Searched refs:rsa (Results 1 - 25 of 43) sorted by relevance

12

/system/security/keystore-engine/
H A Drsa_meth.cpp29 #define LOG_TAG "OpenSSL-keystore-rsa"
35 #include <openssl/rsa.h>
44 int keystore_rsa_priv_enc(int flen, const unsigned char* from, unsigned char* to, RSA* rsa, argument
46 ALOGV("keystore_rsa_priv_enc(%d, %p, %p, %p, %d)", flen, from, to, rsa, padding);
48 int num = RSA_size(rsa);
76 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle));
111 ALOGV("rsa=%p keystore_rsa_priv_enc => returning %p len %llu", rsa, to,
116 int keystore_rsa_priv_dec(int flen, const unsigned char* from, unsigned char* to, RSA* rsa, argument
118 ALOGV("keystore_rsa_priv_dec(%d, %p, %p, %p, %d)", flen, from, to, rsa, paddin
[all...]
H A Dandroid_engine.cpp36 #include <openssl/rsa.h>
130 const char* rsa_get_key_id(const RSA* rsa) { argument
132 RSA_get_ex_data(rsa, g_keystore_engine->rsa_ex_index()));
139 int rsa_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in, size_t len) { argument
140 ALOGV("rsa_private_transform(%p, %p, %p, %u)", rsa, out, in, (unsigned) len);
142 const char *key_id = rsa_get_key_id(rsa);
191 ALOGV("rsa=%p keystore_rsa_priv_dec successful", rsa);
324 Unique_RSA rsa(RSA_new_method(g_keystore_engine->engine()));
325 if (rsa
[all...]
/system/keymaster/
H A Drsa_key.h20 #include <openssl/rsa.h>
45 RsaKey(RSA* rsa, const AuthorizationSet& hw_enforced, const AuthorizationSet& sw_enforced, argument
47 : AsymmetricKey(hw_enforced, sw_enforced, error), rsa_key_(rsa) {}
H A Dkeymaster0_engine.h25 #include <openssl/rsa.h>
59 const keymaster_key_blob_t* RsaKeyToBlob(const RSA* rsa) const;
60 const keymaster_key_blob_t* EcKeyToBlob(const EC_KEY* rsa) const;
74 static int rsa_private_transform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len);
87 int RsaPrivateTransform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) const;
H A Dkeymaster1_engine.h25 #include <openssl/rsa.h>
77 KeyData* GetData(const RSA* rsa) const;
78 KeyData* GetData(const EC_KEY* rsa) const;
103 static int rsa_sign_raw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out,
105 static int rsa_decrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out,
H A Dkeymaster0_engine.cpp182 unique_ptr<RSA, RSA_Delete> rsa(RSA_new_method(engine_));
183 if (!rsa)
187 if (!blob_copy->key_material || !RSA_set_ex_data(rsa.get(), rsa_index_, blob_copy))
197 rsa->n = BN_dup(public_rsa->n);
198 rsa->e = BN_dup(public_rsa->e);
199 if (!rsa->n || !rsa->e)
202 return rsa.release();
231 const keymaster_key_blob_t* Keymaster0Engine::RsaKeyToBlob(const RSA* rsa) const {
232 return reinterpret_cast<keymaster_key_blob_t*>(RSA_get_ex_data(rsa, rsa_index
263 rsa_private_transform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) argument
311 data_too_large_for_public_modulus(const uint8_t* data, size_t len, const RSA* rsa) argument
317 RsaPrivateTransform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) const argument
[all...]
H A Dkeymaster1_engine.cpp140 unique_ptr<RSA, RSA_Delete> rsa(RSA_new_method(engine_.get()));
141 if (!rsa) {
147 if (!RSA_set_ex_data(rsa.get(), rsa_index_, key_data)) {
167 rsa->n = BN_dup(public_rsa->n);
168 rsa->e = BN_dup(public_rsa->e);
169 if (!rsa->n || !rsa->e) {
175 return rsa.release();
222 unique_ptr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(key));
223 return GetData(rsa
289 rsa_sign_raw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument
314 rsa_decrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument
[all...]
