HomeSort by relevance Sort by last modified time
    Searched refs:ECDSA (Results 1 - 25 of 88) sorted by null

1 2 3 4

  /external/boringssl/src/crypto/ecdsa/
ecdsa.c 53 #include <openssl/ecdsa.h>
85 /* Decode the ECDSA signature. */
96 OPENSSL_PUT_ERROR(ECDSA, ERR_R_INTERNAL_ERROR);
122 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB);
129 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB);
154 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_MISSING_PARAMETERS);
160 OPENSSL_PUT_ERROR(ECDSA, ERR_R_MALLOC_FAILURE);
169 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB);
177 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_BAD_SIGNATURE);
184 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB)
    [all...]
ecdsa_asn1.c 53 #include <openssl/ecdsa.h>
122 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_BAD_SIGNATURE);
134 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_BAD_SIGNATURE);
147 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_ENCODE_ERROR);
160 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_ENCODE_ERROR);
188 /* An ECDSA signature is two INTEGERs. */
  /external/webrtc/webrtc/base/
rtccertificate_unittests.cc 76 // Certificate type does not matter for our purposes, using ECDSA because it
78 params.key_params = KeyParams::ECDSA();
87 // Certificate type doesn't matter, using ECDSA because it's fast to generate.
89 SSLIdentity::Generate(kTestCertCommonName, KeyParams::ECDSA()));
sslidentity.h 144 // Generate a a KeyParams for ECDSA specifying the curve.
145 static KeyParams ECDSA(ECCurve curve = EC_NIST_P256);
ssladapter_unittest.cc 357 : SSLAdapterTestBase(rtc::SSL_MODE_TLS, rtc::KeyParams::ECDSA()) {}
369 : SSLAdapterTestBase(rtc::SSL_MODE_DTLS, rtc::KeyParams::ECDSA()) {}
381 // Test that handshake works, using ECDSA
392 // Test transfer between client and server, using ECDSA
405 // Test that handshake works, using ECDSA
416 // Test transfer between client and server, using ECDSA
  /build/make/tools/releasetools/
check_ota_package_signature.py 43 assert not algorithm.group(1).startswith('ecdsa'), (
44 'This script doesn\'t support verifying ECDSA signed package yet.')
  /external/conscrypt/platform/src/main/java/org/conscrypt/ct/
DigitallySigned.java 49 ECDSA;
  /external/boringssl/src/ssl/test/runner/
sign.go 9 "crypto/ecdsa"
142 ecdsaKey, ok := key.(*ecdsa.PrivateKey)
165 ecdsaKey, ok := key.(*ecdsa.PrivateKey)
167 return nil, errors.New("invalid key type for ECDSA")
170 return nil, errors.New("invalid curve for ECDSA")
177 r, s, err := ecdsa.Sign(config.rand(), ecdsaKey, digest)
188 ecdsaKey, ok := key.(*ecdsa.PublicKey)
190 return errors.New("invalid key type for ECDSA")
193 return errors.New("invalid curve for ECDSA")
201 return errors.New("ECDSA signature contained zero or negative values"
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/x509/
x509_test.go 10 "crypto/ecdsa"
337 ecdsaPriv, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
339 t.Fatalf("Failed to generate ECDSA key: %s", err)
349 {"RSA/ECDSA", &testPrivateKey.PublicKey, ecdsaPriv, false, ECDSAWithSHA384},
350 {"ECDSA/RSA", &ecdsaPriv.PublicKey, testPrivateKey, false, SHA256WithRSA},
351 {"ECDSA/ECDSA", &ecdsaPriv.PublicKey, ecdsaPriv, true, ECDSAWithSHA1},
353 {"ECDSA/RSAPSS", &ecdsaPriv.PublicKey, testPrivateKey, false, SHA256WithRSAPSS},
354 {"RSAPSS/ECDSA", &testPrivateKey.PublicKey, ecdsaPriv, false, ECDSAWithSHA384},
522 priv, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader
    [all...]
x509.go 12 "crypto/ecdsa"
40 // Supported key types include RSA, DSA, and ECDSA. Unknown key
44 // or *ecdsa.PublicKey.
