HomeSort by: relevance | last modified time | path
    Searched defs:ecdsa (Results 1 - 8 of 8) sorted by relevancy

  /src/external/bsd/libfido2/dist/regress/
eddsa.c 26 static const char ecdsa[] = \ variable
110 ASSERT_NOT_NULL((pkey = EVP_PKEY_from_PEM(ecdsa, sizeof(ecdsa))));
  /src/crypto/external/bsd/openssh/dist/
ssh-sk.c 196 EC_KEY *ecdsa = NULL; local
208 if ((ecdsa = EC_KEY_new_by_curve_name(key->ecdsa_nid)) == NULL ||
209 (g = EC_KEY_get0_group(ecdsa)) == NULL ||
227 error("Authenticator returned invalid ECDSA key");
231 if (EC_KEY_set_public_key(ecdsa, q) != 1) {
242 if (EVP_PKEY_set1_EC_KEY(key->pkey, ecdsa) != 1) {
254 EC_KEY_free(ecdsa);
sshkey.c 2586 /* For ECDSA keys, the group must match too */
3445 EC_KEY *ecdsa = NULL; local
3503 (ecdsa = EVP_PKEY_get1_EC_KEY(pk)) == NULL) {
3509 sshkey_ec_validate_public(EC_KEY_get0_group(ecdsa),
3510 EC_KEY_get0_public_key(ecdsa)) != 0 ||
3511 sshkey_ec_validate_private(ecdsa) != 0) {
3569 EC_KEY_free(ecdsa);
  /src/crypto/external/bsd/heimdal/dist/lib/hx509/
hx_locl.h 270 void *ecdsa; /* EC_KEY */ member in union:hx509_private_key::__anon851
  /src/crypto/external/bsd/netpgp/dist/src/lib/
packet.h 351 PGP_PKA_ECDSA = 19, /* ECDSA */
381 /** Structure to hold one ECDSA public key params.
435 pgp_ecdsa_pubkey_t ecdsa; /* An ECDSA public key */ member in union:__anon1012::__anon1013
561 pgp_ecdsa_seckey_t ecdsa; member in union:pgp_seckey_t::__anon1022
619 /** Struct to hold params of an ECDSA signature */
621 BIGNUM *r; /* ECDSA value r */
622 BIGNUM *s; /* ECDSA value s */
651 pgp_ecdsa_sig_t ecdsa; /* An ECDSA Signature * member in union:pgp_sig_info_t::__anon1024
    [all...]
  /src/crypto/external/bsd/openssl/dist/apps/
speed.c 93 int ecdsa; member in struct:openssl_speed_sec_st
377 /* list of ecdsa curves */
1043 BIO_printf(bio_err, "ECDSA sign failure\n");
1065 BIO_printf(bio_err, "ECDSA verify failure\n");
1713 seconds.sym = seconds.rsa = seconds.dsa = seconds.ecdsa
1794 if (strncmp(algo, "ecdsa", 5) == 0) {
2769 "ECDSA sign setup failure. No ECDSA sign will be done.\n");
2773 pkey_print_message("sign", "ecdsa",
2775 seconds.ecdsa);
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/apps/
speed.c 124 int ecdsa; member in struct:openssl_speed_sec_st
620 EC_KEY *ecdsa[ECDSA_NUM]; member in struct:loopargs_st
1138 EC_KEY **ecdsa = tempargs->ecdsa; local
1143 ret = ECDSA_sign(0, buf, 20, ecdsasig, ecdsasiglen, ecdsa[testnum]);
1145 BIO_printf(bio_err, "ECDSA sign failure\n");
1158 EC_KEY **ecdsa = tempargs->ecdsa; local
1163 ret = ECDSA_verify(0, buf, 20, ecdsasig, ecdsasiglen, ecdsa[testnum]);
1165 BIO_printf(bio_err, "ECDSA verify failure\n")
    [all...]
  /src/crypto/external/apache2/openssl/dist/apps/
speed.c 108 int ecdsa; member in struct:openssl_speed_sec_st
487 /* list of ecdsa curves */
1313 BIO_printf(bio_err, "ECDSA sign failure\n");
1335 BIO_printf(bio_err, "ECDSA verify failure\n");
2247 seconds.sym = seconds.rsa = seconds.dsa = seconds.ecdsa
2360 else if (strncmp(sig_name, "RSA", 3) && strncmp(sig_name, "DSA", 3) && strncmp(sig_name, "ED25519", 7) && strncmp(sig_name, "ED448", 5) && strncmp(sig_name, "ECDSA", 5) && strcmp(sig_name, "HMAC") && strcmp(sig_name, "SIPHASH") && strcmp(sig_name, "POLY1305") && strcmp(sig_name, "CMAC") && strcmp(sig_name, "SM2")) { /* skip alg */
2443 if (HAS_PREFIX(algo, "ecdsa")) {
2444 if (algo[sizeof("ecdsa") - 1] == '\0') {
3548 "ECDSA sign setup failure. No ECDSA sign will be done.\n")
    [all...]

Completed in 42 milliseconds