/external/boringssl/src/crypto/ecdsa/ |
ecdsa.c | 53 #include <openssl/ecdsa.h> 85 /* Decode the ECDSA signature. */ 96 OPENSSL_PUT_ERROR(ECDSA, ERR_R_INTERNAL_ERROR); 122 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB); 129 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB); 154 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_MISSING_PARAMETERS); 160 OPENSSL_PUT_ERROR(ECDSA, ERR_R_MALLOC_FAILURE); 169 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB); 177 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_BAD_SIGNATURE); 184 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB) [all...] |
ecdsa_asn1.c | 53 #include <openssl/ecdsa.h> 122 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_BAD_SIGNATURE); 134 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_BAD_SIGNATURE); 147 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_ENCODE_ERROR); 160 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_ENCODE_ERROR); 188 /* An ECDSA signature is two INTEGERs. */
|
/external/webrtc/webrtc/base/ |
rtccertificate_unittests.cc | 76 // Certificate type does not matter for our purposes, using ECDSA because it 78 params.key_params = KeyParams::ECDSA(); 87 // Certificate type doesn't matter, using ECDSA because it's fast to generate. 89 SSLIdentity::Generate(kTestCertCommonName, KeyParams::ECDSA()));
|
sslidentity.h | 144 // Generate a a KeyParams for ECDSA specifying the curve. 145 static KeyParams ECDSA(ECCurve curve = EC_NIST_P256);
|
ssladapter_unittest.cc | 357 : SSLAdapterTestBase(rtc::SSL_MODE_TLS, rtc::KeyParams::ECDSA()) {} 369 : SSLAdapterTestBase(rtc::SSL_MODE_DTLS, rtc::KeyParams::ECDSA()) {} 381 // Test that handshake works, using ECDSA 392 // Test transfer between client and server, using ECDSA 405 // Test that handshake works, using ECDSA 416 // Test transfer between client and server, using ECDSA
|
/build/make/tools/releasetools/ |
check_ota_package_signature.py | 43 assert not algorithm.group(1).startswith('ecdsa'), ( 44 'This script doesn\'t support verifying ECDSA signed package yet.')
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ct/ |
DigitallySigned.java | 49 ECDSA;
|
/external/boringssl/src/ssl/test/runner/ |
sign.go | 9 "crypto/ecdsa" 142 ecdsaKey, ok := key.(*ecdsa.PrivateKey) 165 ecdsaKey, ok := key.(*ecdsa.PrivateKey) 167 return nil, errors.New("invalid key type for ECDSA") 170 return nil, errors.New("invalid curve for ECDSA") 177 r, s, err := ecdsa.Sign(config.rand(), ecdsaKey, digest) 188 ecdsaKey, ok := key.(*ecdsa.PublicKey) 190 return errors.New("invalid key type for ECDSA") 193 return errors.New("invalid curve for ECDSA") 201 return errors.New("ECDSA signature contained zero or negative values" [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
x509_test.go | 10 "crypto/ecdsa" 337 ecdsaPriv, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader) 339 t.Fatalf("Failed to generate ECDSA key: %s", err) 349 {"RSA/ECDSA", &testPrivateKey.PublicKey, ecdsaPriv, false, ECDSAWithSHA384}, 350 {"ECDSA/RSA", &ecdsaPriv.PublicKey, testPrivateKey, false, SHA256WithRSA}, 351 {"ECDSA/ECDSA", &ecdsaPriv.PublicKey, ecdsaPriv, true, ECDSAWithSHA1}, 353 {"ECDSA/RSAPSS", &ecdsaPriv.PublicKey, testPrivateKey, false, SHA256WithRSAPSS}, 354 {"RSAPSS/ECDSA", &testPrivateKey.PublicKey, ecdsaPriv, false, ECDSAWithSHA384}, 522 priv, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader [all...] |
