/system/keymaster/ |
H A D | ec_key.cpp | 27 bool EcKey::EvpToInternal(const EVP_PKEY* pkey) { argument 28 ec_key_.reset(EVP_PKEY_get1_EC_KEY(const_cast<EVP_PKEY*>(pkey))); 32 bool EcKey::InternalToEvp(EVP_PKEY* pkey) const { 33 return EVP_PKEY_set1_EC_KEY(pkey, ec_key_.get()) == 1;
|
H A D | rsa_key.cpp | 27 bool RsaKey::EvpToInternal(const EVP_PKEY* pkey) { argument 28 rsa_key_.reset(EVP_PKEY_get1_RSA(const_cast<EVP_PKEY*>(pkey))); 32 bool RsaKey::InternalToEvp(EVP_PKEY* pkey) const { 33 return EVP_PKEY_set1_RSA(pkey, rsa_key_.get()) == 1;
|
H A D | openssl_utils.cpp | 84 UniquePtr<EVP_PKEY, EVP_PKEY_Delete>* pkey) { 93 pkey->reset(EVP_PKCS82PKEY(pkcs8.get())); 94 if (!pkey->get()) 97 if (EVP_PKEY_type((*pkey)->type) != convert_to_evp(expected_algorithm)) { 98 LOG_E("EVP key algorithm was %d, not the expected %d", EVP_PKEY_type((*pkey)->type), 109 UniquePtr<EVP_PKEY, EVP_PKEY_Delete>* pkey) { 114 expected_algorithm, pkey); 117 keymaster_error_t EvpKeyToKeyMaterial(const EVP_PKEY* pkey, KeymasterKeyBlob* key_blob) { argument 118 int key_data_size = i2d_PrivateKey(pkey, NULL /* key_data*/); 126 i2d_PrivateKey(pkey, 82 convert_pkcs8_blob_to_evp(const uint8_t* key_data, size_t key_length, keymaster_algorithm_t expected_algorithm, UniquePtr<EVP_PKEY, EVP_PKEY_Delete>* pkey) argument 106 KeyMaterialToEvpKey(keymaster_key_format_t key_format, const KeymasterKeyBlob& key_material, keymaster_algorithm_t expected_algorithm, UniquePtr<EVP_PKEY, EVP_PKEY_Delete>* pkey) argument [all...] |
H A D | asymmetric_key.h | 42 virtual bool InternalToEvp(EVP_PKEY* pkey) const = 0; 43 virtual bool EvpToInternal(const EVP_PKEY* pkey) = 0;
|
H A D | asymmetric_key_factory.cpp | 52 EVP_PKEY* pkey = local 53 d2i_PrivateKey(evp_key_type(), NULL /* pkey */, &tmp, key_material.key_material_size); 54 if (!pkey) 56 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> pkey_deleter(pkey); 58 if (!asymmetric_key->EvpToInternal(pkey))
|
H A D | ec_key.h | 35 bool InternalToEvp(EVP_PKEY* pkey) const override; 36 bool EvpToInternal(const EVP_PKEY* pkey) override;
|
H A D | rsa_key.h | 32 bool InternalToEvp(EVP_PKEY* pkey) const override; 33 bool EvpToInternal(const EVP_PKEY* pkey) override;
|
H A D | rsa_key_factory.cpp | 79 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> pkey(EVP_PKEY_new()); 80 if (exponent.get() == NULL || rsa_key.get() == NULL || pkey.get() == NULL) 87 if (EVP_PKEY_set1_RSA(pkey.get(), rsa_key.get()) != 1) 91 keymaster_error_t error = EvpKeyToKeyMaterial(pkey.get(), &key_material); 129 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> pkey; 131 KeyMaterialToEvpKey(key_format, key_material, keymaster_key_type(), &pkey); 135 UniquePtr<RSA, RsaKey::RSA_Delete> rsa_key(EVP_PKEY_get1_RSA(pkey.get()));
|
H A D | ec_key_factory.cpp | 95 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> pkey(EVP_PKEY_new()); 96 if (ec_key.get() == NULL || pkey.get() == NULL) 115 if (EVP_PKEY_set1_EC_KEY(pkey.get(), ec_key.get()) != 1) 119 error = EvpKeyToKeyMaterial(pkey.get(), &key_material); 155 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> pkey; 157 KeyMaterialToEvpKey(key_format, key_material, keymaster_key_type(), &pkey); 161 UniquePtr<EC_KEY, EC_KEY_Delete> ec_key(EVP_PKEY_get1_EC_KEY(pkey.get()));
