HomeSort by relevance Sort by last modified time
    Searched refs:DSA (Results 1 - 25 of 112) sorted by null

1 2 3 4 5

  /external/boringssl/src/include/openssl/
dsa.h 74 // DSA contains functions for signing and verifying with the Digital Signature
80 // DSA_new returns a new, empty DSA object or NULL on error.
81 OPENSSL_EXPORT DSA *DSA_new(void);
83 // DSA_free decrements the reference count of |dsa| and frees it if the
85 OPENSSL_EXPORT void DSA_free(DSA *dsa);
87 // DSA_up_ref increments the reference count of |dsa| and returns one.
88 OPENSSL_EXPORT int DSA_up_ref(DSA *dsa);
93 // DSA_get0_key sets |*out_pub_key| and |*out_priv_key|, if non-NULL, to |dsa|'
    [all...]
evp.h 150 OPENSSL_EXPORT int EVP_PKEY_set1_DSA(EVP_PKEY *pkey, DSA *key);
151 OPENSSL_EXPORT int EVP_PKEY_assign_DSA(EVP_PKEY *pkey, DSA *key);
152 OPENSSL_EXPORT DSA *EVP_PKEY_get0_DSA(EVP_PKEY *pkey);
153 OPENSSL_EXPORT DSA *EVP_PKEY_get1_DSA(EVP_PKEY *pkey);
812 DSA *dsa; member in union:evp_pkey_st::__anon14370
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
DSA.java 8 public interface DSA
  /external/boringssl/src/crypto/dsa/
dsa_asn1.c 55 #include <openssl/dsa.h>
78 // A DSA object may be missing some components.
79 OPENSSL_PUT_ERROR(DSA, ERR_R_PASSED_NULL_PARAMETER);
95 OPENSSL_PUT_ERROR(DSA, DSA_R_DECODE_ERROR);
108 OPENSSL_PUT_ERROR(DSA, DSA_R_ENCODE_ERROR);
114 DSA *DSA_parse_public_key(CBS *cbs) {
115 DSA *ret = DSA_new();
126 OPENSSL_PUT_ERROR(DSA, DSA_R_DECODE_ERROR);
133 int DSA_marshal_public_key(CBB *cbb, const DSA *dsa) {
    [all...]
dsa.c 60 #include <openssl/dsa.h>
85 static int dsa_sign_setup(const DSA *dsa, BN_CTX *ctx_in, BIGNUM **out_kinv,
90 DSA *DSA_new(void) {
91 DSA *dsa = OPENSSL_malloc(sizeof(DSA)); local
92 if (dsa == NULL) {
93 OPENSSL_PUT_ERROR(DSA, ERR_R_MALLOC_FAILURE);
97 OPENSSL_memset(dsa, 0, sizeof(DSA))
    [all...]
dsa_test.cc 60 #include <openssl/dsa.h>
169 static bssl::UniquePtr<DSA> GetFIPSDSA(void) {
170 bssl::UniquePtr<DSA> dsa(DSA_new());
171 if (!dsa) {
174 dsa->p = BN_bin2bn(fips_p, sizeof(fips_p), nullptr);
175 dsa->q = BN_bin2bn(fips_q, sizeof(fips_q), nullptr);
176 dsa->g = BN_bin2bn(fips_g, sizeof(fips_g), nullptr);
177 dsa->pub_key = BN_bin2bn(fips_y, sizeof(fips_y), nullptr);
178 dsa->priv_key = BN_bin2bn(fips_x, sizeof(fips_x), nullptr)
290 bssl::UniquePtr<DSA> dsa = GetFIPSDSA(); local
    [all...]
  /external/boringssl/src/crypto/pem/
pem_all.c 113 #include <openssl/dsa.h>
123 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa);
132 * We treat RSA or DSA private keys as a special case. For private keys we
181 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa)
183 DSA *dtmp;
190 if (dsa) {
    [all...]
