HomeSort by relevance Sort by last modified time
    Searched refs:ECDSA (Results 1 - 25 of 113) sorted by null

1 2 3 4 5

  /external/boringssl/src/crypto/fipsmodule/ecdsa/
ecdsa.c 53 #include <openssl/ecdsa.h>
113 // ECDSA. Note this value is not fully reduced modulo the order, only the
223 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_MISSING_PARAMETERS);
229 OPENSSL_PUT_ERROR(ECDSA, ERR_R_MALLOC_FAILURE);
237 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB);
248 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_BAD_SIGNATURE);
275 OPENSSL_PUT_ERROR(ECDSA, ERR_R_MALLOC_FAILURE);
279 OPENSSL_PUT_ERROR(ECDSA, ERR_R_EC_LIB);
283 OPENSSL_PUT_ERROR(ECDSA, ERR_R_EC_LIB);
287 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB)
    [all...]
  /external/boringssl/src/crypto/ecdsa_extra/
ecdsa_asn1.c 53 #include <openssl/ecdsa.h>
80 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_NOT_IMPLEMENTED);
97 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_ENCODE_ERROR);
116 // Decode the ECDSA signature.
127 OPENSSL_PUT_ERROR(ECDSA, ERR_R_INTERNAL_ERROR);
170 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_BAD_SIGNATURE);
182 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_BAD_SIGNATURE);
195 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_ENCODE_ERROR);
208 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_ENCODE_ERROR);
236 // An ECDSA signature is two INTEGERs
    [all...]
  /tools/apkzlib/src/main/java/com/android/tools/build/apkzlib/sign/
SignatureAlgorithm.java 29 /** ECDSA algorithm. */
30 ECDSA("EC", 18, "withECDSA"),
  /external/webrtc/webrtc/base/
rtccertificate_unittests.cc 76 // Certificate type does not matter for our purposes, using ECDSA because it
78 params.key_params = KeyParams::ECDSA();
87 // Certificate type doesn't matter, using ECDSA because it's fast to generate.
89 SSLIdentity::Generate(kTestCertCommonName, KeyParams::ECDSA()));
sslidentity.h 144 // Generate a a KeyParams for ECDSA specifying the curve.
145 static KeyParams ECDSA(ECCurve curve = EC_NIST_P256);
ssladapter_unittest.cc 357 : SSLAdapterTestBase(rtc::SSL_MODE_TLS, rtc::KeyParams::ECDSA()) {}
369 : SSLAdapterTestBase(rtc::SSL_MODE_DTLS, rtc::KeyParams::ECDSA()) {}
381 // Test that handshake works, using ECDSA
392 // Test transfer between client and server, using ECDSA
405 // Test that handshake works, using ECDSA
416 // Test transfer between client and server, using ECDSA
  /external/conscrypt/platform/src/main/java/org/conscrypt/ct/
DigitallySigned.java 53 ECDSA;
  /compatibility/cdd/9_security-model/
9_11_keys-and-credentials.md 18 * [C-1-2] MUST have implementations of RSA, AES, ECDSA and HMAC cryptographic
  /build/make/tools/releasetools/
check_ota_package_signature.py 46 assert not algorithm.group(1).startswith('ecdsa'), (
47 'This script doesn\'t support verifying ECDSA signed package yet.')
  /external/boringssl/src/ssl/test/runner/
sign.go 9 "crypto/ecdsa"
144 ecdsaKey, ok := key.(*ecdsa.PrivateKey)
167 ecdsaKey, ok := key.(*ecdsa.PrivateKey)
169 return nil, errors.New("invalid key type for ECDSA")
172 return nil, errors.New("invalid curve for ECDSA")
179 r, s, err := ecdsa.Sign(config.rand(), ecdsaKey, digest)
190 ecdsaKey, ok := key.(*ecdsa.PublicKey)
192 return errors.New("invalid key type for ECDSA")
195 return errors.New("invalid curve for ECDSA")
203 return errors.New("ECDSA signature contained zero or negative values"
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/
KeyFactorySpi.java 202 public static class ECDSA
205 public ECDSA()
207 super("ECDSA", BouncyCastleProvider.CONFIGURATION);
KeyPairGeneratorSpi.java 257 public static class ECDSA
260 public ECDSA()
262 super("ECDSA", BouncyCastleProvider.CONFIGURATION);
  /external/conscrypt/platform/src/test/java/org/conscrypt/ct/
SerializationTest.java 45 assertEquals(DigitallySigned.SignatureAlgorithm.ECDSA,
93 assertEquals(DigitallySigned.SignatureAlgorithm.ECDSA, dst.getSignatureAlgorithm());
  /external/webrtc/talk/app/webrtc/java/src/org/webrtc/
PeerConnection.java 135 RSA, ECDSA
167 keyType = KeyType.ECDSA;
  /prebuilts/go/darwin-x86/src/crypto/tls/
key_agreement.go 9 "crypto/ecdsa"
184 // either be ECDSA or RSA.
