/freebsd/crypto/openssl/crypto/dsa/ |
H A D | dsa_ossl.c | 11 * DSA low level APIs are deprecated for public use, but still ok for 27 static DSA_SIG *dsa_do_sign(const unsigned char *dgst, int dlen, DSA *dsa); 28 static int dsa_sign_setup_no_digest(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, 30 static int dsa_sign_setup(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, 33 DSA_SIG *sig, DSA *dsa); 34 static int dsa_init(DSA *ds 73 ossl_dsa_do_sign_int(const unsigned char * dgst,int dlen,DSA * dsa) ossl_dsa_do_sign_int() argument 198 dsa_do_sign(const unsigned char * dgst,int dlen,DSA * dsa) dsa_do_sign() argument 203 dsa_sign_setup_no_digest(DSA * dsa,BN_CTX * ctx_in,BIGNUM ** kinvp,BIGNUM ** rp) dsa_sign_setup_no_digest() argument 209 dsa_sign_setup(DSA * dsa,BN_CTX * ctx_in,BIGNUM ** kinvp,BIGNUM ** rp,const unsigned char * dgst,int dlen) dsa_sign_setup() argument 334 dsa_do_verify(const unsigned char * dgst,int dgst_len,DSA_SIG * sig,DSA * dsa) dsa_do_verify() argument 441 dsa_init(DSA * dsa) dsa_init() argument 448 dsa_finish(DSA * dsa) dsa_finish() argument [all...] |
H A D | dsa_ameth.c | 11 * DSA low level APIs are deprecated for public use, but still ok for 24 #include "crypto/dsa.h" 39 DSA *dsa = NULL; in dsa_pub_decode() local 50 if ((dsa = d2i_DSAparams(NULL, &pm, pmlen)) == NULL) { in dsa_pub_decode() 56 if ((dsa = DSA_new()) == NULL) { in dsa_pub_decode() 70 if ((dsa->pub_key = ASN1_INTEGER_to_BN(public_key, NULL)) == NULL) { in dsa_pub_decode() 75 dsa->dirty_cnt++; in dsa_pub_decode() 77 EVP_PKEY_assign_DSA(pkey, dsa); in dsa_pub_decode() 82 DSA_free(dsa); in dsa_pub_decode() 89 DSA *dsa; in dsa_pub_encode() local [all …]
|
H A D | dsa_key.c | 11 * DSA low level APIs are deprecated for public use, but still ok for 22 #include "crypto/dsa.h" 31 static int dsa_keygen(DSA *dsa, int pairwise_test); 32 static int dsa_keygen_pairwise_test(DSA *dsa, OSSL_CALLBACK *cb, void *cbarg); 34 int DSA_generate_key(DSA *dsa) in DSA_generate_key() argument 37 if (dsa->meth->dsa_keygen != NULL) in DSA_generate_key() 38 return dsa->meth->dsa_keygen(dsa); in DSA_generate_key() 40 return dsa_keygen(dsa, 0); in DSA_generate_key() 43 int ossl_dsa_generate_public_key(BN_CTX *ctx, const DSA *dsa, in ossl_dsa_generate_public_key() argument 54 if (!BN_mod_exp(pub_key, dsa->params.g, prk, dsa->params.p, ctx)) in ossl_dsa_generate_public_key() [all …]
|
H A D | dsa_lib.c | 11 * DSA low level APIs are deprecated for public use, but still ok for 22 #include "crypto/dsa.h" 26 static DSA *dsa_new_intern(ENGINE *engine, OSSL_LIB_CTX *libctx); 30 int DSA_set_ex_data(DSA *d, int idx, void *arg) in DSA_set_ex_data() 35 void *DSA_get_ex_data(const DSA *d, int idx) in DSA_get_ex_data() 41 DH *DSA_dup_DH(const DSA *r) in DSA_dup_DH() 44 * DSA has p, q, g, optional pub_key, optional priv_key. in DSA_dup_DH() 86 void DSA_clear_flags(DSA *d, int flags) in DSA_clear_flags() 91 int DSA_test_flags(const DSA *d, int flags) in DSA_test_flags() 96 void DSA_set_flags(DSA *d, int flags) in DSA_set_flags() [all …]
|