x509.go | 12 "crypto/ecdsa" 40 // Supported key types include RSA, DSA, and ECDSA. Unknown key 44 // or *ecdsa.PublicKey. 75 case *ecdsa.PublicKey: 89 return nil, pkix.AlgorithmIdentifier{}, errors.New("x509: only RSA and ECDSA public keys supported") 207 ECDSAWithSHA1: "ECDSA-SHA1", 208 ECDSAWithSHA256: "ECDSA-SHA256", 209 ECDSAWithSHA384: "ECDSA-SHA384", 210 ECDSAWithSHA512: "ECDSA-SHA512", 226 ECDSA [all...] |
example_test.go | 9 "crypto/ecdsa" 129 case *ecdsa.PublicKey: 130 fmt.Println("pub is of type ECDSA:", pub)
|
/prebuilts/go/linux-x86/src/crypto/x509/ |
x509_test.go | 10 "crypto/ecdsa" 337 ecdsaPriv, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader) 339 t.Fatalf("Failed to generate ECDSA key: %s", err) 349 {"RSA/ECDSA", &testPrivateKey.PublicKey, ecdsaPriv, false, ECDSAWithSHA384}, 350 {"ECDSA/RSA", &ecdsaPriv.PublicKey, testPrivateKey, false, SHA256WithRSA}, 351 {"ECDSA/ECDSA", &ecdsaPriv.PublicKey, ecdsaPriv, true, ECDSAWithSHA1}, 353 {"ECDSA/RSAPSS", &ecdsaPriv.PublicKey, testPrivateKey, false, SHA256WithRSAPSS}, 354 {"RSAPSS/ECDSA", &testPrivateKey.PublicKey, ecdsaPriv, false, ECDSAWithSHA384}, 522 priv, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader [all...] |
x509.go | 12 "crypto/ecdsa" 40 // Supported key types include RSA, DSA, and ECDSA. Unknown key 44 // or *ecdsa.PublicKey. 75 case *ecdsa.PublicKey: 89 return nil, pkix.AlgorithmIdentifier{}, errors.New("x509: only RSA and ECDSA public keys supported") 207 ECDSAWithSHA1: "ECDSA-SHA1", 208 ECDSAWithSHA256: "ECDSA-SHA256", 209 ECDSAWithSHA384: "ECDSA-SHA384", 210 ECDSAWithSHA512: "ECDSA-SHA512", 226 ECDSA [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/ |
KeyFactorySpi.java | 202 public static class ECDSA 205 public ECDSA() 207 super("ECDSA", BouncyCastleProvider.CONFIGURATION);
|
KeyPairGeneratorSpi.java | 256 public static class ECDSA 259 public ECDSA() 261 super("ECDSA", BouncyCastleProvider.CONFIGURATION);
|
/external/conscrypt/platform/src/test/java/org/conscrypt/ct/ |
SerializationTest.java | 45 assertEquals(DigitallySigned.SignatureAlgorithm.ECDSA, 93 assertEquals(DigitallySigned.SignatureAlgorithm.ECDSA, dst.getSignatureAlgorithm());
|
/external/webrtc/talk/app/webrtc/java/src/org/webrtc/ |
PeerConnection.java | 135 RSA, ECDSA 167 keyType = KeyType.ECDSA;
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
key_agreement.go | 9 "crypto/ecdsa" 177 // either be ECDSA or RSA. 264 _, ok := priv.Public().(*ecdsa.PublicKey) 266 return nil, errors.New("tls: ECDHE ECDSA requires an ECDSA server key") 402 pubKey, ok := cert.PublicKey.(*ecdsa.PublicKey) 404 return errors.New("tls: ECDHE ECDSA requires a ECDSA server public key") 411 return errors.New("tls: ECDSA signature contained zero or negative values") 413 if !ecdsa.Verify(pubKey, digest, ecdsaSig.R, ecdsaSig.S) [all...] |
