/external/boringssl/src/include/openssl/ |
dsa.h | 74 /* DSA contains functions for signing and verifying with the Digital Signature 80 /* DSA_new returns a new, empty DSA object or NULL on error. */ 81 OPENSSL_EXPORT DSA *DSA_new(void); 83 /* DSA_free decrements the reference count of |dsa| and frees it if the 85 OPENSSL_EXPORT void DSA_free(DSA *dsa); 87 /* DSA_up_ref increments the reference count of |dsa| and returns one. */ 88 OPENSSL_EXPORT int DSA_up_ref(DSA *dsa); 93 /* DSA_get0_key sets |*out_pub_key| and |*out_priv_key|, if non-NULL, to |dsa|' [all...] |
evp.h | 150 OPENSSL_EXPORT int EVP_PKEY_set1_DSA(EVP_PKEY *pkey, DSA *key); 151 OPENSSL_EXPORT int EVP_PKEY_assign_DSA(EVP_PKEY *pkey, DSA *key); 152 OPENSSL_EXPORT DSA *EVP_PKEY_get0_DSA(EVP_PKEY *pkey); 153 OPENSSL_EXPORT DSA *EVP_PKEY_get1_DSA(EVP_PKEY *pkey); 816 DSA *dsa; member in union:evp_pkey_st::__anon13442 [all...] |
x509.h | 74 #include <openssl/dsa.h> 620 OPENSSL_EXPORT DSA *d2i_DSA_PUBKEY_fp(FILE *fp, DSA **dsa); 621 OPENSSL_EXPORT int i2d_DSA_PUBKEY_fp(FILE *fp, DSA *dsa); 622 OPENSSL_EXPORT DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa); 623 OPENSSL_EXPORT int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
DSA.java | 8 public interface DSA
|
/external/boringssl/src/crypto/dsa/ |
dsa_asn1.c | 55 #include <openssl/dsa.h> 78 /* A DSA object may be missing some components. */ 79 OPENSSL_PUT_ERROR(DSA, ERR_R_PASSED_NULL_PARAMETER); 95 OPENSSL_PUT_ERROR(DSA, DSA_R_DECODE_ERROR); 108 OPENSSL_PUT_ERROR(DSA, DSA_R_ENCODE_ERROR); 114 DSA *DSA_parse_public_key(CBS *cbs) { 115 DSA *ret = DSA_new(); 126 OPENSSL_PUT_ERROR(DSA, DSA_R_DECODE_ERROR); 133 int DSA_marshal_public_key(CBB *cbb, const DSA *dsa) { [all...] |
dsa.c | 60 #include <openssl/dsa.h> 87 DSA *DSA_new(void) { 88 DSA *dsa = OPENSSL_malloc(sizeof(DSA)); local 89 if (dsa == NULL) { 90 OPENSSL_PUT_ERROR(DSA, ERR_R_MALLOC_FAILURE); 94 OPENSSL_memset(dsa, 0, sizeof(DSA)); 96 dsa->references = 1 [all...] |
dsa_test.cc | 60 #include <openssl/dsa.h> 169 static bssl::UniquePtr<DSA> GetFIPSDSA(void) { 170 bssl::UniquePtr<DSA> dsa(DSA_new()); 171 if (!dsa) { 174 dsa->p = BN_bin2bn(fips_p, sizeof(fips_p), nullptr); 175 dsa->q = BN_bin2bn(fips_q, sizeof(fips_q), nullptr); 176 dsa->g = BN_bin2bn(fips_g, sizeof(fips_g), nullptr); 177 dsa->pub_key = BN_bin2bn(fips_y, sizeof(fips_y), nullptr); 178 dsa->priv_key = BN_bin2bn(fips_x, sizeof(fips_x), nullptr) 290 bssl::UniquePtr<DSA> dsa = GetFIPSDSA(); local [all...] |
/external/boringssl/src/crypto/pem/ |
pem_all.c | 113 #include <openssl/dsa.h> 123 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa); 132 * We treat RSA or DSA private keys as a special case. For private keys we 181 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa) 183 DSA *dtmp; 190 if (dsa) { [all...] |
/external/boringssl/src/decrepit/dsa/ |
dsa_decrepit.c | 54 #include <openssl/dsa.h> 70 DSA *DSA_generate_parameters(int bits, uint8_t *seed_in, int seed_len, 77 DSA *ret = DSA_new();
|
/system/security/keystore-engine/ |
methods.h | 33 void operator()(DSA* p) const { 37 typedef std::unique_ptr<DSA, struct DSA_Delete> Unique_DSA; 68 /* DSA */
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
DSABase.java | 10 import org.bouncycastle.crypto.DSA; 18 protected DSA signer; 23 DSA signer,
|
/external/boringssl/src/crypto/x509/ |
x_all.c | 60 #include <openssl/dsa.h> 267 DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa) 269 return ASN1_d2i_fp_of(DSA, DSA_new, d2i_DSAPrivateKey, fp, dsa); 272 int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa) 274 return ASN1_i2d_fp_of_const(DSA, i2d_DSAPrivateKey, fp, dsa); [all...] |
x_pubkey.c | 220 * The following are equivalents but which return RSA and DSA keys 261 DSA *d2i_DSA_PUBKEY(DSA **a, const unsigned char **pp, long length) 264 DSA *key; 282 int i2d_DSA_PUBKEY(const DSA *a, unsigned char **pp) 293 EVP_PKEY_set1_DSA(pktmp, (DSA *)a);
|
/libcore/benchmarks/src/benchmarks/regression/ |
KeyPairGeneratorBenchmark.java | 30 DSA,
|
/external/boringssl/src/crypto/evp/ |