H A D | dsa_check.c | 11 * DSA low level APIs are deprecated for public use, but still ok for 20 #include "crypto/dsa.h" 22 static int dsa_precheck_params(const DSA *dsa, int *ret) in ossl_dsa_check_params() argument 24 if (dsa->params.p == NULL || dsa->params.q == NULL) { in ossl_dsa_check_params() 30 if (BN_num_bits(dsa->params.p) > OPENSSL_DSA_MAX_MODULUS_BITS) { in ossl_dsa_check_params() 36 if (BN_num_bits(dsa->params.q) >= BN_num_bits(dsa->params.p)) { 45 int ossl_dsa_check_params(const DSA *ds in ossl_dsa_check_pub_key() 40 ossl_dsa_check_pub_key(const DSA * dsa,const BIGNUM * pub_key,int * ret) ossl_dsa_check_pub_key() argument 51 ossl_dsa_check_pub_key_partial(const DSA * dsa,const BIGNUM * pub_key,int * ret) ossl_dsa_check_pub_key_partial() argument 57 ossl_dsa_check_priv_key(const DSA * dsa,const BIGNUM * priv_key,int * ret) ossl_dsa_check_priv_key() argument 69 ossl_dsa_check_pairwise(const DSA * dsa) ossl_dsa_check_pairwise() argument [all...] |
H A D | dsa_asn1.c | 11 * DSA low level APIs are deprecated for public use, but still ok for 34 DSA_free((DSA *)*pval); in dsa_cb() 42 ASN1_EMBED(DSA, version, INT32), 43 ASN1_SIMPLE(DSA, params.p, BIGNUM), 44 ASN1_SIMPLE(DSA, params.q, BIGNUM), 45 ASN1_SIMPLE(DSA, params.g, BIGNUM), 46 ASN1_SIMPLE(DSA, pub_key, BIGNUM), 47 ASN1_SIMPLE(DSA, priv_key, CBIGNUM) 48 } static_ASN1_SEQUENCE_END_cb(DSA, DSAPrivateKey) 50 IMPLEMENT_ASN1_ENCODE_FUNCTIONS_fname(DSA, DSAPrivateKey, DSAPrivateKey) [all …]
|
H A D | dsa_backend.c | 11 * DSA low level APIs are deprecated for public use, but still ok for 21 #include "crypto/dsa.h" 30 int ossl_dsa_key_fromdata(DSA *dsa, const OSSL_PARAM params[], in ossl_dsa_key_fromdata() argument 36 if (dsa == NULL) in ossl_dsa_key_fromdata() 55 if (!DSA_set0_key(dsa, pub_key, priv_key)) in ossl_dsa_key_fromdata() 66 int ossl_dsa_is_foreign(const DSA *dsa) in ossl_dsa_is_foreign() argument 69 if (dsa->engine != NULL || DSA_get_method((DSA *)dsa) != DSA_OpenSSL()) in ossl_dsa_is_foreign() 82 DSA *ossl_dsa_dup(const DSA *dsa, int selection) in ossl_dsa_dup() argument 84 DSA *dupkey = NULL; in ossl_dsa_dup() 86 /* Do not try to duplicate foreign DSA keys */ in ossl_dsa_dup() [all …]
|
H A D | dsa_local.h | 10 #include <openssl/dsa.h> 16 * This first variable is used to pick up errors where a DSA is passed 48 DSA_SIG *(*dsa_do_sign) (const unsigned char *dgst, int dlen, DSA *dsa); 49 int (*dsa_sign_setup) (DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, 52 DSA_SIG *sig, DSA *dsa); 53 int (*dsa_mod_exp) (DSA *dsa, BIGNUM *rr, const BIGNUM *a1, 57 int (*bn_mod_exp) (DSA *dsa, BIGNUM *r, const BIGNUM *a, const BIGNUM *p, 59 int (*init) (DSA *dsa); 60 int (*finish) (DSA *dsa); 63 /* If this is non-NULL, it is used to generate DSA parameters */ [all …]
|
H A D | dsa_gen.c | 11 * DSA low level APIs are deprecated for public use, but still ok for 23 #include "crypto/dsa.h" 26 int ossl_dsa_generate_ffc_parameters(DSA *dsa, int type, int pbits, int qbits, in ossl_dsa_generate_ffc_parameters() argument 33 ret = ossl_ffc_params_FIPS186_2_generate(dsa->libctx, &dsa->params, in ossl_dsa_generate_ffc_parameters() 38 ret = ossl_ffc_params_FIPS186_4_generate(dsa->libctx, &dsa->params, in ossl_dsa_generate_ffc_parameters() 42 dsa->dirty_cnt++; in ossl_dsa_generate_ffc_parameters() 47 int DSA_generate_parameters_ex(DSA *dsa, int bits, in DSA_generate_parameters_ex() argument 52 if (dsa->meth->dsa_paramgen) in DSA_generate_parameters_ex() 53 return dsa->meth->dsa_paramgen(dsa, bits, seed_in, seed_len, in DSA_generate_parameters_ex() 56 && !ossl_ffc_params_set_validate_params(&dsa->params, seed_in, seed_len, in DSA_generate_parameters_ex() [all …]