  /external/boringssl/src/decrepit/dsa/
dsa_decrepit.c 54 #include <openssl/dsa.h>
70 DSA *DSA_generate_parameters(int bits, uint8_t *seed_in, int seed_len,
77 DSA *ret = DSA_new();
  /system/security/keystore-engine/
methods.h 33 void operator()(DSA* p) const {
37 typedef std::unique_ptr<DSA, struct DSA_Delete> Unique_DSA;
68 /* DSA */
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/
DSABase.java 10 import org.bouncycastle.crypto.DSA;
18 protected DSA signer;
23 DSA signer,
  /external/boringssl/src/crypto/x509/
x_all.c 60 #include <openssl/dsa.h>
267 DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa)
269 return ASN1_d2i_fp_of(DSA, DSA_new, d2i_DSAPrivateKey, fp, dsa);
272 int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa)
274 return ASN1_i2d_fp_of_const(DSA, i2d_DSAPrivateKey, fp, dsa);
    [all...]
x_pubkey.c 220 * The following are equivalents but which return RSA and DSA keys
261 DSA *d2i_DSA_PUBKEY(DSA **a, const unsigned char **pp, long length)
264 DSA *key;
282 int i2d_DSA_PUBKEY(const DSA *a, unsigned char **pp)
293 EVP_PKEY_set1_DSA(pktmp, (DSA *)a);
  /libcore/benchmarks/src/benchmarks/regression/
KeyPairGeneratorBenchmark.java 30 DSA,
  /tools/apkzlib/src/main/java/com/android/tools/build/apkzlib/sign/
SignatureAlgorithm.java 32 /** DSA algorithm. */
33 DSA("DSA", 1, "withDSA");
  /prebuilts/jdk/jdk9/darwin-x86/conf/security/
java.security 504 # the assertion algorithm name "DSA" will disable all certificate algorithms
505 # that rely on DSA, such as NONEwithDSA, SHA1withDSA. However, the assertion
576 # jdk.certpath.disabledAlgorithms=MD2, DSA, RSA keySize < 2048
580 RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224
624 DSA keySize < 1024
655 # jdk.tls.disabledAlgorithms=MD5, SSLv3, DSA, RSA keySize < 2048
    [all...]
  /prebuilts/jdk/jdk9/linux-x86/conf/security/
java.security 503 # the assertion algorithm name "DSA" will disable all certificate algorithms
504 # that rely on DSA, such as NONEwithDSA, SHA1withDSA. However, the assertion
575 # jdk.certpath.disabledAlgorithms=MD2, DSA, RSA keySize < 2048
579 RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224
623 DSA keySize < 1024
654 # jdk.tls.disabledAlgorithms=MD5, SSLv3, DSA, RSA keySize < 2048
    [all...]
  /external/boringssl/src/crypto/evp/
evp.c 62 #include <openssl/dsa.h>
244 int EVP_PKEY_set1_DSA(EVP_PKEY *pkey, DSA *key) {
252 int EVP_PKEY_assign_DSA(EVP_PKEY *pkey, DSA *key) {
256 DSA *EVP_PKEY_get0_DSA(EVP_PKEY *pkey) {
261 return pkey->pkey.dsa;
264 DSA *EVP_PKEY_get1_DSA(EVP_PKEY *pkey) {
265 DSA *dsa = EVP_PKEY_get0_DSA(pkey); local
266 if (dsa != NULL) {
267 DSA_up_ref(dsa);
    [all...]
