/external/boringssl/src/crypto/ecdsa/ |
D | CMakeLists.txt | 4 ecdsa target 8 ecdsa.c
|
/external/boringssl/src/ssl/test/runner/ |
D | tls.go | 240 case *ecdsa.PublicKey: 241 priv, ok := cert.PrivateKey.(*ecdsa.PrivateKey) 268 case *rsa.PrivateKey, *ecdsa.PrivateKey:
|
D | handshake_server.go | 362 _, hs.ecdsaOk = hs.cert.PrivateKey.(*ecdsa.PrivateKey) 707 case *ecdsa.PublicKey: 715 case *ecdsa.PublicKey: 733 if !ecdsa.Verify(key, digest, ecdsaSig.R, ecdsaSig.S) { 827 channelID := &ecdsa.PublicKey{elliptic.P256(), x, y} 832 if !ecdsa.Verify(channelID, hs.finishedHash.hashForChannelID(resumeHash), r, s) { 994 case *ecdsa.PublicKey, *rsa.PublicKey:
|
D | handshake_client.go | 429 case *rsa.PublicKey, *ecdsa.PublicKey: 606 case *ecdsa.PrivateKey: 632 case *ecdsa.PrivateKey: 634 r, s, err = ecdsa.Sign(c.config.rand(), key, digest) 885 …r, s, err := ecdsa.Sign(c.config.rand(), c.config.ChannelID, hs.finishedHash.hashForChannelID(resu…
|
D | key_agreement.go | 410 privKey, ok := cert.PrivateKey.(*ecdsa.PrivateKey) 414 r, s, err := ecdsa.Sign(config.rand(), privKey, digest) 493 pubKey, ok := cert.PublicKey.(*ecdsa.PublicKey) 504 if !ecdsa.Verify(pubKey, digest, ecdsaSig.R, ecdsaSig.S) {
|
D | common.go | 191 ChannelID *ecdsa.PublicKey // the channel ID for this connection 361 ChannelID *ecdsa.PrivateKey
|
D | conn.go | 70 channelID *ecdsa.PublicKey
|
D | runner.go | 54 var channelIDKey *ecdsa.PrivateKey
|
/external/boringssl/src/crypto/err/ |
D | CMakeLists.txt | 17 ecdsa.errordata
|
/external/boringssl/src/crypto/ |
D | CMakeLists.txt | 126 add_subdirectory(ecdsa) 191 $<TARGET_OBJECTS:ecdsa>
|
/external/boringssl/src/util/ |
D | doc.config | 34 "include/openssl/ecdsa.h",
|
/external/boringssl/src/crypto/obj/ |
D | objects.txt | 81 X9-62_id-ecSigType 1 : ecdsa-with-SHA1 82 X9-62_id-ecSigType 2 : ecdsa-with-Recommended 83 X9-62_id-ecSigType 3 : ecdsa-with-Specified 84 ecdsa-with-Specified 1 : ecdsa-with-SHA224 85 ecdsa-with-Specified 2 : ecdsa-with-SHA256 86 ecdsa-with-Specified 3 : ecdsa-with-SHA384 87 ecdsa-with-Specified 4 : ecdsa-with-SHA512
|
/external/boringssl/src/crypto/x509/ |
D | x_all.c | 338 int i2d_EC_PUBKEY_bio(BIO *bp, EC_KEY *ecdsa) in i2d_EC_PUBKEY_bio() argument 340 return ASN1_i2d_bio_of_const(EC_KEY,i2d_EC_PUBKEY,bp,ecdsa); in i2d_EC_PUBKEY_bio()
|
/external/tpm2/ |
D | tpm_types.h | 1120 TPMS_SIG_SCHEME_ECDSA ecdsa; member 1196 TPMS_SIG_SCHEME_ECDSA ecdsa; member 1339 TPMS_SIGNATURE_ECDSA ecdsa; member
|
D | CryptUtil.c | 1476 retVal = _cpri__SignEcc(&signature->signature.ecdsa.signatureR, in CryptSignECC() 1477 &signature->signature.ecdsa.signatureS, in CryptSignECC() 1514 retVal = _cpri__ValidateSignatureEcc(&signature->signature.ecdsa.signatureR, in CryptECCVerifySignature() 1515 &signature->signature.ecdsa.signatureS, in CryptECCVerifySignature() 3154 return auth->signature.ecdsa.hash; in CryptGetSignHashAlg()
|
D | tpm_generated.c | 2431 (TPMS_SIG_SCHEME_ECDSA*)&source->ecdsa, buffer, size); in TPMU_ASYM_SCHEME_Marshal() 2494 (TPMS_SIG_SCHEME_ECDSA*)&target->ecdsa, buffer, size); in TPMU_ASYM_SCHEME_Unmarshal() 6944 return TPMS_SIGNATURE_ECDSA_Marshal((TPMS_SIGNATURE_ECDSA*)&source->ecdsa, in TPMU_SIGNATURE_Marshal() 6992 (TPMS_SIGNATURE_ECDSA*)&target->ecdsa, buffer, size); in TPMU_SIGNATURE_Unmarshal() 7065 (TPMS_SIG_SCHEME_ECDSA*)&source->ecdsa, buffer, size); in TPMU_SIG_SCHEME_Marshal() 7113 (TPMS_SIG_SCHEME_ECDSA*)&target->ecdsa, buffer, size); in TPMU_SIG_SCHEME_Unmarshal()
|
D | part4.txt | 21097 1141 retVal = _cpri__SignEcc(&signature->signature.ecdsa.signatureR, 21098 1142 &signature->signature.ecdsa.signatureS, 21142 1170 retVal = _cpri__ValidateSignatureEcc(&signature->signature.ecdsa.signatureR, 21143 1171 &signature->signature.ecdsa.signatureS, 23058 2648 return auth->signature.ecdsa.hash;
|
/external/boringssl/ |
D | sources.mk | 137 src/crypto/ecdsa/ecdsa.c\ 138 src/crypto/ecdsa/ecdsa_asn1.c\
|
/external/tpm2/generator/ |
D | structures.txt | 1645 _NAME ecdsa 1673 _NAME ecdsa 1690 _NAME ecdsa
|
D | raw_structures.txt | 13125 ecdsa 13495 ecdsa 14163 ecdsa
|
D | raw_structures_fixed.txt | 13129 ecdsa 13496 ecdsa 14165 ecdsa
|
/external/bouncycastle/patches/ |
D | bcpkix.patch | 904 …// According to RFC 3279, the ASN.1 encoding SHALL (id-dsa-with-sha1) or MUST (ecdsa-with-SHA*) om…
|
D | bcprov.patch | 9027 …// According to RFC 3279, the ASN.1 encoding SHALL (id-dsa-with-sha1) or MUST (ecdsa-with-SHA*) om…
|