|
H A D | dsa_sign.c | 11 * DSA low level APIs are deprecated for public use, but still ok for 20 #include "crypto/dsa.h" 22 DSA_SIG *DSA_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) in DSA_do_sign() argument 24 return dsa->meth->dsa_do_sign(dgst, dlen, dsa); in DSA_do_sign() 28 int DSA_sign_setup(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp) in DSA_sign_setup() argument 30 return dsa->meth->dsa_sign_setup(dsa, ctx_i in DSA_sign_setup() 120 DSA_size(const DSA * dsa) DSA_size() argument 155 ossl_dsa_sign_int(int type,const unsigned char * dgst,int dlen,unsigned char * sig,unsigned int * siglen,DSA * dsa) ossl_dsa_sign_int() argument 174 DSA_sign(int type,const unsigned char * dgst,int dlen,unsigned char * sig,unsigned int * siglen,DSA * dsa) DSA_sign() argument 187 DSA_verify(int type,const unsigned char * dgst,int dgst_len,const unsigned char * sigbuf,int siglen,DSA * dsa) DSA_verify() argument [all...] |
/freebsd/crypto/openssl/include/openssl/ |
H A D | dsa.h | 80 * If this flag is set the DSA method is FIPS compliant and can be used in 98 /* typedef struct dsa_st DSA; */ 102 (DSA *)ASN1_d2i_fp((char *(*)())DSA_new, \ 108 ASN1_d2i_bio_of(DSA, DSA_new, d2i_DSAparams, bp, x) 110 ASN1_i2d_bio_of(DSA, i2d_DSAparams, bp, x) 112 DECLARE_ASN1_DUP_FUNCTION_name_attr(OSSL_DEPRECATEDIN_3_0, DSA, DSAparams) 114 DSA *dsa); 116 DSA_SIG *sig, DSA *dsa); 122 OSSL_DEPRECATEDIN_3_0 int DSA_set_method(DSA *dsa, const DSA_METHOD *); 123 OSSL_DEPRECATEDIN_3_0 const DSA_METHOD *DSA_get_method(DSA *d); [all …]
|
/freebsd/crypto/openssl/include/crypto/ |
H A D | dsa.h | 15 # include <openssl/dsa.h> 22 DSA *ossl_dsa_new(OSSL_LIB_CTX *libctx); 23 void ossl_dsa_set0_libctx(DSA *d, OSSL_LIB_CTX *libctx); 25 int ossl_dsa_generate_ffc_parameters(DSA *dsa, int type, int pbits, int qbits, 29 unsigned char *sig, unsigned int *siglen, DSA *dsa); 31 FFC_PARAMS *ossl_dsa_get0_params(DSA *dsa); 32 int ossl_dsa_ffc_params_fromdata(DSA *dsa, const OSSL_PARAM params[]); 33 int ossl_dsa_key_fromdata(DSA *dsa, const OSSL_PARAM params[], 35 DSA *ossl_dsa_key_from_pkcs8(const PKCS8_PRIV_KEY_INFO *p8inf, 38 int ossl_dsa_generate_public_key(BN_CTX *ctx, const DSA *dsa, [all …]
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_dsa.txt | 17 # DSA key 18 PrivateKey=DSA-1024 29 PublicKey=DSA-1024-PUBLIC 43 PrivPubKeyPair = DSA-1024:DSA-1024-PUBLIC 45 Title = DSA tests 47 Verify = DSA-1024 52 Verify = DSA-1024-PUBLIC 58 Verify = DSA-1024-PUBLIC 65 Verify = DSA-1024-PUBLIC 72 Verify = DSA-1024-PUBLIC [all …]
|
/freebsd/crypto/openssl/providers/implementations/keymgmt/ |
