Home
last modified time | relevance | path

Searched refs:eddsa (Results 1 – 25 of 514) sorted by relevance

12345678910>>...21

/dports/security/softhsm2/softhsm-2.6.1/src/lib/crypto/test/
H A DEDDSATests.cpp100 eddsa = NULL; in setUp()
105 CPPUNIT_ASSERT(eddsa != NULL); in setUp()
110 if (eddsa != NULL) in tearDown()
138 eddsa->recycleKeyPair(kp); in testKeyGeneration()
152 eddsa->recycleParameters(p); in testKeyGeneration()
153 eddsa->recycleKeyPair(kp); in testKeyGeneration()
205 eddsa->recycleParameters(p); in testSerialisation()
207 eddsa->recycleKeyPair(kp); in testSerialisation()
208 eddsa->recycleKeyPair(dKP); in testSerialisation()
242 eddsa->recycleKeyPair(kp); in testPKCS8()
[all …]
/dports/dns/yadifa/yadifa-2.5.3-10333/lib/dnscore/src/
H A Ddnskey_eddsa.c342 dnskey_eddsa_public_size(const EVP_PKEY* eddsa) in dnskey_eddsa_public_size() argument
345 EVP_PKEY_get_raw_public_key(eddsa, NULL, &size); in dnskey_eddsa_public_size()
359 EVP_PKEY* eddsa = key->key.ed; in dnskey_eddsa_free() local
360 EVP_PKEY_free(eddsa); in dnskey_eddsa_free()
478 key->key.ed = eddsa; in dnskey_eddsa_initinstance()
532 if(eddsa != NULL) in dnskey_eddsa_parse_set_key()
544 EVP_PKEY_free(eddsa); in dnskey_eddsa_parse_set_key()
554 EVP_PKEY_free(eddsa); in dnskey_eddsa_parse_set_key()
564 key->key.ed = eddsa; in dnskey_eddsa_parse_set_key()
635 if(eddsa != NULL) in dnskey_eddsa_loadpublic()
[all …]
/dports/security/rnp/rnp-0.15.2/src/lib/crypto/
H A Deddsa.cpp103 botan_privkey_t eddsa = NULL; in eddsa_generate() local
115 if (botan_privkey_ed25519_get_privkey(eddsa, key_bits)) { in eddsa_generate()
130 botan_privkey_destroy(eddsa); in eddsa_generate()
140 botan_pubkey_t eddsa = NULL; in eddsa_verify() local
145 if (!eddsa_load_public_key(&eddsa, key)) { in eddsa_verify()
150 if (botan_pk_op_verify_create(&verify_op, eddsa, "Pure", 0) != 0) { in eddsa_verify()
170 botan_pubkey_destroy(eddsa); in eddsa_verify()
181 botan_privkey_t eddsa = NULL; in eddsa_sign() local
187 if (!eddsa_load_secret_key(&eddsa, key)) { in eddsa_sign()
192 if (botan_pk_op_sign_create(&sign_op, eddsa, "Pure", 0) != 0) { in eddsa_sign()
[all …]
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/rnp/src/lib/crypto/
H A Deddsa.cpp103 botan_privkey_t eddsa = NULL; in eddsa_generate() local
111 if (botan_privkey_ed25519_get_privkey(eddsa, key_bits)) { in eddsa_generate()
126 botan_privkey_destroy(eddsa); in eddsa_generate()
136 botan_pubkey_t eddsa = NULL; in eddsa_verify() local
141 if (!eddsa_load_public_key(&eddsa, key)) { in eddsa_verify()
146 if (botan_pk_op_verify_create(&verify_op, eddsa, "Pure", 0) != 0) { in eddsa_verify()
166 botan_pubkey_destroy(eddsa); in eddsa_verify()
177 botan_privkey_t eddsa = NULL; in eddsa_sign() local