272 _, ok := priv.Public().(*ecdsa.PublicKey)
274 return nil, errors.New("tls: ECDHE ECDSA requires an ECDSA server key")
403 pubKey, ok := cert.PublicKey.(*ecdsa.PublicKey)
405 return errors.New("tls: ECDHE ECDSA requires a ECDSA server public key")
412 return errors.New("tls: ECDSA signature contained zero or negative values")
414 if !ecdsa.Verify(pubKey, digest, ecdsaSig.R, ecdsaSig.S)
    [all...]
generate_cert.go 13 "crypto/ecdsa"
35 rsaBits = flag.Int("rsa-bits", 2048, "Size of RSA key to generate. Ignored if --ecdsa-curve is set")
36 ecdsaCurve = flag.String("ecdsa-curve", "", "ECDSA curve to use to generate a key. Valid values are P224, P256 (recommended), P384, P521")
43 case *ecdsa.PrivateKey:
54 case *ecdsa.PrivateKey:
57 fmt.Fprintf(os.Stderr, "Unable to marshal ECDSA private key: %v", err)
79 priv, err = ecdsa.GenerateKey(elliptic.P224(), rand.Reader)
81 priv, err = ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
83 priv, err = ecdsa.GenerateKey(elliptic.P384(), rand.Reader
    [all...]
handshake_client_test.go 9 "crypto/ecdsa"
122 // *ecdsa.PrivateKey which is the private key for the reference server.
168 case *ecdsa.PrivateKey:
504 name: "ECDHE-ECDSA-AES",
505 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-SHA"},
516 name: "ECDHE-ECDSA-AES-GCM",
517 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-GCM-SHA256"},
526 name: "ECDHE-ECDSA-AES256-GCM-SHA384",
527 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES256-GCM-SHA384"},
552 name: "ECDHE-ECDSA-AES128-SHA256"
    [all...]
handshake_server_test.go 10 "crypto/ecdsa"
147 // Test that, even when both sides support an ECDSA cipher suite, it
162 // First test that it *does* work when the server's key is ECDSA.
186 // Now test that switching to an ECDSA key causes the expected error
752 name: "ECDHE-ECDSA-AES",
753 command: []string{"openssl", "s_client", "-no_ticket", "-cipher", "ECDHE-ECDSA-AES256-SHA"},
914 // an RSA certificate and an ECDSA ciphersuite with an ECDSA certificate.
1065 b.Run("ECDHE-P256-ECDSA-P256", func(b *testing.B) {
1069 b.Run("ECDHE-X25519-ECDSA-P256", func(b *testing.B)
    [all...]
  /prebuilts/go/linux-x86/src/crypto/tls/
key_agreement.go 9 "crypto/ecdsa"
184 // either be ECDSA or RSA.
272 _, ok := priv.Public().(*ecdsa.PublicKey)
274 return nil, errors.New("tls: ECDHE ECDSA requires an ECDSA server key")
403 pubKey, ok := cert.PublicKey.(*ecdsa.PublicKey)
405 return errors.New("tls: ECDHE ECDSA requires a ECDSA server public key")
412 return errors.New("tls: ECDSA signature contained zero or negative values")
414 if !ecdsa.Verify(pubKey, digest, ecdsaSig.R, ecdsaSig.S)
    [all...]
