/libcore/luni/src/test/java/tests/security/interfaces/ |
DSAKeyPairGeneratorTest.java | 50 MyDSA dsa = new MyDSA(dsaParams); local 58 dsa.initialize(dsaParams, random); 64 dsa.initialize(dsaParams, null); 72 dsa.initialize(null, random); 89 MyDSA dsa = new MyDSA(null); local 98 dsa.initialize(520, false, random); 112 dsa.initialize(invalidLen[i], true, random); 125 dsa = new MyDSA(dsaParams); 127 dsa.initialize(520, true, random); 134 dsa.initialize(520, false, random) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/ |
AlgorithmParametersSpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.dsa; 79 throw new InvalidParameterSpecException("unknown parameter spec passed to DSA parameters object."); 88 throw new InvalidParameterSpecException("DSAParameterSpec required to initialise a DSA algorithm parameters object"); 106 throw new IOException("Not a valid DSA Parameter encoding."); 110 throw new IOException("Not a valid DSA Parameter encoding."); 131 return "DSA Parameters";
|
DSAUtil.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.dsa; 18 * utility class for converting jce/jca DSA objects 55 throw new InvalidKeyException("can't identify DSA public key: " + key.getClass().getName()); 70 throw new InvalidKeyException("can't identify DSA private key.");
|
KeyFactorySpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.dsa;
|
AlgorithmParameterGeneratorSpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.dsa; 40 throw new InvalidAlgorithmParameterException("No supported AlgorithmParameterSpec for DSA parameter generation."); 62 params = AlgorithmParameters.getInstance("DSA", BouncyCastleProvider.PROVIDER_NAME);
|
KeyPairGeneratorSpi.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.dsa; 30 super("DSA");
|
BCDSAPrivateKey.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.dsa; 74 return "DSA";
|
BCDSAPublicKey.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.dsa; 71 throw new IllegalArgumentException("invalid info structure in DSA public key"); 91 return "DSA"; 124 buf.append("DSA Public Key").append(nl);
|
DSASigner.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.dsa; 23 import org.bouncycastle.crypto.DSA; 43 private DSA signer; 48 DSA signer) 83 throw new InvalidKeyException("can't recognise key type in DSA based signer"); 88 throw new InvalidKeyException("can't recognise key type in DSA based signer");
|
/external/openssl/apps/ |
gendsa.c | 69 #include <openssl/dsa.h> 81 DSA *dsa=NULL; local 201 BIO_printf(bio_err," - a DSA parameter file as generated by the dsaparam command\n"); 222 if ((dsa=PEM_read_bio_DSAparams(in,NULL,NULL,NULL)) == NULL) 224 BIO_printf(bio_err,"unable to load DSA parameter file\n"); 260 BIO_printf(bio_err,"Generating DSA key, %d bits\n", 261 BN_num_bits(dsa->p)); 262 if (!DSA_generate_key(dsa)) goto end; 266 if (!PEM_write_bio_DSAPrivateKey(out,dsa,enc,NULL,0,NULL, passout) [all...] |
testdsa.h | 3 DSA *get_dsa512(void ); 4 DSA *get_dsa1024(void ); 5 DSA *get_dsa2048(void ); 39 DSA *get_dsa512() 41 DSA *dsa; local 43 if ((dsa=DSA_new()) == NULL) return(NULL); 44 dsa->priv_key=BN_bin2bn(dsa512_priv,sizeof(dsa512_priv),NULL); 45 dsa->pub_key=BN_bin2bn(dsa512_pub,sizeof(dsa512_pub),NULL); 46 dsa->p=BN_bin2bn(dsa512_p,sizeof(dsa512_p),NULL) 105 DSA *dsa; local 202 DSA *dsa; local [all...] |
dhparam.c | 127 #include <openssl/dsa.h> 139 * -dsaparam - read or generate DSA parameters, convert to DH 249 BIO_printf(bio_err," -dsaparam read or generate DSA parameters, convert to DH\n"); 281 BIO_printf(bio_err, "generator may not be chosen for DSA parameters\n"); 308 DSA *dsa = DSA_new(); local 310 BIO_printf(bio_err,"Generating DSA parameters, %d bit long prime\n",num); 311 if(!dsa || !DSA_generate_parameters_ex(dsa, num, 314 if(dsa) DSA_free(dsa) 370 DSA *dsa; local [all...] |
