| /src/crypto/external/bsd/netpgp/dist/src/librsa/ |
| rsastubs.c | 71 DSA * 72 PEM_read_DSAPrivateKey(FILE *fp, DSA **x, pem_password_cb *cb, void *u) 74 DSA *dsa; local 80 dsa = *x = DSA_new(); 82 return dsa;
|
| rsa.h | 65 BIGNUM *p; /* DSA public modulus n */ 66 BIGNUM *q; /* DSA public encryption exponent e */ 81 #define DSA mpi_dsa_t 113 dsa_pubkey_t dsa; /* specific DSA keys */ member in struct:pubkey_t 126 dsasig_t dsa; /* DSA signature */ member in struct:signature_t 145 DSA *DSA_new(void); 146 int DSA_size(const DSA */*rsa*/); 147 void DSA_free(DSA */*dsa*/) [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
| dsa.c | 1 /* $NetBSD: dsa.c,v 1.2 2017/01/28 21:31:47 christos Exp $ */ 39 #include <dsa.h> 45 DSA * 48 DSA *dsa = calloc(1, sizeof(*dsa)); local 49 dsa->meth = rk_UNCONST(DSA_get_default_method()); 50 dsa->references = 1; 51 return dsa; 55 DSA_free(DSA *dsa [all...] |
| /src/crypto/external/apache2/openssl/dist/test/ |
| pem_read_depr_test.c | 19 #include <openssl/dsa.h> 89 DSA *dsa = NULL; local 94 dsa = PEM_read_bio_DSAparams(infile, NULL, NULL, NULL); 95 if (!TEST_ptr(dsa)) 102 DSA_free(dsa); 110 DSA *dsa = NULL; local 115 dsa = PEM_read_bio_DSAPrivateKey(infile, NULL, NULL, NULL); 116 if (!TEST_ptr(dsa)) 131 DSA *dsa = NULL; local [all...] |
| dsa_no_digest_size_test.c | 11 * DSA low level APIs are deprecated for public use, but still ok for 26 #include <openssl/dsa.h> 28 static DSA *dsakey; 34 static DSA *load_dsa_params(void) 98 DSA *dsa = DSA_new(); local 101 if (dsa == NULL) 103 if (!DSA_set0_pqg(dsa, p = BN_bin2bn(dsap_2048, sizeof(dsap_2048), NULL), 106 DSA_free(dsa); 112 return dsa; [all...] |
| /src/crypto/external/bsd/openssl/dist/test/ |
| pem_read_depr_test.c | 19 #include <openssl/dsa.h> 89 DSA *dsa = NULL; local 94 dsa = PEM_read_bio_DSAparams(infile, NULL, NULL, NULL); 95 if (!TEST_ptr(dsa)) 102 DSA_free(dsa); 110 DSA *dsa = NULL; local 115 dsa = PEM_read_bio_DSAPrivateKey(infile, NULL, NULL, NULL); 116 if (!TEST_ptr(dsa)) 131 DSA *dsa = NULL; local [all...] |
| dsa_no_digest_size_test.c | 11 * DSA low level APIs are deprecated for public use, but still ok for 26 #include <openssl/dsa.h> 28 static DSA *dsakey; 34 static DSA *load_dsa_params(void) 98 DSA *dsa = DSA_new(); local 101 if (dsa == NULL) 103 if (!DSA_set0_pqg(dsa, p = BN_bin2bn(dsap_2048, sizeof(dsap_2048), NULL), 106 DSA_free(dsa); 112 return dsa; [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/dsa/ |
| dsa_backend.c | 11 * DSA low level APIs are deprecated for public use, but still ok for 21 #include "crypto/dsa.h" 30 int ossl_dsa_key_fromdata(DSA *dsa, const OSSL_PARAM params[], 36 if (dsa == NULL) 53 if (!DSA_set0_key(dsa, pub_key, priv_key)) 64 int ossl_dsa_is_foreign(const DSA *dsa) 67 if (dsa->engine != NULL || DSA_get_method((DSA *)dsa) != DSA_OpenSSL() 135 DSA *dsa = NULL; local [all...] |
| dsa_pmeth.c | 11 * DSA low level APIs are deprecated for public use, but still ok for 25 /* DSA pkey context structure */ 89 DSA *dsa = (DSA *)EVP_PKEY_get0_DSA(ctx->pkey); local 99 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa); 118 DSA *dsa = (DSA *)EVP_PKEY_get0_DSA(ctx->pkey); local 128 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa); 209 DSA *dsa = NULL; local 242 DSA *dsa = NULL; local [all...] |
