HomeSort by: relevance | last modified time | path
    Searched defs:dsa (Results 1 - 25 of 65) sorted by relevancy

1 2 3

  /src/crypto/external/bsd/netpgp/dist/src/librsa/
rsastubs.c 71 DSA *
72 PEM_read_DSAPrivateKey(FILE *fp, DSA **x, pem_password_cb *cb, void *u)
74 DSA *dsa; local
80 dsa = *x = DSA_new();
82 return dsa;
rsa.h 65 BIGNUM *p; /* DSA public modulus n */
66 BIGNUM *q; /* DSA public encryption exponent e */
81 #define DSA mpi_dsa_t
113 dsa_pubkey_t dsa; /* specific DSA keys */ member in struct:pubkey_t
126 dsasig_t dsa; /* DSA signature */ member in struct:signature_t
145 DSA *DSA_new(void);
146 int DSA_size(const DSA */*rsa*/);
147 void DSA_free(DSA */*dsa*/)
    [all...]
  /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/
dsa.c 1 /* $NetBSD: dsa.c,v 1.2 2017/01/28 21:31:47 christos Exp $ */
39 #include <dsa.h>
45 DSA *
48 DSA *dsa = calloc(1, sizeof(*dsa)); local
49 dsa->meth = rk_UNCONST(DSA_get_default_method());
50 dsa->references = 1;
51 return dsa;
55 DSA_free(DSA *dsa
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/
pem_read_depr_test.c 19 #include <openssl/dsa.h>
89 DSA *dsa = NULL; local
94 dsa = PEM_read_bio_DSAparams(infile, NULL, NULL, NULL);
95 if (!TEST_ptr(dsa))
102 DSA_free(dsa);
110 DSA *dsa = NULL; local
115 dsa = PEM_read_bio_DSAPrivateKey(infile, NULL, NULL, NULL);
116 if (!TEST_ptr(dsa))
131 DSA *dsa = NULL; local
    [all...]
dsa_no_digest_size_test.c 11 * DSA low level APIs are deprecated for public use, but still ok for
26 #include <openssl/dsa.h>
28 static DSA *dsakey;
34 static DSA *load_dsa_params(void)
98 DSA *dsa = DSA_new(); local
101 if (dsa == NULL)
103 if (!DSA_set0_pqg(dsa, p = BN_bin2bn(dsap_2048, sizeof(dsap_2048), NULL),
106 DSA_free(dsa);
112 return dsa;
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/
pem_read_depr_test.c 19 #include <openssl/dsa.h>
89 DSA *dsa = NULL; local
94 dsa = PEM_read_bio_DSAparams(infile, NULL, NULL, NULL);
95 if (!TEST_ptr(dsa))
102 DSA_free(dsa);
110 DSA *dsa = NULL; local
115 dsa = PEM_read_bio_DSAPrivateKey(infile, NULL, NULL, NULL);
116 if (!TEST_ptr(dsa))
131 DSA *dsa = NULL; local
    [all...]
dsa_no_digest_size_test.c 11 * DSA low level APIs are deprecated for public use, but still ok for
26 #include <openssl/dsa.h>
28 static DSA *dsakey;
34 static DSA *load_dsa_params(void)
98 DSA *dsa = DSA_new(); local
101 if (dsa == NULL)
103 if (!DSA_set0_pqg(dsa, p = BN_bin2bn(dsap_2048, sizeof(dsap_2048), NULL),
106 DSA_free(dsa);
112 return dsa;
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/dsa/
dsa_backend.c 11 * DSA low level APIs are deprecated for public use, but still ok for
21 #include "crypto/dsa.h"
30 int ossl_dsa_key_fromdata(DSA *dsa, const OSSL_PARAM params[],
36 if (dsa == NULL)
53 if (!DSA_set0_key(dsa, pub_key, priv_key))
64 int ossl_dsa_is_foreign(const DSA *dsa)
67 if (dsa->engine != NULL || DSA_get_method((DSA *)dsa) != DSA_OpenSSL()
135 DSA *dsa = NULL; local
    [all...]
dsa_pmeth.c 11 * DSA low level APIs are deprecated for public use, but still ok for
25 /* DSA pkey context structure */
89 DSA *dsa = (DSA *)EVP_PKEY_get0_DSA(ctx->pkey); local
99 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa);
118 DSA *dsa = (DSA *)EVP_PKEY_get0_DSA(ctx->pkey); local
128 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa);
209 DSA *dsa = NULL; local
242 DSA *dsa = NULL; local
    [all...]
