HomeSort by: relevance | last modified time | path
    Searched refs:ecdsa (Results 1 - 25 of 55) sorted by relevancy

1 2 3

  /src/tests/crypto/libcrypto/ecdsa/
Makefile 4 HELPER_DIR= ecdsa
  /src/crypto/external/apache2/openssl/dist/test/recipes/95-test_external_tlsfuzzer_data/
tlsfuzzer.sh 61 test -L ecdsa || ln -s ../python-ecdsa/src/ecdsa ecdsa
  /src/tests/crypto/libcrypto/
Makefile 9 SUBDIR+= ecdh ecdsa md2
t_pubkey.sh 81 atf_test_case ecdsa
84 atf_set "descr" "Checks ECDSA algorithm"
109 # atf_add_test_case ecdsa
  /src/external/ibm-public/postfix/dist/conf/
postfix-tls-script 59 # Note: ECDSA support requires OpenSSL 1.0.0 or later and may
61 # will support ECDSA, so you'll generally want to deploy both
62 # RSA and ECDSA certificates to make use of ECDSA with
65 # RSA and ECDSA, you'll want at least OpenSSL 1.0.2, as earlier
79 # in UTC. For ECDSA, the file names start with \fBeckey-\fR
190 # File with the Postfix SMTP server ECDSA certificate in PEM format.
192 # File with the Postfix SMTP server ECDSA private key in PEM format.
335 ecdsa=
336 for _algo in `$postconf -T public-key-algorithms | grep -E '^(rsa|ecdsa)$'
    [all...]
  /src/external/bsd/libfido2/dist/regress/
eddsa.c 26 static const char ecdsa[] = \ variable
110 ASSERT_NOT_NULL((pkey = EVP_PKEY_from_PEM(ecdsa, sizeof(ecdsa))));
  /src/crypto/external/bsd/heimdal/dist/lib/hx509/
crypto-ec.c 40 #include <openssl/ecdsa.h>
250 sig->length = ECDSA_size(signer->private_key.ecdsa);
262 sig->data, &siglen, signer->private_key.ecdsa);
267 "ECDSA sign failed: %d", ret);
271 _hx509_abort("ECDSA signature prelen longer the output len");
300 group = EC_KEY_get0_group(signer->private_key.ecdsa);
387 private_key->private_key.ecdsa = d2i_ECPrivateKey(pkey, &p, len);
388 if (private_key->private_key.ecdsa == NULL) {
456 "ecdsa-with-sha512",
471 "ecdsa-with-sha384"
    [all...]
hx_locl.h 270 void *ecdsa; /* EC_KEY */ member in union:hx509_private_key::__anon851
  /src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/
20-cert-select.conf 5 test-0 = 0-ECDSA CipherString Selection
6 test-1 = 1-ECDSA CipherString Selection
7 test-2 = 2-ECDSA CipherString Selection
10 test-5 = 5-ECDSA with brainpool
16 test-11 = 11-ECDSA CipherString Selection, no ECDSA certificate
17 test-12 = 12-ECDSA Signature Algorithm Selection
18 test-13 = 13-ECDSA Signature Algorithm Selection SHA384
19 test-14 = 14-ECDSA Signature Algorithm Selection SHA1
20 test-15 = 15-ECDSA Signature Algorithm Selection compressed poin
    [all...]
  /src/crypto/external/bsd/heimdal/dist/include/
crypto-headers.h 29 #include <openssl/ecdsa.h>
  /src/crypto/external/bsd/openssh/lib/
Makefile 91 ssh-ecdsa.c \
92 ssh-ecdsa-sk.c \
131 COPTS.ssh-ecdsa-sk.c+= -Wno-error=deprecated-declarations
132 COPTS.ssh-ecdsa.c+= -Wno-error=deprecated-declarations
  /src/crypto/external/apache2/openssl/dist/test/smime-certs/
mksmime-certs.sh 47 cp ../certs/ee-ecdsa-key.pem smec1.pem
49 cp ../certs/server-ecdsa-key.pem smec2.pem
  /src/etc/rc.d/
sshd 64 ecdsa -1 ssh_host_ecdsa_key
  /src/external/mpl/bind/dist/lib/dns/
openssl_shim.h 20 #include <openssl/ecdsa.h>
  /src/crypto/external/bsd/netpgp/dist/src/lib/
signature.c 270 const pgp_ecdsa_pubkey_t *ecdsa,