| dsa_ameth.c | 11 * DSA low level APIs are deprecated for public use, but still ok for 24 #include "crypto/dsa.h" 39 DSA *dsa = NULL; local 50 if ((dsa = d2i_DSAparams(NULL, &pm, pmlen)) == NULL) { 56 if ((dsa = DSA_new()) == NULL) { 70 if ((dsa->pub_key = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL) { 75 dsa->dirty_cnt++; 77 EVP_PKEY_assign_DSA(pkey, dsa); 82 DSA_free(dsa); 88 DSA *dsa; local 152 DSA *dsa = ossl_dsa_key_from_pkcs8(p8, NULL, NULL); local 234 DSA *dsa; local 322 DSA *dsa; local 358 DSA *dsa; local 432 DSA *dsa = from->pkey.dsa; local 482 DSA *dsa = ossl_dsa_new(pctx->libctx); local 500 DSA *dsa = from->pkey.dsa; local [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/dsa/ |
| dsa_backend.c | 11 * DSA low level APIs are deprecated for public use, but still ok for 21 #include "crypto/dsa.h" 30 int ossl_dsa_key_fromdata(DSA *dsa, const OSSL_PARAM params[], 36 if (dsa == NULL) 55 if (!DSA_set0_key(dsa, pub_key, priv_key)) 66 int ossl_dsa_is_foreign(const DSA *dsa) 69 if (dsa->engine != NULL || DSA_get_method((DSA *)dsa) != DSA_OpenSSL() 137 DSA *dsa = NULL; local [all...] |
| dsa_pmeth.c | 11 * DSA low level APIs are deprecated for public use, but still ok for 25 /* DSA pkey context structure */ 89 DSA *dsa = (DSA *)EVP_PKEY_get0_DSA(ctx->pkey); local 94 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa); 113 DSA *dsa = (DSA *)EVP_PKEY_get0_DSA(ctx->pkey); local 118 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa); 212 DSA *dsa = NULL; local 245 DSA *dsa = NULL; local [all...] |
| dsa_ameth.c | 11 * DSA low level APIs are deprecated for public use, but still ok for 24 #include "crypto/dsa.h" 39 DSA *dsa = NULL; local 50 if ((dsa = d2i_DSAparams(NULL, &pm, pmlen)) == NULL) { 56 if ((dsa = DSA_new()) == NULL) { 70 if ((dsa->pub_key = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL) { 75 dsa->dirty_cnt++; 77 EVP_PKEY_assign_DSA(pkey, dsa); 82 DSA_free(dsa); 89 DSA *dsa; local 153 DSA *dsa = ossl_dsa_key_from_pkcs8(p8, NULL, NULL); local 235 DSA *dsa; local 323 DSA *dsa; local 359 DSA *dsa; local 433 DSA *dsa = from->pkey.dsa; local 483 DSA *dsa = ossl_dsa_new(pctx->libctx); local 501 DSA *dsa = from->pkey.dsa; local [all...] |
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| gendsa.c | 20 #include <openssl/dsa.h> 48 DSA *dsa = NULL; local 104 if ((dsa = PEM_read_bio_DSAparams(in, NULL, NULL, NULL)) == NULL) { 105 BIO_printf(bio_err, "unable to load DSA parameter file\n"); 115 DSA_get0_pqg(dsa, &p, NULL, NULL); 119 "Warning: It is not recommended to use more than %d bit for DSA keys.\n" 123 BIO_printf(bio_err, "Generating DSA key, %d bits\n", BN_num_bits(p)); 124 if (!DSA_generate_key(dsa)) 128 if (!PEM_write_bio_DSAPrivateKey(out, dsa, enc, NULL, 0, NULL, passout) [all...] |
| testdsa.h | 11 DSA *get_dsa(int); 202 st.priv = dsa##bits##_priv; \ 203 st.pub = dsa##bits##_pub; \ 204 st.p = dsa##bits##_p; \ 205 st.g = dsa##bits##_g; \ 206 st.q = dsa##bits##_q; \ 207 st.priv_l = sizeof(dsa##bits##_priv); \ 208 st.pub_l = sizeof(dsa##bits##_pub); \ 209 st.p_l = sizeof(dsa##bits##_p); \ 210 st.g_l = sizeof(dsa##bits##_g); 216 DSA *dsa; local [all...] |
| dhparam.c | 25 # include <openssl/dsa.h> 57 "Read or generate DSA parameters, convert to DH"}, 148 "generator may not be chosen for DSA parameters\n"); 174 DSA *dsa = DSA_new(); local 177 "Generating DSA parameters, %d bit long prime\n", num); 178 if (dsa == NULL 179 || !DSA_generate_parameters_ex(dsa, num, NULL, 0, NULL, NULL, 181 DSA_free(dsa); 187 dh = DSA_dup_DH(dsa); 218 DSA *dsa; local [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/dsa/ |
