/external/boringssl/src/crypto/dsa/ |
dsa_asn1.c | 55 #include <openssl/dsa.h> 76 OPENSSL_PUT_ERROR(DSA, dsa_sig_cb, ERR_R_MALLOC_FAILURE); 103 DSA_free((DSA *)*pval); 113 ASN1_SIMPLE(DSA, version, LONG), 114 ASN1_SIMPLE(DSA, p, BIGNUM), 115 ASN1_SIMPLE(DSA, q, BIGNUM), 116 ASN1_SIMPLE(DSA, g, BIGNUM), 117 ASN1_SIMPLE(DSA, pub_key, BIGNUM), 118 ASN1_SIMPLE(DSA, priv_key, BIGNUM)} ASN1_SEQUENCE_END_cb(DSA, [all...] |
dsa.c | 60 #include <openssl/dsa.h> 80 DSA *DSA_new(void) { return DSA_new_method(NULL); } 82 DSA *DSA_new_method(const ENGINE *engine) { 83 DSA *dsa = (DSA *)OPENSSL_malloc(sizeof(DSA)); local 84 if (dsa == NULL) { 85 OPENSSL_PUT_ERROR(DSA, DSA_new_method, ERR_R_MALLOC_FAILURE); 89 memset(dsa, 0, sizeof(DSA)) [all...] |
dsa_impl.c | 60 #include <openssl/dsa.h> 79 static int sign_setup(const DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, 85 if (!dsa->p || !dsa->q || !dsa->g) { 86 OPENSSL_PUT_ERROR(DSA, sign_setup, DSA_R_MISSING_PARAMETERS); 114 ok = BN_generate_dsa_nonce(&k, dsa->q, dsa->priv_key, digest, digest_len, 117 ok = BN_rand_range(&k, dsa->q) [all...] |
dsa_test.c | 60 #include <openssl/dsa.h> 168 static DSA *get_fips_dsa(void) { 169 DSA *dsa = DSA_new(); local 170 if (!dsa) { 173 dsa->p = BN_bin2bn(fips_p, sizeof(fips_p), NULL); 174 dsa->q = BN_bin2bn(fips_q, sizeof(fips_q), NULL); 175 dsa->g = BN_bin2bn(fips_g, sizeof(fips_g), NULL); 176 dsa->pub_key = BN_bin2bn(fips_y, sizeof(fips_y), NULL); 177 dsa->priv_key = BN_bin2bn(fips_x, sizeof(fips_x), NULL) 188 DSA *dsa = NULL; local 259 DSA *dsa = get_fips_dsa(); local [all...] |
/external/boringssl/src/include/openssl/ |
dsa.h | 74 /* DSA contains functions for signing and verifing with the Digital Signature 80 /* DSA_new returns a new, empty DSA object or NULL on error. */ 81 OPENSSL_EXPORT DSA *DSA_new(void); 84 OPENSSL_EXPORT DSA *DSA_new_method(const ENGINE *engine); 86 /* DSA_free decrements the reference count of |dsa| and frees it if the 88 OPENSSL_EXPORT void DSA_free(DSA *dsa); 90 /* DSA_up_ref increments the reference count of |dsa|. */ 91 OPENSSL_EXPORT int DSA_up_ref(DSA *dsa); [all...] |
x509.h | 75 #include <openssl/dsa.h> 656 OPENSSL_EXPORT DSA *d2i_DSA_PUBKEY_fp(FILE *fp, DSA **dsa); 657 OPENSSL_EXPORT int i2d_DSA_PUBKEY_fp(FILE *fp, DSA *dsa); 658 OPENSSL_EXPORT DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa); 659 OPENSSL_EXPORT int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa) [all...] |
base.h | 191 typedef struct dsa_st DSA;
|
pem.h | 121 #define PEM_STRING_DSA "DSA PRIVATE KEY" 122 #define PEM_STRING_DSA_PUBLIC "DSA PUBLIC KEY" 130 #define PEM_STRING_DSAPARAMS "DSA PARAMETERS" 449 DECLARE_PEM_rw_cb(DSAPrivateKey, DSA) 451 DECLARE_PEM_rw(DSA_PUBKEY, DSA) 453 DECLARE_PEM_rw_const(DSAparams, DSA)
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
DSA.java | 8 public interface DSA
|
/external/boringssl/src/crypto/pem/ |
pem_all.c | 113 #include <openssl/dsa.h> 122 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa); 134 /* We treat RSA or DSA private keys as a special case. 183 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa) 185 DSA *dtmp; 190 if(dsa) { [all...] |
