/external/boringssl/src/crypto/fipsmodule/ecdsa/ |
ecdsa.c | 53 #include <openssl/ecdsa.h> 113 // ECDSA. Note this value is not fully reduced modulo the order, only the 223 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_MISSING_PARAMETERS); 229 OPENSSL_PUT_ERROR(ECDSA, ERR_R_MALLOC_FAILURE); 237 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB); 248 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_BAD_SIGNATURE); 275 OPENSSL_PUT_ERROR(ECDSA, ERR_R_MALLOC_FAILURE); 279 OPENSSL_PUT_ERROR(ECDSA, ERR_R_EC_LIB); 283 OPENSSL_PUT_ERROR(ECDSA, ERR_R_EC_LIB); 287 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB) [all...] |
/external/boringssl/src/crypto/ecdsa_extra/ |
ecdsa_asn1.c | 53 #include <openssl/ecdsa.h> 80 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_NOT_IMPLEMENTED); 97 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_ENCODE_ERROR); 116 // Decode the ECDSA signature. 127 OPENSSL_PUT_ERROR(ECDSA, ERR_R_INTERNAL_ERROR); 170 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_BAD_SIGNATURE); 182 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_BAD_SIGNATURE); 195 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_ENCODE_ERROR); 208 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_ENCODE_ERROR); 236 // An ECDSA signature is two INTEGERs [all...] |
/tools/apkzlib/src/main/java/com/android/tools/build/apkzlib/sign/ |
SignatureAlgorithm.java | 29 /** ECDSA algorithm. */ 30 ECDSA("EC", 18, "withECDSA"),
|
/external/webrtc/webrtc/base/ |
rtccertificate_unittests.cc | 76 // Certificate type does not matter for our purposes, using ECDSA because it 78 params.key_params = KeyParams::ECDSA(); 87 // Certificate type doesn't matter, using ECDSA because it's fast to generate. 89 SSLIdentity::Generate(kTestCertCommonName, KeyParams::ECDSA()));
|
sslidentity.h | 144 // Generate a a KeyParams for ECDSA specifying the curve. 145 static KeyParams ECDSA(ECCurve curve = EC_NIST_P256);
|
ssladapter_unittest.cc | 357 : SSLAdapterTestBase(rtc::SSL_MODE_TLS, rtc::KeyParams::ECDSA()) {} 369 : SSLAdapterTestBase(rtc::SSL_MODE_DTLS, rtc::KeyParams::ECDSA()) {} 381 // Test that handshake works, using ECDSA 392 // Test transfer between client and server, using ECDSA 405 // Test that handshake works, using ECDSA 416 // Test transfer between client and server, using ECDSA
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ct/ |
DigitallySigned.java | 53 ECDSA;
|
/compatibility/cdd/9_security-model/ |
9_11_keys-and-credentials.md | 18 * [C-1-2] MUST have implementations of RSA, AES, ECDSA and HMAC cryptographic
|
/build/make/tools/releasetools/ |
check_ota_package_signature.py | 46 assert not algorithm.group(1).startswith('ecdsa'), ( 47 'This script doesn\'t support verifying ECDSA signed package yet.')