| dsa_pmeth.c | 19 /* DSA pkey context structure */ 78 DSA *dsa = ctx->pkey->pkey.dsa; local 83 ret = DSA_sign(0, tbs, tbslen, sig, &sltmp, dsa); 97 DSA *dsa = ctx->pkey->pkey.dsa; local 102 ret = DSA_verify(0, tbs, tbslen, sig, siglen, dsa); 197 DSA *dsa = NULL local 226 DSA *dsa = NULL; local [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| dsa_no_digest_size_test.c | 20 #include <openssl/dsa.h> 22 static DSA *dsakey; 28 static DSA *load_dsa_params(void) 92 DSA *dsa = DSA_new(); local 95 if (dsa == NULL) 97 if (!DSA_set0_pqg(dsa, p = BN_bin2bn(dsap_2048, sizeof(dsap_2048), NULL), 100 DSA_free(dsa); 106 return dsa; 186 /* Verify again using the raw DSA interface * [all...] |
| dsatest.c | 19 #include <openssl/dsa.h> 69 DSA *dsa = NULL; local 81 if (!TEST_ptr(dsa = DSA_new()) 82 || !TEST_true(DSA_generate_parameters_ex(dsa, 512, seed, 20, 91 DSA_get0_pqg(dsa, &p, &q, &g); 107 DSA_generate_key(dsa); 108 DSA_sign(0, str1, 20, sig, &siglen, dsa); 109 if (TEST_true(DSA_verify(0, str1, 20, sig, siglen, dsa))) 113 DSA_free(dsa); [all...] |
| /src/external/cddl/osnet/dist/uts/common/fs/zfs/ |
| vdev_disk.c | 152 struct disk_sectoralign dsa; local 280 if (VOP_IOCTL(vp, DIOCGSECTORALIGN, &dsa, FREAD, NOCRED) == 0) { 281 *pashift = highbit(dsa.dsa_alignment * secsize) - 1; 282 if (dsa.dsa_firstaligned % dsa.dsa_alignment) 286 dsa.dsa_alignment, dsa.dsa_firstaligned);
|
| /src/sys/ddb/ |
| db_sym.c | 148 struct db_sift_args *dsa; local 150 dsa = (struct db_sift_args*)arg; 152 find = dsa->symstr; /* String we're looking for. */ 166 if (dsa->mode=='F') /* ala ls -F */ 190 struct db_sift_args dsa; local 193 dsa.symstr = symstr; 194 dsa.mode = mode; 195 (*db_symformat->sym_forall)(NULL, db_sift, &dsa);
|
| /src/sys/dev/ic/ |
| esiopvar.h | 38 uint32_t dsa; /* DSA of the xfer. The first 2 bits holds flags */ member in struct:esiop_slot 80 /* DSA table descriptor for tags. Free tables are in a list */ 84 uint32_t tbl_dsa; /* DSA of base of this table */ 89 /* DSA table block descriptor. */ 106 struct esiop_dsatbl *lun_tagtbl; /* the tag DSA table */ 116 uint32_t lun_table_offset; /* pointer to our DSA table */ 126 offset = esiop_cmd->cmd_c.dsa - 142 struct tbl_list free_tagtbl; /* list of free tag DSA tables */ 143 struct tblblk_list tag_tblblk; /* tag DSA table blocks * [all...] |
| /src/sys/kern/ |
| subr_disk.c | 666 struct disk_sectoralign * const dsa = data; local 669 dsa->dsa_alignment = MAX(1u, dk->dk_geom.dg_physsecsize / 671 dsa->dsa_firstaligned = dk->dk_geom.dg_alignedsec; 676 uint32_t r = offset % dsa->dsa_alignment; 678 if (r <= dsa->dsa_firstaligned) 679 dsa->dsa_firstaligned -= r; 681 dsa->dsa_firstaligned += dsa->dsa_alignment - r; 683 dsa->dsa_firstaligned %= dsa->dsa_alignment [all...] |
| /src/crypto/external/bsd/netpgp/dist/src/netpgpverify/ |
| rsa.h | 65 PGPV_BIGNUM *p; /* DSA public modulus n */ 66 PGPV_BIGNUM *q; /* DSA public encryption exponent e */ 113 netpgpv_dsa_pubkey_t dsa; /* specific DSA keys */ member in struct:pubkey_t 126 netpgpv_dsasig_t dsa; /* DSA signature */ member in struct:signature_t 154 void netpgpv_DSA_free(NETPGPV_DSA */*dsa*/); 158 NETPGPV_DSA_SIG */*sig*/, NETPGPV_DSA */*dsa*/); 160 int /*dlen*/, NETPGPV_DSA */*dsa*/);
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/signature/ |
| dsa_sig.c | 11 * DSA low level APIs are deprecated for public use, but still ok for 22 #include <openssl/dsa.h> 34 #include "crypto/dsa.h" 61 * We happen to know that our KEYMGMT simply passes DSA structures, so 68 DSA *dsa; member in struct:__anon1622 171 && ossl_DER_w_algorithmIdentifier_DSA_with_MD(&pkt, -1, ctx->dsa, 195 if (vdsa == NULL && pdsactx->dsa == NULL) { 208 DSA_free(pdsactx->dsa); 209 pdsactx->dsa = vdsa [all...] |