183 if (!eddsa_load_secret_key(&eddsa, key)) { in eddsa_sign()
188 if (botan_pk_op_sign_create(&sign_op, eddsa, "Pure", 0) != 0) { in eddsa_sign()
[all …]
/dports/security/nettle/nettle-3.7.3/
H A Deddsa-sign.c54 const struct ecc_eddsa *eddsa, in _eddsa_sign() argument
78 eddsa->dom (ctx); in _eddsa_sign()
79 eddsa->update (ctx, nbytes, k1); in _eddsa_sign()
80 eddsa->update (ctx, length, msg); in _eddsa_sign()
81 eddsa->digest (ctx, 2*nbytes, hash); in _eddsa_sign()
87 eddsa->dom (ctx); in _eddsa_sign()
88 eddsa->update (ctx, nbytes, signature); in _eddsa_sign()
89 eddsa->update (ctx, nbytes, pub); in _eddsa_sign()
90 eddsa->update (ctx, length, msg); in _eddsa_sign()
91 eddsa->digest (ctx, 2*nbytes, hash); in _eddsa_sign()
H A Deddsa-expand.c49 const struct ecc_eddsa *eddsa, in _eddsa_expand_key() argument
57 eddsa->update (ctx, nbytes, key); in _eddsa_expand_key()
58 eddsa->digest (ctx, 2*nbytes, digest); in _eddsa_expand_key()
64 k2[0] &= eddsa->low_mask; in _eddsa_expand_key()
67 k2[ecc->p.size - 1] &= eddsa->high_bit - 1; in _eddsa_expand_key()
71 k2[ecc->p.size - 1] |= eddsa->high_bit; in _eddsa_expand_key()
H A Deddsa-verify.c74 const struct ecc_eddsa *eddsa, in _eddsa_verify() argument
104 eddsa->dom (ctx); in _eddsa_verify()
105 eddsa->update (ctx, nbytes, signature); in _eddsa_verify()
106 eddsa->update (ctx, nbytes, pub); in _eddsa_verify()
107 eddsa->update (ctx, length, msg); in _eddsa_verify()
108 eddsa->digest (ctx, 2*nbytes, hash); in _eddsa_verify()
H A Ded448-shake256-sign.c50 const struct ecc_eddsa *eddsa = &_nettle_ed448_shake256; in ed448_shake256_sign() local
59 _eddsa_expand_key (ecc, eddsa, &ctx, priv, digest, k2); in ed448_shake256_sign()
61 _eddsa_sign (ecc, eddsa, &ctx, in ed448_shake256_sign()
H A Deddsa-internal.h94 const struct ecc_eddsa *eddsa,
109 const struct ecc_eddsa *eddsa,
120 const struct ecc_eddsa *eddsa,
/dports/security/gnutls/gnutls-3.6.16/lib/nettle/ecc/
H A Deddsa-sign.c54 const struct ecc_eddsa *eddsa, in _eddsa_sign() argument
78 eddsa->dom (ctx); in _eddsa_sign()
79 eddsa->update (ctx, nbytes, k1); in _eddsa_sign()
80 eddsa->update (ctx, length, msg); in _eddsa_sign()
81 eddsa->digest (ctx, 2*nbytes, hash); in _eddsa_sign()
87 eddsa->dom (ctx); in _eddsa_sign()
88 eddsa->update (ctx, nbytes, signature); in _eddsa_sign()
89 eddsa->update (ctx, nbytes, pub); in _eddsa_sign()
90 eddsa->update (ctx, length, msg); in _eddsa_sign()
91 eddsa->digest (ctx, 2*nbytes, hash); in _eddsa_sign()
H A Deddsa-expand.c48 const struct ecc_eddsa *eddsa, in _eddsa_expand_key() argument
56 eddsa->update (ctx, nbytes, key); in _eddsa_expand_key()
57 eddsa->digest (ctx, 2*nbytes, digest); in _eddsa_expand_key()
