HomeSort by relevance Sort by last modified time
    Searched refs:ecdsa (Results 1 - 25 of 90) sorted by null

1 2 3 4

  /external/openssh/regress/
keytype.sh 19 ecdsa-sha2-nistp256) ktypes="$ktypes ecdsa-256" ;;
20 ecdsa-sha2-nistp384) ktypes="$ktypes ecdsa-384" ;;
21 ecdsa-sha2-nistp521) ktypes="$ktypes ecdsa-521" ;;
41 ecdsa-256) t=ecdsa-sha2-nistp256;;
42 ecdsa-384) t=ecdsa-sha2-nistp384;
    [all...]
  /system/keymaster/
ecdsa_operation.cpp 19 #include <openssl/ecdsa.h>
151 UniquePtr<EC_KEY, EC_KEY_Delete> ecdsa(EVP_PKEY_get1_EC_KEY(ecdsa_key_));
152 if (!ecdsa.get())
155 output->Reinitialize(ECDSA_size(ecdsa.get()));
158 output->peek_write(), &siglen_tmp, ecdsa.get()))
212 UniquePtr<EC_KEY, EC_KEY_Delete> ecdsa(EVP_PKEY_get1_EC_KEY(ecdsa_key_));
213 if (!ecdsa.get())
218 signature.peek_read(), signature.available_read(), ecdsa.get());
ec_keymaster1_key.cpp 101 unique_ptr<EC_KEY, EC_KEY_Delete> ecdsa(
103 if (!ecdsa)
107 EcdsaKeymaster1Key(ecdsa.release(), hw_enforced, sw_enforced, &error));
ecdsa_keymaster1_operation.cpp 40 // to the hardware module. The regular Ecdsa*Operation classes will do software digesting and
107 unique_ptr<EVP_PKEY, EVP_PKEY_Delete> ecdsa(GetEvpKey(ecdsa_km1_key, error));
108 if (!ecdsa)
113 return new EcdsaKeymaster1Operation<EcdsaSignOperation>(digest, ecdsa.release(), engine_);
116 "Bug: Pubkey operation requested. Those should be handled by normal ECDSA operations.",
ec_keymaster1_key.h 20 #include <openssl/ecdsa.h>
  /external/openssh/
ssh-ecdsa.c 1 /* $OpenBSD: ssh-ecdsa.c,v 1.13 2016/04/21 06:08:02 djm Exp $ */
35 #include <openssl/ecdsa.h>
63 if (key == NULL || key->ecdsa == NULL ||
74 if ((sig = ECDSA_do_sign(digest, dlen, key->ecdsa)) == NULL) {
123 if (key == NULL || key->ecdsa == NULL ||
167 switch (ECDSA_do_verify(digest, dlen, sig, key->ecdsa)) {
sshkey.c 100 { "ecdsa-sha2-nistp256", "ECDSA", KEY_ECDSA, NID_X9_62_prime256v1, 0, 0 },
101 { "ecdsa-sha2-nistp384", "ECDSA", KEY_ECDSA, NID_secp384r1, 0, 0 },
103 { "ecdsa-sha2-nistp521", "ECDSA", KEY_ECDSA, NID_secp521r1, 0, 0 },
109 { "ecdsa-sha2-nistp256-cert-v01@openssh.com", "ECDSA-CERT",
111 { "ecdsa-sha2-nistp384-cert-v01@openssh.com", "ECDSA-CERT"
    [all...]
opensshd.init.in 38 @COMMENT_OUT_ECC@ ${SSH_KEYGEN} -t ecdsa -f ${HOST_KEY_ECDSA} -N ""
  /prebuilts/go/darwin-x86/src/crypto/tls/
generate_cert.go 13 "crypto/ecdsa"
35 rsaBits = flag.Int("rsa-bits", 2048, "Size of RSA key to generate. Ignored if --ecdsa-curve is set")
36 ecdsaCurve = flag.String("ecdsa-curve", "", "ECDSA curve to use to generate a key. Valid values are P224, P256, P384, P521")
43 case *ecdsa.PrivateKey:
54 case *ecdsa.PrivateKey:
57 fmt.Fprintf(os.Stderr, "Unable to marshal ECDSA private key: %v", err)
79 priv, err = ecdsa.GenerateKey(elliptic.P224(), rand.Reader)
81 priv, err = ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
83 priv, err = ecdsa.GenerateKey(elliptic.P384(), rand.Reader
    [all...]
tls.go 15 "crypto/ecdsa"
262 case *ecdsa.PublicKey:
263 priv, ok := cert.PrivateKey.(*ecdsa.PrivateKey)
279 // OpenSSL ecparam generates SEC1 EC private keys for ECDSA. We try all three.
286 case *rsa.PrivateKey, *ecdsa.PrivateKey:
  /prebuilts/go/linux-x86/src/crypto/tls/
generate_cert.go 13 "crypto/ecdsa"
35 rsaBits = flag.Int("rsa-bits", 2048, "Size of RSA key to generate. Ignored if --ecdsa-curve is set")
