/system/security/keystore-engine/ |
H A D | dsa_meth.cpp | 124 int dsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { argument 125 Unique_DSA dsa(EVP_PKEY_get1_DSA(pkey));
|
H A D | ecdsa_meth.cpp | 124 int ecdsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { argument 125 Unique_EC_KEY eckey(EVP_PKEY_get1_EC_KEY(pkey));
|
H A D | rsa_meth.cpp | 212 int rsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { argument 213 Unique_RSA rsa(EVP_PKEY_get1_RSA(pkey));
|
/system/extras/verity/ |
H A D | generate_verity_key.c | 37 static int convert_to_mincrypt_format(RSA *rsa, RSAPublicKey *pkey) argument 60 pkey->len = RSANUMWORDS; 61 pkey->n0inv = 0 - BN_get_word(n0inv); 64 pkey->rr[i] = BN_get_word(rem); 66 pkey->n[i] = BN_get_word(rem); 68 pkey->exponent = BN_get_word(rsa->e); 86 RSAPublicKey pkey; local 94 if (convert_to_mincrypt_format(private_key, &pkey) < 0) 101 BIO_write(bfile, &pkey, sizeof(pkey)); 115 EVP_PKEY *pkey = NULL; local 177 EVP_PKEY* pkey = EVP_PKEY_new(); local [all...] |
H A D | verify_boot_signature.c | 313 EVP_PKEY *pkey = NULL; local 325 if ((pkey = X509_get_pubkey(bs->certificate)) == NULL) { 330 if ((rsa = EVP_PKEY_get1_RSA(pkey)) == NULL) { 344 if (pkey) { 345 EVP_PKEY_free(pkey);
|
/system/core/adb/ |
H A D | adb_auth_host.c | 66 static int RSA_to_RSAPublicKey(RSA *rsa, RSAPublicKey *pkey) argument 91 pkey->len = RSANUMWORDS; 92 pkey->n0inv = 0 - BN_get_word(n0inv); 95 pkey->rr[i] = BN_get_word(rem); 97 pkey->n[i] = BN_get_word(rem); 99 pkey->exponent = BN_get_word(rsa->e); 153 RSAPublicKey pkey; local 162 ret = RSA_to_RSAPublicKey(private_key, &pkey); 180 BIO_write(bio, &pkey, sizeof(pkey)); 195 EVP_PKEY* pkey = EVP_PKEY_new(); local [all...] |
/system/keymaster/ |
H A D | asymmetric_key.cpp | 59 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> pkey(EVP_PKEY_new()); 60 if (pkey.get() == NULL) 63 if (!InternalToEvp(pkey.get())) 66 *size = i2d_PrivateKey(pkey.get(), NULL /* key_data*/); 72 i2d_PrivateKey(pkey.get(), &tmp); 86 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> pkey(EVP_PKEY_new()); 87 if (!InternalToEvp(pkey.get())) 90 int key_data_length = i2d_PUBKEY(pkey.get(), NULL); 99 if (i2d_PUBKEY(pkey.get(), &tmp) != key_data_length) { 142 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> pkey(EVP_PKEY_ne 160 ImportKey(const AuthorizationSet& key_description, EVP_PKEY* pkey, const Logger& logger, keymaster_error_t* error) argument 245 EvpToInternal(const EVP_PKEY* pkey) argument 366 ImportKey(const AuthorizationSet& key_description, EVP_PKEY* pkey, const Logger& logger, keymaster_error_t* error) argument 449 EvpToInternal(const EVP_PKEY* pkey) argument 499 ImportKey(const AuthorizationSet& key_description, EVP_PKEY* pkey, const Logger& logger, keymaster_error_t* error) argument 617 EvpToInternal(const EVP_PKEY* pkey) argument [all...] |
/system/security/softkeymaster/ |
H A D | keymaster_openssl.cpp | 124 static int wrap_key(EVP_PKEY* pkey, int type, uint8_t** keyBlob, size_t* keyBlobLength) { argument 130 int privateLen = i2d_PrivateKey(pkey, NULL); 167 if (i2d_PrivateKey(pkey, &p) != privateLen) { 226 Unique_EVP_PKEY pkey(EVP_PKEY_new()); 227 if (pkey.get() == NULL) { 231 EVP_PKEY* tmp = pkey.get(); 238 return pkey.release(); 241 static int generate_dsa_keypair(EVP_PKEY* pkey, const keymaster_dsa_keygen_params_t* dsa_params) { argument 282 if (EVP_PKEY_assign_DSA(pkey, dsa.get()) == 0) { 291 static int generate_ec_keypair(EVP_PKEY* pkey, cons argument 347 generate_rsa_keypair(EVP_PKEY* pkey, const keymaster_rsa_keygen_params_t* rsa_params) argument 490 sign_dsa(EVP_PKEY* pkey, keymaster_dsa_sign_params_t* sign_params, const uint8_t* data, const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) argument 522 sign_ec(EVP_PKEY* pkey, keymaster_ec_sign_params_t* sign_params, const uint8_t* data, const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) argument 554 sign_rsa(EVP_PKEY* pkey, keymaster_rsa_sign_params_t* sign_params, const uint8_t* data, const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) argument 627 verify_dsa(EVP_PKEY* pkey, keymaster_dsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument 649 verify_ec(EVP_PKEY* pkey, keymaster_ec_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument 672 verify_rsa(EVP_PKEY* pkey, keymaster_rsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument [all...] |