63 k2[0] &= eddsa->low_mask; in _eddsa_expand_key()
66 k2[ecc->p.size - 1] &= eddsa->high_bit - 1; in _eddsa_expand_key()
70 k2[ecc->p.size - 1] |= eddsa->high_bit; in _eddsa_expand_key()
H A Deddsa-verify.c79 const struct ecc_eddsa *eddsa, in _eddsa_verify() argument
109 eddsa->dom (ctx); in _eddsa_verify()
110 eddsa->update (ctx, nbytes, signature); in _eddsa_verify()
111 eddsa->update (ctx, nbytes, pub); in _eddsa_verify()
112 eddsa->update (ctx, length, msg); in _eddsa_verify()
113 eddsa->digest (ctx, 2*nbytes, hash); in _eddsa_verify()
H A Ded448-shake256-sign.c50 const struct ecc_eddsa *eddsa = &_nettle_ed448_shake256; in ed448_shake256_sign() local
59 _eddsa_expand_key (ecc, eddsa, &ctx, priv, digest, k2); in ed448_shake256_sign()
61 _eddsa_sign (ecc, eddsa, &ctx, in ed448_shake256_sign()
H A Deddsa-internal.h96 const struct ecc_eddsa *eddsa,
111 const struct ecc_eddsa *eddsa,
122 const struct ecc_eddsa *eddsa,
/dports/security/nettle/nettle-3.7.3/testsuite/
H A Deddsa-verify-test.c40 const struct ecc_eddsa *eddsa, in test_eddsa() argument
56 if (!_eddsa_verify (ecc, eddsa, pub, A, ctx, in test_eddsa()
73 if (_eddsa_verify (ecc, eddsa, pub, A, ctx, in test_eddsa()
84 if (_eddsa_verify (ecc, eddsa, pub, A, ctx, in test_eddsa()
94 if (_eddsa_verify (ecc, eddsa, pub, A, ctx, in test_eddsa()
104 if (_eddsa_verify (ecc, eddsa, pub, A, ctx, in test_eddsa()
114 if (_eddsa_verify (ecc, eddsa, pub, A, ctx, in test_eddsa()
/dports/security/gnutls/gnutls-3.6.16/tests/cert-tests/
H A Dcerttool-eddsa25 KEYFILE=eddsa-privkey.$$.tmp
26 TMPFILE=eddsa.$$.tmp
73 --key-type eddsa --outfile "$KEYFILE"
105 ${VALGRIND} "${CERTTOOL}" --generate-certificate --key-type eddsa \
131 ${VALGRIND} "${CERTTOOL}" --verify-chain --infile ${srcdir}/data/chain-eddsa.pem
/dports/security/fizz/fizz-2021.12.27.00/fizz/crypto/signature/test/
H A DEdSignatureTest.cpp72 OpenSSLSignature<KeyType::ED25519> eddsa; in TEST_P() local
75 eddsa.setKey(std::move(privateKey)); in TEST_P()
78 auto generatedSignature = eddsa.sign<SignatureScheme::ed25519>( in TEST_P()
83 eddsa.verify<SignatureScheme::ed25519>( in TEST_P()
90 eddsa.verify<SignatureScheme::ed25519>( in TEST_P()
98 eddsa.verify<SignatureScheme::ed25519>( in TEST_P()
/dports/mail/rspamd-devel/rspamd-93430bb/test/functional/cases/131_dkim_signing/
H A D004_invalidate_key.robot38 Copy File ${RSPAMD_TESTDIR}/configs/dkim-eddsa.key ${RSPAMD_KEY_DIR}/dkim-eddsa.key
42 Remove File ${RSPAMD_KEY_DIR}/dkim-eddsa.key
45 Copy File ${RSPAMD_TESTDIR}/configs/dkim.key ${RSPAMD_KEY_DIR}/dkim-eddsa.key
46 Set Modified Time ${RSPAMD_KEY_DIR}/dkim-eddsa.key NOW + 3s
/dports/mail/rspamd/rspamd-3.1/test/functional/cases/131_dkim_signing/