H A Drsa_keymaster0_key.cpp112 unique_ptr<RSA, RSA_Delete> rsa(engine_->BlobToRsaKey(key_material));
113 if (!rsa)
118 RsaKeymaster0Key(rsa.release(), hw_enforced, sw_enforced, &error));
H A Drsa_keymaster1_key.cpp113 unique_ptr<RSA, RSA_Delete> rsa(engine_->BuildRsaKey(key_material, additional_params, &error));
114 if (!rsa)
118 RsaKeymaster1Key(rsa.release(), hw_enforced, sw_enforced, &error));
H A Drsa_keymaster1_operation.cpp95 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); // key_data is owned by rsa
127 unique_ptr<EVP_PKEY, EVP_PKEY_Delete> rsa(GetEvpKey(rsa_km1_key, error));
128 if (!rsa)
133 return new RsaKeymaster1Operation<RsaSignOperation>(digest, padding, rsa.release(),
136 return new RsaKeymaster1Operation<RsaDecryptOperation>(digest, padding, rsa.release(),
H A Drsa_operation.cpp79 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> rsa(GetRsaKey(key, error));
80 if (!rsa.get())
83 RsaOperation* op = InstantiateOperation(digest, padding, rsa.release());
323 UniquePtr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(const_cast<EVP_PKEY*>(rsa_key_)));
324 if (!rsa.get())
327 if (!output->Reinitialize(RSA_size(rsa.get())))
344 bytes_encrypted = RSA_private_encrypt(key_len, to_encrypt, output->peek_write(), rsa.get(),
356 output->peek_write(), rsa.get(), RSA_PKCS1_PADDING);
430 UniquePtr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(const_cast<EVP_PKEY*>(rsa_key_)));
431 if (!rsa
[all...]
H A Drsa_keymaster0_key.h20 #include <openssl/rsa.h>
H A Drsa_keymaster1_key.h20 #include <openssl/rsa.h>
/system/connectivity/shill/shims/
H A Dcrypto_util.cc32 #include <openssl/rsa.h>
80 RSA* rsa = *rsa_ptr; local
81 if (!rsa) {
86 vector<unsigned char> rsa_output(RSA_size(rsa));
94 rsa,
121 RSA* rsa = NULL; local
124 message.public_key(), message.data(), &rsa, &encrypted_output);
125 if (rsa) {
126 RSA_free(rsa);
127 rsa
176 RSA* rsa = *rsa_ptr; local
316 RSA* rsa = NULL; local
[all...]
/system/extras/verity/
H A Dgenerate_verity_key.c29 #include "mincrypt/rsa.h"
35 #include <openssl/rsa.h>
40 static int convert_to_mincrypt_format(RSA *rsa, RSAPublicKey *pkey) argument
45 if (RSA_size(rsa) != RSANUMBYTES)
57 BN_copy(n, rsa->n);
71 pkey->exponent = BN_get_word(rsa->e);
119 RSA *rsa = NULL; local
144 rsa = EVP_PKEY_get1_RSA(pkey);
145 if (!rsa) {
150 if (write_public_keyfile(rsa, key_fil
178 RSA* rsa = RSA_new(); local
[all...]
H A Dverify_boot_signature.c35 #include <openssl/rsa.h>
317 RSA *rsa = NULL; local
333 if ((rsa = EVP_PKEY_get1_RSA(pkey)) == NULL) {
339 bs->signature->data, bs->signature->length, rsa)) {
351 if (rsa) {
352 RSA_free(rsa);
/system/core/libmincrypt/
H A DAndroid.mk7 LOCAL_SRC_FILES := dsa_sig.c p256.c p256_ec.c p256_ecdsa.c rsa.c sha.c sha256.c
13 LOCAL_SRC_FILES := dsa_sig.c p256.c p256_ec.c p256_ecdsa.c rsa.c sha.c sha256.c
/system/core/adb/
H A Dadb_auth_host.cpp32 #include "mincrypt/rsa.h"
43 #include <openssl/rsa.h>
55 RSA *rsa; member in struct:adb_private_key
62 static int RSA_to_RSAPublicKey(RSA *rsa, RSAPublicKey *pkey) argument
75 if (RSA_size(rsa) != RSANUMBYTES) {
81 BN_copy(n, rsa->n);
95 pkey->exponent = BN_get_word(rsa->e);
215 RSA* rsa = RSA_new(); local
222 if (!pkey || !exponent || !rsa) {
228 RSA_generate_key_ex(rsa, 204
[all...]