evp.c | 62 #include <openssl/dsa.h> 244 int EVP_PKEY_set1_DSA(EVP_PKEY *pkey, DSA *key) { 252 int EVP_PKEY_assign_DSA(EVP_PKEY *pkey, DSA *key) { 256 DSA *EVP_PKEY_get0_DSA(EVP_PKEY *pkey) { 261 return pkey->pkey.dsa; 264 DSA *EVP_PKEY_get1_DSA(EVP_PKEY *pkey) { 265 DSA *dsa = EVP_PKEY_get0_DSA(pkey); local 266 if (dsa != NULL) { 267 DSA_up_ref(dsa); [all...] |
p_dsa_asn1.c | 61 #include <openssl/dsa.h> 71 DSA *dsa; local 73 dsa = DSA_new(); 74 if (dsa == NULL) { 78 dsa = DSA_parse_parameters(params); 79 if (dsa == NULL || CBS_len(params) != 0) { 85 dsa->pub_key = BN_new(); 86 if (dsa->pub_key == NULL) { 90 if (!BN_parse_asn1_unsigned(key, dsa->pub_key) | 105 const DSA *dsa = key->pkey.dsa; local 132 DSA *dsa = DSA_parse_parameters(params); local 170 const DSA *dsa = key->pkey.dsa; local 203 DSA *dsa; local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ |
DSA.java | 4 import org.bouncycastle.jcajce.provider.asymmetric.dsa.DSAUtil; 5 import org.bouncycastle.jcajce.provider.asymmetric.dsa.KeyFactorySpi; 10 public class DSA 12 private static final String PREFIX = "org.bouncycastle.jcajce.provider.asymmetric" + ".dsa."; 23 provider.addAlgorithm("AlgorithmParameters.DSA", PREFIX + "AlgorithmParametersSpi"); 25 provider.addAlgorithm("AlgorithmParameterGenerator.DSA", PREFIX + "AlgorithmParameterGeneratorSpi"); 27 provider.addAlgorithm("KeyPairGenerator.DSA", PREFIX + "KeyPairGeneratorSpi"); 28 provider.addAlgorithm("KeyFactory.DSA", PREFIX + "KeyFactorySpi"); 57 addSignatureAlgorithm(provider, "SHA224", "DSA", PREFIX + "DSASigner$dsa224", NISTObjectIdentifiers.dsa_with_sha224); 58 addSignatureAlgorithm(provider, "SHA256", "DSA", PREFIX + "DSASigner$dsa256", NISTObjectIdentifiers.dsa_with_sha256) [all...] |
/external/conscrypt/platform/src/main/java/org/conscrypt/ct/ |
DigitallySigned.java | 52 DSA,
|
/external/libchrome/crypto/ |
scoped_openssl_types.h | 10 #include <openssl/dsa.h> 47 using ScopedDSA = ScopedOpenSSL<DSA, DSA_free>;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/signers/ |
DSASigner.java | 7 import org.bouncycastle.crypto.DSA; 19 implements DSA 74 * initialised with. For conventional DSA the message should be a SHA-1 109 * return true if the value r and s represent a DSA signature for 110 * the passed in message for standard DSA the message should be a
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/ |
SignatureSpi.java | 16 import org.bouncycastle.crypto.DSA; 40 SignatureSpi(Digest digest, DSA signer, DSAEncoder encoder)
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/ |
DSASigner.java | 1 package org.bouncycastle.jcajce.provider.asymmetric.dsa; 21 import org.bouncycastle.crypto.DSA; 52 private DSA signer; 57 DSA signer)
|
/external/openssh/ |
sshkey.h | 33 #include <openssl/dsa.h> 43 # define DSA void 103 DSA *dsa; member in struct:sshkey 220 # undef DSA
|
/prebuilts/go/darwin-x86/src/crypto/dsa/ |
dsa.go | 5 // Package dsa implements the Digital Signature Algorithm, as defined in FIPS 186-3. 7 // The DSA operations in this package are not implemented using constant-time algorithms. 8 package dsa package 22 // PublicKey represents a DSA public key. 28 // PrivateKey represents a DSA private key. 35 // FIPS is quite strict about the format of DSA keys, but other code may be 38 var ErrInvalidPublicKey = errors.New("crypto/dsa: invalid public key") 41 // in a set of DSA parameters. See FIPS 186-3, section 4.2. 55 // GenerateParameters puts a random, valid set of DSA parameters into params. 78 return errors.New("crypto/dsa: invalid ParameterSizes" [all...] |
/prebuilts/go/linux-x86/src/crypto/dsa/ |
dsa.go | 5 // Package dsa implements the Digital Signature Algorithm, as defined in FIPS 186-3. 7 // The DSA operations in this package are not implemented using constant-time algorithms. 8 package dsa package 22 // PublicKey represents a DSA public key. 28 // PrivateKey represents a DSA private key. 35 // FIPS is quite strict about the format of DSA keys, but other code may be 38 var ErrInvalidPublicKey = errors.New("crypto/dsa: invalid public key") 41 // in a set of DSA parameters. See FIPS 186-3, section 4.2. 55 // GenerateParameters puts a random, valid set of DSA parameters into params. 78 return errors.New("crypto/dsa: invalid ParameterSizes" [all...] |