/dports/security/softhsm2/softhsm-2.6.1/src/lib/crypto/test/ |
H A D | EDDSATests.cpp | 100 eddsa = NULL; in setUp() 105 CPPUNIT_ASSERT(eddsa != NULL); in setUp() 110 if (eddsa != NULL) in tearDown() 138 eddsa->recycleKeyPair(kp); in testKeyGeneration() 152 eddsa->recycleParameters(p); in testKeyGeneration() 153 eddsa->recycleKeyPair(kp); in testKeyGeneration() 205 eddsa->recycleParameters(p); in testSerialisation() 207 eddsa->recycleKeyPair(kp); in testSerialisation() 208 eddsa->recycleKeyPair(dKP); in testSerialisation() 242 eddsa->recycleKeyPair(kp); in testPKCS8() [all …]
|
/dports/dns/yadifa/yadifa-2.5.3-10333/lib/dnscore/src/ |
H A D | dnskey_eddsa.c | 342 dnskey_eddsa_public_size(const EVP_PKEY* eddsa) in dnskey_eddsa_public_size() argument 345 EVP_PKEY_get_raw_public_key(eddsa, NULL, &size); in dnskey_eddsa_public_size() 359 EVP_PKEY* eddsa = key->key.ed; in dnskey_eddsa_free() local 360 EVP_PKEY_free(eddsa); in dnskey_eddsa_free() 478 key->key.ed = eddsa; in dnskey_eddsa_initinstance() 532 if(eddsa != NULL) in dnskey_eddsa_parse_set_key() 544 EVP_PKEY_free(eddsa); in dnskey_eddsa_parse_set_key() 554 EVP_PKEY_free(eddsa); in dnskey_eddsa_parse_set_key() 564 key->key.ed = eddsa; in dnskey_eddsa_parse_set_key() 635 if(eddsa != NULL) in dnskey_eddsa_loadpublic() [all …]
|
/dports/security/rnp/rnp-0.15.2/src/lib/crypto/ |
H A D | eddsa.cpp | 103 botan_privkey_t eddsa = NULL; in eddsa_generate() local 115 if (botan_privkey_ed25519_get_privkey(eddsa, key_bits)) { in eddsa_generate() 130 botan_privkey_destroy(eddsa); in eddsa_generate() 140 botan_pubkey_t eddsa = NULL; in eddsa_verify() local 145 if (!eddsa_load_public_key(&eddsa, key)) { in eddsa_verify() 150 if (botan_pk_op_verify_create(&verify_op, eddsa, "Pure", 0) != 0) { in eddsa_verify() 170 botan_pubkey_destroy(eddsa); in eddsa_verify() 181 botan_privkey_t eddsa = NULL; in eddsa_sign() local 187 if (!eddsa_load_secret_key(&eddsa, key)) { in eddsa_sign() 192 if (botan_pk_op_sign_create(&sign_op, eddsa, "Pure", 0) != 0) { in eddsa_sign() [all …]
|
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/rnp/src/lib/crypto/ |
H A D | eddsa.cpp | 103 botan_privkey_t eddsa = NULL; in eddsa_generate() local 111 if (botan_privkey_ed25519_get_privkey(eddsa, key_bits)) { in eddsa_generate() 126 botan_privkey_destroy(eddsa); in eddsa_generate() 136 botan_pubkey_t eddsa = NULL; in eddsa_verify() local 141 if (!eddsa_load_public_key(&eddsa, key)) { in eddsa_verify() 146 if (botan_pk_op_verify_create(&verify_op, eddsa, "Pure", 0) != 0) { in eddsa_verify() 166 botan_pubkey_destroy(eddsa); in eddsa_verify() 177 botan_privkey_t eddsa = NULL; in eddsa_sign() local 183 if (!eddsa_load_secret_key(&eddsa, key)) { in eddsa_sign() 188 if (botan_pk_op_sign_create(&sign_op, eddsa, "Pure", 0) != 0) { in eddsa_sign() [all …]