dsa.c | 1 /* apps/dsa.c */ 68 #include <openssl/dsa.h> 92 * -modulus - print the DSA public key 101 DSA *dsa=NULL; local 234 BIO_printf(bio_err," -modulus print the DSA public value\n"); 268 BIO_printf(bio_err,"read DSA key\n"); 282 dsa = EVP_PKEY_get1_DSA(pkey); 286 if (dsa == NULL) 313 if (!DSA_print(out,dsa,0) [all...] |
dsaparam.c | 76 #include <openssl/dsa.h> 114 DSA *dsa=NULL; local 226 BIO_printf(bio_err," -genkey generate a DSA key\n"); 294 dsa = DSA_new(); 295 if(!dsa) 297 BIO_printf(bio_err,"Error allocating DSA object\n"); 300 BIO_printf(bio_err,"Generating DSA parameters, %d bit long prime\n",num); 318 if(!DSA_generate_parameters_ex(dsa,num,NULL,0,NULL,NULL, &cb)) 323 BIO_printf(bio_err,"DSA key generation time-stopped\n") [all...] |
/external/openssl/crypto/dsa/ |
dsagen.c | 1 /* crypto/dsa/dsagen.c */ 60 #include <openssl/dsa.h> 98 DSA *dsa; local 106 dsa=DSA_generate_parameters(1024,seed,20,&counter,&h,cb,bio_err); 108 if (dsa == NULL) 109 DSA_print(bio_err,dsa,0);
|
dsa_pmeth.c | 67 /* DSA pkey context structure */ 126 DSA *dsa = ctx->pkey->pkey.dsa; local 133 ret = DSA_sign(type, tbs, tbslen, sig, &sltmp, dsa); 147 DSA *dsa = ctx->pkey->pkey.dsa; local 154 ret = DSA_verify(type, tbs, tbslen, sig, siglen, dsa); 243 DSA *dsa = NULL local 268 DSA *dsa = NULL; local [all...] |
dsatest.c | 1 /* crypto/dsa/dsatest.c */ 82 printf("No DSA support\n"); 86 #include <openssl/dsa.h> 140 DSA *dsa=NULL; local 157 BIO_printf(bio_err,"test generation of DSA parameters\n"); 160 if(((dsa = DSA_new()) == NULL) || !DSA_generate_parameters_ex(dsa, 512, 172 DSA_print(bio_err,dsa,0); 184 i=BN_bn2bin(dsa->q,buf) [all...] |
dsa_ameth.c | 62 #include <openssl/dsa.h> 79 DSA *dsa = NULL; local 92 if (!(dsa = d2i_DSAparams(NULL, &pm, pmlen))) 101 if (!(dsa = DSA_new())) 119 if (!(dsa->pub_key = ASN1_INTEGER_to_BN(public_key, NULL))) 126 EVP_PKEY_assign_DSA(pkey, dsa); 132 if (dsa) 133 DSA_free(dsa); 140 DSA *dsa local 202 DSA *dsa = NULL; local 367 DSA *dsa; local 493 DSA *dsa; local 530 DSA *dsa; local [all...] |
/external/openssh/ |
key.h | 31 #include <openssl/dsa.h> 80 DSA *dsa; member in struct:Key
|
key.c | 78 DSA *dsa; local 83 k->dsa = NULL; 102 if ((dsa = DSA_new()) == NULL) 104 if ((dsa->p = BN_new()) == NULL) 106 if ((dsa->q = BN_new()) == NULL) 108 if ((dsa->g = BN_new()) == NULL) 110 if ((dsa->pub_key = BN_new()) == NULL) 112 k->dsa = dsa; [all...] |
ssh-keygen.c | 54 /* Number of bits in the RSA/DSA key. This value can be set on the command line. */ 183 fatal("DSA keys must be 1024 bits"); 296 if (!PEM_write_DSA_PUBKEY(stdout, k->dsa)) 321 if (!PEM_write_DSAPublicKey(stdout, k->dsa)) 419 if (strstr(type, "dsa")) { 433 buffer_get_bignum_bits(&b, key->dsa->p); 434 buffer_get_bignum_bits(&b, key->dsa->g); 435 buffer_get_bignum_bits(&b, key->dsa->q); 436 buffer_get_bignum_bits(&b, key->dsa->pub_key); 437 buffer_get_bignum_bits(&b, key->dsa->priv_key) 607 DSA *dsa; local [all...] |
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
KeyAgreementTest.java | 432 DSAParameterSpec dsa = new DSAParameterSpec(new BigInteger("56"), local 436 kAgs[i].init(privKey, dsa); 442 kAgs[i].init(privKey, dsa, new SecureRandom()); 448 kAgs[i].init(privKey, dsa, random);
|
/external/openssl/crypto/pem/ |
pvkfmt.c | 67 #include <openssl/dsa.h> 114 /* Convert private key blob to EVP_PKEY: RSA and DSA keys supported */ 316 DSA *dsa = NULL; local 321 dsa = DSA_new(); 323 if (!dsa || !ret) 325 if (!read_lebn(&p, nbyte, &dsa->p)) 327 if (!read_lebn(&p, 20, &dsa->q)) 329 if (!read_lebn(&p, nbyte, &dsa->g)) 333 if (!read_lebn(&p, nbyte, &dsa->pub_key) [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
KeyAgreementTest.java | 450 DSAParameterSpec dsa = new DSAParameterSpec(new BigInteger("56"), local 454 kAgs[i].init(privKey, dsa); 460 kAgs[i].init(privKey, dsa, new SecureRandom()); 466 kAgs[i].init(privKey, dsa, random);
|
/external/openssl/crypto/evp/ |
evp.h | 141 struct dsa_st *dsa; /* DSA */ member in union:evp_pkey_st::__anon11372 457 #define EVP_PKEY_assign_DSA(pkey,dsa) EVP_PKEY_assign((pkey),EVP_PKEY_DSA,\ 458 (char *)(dsa)) [all...] |