HomeSort by relevance Sort by last modified time
    Searched defs:dsa (Results 1 - 25 of 28) sorted by null

1 2

  /libcore/luni/src/test/java/tests/security/interfaces/
DSAKeyPairGeneratorTest.java 50 MyDSA dsa = new MyDSA(dsaParams); local
58 dsa.initialize(dsaParams, random);
64 dsa.initialize(dsaParams, null);
72 dsa.initialize(null, random);
89 MyDSA dsa = new MyDSA(null); local
98 dsa.initialize(520, false, random);
112 dsa.initialize(invalidLen[i], true, random);
125 dsa = new MyDSA(dsaParams);
127 dsa.initialize(520, true, random);
134 dsa.initialize(520, false, random)
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/
AlgorithmParametersSpi.java 1 package org.bouncycastle.jcajce.provider.asymmetric.dsa;
79 throw new InvalidParameterSpecException("unknown parameter spec passed to DSA parameters object.");
88 throw new InvalidParameterSpecException("DSAParameterSpec required to initialise a DSA algorithm parameters object");
106 throw new IOException("Not a valid DSA Parameter encoding.");
110 throw new IOException("Not a valid DSA Parameter encoding.");
131 return "DSA Parameters";
DSAUtil.java 1 package org.bouncycastle.jcajce.provider.asymmetric.dsa;
18 * utility class for converting jce/jca DSA objects
55 throw new InvalidKeyException("can't identify DSA public key: " + key.getClass().getName());
70 throw new InvalidKeyException("can't identify DSA private key.");
KeyFactorySpi.java 1 package org.bouncycastle.jcajce.provider.asymmetric.dsa;
AlgorithmParameterGeneratorSpi.java 1 package org.bouncycastle.jcajce.provider.asymmetric.dsa;
40 throw new InvalidAlgorithmParameterException("No supported AlgorithmParameterSpec for DSA parameter generation.");
62 params = AlgorithmParameters.getInstance("DSA", BouncyCastleProvider.PROVIDER_NAME);
KeyPairGeneratorSpi.java 1 package org.bouncycastle.jcajce.provider.asymmetric.dsa;
30 super("DSA");
BCDSAPrivateKey.java 1 package org.bouncycastle.jcajce.provider.asymmetric.dsa;
74 return "DSA";
BCDSAPublicKey.java 1 package org.bouncycastle.jcajce.provider.asymmetric.dsa;
71 throw new IllegalArgumentException("invalid info structure in DSA public key");
91 return "DSA";
124 buf.append("DSA Public Key").append(nl);
DSASigner.java 1 package org.bouncycastle.jcajce.provider.asymmetric.dsa;
23 import org.bouncycastle.crypto.DSA;
43 private DSA signer;
48 DSA signer)
83 throw new InvalidKeyException("can't recognise key type in DSA based signer");
88 throw new InvalidKeyException("can't recognise key type in DSA based signer");
  /external/openssl/apps/
gendsa.c 69 #include <openssl/dsa.h>
81 DSA *dsa=NULL; local
201 BIO_printf(bio_err," - a DSA parameter file as generated by the dsaparam command\n");
222 if ((dsa=PEM_read_bio_DSAparams(in,NULL,NULL,NULL)) == NULL)
224 BIO_printf(bio_err,"unable to load DSA parameter file\n");
260 BIO_printf(bio_err,"Generating DSA key, %d bits\n",
261 BN_num_bits(dsa->p));
262 if (!DSA_generate_key(dsa)) goto end;
266 if (!PEM_write_bio_DSAPrivateKey(out,dsa,enc,NULL,0,NULL, passout)
    [all...]
testdsa.h 3 DSA *get_dsa512(void );
4 DSA *get_dsa1024(void );
5 DSA *get_dsa2048(void );
39 DSA *get_dsa512()
41 DSA *dsa; local
43 if ((dsa=DSA_new()) == NULL) return(NULL);
44 dsa->priv_key=BN_bin2bn(dsa512_priv,sizeof(dsa512_priv),NULL);
45 dsa->pub_key=BN_bin2bn(dsa512_pub,sizeof(dsa512_pub),NULL);
46 dsa->p=BN_bin2bn(dsa512_p,sizeof(dsa512_p),NULL)
105 DSA *dsa; local
202 DSA *dsa; local
    [all...]
dhparam.c 127 #include <openssl/dsa.h>
139 * -dsaparam - read or generate DSA parameters, convert to DH
249 BIO_printf(bio_err," -dsaparam read or generate DSA parameters, convert to DH\n");
281 BIO_printf(bio_err, "generator may not be chosen for DSA parameters\n");
308 DSA *dsa = DSA_new(); local
310 BIO_printf(bio_err,"Generating DSA parameters, %d bit long prime\n",num);
311 if(!dsa || !DSA_generate_parameters_ex(dsa, num,
314 if(dsa) DSA_free(dsa)
370 DSA *dsa; local
    [all...]
dsa.c 1 /* apps/dsa.c */
68 #include <openssl/dsa.h>
92 * -modulus - print the DSA public key
