Home
last modified time | relevance | path

Searched refs:RSA (Results 1 - 23 of 23) sorted by relevance

/base/security/crypto_framework/plugin/openssl_plugin/common/src/
H A Drsa_openssl_common.c20 static RSA *DuplicateRsaPriKeyForSpec(const RSA *rsa) in DuplicateRsaPriKeyForSpec()
22 RSA *tmp = OpensslRsaNew(); in DuplicateRsaPriKeyForSpec()
48 LOGE("assign RSA n, e, d failed"); in DuplicateRsaPriKeyForSpec()
58 HcfResult DuplicateRsa(RSA *rsa, bool needPrivate, RSA **dupRsa) in DuplicateRsa()
60 RSA *retRSA = NULL; in DuplicateRsa()
75 LOGD("[error] Duplicate RSA fail."); in DuplicateRsa()
83 EVP_PKEY *NewEvpPkeyByRsa(RSA *rsa, bool withDuplicate) in NewEvpPkeyByRsa()
86 LOGE("RSA i in NewEvpPkeyByRsa()
[all...]
/base/security/crypto_framework/plugin/openssl_plugin/common/inc/
H A Drsa_openssl_common.h28 #define RSA_ALG_NAME "RSA"
30 HcfResult DuplicateRsa(RSA *rsa, bool needPrivate, RSA **dupRsa);
32 EVP_PKEY *NewEvpPkeyByRsa(RSA *rsa, bool withDuplicate);
H A Dopenssl_adapter.h193 RSA *OpensslRsaNew(void);
194 void OpensslRsaFree(RSA *rsa);
195 int OpensslRsaGenerateMultiPrimeKey(RSA *rsa, int bits, int primes,
197 int OpensslRsaGenerateKeyEx(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb);
198 int OpensslRsaBits(const RSA *rsa);
199 int OpensslRsaSet0Key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d);
200 void OpensslRsaGet0Key(const RSA *r, const BIGNUM **n, const BIGNUM **e, const BIGNUM **d);
201 const BIGNUM *OpensslRsaGet0N(const RSA *d);
202 const BIGNUM *OpensslRsaGet0E(const RSA *d);
203 const BIGNUM *OpensslRsaGet0D(const RSA *
[all...]
H A Dopenssl_class.h61 RSA *pk;
63 #define OPENSSL_RSA_PUBKEY_CLASS "OPENSSL.RSA.PUB_KEY"
70 RSA *sk;
72 #define OPENSSL_RSA_PRIKEY_CLASS "OPENSSL.RSA.PRI_KEY"
77 #define OPENSSL_RSA_KEYPAIR_CLASS "OPENSSL.RSA.KEY_PAIR"
172 #define OPENSSL_RSA_CIPHER_CLASS "OPENSSL.RSA.CIPHER"
/base/security/certificate_framework/frameworks/adapter/v1.0/inc/
H A Dcertificate_openssl_class.h37 RSA *pk;
39 #define OPENSSL_RSA_PUBKEY_CLASS "OPENSSL.RSA.PUB_KEY"
46 RSA *sk;
48 #define OPENSSL_RSA_PRIKEY_CLASS "OPENSSL.RSA.PRI_KEY"
/base/security/crypto_framework/plugin/openssl_plugin/key/asy_key_generator/src/
H A Drsa_asy_key_generator_openssl.c193 LOGD("[error] fail get RSA Big Integer n"); in GetRsaPriKeySpecBigInteger()
204 LOGE("fail get RSA Big Integer d"); in GetRsaPriKeySpecBigInteger()
208 LOGE("Invalid RSA pri key spec"); in GetRsaPriKeySpecBigInteger()
235 LOGE("fail get RSA Big Integer n"); in GetRsaPubKeySpecBigInteger()
246 LOGE("fail get RSA Big Integer e"); in GetRsaPubKeySpecBigInteger()
250 LOGE("Invalid RSA pub key spec"); in GetRsaPubKeySpecBigInteger()
366 static HcfResult ConvertPubKeyFromX509(HcfBlob *x509Blob, RSA **rsa) in ConvertPubKeyFromX509()
369 RSA *tempRsa = OpensslD2iRsaPubKey(NULL, (const unsigned char **)&temp, x509Blob->len); in ConvertPubKeyFromX509()
378 static HcfResult ConvertPriKeyFromPKCS8(HcfBlob *pkcs8Blob, RSA **rsa) in ConvertPriKeyFromPKCS8()
387 RSA *tmpRs in ConvertPriKeyFromPKCS8()
[all...]
/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/src/
H A Dopenssl_rsa_helper.c75 RSA *rsa = RSA_new(); in GenerateRsaKey()
133 const RSA *rsa = EVP_PKEY_get0_RSA(pkey); in X509ToRsaPublicKey()
163 static RSA *InitRsa(struct HksBlob *key, const bool needPrivateExponent) in InitRsa()
192 RSA *rsa = RSA_new(); in InitRsa()
239 RSA *rsa = InitRsa(key, false); in EncryptRsa()
287 RSA *rsa = InitRsa(key, true); in DecryptRsa()
342 RSA *rsa = InitRsa(key, true); in InitRsaCtx()
425 RSA *rsa = InitRsa(key, true); in OpensslSignRsa()
488 RSA *rsa = InitRsa(key, false); in OpensslVerifyRsa()
/base/security/crypto_framework/test/unittest/src/
H A Dopenssl_adapter_mock.c1082 RSA *OpensslRsaNew(void) in OpensslRsaNew()
1087 void OpensslRsaFree(RSA *rsa) in OpensslRsaFree()
1094 int OpensslRsaGenerateMultiPrimeKey(RSA *rsa, int bits, int primes, in OpensslRsaGenerateMultiPrimeKey()
1100 int OpensslRsaGenerateKeyEx(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb) in OpensslRsaGenerateKeyEx()
1105 int OpensslRsaBits(const RSA *rsa) in OpensslRsaBits()
