HomeSort by relevance Sort by last modified time
    Searched refs:DSA (Results 1 - 25 of 60) sorted by null

1 2 3

  /external/openssl/crypto/dsa/
dsa.h 1 /* crypto/dsa/dsa.h */
71 #error DSA is disabled.
92 #define DSA_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DSA
100 /* If this flag is set the DSA method is FIPS compliant and can be used
120 /* typedef struct dsa_st DSA; */
132 DSA_SIG * (*dsa_do_sign)(const unsigned char *dgst, int dlen, DSA *dsa);
133 int (*dsa_sign_setup)(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp
    [all...]
dsa_asn1.c 61 #include <openssl/dsa.h>
102 DSA_free((DSA *)*pval);
110 ASN1_SIMPLE(DSA, version, LONG),
111 ASN1_SIMPLE(DSA, p, BIGNUM),
112 ASN1_SIMPLE(DSA, q, BIGNUM),
113 ASN1_SIMPLE(DSA, g, BIGNUM),
114 ASN1_SIMPLE(DSA, pub_key, BIGNUM),
115 ASN1_SIMPLE(DSA, priv_key, BIGNUM)
116 } ASN1_SEQUENCE_END_cb(DSA, DSAPrivateKey)
118 IMPLEMENT_ASN1_ENCODE_FUNCTIONS_const_fname(DSA, DSAPrivateKey, DSAPrivateKey
    [all...]
dsa_locl.h 55 #include <openssl/dsa.h>
57 int dsa_builtin_paramgen(DSA *ret, size_t bits, size_t qbits,
dsa_prn.c 1 /* crypto/dsa/dsa_prn.c */
62 #include <openssl/dsa.h>
65 int DSA_print_fp(FILE *fp, const DSA *x, int off)
81 int DSAparams_print_fp(FILE *fp, const DSA *x)
98 int DSA_print(BIO *bp, const DSA *x, int off)
103 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x))
110 int DSAparams_print(BIO *bp, const DSA *x)
115 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x))
dsa_vrf.c 1 /* crypto/dsa/dsa_vrf.c */
62 #include <openssl/dsa.h>
65 DSA *dsa)
68 if (FIPS_mode() && !(dsa->meth->flags & DSA_FLAG_FIPS_METHOD)
69 && !(dsa->flags & DSA_FLAG_NON_FIPS_ALLOW))
75 return dsa->meth->dsa_do_verify(dgst, dgst_len, sig, dsa);
dsa_depr.c 1 /* crypto/dsa/dsa_depr.c */
81 #include <openssl/dsa.h>
86 DSA *DSA_generate_parameters(int bits,
93 DSA *ret;
dsa_lib.c 1 /* crypto/dsa/dsa_lib.c */
64 #include <openssl/dsa.h>
77 const char DSA_version[]="DSA" OPENSSL_VERSION_PTEXT;
102 DSA *DSA_new(void)
107 int DSA_set_method(DSA *dsa, const DSA_METHOD *meth)
112 mtmp = dsa->meth;
113 if (mtmp->finish) mtmp->finish(dsa);
115 if (dsa->engine)
117 ENGINE_finish(dsa->engine)
    [all...]
dsa_key.c 1 /* crypto/dsa/dsa_key.c */
64 #include <openssl/dsa.h>
71 static int dsa_builtin_keygen(DSA *dsa);
73 int DSA_generate_key(DSA *dsa)
76 if (FIPS_mode() && !(dsa->meth->flags & DSA_FLAG_FIPS_METHOD)
77 && !(dsa->flags & DSA_FLAG_NON_FIPS_ALLOW))
83 if(dsa->meth->dsa_keygen)
84 return dsa->meth->dsa_keygen(dsa)
    [all...]
dsa_sign.c 1 /* crypto/dsa/dsa_sign.c */
62 #include <openssl/dsa.h>
66 DSA_SIG * DSA_do_sign(const unsigned char *dgst, int dlen, DSA *dsa)
69 if (FIPS_mode() && !(dsa->meth->flags & DSA_FLAG_FIPS_METHOD)
70 && !(dsa->flags & DSA_FLAG_NON_FIPS_ALLOW))
76 return dsa->meth->dsa_do_sign(dgst, dlen, dsa);
79 int DSA_sign_setup(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp
    [all...]
dsa_ossl.c 1 /* crypto/dsa/dsa_ossl.c */
65 #include <openssl/dsa.h>
69 static DSA_SIG *dsa_do_sign(const unsigned char *dgst, int dlen, DSA *dsa);
70 static int dsa_sign_setup(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp);
72 DSA *dsa);
73 static int dsa_init(DSA *dsa);
    [all...]
dsa_pmeth.c 67 /* DSA pkey context structure */
126 DSA *dsa = ctx->pkey->pkey.dsa; local
133 ret = DSA_sign(type, tbs, tbslen, sig, &sltmp, dsa);
147 DSA *dsa = ctx->pkey->pkey.dsa; local
154 ret = DSA_verify(type, tbs, tbslen, sig, siglen, dsa);
243 DSA *dsa = NULL local
268 DSA *dsa = NULL; local
    [all...]
dsagen.c 1 /* crypto/dsa/dsagen.c */
60 #include <openssl/dsa.h>
98 DSA *dsa; local
106 dsa=DSA_generate_parameters(1024,seed,20,&counter,&h,cb,bio_err);
108 if (dsa == NULL)
109 DSA_print(bio_err,dsa,0);
  /external/openssl/include/openssl/
dsa.h 1 /* crypto/dsa/dsa.h */
71 #error DSA is disabled.
92 #define DSA_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DSA
100 /* If this flag is set the DSA method is FIPS compliant and can be used
120 /* typedef struct dsa_st DSA; */
132 DSA_SIG * (*dsa_do_sign)(const unsigned char *dgst, int dlen, DSA *dsa);