generate_cert.go 13 "crypto/ecdsa"
35 rsaBits = flag.Int("rsa-bits", 2048, "Size of RSA key to generate. Ignored if --ecdsa-curve is set")
36 ecdsaCurve = flag.String("ecdsa-curve", "", "ECDSA curve to use to generate a key. Valid values are P224, P256 (recommended), P384, P521")
43 case *ecdsa.PrivateKey:
54 case *ecdsa.PrivateKey:
57 fmt.Fprintf(os.Stderr, "Unable to marshal ECDSA private key: %v", err)
79 priv, err = ecdsa.GenerateKey(elliptic.P224(), rand.Reader)
81 priv, err = ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
83 priv, err = ecdsa.GenerateKey(elliptic.P384(), rand.Reader
    [all...]
handshake_client_test.go 9 "crypto/ecdsa"
122 // *ecdsa.PrivateKey which is the private key for the reference server.
168 case *ecdsa.PrivateKey:
504 name: "ECDHE-ECDSA-AES",
505 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-SHA"},
516 name: "ECDHE-ECDSA-AES-GCM",
517 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES128-GCM-SHA256"},
526 name: "ECDHE-ECDSA-AES256-GCM-SHA384",
527 command: []string{"openssl", "s_server", "-cipher", "ECDHE-ECDSA-AES256-GCM-SHA384"},
552 name: "ECDHE-ECDSA-AES128-SHA256"
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/ecdsa/
ecdsa.go 5 // Package ecdsa implements the Elliptic Curve Digital Signature Algorithm, as
11 package ecdsa package
15 // http://www.nsa.gov/ia/_files/ecdsa.pdf
43 aesIV = "IV for ECDSA CTR"
46 // PublicKey represents an ECDSA public key.
52 // PrivateKey represents an ECDSA private key.
  /prebuilts/go/linux-x86/src/crypto/ecdsa/
ecdsa.go 5 // Package ecdsa implements the Elliptic Curve Digital Signature Algorithm, as
11 package ecdsa package
15 // http://www.nsa.gov/ia/_files/ecdsa.pdf
43 aesIV = "IV for ECDSA CTR"
46 // PublicKey represents an ECDSA public key.
52 // PrivateKey represents an ECDSA private key.
  /prebuilts/go/darwin-x86/src/crypto/x509/
x509_test.go 10 "crypto/ecdsa"
494 ecdsaPriv, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
496 t.Fatalf("Failed to generate ECDSA key: %s", err)
506 {"RSA/ECDSA", &testPrivateKey.PublicKey, ecdsaPriv, false, ECDSAWithSHA384},
507 {"ECDSA/RSA", &ecdsaPriv.PublicKey, testPrivateKey, false, SHA256WithRSA},
508 {"ECDSA/ECDSA", &ecdsaPriv.PublicKey, ecdsaPriv, true, ECDSAWithSHA1},
510 {"ECDSA/RSAPSS", &ecdsaPriv.PublicKey, testPrivateKey, false, SHA256WithRSAPSS},
511 {"RSAPSS/ECDSA", &testPrivateKey.PublicKey, ecdsaPriv, false, ECDSAWithSHA384},
726 // Self-signed certificate using ECDSA with SHA1 & secp256r
    [all...]
  /prebuilts/go/linux-x86/src/crypto/x509/
x509_test.go 10 "crypto/ecdsa"
494 ecdsaPriv, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
496 t.Fatalf("Failed to generate ECDSA key: %s", err)
506 {"RSA/ECDSA", &testPrivateKey.PublicKey, ecdsaPriv, false, ECDSAWithSHA384},
507 {"ECDSA/RSA", &ecdsaPriv.PublicKey, testPrivateKey, false, SHA256WithRSA},
508 {"ECDSA/ECDSA", &ecdsaPriv.PublicKey, ecdsaPriv, true, ECDSAWithSHA1},
510 {"ECDSA/RSAPSS", &ecdsaPriv.PublicKey, testPrivateKey, false, SHA256WithRSAPSS},
511 {"RSAPSS/ECDSA", &testPrivateKey.PublicKey, ecdsaPriv, false, ECDSAWithSHA384},
726 // Self-signed certificate using ECDSA with SHA1 & secp256r
    [all...]

Completed in 2163 milliseconds

1 2 3 4 5