/external/openssl/crypto/dsa/ |
dsa.h | 1 /* crypto/dsa/dsa.h */ 71 #error DSA is disabled. 92 #define DSA_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DSA 100 /* If this flag is set the DSA method is FIPS compliant and can be used 120 /* typedef struct dsa_st DSA; */ 132 DSA_SIG * (*dsa_do_sign)(const unsigned char *dgst, int dlen, DSA *dsa); 133 int (*dsa_sign_setup)(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp [all...] |
dsa_asn1.c | 61 #include <openssl/dsa.h> 102 DSA_free((DSA *)*pval); 110 ASN1_SIMPLE(DSA, version, LONG), 111 ASN1_SIMPLE(DSA, p, BIGNUM), 112 ASN1_SIMPLE(DSA, q, BIGNUM), 113 ASN1_SIMPLE(DSA, g, BIGNUM), 114 ASN1_SIMPLE(DSA, pub_key, BIGNUM), 115 ASN1_SIMPLE(DSA, priv_key, BIGNUM) 116 } ASN1_SEQUENCE_END_cb(DSA, DSAPrivateKey) 118 IMPLEMENT_ASN1_ENCODE_FUNCTIONS_const_fname(DSA, DSAPrivateKey, DSAPrivateKey [all...] |
dsa_locl.h | 55 #include <openssl/dsa.h> 57 int dsa_builtin_paramgen(DSA *ret, size_t bits, size_t qbits,
|
dsa_prn.c | 1 /* crypto/dsa/dsa_prn.c */ 62 #include <openssl/dsa.h> 65 int DSA_print_fp(FILE *fp, const DSA *x, int off) 81 int DSAparams_print_fp(FILE *fp, const DSA *x) 98 int DSA_print(BIO *bp, const DSA *x, int off) 103 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x)) 110 int DSAparams_print(BIO *bp, const DSA *x) 115 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x))
|
dsa_vrf.c | 1 /* crypto/dsa/dsa_vrf.c */ 62 #include <openssl/dsa.h> 65 DSA *dsa) 68 if (FIPS_mode() && !(dsa->meth->flags & DSA_FLAG_FIPS_METHOD) 69 && !(dsa->flags & DSA_FLAG_NON_FIPS_ALLOW)) 75 return dsa->meth->dsa_do_verify(dgst, dgst_len, sig, dsa);
|
dsa_depr.c | 1 /* crypto/dsa/dsa_depr.c */ 81 #include <openssl/dsa.h> 86 DSA *DSA_generate_parameters(int bits, 93 DSA *ret;
|
dsa_lib.c | 1 /* crypto/dsa/dsa_lib.c */ 64 #include <openssl/dsa.h> 77 const char DSA_version[]="DSA" OPENSSL_VERSION_PTEXT; 102 DSA *DSA_new(void) 107 int DSA_set_method(DSA *dsa, const DSA_METHOD *meth) 112 mtmp = dsa->meth; 113 if (mtmp->finish) mtmp->finish(dsa); 115 if (dsa->engine) 117 ENGINE_finish(dsa->engine) [all...] |
dsa_key.c | 1 /* crypto/dsa/dsa_key.c */ 64 #include <openssl/dsa.h> 71 static int dsa_builtin_keygen(DSA *dsa); 73 int DSA_generate_key(DSA *dsa) 76 if (FIPS_mode() && !(dsa->meth->flags & DSA_FLAG_FIPS_METHOD) 77 && !(dsa->flags & DSA_FLAG_NON_FIPS_ALLOW)) 83 if(dsa->meth->dsa_keygen) 84 return dsa->meth->dsa_keygen(dsa) [all...] |
dsa_sign.c | 1 /* crypto/dsa/dsa_sign.c */ 62 #include <openssl/dsa.h> 66 DSA_SIG * DSA_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) 69 if (FIPS_mode() && !(dsa->meth->flags & DSA_FLAG_FIPS_METHOD) 70 && !(dsa->flags & DSA_FLAG_NON_FIPS_ALLOW)) 76 return dsa->meth->dsa_do_sign(dgst, dlen, dsa); 79 int DSA_sign_setup(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp [all...] |
dsa_ossl.c | 1 /* crypto/dsa/dsa_ossl.c */ 65 #include <openssl/dsa.h> 69 static DSA_SIG *dsa_do_sign(const unsigned char *dgst, int dlen, DSA *dsa); 70 static int dsa_sign_setup(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp); 72 DSA *dsa); 73 static int dsa_init(DSA *dsa); [all...] |
dsa_pmeth.c | 67 /* DSA pkey context structure */ 126 DSA *dsa = ctx->pkey->pkey.dsa; local 133 ret = DSA_sign(type, tbs, tbslen, sig, &sltmp, dsa); 147 DSA *dsa = ctx->pkey->pkey.dsa; local 154 ret = DSA_verify(type, tbs, tbslen, sig, siglen, dsa); 243 DSA *dsa = NULL local 268 DSA *dsa = NULL; local [all...] |
dsagen.c | 1 /* crypto/dsa/dsagen.c */ 60 #include <openssl/dsa.h> 98 DSA *dsa; local 106 dsa=DSA_generate_parameters(1024,seed,20,&counter,&h,cb,bio_err); 108 if (dsa == NULL) 109 DSA_print(bio_err,dsa,0);
|
/external/openssl/include/openssl/ |