101 DSA *dsa=NULL; local
234 BIO_printf(bio_err," -modulus print the DSA public value\n");
268 BIO_printf(bio_err,"read DSA key\n");
282 dsa = EVP_PKEY_get1_DSA(pkey);
286 if (dsa == NULL)
313 if (!DSA_print(out,dsa,0)
    [all...]
dsaparam.c 76 #include <openssl/dsa.h>
114 DSA *dsa=NULL; local
226 BIO_printf(bio_err," -genkey generate a DSA key\n");
294 dsa = DSA_new();
295 if(!dsa)
297 BIO_printf(bio_err,"Error allocating DSA object\n");
300 BIO_printf(bio_err,"Generating DSA parameters, %d bit long prime\n",num);
318 if(!DSA_generate_parameters_ex(dsa,num,NULL,0,NULL,NULL, &cb))
323 BIO_printf(bio_err,"DSA key generation time-stopped\n")
    [all...]
  /external/openssl/crypto/dsa/
dsagen.c 1 /* crypto/dsa/dsagen.c */
60 #include <openssl/dsa.h>
98 DSA *dsa; local
106 dsa=DSA_generate_parameters(1024,seed,20,&counter,&h,cb,bio_err);
108 if (dsa == NULL)
109 DSA_print(bio_err,dsa,0);
dsa_pmeth.c 67 /* DSA pkey context structure */
126 DSA *dsa = ctx->pkey->pkey.dsa; local
133 ret = DSA_sign(type, tbs, tbslen, sig, &sltmp, dsa);
147 DSA *dsa = ctx->pkey->pkey.dsa; local
154 ret = DSA_verify(type, tbs, tbslen, sig, siglen, dsa);
243 DSA *dsa = NULL local
268 DSA *dsa = NULL; local
    [all...]
dsatest.c 1 /* crypto/dsa/dsatest.c */
82 printf("No DSA support\n");
86 #include <openssl/dsa.h>
140 DSA *dsa=NULL; local
157 BIO_printf(bio_err,"test generation of DSA parameters\n");
160 if(((dsa = DSA_new()) == NULL) || !DSA_generate_parameters_ex(dsa, 512,
172 DSA_print(bio_err,dsa,0);
184 i=BN_bn2bin(dsa->q,buf)
    [all...]
dsa_ameth.c 62 #include <openssl/dsa.h>
79 DSA *dsa = NULL; local
92 if (!(dsa = d2i_DSAparams(NULL, &pm, pmlen)))
101 if (!(dsa = DSA_new()))
119 if (!(dsa->pub_key = ASN1_INTEGER_to_BN(public_key, NULL)))
126 EVP_PKEY_assign_DSA(pkey, dsa);
132 if (dsa)
133 DSA_free(dsa);
140 DSA *dsa local
202 DSA *dsa = NULL; local
367 DSA *dsa; local
493 DSA *dsa; local
530 DSA *dsa; local
    [all...]
  /external/openssh/
key.h 31 #include <openssl/dsa.h>
80 DSA *dsa; member in struct:Key
key.c 78 DSA *dsa; local
83 k->dsa = NULL;
102 if ((dsa = DSA_new()) == NULL)
104 if ((dsa->p = BN_new()) == NULL)
106 if ((dsa->q = BN_new()) == NULL)
108 if ((dsa->g = BN_new()) == NULL)
110 if ((dsa->pub_key = BN_new()) == NULL)
112 k->dsa = dsa;
    [all...]
ssh-keygen.c 54 /* Number of bits in the RSA/DSA key. This value can be set on the command line. */
183 fatal("DSA keys must be 1024 bits");
296 if (!PEM_write_DSA_PUBKEY(stdout, k->dsa))
321 if (!PEM_write_DSAPublicKey(stdout, k->dsa))
419 if (strstr(type, "dsa")) {
433 buffer_get_bignum_bits(&b, key->dsa->p);
434 buffer_get_bignum_bits(&b, key->dsa->g);
435 buffer_get_bignum_bits(&b, key->dsa->q);
436 buffer_get_bignum_bits(&b, key->dsa->pub_key);
437 buffer_get_bignum_bits(&b, key->dsa->priv_key)
607 DSA *dsa; local
    [all...]
  /external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/
KeyAgreementTest.java 432 DSAParameterSpec dsa = new DSAParameterSpec(new BigInteger("56"), local
436 kAgs[i].init(privKey, dsa);
442 kAgs[i].init(privKey, dsa, new SecureRandom());
448 kAgs[i].init(privKey, dsa, random);
  /external/openssl/crypto/pem/
pvkfmt.c 67 #include <openssl/dsa.h>
114 /* Convert private key blob to EVP_PKEY: RSA and DSA keys supported */
316 DSA *dsa = NULL; local
321 dsa = DSA_new();
323 if (!dsa || !ret)
325 if (!read_lebn(&p, nbyte, &dsa->p))
327 if (!read_lebn(&p, 20, &dsa->q))
329 if (!read_lebn(&p, nbyte, &dsa->g))
333 if (!read_lebn(&p, nbyte, &dsa->pub_key)
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/
KeyAgreementTest.java 450 DSAParameterSpec dsa = new DSAParameterSpec(new BigInteger("56"), local
454 kAgs[i].init(privKey, dsa);
460 kAgs[i].init(privKey, dsa, new SecureRandom());
466 kAgs[i].init(privKey, dsa, random);
  /external/openssl/crypto/evp/
evp.h 141 struct dsa_st *dsa; /* DSA */ member in union:evp_pkey_st::__anon11372
457 #define EVP_PKEY_assign_DSA(pkey,dsa) EVP_PKEY_assign((pkey),EVP_PKEY_DSA,\
458 (char *)(dsa))
    [all...]

Completed in 480 milliseconds

1 2