| /freebsd/contrib/libfido2/regress/ |
| H A D | eddsa.c | 16 #include <fido/eddsa.h> 32 static const char eddsa[] = \ variable 128 ASSERT_NULL(EVP_PKEY_from_PEM(eddsa, sizeof(eddsa))); in valid_key() 132 assert(eddsa_pk_cmp(eddsa, sizeof(eddsa)) < 0); in valid_key() 134 ASSERT_NOT_NULL((pkeyA = EVP_PKEY_from_PEM(eddsa, sizeof(eddsa)))); in valid_key() 141 assert(eddsa_pk_cmp(eddsa, sizeof(eddsa)) in valid_key() [all...] |
| H A D | assert.c | 18 #include <fido/eddsa.h> 228 eddsa_pk_t *eddsa; in empty_assert() local 250 eddsa = alloc_eddsa_pk(); in empty_assert() 264 eddsa) == FIDO_ERR_INVALID_ARGUMENT); in empty_assert() 278 eddsa) == FIDO_ERR_INVALID_ARGUMENT); in empty_assert() 282 free_eddsa_pk(eddsa); 323 eddsa_pk_t *eddsa; in valid_assert() 328 eddsa = alloc_eddsa_pk(); in valid_assert() 340 assert(fido_assert_verify(a, 0, COSE_EDDSA, eddsa) == FIDO_ERR_INVALID_SIG); in valid_assert() 344 free_eddsa_pk(eddsa); 321 eddsa_pk_t *eddsa; valid_assert() local [all...] |
| H A D | CMakeLists.txt | 46 add_regress_test(regress_eddsa eddsa.c ${_FIDO2_LIBRARY})
|
| /freebsd/contrib/libfido2/tools/ |
| H A D | assert_verify.c | 96 EVP_PKEY *eddsa = NULL; in load_pubkey() local 135 if ((eddsa = read_eddsa_pubkey(file)) == NULL) in load_pubkey() 139 if (eddsa_pk_from_EVP_PKEY(eddsa_pk, eddsa) != FIDO_OK) in load_pubkey() 142 EVP_PKEY_free(eddsa); in load_pubkey()
|
| /freebsd/contrib/libfido2/fuzz/ |
| H A D | fuzz_assert.c | 31 struct blob eddsa; member 94 unpack_blob(v[12], &p->eddsa) < 0 || in unpack() 134 (argv[12] = pack_blob(&p->eddsa)) == NULL || in pack() 182 dummy.eddsa.len = sizeof(dummy_eddsa); in pack_dummy() 191 memcpy(&dummy.eddsa.body, &dummy_eddsa, dummy.eddsa.len); in pack_dummy() 444 eddsa_pk_from_ptr(eddsa_pk, p->eddsa.body, p->eddsa.len); in test() 515 mutate_blob(&p->eddsa); in mutate()
|
| H A D | summary.txt | 26 src/eddsa.c 88 5 94.32% 10 0 100.00% 114 9 92.11%
|
| H A D | functions.txt | 442 File '/libfido2/src/eddsa.c': 453 eddsa.c:decode_pubkey_point 8 0 100.00% 11 0 100.00% 454 eddsa.c:decode_coord 8 0 100.00% 10 0 100.00%
|
| /freebsd/contrib/libfido2/examples/ |
| H A D | assert.c | 49 EVP_PKEY *eddsa = NULL; in verify_assert() local 105 if ((eddsa = read_eddsa_pubkey(key)) == NULL) in verify_assert() 111 if (eddsa_pk_from_EVP_PKEY(eddsa_pk, eddsa) != FIDO_OK) in verify_assert() 115 EVP_PKEY_free(eddsa); in verify_assert() 116 eddsa = NULL; in verify_assert()
|
| H A D | README.adoc | 50 - cred [-t es256|es384|rs256|eddsa] [-k pubkey] [-ei cred_id] [-P pin] 69 - assert [-t es256|es384|rs256|eddsa] [-a cred_id] [-h hmac_secret] [-P pin]
|
| /freebsd/crypto/libecc/src/sig/ |