|
/dports/security/nettle/nettle-3.7.3/ |
H A D | eddsa-sign.c | 54 const struct ecc_eddsa *eddsa, in _eddsa_sign() argument 78 eddsa->dom (ctx); in _eddsa_sign() 79 eddsa->update (ctx, nbytes, k1); in _eddsa_sign() 80 eddsa->update (ctx, length, msg); in _eddsa_sign() 81 eddsa->digest (ctx, 2*nbytes, hash); in _eddsa_sign() 87 eddsa->dom (ctx); in _eddsa_sign() 88 eddsa->update (ctx, nbytes, signature); in _eddsa_sign() 89 eddsa->update (ctx, nbytes, pub); in _eddsa_sign() 90 eddsa->update (ctx, length, msg); in _eddsa_sign() 91 eddsa->digest (ctx, 2*nbytes, hash); in _eddsa_sign()
|
H A D | eddsa-expand.c | 49 const struct ecc_eddsa *eddsa, in _eddsa_expand_key() argument 57 eddsa->update (ctx, nbytes, key); in _eddsa_expand_key() 58 eddsa->digest (ctx, 2*nbytes, digest); in _eddsa_expand_key() 64 k2[0] &= eddsa->low_mask; in _eddsa_expand_key() 67 k2[ecc->p.size - 1] &= eddsa->high_bit - 1; in _eddsa_expand_key() 71 k2[ecc->p.size - 1] |= eddsa->high_bit; in _eddsa_expand_key()
|
H A D | eddsa-verify.c | 74 const struct ecc_eddsa *eddsa, in _eddsa_verify() argument 104 eddsa->dom (ctx); in _eddsa_verify() 105 eddsa->update (ctx, nbytes, signature); in _eddsa_verify() 106 eddsa->update (ctx, nbytes, pub); in _eddsa_verify() 107 eddsa->update (ctx, length, msg); in _eddsa_verify() 108 eddsa->digest (ctx, 2*nbytes, hash); in _eddsa_verify()
|
H A D | ed448-shake256-sign.c | 50 const struct ecc_eddsa *eddsa = &_nettle_ed448_shake256; in ed448_shake256_sign() local 59 _eddsa_expand_key (ecc, eddsa, &ctx, priv, digest, k2); in ed448_shake256_sign() 61 _eddsa_sign (ecc, eddsa, &ctx, in ed448_shake256_sign()
|
H A D | eddsa-internal.h | 94 const struct ecc_eddsa *eddsa, 109 const struct ecc_eddsa *eddsa, 120 const struct ecc_eddsa *eddsa,
|
/dports/security/gnutls/gnutls-3.6.16/lib/nettle/ecc/ |
H A D | eddsa-sign.c | 54 const struct ecc_eddsa *eddsa, in _eddsa_sign() argument 78 eddsa->dom (ctx); in _eddsa_sign() 79 eddsa->update (ctx, nbytes, k1); in _eddsa_sign() 80 eddsa->update (ctx, length, msg); in _eddsa_sign() 81 eddsa->digest (ctx, 2*nbytes, hash); in _eddsa_sign() 87 eddsa->dom (ctx); in _eddsa_sign() 88 eddsa->update (ctx, nbytes, signature); in _eddsa_sign() 89 eddsa->update (ctx, nbytes, pub); in _eddsa_sign() 90 eddsa->update (ctx, length, msg); in _eddsa_sign() 91 eddsa->digest (ctx, 2*nbytes, hash); in _eddsa_sign()
|
H A D | eddsa-expand.c | 48 const struct ecc_eddsa *eddsa, in _eddsa_expand_key() argument 56 eddsa->update (ctx, nbytes, key); in _eddsa_expand_key() 57 eddsa->digest (ctx, 2*nbytes, digest); in _eddsa_expand_key() 63 k2[0] &= eddsa->low_mask; in _eddsa_expand_key() 66 k2[ecc->p.size - 1] &= eddsa->high_bit - 1; in _eddsa_expand_key() 70 k2[ecc->p.size - 1] |= eddsa->high_bit; in _eddsa_expand_key()