dsa.h | 1 /* crypto/dsa/dsa.h */ 71 #error DSA is disabled. 92 #define DSA_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DSA 100 /* If this flag is set the DSA method is FIPS compliant and can be used 120 /* typedef struct dsa_st DSA; */ 132 DSA_SIG * (*dsa_do_sign)(const unsigned char *dgst, int dlen, DSA *dsa); 133 int (*dsa_sign_setup)(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/ |
DSA.java | 8 public interface DSA
|
/external/openssl/crypto/pem/ |
pem_all.c | 123 #include <openssl/dsa.h> 133 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa); 154 /* We treat RSA or DSA private keys as a special case. 204 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa) 206 DSA *dtmp; 211 if(dsa) { [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
DSABase.java | 12 import org.bouncycastle.crypto.DSA; 20 protected DSA signer; 25 DSA signer,
|
JDKDSASigner.java | 22 import org.bouncycastle.crypto.DSA; 43 private DSA signer; 48 DSA signer) 87 throw new InvalidKeyException("can't recognise key type in DSA based signer"); 92 throw new InvalidKeyException("can't recognise key type in DSA based signer");
|
/external/openssl/crypto/x509/ |
x_all.c | 70 #include <openssl/dsa.h> 295 DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa) 297 return ASN1_d2i_fp_of(DSA,DSA_new,d2i_DSAPrivateKey,fp,dsa); 300 int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa) 302 return ASN1_i2d_fp_of_const(DSA,i2d_DSAPrivateKey,fp,dsa); [all...] |
x509.h | 99 #include <openssl/dsa.h> 699 DSA *d2i_DSA_PUBKEY_fp(FILE *fp, DSA **dsa); 700 int i2d_DSA_PUBKEY_fp(FILE *fp, DSA *dsa); 701 DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa); 702 int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa) [all...] |
/external/openssh/openbsd-compat/ |
openssl-compat.c | 107 DSA_generate_parameters_ex(DSA *dsa, int bits, const unsigned char *seed, 110 DSA *new_dsa, tmp_dsa; 118 /* swap dsa/new_dsa then free new_dsa */ 119 tmp_dsa = *dsa; 120 *dsa = *new_dsa;
|
openssl-compat.h | 23 #include <openssl/dsa.h> 120 int DSA_generate_parameters_ex(DSA *, int, const unsigned char *, int, int *,
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
OpenSSLSignature.java | 38 RSA, DSA, 125 if (engineType != EngineType.DSA) { 126 throw new InvalidKeyException("Signature not initialized as DSA"); 132 if (engineType != EngineType.DSA) { 133 throw new InvalidKeyException("Signature not initialized as DSA"); 160 throw new InvalidKeyException("Need DSA or RSA private key"); 170 if (engineType != EngineType.DSA) { 171 throw new InvalidKeyException("Signature not initialized as DSA"); 177 if (engineType != EngineType.DSA) { 178 throw new InvalidKeyException("Signature not initialized as DSA"); [all...] |
/external/openssl/crypto/asn1/ |
x_pubkey.c | 68 #include <openssl/dsa.h> 227 /* The following are equivalents but which return RSA and DSA 271 DSA *d2i_DSA_PUBKEY(DSA **a, const unsigned char **pp, 275 DSA *key; 292 int i2d_DSA_PUBKEY(DSA *a, unsigned char **pp)
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/signers/ |
DSASigner.java | 4 import org.bouncycastle.crypto.DSA; 19 implements DSA 52 * initialised with. For conventional DSA the message should be a SHA-1 87 * return true if the value r and s represent a DSA signature for 88 * the passed in message for standard DSA the message should be a
|
ECDSASigner.java | 7 import org.bouncycastle.crypto.DSA; 17 * EC-DSA as described in X9.62 20 implements ECConstants, DSA 54 * initialised with. For conventional DSA the message should be a SHA-1 106 * return true if the value r and s represent a DSA signature for 107 * the passed in message (for standard DSA the message should be
|