/system/security/keystore-engine/ |
H A D | rsa_meth.cpp | 29 #define LOG_TAG "OpenSSL-keystore-rsa" 35 #include <openssl/rsa.h> 44 int keystore_rsa_priv_enc(int flen, const unsigned char* from, unsigned char* to, RSA* rsa, argument 46 ALOGV("keystore_rsa_priv_enc(%d, %p, %p, %p, %d)", flen, from, to, rsa, padding); 48 int num = RSA_size(rsa); 76 uint8_t* key_id = reinterpret_cast<uint8_t*>(RSA_get_ex_data(rsa, rsa_key_handle)); 111 ALOGV("rsa=%p keystore_rsa_priv_enc => returning %p len %llu", rsa, to, 116 int keystore_rsa_priv_dec(int flen, const unsigned char* from, unsigned char* to, RSA* rsa, argument 118 ALOGV("keystore_rsa_priv_dec(%d, %p, %p, %p, %d)", flen, from, to, rsa, paddin [all...] |
H A D | android_engine.cpp | 36 #include <openssl/rsa.h> 130 const char* rsa_get_key_id(const RSA* rsa) { argument 132 RSA_get_ex_data(rsa, g_keystore_engine->rsa_ex_index())); 139 int rsa_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in, size_t len) { argument 140 ALOGV("rsa_private_transform(%p, %p, %p, %u)", rsa, out, in, (unsigned) len); 142 const char *key_id = rsa_get_key_id(rsa); 191 ALOGV("rsa=%p keystore_rsa_priv_dec successful", rsa); 324 Unique_RSA rsa(RSA_new_method(g_keystore_engine->engine())); 325 if (rsa [all...] |
/system/keymaster/ |
H A D | rsa_key.h | 20 #include <openssl/rsa.h> 45 RsaKey(RSA* rsa, const AuthorizationSet& hw_enforced, const AuthorizationSet& sw_enforced, argument 47 : AsymmetricKey(hw_enforced, sw_enforced, error), rsa_key_(rsa) {}
|
H A D | keymaster0_engine.h | 25 #include <openssl/rsa.h> 59 const keymaster_key_blob_t* RsaKeyToBlob(const RSA* rsa) const; 60 const keymaster_key_blob_t* EcKeyToBlob(const EC_KEY* rsa) const; 74 static int rsa_private_transform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len); 87 int RsaPrivateTransform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) const;
|
H A D | keymaster1_engine.h | 25 #include <openssl/rsa.h> 77 KeyData* GetData(const RSA* rsa) const; 78 KeyData* GetData(const EC_KEY* rsa) const; 103 static int rsa_sign_raw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, 105 static int rsa_decrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out,
|
H A D | keymaster0_engine.cpp | 182 unique_ptr<RSA, RSA_Delete> rsa(RSA_new_method(engine_)); 183 if (!rsa) 187 if (!blob_copy->key_material || !RSA_set_ex_data(rsa.get(), rsa_index_, blob_copy)) 197 rsa->n = BN_dup(public_rsa->n); 198 rsa->e = BN_dup(public_rsa->e); 199 if (!rsa->n || !rsa->e) 202 return rsa.release(); 231 const keymaster_key_blob_t* Keymaster0Engine::RsaKeyToBlob(const RSA* rsa) const { 232 return reinterpret_cast<keymaster_key_blob_t*>(RSA_get_ex_data(rsa, rsa_index 263 rsa_private_transform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) argument 311 data_too_large_for_public_modulus(const uint8_t* data, size_t len, const RSA* rsa) argument 317 RsaPrivateTransform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) const argument [all...] |
