| /src/tests/crypto/libcrypto/ecdsa/ |
| Makefile | 4 HELPER_DIR= ecdsa
|
| /src/crypto/external/apache2/openssl/dist/test/recipes/95-test_external_tlsfuzzer_data/ |
| tlsfuzzer.sh | 61 test -L ecdsa || ln -s ../python-ecdsa/src/ecdsa ecdsa
|
| /src/tests/crypto/libcrypto/ |
| Makefile | 9 SUBDIR+= ecdh ecdsa md2
|
| t_pubkey.sh | 81 atf_test_case ecdsa 84 atf_set "descr" "Checks ECDSA algorithm" 109 # atf_add_test_case ecdsa
|
| /src/external/ibm-public/postfix/dist/conf/ |
| postfix-tls-script | 59 # Note: ECDSA support requires OpenSSL 1.0.0 or later and may 61 # will support ECDSA, so you'll generally want to deploy both 62 # RSA and ECDSA certificates to make use of ECDSA with 65 # RSA and ECDSA, you'll want at least OpenSSL 1.0.2, as earlier 79 # in UTC. For ECDSA, the file names start with \fBeckey-\fR 190 # File with the Postfix SMTP server ECDSA certificate in PEM format. 192 # File with the Postfix SMTP server ECDSA private key in PEM format. 335 ecdsa= 336 for _algo in `$postconf -T public-key-algorithms | grep -E '^(rsa|ecdsa)$' [all...] |
| /src/external/bsd/libfido2/dist/regress/ |
| eddsa.c | 26 static const char ecdsa[] = \ variable 110 ASSERT_NOT_NULL((pkey = EVP_PKEY_from_PEM(ecdsa, sizeof(ecdsa))));
|
| /src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| crypto-ec.c | 40 #include <openssl/ecdsa.h> 250 sig->length = ECDSA_size(signer->private_key.ecdsa); 262 sig->data, &siglen, signer->private_key.ecdsa); 267 "ECDSA sign failed: %d", ret); 271 _hx509_abort("ECDSA signature prelen longer the output len"); 300 group = EC_KEY_get0_group(signer->private_key.ecdsa); 387 private_key->private_key.ecdsa = d2i_ECPrivateKey(pkey, &p, len); 388 if (private_key->private_key.ecdsa == NULL) { 456 "ecdsa-with-sha512", 471 "ecdsa-with-sha384" [all...] |
| hx_locl.h | 270 void *ecdsa; /* EC_KEY */ member in union:hx509_private_key::__anon851
|
| /src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/ |
| 20-cert-select.conf | 5 test-0 = 0-ECDSA CipherString Selection 6 test-1 = 1-ECDSA CipherString Selection 7 test-2 = 2-ECDSA CipherString Selection 10 test-5 = 5-ECDSA with brainpool 16 test-11 = 11-ECDSA CipherString Selection, no ECDSA certificate 17 test-12 = 12-ECDSA Signature Algorithm Selection 18 test-13 = 13-ECDSA Signature Algorithm Selection SHA384 19 test-14 = 14-ECDSA Signature Algorithm Selection SHA1 20 test-15 = 15-ECDSA Signature Algorithm Selection compressed poin [all...] |
| /src/crypto/external/bsd/heimdal/dist/include/ |
| crypto-headers.h | 29 #include <openssl/ecdsa.h>
|
| /src/crypto/external/bsd/openssh/lib/ |
| Makefile | 91 ssh-ecdsa.c \ 92 ssh-ecdsa-sk.c \ 131 COPTS.ssh-ecdsa-sk.c+= -Wno-error=deprecated-declarations 132 COPTS.ssh-ecdsa.c+= -Wno-error=deprecated-declarations
|
| /src/crypto/external/apache2/openssl/dist/test/smime-certs/ |
| mksmime-certs.sh | 47 cp ../certs/ee-ecdsa-key.pem smec1.pem 49 cp ../certs/server-ecdsa-key.pem smec2.pem
|
| /src/etc/rc.d/ |
| sshd | 64 ecdsa -1 ssh_host_ecdsa_key
|
| /src/external/mpl/bind/dist/lib/dns/ |
| openssl_shim.h | 20 #include <openssl/ecdsa.h>
|
| /src/crypto/external/bsd/netpgp/dist/src/lib/ |