p_dsa_asn1.c 61 #include <openssl/dsa.h>
71 DSA *dsa; local
73 dsa = DSA_new();
74 if (dsa == NULL) {
78 dsa = DSA_parse_parameters(params);
79 if (dsa == NULL || CBS_len(params) != 0) {
85 dsa->pub_key = BN_new();
86 if (dsa->pub_key == NULL) {
90 if (!BN_parse_asn1_unsigned(key, dsa->pub_key) |
105 const DSA *dsa = key->pkey.dsa; local
132 DSA *dsa = DSA_parse_parameters(params); local
170 const DSA *dsa = key->pkey.dsa; local
203 DSA *dsa; local
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/
DSA.java 4 import org.bouncycastle.jcajce.provider.asymmetric.dsa.DSAUtil;
5 import org.bouncycastle.jcajce.provider.asymmetric.dsa.KeyFactorySpi;
10 public class DSA
12 private static final String PREFIX = "org.bouncycastle.jcajce.provider.asymmetric" + ".dsa.";
23 provider.addAlgorithm("AlgorithmParameters.DSA", PREFIX + "AlgorithmParametersSpi");
25 provider.addAlgorithm("AlgorithmParameterGenerator.DSA", PREFIX + "AlgorithmParameterGeneratorSpi");
27 provider.addAlgorithm("KeyPairGenerator.DSA", PREFIX + "KeyPairGeneratorSpi");
28 provider.addAlgorithm("KeyFactory.DSA", PREFIX + "KeyFactorySpi");
30 // BEGIN Android-changed: Change primary ID from DSA to SHA1withDSA
31 // provider.addAlgorithm("Signature.DSA", PREFIX + "DSASigner$stdDSA")
    [all...]
  /external/conscrypt/platform/src/main/java/org/conscrypt/ct/
DigitallySigned.java 52 DSA,
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/signers/
DSASigner.java 7 import org.bouncycastle.crypto.DSA;
19 implements DSA
74 * initialised with. For conventional DSA the message should be a SHA-1
109 * return true if the value r and s represent a DSA signature for
110 * the passed in message for standard DSA the message should be a
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/
SignatureSpi.java 16 import org.bouncycastle.crypto.DSA;
39 SignatureSpi(Digest digest, DSA signer, DSAEncoder encoder)
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/
DSASigner.java 1 package org.bouncycastle.jcajce.provider.asymmetric.dsa;
21 import org.bouncycastle.crypto.DSA;
24 // Android-added: Check DSA keys when generated
40 private DSA signer;
45 DSA signer)
76 // Android-added: Check DSA keys when generated
152 // BEGIN Android-added: Check DSA keys when generated
173 // END Android-added: Check DSA keys when generated
  /prebuilts/go/darwin-x86/src/crypto/dsa/
dsa.go 5 // Package dsa implements the Digital Signature Algorithm, as defined in FIPS 186-3.
7 // The DSA operations in this package are not implemented using constant-time algorithms.
8 package dsa package
22 // PublicKey represents a DSA public key.
28 // PrivateKey represents a DSA private key.
35 // FIPS is quite strict about the format of DSA keys, but other code may be
38 var ErrInvalidPublicKey = errors.New("crypto/dsa: invalid public key")
41 // in a set of DSA parameters. See FIPS 186-3, section 4.2.
55 // GenerateParameters puts a random, valid set of DSA parameters into params.
78 return errors.New("crypto/dsa: invalid ParameterSizes"
    [all...]
  /prebuilts/go/linux-x86/src/crypto/dsa/
dsa.go 5 // Package dsa implements the Digital Signature Algorithm, as defined in FIPS 186-3.
7 // The DSA operations in this package are not implemented using constant-time algorithms.
8 package dsa package
22 // PublicKey represents a DSA public key.
28 // PrivateKey represents a DSA private key.
35 // FIPS is quite strict about the format of DSA keys, but other code may be
38 var ErrInvalidPublicKey = errors.New("crypto/dsa: invalid public key")
41 // in a set of DSA parameters. See FIPS 186-3, section 4.2.
55 // GenerateParameters puts a random, valid set of DSA parameters into params.
78 return errors.New("crypto/dsa: invalid ParameterSizes"
    [all...]

Completed in 559 milliseconds

1 2 3 4 5