/external/openssl/crypto/pem/ |
pvkfmt.c | 67 #include <openssl/dsa.h> 114 /* Convert private key blob to EVP_PKEY: RSA and DSA keys supported */ 316 DSA *dsa = NULL; local 321 dsa = DSA_new(); 323 if (!dsa || !ret) 325 if (!read_lebn(&p, nbyte, &dsa->p)) 327 if (!read_lebn(&p, 20, &dsa->q)) 329 if (!read_lebn(&p, nbyte, &dsa->g)) 333 if (!read_lebn(&p, nbyte, &dsa->pub_key) [all...] |
pem_all.c | 123 #include <openssl/dsa.h> 133 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa); 154 /* We treat RSA or DSA private keys as a special case. 258 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa) 260 DSA *dtmp; 265 if(dsa) { [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/state_trackers/vega/ |
renderer.c | 83 struct pipe_depth_stencil_alpha_state dsa; member in struct:renderer::__anon15771 125 struct pipe_depth_stencil_alpha_state dsa; member in struct:renderer::__anon15772::__anon15777 734 struct pipe_depth_stencil_alpha_state dsa; local 744 memset(&dsa, 0, sizeof(dsa)); 745 dsa.depth.enabled = 1; 746 dsa.depth.writemask = 1; 747 dsa.depth.func = PIPE_FUNC_ALWAYS; 748 cso_set_depth_stencil_alpha(renderer->cso, &dsa); 974 struct pipe_depth_stencil_alpha_state *dsa; local 1050 struct pipe_depth_stencil_alpha_state dsa; local 1100 struct pipe_depth_stencil_alpha_state dsa; local 1215 struct pipe_depth_stencil_alpha_state *dsa = &renderer->g3d.dsa; local [all...] |
/external/mesa3d/src/gallium/state_trackers/vega/ |
renderer.c | 83 struct pipe_depth_stencil_alpha_state dsa; member in struct:renderer::__anon26238 125 struct pipe_depth_stencil_alpha_state dsa; member in struct:renderer::__anon26239::__anon26244 734 struct pipe_depth_stencil_alpha_state dsa; local 744 memset(&dsa, 0, sizeof(dsa)); 745 dsa.depth.enabled = 1; 746 dsa.depth.writemask = 1; 747 dsa.depth.func = PIPE_FUNC_ALWAYS; 748 cso_set_depth_stencil_alpha(renderer->cso, &dsa); 974 struct pipe_depth_stencil_alpha_state *dsa; local 1050 struct pipe_depth_stencil_alpha_state dsa; local 1100 struct pipe_depth_stencil_alpha_state dsa; local 1215 struct pipe_depth_stencil_alpha_state *dsa = &renderer->g3d.dsa; local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ |
DSA.java | 4 import org.bouncycastle.jcajce.provider.asymmetric.dsa.DSAUtil; 5 import org.bouncycastle.jcajce.provider.asymmetric.dsa.KeyFactorySpi; 10 public class DSA 12 private static final String PREFIX = "org.bouncycastle.jcajce.provider.asymmetric" + ".dsa."; 23 provider.addAlgorithm("AlgorithmParameters.DSA", PREFIX + "AlgorithmParametersSpi"); 25 provider.addAlgorithm("AlgorithmParameterGenerator.DSA", PREFIX + "AlgorithmParameterGeneratorSpi"); 27 provider.addAlgorithm("KeyPairGenerator.DSA", PREFIX + "KeyPairGeneratorSpi"); 28 provider.addAlgorithm("KeyFactory.DSA", PREFIX + "KeyFactorySpi"); 38 // addSignatureAlgorithm(provider, "SHA224", "DSA", PREFIX + "DSASigner$dsa224", NISTObjectIdentifiers.dsa_with_sha224); 39 // addSignatureAlgorithm(provider, "SHA256", "DSA", PREFIX + "DSASigner$dsa256", NISTObjectIdentifiers.dsa_with_sha256) [all...] |
/external/chromium_org/third_party/openssl/openssl/apps/ |