/system/tpm/trunks/
H A Dsession_manager_test.cc68 TPM2B_PUBLIC_KEY_RSA rsa; local
69 rsa.size = bytes.size();
70 memcpy(rsa.buffer, bytes.data(), bytes.size());
71 return rsa;
108 public_data.public_area.unique.rsa = GetValidRSAPublicKey();
127 public_data.public_area.unique.rsa.size = 32;
138 public_data.public_area.unique.rsa = GetValidRSAPublicKey();
154 public_data.public_area.unique.rsa = GetValidRSAPublicKey();
H A Dsession_manager_impl.cc29 #include <openssl/rsa.h>
156 public_data.public_area.unique.rsa.size = 0;
173 BN_bin2bn(public_data.public_area.unique.rsa.buffer,
174 public_data.public_area.unique.rsa.size, nullptr);
176 LOG(ERROR) << "Error setting public area of rsa key: " << GetOpenSSLError();
/system/tpm/attestation/common/
H A Dcrypto_utility_impl.cc33 #include <openssl/rsa.h>
169 crypto::ScopedRSA rsa(d2i_RSAPublicKey(nullptr, &asn1_ptr,
171 if (!rsa.get()) {
177 int length = i2d_RSA_PUBKEY(rsa.get(), &buffer);
192 crypto::ScopedRSA rsa(d2i_RSA_PUBKEY(NULL, &asn1_ptr,
194 if (!rsa.get()) {
200 int length = i2d_RSAPublicKey(rsa.get(), &buffer);
243 crypto::ScopedRSA rsa(d2i_RSA_PUBKEY(NULL, &asn1_ptr,
245 if (!rsa.get()) {
251 if (!TpmCompatibleOAEPEncrypt(asym_content, rsa
[all...]
H A Dtpm_utility_v1.cc26 #include <openssl/rsa.h>
694 crypto::ScopedRSA rsa(RSA_new());
695 CHECK(rsa.get());
698 rsa.get()->e = BN_new();
699 CHECK(rsa.get()->e);
700 BN_set_word(rsa.get()->e, kWellKnownExponent);
702 rsa.get()->e = BN_bin2bn(parms->exponent, parms->exponentSize, nullptr);
703 CHECK(rsa.get()->e);
706 rsa.get()->n = BN_bin2bn(parsed.pubKey.key, parsed.pubKey.keyLength, nullptr);
707 CHECK(rsa
[all...]
/system/update_engine/payload_consumer/
H A Dpayload_verifier.cc148 RSA* rsa = PEM_read_RSA_PUBKEY(fpubkey, nullptr, nullptr, dummy_password); local
150 TEST_AND_RETURN_FALSE(rsa != nullptr);
151 unsigned int keysize = RSA_size(rsa);
154 RSA_free(rsa);
163 rsa,
165 RSA_free(rsa);
/system/security/softkeymaster/
H A Dkeymaster_openssl.cpp28 #include <openssl/rsa.h>
344 Unique_RSA rsa(RSA_new());
345 if (rsa.get() == NULL) {
350 if (!RSA_generate_key_ex(rsa.get(), rsa_params->modulus_size, bn.get(), NULL) ||
351 RSA_check_key(rsa.get()) < 0) {
356 if (EVP_PKEY_assign_RSA(pkey, rsa.get()) == 0) {
360 release_because_ownership_transferred(rsa);
548 Unique_RSA rsa(EVP_PKEY_get1_RSA(pkey));
549 if (rsa.get() == NULL) {
561 if (RSA_private_encrypt(dataLength, data, tmp, rsa
[all...]
/system/keymaster/include/keymaster/
H A Drsa_key_factory.h21 #include <openssl/rsa.h>

Completed in 313 milliseconds

12