36 ecdsaCurve = flag.String("ecdsa-curve", "", "ECDSA curve to use to generate a key. Valid values are P224, P256, P384, P521")
43 case *ecdsa.PrivateKey:
54 case *ecdsa.PrivateKey:
57 fmt.Fprintf(os.Stderr, "Unable to marshal ECDSA private key: %v", err)
79 priv, err = ecdsa.GenerateKey(elliptic.P224(), rand.Reader)
81 priv, err = ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
83 priv, err = ecdsa.GenerateKey(elliptic.P384(), rand.Reader
    [all...]
  /external/openssh/regress/unittests/hostkeys/
mktestdata.sh 8 rm -f rsa1* rsa* dsa* ecdsa* ed25519*
19 ssh-keygen -qt ecdsa -b $_ecdsa_bits -C "ECDSA #$_n" -N "" -f ecdsa_$_n
  /prebuilts/go/darwin-x86/src/crypto/x509/
sec1.go 8 "crypto/ecdsa"
32 func ParseECPrivateKey(der []byte) (*ecdsa.PrivateKey, error) {
37 func MarshalECPrivateKey(key *ecdsa.PrivateKey) ([]byte, error) {
59 func parseECPrivateKey(namedCurveOID *asn1.ObjectIdentifier, der []byte) (key *ecdsa.PrivateKey, err error) {
83 priv := new(ecdsa.PrivateKey)
example_test.go 9 "crypto/ecdsa"
129 case *ecdsa.PublicKey:
130 fmt.Println("pub is of type ECDSA:", pub)
  /prebuilts/go/linux-x86/src/crypto/x509/
sec1.go 8 "crypto/ecdsa"
32 func ParseECPrivateKey(der []byte) (*ecdsa.PrivateKey, error) {
37 func MarshalECPrivateKey(key *ecdsa.PrivateKey) ([]byte, error) {
59 func parseECPrivateKey(namedCurveOID *asn1.ObjectIdentifier, der []byte) (key *ecdsa.PrivateKey, err error) {
83 priv := new(ecdsa.PrivateKey)
example_test.go 9 "crypto/ecdsa"
129 case *ecdsa.PublicKey:
130 fmt.Println("pub is of type ECDSA:", pub)
  /external/libchrome/crypto/
scoped_openssl_types.h 12 #include <openssl/ecdsa.h>
  /external/boringssl/src/fipstools/
cavp_ecdsa2_sigver_test.cc 24 #include <openssl/ecdsa.h>
cavp_ecdsa2_siggen_test.cc 25 #include <openssl/ecdsa.h>
  /external/boringssl/src/ssl/test/runner/
sign.go 9 "crypto/ecdsa"
144 ecdsaKey, ok := key.(*ecdsa.PrivateKey)
167 ecdsaKey, ok := key.(*ecdsa.PrivateKey)
169 return nil, errors.New("invalid key type for ECDSA")
172 return nil, errors.New("invalid curve for ECDSA")
179 r, s, err := ecdsa.Sign(config.rand(), ecdsaKey, digest)
190 ecdsaKey, ok := key.(*ecdsa.PublicKey)
192 return errors.New("invalid key type for ECDSA")
195 return errors.New("invalid curve for ECDSA")
203 return errors.New("ECDSA signature contained zero or negative values"
    [all...]
tls.go 11 "crypto/ecdsa"
243 case *ecdsa.PublicKey:
244 priv, ok := cert.PrivateKey.(*ecdsa.PrivateKey)
295 // OpenSSL ecparam generates SEC1 EC private keys for ECDSA. We try all three.
302 case *rsa.PrivateKey, *ecdsa.PrivateKey:
  /external/openssh/regress/unittests/sshkey/
test_sshkey.c 229 ASSERT_PTR_EQ(k1->ecdsa, NULL); /* Can't allocate without NID */
316 ASSERT_PTR_NE(ke->ecdsa, NULL);
317 ASSERT_PTR_NE(EC_KEY_get0_public_key(ke->ecdsa), NULL);
318 ASSERT_PTR_NE(EC_KEY_get0_private_key(ke->ecdsa), NULL);
367 ASSERT_PTR_NE(k1->ecdsa, NULL);
369 ASSERT_PTR_NE(EC_KEY_get0_public_key(ke->ecdsa), NULL);
370 ASSERT_PTR_EQ(EC_KEY_get0_private_key(k1->ecdsa), NULL);
507 TEST_START("sign and verify ECDSA");
  /external/openssh/contrib/cygwin/
ssh-user-config 250 create_identity id_ecdsa ecdsa "SSH2 ECDSA"
  /device/linaro/bootloader/edk2/CryptoPkg/Library/OpensslLib/
Install.sh 35 cp crypto/ecdsa/ecdsa.h ../../../Include/openssl
  /external/boringssl/src/crypto/evp/
p_ec.c 66 #include <openssl/ecdsa.h>

Completed in 1078 milliseconds

1 2 3 4