generate_cert.go | 13 "crypto/ecdsa" 35 rsaBits = flag.Int("rsa-bits", 2048, "Size of RSA key to generate. Ignored if --ecdsa-curve is set") 36 ecdsaCurve = flag.String("ecdsa-curve", "", "ECDSA curve to use to generate a key. Valid values are P224, P256, P384, P521") 43 case *ecdsa.PrivateKey: 54 case *ecdsa.PrivateKey: 57 fmt.Fprintf(os.Stderr, "Unable to marshal ECDSA private key: %v", err) 79 priv, err = ecdsa.GenerateKey(elliptic.P224(), rand.Reader) 81 priv, err = ecdsa.GenerateKey(elliptic.P256(), rand.Reader) 83 priv, err = ecdsa.GenerateKey(elliptic.P384(), rand.Reader [all...] |
handshake_client_test.go | 9 "crypto/ecdsa" 122 // *ecdsa.PrivateKey which is the private key for the reference server. 168 case *ecdsa.PrivateKey: 504 name: "ECDHE-ECDSA-AES", 505 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-SHA"}, 516 name: "ECDHE-ECDSA-AES-GCM", 517 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-GCM-SHA256"}, 526 name: "ECDHE-ECDSA-AES256-GCM-SHA384", 527 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES256-GCM-SHA384"}, 552 name: "ECDHE-ECDSA-AES128-SHA256" [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
key_agreement.go | 9 "crypto/ecdsa" 177 // either be ECDSA or RSA. 264 _, ok := priv.Public().(*ecdsa.PublicKey) 266 return nil, errors.New("tls: ECDHE ECDSA requires an ECDSA server key") 402 pubKey, ok := cert.PublicKey.(*ecdsa.PublicKey) 404 return errors.New("tls: ECDHE ECDSA requires a ECDSA server public key") 411 return errors.New("tls: ECDSA signature contained zero or negative values") 413 if !ecdsa.Verify(pubKey, digest, ecdsaSig.R, ecdsaSig.S) [all...] |
generate_cert.go | 13 "crypto/ecdsa" 35 rsaBits = flag.Int("rsa-bits", 2048, "Size of RSA key to generate. Ignored if --ecdsa-curve is set") 36 ecdsaCurve = flag.String("ecdsa-curve", "", "ECDSA curve to use to generate a key. Valid values are P224, P256, P384, P521") 43 case *ecdsa.PrivateKey: 54 case *ecdsa.PrivateKey: 57 fmt.Fprintf(os.Stderr, "Unable to marshal ECDSA private key: %v", err) 79 priv, err = ecdsa.GenerateKey(elliptic.P224(), rand.Reader) 81 priv, err = ecdsa.GenerateKey(elliptic.P256(), rand.Reader) 83 priv, err = ecdsa.GenerateKey(elliptic.P384(), rand.Reader [all...] |
handshake_client_test.go | 9 "crypto/ecdsa" 122 // *ecdsa.PrivateKey which is the private key for the reference server. 168 case *ecdsa.PrivateKey: 504 name: "ECDHE-ECDSA-AES", 505 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-SHA"}, 516 name: "ECDHE-ECDSA-AES-GCM", 517 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-GCM-SHA256"}, 526 name: "ECDHE-ECDSA-AES256-GCM-SHA384", 527 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES256-GCM-SHA384"}, 552 name: "ECDHE-ECDSA-AES128-SHA256" [all...] |
/prebuilts/go/darwin-x86/src/crypto/ecdsa/ |
ecdsa.go | 5 // Package ecdsa implements the Elliptic Curve Digital Signature Algorithm, as 11 package ecdsa package 15 // http://www.nsa.gov/ia/_files/ecdsa.pdf 43 aesIV = "IV for ECDSA CTR" 46 // PublicKey represents an ECDSA public key. 52 // PrivateKey represents a ECDSA private key.
|
/prebuilts/go/linux-x86/src/crypto/ecdsa/ |
ecdsa.go | 5 // Package ecdsa implements the Elliptic Curve Digital Signature Algorithm, as 11 package ecdsa package 15 // http://www.nsa.gov/ia/_files/ecdsa.pdf 43 aesIV = "IV for ECDSA CTR" 46 // PublicKey represents an ECDSA public key. 52 // PrivateKey represents a ECDSA private key.
|