dsa_ameth.c 11 * DSA low level APIs are deprecated for public use, but still ok for
24 #include "crypto/dsa.h"
39 DSA *dsa = NULL; local
50 if ((dsa = d2i_DSAparams(NULL, &pm, pmlen)) == NULL) {
56 if ((dsa = DSA_new()) == NULL) {
70 if ((dsa->pub_key = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL) {
75 dsa->dirty_cnt++;
77 EVP_PKEY_assign_DSA(pkey, dsa);
82 DSA_free(dsa);
88 DSA *dsa; local
152 DSA *dsa = ossl_dsa_key_from_pkcs8(p8, NULL, NULL); local
234 DSA *dsa; local
322 DSA *dsa; local
358 DSA *dsa; local
432 DSA *dsa = from->pkey.dsa; local
482 DSA *dsa = ossl_dsa_new(pctx->libctx); local
500 DSA *dsa = from->pkey.dsa; local
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/dsa/
dsa_backend.c 11 * DSA low level APIs are deprecated for public use, but still ok for
21 #include "crypto/dsa.h"
30 int ossl_dsa_key_fromdata(DSA *dsa, const OSSL_PARAM params[],
36 if (dsa == NULL)
55 if (!DSA_set0_key(dsa, pub_key, priv_key))
66 int ossl_dsa_is_foreign(const DSA *dsa)
69 if (dsa->engine != NULL || DSA_get_method((DSA *)dsa) != DSA_OpenSSL()
137 DSA *dsa = NULL; local
    [all...]
dsa_pmeth.c 11 * DSA low level APIs are deprecated for public use, but still ok for
25 /* DSA pkey context structure */
89 DSA *dsa = (DSA *)EVP_PKEY_get0_DSA(ctx->pkey); local
94 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa);
113 DSA *dsa = (DSA *)EVP_PKEY_get0_DSA(ctx->pkey); local
118 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa);
212 DSA *dsa = NULL; local
245 DSA *dsa = NULL; local
    [all...]
dsa_ameth.c 11 * DSA low level APIs are deprecated for public use, but still ok for
24 #include "crypto/dsa.h"
39 DSA *dsa = NULL; local
50 if ((dsa = d2i_DSAparams(NULL, &pm, pmlen)) == NULL) {
56 if ((dsa = DSA_new()) == NULL) {
70 if ((dsa->pub_key = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL) {
75 dsa->dirty_cnt++;
77 EVP_PKEY_assign_DSA(pkey, dsa);
82 DSA_free(dsa);
89 DSA *dsa; local
153 DSA *dsa = ossl_dsa_key_from_pkcs8(p8, NULL, NULL); local
235 DSA *dsa; local
323 DSA *dsa; local
359 DSA *dsa; local
433 DSA *dsa = from->pkey.dsa; local
483 DSA *dsa = ossl_dsa_new(pctx->libctx); local
501 DSA *dsa = from->pkey.dsa; local
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/apps/
gendsa.c 20 #include <openssl/dsa.h>
48 DSA *dsa = NULL; local
104 if ((dsa = PEM_read_bio_DSAparams(in, NULL, NULL, NULL)) == NULL) {
105 BIO_printf(bio_err, "unable to load DSA parameter file\n");
115 DSA_get0_pqg(dsa, &p, NULL, NULL);
119 "Warning: It is not recommended to use more than %d bit for DSA keys.\n"
123 BIO_printf(bio_err, "Generating DSA key, %d bits\n", BN_num_bits(p));
124 if (!DSA_generate_key(dsa))
128 if (!PEM_write_bio_DSAPrivateKey(out, dsa, enc, NULL, 0, NULL, passout)
    [all...]
testdsa.h 11 DSA *get_dsa(int);
202 st.priv = dsa##bits##_priv; \
203 st.pub = dsa##bits##_pub; \
204 st.p = dsa##bits##_p; \
205 st.g = dsa##bits##_g; \
206 st.q = dsa##bits##_q; \
207 st.priv_l = sizeof(dsa##bits##_priv); \
208 st.pub_l = sizeof(dsa##bits##_pub); \
209 st.p_l = sizeof(dsa##bits##_p); \
210 st.g_l = sizeof(dsa##bits##_g);
216 DSA *dsa; local
    [all...]
dhparam.c 25 # include <openssl/dsa.h>
57 "Read or generate DSA parameters, convert to DH"},
148 "generator may not be chosen for DSA parameters\n");
174 DSA *dsa = DSA_new(); local
177 "Generating DSA parameters, %d bit long prime\n", num);
178 if (dsa == NULL
179 || !DSA_generate_parameters_ex(dsa, num, NULL, 0, NULL, NULL,
181 DSA_free(dsa);
187 dh = DSA_dup_DH(dsa);
218 DSA *dsa; local
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/crypto/dsa/
dsa_pmeth.c 19 /* DSA pkey context structure */
78 DSA *dsa = ctx->pkey->pkey.dsa; local
83 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa);
97 DSA *dsa = ctx->pkey->pkey.dsa; local
102 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa);
197 DSA *dsa = NULL local
226 DSA *dsa = NULL; local
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/test/
dsa_no_digest_size_test.c 20 #include <openssl/dsa.h>
22 static DSA *dsakey;
28 static DSA *load_dsa_params(void)
92 DSA *dsa = DSA_new(); local
95 if (dsa == NULL)
97 if (!DSA_set0_pqg(dsa, p = BN_bin2bn(dsap_2048, sizeof(dsap_2048), NULL),
100 DSA_free(dsa);
106 return dsa;
186 /* Verify again using the raw DSA interface *
    [all...]