|
/external/boringssl/src/ssl/test/runner/ |
sign.go | 9 "crypto/ecdsa" 144 ecdsaKey, ok := key.(*ecdsa.PrivateKey) 167 ecdsaKey, ok := key.(*ecdsa.PrivateKey) 169 return nil, errors.New("invalid key type for ECDSA") 172 return nil, errors.New("invalid curve for ECDSA") 179 r, s, err := ecdsa.Sign(config.rand(), ecdsaKey, digest) 190 ecdsaKey, ok := key.(*ecdsa.PublicKey) 192 return errors.New("invalid key type for ECDSA") 195 return errors.New("invalid curve for ECDSA") 203 return errors.New("ECDSA signature contained zero or negative values" [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/ |
KeyFactorySpi.java | 202 public static class ECDSA 205 public ECDSA() 207 super("ECDSA", BouncyCastleProvider.CONFIGURATION);
|
KeyPairGeneratorSpi.java | 257 public static class ECDSA 260 public ECDSA() 262 super("ECDSA", BouncyCastleProvider.CONFIGURATION);
|
/external/conscrypt/platform/src/test/java/org/conscrypt/ct/ |
SerializationTest.java | 45 assertEquals(DigitallySigned.SignatureAlgorithm.ECDSA, 93 assertEquals(DigitallySigned.SignatureAlgorithm.ECDSA, dst.getSignatureAlgorithm());
|
/external/webrtc/talk/app/webrtc/java/src/org/webrtc/ |
PeerConnection.java | 135 RSA, ECDSA 167 keyType = KeyType.ECDSA;
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
key_agreement.go | 9 "crypto/ecdsa" 184 // either be ECDSA or RSA. 272 _, ok := priv.Public().(*ecdsa.PublicKey) 274 return nil, errors.New("tls: ECDHE ECDSA requires an ECDSA server key") 403 pubKey, ok := cert.PublicKey.(*ecdsa.PublicKey) 405 return errors.New("tls: ECDHE ECDSA requires a ECDSA server public key") 412 return errors.New("tls: ECDSA signature contained zero or negative values") 414 if !ecdsa.Verify(pubKey, digest, ecdsaSig.R, ecdsaSig.S) [all...] |
generate_cert.go | 13 "crypto/ecdsa" 35 rsaBits = flag.Int("rsa-bits", 2048, "Size of RSA key to generate. Ignored if --ecdsa-curve is set") 36 ecdsaCurve = flag.String("ecdsa-curve", "", "ECDSA curve to use to generate a key. Valid values are P224, P256 (recommended), P384, P521") 43 case *ecdsa.PrivateKey: 54 case *ecdsa.PrivateKey: 57 fmt.Fprintf(os.Stderr, "Unable to marshal ECDSA private key: %v", err) 79 priv, err = ecdsa.GenerateKey(elliptic.P224(), rand.Reader) 81 priv, err = ecdsa.GenerateKey(elliptic.P256(), rand.Reader) 83 priv, err = ecdsa.GenerateKey(elliptic.P384(), rand.Reader [all...] |
handshake_client_test.go | 9 "crypto/ecdsa" 122 // *ecdsa.PrivateKey which is the private key for the reference server. 168 case *ecdsa.PrivateKey: 504 name: "ECDHE-ECDSA-AES", 505 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-SHA"}, 516 name: "ECDHE-ECDSA-AES-GCM", 517 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-GCM-SHA256"}, 526 name: "ECDHE-ECDSA-AES256-GCM-SHA384", 527 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES256-GCM-SHA384"}, 552 name: "ECDHE-ECDSA-AES128-SHA256" [all...] |
handshake_server_test.go | 10 "crypto/ecdsa" 147 // Test that, even when both sides support an ECDSA cipher suite, it 162 // First test that it *does* work when the server's key is ECDSA. 186 // Now test that switching to an ECDSA key causes the expected error 752 name: "ECDHE-ECDSA-AES", 753 command: []string{"openssl", "s_client", "-no_ticket", "-cipher", "ECDHE-ECDSA-AES256-SHA"}, 914 // an RSA certificate and an ECDSA ciphersuite with an ECDSA certificate. 1065 b.Run("ECDHE-P256-ECDSA-P256", func(b *testing.B) { 1069 b.Run("ECDHE-X25519-ECDSA-P256", func(b *testing.B) [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