gendsa.c | 69 #include <openssl/dsa.h> 81 DSA *dsa=NULL; local 201 BIO_printf(bio_err," - a DSA parameter file as generated by the dsaparam command\n"); 222 if ((dsa=PEM_read_bio_DSAparams(in,NULL,NULL,NULL)) == NULL) 224 BIO_printf(bio_err,"unable to load DSA parameter file\n"); 260 BIO_printf(bio_err,"Generating DSA key, %d bits\n", 261 BN_num_bits(dsa->p)); 262 if (!DSA_generate_key(dsa)) goto end; 266 if (!PEM_write_bio_DSAPrivateKey(out,dsa,enc,NULL,0,NULL, passout) [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
d2i_pu.c | 69 #include <openssl/dsa.h> 110 if (!d2i_DSAPublicKey(&(ret->pkey.dsa),
|
/external/openssh/contrib/caldera/ |
ssh-host-keygen | 32 echo "You already have an SSH2 DSA host key in $keydir/ssh_host_dsa_key." 34 echo "Generating SSH2 DSA host key." 35 $keygen -t dsa -f $keydir/ssh_host_dsa_key -C '' -N ''
|
/external/openssh/regress/ |
keygen-change.sh | 9 for t in rsa dsa rsa1; do
|
ssh-com-client.sh | 39 # we need a DSA host key 40 t=dsa 50 ${SSHKEYGEN} -e -f ${OBJ}/dsa.pub > ${HK}.ssh-dss.pub 131 for i in ssh2_config random_seed dsa.pub dsa host.dsa \
|
/external/openssl/apps/ |
gendsa.c | 69 #include <openssl/dsa.h> 81 DSA *dsa=NULL; local 201 BIO_printf(bio_err," - a DSA parameter file as generated by the dsaparam command\n"); 222 if ((dsa=PEM_read_bio_DSAparams(in,NULL,NULL,NULL)) == NULL) 224 BIO_printf(bio_err,"unable to load DSA parameter file\n"); 260 BIO_printf(bio_err,"Generating DSA key, %d bits\n", 261 BN_num_bits(dsa->p)); 262 if (!DSA_generate_key(dsa)) goto end; 266 if (!PEM_write_bio_DSAPrivateKey(out,dsa,enc,NULL,0,NULL, passout) [all...] |
/external/openssl/crypto/asn1/ |
d2i_pu.c | 69 #include <openssl/dsa.h> 110 if (!d2i_DSAPublicKey(&(ret->pkey.dsa),
|
/external/chromium_org/net/android/ |
keystore_openssl.cc | 16 #include <openssl/dsa.h> 41 // Internally, it can hold a pointer to a RSA, DSA or ECDSA structure, 106 typedef crypto::ScopedOpenSSL<DSA, DSA_free> ScopedDSA; 349 // See <openssl/dsa.h> for exact declaration of DSA_METHOD. 358 DSA* dsa) { 360 jobject private_key = reinterpret_cast<jobject>(DSA_get_ex_data(dsa, 0)); 375 // Note: With DSA, the actual signature might be smaller than DSA_size(). 376 size_t max_expected_size = static_cast<size_t>(DSA_size(dsa)); 378 LOG(ERROR) << "DSA Signature size mismatch, actual: [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/pem/ |
pem_all.c | 123 #include <openssl/dsa.h> 133 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa); 154 /* We treat RSA or DSA private keys as a special case. 258 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa) 260 DSA *dtmp; 265 if(dsa) { [all...] |
/system/security/softkeymaster/ |
keymaster_openssl.cpp | 61 void operator()(DSA* p) const { 65 typedef UniquePtr<DSA, DSA_Delete> Unique_DSA; 229 ALOGI("Requested DSA key size is too small (<512)"); 233 Unique_DSA dsa(DSA_new()); 241 if (DSA_generate_parameters_ex(dsa.get(), dsa_params->key_size, NULL, 0, NULL, NULL, 247 dsa->g = BN_bin2bn(dsa_params->generator, 250 if (dsa->g == NULL) { 255 dsa->p = BN_bin2bn(dsa_params->prime_p, 258 if (dsa->p == NULL) { 263 dsa->q = BN_bin2bn(dsa_params->prime_q [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/drivers/r300/ |
r300_state.c | 570 /* Create a new depth, stencil, and alpha state based on the CSO dsa state. 580 struct r300_dsa_state* dsa = CALLOC_STRUCT(r300_dsa_state); local 583 dsa->dsa = *state; 587 dsa->z_buffer_control |= R300_Z_WRITE_ENABLE; 591 dsa->z_buffer_control |= R300_Z_ENABLE; 593 dsa->z_stencil_control |= 598 dsa->z_buffer_control |= R300_Z_ENABLE; 599 dsa->z_stencil_control |= R300_ZS_ALWAYS; 604 dsa->z_buffer_control |= R300_STENCIL_ENABLE 710 struct r300_dsa_state *dsa = local [all...] |
