Home
last modified time | relevance | path

Searched refs:rsa_key_ (Results 1 – 5 of 5) sorted by relevance

/system/keymaster/
Drsa_key.cpp28 rsa_key_.reset(EVP_PKEY_get1_RSA(const_cast<EVP_PKEY*>(pkey))); in EvpToInternal()
29 return rsa_key_.get() != NULL; in EvpToInternal()
33 return EVP_PKEY_set1_RSA(pkey, rsa_key_.get()) == 1; in InternalToEvp()
Drsa_key.h42 RSA* key() const { return rsa_key_.get(); } in key()
47 : AsymmetricKey(hw_enforced, sw_enforced, error), rsa_key_(rsa) {} in RsaKey()
50 UniquePtr<RSA, RSA_Delete> rsa_key_;
Drsa_operation.cpp135 if (rsa_key_ != NULL) in ~RsaOperation()
136 EVP_PKEY_free(rsa_key_); in ~RsaOperation()
162 if (!data_.reserve(EVP_PKEY_size(rsa_key_))) in StoreData()
167 input.available_read() + data_.available_read(), EVP_PKEY_size(rsa_key_)); in StoreData()
249 if (EVP_MD_size(digest_algorithm_) * 2 + kPssOverhead > (size_t)EVP_PKEY_size(rsa_key_)) { in GetOpensslPadding()
252 EVP_MD_size(digest_algorithm_), EVP_PKEY_size(rsa_key_)); in GetOpensslPadding()
273 rsa_key_) != 1) in Begin()
323 UniquePtr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(const_cast<EVP_PKEY*>(rsa_key_))); in SignUndigested()
330 size_t key_len = EVP_PKEY_size(rsa_key_); in SignUndigested()
352 data_.available_read(), EVP_PKEY_size(rsa_key_) * 8); in SignUndigested()
[all …]
Drsa_keymaster1_operation.h66 keymaster_error_t error = wrapped_operation_.Begin(super::rsa_key_, input_params); in Begin()
75 keymaster_error_t error = wrapped_operation_.PrepareFinish(super::rsa_key_, input_params); in Finish()
79 if (wrapped_operation_.GetError(super::rsa_key_) != KM_ERROR_OK) in Finish()
80 error = wrapped_operation_.GetError(super::rsa_key_); in Finish()
Drsa_operation.h38 : Operation(purpose), rsa_key_(key), padding_(padding), digest_(digest), in RsaOperation()
60 EVP_PKEY* rsa_key_; variable