/external/openssh/regress/ |
keytype.sh | 19 ecdsa-sha2-nistp256) ktypes="$ktypes ecdsa-256" ;; 20 ecdsa-sha2-nistp384) ktypes="$ktypes ecdsa-384" ;; 21 ecdsa-sha2-nistp521) ktypes="$ktypes ecdsa-521" ;; 41 ecdsa-256) t=ecdsa-sha2-nistp256;; 42 ecdsa-384) t=ecdsa-sha2-nistp384; [all...] |
/system/keymaster/ |
ecdsa_operation.cpp | 19 #include <openssl/ecdsa.h> 151 UniquePtr<EC_KEY, EC_KEY_Delete> ecdsa(EVP_PKEY_get1_EC_KEY(ecdsa_key_)); 152 if (!ecdsa.get()) 155 output->Reinitialize(ECDSA_size(ecdsa.get())); 158 output->peek_write(), &siglen_tmp, ecdsa.get())) 212 UniquePtr<EC_KEY, EC_KEY_Delete> ecdsa(EVP_PKEY_get1_EC_KEY(ecdsa_key_)); 213 if (!ecdsa.get()) 218 signature.peek_read(), signature.available_read(), ecdsa.get());
|
ec_keymaster1_key.cpp | 101 unique_ptr<EC_KEY, EC_KEY_Delete> ecdsa( 103 if (!ecdsa) 107 EcdsaKeymaster1Key(ecdsa.release(), hw_enforced, sw_enforced, &error));
|
ecdsa_keymaster1_operation.cpp | 40 // to the hardware module. The regular Ecdsa*Operation classes will do software digesting and 107 unique_ptr<EVP_PKEY, EVP_PKEY_Delete> ecdsa(GetEvpKey(ecdsa_km1_key, error)); 108 if (!ecdsa) 113 return new EcdsaKeymaster1Operation<EcdsaSignOperation>(digest, ecdsa.release(), engine_); 116 "Bug: Pubkey operation requested. Those should be handled by normal ECDSA operations.",
|
ec_keymaster1_key.h | 20 #include <openssl/ecdsa.h>
|
/external/openssh/ |
ssh-ecdsa.c | 1 /* $OpenBSD: ssh-ecdsa.c,v 1.13 2016/04/21 06:08:02 djm Exp $ */ 35 #include <openssl/ecdsa.h> 63 if (key == NULL || key->ecdsa == NULL || 74 if ((sig = ECDSA_do_sign(digest, dlen, key->ecdsa)) == NULL) { 123 if (key == NULL || key->ecdsa == NULL || 167 switch (ECDSA_do_verify(digest, dlen, sig, key->ecdsa)) {
|
sshkey.c | 100 { "ecdsa-sha2-nistp256", "ECDSA", KEY_ECDSA, NID_X9_62_prime256v1, 0, 0 }, 101 { "ecdsa-sha2-nistp384", "ECDSA", KEY_ECDSA, NID_secp384r1, 0, 0 }, 103 { "ecdsa-sha2-nistp521", "ECDSA", KEY_ECDSA, NID_secp521r1, 0, 0 }, 109 { "ecdsa-sha2-nistp256-cert-v01@openssh.com", "ECDSA-CERT", 111 { "ecdsa-sha2-nistp384-cert-v01@openssh.com", "ECDSA-CERT" [all...] |
opensshd.init.in | 38 @COMMENT_OUT_ECC@ ${SSH_KEYGEN} -t ecdsa -f ${HOST_KEY_ECDSA} -N ""
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
generate_cert.go | 13 "crypto/ecdsa" 35 rsaBits = flag.Int("rsa-bits", 2048, "Size of RSA key to generate. Ignored if --ecdsa-curve is set") 36 ecdsaCurve = flag.String("ecdsa-curve", "", "ECDSA curve to use to generate a key. Valid values are P224, P256, P384, P521") 43 case *ecdsa.PrivateKey: 54 case *ecdsa.PrivateKey: 57 fmt.Fprintf(os.Stderr, "Unable to marshal ECDSA private key: %v", err) 79 priv, err = ecdsa.GenerateKey(elliptic.P224(), rand.Reader) 81 priv, err = ecdsa.GenerateKey(elliptic.P256(), rand.Reader) 83 priv, err = ecdsa.GenerateKey(elliptic.P384(), rand.Reader [all...] |
tls.go | 15 "crypto/ecdsa" 262 case *ecdsa.PublicKey: 263 priv, ok := cert.PrivateKey.(*ecdsa.PrivateKey) 279 // OpenSSL ecparam generates SEC1 EC private keys for ECDSA. We try all three. 286 case *rsa.PrivateKey, *ecdsa.PrivateKey:
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