280 hashsize = ecdsa_hashsize(ecdsa);
296 ecdsasig = pgp_ecdsa_sign(hashbuf, hashsize, secdsa, ecdsa);
299 (void) fprintf(stderr, "ecdsa_sign: invalid ecdsa sig\n");
485 &sig->info.sig.ecdsa,
486 &signer->key.ecdsa);
824 if (seckey->key.ecdsa.x == NULL) {
825 (void) fprintf(stderr, "pgp_write_sig: null ecdsa.x\n");
885 if (!ecdsa_sign(&sig->hash, &key->key.ecdsa, &seckey->key.ecdsa,
    [all...]
packet.h 351 PGP_PKA_ECDSA = 19, /* ECDSA */
381 /** Structure to hold one ECDSA public key params.
435 pgp_ecdsa_pubkey_t ecdsa; /* An ECDSA public key */ member in union:__anon1012::__anon1013
561 pgp_ecdsa_seckey_t ecdsa; member in union:pgp_seckey_t::__anon1022
619 /** Struct to hold params of an ECDSA signature */
621 BIGNUM *r; /* ECDSA value r */
622 BIGNUM *s; /* ECDSA value s */
651 pgp_ecdsa_sig_t ecdsa; /* An ECDSA Signature * member in union:pgp_sig_info_t::__anon1024
    [all...]
packet-parse.c 944 free_BN(&sig->info.sig.ecdsa.r);
945 free_BN(&sig->info.sig.ecdsa.s);
1185 free_BN(&p->key.ecdsa.p);
1258 if (!limread(&key->key.ecdsa.len, 1, region, stream) ||
1259 !limread(key->key.ecdsa.oid, key->key.ecdsa.len, region, stream) ||
1260 !limread_mpi(&key->key.ecdsa.p, region, stream)) {
1517 if (!limread_mpi(&pkt.u.sig.info.sig.ecdsa.r, region, stream) ||
1518 !limread_mpi(&pkt.u.sig.info.sig.ecdsa.s, region, stream)) {
2063 if (!limread_mpi(&pkt.u.sig.info.sig.ecdsa.r, region, stream) |
    [all...]
openssl_crypto.c 250 makeECDSA(const pgp_ecdsa_pubkey_t *ecdsa, const pgp_ecdsa_seckey_t *sececdsa)
264 nid = ecdsa_nid(ecdsa);
282 point = EC_POINT_bn2point(group, ecdsa->p, NULL, NULL);
691 const pgp_ecdsa_pubkey_t *ecdsa)
695 EC_KEY *oecdsa = makeECDSA(ecdsa, NULL);
709 (void) fprintf(stderr, "pgp_ecdsa_verify: ECDSA verification failed\n");
create.c 254 return pgp_write(output, &key->key.ecdsa.len, 1) &&
255 pgp_write(output, key->key.ecdsa.oid, key->key.ecdsa.len) &&
256 pgp_write_mpi(output, key->key.ecdsa.p);
crypto.h 63 #include <openssl/ecdsa.h>
  /src/external/apache2/mDNSResponder/dist/ServiceRegistration/
srp-crypto.h 86 #include <mbedtls/ecdsa.h>
95 // The SRP key includes both the ecdsa key and the pseudo-random number generator context, so that we can
  /src/crypto/external/bsd/openssh/dist/
ssh-sk.c 196 EC_KEY *ecdsa = NULL; local
208 if ((ecdsa = EC_KEY_new_by_curve_name(key->ecdsa_nid)) == NULL ||
209 (g = EC_KEY_get0_group(ecdsa)) == NULL ||
227 error("Authenticator returned invalid ECDSA key");
231 if (EC_KEY_set_public_key(ecdsa, q) != 1) {
242 if (EVP_PKEY_set1_EC_KEY(key->pkey, ecdsa) != 1) {
254 EC_KEY_free(ecdsa);
kex.h 37 #include <openssl/ecdsa.h>
packet.h 28 #include <openssl/ecdsa.h>
  /src/crypto/external/bsd/openssl.old/dist/apps/
speed.c 124 int ecdsa; member in struct:openssl_speed_sec_st
620 EC_KEY *ecdsa[ECDSA_NUM]; member in struct:loopargs_st
1138 EC_KEY **ecdsa = tempargs->ecdsa; local
1143 ret = ECDSA_sign(0, buf, 20, ecdsasig, ecdsasiglen, ecdsa[testnum]);
1145 BIO_printf(bio_err, "ECDSA sign failure\n");
1158 EC_KEY **ecdsa = tempargs->ecdsa; local
1163 ret = ECDSA_verify(0, buf, 20, ecdsasig, ecdsasiglen, ecdsa[testnum]);
1165 BIO_printf(bio_err, "ECDSA verify failure\n")
    [all...]

Completed in 49 milliseconds

1 2 3