dsatest.c 19 #include <openssl/dsa.h>
69 DSA *dsa = NULL; local
81 if (!TEST_ptr(dsa = DSA_new())
82 || !TEST_true(DSA_generate_parameters_ex(dsa, 512, seed, 20,
91 DSA_get0_pqg(dsa, &p, &q, &g);
107 DSA_generate_key(dsa);
108 DSA_sign(0, str1, 20, sig, &siglen, dsa);
109 if (TEST_true(DSA_verify(0, str1, 20, sig, siglen, dsa)))
113 DSA_free(dsa);
    [all...]
  /src/external/cddl/osnet/dist/uts/common/fs/zfs/
vdev_disk.c 152 struct disk_sectoralign dsa; local
280 if (VOP_IOCTL(vp, DIOCGSECTORALIGN, &dsa, FREAD, NOCRED) == 0) {
281 *pashift = highbit(dsa.dsa_alignment * secsize) - 1;
282 if (dsa.dsa_firstaligned % dsa.dsa_alignment)
286 dsa.dsa_alignment, dsa.dsa_firstaligned);
  /src/sys/ddb/
db_sym.c 148 struct db_sift_args *dsa; local
150 dsa = (struct db_sift_args*)arg;
152 find = dsa->symstr; /* String we're looking for. */
166 if (dsa->mode=='F') /* ala ls -F */
190 struct db_sift_args dsa; local
193 dsa.symstr = symstr;
194 dsa.mode = mode;
195 (*db_symformat->sym_forall)(NULL, db_sift, &dsa);
  /src/sys/dev/ic/
esiopvar.h 38 uint32_t dsa; /* DSA of the xfer. The first 2 bits holds flags */ member in struct:esiop_slot
80 /* DSA table descriptor for tags. Free tables are in a list */
84 uint32_t tbl_dsa; /* DSA of base of this table */
89 /* DSA table block descriptor. */
106 struct esiop_dsatbl *lun_tagtbl; /* the tag DSA table */
116 uint32_t lun_table_offset; /* pointer to our DSA table */
126 offset = esiop_cmd->cmd_c.dsa -
142 struct tbl_list free_tagtbl; /* list of free tag DSA tables */
143 struct tblblk_list tag_tblblk; /* tag DSA table blocks *
    [all...]
  /src/sys/kern/
subr_disk.c 666 struct disk_sectoralign * const dsa = data; local
669 dsa->dsa_alignment = MAX(1u, dk->dk_geom.dg_physsecsize /
671 dsa->dsa_firstaligned = dk->dk_geom.dg_alignedsec;
676 uint32_t r = offset % dsa->dsa_alignment;
678 if (r <= dsa->dsa_firstaligned)
679 dsa->dsa_firstaligned -= r;
681 dsa->dsa_firstaligned += dsa->dsa_alignment - r;
683 dsa->dsa_firstaligned %= dsa->dsa_alignment
    [all...]
  /src/crypto/external/bsd/netpgp/dist/src/netpgpverify/
rsa.h 65 PGPV_BIGNUM *p; /* DSA public modulus n */
66 PGPV_BIGNUM *q; /* DSA public encryption exponent e */
113 netpgpv_dsa_pubkey_t dsa; /* specific DSA keys */ member in struct:pubkey_t
126 netpgpv_dsasig_t dsa; /* DSA signature */ member in struct:signature_t
154 void netpgpv_DSA_free(NETPGPV_DSA */*dsa*/);
158 NETPGPV_DSA_SIG */*sig*/, NETPGPV_DSA */*dsa*/);
160 int /*dlen*/, NETPGPV_DSA */*dsa*/);
  /src/crypto/external/bsd/openssl/dist/providers/implementations/signature/
dsa_sig.c 11 * DSA low level APIs are deprecated for public use, but still ok for
22 #include <openssl/dsa.h>
34 #include "crypto/dsa.h"
61 * We happen to know that our KEYMGMT simply passes DSA structures, so
68 DSA *dsa; member in struct:__anon1622
171 && ossl_DER_w_algorithmIdentifier_DSA_with_MD(&pkt, -1, ctx->dsa,
195 if (vdsa == NULL && pdsactx->dsa == NULL) {
208 DSA_free(pdsactx->dsa);
209 pdsactx->dsa = vdsa
    [all...]

Completed in 46 milliseconds

1 2 3