|
H A D | ecdsa_keymaster1_operation.cpp | 91 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> pkey(EVP_PKEY_new()); 92 if (!key.InternalToEvp(pkey.get())) { 96 return pkey.release();
|
H A D | asymmetric_key.cpp | 123 EVP_PKEY_Ptr pkey(EVP_PKEY_new()); 124 if (!InternalToEvp(pkey.get())) 127 int key_data_length = i2d_PUBKEY(pkey.get(), NULL); 136 if (i2d_PUBKEY(pkey.get(), &tmp) != key_data_length) { 277 EVP_PKEY_Ptr pkey(EVP_PKEY_new()); 278 if (!InternalToEvp(pkey.get())) 336 !add_public_key(pkey.get(), certificate.get(), &error) ||
|
H A D | rsa_keymaster1_operation.cpp | 107 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> pkey(EVP_PKEY_new()); 108 if (!key.InternalToEvp(pkey.get())) { 112 return pkey.release();
|
H A D | keymaster0_engine.cpp | 191 unique_ptr<EVP_PKEY, EVP_PKEY_Delete> pkey(GetKeymaster0PublicKey(blob)); 192 if (!pkey) 194 unique_ptr<RSA, RSA_Delete> public_rsa(EVP_PKEY_get1_RSA(pkey.get())); 216 unique_ptr<EVP_PKEY, EVP_PKEY_Delete> pkey(GetKeymaster0PublicKey(blob)); 217 if (!pkey) 220 unique_ptr<EC_KEY, EC_KEY_Delete> public_ec_key(EVP_PKEY_get1_EC_KEY(pkey.get()));
|
H A D | keymaster1_engine.cpp | 154 unique_ptr<EVP_PKEY, EVP_PKEY_Delete> pkey( 156 if (!pkey) { 161 unique_ptr<RSA, RSA_Delete> public_rsa(EVP_PKEY_get1_RSA(pkey.get())); 196 unique_ptr<EVP_PKEY, EVP_PKEY_Delete> pkey( 198 if (!pkey) { 203 unique_ptr<EC_KEY, EC_KEY_Delete> public_ec_key(EVP_PKEY_get1_EC_KEY(pkey.get()));
|
H A D | openssl_utils.h | 87 UniquePtr<EVP_PKEY, EVP_PKEY_Delete>* pkey);
|
/system/extras/verity/ |
H A D | generate_verity_key.c | 40 static int convert_to_mincrypt_format(RSA *rsa, RSAPublicKey *pkey) argument 63 pkey->len = RSANUMWORDS; 64 pkey->n0inv = 0 - BN_get_word(n0inv); 67 pkey->rr[i] = BN_get_word(rem); 69 pkey->n[i] = BN_get_word(rem); 71 pkey->exponent = BN_get_word(rsa->e); 89 RSAPublicKey pkey; local 97 if (convert_to_mincrypt_format(private_key, &pkey) < 0) 104 BIO_write(bfile, &pkey, sizeof(pkey)); 118 EVP_PKEY *pkey = NULL; local 180 EVP_PKEY* pkey = EVP_PKEY_new(); local [all...] |
H A D | verify_boot_signature.c | 316 EVP_PKEY *pkey = NULL; local 328 if ((pkey = X509_get_pubkey(bs->certificate)) == NULL) { 333 if ((rsa = EVP_PKEY_get1_RSA(pkey)) == NULL) { 347 if (pkey) { 348 EVP_PKEY_free(pkey);
|
/system/security/softkeymaster/ |
H A D | keymaster_openssl.cpp | 109 static int wrap_key(EVP_PKEY* pkey, int type, uint8_t** keyBlob, size_t* keyBlobLength) { argument 115 int privateLen = i2d_PrivateKey(pkey, NULL); 152 if (i2d_PrivateKey(pkey, &p) != privateLen) { 211 Unique_EVP_PKEY pkey(EVP_PKEY_new()); 212 if (pkey.get() == NULL) { 216 EVP_PKEY* tmp = pkey.get(); 223 return pkey.release(); 226 static int generate_dsa_keypair(EVP_PKEY* pkey, const keymaster_dsa_keygen_params_t* dsa_params) { argument 267 if (EVP_PKEY_assign_DSA(pkey, dsa.get()) == 0) { 276 static int generate_ec_keypair(EVP_PKEY* pkey, cons