H A D | dsa_kmgmt.c | 11 * DSA low level APIs are deprecated for public use, but still ok for 23 #include "crypto/dsa.h" 98 static int dsa_key_todata(DSA *dsa, OSSL_PARAM_BLD *bld, OSSL_PARAM params[], in dsa_key_todata() argument 103 if (dsa == NULL) in dsa_key_todata() 106 DSA_get0_key(dsa, &pub, &priv); in dsa_key_todata() 132 const DSA *dsa = keydata; in dsa_has() local 135 if (!ossl_prov_is_running() || dsa == NULL) in dsa_has() 141 ok = ok && (DSA_get0_pub_key(dsa) != NULL); in dsa_has() 143 ok = ok && (DSA_get0_priv_key(dsa) != NULL); in dsa_has() 145 ok = ok && (DSA_get0_p(dsa) != NULL && DSA_get0_g(dsa) != NULL); in dsa_has() [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | DSA_meth_new.pod | 13 DSA_meth_set_keygen - Routines to build up DSA methods 17 #include <openssl/dsa.h> 39 int, DSA *); 41 int, DSA *)); 43 int (*DSA_meth_get_sign_setup(const DSA_METHOD *dsam))(DSA *, BN_CTX *,$ 45 int DSA_meth_set_sign_setup(DSA_METHOD *dsam, int (*sign_setup)(DSA *, BN_CTX *, 49 int, DSA_SIG *, DSA *); 51 int, DSA_SIG *, DSA *)); 53 int (*DSA_meth_get_mod_exp(const DSA_METHOD *dsam))(DSA *dsa, BIGNUM *rr, BIGNUM *a1, 57 int DSA_meth_set_mod_exp(DSA_METHOD *dsam, int (*mod_exp)(DSA *dsa, BIGNUM *rr, [all …]
|
H A D | DSA_get0_pqg.pod | 10 setting data in a DSA object 14 #include <openssl/dsa.h> 20 void DSA_get0_pqg(const DSA *d, 22 int DSA_set0_pqg(DSA *d, BIGNUM *p, BIGNUM *q, BIGNUM *g); 23 void DSA_get0_key(const DSA *d, 25 int DSA_set0_key(DSA *d, BIGNUM *pub_key, BIGNUM *priv_key); 26 const BIGNUM *DSA_get0_p(const DSA *d); 27 const BIGNUM *DSA_get0_q(const DSA *d); 28 const BIGNUM *DSA_get0_g(const DSA *d); 29 const BIGNUM *DSA_get0_pub_key(const DSA *d); [all …]
|
H A D | DSA_size.pod | 5 DSA_size, DSA_bits, DSA_security_bits - get DSA signature size, key bits or security bits 9 #include <openssl/dsa.h> 15 int DSA_bits(const DSA *dsa); 17 int DSA_size(const DSA *dsa); 19 int DSA_security_bits(const DSA *dsa); 27 DSA_bits() returns the number of bits in key I<dsa>: this is the number 30 DSA_size() returns the maximum size of an ASN.1 encoded DSA signature 31 for key I<dsa> in bytes. It can be used to determine how much memory must 32 be allocated for a DSA signature. 34 DSA_security_bits() returns the number of security bits of the given I<dsa> [all …]
|
/freebsd/crypto/openssl/test/recipes/ |
H A D | 15-test_gendsa.t | 24 plan skip_all => "This test is unsupported in a no-dsa build" 25 if disabled("dsa"); 34 '-algorithm', 'DSA', 38 "genpkey DSA params fips186_4 with verifiable g"); 41 '-algorithm', 'DSA', 44 "genpkey DSA params fips186_4 with unverifiable g"); 47 '-algorithm', 'DSA', 52 "genpkey DSA params fips186_4 with truncated SHA"); 55 '-algorithm', 'DSA', 58 "genpkey DSA params fips186_2"); [all …]
|
H A D | 15-test_dsaparam.t | 27 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi… 28 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi… 29 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi… 30 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:3072 -pkeyopt qbi… 32 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi… 33 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi… 34 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi… 35 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:3072 -pkeyopt qbi… 37 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi… 38 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi… [all …]
|
H A D | 04-test_pem_reading.t | 56 "dsa-1023line.pem" => 0, 57 "dsa-1024line.pem" => 0, 58 "dsa-1025line.pem" => 0, 59 "dsa-255line.pem" => 0, 60 "dsa-256line.pem" => 0, 61 "dsa-257line.pem" => 0, 62 "dsa-blankline.pem" => 0, 63 "dsa-comment.pem" => 0, 64 "dsa-corruptedheader.pem" => 0, 65 "dsa-corruptiv.pem" => 0, [all …]
