| /src/external/bsd/libfido2/dist/regress/ |
| eddsa.c | 26 static const char ecdsa[] = \ variable 110 ASSERT_NOT_NULL((pkey = EVP_PKEY_from_PEM(ecdsa, sizeof(ecdsa))));
|
| eddsa.c | 26 static const char ecdsa[] = \ variable 110 ASSERT_NOT_NULL((pkey = EVP_PKEY_from_PEM(ecdsa, sizeof(ecdsa))));
|
| eddsa.c | 26 static const char ecdsa[] = \ variable 110 ASSERT_NOT_NULL((pkey = EVP_PKEY_from_PEM(ecdsa, sizeof(ecdsa))));
|
| /src/crypto/external/bsd/openssh/dist/ |
| ssh-sk.c | 196 EC_KEY *ecdsa = NULL; local 208 if ((ecdsa = EC_KEY_new_by_curve_name(key->ecdsa_nid)) == NULL || 209 (g = EC_KEY_get0_group(ecdsa)) == NULL || 227 error("Authenticator returned invalid ECDSA key"); 231 if (EC_KEY_set_public_key(ecdsa, q) != 1) { 242 if (EVP_PKEY_set1_EC_KEY(key->pkey, ecdsa) != 1) { 254 EC_KEY_free(ecdsa);
|
| ssh-sk.c | 196 EC_KEY *ecdsa = NULL; local 208 if ((ecdsa = EC_KEY_new_by_curve_name(key->ecdsa_nid)) == NULL || 209 (g = EC_KEY_get0_group(ecdsa)) == NULL || 227 error("Authenticator returned invalid ECDSA key"); 231 if (EC_KEY_set_public_key(ecdsa, q) != 1) { 242 if (EVP_PKEY_set1_EC_KEY(key->pkey, ecdsa) != 1) { 254 EC_KEY_free(ecdsa);
|
| ssh-sk.c | 196 EC_KEY *ecdsa = NULL; local 208 if ((ecdsa = EC_KEY_new_by_curve_name(key->ecdsa_nid)) == NULL || 209 (g = EC_KEY_get0_group(ecdsa)) == NULL || 227 error("Authenticator returned invalid ECDSA key"); 231 if (EC_KEY_set_public_key(ecdsa, q) != 1) { 242 if (EVP_PKEY_set1_EC_KEY(key->pkey, ecdsa) != 1) { 254 EC_KEY_free(ecdsa);
|
| sshkey.c | 2586 /* For ECDSA keys, the group must match too */ 3445 EC_KEY *ecdsa = NULL; local 3503 (ecdsa = EVP_PKEY_get1_EC_KEY(pk)) == NULL) { 3509 sshkey_ec_validate_public(EC_KEY_get0_group(ecdsa), 3510 EC_KEY_get0_public_key(ecdsa)) != 0 || 3511 sshkey_ec_validate_private(ecdsa) != 0) { 3569 EC_KEY_free(ecdsa);
|
| sshkey.c | 2586 /* For ECDSA keys, the group must match too */ 3445 EC_KEY *ecdsa = NULL; local 3503 (ecdsa = EVP_PKEY_get1_EC_KEY(pk)) == NULL) { 3509 sshkey_ec_validate_public(EC_KEY_get0_group(ecdsa), 3510 EC_KEY_get0_public_key(ecdsa)) != 0 || 3511 sshkey_ec_validate_private(ecdsa) != 0) { 3569 EC_KEY_free(ecdsa);
|
| sshkey.c | 2586 /* For ECDSA keys, the group must match too */ 3445 EC_KEY *ecdsa = NULL; local 3503 (ecdsa = EVP_PKEY_get1_EC_KEY(pk)) == NULL) { 3509 sshkey_ec_validate_public(EC_KEY_get0_group(ecdsa), 3510 EC_KEY_get0_public_key(ecdsa)) != 0 || 3511 sshkey_ec_validate_private(ecdsa) != 0) { 3569 EC_KEY_free(ecdsa);
|
| /src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| hx_locl.h | 270 void *ecdsa; /* EC_KEY */ member in union:hx509_private_key::__anon851
|
| hx_locl.h | 270 void *ecdsa; /* EC_KEY */ member in union:hx509_private_key::__anon851
|
| hx_locl.h | 270 void *ecdsa; /* EC_KEY */ member in union:hx509_private_key::__anon851
|
| /src/crypto/external/bsd/netpgp/dist/src/lib/ |
| packet.h | 351 PGP_PKA_ECDSA = 19, /* ECDSA */ 381 /** Structure to hold one ECDSA public key params. 435 pgp_ecdsa_pubkey_t ecdsa; /* An ECDSA public key */ member in union:__anon1012::__anon1013 561 pgp_ecdsa_seckey_t ecdsa; member in union:pgp_seckey_t::__anon1022 619 /** Struct to hold params of an ECDSA signature */ 621 BIGNUM *r; /* ECDSA value r */ 622 BIGNUM *s; /* ECDSA value s */ 651 pgp_ecdsa_sig_t ecdsa; /* An ECDSA Signature * member in union:pgp_sig_info_t::__anon1024 [all...] |
