Home
last modified time | relevance | path

Searched refs:P256 (Results 1 – 17 of 17) sorted by relevance

/external/rust/crates/ring/src/ec/suite_b/
Dcurve.rs66 P256,
69 ec::CurveID::P256,
Decdh.rs64 &ec::suite_b::curve::P256,
150 &super::super::curve::P256,
/external/rust/crates/ring/src/
Dec.rs40 P256, enumerator
/external/boringssl/src/crypto/fipsmodule/ec/
Dmake_ec_scalar_base_mult_tests.go57 printMultiples("P-256", elliptic.P256())
Dmake_tables.go38 curve := elliptic.P256()
90 curve := elliptic.P256()
Dmake_p256-x86_64-tests.go41 p256 = elliptic.P256()
/external/avb/proto/crypto/keyspb/
Dkeyspb.proto28 P256 = 1; enumerator
/external/rust/crates/ring/src/ec/suite_b/ecdsa/
Dsigning.rs448 curve: &ec::suite_b::curve::P256,
478 curve: &ec::suite_b::curve::P256,
/external/ukey2/src/main/proto/
Dsecuremessage.proto100 // Client MUST verify (x,y) is a valid point on NIST P256
/external/boringssl/src/ssl/test/runner/
Dsign.go317 return &ecdsaSigner{version, config, elliptic.P256(), crypto.SHA256}, nil
Dkey_agreement.go441 …return &ellipticECDHCurve{curve: elliptic.P256(), sendCompressed: config.Bugs.SendCompressedCoordi…
Dhandshake_server.go2177 if !elliptic.P256().IsOnCurve(x, y) {
2180 channelID := &ecdsa.PublicKey{Curve: elliptic.P256(), X: x, Y: y}
Dhandshake_client.go2034 if c.config.ChannelID.Curve != elliptic.P256() {
Drunner.go243 if channelIDKey.Curve != elliptic.P256() {
325 curve = elliptic.P256()
15447 p256 := elliptic.P256()
/external/boringssl/src/crypto/evp/
Devp_tests.txt1640 PrivateKey = ECDH-P256-Private
1644 PublicKey = ECDH-P256-Peer
1648 Derive = ECDH-P256-Private
1649 DerivePeer = ECDH-P256-Peer
/external/libwebsockets/READMEs/
DREADME.crypto-apis.md67 - P256 / P384 / P521 (sic) curves
/external/openssh/
DPROTOCOL.u2f39 primarily use ECDSA signatures in the NIST-P256 field, though the FIDO2