/external/boringssl/src/crypto/ecdsa/ |
D | ecdsa.c | 96 OPENSSL_PUT_ERROR(ECDSA, ERR_R_INTERNAL_ERROR); in ECDSA_verify() 122 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB); in digest_to_bn() 129 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB); in digest_to_bn() 154 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_MISSING_PARAMETERS); in ECDSA_do_verify() 160 OPENSSL_PUT_ERROR(ECDSA, ERR_R_MALLOC_FAILURE); in ECDSA_do_verify() 169 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB); in ECDSA_do_verify() 177 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_BAD_SIGNATURE); in ECDSA_do_verify() 184 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB); in ECDSA_do_verify() 192 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB); in ECDSA_do_verify() 197 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB); in ECDSA_do_verify() [all …]
|
D | ecdsa_asn1.c | 122 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_BAD_SIGNATURE); in ECDSA_SIG_parse() 134 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_BAD_SIGNATURE); in ECDSA_SIG_from_bytes() 147 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_ENCODE_ERROR); in ECDSA_SIG_marshal() 160 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_ENCODE_ERROR); in ECDSA_SIG_to_bytes()
|
/external/boringssl/src/crypto/err/ |
D | ecdsa.errordata | 1 ECDSA,100,BAD_SIGNATURE 2 ECDSA,105,ENCODE_ERROR 3 ECDSA,101,MISSING_PARAMETERS 4 ECDSA,102,NEED_NEW_SETUP_VALUES 5 ECDSA,103,NOT_IMPLEMENTED 6 ECDSA,104,RANDOM_NUMBER_GENERATION_FAILED
|
/external/bouncycastle/patches/ |
D | bcpkix.patch | 618 - addEntries(BSIObjectIdentifiers.ecdsa_plain_SHA1, "SHA1", "PLAIN-ECDSA"); 619 - addEntries(BSIObjectIdentifiers.ecdsa_plain_SHA224, "SHA224", "PLAIN-ECDSA"); 620 - addEntries(BSIObjectIdentifiers.ecdsa_plain_SHA256, "SHA256", "PLAIN-ECDSA"); 621 - addEntries(BSIObjectIdentifiers.ecdsa_plain_SHA384, "SHA384", "PLAIN-ECDSA"); 622 - addEntries(BSIObjectIdentifiers.ecdsa_plain_SHA512, "SHA512", "PLAIN-ECDSA"); 623 - addEntries(BSIObjectIdentifiers.ecdsa_plain_RIPEMD160, "RIPEMD160", "PLAIN-ECDSA"); 625 + // addEntries(BSIObjectIdentifiers.ecdsa_plain_SHA1, "SHA1", "PLAIN-ECDSA"); 626 + // addEntries(BSIObjectIdentifiers.ecdsa_plain_SHA224, "SHA224", "PLAIN-ECDSA"); 627 + // addEntries(BSIObjectIdentifiers.ecdsa_plain_SHA256, "SHA256", "PLAIN-ECDSA"); 628 + // addEntries(BSIObjectIdentifiers.ecdsa_plain_SHA384, "SHA384", "PLAIN-ECDSA"); [all …]
|
D | bcprov.patch | 1440 - provider.addAlgorithm("KeyFactory.ECDSA", PREFIX + "KeyFactorySpi$ECDSA"); 1445 + // provider.addAlgorithm("KeyFactory.ECDSA", PREFIX + "KeyFactorySpi$ECDSA"); 1452 - provider.addAlgorithm("KeyPairGenerator.ECDSA", PREFIX + "KeyPairGeneratorSpi$ECDSA"); 1469 + // provider.addAlgorithm("KeyPairGenerator.ECDSA", PREFIX + "KeyPairGeneratorSpi$ECDSA… 1487 provider.addAlgorithm("Signature.ECDSA", PREFIX + "SignatureSpi$ecDSA"); 1490 provider.addAlgorithm("Alg.Alias.Signature.SHA1WithECDSA", "ECDSA"); 1491 provider.addAlgorithm("Alg.Alias.Signature.ECDSAWithSHA1", "ECDSA"); 1492 provider.addAlgorithm("Alg.Alias.Signature.1.2.840.10045.4.1", "ECDSA"); 1493 …provider.addAlgorithm("Alg.Alias.Signature." + TeleTrusTObjectIdentifiers.ecSignWithSha1, "ECDSA"); 1502 …provider.addAlgorithm("Alg.Alias.Signature." + TeleTrusTObjectIdentifiers.ecSignWithSha1, "ECDSA"); [all …]
|
/external/webrtc/webrtc/base/ |
D | rtccertificate_unittests.cc | 78 params.key_params = KeyParams::ECDSA(); in GenerateCertificateWithExpires() 89 SSLIdentity::Generate(kTestCertCommonName, KeyParams::ECDSA())); in TEST_F()