1110 int OpensslRsaSet0Key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d) in OpensslRsaSet0Key()
1115 void OpensslRsaGet0Key(const RSA *r, const BIGNUM **n, const BIGNUM **e, const BIGNUM **d) in OpensslRsaGet0Key()
1120 const BIGNUM *OpensslRsaGet0N(const RSA *d) in OpensslRsaGet0N()
1125 const BIGNUM *OpensslRsaGet0E(const RSA *d) in OpensslRsaGet0E()
1130 const BIGNUM *OpensslRsaGet0D(const RSA *
[all...]
H A Dcrypto_common_cov_test.cpp209 RSA *rsa = OpensslRsaNew(); in HWTEST_F()
/base/hiviewdfx/hiview/core/param_update/include/
H A Dlog_sign_tools.h46 static bool VerifyRsa(RSA *rsa, const std::string &digest, const std::string &sign);
/base/global/i18n/frameworks/intl/include/
H A Dsignature_verifier.h41 static bool VerifyRsa(RSA* pubkey, const std::string& digest, const std::string& sign);
/base/hiviewdfx/hiview/core/param_update/src/
H A Dlog_sign_tools.cpp54 RSA *pubKey = RSA_new(); in VerifyFileSign()
128 bool LogSignTools::VerifyRsa(RSA *pubKey, const std::string &digest, const std::string &sign) in VerifyRsa()
139 HIVIEW_LOGE("set RSA failed."); in VerifyRsa()
/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/
H A Dhks_openssl_rsa.c100 static RSA *InitRsaStruct(const struct HksBlob *key, const bool needPrivateExponent) in InitRsaStruct()
125 RSA *rsa = NULL; in InitRsaStruct()
180 static int32_t RsaSaveKeyMaterial(const RSA *rsa, const uint32_t keySize, struct HksBlob *key) in RsaSaveKeyMaterial()
231 RSA *rsa = RSA_new(); in HksOpensslRsaGenerateKey()
315 RSA *rsa = InitRsaStruct(key, !encrypt); in InitEvpPkeyCtx()
487 RSA *rsa = InitRsaStruct(key, signing); in InitRsaEvpKey()
/base/update/updater/services/package/pkg_algorithm/
H A Dpkg_algo_sign.h39 RSA *rsa;
H A Dpkg_algo_sign.cpp54 RSA *rsa = PEM_read_bio_RSAPrivateKey(in, nullptr, nullptr, nullptr); in SignBuffer()
/base/global/i18n/frameworks/intl/src/
H A Dsignature_verifier.cpp173 RSA* pubkey = RSA_new(); in VerifyFileSign()
188 bool SignatureVerifier::VerifyRsa(RSA* pubkey, const std::string& digest, const std::string& sign) in VerifyRsa()
/base/security/certificate_manager/services/cert_manager_standard/cert_manager_engine/main/core/src/
H A Dcert_manager_app_cert_process.c138 static int32_t SaveKeyMaterialRsa(const RSA *rsa, const uint32_t keySize, struct CmBlob *keyOut) in SaveKeyMaterialRsa()
237 const RSA *rsa = EVP_PKEY_get0_RSA((EVP_PKEY *)priKey); in ImportRsaKey()
/base/security/crypto_framework/plugin/openssl_plugin/crypto_operation/cipher/src/
H A Dcipher_rsa_openssl.c66 static HcfResult DuplicateRsaFromKey(HcfKey *key, enum HcfCryptoMode opMode, RSA **dupRsa) in DuplicateRsaFromKey()
72 LOGD("[error] dup pub RSA fail."); in DuplicateRsaFromKey()
79 LOGD("[error] dup pri RSA fail."); in DuplicateRsaFromKey()
91 RSA *rsa = NULL; in InitEvpPkeyCtx()
197 // The EVP_PKEY_CTX_set0_rsa_oaep_label() macro sets the RSA OAEP label to label and its length to len.
385 LOGD("[error] RSA openssl error"); in DoRsaCrypt()
465 // cannot use pss padding mode in RSA cipher. in CheckRsaCipherParams()
/base/update/packaging_tools/
H A Dupdate_package.py61 RSA = 1 variable in SignMethod
233 # signing algorithm use RSA
234 head_list.sign_method = SignMethod.RSA.value
/base/security/huks/utils/crypto_adapter/
H A Dhks_client_service_adapter.c82 RSA *rsa = NULL; in RsaToX509PublicKey()
453 const RSA *rsa = EVP_PKEY_get0_RSA(pkey); in X509PublicKeyToRsa()
464 /* n and e in RSA algorithm is small, will never overflow. */ in X509PublicKeyToRsa()
/base/security/certificate_framework/test/fuzztest/v1.0/x509crl_fuzzer/
H A Dx509crl_fuzzer.cpp115 RSA *rsaPrikey = (reinterpret_cast<HcfOpensslRsaPriKey *>(g_keyPair->priKey))->sk; in GetCrlStream()
/base/security/crypto_framework/plugin/openssl_plugin/crypto_operation/signature/src/
H A Dsignature_rsa_openssl.c147 RSA *rsa = NULL; in InitRsaEvpKey()
151 LOGE("dup pri RSA fail"); in InitRsaEvpKey()
156 LOGE("dup pub RSA fail"); in InitRsaEvpKey()
/base/security/certificate_framework/frameworks/adapter/v1.0/src/
H A Dx509_crl_openssl.c167 RSA *rsaPubkey = ((HcfOpensslRsaPubKey *)key)->pk; in Verify()

Completed in 17 milliseconds