| H A D | eddsa.c | 1163 ret = h->hfunc_init(&(ctx->sign_data.eddsa.h_ctx)); EG(ret, err); 1166 ctx->sign_data.eddsa.magic = EDDSA_SIGN_MAGIC; 1190 EDDSA_SIGN_CHECK_INITIALIZED(&(ctx->sign_data.eddsa), ret, err); 1215 ret = ctx->h->hfunc_update(&(ctx->sign_data.eddsa.h_ctx), chunk, chunklen); 1264 EDDSA_SIGN_CHECK_INITIALIZED(&(ctx->sign_data.eddsa), ret, err); 1327 ret = h->hfunc_finalize(&(ctx->sign_data.eddsa.h_ctx), ph_hash); EG(ret, err); 1338 ret = h->hfunc_init(&(ctx->sign_data.eddsa.h_ctx)); EG(ret, err); 1344 &(ctx->sign_data.eddsa.h_ctx)); EG(ret, err); 1350 &(ctx->sign_data.eddsa.h_ctx)); EG(ret, err); 1353 ret = h->hfunc_update(&(ctx->sign_data.eddsa.h_ctx), &hash[hsize / 2], hsize / 2); EG(ret, err); [all …]
|
| H A D | meson.build | 10 'eddsa.c',
|
| /freebsd/lib/libfido2/ |
| H A D | Makefile | 21 SRCS+= eddsa.c
|
| /freebsd/secure/lib/libpkgecc/ |
| H A D | Makefile | 95 eddsa.c \
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | EVP_SIGNATURE-ED25519.pod | 134 Valid algorithm names are B<ed25519>, B<ed448> and B<eddsa>. If B<eddsa> is
|
| /freebsd/contrib/libfido2/src/fido/ |
| H A D | types.h | 138 eddsa_pk_t eddsa; member
|
| /freebsd/crypto/libecc/include/libecc/sig/ |
| H A D | sig_algs_internal.h | 144 eddsa_sign_data eddsa; member 200 eddsa_verify_data eddsa; member
|
| /freebsd/contrib/libfido2/src/ |
| H A D | CMakeLists.txt | 22 eddsa.c
|
| H A D | cred.c | 501 ok = eddsa_pk_verify_sig(&dgst, &cred->attcred.pubkey.eddsa, in fido_cred_verify_self() 1106 ptr = &cred->attcred.pubkey.eddsa; in fido_cred_pubkey_ptr() 1132 len = sizeof(cred->attcred.pubkey.eddsa); in fido_cred_pubkey_len()
|
| /freebsd/crypto/libecc/include/libecc/ |
| H A D | meson.build | 136 'sig/eddsa.h',
|
| /freebsd/crypto/openssl/crypto/ec/ |
| H A D | build.info | 80 curve448/curve448_tables.c curve448/eddsa.c curve448/curve448.c \
|
| /freebsd/crypto/openssl/apps/ |
| H A D | speed.c | 110 int eddsa; member 2248 = seconds.ecdh = seconds.eddsa in speed_main() 3756 ed_curves[testnum].bits, seconds.eddsa); in speed_main() 3783 ed_curves[testnum].bits, seconds.eddsa); in speed_main()
|
| /freebsd/sys/contrib/libsodium/ |
| H A D | ChangeLog | 192 to match the irtf-cfrg-eddsa draft (note that malleability is irrelevant to
|
| /freebsd/crypto/openssl/providers/ |
| H A D | fips.module.sources | 175 crypto/ec/curve448/eddsa.c
|
| H A D | fips-sources.checksums | 175 b65aa613ee9f74bfc7fd00be16087c431bdf092a7e6943238eee9e54ca3adf00 crypto/ec/curve448/eddsa.c
|
| /freebsd/secure/lib/libcrypto/ |
| H A D | Makefile | 239 SRCS+= ecp_oct.c ecp_smpl.c ecx_backend.c ecx_key.c ecx_meth.c eddsa.c
|