75 case *ecdsa.PublicKey:
89 return nil, pkix.AlgorithmIdentifier{}, errors.New("x509: only RSA and ECDSA public keys supported")
207 ECDSAWithSHA1: "ECDSA-SHA1",
208 ECDSAWithSHA256: "ECDSA-SHA256",
209 ECDSAWithSHA384: "ECDSA-SHA384",
210 ECDSAWithSHA512: "ECDSA-SHA512",
226 ECDSA
    [all...]
example_test.go 9 "crypto/ecdsa"
129 case *ecdsa.PublicKey:
130 fmt.Println("pub is of type ECDSA:", pub)
  /prebuilts/go/linux-x86/src/crypto/x509/
x509_test.go 10 "crypto/ecdsa"
337 ecdsaPriv, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
339 t.Fatalf("Failed to generate ECDSA key: %s", err)
349 {"RSA/ECDSA", &testPrivateKey.PublicKey, ecdsaPriv, false, ECDSAWithSHA384},
350 {"ECDSA/RSA", &ecdsaPriv.PublicKey, testPrivateKey, false, SHA256WithRSA},
351 {"ECDSA/ECDSA", &ecdsaPriv.PublicKey, ecdsaPriv, true, ECDSAWithSHA1},
353 {"ECDSA/RSAPSS", &ecdsaPriv.PublicKey, testPrivateKey, false, SHA256WithRSAPSS},
354 {"RSAPSS/ECDSA", &testPrivateKey.PublicKey, ecdsaPriv, false, ECDSAWithSHA384},
522 priv, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader
    [all...]
x509.go 12 "crypto/ecdsa"
40 // Supported key types include RSA, DSA, and ECDSA. Unknown key
44 // or *ecdsa.PublicKey.
75 case *ecdsa.PublicKey:
89 return nil, pkix.AlgorithmIdentifier{}, errors.New("x509: only RSA and ECDSA public keys supported")
207 ECDSAWithSHA1: "ECDSA-SHA1",
208 ECDSAWithSHA256: "ECDSA-SHA256",
209 ECDSAWithSHA384: "ECDSA-SHA384",
210 ECDSAWithSHA512: "ECDSA-SHA512",
226 ECDSA
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/
KeyFactorySpi.java 202 public static class ECDSA
205 public ECDSA()
207 super("ECDSA", BouncyCastleProvider.CONFIGURATION);
KeyPairGeneratorSpi.java 256 public static class ECDSA
259 public ECDSA()
261 super("ECDSA", BouncyCastleProvider.CONFIGURATION);
  /external/conscrypt/platform/src/test/java/org/conscrypt/ct/
SerializationTest.java 45 assertEquals(DigitallySigned.SignatureAlgorithm.ECDSA,
93 assertEquals(DigitallySigned.SignatureAlgorithm.ECDSA, dst.getSignatureAlgorithm());
  /external/webrtc/talk/app/webrtc/java/src/org/webrtc/
PeerConnection.java 135 RSA, ECDSA
167 keyType = KeyType.ECDSA;
  /prebuilts/go/darwin-x86/src/crypto/tls/
key_agreement.go 9 "crypto/ecdsa"
177 // either be ECDSA or RSA.
264 _, ok := priv.Public().(*ecdsa.PublicKey)
266 return nil, errors.New("tls: ECDHE ECDSA requires an ECDSA server key")
402 pubKey, ok := cert.PublicKey.(*ecdsa.PublicKey)
404 return errors.New("tls: ECDHE ECDSA requires a ECDSA server public key")
411 return errors.New("tls: ECDSA signature contained zero or negative values")
413 if !ecdsa.Verify(pubKey, digest, ecdsaSig.R, ecdsaSig.S)
    [all...]