| packet.h | 351 PGP_PKA_ECDSA = 19, /* ECDSA */ 381 /** Structure to hold one ECDSA public key params. 435 pgp_ecdsa_pubkey_t ecdsa; /* An ECDSA public key */ member in union:__anon1012::__anon1013 561 pgp_ecdsa_seckey_t ecdsa; member in union:pgp_seckey_t::__anon1022 619 /** Struct to hold params of an ECDSA signature */ 621 BIGNUM *r; /* ECDSA value r */ 622 BIGNUM *s; /* ECDSA value s */ 651 pgp_ecdsa_sig_t ecdsa; /* An ECDSA Signature * member in union:pgp_sig_info_t::__anon1024 [all...] |
| packet.h | 351 PGP_PKA_ECDSA = 19, /* ECDSA */ 381 /** Structure to hold one ECDSA public key params. 435 pgp_ecdsa_pubkey_t ecdsa; /* An ECDSA public key */ member in union:__anon1012::__anon1013 561 pgp_ecdsa_seckey_t ecdsa; member in union:pgp_seckey_t::__anon1022 619 /** Struct to hold params of an ECDSA signature */ 621 BIGNUM *r; /* ECDSA value r */ 622 BIGNUM *s; /* ECDSA value s */ 651 pgp_ecdsa_sig_t ecdsa; /* An ECDSA Signature * member in union:pgp_sig_info_t::__anon1024 [all...] |
| /src/crypto/external/bsd/openssl/dist/apps/ |
| speed.c | 93 int ecdsa; member in struct:openssl_speed_sec_st 377 /* list of ecdsa curves */ 1043 BIO_printf(bio_err, "ECDSA sign failure\n"); 1065 BIO_printf(bio_err, "ECDSA verify failure\n"); 1713 seconds.sym = seconds.rsa = seconds.dsa = seconds.ecdsa 1794 if (strncmp(algo, "ecdsa", 5) == 0) { 2769 "ECDSA sign setup failure. No ECDSA sign will be done.\n"); 2773 pkey_print_message("sign", "ecdsa", 2775 seconds.ecdsa); [all...] |
| speed.c | 93 int ecdsa; member in struct:openssl_speed_sec_st 377 /* list of ecdsa curves */ 1043 BIO_printf(bio_err, "ECDSA sign failure\n"); 1065 BIO_printf(bio_err, "ECDSA verify failure\n"); 1713 seconds.sym = seconds.rsa = seconds.dsa = seconds.ecdsa 1794 if (strncmp(algo, "ecdsa", 5) == 0) { 2769 "ECDSA sign setup failure. No ECDSA sign will be done.\n"); 2773 pkey_print_message("sign", "ecdsa", 2775 seconds.ecdsa); [all...] |
| speed.c | 93 int ecdsa; member in struct:openssl_speed_sec_st 377 /* list of ecdsa curves */ 1043 BIO_printf(bio_err, "ECDSA sign failure\n"); 1065 BIO_printf(bio_err, "ECDSA verify failure\n"); 1713 seconds.sym = seconds.rsa = seconds.dsa = seconds.ecdsa 1794 if (strncmp(algo, "ecdsa", 5) == 0) { 2769 "ECDSA sign setup failure. No ECDSA sign will be done.\n"); 2773 pkey_print_message("sign", "ecdsa", 2775 seconds.ecdsa); [all...] |
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| speed.c | 124 int ecdsa; member in struct:openssl_speed_sec_st 620 EC_KEY *ecdsa[ECDSA_NUM]; member in struct:loopargs_st 1138 EC_KEY **ecdsa = tempargs->ecdsa; local 1143 ret = ECDSA_sign(0, buf, 20, ecdsasig, ecdsasiglen, ecdsa[testnum]); 1145 BIO_printf(bio_err, "ECDSA sign failure\n"); 1158 EC_KEY **ecdsa = tempargs->ecdsa; local 1163 ret = ECDSA_verify(0, buf, 20, ecdsasig, ecdsasiglen, ecdsa[testnum]); 1165 BIO_printf(bio_err, "ECDSA verify failure\n") [all...] |
