HomeSort by relevance Sort by last modified time
    Searched refs:dsa (Results 51 - 75 of 220) sorted by null

1 23 4 5 6 7 8 9

  /external/openssl/crypto/pem/
pvkfmt.c 67 #include <openssl/dsa.h>
114 /* Convert private key blob to EVP_PKEY: RSA and DSA keys supported */
316 DSA *dsa = NULL; local
321 dsa = DSA_new();
323 if (!dsa || !ret)
325 if (!read_lebn(&p, nbyte, &dsa->p))
327 if (!read_lebn(&p, 20, &dsa->q))
329 if (!read_lebn(&p, nbyte, &dsa->g))
333 if (!read_lebn(&p, nbyte, &dsa->pub_key)
    [all...]
pem_all.c 123 #include <openssl/dsa.h>
133 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa);
154 /* We treat RSA or DSA private keys as a special case.
258 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa)
260 DSA *dtmp;
265 if(dsa) {
    [all...]
  /external/chromium_org/third_party/mesa/src/src/gallium/state_trackers/vega/
renderer.c 83 struct pipe_depth_stencil_alpha_state dsa; member in struct:renderer::__anon15771
125 struct pipe_depth_stencil_alpha_state dsa; member in struct:renderer::__anon15772::__anon15777
734 struct pipe_depth_stencil_alpha_state dsa; local
744 memset(&dsa, 0, sizeof(dsa));
745 dsa.depth.enabled = 1;
746 dsa.depth.writemask = 1;
747 dsa.depth.func = PIPE_FUNC_ALWAYS;
748 cso_set_depth_stencil_alpha(renderer->cso, &dsa);
974 struct pipe_depth_stencil_alpha_state *dsa; local
1050 struct pipe_depth_stencil_alpha_state dsa; local
1100 struct pipe_depth_stencil_alpha_state dsa; local
1215 struct pipe_depth_stencil_alpha_state *dsa = &renderer->g3d.dsa; local
    [all...]
  /external/mesa3d/src/gallium/state_trackers/vega/
renderer.c 83 struct pipe_depth_stencil_alpha_state dsa; member in struct:renderer::__anon26238
125 struct pipe_depth_stencil_alpha_state dsa; member in struct:renderer::__anon26239::__anon26244
734 struct pipe_depth_stencil_alpha_state dsa; local
744 memset(&dsa, 0, sizeof(dsa));
745 dsa.depth.enabled = 1;
746 dsa.depth.writemask = 1;
747 dsa.depth.func = PIPE_FUNC_ALWAYS;
748 cso_set_depth_stencil_alpha(renderer->cso, &dsa);
974 struct pipe_depth_stencil_alpha_state *dsa; local
1050 struct pipe_depth_stencil_alpha_state dsa; local
1100 struct pipe_depth_stencil_alpha_state dsa; local
1215 struct pipe_depth_stencil_alpha_state *dsa = &renderer->g3d.dsa; local
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/
DSA.java 4 import org.bouncycastle.jcajce.provider.asymmetric.dsa.DSAUtil;
5 import org.bouncycastle.jcajce.provider.asymmetric.dsa.KeyFactorySpi;
10 public class DSA
12 private static final String PREFIX = "org.bouncycastle.jcajce.provider.asymmetric" + ".dsa.";
23 provider.addAlgorithm("AlgorithmParameters.DSA", PREFIX + "AlgorithmParametersSpi");
25 provider.addAlgorithm("AlgorithmParameterGenerator.DSA", PREFIX + "AlgorithmParameterGeneratorSpi");
27 provider.addAlgorithm("KeyPairGenerator.DSA", PREFIX + "KeyPairGeneratorSpi");
28 provider.addAlgorithm("KeyFactory.DSA", PREFIX + "KeyFactorySpi");
38 // addSignatureAlgorithm(provider, "SHA224", "DSA", PREFIX + "DSASigner$dsa224", NISTObjectIdentifiers.dsa_with_sha224);
39 // addSignatureAlgorithm(provider, "SHA256", "DSA", PREFIX + "DSASigner$dsa256", NISTObjectIdentifiers.dsa_with_sha256)
    [all...]