133 int (*dsa_sign_setup)(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
DSA.java 8 public interface DSA
  /external/openssl/crypto/pem/
pem_all.c 123 #include <openssl/dsa.h>
133 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa);
154 /* We treat RSA or DSA private keys as a special case.
258 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa)
260 DSA *dtmp;
265 if(dsa) {
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/
DSABase.java 10 import org.bouncycastle.crypto.DSA;
18 protected DSA signer;
23 DSA signer,
  /external/openssl/crypto/x509/
x_all.c 70 #include <openssl/dsa.h>
295 DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa)
297 return ASN1_d2i_fp_of(DSA,DSA_new,d2i_DSAPrivateKey,fp,dsa);
300 int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa)
302 return ASN1_i2d_fp_of_const(DSA,i2d_DSAPrivateKey,fp,dsa);
    [all...]
  /external/openssh/openbsd-compat/
openssl-compat.c 107 DSA_generate_parameters_ex(DSA *dsa, int bits, const unsigned char *seed,
110 DSA *new_dsa, tmp_dsa;
118 /* swap dsa/new_dsa then free new_dsa */
119 tmp_dsa = *dsa;
120 *dsa = *new_dsa;
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
OpenSSLSignature.java 40 RSA, DSA, EC,
131 case DSA:
133 throw new InvalidKeyException("Signature not initialized as DSA");
142 throw new InvalidKeyException("Need DSA or RSA or EC private key");
169 if (engineType != EngineType.DSA) {
170 throw new InvalidKeyException("Signature not initialized as DSA");
183 throw new InvalidKeyException("Need DSA or RSA or EC private key");
204 if (engineType != EngineType.DSA) {
205 throw new InvalidKeyException("Signature not initialized as DSA");
218 throw new InvalidKeyException("Need DSA or RSA or EC public key")
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/
DSASigner.java 1 package org.bouncycastle.jcajce.provider.asymmetric.dsa;
23 import org.bouncycastle.crypto.DSA;
43 private DSA signer;
48 DSA signer)
83 throw new InvalidKeyException("can't recognise key type in DSA based signer");
88 throw new InvalidKeyException("can't recognise key type in DSA based signer");
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/
DSA.java 4 import org.bouncycastle.jcajce.provider.asymmetric.dsa.DSAUtil;
5 import org.bouncycastle.jcajce.provider.asymmetric.dsa.KeyFactorySpi;
10 public class DSA
12 private static final String PREFIX = "org.bouncycastle.jcajce.provider.asymmetric" + ".dsa.";
23 provider.addAlgorithm("AlgorithmParameters.DSA", PREFIX + "AlgorithmParametersSpi");
25 provider.addAlgorithm("AlgorithmParameterGenerator.DSA", PREFIX + "AlgorithmParameterGeneratorSpi");
27 provider.addAlgorithm("KeyPairGenerator.DSA", PREFIX + "KeyPairGeneratorSpi");
28 provider.addAlgorithm("KeyFactory.DSA", PREFIX + "KeyFactorySpi");
38 // addSignatureAlgorithm(provider, "SHA224", "DSA", PREFIX + "DSASigner$dsa224", NISTObjectIdentifiers.dsa_with_sha224);
39 // addSignatureAlgorithm(provider, "SHA256", "DSA", PREFIX + "DSASigner$dsa256", NISTObjectIdentifiers.dsa_with_sha256)
    [all...]
  /external/openssl/crypto/asn1/
x_pubkey.c 68 #include <openssl/dsa.h>
230 /* The following are equivalents but which return RSA and DSA
274 DSA *d2i_DSA_PUBKEY(DSA **a, const unsigned char **pp,
278 DSA *key;
295 int i2d_DSA_PUBKEY(DSA *a, unsigned char **pp)
  /libcore/benchmarks/src/benchmarks/regression/
KeyPairGeneratorBenchmark.java 34 DSA,
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/signers/
DSASigner.java 4 import org.bouncycastle.crypto.DSA;
19 implements DSA
52 * initialised with. For conventional DSA the message should be a SHA-1
87 * return true if the value r and s represent a DSA signature for
88 * the passed in message for standard DSA the message should be a
ECDSASigner.java 7 import org.bouncycastle.crypto.DSA;
17 * EC-DSA as described in X9.62
20 implements ECConstants, DSA
54 * initialised with. For conventional DSA the message should be a SHA-1
106 * return true if the value r and s represent a DSA signature for
107 * the passed in message (for standard DSA the message should be

Completed in 1423 milliseconds

1 2 3