generate_cert.go 13 "crypto/ecdsa"
35 rsaBits = flag.Int("rsa-bits", 2048, "Size of RSA key to generate. Ignored if --ecdsa-curve is set")
36 ecdsaCurve = flag.String("ecdsa-curve", "", "ECDSA curve to use to generate a key. Valid values are P224, P256, P384, P521")
43 case *ecdsa.PrivateKey:
54 case *ecdsa.PrivateKey:
57 fmt.Fprintf(os.Stderr, "Unable to marshal ECDSA private key: %v", err)
79 priv, err = ecdsa.GenerateKey(elliptic.P224(), rand.Reader)
81 priv, err = ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
83 priv, err = ecdsa.GenerateKey(elliptic.P384(), rand.Reader
    [all...]
handshake_client_test.go 9 "crypto/ecdsa"
122 // *ecdsa.PrivateKey which is the private key for the reference server.
168 case *ecdsa.PrivateKey:
504 name: "ECDHE-ECDSA-AES",
505 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-SHA"},
516 name: "ECDHE-ECDSA-AES-GCM",
517 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-GCM-SHA256"},
526 name: "ECDHE-ECDSA-AES256-GCM-SHA384",
527 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES256-GCM-SHA384"},
552 name: "ECDHE-ECDSA-AES128-SHA256"
    [all...]
  /prebuilts/go/linux-x86/src/crypto/tls/
key_agreement.go 9 "crypto/ecdsa"
177 // either be ECDSA or RSA.
264 _, ok := priv.Public().(*ecdsa.PublicKey)
266 return nil, errors.New("tls: ECDHE ECDSA requires an ECDSA server key")
402 pubKey, ok := cert.PublicKey.(*ecdsa.PublicKey)
404 return errors.New("tls: ECDHE ECDSA requires a ECDSA server public key")
411 return errors.New("tls: ECDSA signature contained zero or negative values")
413 if !ecdsa.Verify(pubKey, digest, ecdsaSig.R, ecdsaSig.S)
    [all...]
generate_cert.go 13 "crypto/ecdsa"
35 rsaBits = flag.Int("rsa-bits", 2048, "Size of RSA key to generate. Ignored if --ecdsa-curve is set")
36 ecdsaCurve = flag.String("ecdsa-curve", "", "ECDSA curve to use to generate a key. Valid values are P224, P256, P384, P521")
43 case *ecdsa.PrivateKey:
54 case *ecdsa.PrivateKey:
57 fmt.Fprintf(os.Stderr, "Unable to marshal ECDSA private key: %v", err)
79 priv, err = ecdsa.GenerateKey(elliptic.P224(), rand.Reader)
81 priv, err = ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
83 priv, err = ecdsa.GenerateKey(elliptic.P384(), rand.Reader
    [all...]
handshake_client_test.go 9 "crypto/ecdsa"
122 // *ecdsa.PrivateKey which is the private key for the reference server.
168 case *ecdsa.PrivateKey:
504 name: "ECDHE-ECDSA-AES",
505 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-SHA"},
516 name: "ECDHE-ECDSA-AES-GCM",
517 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-GCM-SHA256"},
526 name: "ECDHE-ECDSA-AES256-GCM-SHA384",
527 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES256-GCM-SHA384"},
552 name: "ECDHE-ECDSA-AES128-SHA256"
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/ecdsa/
ecdsa.go 5 // Package ecdsa implements the Elliptic Curve Digital Signature Algorithm, as
11 package ecdsa package
15 // http://www.nsa.gov/ia/_files/ecdsa.pdf
43 aesIV = "IV for ECDSA CTR"
46 // PublicKey represents an ECDSA public key.
52 // PrivateKey represents a ECDSA private key.
  /prebuilts/go/linux-x86/src/crypto/ecdsa/
ecdsa.go 5 // Package ecdsa implements the Elliptic Curve Digital Signature Algorithm, as
11 package ecdsa package
15 // http://www.nsa.gov/ia/_files/ecdsa.pdf
43 aesIV = "IV for ECDSA CTR"
46 // PublicKey represents an ECDSA public key.
52 // PrivateKey represents a ECDSA private key.

Completed in 3311 milliseconds

1 2 3 4