| signature.c | 270 const pgp_ecdsa_pubkey_t *ecdsa, 280 hashsize = ecdsa_hashsize(ecdsa); 296 ecdsasig = pgp_ecdsa_sign(hashbuf, hashsize, secdsa, ecdsa); 299 (void) fprintf(stderr, "ecdsa_sign: invalid ecdsa sig\n"); 485 &sig->info.sig.ecdsa, 486 &signer->key.ecdsa); 824 if (seckey->key.ecdsa.x == NULL) { 825 (void) fprintf(stderr, "pgp_write_sig: null ecdsa.x\n"); 885 if (!ecdsa_sign(&sig->hash, &key->key.ecdsa, &seckey->key.ecdsa, [all...] |
| packet.h | 351 PGP_PKA_ECDSA = 19, /* ECDSA */ 381 /** Structure to hold one ECDSA public key params. 435 pgp_ecdsa_pubkey_t ecdsa; /* An ECDSA public key */ member in union:__anon1012::__anon1013 561 pgp_ecdsa_seckey_t ecdsa; member in union:pgp_seckey_t::__anon1022 619 /** Struct to hold params of an ECDSA signature */ 621 BIGNUM *r; /* ECDSA value r */ 622 BIGNUM *s; /* ECDSA value s */ 651 pgp_ecdsa_sig_t ecdsa; /* An ECDSA Signature * member in union:pgp_sig_info_t::__anon1024 [all...] |
| packet-parse.c | 944 free_BN(&sig->info.sig.ecdsa.r); 945 free_BN(&sig->info.sig.ecdsa.s); 1185 free_BN(&p->key.ecdsa.p); 1258 if (!limread(&key->key.ecdsa.len, 1, region, stream) || 1259 !limread(key->key.ecdsa.oid, key->key.ecdsa.len, region, stream) || 1260 !limread_mpi(&key->key.ecdsa.p, region, stream)) { 1517 if (!limread_mpi(&pkt.u.sig.info.sig.ecdsa.r, region, stream) || 1518 !limread_mpi(&pkt.u.sig.info.sig.ecdsa.s, region, stream)) { 2063 if (!limread_mpi(&pkt.u.sig.info.sig.ecdsa.r, region, stream) | [all...] |
| openssl_crypto.c | 250 makeECDSA(const pgp_ecdsa_pubkey_t *ecdsa, const pgp_ecdsa_seckey_t *sececdsa) 264 nid = ecdsa_nid(ecdsa); 282 point = EC_POINT_bn2point(group, ecdsa->p, NULL, NULL); 691 const pgp_ecdsa_pubkey_t *ecdsa) 695 EC_KEY *oecdsa = makeECDSA(ecdsa, NULL); 709 (void) fprintf(stderr, "pgp_ecdsa_verify: ECDSA verification failed\n");
|
| create.c | 254 return pgp_write(output, &key->key.ecdsa.len, 1) && 255 pgp_write(output, key->key.ecdsa.oid, key->key.ecdsa.len) && 256 pgp_write_mpi(output, key->key.ecdsa.p);
|
| crypto.h | 63 #include <openssl/ecdsa.h>
|
| /src/external/apache2/mDNSResponder/dist/ServiceRegistration/ |
| srp-crypto.h | 86 #include <mbedtls/ecdsa.h> 95 // The SRP key includes both the ecdsa key and the pseudo-random number generator context, so that we can
|
| /src/crypto/external/bsd/openssh/dist/ |
| ssh-sk.c | 196 EC_KEY *ecdsa = NULL; local 208 if ((ecdsa = EC_KEY_new_by_curve_name(key->ecdsa_nid)) == NULL || 209 (g = EC_KEY_get0_group(ecdsa)) == NULL || 227 error("Authenticator returned invalid ECDSA key"); 231 if (EC_KEY_set_public_key(ecdsa, q) != 1) { 242 if (EVP_PKEY_set1_EC_KEY(key->pkey, ecdsa) != 1) { 254 EC_KEY_free(ecdsa);
|
| kex.h | 37 #include <openssl/ecdsa.h>
|
| packet.h | 28 #include <openssl/ecdsa.h>
|
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| speed.c | 124 int ecdsa; member in struct:openssl_speed_sec_st 620 EC_KEY *ecdsa[ECDSA_NUM]; member in struct:loopargs_st 1138 EC_KEY **ecdsa = tempargs->ecdsa; local 1143 ret = ECDSA_sign(0, buf, 20, ecdsasig, ecdsasiglen, ecdsa[testnum]); 1145 BIO_printf(bio_err, "ECDSA sign failure\n"); 1158 EC_KEY **ecdsa = tempargs->ecdsa; local 1163 ret = ECDSA_verify(0, buf, 20, ecdsasig, ecdsasiglen, ecdsa[testnum]); 1165 BIO_printf(bio_err, "ECDSA verify failure\n") [all...] |