generate_cert.go | 13 "crypto/ecdsa" 35 rsaBits = flag.Int("rsa-bits", 2048, "Size of RSA key to generate. Ignored if --ecdsa-curve is set") 36 ecdsaCurve = flag.String("ecdsa-curve", "", "ECDSA curve to use to generate a key. Valid values are P224, P256, P384, P521") 43 case *ecdsa.PrivateKey: 54 case *ecdsa.PrivateKey: 57 fmt.Fprintf(os.Stderr, "Unable to marshal ECDSA private key: %v", err) 79 priv, err = ecdsa.GenerateKey(elliptic.P224(), rand.Reader) 81 priv, err = ecdsa.GenerateKey(elliptic.P256(), rand.Reader) 83 priv, err = ecdsa.GenerateKey(elliptic.P384(), rand.Reader [all...] |
/external/openssh/regress/unittests/hostkeys/ |
mktestdata.sh | 8 rm -f rsa1* rsa* dsa* ecdsa* ed25519* 19 ssh-keygen -qt ecdsa -b $_ecdsa_bits -C "ECDSA #$_n" -N "" -f ecdsa_$_n
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
sec1.go | 8 "crypto/ecdsa" 32 func ParseECPrivateKey(der []byte) (*ecdsa.PrivateKey, error) { 37 func MarshalECPrivateKey(key *ecdsa.PrivateKey) ([]byte, error) { 59 func parseECPrivateKey(namedCurveOID *asn1.ObjectIdentifier, der []byte) (key *ecdsa.PrivateKey, err error) { 83 priv := new(ecdsa.PrivateKey)
|
example_test.go | 9 "crypto/ecdsa" 129 case *ecdsa.PublicKey: 130 fmt.Println("pub is of type ECDSA:", pub)
|
/prebuilts/go/linux-x86/src/crypto/x509/ |
sec1.go | 8 "crypto/ecdsa" 32 func ParseECPrivateKey(der []byte) (*ecdsa.PrivateKey, error) { 37 func MarshalECPrivateKey(key *ecdsa.PrivateKey) ([]byte, error) { 59 func parseECPrivateKey(namedCurveOID *asn1.ObjectIdentifier, der []byte) (key *ecdsa.PrivateKey, err error) { 83 priv := new(ecdsa.PrivateKey)
|
example_test.go | 9 "crypto/ecdsa" 129 case *ecdsa.PublicKey: 130 fmt.Println("pub is of type ECDSA:", pub)
|
/external/libchrome/crypto/ |
scoped_openssl_types.h | 12 #include <openssl/ecdsa.h>
|
/external/boringssl/src/fipstools/ |
cavp_ecdsa2_sigver_test.cc | 24 #include <openssl/ecdsa.h>
|
cavp_ecdsa2_siggen_test.cc | 25 #include <openssl/ecdsa.h>
|
/external/boringssl/src/ssl/test/runner/ |
sign.go | 9 "crypto/ecdsa" 144 ecdsaKey, ok := key.(*ecdsa.PrivateKey) 167 ecdsaKey, ok := key.(*ecdsa.PrivateKey) 169 return nil, errors.New("invalid key type for ECDSA") 172 return nil, errors.New("invalid curve for ECDSA") 179 r, s, err := ecdsa.Sign(config.rand(), ecdsaKey, digest) 190 ecdsaKey, ok := key.(*ecdsa.PublicKey) 192 return errors.New("invalid key type for ECDSA") 195 return errors.New("invalid curve for ECDSA") 203 return errors.New("ECDSA signature contained zero or negative values" [all...] |
tls.go | 11 "crypto/ecdsa" 243 case *ecdsa.PublicKey: 244 priv, ok := cert.PrivateKey.(*ecdsa.PrivateKey) 295 // OpenSSL ecparam generates SEC1 EC private keys for ECDSA. We try all three. 302 case *rsa.PrivateKey, *ecdsa.PrivateKey:
|
/external/openssh/regress/unittests/sshkey/ |
test_sshkey.c | 229 ASSERT_PTR_EQ(k1->ecdsa, NULL); /* Can't allocate without NID */ 316 ASSERT_PTR_NE(ke->ecdsa, NULL); 317 ASSERT_PTR_NE(EC_KEY_get0_public_key(ke->ecdsa), NULL); 318 ASSERT_PTR_NE(EC_KEY_get0_private_key(ke->ecdsa), NULL); 367 ASSERT_PTR_NE(k1->ecdsa, NULL); 369 ASSERT_PTR_NE(EC_KEY_get0_public_key(ke->ecdsa), NULL); 370 ASSERT_PTR_EQ(EC_KEY_get0_private_key(k1->ecdsa), NULL); 507 TEST_START("sign and verify ECDSA");
|
/external/openssh/contrib/cygwin/ |
ssh-user-config | 250 create_identity id_ecdsa ecdsa "SSH2 ECDSA"
|
/device/linaro/bootloader/edk2/CryptoPkg/Library/OpensslLib/ |
Install.sh | 35 cp crypto/ecdsa/ecdsa.h ../../../Include/openssl
|
/external/boringssl/src/crypto/evp/ |
p_ec.c | 66 #include <openssl/ecdsa.h>
|