/system/security/keystore-engine/ |
methods.h | 33 void operator()(DSA* p) const { 37 typedef UniquePtr<DSA, struct DSA_Delete> Unique_DSA; 68 /* DSA */
|
dsa_meth.cpp | 29 #define LOG_TAG "OpenSSL-keystore-dsa" 35 #include <openssl/dsa.h> 50 static DSA_SIG* keystore_dsa_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) { 51 ALOGV("keystore_dsa_do_sign(%p, %d, %p)", dgst, dlen, dsa); 53 uint8_t* key_id = reinterpret_cast<uint8_t*>(DSA_get_ex_data(dsa, dsa_key_handle)); 68 int num = DSA_size(dsa); 96 ALOGV("keystore_dsa_do_sign(%p, %d, %p) => returning %p len %zu", dgst, dlen, dsa, 125 Unique_DSA dsa(EVP_PKEY_get1_DSA(pkey)); 126 if (!DSA_set_ex_data(dsa.get(), dsa_key_handle, reinterpret_cast<void*>(strdup(key_id)))) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
DSABase.java | 10 import org.bouncycastle.crypto.DSA; 18 protected DSA signer; 23 DSA signer,
|
/external/boringssl/src/crypto/x509/ |
x_all.c | 60 #include <openssl/dsa.h> 306 DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa) 308 return ASN1_d2i_fp_of(DSA,DSA_new,d2i_DSAPrivateKey,fp,dsa); 311 int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa) 313 return ASN1_i2d_fp_of_const(DSA,i2d_DSAPrivateKey,fp,dsa); [all...] |
x_pubkey.c | 233 /* The following are equivalents but which return RSA and DSA 275 DSA *d2i_DSA_PUBKEY(DSA **a, const unsigned char **pp, 279 DSA *key; 296 int i2d_DSA_PUBKEY(const DSA *a, unsigned char **pp) 307 EVP_PKEY_set1_DSA(pktmp, (DSA*) a);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ |
DSA.java | 4 import org.bouncycastle.jcajce.provider.asymmetric.dsa.DSAUtil; 5 import org.bouncycastle.jcajce.provider.asymmetric.dsa.KeyFactorySpi; 10 public class DSA 12 private static final String PREFIX = "org.bouncycastle.jcajce.provider.asymmetric" + ".dsa."; 23 provider.addAlgorithm("AlgorithmParameters.DSA", PREFIX + "AlgorithmParametersSpi"); 25 provider.addAlgorithm("AlgorithmParameterGenerator.DSA", PREFIX + "AlgorithmParameterGeneratorSpi"); 27 provider.addAlgorithm("KeyPairGenerator.DSA", PREFIX + "KeyPairGeneratorSpi"); 28 provider.addAlgorithm("KeyFactory.DSA", PREFIX + "KeyFactorySpi"); 46 addSignatureAlgorithm(provider, "SHA224", "DSA", PREFIX + "DSASigner$dsa224", NISTObjectIdentifiers.dsa_with_sha224); 47 addSignatureAlgorithm(provider, "SHA256", "DSA", PREFIX + "DSASigner$dsa256", NISTObjectIdentifiers.dsa_with_sha256) [all...] |
/libcore/benchmarks/src/benchmarks/regression/ |
KeyPairGeneratorBenchmark.java | 34 DSA,
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/signers/ |
DSASigner.java | 7 import org.bouncycastle.crypto.DSA; 19 implements DSA 74 * initialised with. For conventional DSA the message should be a SHA-1 108 * return true if the value r and s represent a DSA signature for 109 * the passed in message for standard DSA the message should be a
|
ECDSASigner.java | 7 import org.bouncycastle.crypto.DSA; 20 * EC-DSA as described in X9.62 23 implements ECConstants, DSA 79 * initialised with. For conventional DSA the message should be a SHA-1 129 * return true if the value r and s represent a DSA signature for 130 * the passed in message (for standard DSA the message should be
|