|
H A D | 15-test_dsa.t | 19 plan skip_all => 'DSA is not supported in this build' if disabled('dsa'); 28 subtest "dsa conversions using 'openssl dsa' -- private key" => sub { 29 tconversion( -type => 'dsa', -prefix => 'dsa-priv', 32 subtest "dsa conversions using 'openssl dsa' -- public key" => sub { 33 tconversion( -type => 'msb', -prefix => 'dsa-msb-pub', 35 -args => ["dsa", "-pubin", "-pubout"] ); 38 subtest "dsa conversions using 'openssl pkey' -- private key PKCS#8" => sub { 39 tconversion( -type => 'dsa', -prefix => 'dsa-pkcs8', 43 subtest "dsa conversions using 'openssl pkey' -- public key" => sub { 44 tconversion( -type => 'dsa', -prefix => 'dsa-pkey-pub',
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | DSA_meth_new.3 | 148 DSA_meth_set_keygen \- Routines to build up DSA methods 152 \& #include <openssl/dsa.h> 176 \& int, DSA *); 178 \& int, DSA *)); 180 \& int (*DSA_meth_get_sign_setup(const DSA_METHOD *dsam))(DSA *, BN_CTX *,$ 182 \& int DSA_meth_set_sign_setup(DSA_METHOD *dsam, int (*sign_setup)(DSA *, BN_CTX *, 186 \& int, DSA_SIG *, DSA *); 188 \& int, DSA_SIG *, DSA *)); 190 \& int (*DSA_meth_get_mod_exp(const DSA_METHOD *dsam))(DSA *dsa, BIGNUM *rr, BIGNUM *a1, 194 \& int DSA_meth_set_mod_exp(DSA_METHOD *dsam, int (*mod_exp)(DSA *dsa, BIGNUM *rr, [all …]
|
H A D | DSA_get0_pqg.3 | 145 setting data in a DSA object 149 \& #include <openssl/dsa.h> 157 \& void DSA_get0_pqg(const DSA *d, 159 \& int DSA_set0_pqg(DSA *d, BIGNUM *p, BIGNUM *q, BIGNUM *g); 160 \& void DSA_get0_key(const DSA *d, 162 \& int DSA_set0_key(DSA *d, BIGNUM *pub_key, BIGNUM *priv_key); 163 \& const BIGNUM *DSA_get0_p(const DSA *d); 164 \& const BIGNUM *DSA_get0_q(const DSA *d); 165 \& const BIGNUM *DSA_get0_g(const DSA *d); 166 \& const BIGNUM *DSA_get0_pub_key(const DSA *d); [all …]
|
/freebsd/crypto/openssl/crypto/pem/ |
H A D | pem_all.c | 11 * DSA low level APIs are deprecated for public use, but still ok for 24 #include <openssl/dsa.h> 30 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa); 48 * We treat RSA or DSA private keys as a special case. For private keys we in IMPLEMENT_PEM_rw() 93 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa) in IMPLEMENT_PEM_write_cb() 95 DSA *dtmp; in IMPLEMENT_PEM_write_cb() 102 if (dsa) { in IMPLEMENT_PEM_write_cb() 103 DSA_free(*dsa); in IMPLEMENT_PEM_write_cb() 104 *dsa = dtmp; in IMPLEMENT_PEM_write_cb() 109 DSA *PEM_read_bio_DSAPrivateKey(BIO *bp, DSA **dsa, pem_password_cb *cb, in PEM_read_bio_DSAPrivateKey() argument [all …]
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_PKEY-DSA.pod | 5 EVP_PKEY-DSA, EVP_KEYMGMT-DSA - EVP_PKEY DSA keytype and algorithm support 9 For B<DSA> the FIPS186-4 standard specifies that the values used for FFC 12 and I<gindex> may need to be stored for validation purposes. For B<DSA> these 16 =head2 DSA parameters 18 The B<DSA> key type supports the FFC parameters (see 21 =head2 DSA key generation parameters 23 The B<DSA> key type supports the FFC key generation parameters (see 32 =head2 DSA key validation 34 For DSA keys, L<EVP_PKEY_param_check(3)> behaves in the following way: 40 For DSA keys, L<EVP_PKEY_param_check_quick(3)> behaves in the following way: [all …]
|