|
D | ssladapter_unittest.cc | 357 : SSLAdapterTestBase(rtc::SSL_MODE_TLS, rtc::KeyParams::ECDSA()) {} in SSLAdapterTestTLS_ECDSA() 369 : SSLAdapterTestBase(rtc::SSL_MODE_DTLS, rtc::KeyParams::ECDSA()) {} in SSLAdapterTestDTLS_ECDSA()
|
D | sslidentity.h | 145 static KeyParams ECDSA(ECCurve curve = EC_NIST_P256);
|
D | sslstreamadapter_unittest.cc | 1149 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)), 1152 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)))); 1162 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)), 1165 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256))));
|
D | sslidentity.cc | 60 KeyParams KeyParams::ECDSA(ECCurve curve) { in ECDSA() function in rtc::KeyParams
|
D | sslidentity_unittest.cc | 399 params.key_params = rtc::KeyParams::ECDSA(rtc::EC_NIST_P256); in TestExpireTime()
|
/external/conscrypt/platform/src/test/java/org/conscrypt/ct/ |
D | SerializationTest.java | 45 assertEquals(DigitallySigned.SignatureAlgorithm.ECDSA, in test_decode_SignedCertificateTimestamp() 93 assertEquals(DigitallySigned.SignatureAlgorithm.ECDSA, dst.getSignatureAlgorithm()); in test_decode_DigitallySigned()
|
/external/webrtc/talk/app/webrtc/java/src/org/webrtc/ |
D | PeerConnection.java | 135 RSA, ECDSA enumConstant 167 keyType = KeyType.ECDSA; in RTCConfiguration()
|
/external/openssh/ |
D | PROTOCOL.certkeys | 101 ECDSA certificate 129 curve and public key are respectively the ECDSA "[identifier]" and "Q" 176 The valid key types for CA keys are ssh-rsa, ssh-dss and the ECDSA types 180 be signed by a DSS or ECDSA CA key and vice-versa. 185 (RFC4253 section 6.6 for ssh-rsa and ssh-dss, RFC5656 for the ECDSA
|
D | PROTOCOL.agent | 162 The OpenSSH agent supports DSA, ECDSA and RSA keys for protocol 2. DSA 185 ECDSA keys may be added using the following request 198 ECDSA certificates may be added with: 241 For DSA, ECDSA and RSA key add requests, "key_constraints" may only be
|
D | ssh-keygen.0 | 35 and DSA, ECDSA, Ed25519 or RSA keys for use by SSH protocol version 2. 106 exactly 1024 bits as specified by FIPS 186-2. For ECDSA keys, 109 use bit lengths other than these three values for ECDSA keys will 531 Contains the protocol version 2 DSA, ECDSA, Ed25519 or RSA 544 Contains the protocol version 2 DSA, ECDSA, Ed25519 or RSA public
|
D | ssh-keyscan.0 | 75 Output format for RSA, DSA, ECDSA, and Ed25519 keys:
|
D | ssh-add.0 | 101 Contains the protocol version 2 ECDSA authentication identity of
|
D | ssh-agent.0 | 13 authentication (RSA, DSA, ECDSA, Ed25519). ssh-agent is usually started
|
D | ssh.0 | 466 one of the DSA, ECDSA, Ed25519 or RSA algorithms. Protocol 1 is 479 2 DSA), ~/.ssh/id_ecdsa (protocol 2 ECDSA), ~/.ssh/id_ed25519 (protocol 2 482 ~/.ssh/id_ecdsa.pub (protocol 2 ECDSA), ~/.ssh/id_ed25519.pub (protocol 2 828 Lists the public keys (DSA, ECDSA, Ed25519, RSA) that can be used
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/ |
D | KeyFactorySpi.java | 202 public static class ECDSA class in KeyFactorySpi 205 public ECDSA() in ECDSA() method in KeyFactorySpi.ECDSA
|
D | KeyPairGeneratorSpi.java | 256 public static class ECDSA class in KeyPairGeneratorSpi 259 public ECDSA() in ECDSA() method in KeyPairGeneratorSpi.ECDSA
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ct/ |
D | DigitallySigned.java | 49 ECDSA; enumConstant
|
/external/wycheproof/ |
D | README.md | 58 - ECDSA
|
/external/webrtc/webrtc/examples/androidapp/src/org/appspot/apprtc/ |
D | PeerConnectionClient.java | 459 rtcConfig.keyType = PeerConnection.KeyType.ECDSA; in createPeerConnectionInternal()
|