H A D | keymaster1_engine.cpp | 140 unique_ptr<RSA, RSA_Delete> rsa(RSA_new_method(engine_.get())); 141 if (!rsa) { 147 if (!RSA_set_ex_data(rsa.get(), rsa_index_, key_data)) { 167 rsa->n = BN_dup(public_rsa->n); 168 rsa->e = BN_dup(public_rsa->e); 169 if (!rsa->n || !rsa->e) { 175 return rsa.release(); 222 unique_ptr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(key)); 223 return GetData(rsa 289 rsa_sign_raw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument 314 rsa_decrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument [all...] |
H A D | rsa_keymaster0_key.cpp | 112 unique_ptr<RSA, RSA_Delete> rsa(engine_->BlobToRsaKey(key_material)); 113 if (!rsa) 118 RsaKeymaster0Key(rsa.release(), hw_enforced, sw_enforced, &error));
|
H A D | rsa_keymaster1_key.cpp | 113 unique_ptr<RSA, RSA_Delete> rsa(engine_->BuildRsaKey(key_material, additional_params, &error)); 114 if (!rsa) 118 RsaKeymaster1Key(rsa.release(), hw_enforced, sw_enforced, &error));
|
H A D | rsa_keymaster1_operation.cpp | 95 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); // key_data is owned by rsa 127 unique_ptr<EVP_PKEY, EVP_PKEY_Delete> rsa(GetEvpKey(rsa_km1_key, error)); 128 if (!rsa) 133 return new RsaKeymaster1Operation<RsaSignOperation>(digest, padding, rsa.release(), 136 return new RsaKeymaster1Operation<RsaDecryptOperation>(digest, padding, rsa.release(),
|
H A D | rsa_operation.cpp | 79 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> rsa(GetRsaKey(key, error)); 80 if (!rsa.get()) 83 RsaOperation* op = InstantiateOperation(digest, padding, rsa.release()); 323 UniquePtr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(const_cast<EVP_PKEY*>(rsa_key_))); 324 if (!rsa.get()) 327 if (!output->Reinitialize(RSA_size(rsa.get()))) 344 bytes_encrypted = RSA_private_encrypt(key_len, to_encrypt, output->peek_write(), rsa.get(), 356 output->peek_write(), rsa.get(), RSA_PKCS1_PADDING); 430 UniquePtr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(const_cast<EVP_PKEY*>(rsa_key_))); 431 if (!rsa [all...] |
H A D | rsa_keymaster0_key.h | 20 #include <openssl/rsa.h>
|
H A D | rsa_keymaster1_key.h | 20 #include <openssl/rsa.h>
|
/system/connectivity/shill/shims/ |
H A D | crypto_util.cc | 32 #include <openssl/rsa.h> 80 RSA* rsa = *rsa_ptr; local 81 if (!rsa) { 86 vector<unsigned char> rsa_output(RSA_size(rsa)); 94 rsa, 121 RSA* rsa = NULL; local 124 message.public_key(), message.data(), &rsa, &encrypted_output); 125 if (rsa) { 126 RSA_free(rsa); 127 rsa 176 RSA* rsa = *rsa_ptr; local 316 RSA* rsa = NULL; local [all...] |
/system/extras/verity/ |
H A D | generate_verity_key.c | 29 #include "mincrypt/rsa.h" 35 #include <openssl/rsa.h> 40 static int convert_to_mincrypt_format(RSA *rsa, RSAPublicKey *pkey) argument 45 if (RSA_size(rsa) != RSANUMBYTES) 57 BN_copy(n, rsa->n); 71 pkey->exponent = BN_get_word(rsa->e); 119 RSA *rsa = NULL; local 144 rsa = EVP_PKEY_get1_RSA(pkey); 145 if (!rsa) { 150 if (write_public_keyfile(rsa, key_fil 178 RSA* rsa = RSA_new(); local [all...] |
H A D | verify_boot_signature.c | 35 #include <openssl/rsa.h> 317 RSA *rsa = NULL; local 333 if ((rsa = EVP_PKEY_get1_RSA(pkey)) == NULL) { 339 bs->signature->data, bs->signature->length, rsa)) { 351 if (rsa) { 352 RSA_free(rsa);
|
/system/core/libmincrypt/ |