| speed.c | 124 int ecdsa; member in struct:openssl_speed_sec_st 620 EC_KEY *ecdsa[ECDSA_NUM]; member in struct:loopargs_st 1138 EC_KEY **ecdsa = tempargs->ecdsa; local 1143 ret = ECDSA_sign(0, buf, 20, ecdsasig, ecdsasiglen, ecdsa[testnum]); 1145 BIO_printf(bio_err, "ECDSA sign failure\n"); 1158 EC_KEY **ecdsa = tempargs->ecdsa; local 1163 ret = ECDSA_verify(0, buf, 20, ecdsasig, ecdsasiglen, ecdsa[testnum]); 1165 BIO_printf(bio_err, "ECDSA verify failure\n") [all...] |
| speed.c | 124 int ecdsa; member in struct:openssl_speed_sec_st 620 EC_KEY *ecdsa[ECDSA_NUM]; member in struct:loopargs_st 1138 EC_KEY **ecdsa = tempargs->ecdsa; local 1143 ret = ECDSA_sign(0, buf, 20, ecdsasig, ecdsasiglen, ecdsa[testnum]); 1145 BIO_printf(bio_err, "ECDSA sign failure\n"); 1158 EC_KEY **ecdsa = tempargs->ecdsa; local 1163 ret = ECDSA_verify(0, buf, 20, ecdsasig, ecdsasiglen, ecdsa[testnum]); 1165 BIO_printf(bio_err, "ECDSA verify failure\n") [all...] |
| /src/crypto/external/apache2/openssl/dist/apps/ |
| speed.c | 108 int ecdsa; member in struct:openssl_speed_sec_st 487 /* list of ecdsa curves */ 1313 BIO_printf(bio_err, "ECDSA sign failure\n"); 1335 BIO_printf(bio_err, "ECDSA verify failure\n"); 2247 seconds.sym = seconds.rsa = seconds.dsa = seconds.ecdsa 2360 else if (strncmp(sig_name, "RSA", 3) && strncmp(sig_name, "DSA", 3) && strncmp(sig_name, "ED25519", 7) && strncmp(sig_name, "ED448", 5) && strncmp(sig_name, "ECDSA", 5) && strcmp(sig_name, "HMAC") && strcmp(sig_name, "SIPHASH") && strcmp(sig_name, "POLY1305") && strcmp(sig_name, "CMAC") && strcmp(sig_name, "SM2")) { /* skip alg */ 2443 if (HAS_PREFIX(algo, "ecdsa")) { 2444 if (algo[sizeof("ecdsa") - 1] == '\0') { 3548 "ECDSA sign setup failure. No ECDSA sign will be done.\n") [all...] |
| speed.c | 108 int ecdsa; member in struct:openssl_speed_sec_st 487 /* list of ecdsa curves */ 1313 BIO_printf(bio_err, "ECDSA sign failure\n"); 1335 BIO_printf(bio_err, "ECDSA verify failure\n"); 2247 seconds.sym = seconds.rsa = seconds.dsa = seconds.ecdsa 2360 else if (strncmp(sig_name, "RSA", 3) && strncmp(sig_name, "DSA", 3) && strncmp(sig_name, "ED25519", 7) && strncmp(sig_name, "ED448", 5) && strncmp(sig_name, "ECDSA", 5) && strcmp(sig_name, "HMAC") && strcmp(sig_name, "SIPHASH") && strcmp(sig_name, "POLY1305") && strcmp(sig_name, "CMAC") && strcmp(sig_name, "SM2")) { /* skip alg */ 2443 if (HAS_PREFIX(algo, "ecdsa")) { 2444 if (algo[sizeof("ecdsa") - 1] == '\0') { 3548 "ECDSA sign setup failure. No ECDSA sign will be done.\n") [all...] |
| speed.c | 108 int ecdsa; member in struct:openssl_speed_sec_st 487 /* list of ecdsa curves */ 1313 BIO_printf(bio_err, "ECDSA sign failure\n"); 1335 BIO_printf(bio_err, "ECDSA verify failure\n"); 2247 seconds.sym = seconds.rsa = seconds.dsa = seconds.ecdsa 2360 else if (strncmp(sig_name, "RSA", 3) && strncmp(sig_name, "DSA", 3) && strncmp(sig_name, "ED25519", 7) && strncmp(sig_name, "ED448", 5) && strncmp(sig_name, "ECDSA", 5) && strcmp(sig_name, "HMAC") && strcmp(sig_name, "SIPHASH") && strcmp(sig_name, "POLY1305") && strcmp(sig_name, "CMAC") && strcmp(sig_name, "SM2")) { /* skip alg */ 2443 if (HAS_PREFIX(algo, "ecdsa")) { 2444 if (algo[sizeof("ecdsa") - 1] == '\0') { 3548 "ECDSA sign setup failure. No ECDSA sign will be done.\n") [all...] |