/external/mesa3d/src/gallium/drivers/r300/ |
r300_state.c | 570 /* Create a new depth, stencil, and alpha state based on the CSO dsa state. 580 struct r300_dsa_state* dsa = CALLOC_STRUCT(r300_dsa_state); local 583 dsa->dsa = *state; 587 dsa->z_buffer_control |= R300_Z_WRITE_ENABLE; 591 dsa->z_buffer_control |= R300_Z_ENABLE; 593 dsa->z_stencil_control |= 598 dsa->z_buffer_control |= R300_Z_ENABLE; 599 dsa->z_stencil_control |= R300_ZS_ALWAYS; 604 dsa->z_buffer_control |= R300_STENCIL_ENABLE 710 struct r300_dsa_state *dsa = local [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/x509/ |
x_all.c | 70 #include <openssl/dsa.h> 295 DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa) 297 return ASN1_d2i_fp_of(DSA,DSA_new,d2i_DSAPrivateKey,fp,dsa); 300 int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa) 302 return ASN1_i2d_fp_of_const(DSA,i2d_DSAPrivateKey,fp,dsa); [all...] |
/external/openssl/crypto/x509/ |
x_all.c | 70 #include <openssl/dsa.h> 295 DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa) 297 return ASN1_d2i_fp_of(DSA,DSA_new,d2i_DSAPrivateKey,fp,dsa); 300 int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa) 302 return ASN1_i2d_fp_of_const(DSA,i2d_DSAPrivateKey,fp,dsa); [all...] |
/libcore/support/src/test/java/tests/resources/x509/ |
create.sh | 67 openssl req -config ${DIR}/default.cnf -newkey dsa:/tmp/dsaparam.pem -keyout /tmp/dsapriv.pem -nodes -batch | openssl x509 -extfile ${DIR}/default.cnf -extensions keyUsage_cert -req -signkey /tmp/dsapriv.pem -outform d > ${DIR}/cert-dsa.der 95 openssl x509 -inform d -in ${DIR}/cert-dsa.der -out /tmp/cert-dsa.pem 96 openssl ca -revoke /tmp/cert-dsa.pem -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -crl_reason cessationOfOperation -extensions unsupported_cert -config ${DIR}/default.cnf 97 openssl ca -gencrl -crldays 30 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-rsa-dsa.pem -config ${DIR}/default.cnf 98 openssl ca -gencrl -crldays 30 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out ${DIR}/crl-rsa-dsa-sigopt.pem -config ${DIR}/default.cnf -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:1 99 openssl crl -in /tmp/crl-rsa-dsa.pem -outform d -out ${DIR}/crl-rsa-dsa.der 100 openssl crl -in ${DIR}/crl-rsa-dsa-sigopt.pem -outform d -out ${DIR}/crl-rsa-dsa-sigopt.de [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/dsa/ |
dsa_depr.c | 1 /* crypto/dsa/dsa_depr.c */ 81 #include <openssl/dsa.h> 86 DSA *DSA_generate_parameters(int bits, 93 DSA *ret;
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
m_dss.c | 65 #include <openssl/dsa.h>
|
m_dss1.c | 68 #include <openssl/dsa.h>
|
/external/openssh/ |
ssh-dss.c | 56 if (key == NULL || key->dsa == NULL || (key->type != KEY_DSA && 58 error("ssh_dss_sign: no DSA key"); 65 sig = DSA_do_sign(digest, dlen, key->dsa); 120 if (key == NULL || key->dsa == NULL || (key->type != KEY_DSA && 122 error("ssh_dss_verify: no DSA key"); 179 ret = DSA_do_verify(digest, dlen, sig, key->dsa);
|
/external/openssl/crypto/dsa/ |
dsa_depr.c | 1 /* crypto/dsa/dsa_depr.c */ 81 #include <openssl/dsa.h> 86 DSA *DSA_generate_parameters(int bits, 93 DSA *ret;
|