H A D004_invalidate_key.robot38 Copy File ${RSPAMD_TESTDIR}/configs/dkim-eddsa.key ${RSPAMD_KEY_DIR}/dkim-eddsa.key
42 Remove File ${RSPAMD_KEY_DIR}/dkim-eddsa.key
45 Copy File ${RSPAMD_TESTDIR}/configs/dkim.key ${RSPAMD_KEY_DIR}/dkim-eddsa.key
46 Set Modified Time ${RSPAMD_KEY_DIR}/dkim-eddsa.key NOW + 3s
/dports/security/keybase/client-v5.7.1/go/engine/
H A Dkex2_provisionee.go30 eddsa libkb.NaclKeyPair member
203 e.eddsa, err = libkb.GenerateNaclSigningKeyPair()
329 reboxArg, err := e.ekReboxer.getReboxArg(m, userEKBox, e.device.ID, e.eddsa)
470 e.device.Kid = e.eddsa.GetKID()
489 sig, _, _, err := libkb.SignJSON(jw, e.eddsa)
544 ExistingKey: e.eddsa,
563 dhSig, dhSigID, _, err := libkb.SignJSON(jw, e.eddsa)
614 _, err := libkb.WriteLksSKBToKeyring(m, e.eddsa, e.lks)
628 if e.eddsa == nil {
644 if e.eddsa == nil {
[all …]
/dports/security/gnutls/gnutls-3.6.16/lib/nettle/
H A DMakefile.am164 ecc/eddsa.h ecc/eddsa-compress.c ecc/eddsa-decompress.c \
165 ecc/eddsa-expand.c ecc/eddsa-hash.c ecc/eddsa-internal.h \
166 ecc/eddsa-pubkey.c ecc/eddsa-sign.c ecc/eddsa-verify.c \
/dports/security/libfido2/libfido2-1.9.0/fuzz/
H A Dfuzz_assert.c30 struct blob eddsa; member
93 unpack_blob(v[12], &p->eddsa) < 0 || in unpack()
133 (argv[12] = pack_blob(&p->eddsa)) == NULL || in pack()
181 dummy.eddsa.len = sizeof(dummy_eddsa); in pack_dummy()
190 memcpy(&dummy.eddsa.body, &dummy_eddsa, dummy.eddsa.len); in pack_dummy()
408 eddsa_pk_from_ptr(eddsa_pk, p->eddsa.body, p->eddsa.len); in test()
476 mutate_blob(&p->eddsa); in mutate()
/dports/security/libfido2/libfido2-1.9.0/tools/
H A Dassert_verify.c94 EVP_PKEY *eddsa = NULL; in load_pubkey() local
121 if ((eddsa = read_eddsa_pubkey(file)) == NULL) in load_pubkey()
125 if (eddsa_pk_from_EVP_PKEY(eddsa_pk, eddsa) != FIDO_OK) in load_pubkey()
129 EVP_PKEY_free(eddsa); in load_pubkey()
/dports/security/libfido2/libfido2-1.9.0/examples/
H A Dassert.c47 EVP_PKEY *eddsa = NULL; in verify_assert() local
87 if ((eddsa = read_eddsa_pubkey(key)) == NULL) in verify_assert()
93 if (eddsa_pk_from_EVP_PKEY(eddsa_pk, eddsa) != FIDO_OK) in verify_assert()
97 EVP_PKEY_free(eddsa); in verify_assert()
98 eddsa = NULL; in verify_assert()
/dports/security/libfido2/libfido2-1.9.0/regress/
H A Dassert.c224 eddsa_pk_t *eddsa; in empty_assert() local
244 eddsa = alloc_eddsa_pk(); in empty_assert()
258 eddsa) == FIDO_ERR_INVALID_ARGUMENT); in empty_assert()
272 eddsa) == FIDO_ERR_INVALID_ARGUMENT); in empty_assert()
276 free_eddsa_pk(eddsa); in empty_assert()
317 eddsa_pk_t *eddsa; in valid_assert() local
322 eddsa = alloc_eddsa_pk(); in valid_assert()
334 assert(fido_assert_verify(a, 0, COSE_EDDSA, eddsa) == FIDO_ERR_INVALID_SIG); in valid_assert()
338 free_eddsa_pk(eddsa); in valid_assert()

12345678910>>...21