argument 331 generate_rsa_keypair(EVP_PKEY* pkey, const keymaster_rsa_keygen_params_t* rsa_params) argument 474 sign_dsa(EVP_PKEY* pkey, keymaster_dsa_sign_params_t* sign_params, const uint8_t* data, const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) argument 506 sign_ec(EVP_PKEY* pkey, keymaster_ec_sign_params_t* sign_params, const uint8_t* data, const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) argument 538 sign_rsa(EVP_PKEY* pkey, keymaster_rsa_sign_params_t* sign_params, const uint8_t* data, const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) argument 611 verify_dsa(EVP_PKEY* pkey, keymaster_dsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument 633 verify_ec(EVP_PKEY* pkey, keymaster_ec_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument 656 verify_rsa(EVP_PKEY* pkey, keymaster_rsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument [all...] |
/system/core/adb/ |
H A D | adb_auth_host.cpp | 62 static int RSA_to_RSAPublicKey(RSA *rsa, RSAPublicKey *pkey) argument 87 pkey->len = RSANUMWORDS; 88 pkey->n0inv = 0 - BN_get_word(n0inv); 91 pkey->rr[i] = BN_get_word(rem); 93 pkey->n[i] = BN_get_word(rem); 95 pkey->exponent = BN_get_word(rsa->e); 149 RSAPublicKey pkey; local 162 if (!RSA_to_RSAPublicKey(private_key, &pkey)) { 176 if (!EVP_EncodedLength(&encoded_length, sizeof(pkey))) { 183 encoded_length = 1 + ((sizeof(pkey) 213 EVP_PKEY* pkey = EVP_PKEY_new(); local [all...] |
/system/security/keystore-engine/ |
H A D | eng_keystore.cpp | 133 Unique_EVP_PKEY pkey(d2i_PUBKEY(NULL, &tmp, pubkeyLen)); 135 if (pkey.get() == NULL) { 140 switch (EVP_PKEY_type(pkey->type)) { 142 dsa_pkey_setup(e, pkey.get(), key_id); 146 rsa_pkey_setup(e, pkey.get(), key_id); 150 ecdsa_pkey_setup(e, pkey.get(), key_id); 154 ALOGE("Unsupported key type %d", EVP_PKEY_type(pkey->type)); 158 return pkey.release();
|
H A D | android_engine.cpp | 425 Unique_EVP_PKEY pkey(d2i_PUBKEY(NULL, &inp, pubkey_len)); 427 if (pkey.get() == NULL) { 435 switch (EVP_PKEY_type(pkey->type)) { 437 Unique_RSA public_rsa(EVP_PKEY_get1_RSA(pkey.get())); 442 Unique_EC_KEY public_ecdsa(EVP_PKEY_get1_EC_KEY(pkey.get())); 447 ALOGE("Unsupported key type %d", EVP_PKEY_type(pkey->type));
|
H A D | dsa_meth.cpp | 124 int dsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { argument 125 Unique_DSA dsa(EVP_PKEY_get1_DSA(pkey));
|
H A D | ecdsa_meth.cpp | 124 int ecdsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { argument 125 Unique_EC_KEY eckey(EVP_PKEY_get1_EC_KEY(pkey));
|
H A D | rsa_meth.cpp | 212 int rsa_pkey_setup(ENGINE *e, EVP_PKEY *pkey, const char *key_id) { argument 213 Unique_RSA rsa(EVP_PKEY_get1_RSA(pkey));
|
/system/connectivity/shill/shims/ |
H A D | crypto_util.cc | 178 EVP_PKEY* pkey = *pkey_ptr; local 179 if (!rsa || !pkey) { 193 if (!EVP_PKEY_assign_RSA(pkey, rsa)) { 198 *rsa_ptr = NULL; // pkey took ownership 216 if (X509_verify(x509, pkey) <= 0) { 317 EVP_PKEY* pkey = NULL; local 322 &rsa, &pkey, &raw_certificate_bio, &x509); 331 if (pkey) { 332 EVP_PKEY_free(pkey); 333 pkey [all...] |