key_agreement.go | 9 "crypto/ecdsa" 184 // either be ECDSA or RSA. 272 _, ok := priv.Public().(*ecdsa.PublicKey) 274 return nil, errors.New("tls: ECDHE ECDSA requires an ECDSA server key") 403 pubKey, ok := cert.PublicKey.(*ecdsa.PublicKey) 405 return errors.New("tls: ECDHE ECDSA requires a ECDSA server public key") 412 return errors.New("tls: ECDSA signature contained zero or negative values") 414 if !ecdsa.Verify(pubKey, digest, ecdsaSig.R, ecdsaSig.S) [all...] |
generate_cert.go | 13 "crypto/ecdsa" 35 rsaBits = flag.Int("rsa-bits", 2048, "Size of RSA key to generate. Ignored if --ecdsa-curve is set") 36 ecdsaCurve = flag.String("ecdsa-curve", "", "ECDSA curve to use to generate a key. Valid values are P224, P256 (recommended), P384, P521") 43 case *ecdsa.PrivateKey: 54 case *ecdsa.PrivateKey: 57 fmt.Fprintf(os.Stderr, "Unable to marshal ECDSA private key: %v", err) 79 priv, err = ecdsa.GenerateKey(elliptic.P224(), rand.Reader) 81 priv, err = ecdsa.GenerateKey(elliptic.P256(), rand.Reader) 83 priv, err = ecdsa.GenerateKey(elliptic.P384(), rand.Reader [all...] |
handshake_client_test.go | 9 "crypto/ecdsa" 122 // *ecdsa.PrivateKey which is the private key for the reference server. 168 case *ecdsa.PrivateKey: 504 name: "ECDHE-ECDSA-AES", 505 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-SHA"}, 516 name: "ECDHE-ECDSA-AES-GCM", 517 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-GCM-SHA256"}, 526 name: "ECDHE-ECDSA-AES256-GCM-SHA384", 527 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES256-GCM-SHA384"}, 552 name: "ECDHE-ECDSA-AES128-SHA256" [all...] |
/prebuilts/go/darwin-x86/src/crypto/ecdsa/ |
ecdsa.go | 5 // Package ecdsa implements the Elliptic Curve Digital Signature Algorithm, as 11 package ecdsa package 15 // http://www.nsa.gov/ia/_files/ecdsa.pdf 43 aesIV = "IV for ECDSA CTR" 46 // PublicKey represents an ECDSA public key. 52 // PrivateKey represents an ECDSA private key.
|
/prebuilts/go/linux-x86/src/crypto/ecdsa/ |
ecdsa.go | 5 // Package ecdsa implements the Elliptic Curve Digital Signature Algorithm, as 11 package ecdsa package 15 // http://www.nsa.gov/ia/_files/ecdsa.pdf 43 aesIV = "IV for ECDSA CTR" 46 // PublicKey represents an ECDSA public key. 52 // PrivateKey represents an ECDSA private key.
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
x509_test.go | 10 "crypto/ecdsa" 494 ecdsaPriv, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader) 496 t.Fatalf("Failed to generate ECDSA key: %s", err) 506 {"RSA/ECDSA", &testPrivateKey.PublicKey, ecdsaPriv, false, ECDSAWithSHA384}, 507 {"ECDSA/RSA", &ecdsaPriv.PublicKey, testPrivateKey, false, SHA256WithRSA}, 508 {"ECDSA/ECDSA", &ecdsaPriv.PublicKey, ecdsaPriv, true, ECDSAWithSHA1}, 510 {"ECDSA/RSAPSS", &ecdsaPriv.PublicKey, testPrivateKey, false, SHA256WithRSAPSS}, 511 {"RSAPSS/ECDSA", &testPrivateKey.PublicKey, ecdsaPriv, false, ECDSAWithSHA384}, 726 // Self-signed certificate using ECDSA with SHA1 & secp256r [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
x509_test.go | 10 "crypto/ecdsa" 494 ecdsaPriv, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader) 496 t.Fatalf("Failed to generate ECDSA key: %s", err) 506 {"RSA/ECDSA", &testPrivateKey.PublicKey, ecdsaPriv, false, ECDSAWithSHA384}, 507 {"ECDSA/RSA", &ecdsaPriv.PublicKey, testPrivateKey, false, SHA256WithRSA}, 508 {"ECDSA/ECDSA", &ecdsaPriv.PublicKey, ecdsaPriv, true, ECDSAWithSHA1}, 510 {"ECDSA/RSAPSS", &ecdsaPriv.PublicKey, testPrivateKey, false, SHA256WithRSAPSS}, 511 {"RSAPSS/ECDSA", &testPrivateKey.PublicKey, ecdsaPriv, false, ECDSAWithSHA384}, 726 // Self-signed certificate using ECDSA with SHA1 & secp256r [all...] |