA()) {} in SSLAdapterTestTLS_ECDSA() 369 : SSLAdapterTestBase(rtc::SSL_MODE_DTLS, rtc::KeyParams::ECDSA()) {} in SSLAdapterTestDTLS_ECDSA()
|
D | sslidentity.h | 145 static KeyParams ECDSA(ECCurve curve = EC_NIST_P256);
|
D | sslstreamadapter_unittest.cc | 1149 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)), 1152 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)))); 1162 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)), 1165 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256))));
|
D | sslidentity.cc | 60 KeyParams KeyParams::ECDSA(ECCurve curve) { in ECDSA() function in rtc::KeyParams
|
D | sslidentity_unittest.cc | 399 params.key_params = rtc::KeyParams::ECDSA(rtc::EC_NIST_P256); in TestExpireTime()
|
/external/conscrypt/src/test/java/org/conscrypt/ct/ |
D | SerializationTest.java | 45 assertEquals(DigitallySigned.SignatureAlgorithm.ECDSA, in test_decode_SignedCertificateTimestamp() 93 assertEquals(DigitallySigned.SignatureAlgorithm.ECDSA, dst.getSignatureAlgorithm()); in test_decode_DigitallySigned()
|
/external/webrtc/talk/app/webrtc/java/src/org/webrtc/ |
D | PeerConnection.java | 135 RSA, ECDSA enumConstant 167 keyType = KeyType.ECDSA; in RTCConfiguration()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/ |
D | KeyFactorySpi.java | 195 public static class ECDSA class in KeyFactorySpi 198 public ECDSA() in ECDSA() method in KeyFactorySpi.ECDSA
|
D | KeyPairGeneratorSpi.java | 248 public static class ECDSA class in KeyPairGeneratorSpi 251 public ECDSA() in ECDSA() method in KeyPairGeneratorSpi.ECDSA
|
/external/conscrypt/src/main/java/org/conscrypt/ct/ |
D | DigitallySigned.java | 49 ECDSA; enumConstant
|
/external/webrtc/webrtc/examples/androidapp/src/org/appspot/apprtc/ |
D | PeerConnectionClient.java | 459 rtcConfig.keyType = PeerConnection.KeyType.ECDSA; in createPeerConnectionInternal()
|
/external/boringssl/src/ssl/test/runner/ |
D | handshake_client.go | 529 case ecdsaAvail && x509Cert.PublicKeyAlgorithm == x509.ECDSA:
|
/external/libmicrohttpd/src/datadir/ |
D | spdy-draft.txt | 1419 ECDSA, it would be an ECDSA-Sig-Value 1426 the same type (RSA, ECDSA, etc) as the client certificate associated
|
/external/tpm2/generator/ |
D | raw_structures.txt | 13131 the ECDSA scheme 13139 ECDSA from SM2 13501 an ECDSA scheme 14169 an ECDSA signature 14177 same format as ECDSA 14185 same format as ECDSA 14193 same format as ECDSA 16583 ECDSA
|
D | raw_structures_fixed.txt | 13135 the ECDSA scheme 13143 ECDSA from SM2 13502 an ECDSA scheme 14171 an ECDSA signature 14179 same format as ECDSA 14187 same format as ECDSA 14195 same format as ECDSA 16550 ECDSA
|
/external/conscrypt/src/main/native/ |
D | org_conscrypt_NativeCrypto.cpp | 2127 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_NOT_IMPLEMENTED);
|
/external/tpm2/ |
D | part4.txt | 21028 1091 TEST(ALG_ECDSA_VALUE); // ECDSA is used to verify each key 23119 2691 // If ECC is implemented ECDSA is required 33985 …This function implements the ECDSA signing algorithm. The method is described in the comments belo… 34035 728 // The algorithm as described in "Suite B Implementer's Guide to FIPS 186-3(ECDSA)" 34694 … This function validates an ECDSA signature. rIn and sIn shoudl have been checked to make sure that
|