H A D | Android.mk | 7 LOCAL_SRC_FILES := dsa_sig.c p256.c p256_ec.c p256_ecdsa.c rsa.c sha.c sha256.c 13 LOCAL_SRC_FILES := dsa_sig.c p256.c p256_ec.c p256_ecdsa.c rsa.c sha.c sha256.c
|
/system/core/adb/ |
H A D | adb_auth_host.cpp | 32 #include "mincrypt/rsa.h" 43 #include <openssl/rsa.h> 55 RSA *rsa; member in struct:adb_private_key 62 static int RSA_to_RSAPublicKey(RSA *rsa, RSAPublicKey *pkey) argument 75 if (RSA_size(rsa) != RSANUMBYTES) { 81 BN_copy(n, rsa->n); 95 pkey->exponent = BN_get_word(rsa->e); 215 RSA* rsa = RSA_new(); local 222 if (!pkey || !exponent || !rsa) { 228 RSA_generate_key_ex(rsa, 204 [all...] |
/system/tpm/trunks/ |
H A D | session_manager_test.cc | 68 TPM2B_PUBLIC_KEY_RSA rsa; local 69 rsa.size = bytes.size(); 70 memcpy(rsa.buffer, bytes.data(), bytes.size()); 71 return rsa; 108 public_data.public_area.unique.rsa = GetValidRSAPublicKey(); 127 public_data.public_area.unique.rsa.size = 32; 138 public_data.public_area.unique.rsa = GetValidRSAPublicKey(); 154 public_data.public_area.unique.rsa = GetValidRSAPublicKey();
|
H A D | session_manager_impl.cc | 29 #include <openssl/rsa.h> 156 public_data.public_area.unique.rsa.size = 0; 173 BN_bin2bn(public_data.public_area.unique.rsa.buffer, 174 public_data.public_area.unique.rsa.size, nullptr); 176 LOG(ERROR) << "Error setting public area of rsa key: " << GetOpenSSLError();
|
/system/tpm/attestation/common/ |
H A D | crypto_utility_impl.cc | 33 #include <openssl/rsa.h> 169 crypto::ScopedRSA rsa(d2i_RSAPublicKey(nullptr, &asn1_ptr, 171 if (!rsa.get()) { 177 int length = i2d_RSA_PUBKEY(rsa.get(), &buffer); 192 crypto::ScopedRSA rsa(d2i_RSA_PUBKEY(NULL, &asn1_ptr, 194 if (!rsa.get()) { 200 int length = i2d_RSAPublicKey(rsa.get(), &buffer); 243 crypto::ScopedRSA rsa(d2i_RSA_PUBKEY(NULL, &asn1_ptr, 245 if (!rsa.get()) { 251 if (!TpmCompatibleOAEPEncrypt(asym_content, rsa [all...] |
H A D | tpm_utility_v1.cc | 26 #include <openssl/rsa.h> 694 crypto::ScopedRSA rsa(RSA_new()); 695 CHECK(rsa.get()); 698 rsa.get()->e = BN_new(); 699 CHECK(rsa.get()->e); 700 BN_set_word(rsa.get()->e, kWellKnownExponent); 702 rsa.get()->e = BN_bin2bn(parms->exponent, parms->exponentSize, nullptr); 703 CHECK(rsa.get()->e); 706 rsa.get()->n = BN_bin2bn(parsed.pubKey.key, parsed.pubKey.keyLength, nullptr); 707 CHECK(rsa [all...] |
/system/update_engine/payload_consumer/ |
H A D | payload_verifier.cc | 148 RSA* rsa = PEM_read_RSA_PUBKEY(fpubkey, nullptr, nullptr, dummy_password); local 150 TEST_AND_RETURN_FALSE(rsa != nullptr); 151 unsigned int keysize = RSA_size(rsa); 154 RSA_free(rsa); 163 rsa, 165 RSA_free(rsa);
|
/system/security/softkeymaster/ |
H A D | keymaster_openssl.cpp | 28 #include <openssl/rsa.h> 344 Unique_RSA rsa(RSA_new()); 345 if (rsa.get() == NULL) { 350 if (!RSA_generate_key_ex(rsa.get(), rsa_params->modulus_size, bn.get(), NULL) || 351 RSA_check_key(rsa.get()) < 0) { 356 if (EVP_PKEY_assign_RSA(pkey, rsa.get()) == 0) { 360 release_because_ownership_transferred(rsa); 548 Unique_RSA rsa(EVP_PKEY_get1_RSA(pkey)); 549 if (rsa.get() == NULL) { 561 if (RSA_private_encrypt(dataLength, data, tmp, rsa [all...] |
/system/keymaster/include/keymaster/ |
H A D | rsa_key_factory.h | 21 #include <openssl/rsa.h>
|