  /external/chromium_org/third_party/openssl/openssl/apps/
gendsa.c 69 #include <openssl/dsa.h>
81 DSA *dsa=NULL; local
201 BIO_printf(bio_err," - a DSA parameter file as generated by the dsaparam command\n");
222 if ((dsa=PEM_read_bio_DSAparams(in,NULL,NULL,NULL)) == NULL)
224 BIO_printf(bio_err,"unable to load DSA parameter file\n");
260 BIO_printf(bio_err,"Generating DSA key, %d bits\n",
261 BN_num_bits(dsa->p));
262 if (!DSA_generate_key(dsa)) goto end;
266 if (!PEM_write_bio_DSAPrivateKey(out,dsa,enc,NULL,0,NULL, passout)
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/asn1/
d2i_pu.c 69 #include <openssl/dsa.h>
110 if (!d2i_DSAPublicKey(&(ret->pkey.dsa),
  /external/openssh/contrib/caldera/
ssh-host-keygen 32 echo "You already have an SSH2 DSA host key in $keydir/ssh_host_dsa_key."
34 echo "Generating SSH2 DSA host key."
35 $keygen -t dsa -f $keydir/ssh_host_dsa_key -C '' -N ''
  /external/openssh/regress/
keygen-change.sh 9 for t in rsa dsa rsa1; do
ssh-com-client.sh 39 # we need a DSA host key
40 t=dsa
50 ${SSHKEYGEN} -e -f ${OBJ}/dsa.pub > ${HK}.ssh-dss.pub
131 for i in ssh2_config random_seed dsa.pub dsa host.dsa \
  /external/openssl/apps/
gendsa.c 69 #include <openssl/dsa.h>
81 DSA *dsa=NULL; local
201 BIO_printf(bio_err," - a DSA parameter file as generated by the dsaparam command\n");
222 if ((dsa=PEM_read_bio_DSAparams(in,NULL,NULL,NULL)) == NULL)
224 BIO_printf(bio_err,"unable to load DSA parameter file\n");
260 BIO_printf(bio_err,"Generating DSA key, %d bits\n",
261 BN_num_bits(dsa->p));
262 if (!DSA_generate_key(dsa)) goto end;
266 if (!PEM_write_bio_DSAPrivateKey(out,dsa,enc,NULL,0,NULL, passout)
    [all...]
  /external/openssl/crypto/asn1/
d2i_pu.c 69 #include <openssl/dsa.h>
110 if (!d2i_DSAPublicKey(&(ret->pkey.dsa),
  /external/chromium_org/net/android/
keystore_openssl.cc 16 #include <openssl/dsa.h>
41 // Internally, it can hold a pointer to a RSA, DSA or ECDSA structure,
106 typedef crypto::ScopedOpenSSL<DSA, DSA_free> ScopedDSA;
349 // See <openssl/dsa.h> for exact declaration of DSA_METHOD.
358 DSA* dsa) {
360 jobject private_key = reinterpret_cast<jobject>(DSA_get_ex_data(dsa, 0));
375 // Note: With DSA, the actual signature might be smaller than DSA_size().
376 size_t max_expected_size = static_cast<size_t>(DSA_size(dsa));
378 LOG(ERROR) << "DSA Signature size mismatch, actual:
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/pem/
pem_all.c 123 #include <openssl/dsa.h>
133 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa);
154 /* We treat RSA or DSA private keys as a special case.
258 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa)
260 DSA *dtmp;
265 if(dsa) {
    [all...]
  /system/security/softkeymaster/
keymaster_openssl.cpp 61 void operator()(DSA* p) const {
65 typedef UniquePtr<DSA, DSA_Delete> Unique_DSA;
229 ALOGI("Requested DSA key size is too small (<512)");
233 Unique_DSA dsa(DSA_new());
241 if (DSA_generate_parameters_ex(dsa.get(), dsa_params->key_size, NULL, 0, NULL, NULL,
247 dsa->g = BN_bin2bn(dsa_params->generator,
250 if (dsa->g == NULL) {
255 dsa->p = BN_bin2bn(dsa_params->prime_p,
258 if (dsa->p == NULL) {
263 dsa->q = BN_bin2bn(dsa_params->prime_q
    [all...]
  /external/chromium_org/third_party/mesa/src/src/gallium/drivers/r300/
r300_state.c 570 /* Create a new depth, stencil, and alpha state based on the CSO dsa state.