|
H A D | eddsa-verify.c | 79 const struct ecc_eddsa *eddsa, in _eddsa_verify() argument 109 eddsa->dom (ctx); in _eddsa_verify() 110 eddsa->update (ctx, nbytes, signature); in _eddsa_verify() 111 eddsa->update (ctx, nbytes, pub); in _eddsa_verify() 112 eddsa->update (ctx, length, msg); in _eddsa_verify() 113 eddsa->digest (ctx, 2*nbytes, hash); in _eddsa_verify()
|
H A D | ed448-shake256-sign.c | 50 const struct ecc_eddsa *eddsa = &_nettle_ed448_shake256; in ed448_shake256_sign() local 59 _eddsa_expand_key (ecc, eddsa, &ctx, priv, digest, k2); in ed448_shake256_sign() 61 _eddsa_sign (ecc, eddsa, &ctx, in ed448_shake256_sign()
|
H A D | eddsa-internal.h | 96 const struct ecc_eddsa *eddsa, 111 const struct ecc_eddsa *eddsa, 122 const struct ecc_eddsa *eddsa,
|
/dports/security/nettle/nettle-3.7.3/testsuite/ |
H A D | eddsa-verify-test.c | 40 const struct ecc_eddsa *eddsa, in test_eddsa() argument 56 if (!_eddsa_verify (ecc, eddsa, pub, A, ctx, in test_eddsa() 73 if (_eddsa_verify (ecc, eddsa, pub, A, ctx, in test_eddsa() 84 if (_eddsa_verify (ecc, eddsa, pub, A, ctx, in test_eddsa() 94 if (_eddsa_verify (ecc, eddsa, pub, A, ctx, in test_eddsa() 104 if (_eddsa_verify (ecc, eddsa, pub, A, ctx, in test_eddsa() 114 if (_eddsa_verify (ecc, eddsa, pub, A, ctx, in test_eddsa()
|
/dports/security/gnutls/gnutls-3.6.16/tests/cert-tests/ |
H A D | certtool-eddsa | 25 KEYFILE=eddsa-privkey.$$.tmp 26 TMPFILE=eddsa.$$.tmp 73 --key-type eddsa --outfile "$KEYFILE" 105 ${VALGRIND} "${CERTTOOL}" --generate-certificate --key-type eddsa \ 131 ${VALGRIND} "${CERTTOOL}" --verify-chain --infile ${srcdir}/data/chain-eddsa.pem
|
/dports/security/fizz/fizz-2021.12.27.00/fizz/crypto/signature/test/ |
H A D | EdSignatureTest.cpp | 72 OpenSSLSignature<KeyType::ED25519> eddsa; in TEST_P() local 75 eddsa.setKey(std::move(privateKey)); in TEST_P() 78 auto generatedSignature = eddsa.sign<SignatureScheme::ed25519>( in TEST_P() 83 eddsa.verify<SignatureScheme::ed25519>( in TEST_P() 90 eddsa.verify<SignatureScheme::ed25519>( in TEST_P() 98 eddsa.verify<SignatureScheme::ed25519>( in TEST_P()
|
/dports/mail/rspamd-devel/rspamd-93430bb/test/functional/cases/131_dkim_signing/ |
H A D | 004_invalidate_key.robot | 38 Copy File ${RSPAMD_TESTDIR}/configs/dkim-eddsa.key ${RSPAMD_KEY_DIR}/dkim-eddsa.key 42 Remove File ${RSPAMD_KEY_DIR}/dkim-eddsa.key 45 Copy File ${RSPAMD_TESTDIR}/configs/dkim.key ${RSPAMD_KEY_DIR}/dkim-eddsa.key 46 Set Modified Time ${RSPAMD_KEY_DIR}/dkim-eddsa.key NOW + 3s
|
/dports/mail/rspamd/rspamd-3.1/test/functional/cases/131_dkim_signing/ |
