/external/openssl/crypto/dsa/ |
dsa.h | 1 /* crypto/dsa/dsa.h */ 71 #error DSA is disabled. 92 #define DSA_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DSA 100 /* If this flag is set the DSA method is FIPS compliant and can be used 120 /* typedef struct dsa_st DSA; */ 132 DSA_SIG * (*dsa_do_sign)(const unsigned char *dgst, int dlen, DSA *dsa); 133 int (*dsa_sign_setup)(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp [all...] |
dsa_asn1.c | 61 #include <openssl/dsa.h> 102 DSA_free((DSA *)*pval); 110 ASN1_SIMPLE(DSA, version, LONG), 111 ASN1_SIMPLE(DSA, p, BIGNUM), 112 ASN1_SIMPLE(DSA, q, BIGNUM), 113 ASN1_SIMPLE(DSA, g, BIGNUM), 114 ASN1_SIMPLE(DSA, pub_key, BIGNUM), 115 ASN1_SIMPLE(DSA, priv_key, BIGNUM) 116 } ASN1_SEQUENCE_END_cb(DSA, DSAPrivateKey) 118 IMPLEMENT_ASN1_ENCODE_FUNCTIONS_const_fname(DSA, DSAPrivateKey, DSAPrivateKey [all...] |
dsa_locl.h | 55 #include <openssl/dsa.h> 57 int dsa_builtin_paramgen(DSA *ret, size_t bits, size_t qbits,
|
dsa_prn.c | 1 /* crypto/dsa/dsa_prn.c */ 62 #include <openssl/dsa.h> 65 int DSA_print_fp(FILE *fp, const DSA *x, int off) 81 int DSAparams_print_fp(FILE *fp, const DSA *x) 98 int DSA_print(BIO *bp, const DSA *x, int off) 103 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x)) 110 int DSAparams_print(BIO *bp, const DSA *x) 115 if (!pk || !EVP_PKEY_set1_DSA(pk, (DSA *)x))
|
dsa_vrf.c | 1 /* crypto/dsa/dsa_vrf.c */ 62 #include <openssl/dsa.h> 65 DSA *dsa) 68 if (FIPS_mode() && !(dsa->meth->flags & DSA_FLAG_FIPS_METHOD) 69 && !(dsa->flags & DSA_FLAG_NON_FIPS_ALLOW)) 75 return dsa->meth->dsa_do_verify(dgst, dgst_len, sig, dsa);
|
dsa_depr.c | 1 /* crypto/dsa/dsa_depr.c */ 81 #include <openssl/dsa.h> 86 DSA *DSA_generate_parameters(int bits, 93 DSA *ret;
|
dsa_lib.c | 1 /* crypto/dsa/dsa_lib.c */ 64 #include <openssl/dsa.h> 77 const char DSA_version[]="DSA" OPENSSL_VERSION_PTEXT; 102 DSA *DSA_new(void) 107 int DSA_set_method(DSA *dsa, const DSA_METHOD *meth) 112 mtmp = dsa->meth; 113 if (mtmp->finish) mtmp->finish(dsa); 115 if (dsa->engine) 117 ENGINE_finish(dsa->engine) [all...] |
dsa_key.c | 1 /* crypto/dsa/dsa_key.c */ 64 #include <openssl/dsa.h> 71 static int dsa_builtin_keygen(DSA *dsa); 73 int DSA_generate_key(DSA *dsa) 76 if (FIPS_mode() && !(dsa->meth->flags & DSA_FLAG_FIPS_METHOD) 77 && !(dsa->flags & DSA_FLAG_NON_FIPS_ALLOW)) 83 if(dsa->meth->dsa_keygen) 84 return dsa->meth->dsa_keygen(dsa) [all...] |
dsa_sign.c | 1 /* crypto/dsa/dsa_sign.c */ 62 #include <openssl/dsa.h> 66 DSA_SIG * DSA_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) 69 if (FIPS_mode() && !(dsa->meth->flags & DSA_FLAG_FIPS_METHOD) 70 && !(dsa->flags & DSA_FLAG_NON_FIPS_ALLOW)) 76 return dsa->meth->dsa_do_sign(dgst, dlen, dsa); 79 int DSA_sign_setup(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp [all...] |
dsa_ossl.c | 1 /* crypto/dsa/dsa_ossl.c */ 65 #include <openssl/dsa.h> 69 static DSA_SIG *dsa_do_sign(const unsigned char *dgst, int dlen, DSA *dsa); 70 static int dsa_sign_setup(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp); 72 DSA *dsa); 73 static int dsa_init(DSA *dsa); [all...] |
dsa_pmeth.c | 67 /* DSA pkey context structure */ 126 DSA *dsa = ctx->pkey->pkey.dsa; local 133 ret = DSA_sign(type, tbs, tbslen, sig, &sltmp, dsa); 147 DSA *dsa = ctx->pkey->pkey.dsa; local 154 ret = DSA_verify(type, tbs, tbslen, sig, siglen, dsa); 243 DSA *dsa = NULL local 268 DSA *dsa = NULL; local [all...] |
dsagen.c | 1 /* crypto/dsa/dsagen.c */ 60 #include <openssl/dsa.h> 98 DSA *dsa; local 106 dsa=DSA_generate_parameters(1024,seed,20,&counter,&h,cb,bio_err); 108 if (dsa == NULL) 109 DSA_print(bio_err,dsa,0);
|
/external/openssl/include/openssl/ |
dsa.h | 1 /* crypto/dsa/dsa.h */ 71 #error DSA is disabled. 92 #define DSA_FLAG_NO_EXP_CONSTTIME 0x02 /* new with 0.9.7h; the built-in DSA 100 /* If this flag is set the DSA method is FIPS compliant and can be used 120 /* typedef struct dsa_st DSA; */ 132 DSA_SIG * (*dsa_do_sign)(const unsigned char *dgst, int dlen, DSA *dsa); 133 int (*dsa_sign_setup)(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