580 struct r300_dsa_state* dsa = CALLOC_STRUCT(r300_dsa_state); local
583 dsa->dsa = *state;
587 dsa->z_buffer_control |= R300_Z_WRITE_ENABLE;
591 dsa->z_buffer_control |= R300_Z_ENABLE;
593 dsa->z_stencil_control |=
598 dsa->z_buffer_control |= R300_Z_ENABLE;
599 dsa->z_stencil_control |= R300_ZS_ALWAYS;
604 dsa->z_buffer_control |= R300_STENCIL_ENABLE
710 struct r300_dsa_state *dsa = local
    [all...]
  /external/mesa3d/src/gallium/drivers/r300/
r300_state.c 570 /* Create a new depth, stencil, and alpha state based on the CSO dsa state.
580 struct r300_dsa_state* dsa = CALLOC_STRUCT(r300_dsa_state); local
583 dsa->dsa = *state;
587 dsa->z_buffer_control |= R300_Z_WRITE_ENABLE;
591 dsa->z_buffer_control |= R300_Z_ENABLE;
593 dsa->z_stencil_control |=
598 dsa->z_buffer_control |= R300_Z_ENABLE;
599 dsa->z_stencil_control |= R300_ZS_ALWAYS;
604 dsa->z_buffer_control |= R300_STENCIL_ENABLE
710 struct r300_dsa_state *dsa = local
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/x509/
x_all.c 70 #include <openssl/dsa.h>
295 DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa)
297 return ASN1_d2i_fp_of(DSA,DSA_new,d2i_DSAPrivateKey,fp,dsa);
300 int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa)
302 return ASN1_i2d_fp_of_const(DSA,i2d_DSAPrivateKey,fp,dsa);
    [all...]
  /external/openssl/crypto/x509/
x_all.c 70 #include <openssl/dsa.h>
295 DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa)
297 return ASN1_d2i_fp_of(DSA,DSA_new,d2i_DSAPrivateKey,fp,dsa);
300 int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa)
302 return ASN1_i2d_fp_of_const(DSA,i2d_DSAPrivateKey,fp,dsa);
    [all...]
  /libcore/support/src/test/java/tests/resources/x509/
create.sh 67 openssl req -config ${DIR}/default.cnf -newkey dsa:/tmp/dsaparam.pem -keyout /tmp/dsapriv.pem -nodes -batch | openssl x509 -extfile ${DIR}/default.cnf -extensions keyUsage_cert -req -signkey /tmp/dsapriv.pem -outform d > ${DIR}/cert-dsa.der
95 openssl x509 -inform d -in ${DIR}/cert-dsa.der -out /tmp/cert-dsa.pem
96 openssl ca -revoke /tmp/cert-dsa.pem -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -crl_reason cessationOfOperation -extensions unsupported_cert -config ${DIR}/default.cnf
97 openssl ca -gencrl -crldays 30 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out /tmp/crl-rsa-dsa.pem -config ${DIR}/default.cnf
98 openssl ca -gencrl -crldays 30 -keyfile /tmp/cakey.pem -cert /tmp/cacert.pem -out ${DIR}/crl-rsa-dsa-sigopt.pem -config ${DIR}/default.cnf -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:1
99 openssl crl -in /tmp/crl-rsa-dsa.pem -outform d -out ${DIR}/crl-rsa-dsa.der
100 openssl crl -in ${DIR}/crl-rsa-dsa-sigopt.pem -outform d -out ${DIR}/crl-rsa-dsa-sigopt.de
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/dsa/
dsa_depr.c 1 /* crypto/dsa/dsa_depr.c */
81 #include <openssl/dsa.h>
86 DSA *DSA_generate_parameters(int bits,
93 DSA *ret;
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
m_dss.c 65 #include <openssl/dsa.h>
m_dss1.c 68 #include <openssl/dsa.h>
  /external/openssh/
ssh-dss.c 56 if (key == NULL || key->dsa == NULL || (key->type != KEY_DSA &&
58 error("ssh_dss_sign: no DSA key");
65 sig = DSA_do_sign(digest, dlen, key->dsa);
120 if (key == NULL || key->dsa == NULL || (key->type != KEY_DSA &&
122 error("ssh_dss_verify: no DSA key");
179 ret = DSA_do_verify(digest, dlen, sig, key->dsa);
  /external/openssl/crypto/dsa/
dsa_depr.c 1 /* crypto/dsa/dsa_depr.c */
81 #include <openssl/dsa.h>
86 DSA *DSA_generate_parameters(int bits,
93 DSA *ret;

Completed in 1629 milliseconds

1 23 4 5 6 7 8 9