/external/boringssl/src/crypto/fipsmodule/ecdsa/ |
H A D | ecdsa.c | 81 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB); 88 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB); 137 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_MISSING_PARAMETERS); 143 OPENSSL_PUT_ERROR(ECDSA, ERR_R_MALLOC_FAILURE); 152 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB); 160 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_BAD_SIGNATURE); 166 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB); 174 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB); 179 OPENSSL_PUT_ERROR(ECDSA, ERR_R_BN_LIB); 185 OPENSSL_PUT_ERROR(ECDSA, ERR_R_MALLOC_FAILUR [all...] |
/external/boringssl/src/crypto/ecdsa_extra/ |
H A D | ecdsa_asn1.c | 87 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_NOT_IMPLEMENTED); 104 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_ENCODE_ERROR); 123 /* Decode the ECDSA signature. */ 134 OPENSSL_PUT_ERROR(ECDSA, ERR_R_INTERNAL_ERROR); 177 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_BAD_SIGNATURE); 189 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_BAD_SIGNATURE); 202 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_ENCODE_ERROR); 215 OPENSSL_PUT_ERROR(ECDSA, ECDSA_R_ENCODE_ERROR); 243 /* An ECDSA signature is two INTEGERs. */
|
/external/webrtc/webrtc/base/ |
H A D | rtccertificate_unittests.cc | 76 // Certificate type does not matter for our purposes, using ECDSA because it 78 params.key_params = KeyParams::ECDSA(); 87 // Certificate type doesn't matter, using ECDSA because it's fast to generate. 89 SSLIdentity::Generate(kTestCertCommonName, KeyParams::ECDSA()));
|
H A D | sslidentity.h | 144 // Generate a a KeyParams for ECDSA specifying the curve. 145 static KeyParams ECDSA(ECCurve curve = EC_NIST_P256);
|
H A D | ssladapter_unittest.cc | 357 : SSLAdapterTestBase(rtc::SSL_MODE_TLS, rtc::KeyParams::ECDSA()) {} 369 : SSLAdapterTestBase(rtc::SSL_MODE_DTLS, rtc::KeyParams::ECDSA()) {} 381 // Test that handshake works, using ECDSA 392 // Test transfer between client and server, using ECDSA 405 // Test that handshake works, using ECDSA 416 // Test transfer between client and server, using ECDSA
|
H A D | sslidentity.cc | 60 KeyParams KeyParams::ECDSA(ECCurve curve) { function in class:rtc::KeyParams
|
H A D | sslstreamadapter_unittest.cc | 1149 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)), 1152 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)))); 1162 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)), 1165 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256))));
|
H A D | sslidentity_unittest.cc | 397 // We test just ECDSA here since what we're out to exercise here is the 399 params.key_params = rtc::KeyParams::ECDSA(rtc::EC_NIST_P256);
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ct/ |
H A D | DigitallySigned.java | 53 ECDSA; enum constant in enum:DigitallySigned.SignatureAlgorithm
|
/external/openssh/regress/ |
H A D | krl.sh | 7 ECDSA=ecdsa 9 ECDSA=rsa 18 $SSHKEYGEN -t $ECDSA -f $OBJ/revoked-ca -C "" -N "" > /dev/null || 58 # Vary the keytype. We use mostly ECDSA since this is fastest by far. 59 keytype=$ECDSA
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/ |
H A D | KeyFactorySpi.java | 202 public static class ECDSA class in class:KeyFactorySpi 205 public ECDSA() method in class:KeyFactorySpi.ECDSA 207 super("ECDSA", BouncyCastleProvider.CONFIGURATION);
|
H A D | KeyPairGeneratorSpi.java | 256 public static class ECDSA class in class:KeyPairGeneratorSpi 259 public ECDSA() method in class:KeyPairGeneratorSpi.ECDSA 261 super("ECDSA", BouncyCastleProvider.CONFIGURATION);
|
/external/conscrypt/platform/src/test/java/org/conscrypt/ct/ |
H A D | SerializationTest.java | 45 assertEquals(DigitallySigned.SignatureAlgorithm.ECDSA, 93 assertEquals(DigitallySigned.SignatureAlgorithm.ECDSA, dst.getSignatureAlgorithm());
|
/external/webrtc/talk/app/webrtc/java/src/org/webrtc/ |
H A D | PeerConnection.java | 135 RSA, ECDSA enum constant in enum:PeerConnection.KeyType 167 keyType = KeyType.ECDSA;
|
/external/conscrypt/openjdk-integ-tests/src/test/java/libcore/javax/net/ssl/ |
H A D | SSLSocketTest.java | 987 put("Signature.NONEwithECDSA", OpaqueSignatureSpi.ECDSA.class.getName()); 1002 public final static class ECDSA extends OpaqueSignatureSpi { class in class:SSLSocketTest.OpaqueSignatureSpi 1003 public ECDSA() { method in class:SSLSocketTest.OpaqueSignatureSpi.ECDSA
|
/external/webrtc/webrtc/examples/androidapp/src/org/appspot/apprtc/ |
H A D | PeerConnectionClient.java | 458 // Use ECDSA encryption. 459 rtcConfig.keyType = PeerConnection.KeyType.ECDSA;
|
/external/google-tv-pairing-protocol/java/jar/ |
H A D | bcprov-jdk15-143.jar | META-INF/MANIFEST.MF META-INF/BCKEY.SF META-INF/BCKEY.DSA META ... |
/external/robolectric/v3/runtime/ |
H A D | android-all-4.4_r1-robolectric-1.jar | META-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/android/ com/google/android/collect/ ... |