DSA.java | 8 public interface DSA
|
/external/openssl/crypto/pem/ |
pem_all.c | 123 #include <openssl/dsa.h> 133 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa); 154 /* We treat RSA or DSA private keys as a special case. 258 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa) 260 DSA *dtmp; 265 if(dsa) { [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
DSABase.java | 10 import org.bouncycastle.crypto.DSA; 18 protected DSA signer; 23 DSA signer,
|
/external/openssl/crypto/x509/ |
x_all.c | 70 #include <openssl/dsa.h> 295 DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa) 297 return ASN1_d2i_fp_of(DSA,DSA_new,d2i_DSAPrivateKey,fp,dsa); 300 int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa) 302 return ASN1_i2d_fp_of_const(DSA,i2d_DSAPrivateKey,fp,dsa); [all...] |
/external/openssh/openbsd-compat/ |
openssl-compat.c | 107 DSA_generate_parameters_ex(DSA *dsa, int bits, const unsigned char *seed, 110 DSA *new_dsa, tmp_dsa; 118 /* swap dsa/new_dsa then free new_dsa */ 119 tmp_dsa = *dsa; 120 *dsa = *new_dsa;
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
OpenSSLSignature.java | 40 RSA, DSA, EC, 131 case DSA: 133 throw new InvalidKeyException("Signature not initialized as DSA"); 142 throw new InvalidKeyException("Need DSA or RSA or EC private key"); 169 if (engineType != EngineType.DSA) { 170 throw new InvalidKeyException("Signature not initialized as DSA"); 183 throw new InvalidKeyException("Need DSA or RSA or EC private key"); 204 if (engineType != EngineType.DSA) { 205 throw new InvalidKeyException("Signature not initialized as DSA"); 218 throw new InvalidKeyException("Need DSA or RSA or EC public key") [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/ |
DSASigner.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.dsa; 23 import org.bouncycastle.crypto.DSA; 43 private DSA signer; 48 DSA signer) 83 throw new InvalidKeyException("can't recognise key type in DSA based signer"); 88 throw new InvalidKeyException("can't recognise key type in DSA based signer");
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ |
DSA.java | 4 import org.bouncycastle.jcajce.provider.asymmetric.dsa.DSAUtil; 5 import org.bouncycastle.jcajce.provider.asymmetric.dsa.KeyFactorySpi; 10 public class DSA 12 private static final String PREFIX = "org.bouncycastle.jcajce.provider.asymmetric" + ".dsa."; 23 provider.addAlgorithm("AlgorithmParameters.DSA", PREFIX + "AlgorithmParametersSpi"); 25 provider.addAlgorithm("AlgorithmParameterGenerator.DSA", PREFIX + "AlgorithmParameterGeneratorSpi"); 27 provider.addAlgorithm("KeyPairGenerator.DSA", PREFIX + "KeyPairGeneratorSpi"); 28 provider.addAlgorithm("KeyFactory.DSA", PREFIX + "KeyFactorySpi"); 38 // addSignatureAlgorithm(provider, "SHA224", "DSA", PREFIX + "DSASigner$dsa224", NISTObjectIdentifiers.dsa_with_sha224); 39 // addSignatureAlgorithm(provider, "SHA256", "DSA", PREFIX + "DSASigner$dsa256", NISTObjectIdentifiers.dsa_with_sha256) [all...] |
/external/openssl/crypto/asn1/ |
x_pubkey.c | 68 #include <openssl/dsa.h> 230 /* The following are equivalents but which return RSA and DSA 274 DSA *d2i_DSA_PUBKEY(DSA **a, const unsigned char **pp, 278 DSA *key; 295 int i2d_DSA_PUBKEY(DSA *a, unsigned char **pp)
|
/libcore/benchmarks/src/benchmarks/regression/ |
KeyPairGeneratorBenchmark.java | 34 DSA,
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/signers/ |
DSASigner.java | 4 import org.bouncycastle.crypto.DSA; 19 implements DSA 52 * initialised with. For conventional DSA the message should be a SHA-1 87 * return true if the value r and s represent a DSA signature for 88 * the passed in message for standard DSA the message should be a
|
ECDSASigner.java | 7 import org.bouncycastle.crypto.DSA; 17 * EC-DSA as described in X9.62 20 implements ECConstants, DSA 54 * initialised with. For conventional DSA the message should be a SHA-1 106 * return true if the value r and s represent a DSA signature for 107 * the passed in message (for standard DSA the message should be
|