H A D | 004_invalidate_key.robot | 38 Copy File ${RSPAMD_TESTDIR}/configs/dkim-eddsa.key ${RSPAMD_KEY_DIR}/dkim-eddsa.key 42 Remove File ${RSPAMD_KEY_DIR}/dkim-eddsa.key 45 Copy File ${RSPAMD_TESTDIR}/configs/dkim.key ${RSPAMD_KEY_DIR}/dkim-eddsa.key 46 Set Modified Time ${RSPAMD_KEY_DIR}/dkim-eddsa.key NOW + 3s
|
/dports/security/keybase/client-v5.7.1/go/engine/ |
H A D | kex2_provisionee.go | 30 eddsa libkb.NaclKeyPair member 203 e.eddsa, err = libkb.GenerateNaclSigningKeyPair() 329 reboxArg, err := e.ekReboxer.getReboxArg(m, userEKBox, e.device.ID, e.eddsa) 470 e.device.Kid = e.eddsa.GetKID() 489 sig, _, _, err := libkb.SignJSON(jw, e.eddsa) 544 ExistingKey: e.eddsa, 563 dhSig, dhSigID, _, err := libkb.SignJSON(jw, e.eddsa) 614 _, err := libkb.WriteLksSKBToKeyring(m, e.eddsa, e.lks) 628 if e.eddsa == nil { 644 if e.eddsa == nil { [all …]
|
/dports/security/gnutls/gnutls-3.6.16/lib/nettle/ |
H A D | Makefile.am | 164 ecc/eddsa.h ecc/eddsa-compress.c ecc/eddsa-decompress.c \ 165 ecc/eddsa-expand.c ecc/eddsa-hash.c ecc/eddsa-internal.h \ 166 ecc/eddsa-pubkey.c ecc/eddsa-sign.c ecc/eddsa-verify.c \
|
/dports/security/libfido2/libfido2-1.9.0/fuzz/ |
H A D | fuzz_assert.c | 30 struct blob eddsa; member 93 unpack_blob(v[12], &p->eddsa) < 0 || in unpack() 133 (argv[12] = pack_blob(&p->eddsa)) == NULL || in pack() 181 dummy.eddsa.len = sizeof(dummy_eddsa); in pack_dummy() 190 memcpy(&dummy.eddsa.body, &dummy_eddsa, dummy.eddsa.len); in pack_dummy() 408 eddsa_pk_from_ptr(eddsa_pk, p->eddsa.body, p->eddsa.len); in test() 476 mutate_blob(&p->eddsa); in mutate()
|
/dports/security/libfido2/libfido2-1.9.0/tools/ |
H A D | assert_verify.c | 94 EVP_PKEY *eddsa = NULL; in load_pubkey() local 121 if ((eddsa = read_eddsa_pubkey(file)) == NULL) in load_pubkey() 125 if (eddsa_pk_from_EVP_PKEY(eddsa_pk, eddsa) != FIDO_OK) in load_pubkey() 129 EVP_PKEY_free(eddsa); in load_pubkey()
|
/dports/security/libfido2/libfido2-1.9.0/examples/ |
H A D | assert.c | 47 EVP_PKEY *eddsa = NULL; in verify_assert() local 87 if ((eddsa = read_eddsa_pubkey(key)) == NULL) in verify_assert() 93 if (eddsa_pk_from_EVP_PKEY(eddsa_pk, eddsa) != FIDO_OK) in verify_assert() 97 EVP_PKEY_free(eddsa); in verify_assert() 98 eddsa = NULL; in verify_assert()
|
/dports/security/libfido2/libfido2-1.9.0/regress/ |
H A D | assert.c | 224 eddsa_pk_t *eddsa; in empty_assert() local 244 eddsa = alloc_eddsa_pk(); in empty_assert() 258 eddsa) == FIDO_ERR_INVALID_ARGUMENT); in empty_assert() 272 eddsa) == FIDO_ERR_INVALID_ARGUMENT); in empty_assert() 276 free_eddsa_pk(eddsa); in empty_assert() 317 eddsa_pk_t *eddsa; in valid_assert() local 322 eddsa = alloc_eddsa_pk(); in valid_assert() 334 assert(fido_assert_verify(a, 0, COSE_EDDSA, eddsa) == FIDO_ERR_INVALID_SIG); in valid_assert() 338 free_eddsa_pk(eddsa); in valid_assert()
|