/system/keymaster/ |
H A D | ec_key.cpp | 27 bool EcKey::EvpToInternal(const EVP_PKEY* pkey) { argument 28 ec_key_.reset(EVP_PKEY_get1_EC_KEY(const_cast<EVP_PKEY*>(pkey))); 32 bool EcKey::InternalToEvp(EVP_PKEY* pkey) const { 33 return EVP_PKEY_set1_EC_KEY(pkey, ec_key_.get()) == 1;
|
H A D | rsa_key.cpp | 27 bool RsaKey::EvpToInternal(const EVP_PKEY* pkey) { argument 28 rsa_key_.reset(EVP_PKEY_get1_RSA(const_cast<EVP_PKEY*>(pkey))); 32 bool RsaKey::InternalToEvp(EVP_PKEY* pkey) const { 33 return EVP_PKEY_set1_RSA(pkey, rsa_key_.get()) == 1;
|
H A D | asymmetric_key_factory.cpp | 52 EVP_PKEY* pkey = local 53 d2i_PrivateKey(evp_key_type(), NULL /* pkey */, &tmp, key_material.key_material_size); 54 if (!pkey) 56 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> pkey_deleter(pkey); 58 if (!asymmetric_key->EvpToInternal(pkey))
|
H A D | openssl_utils.cpp | 84 UniquePtr<EVP_PKEY, EVP_PKEY_Delete>* pkey) { 93 pkey->reset(EVP_PKCS82PKEY(pkcs8.get())); 94 if (!pkey->get()) 97 if (EVP_PKEY_type((*pkey)->type) != convert_to_evp(expected_algorithm)) { 98 LOG_E("EVP key algorithm was %d, not the expected %d", EVP_PKEY_type((*pkey)->type), 109 UniquePtr<EVP_PKEY, EVP_PKEY_Delete>* pkey) { 114 expected_algorithm, pkey); 117 keymaster_error_t EvpKeyToKeyMaterial(const EVP_PKEY* pkey, KeymasterKeyBlob* key_blob) { argument 118 int key_data_size = i2d_PrivateKey(pkey, NULL /* key_data*/); 126 i2d_PrivateKey(pkey, 82 convert_pkcs8_blob_to_evp(const uint8_t* key_data, size_t key_length, keymaster_algorithm_t expected_algorithm, UniquePtr<EVP_PKEY, EVP_PKEY_Delete>* pkey) argument 106 KeyMaterialToEvpKey(keymaster_key_format_t key_format, const KeymasterKeyBlob& key_material, keymaster_algorithm_t expected_algorithm, UniquePtr<EVP_PKEY, EVP_PKEY_Delete>* pkey) argument [all...] |
H A D | soft_keymaster_context.cpp | 597 unique_ptr<EVP_PKEY, EVP_PKEY_Delete> pkey(d2i_PrivateKey(type, nullptr, &p, privateLen)); 598 if (pkey.get() == nullptr) { 606 keymaster_error_t error = FakeKeyAuthorizations(pkey.get(), sw_enforced, sw_enforced); 789 EVP_PKEY* pkey = d2i_PrivateKey(evp_key_type, nullptr /* pkey */, &key, key_length); local 790 if (!pkey) 793 return pkey;
|
/system/extras/verity/ |
H A D | generate_verity_key.c | 65 EVP_PKEY *pkey = NULL; local 85 pkey = X509_get_pubkey(cert); 86 if (!pkey) { 91 rsa = EVP_PKEY_get1_RSA(pkey); 111 if (pkey) { 112 EVP_PKEY_free(pkey); 127 EVP_PKEY* pkey = EVP_PKEY_new(); local 129 if (!pkey || !exponent || !rsa) { 136 EVP_PKEY_set1_RSA(pkey, rsa); 144 if (!PEM_write_PrivateKey(f, pkey, NUL [all...] |
H A D | verify_boot_signature.c | 314 * @param pkey The external pubkey file 317 const char *pkey) 350 if (pkey) { 351 if ((bio_pkey = BIO_new_file(pkey, "r")) == NULL) { 394 static int verify(const char *image_file, const char *pkey) argument 421 if (verify_signature(fd, offset, bs, pkey) == -1) { 461 const char *pkey = (argc == 2) ? NULL : argv[2]; local 463 return verify(argv[1], pkey); 316 verify_signature(int fd, uint64_t length, const BootSignature *bs, const char *pkey) argument
|
/system/core/adb/ |
H A D | adb_auth_host.cpp | 115 EVP_PKEY* pkey = EVP_PKEY_new(); local 118 if (!pkey || !exponent || !rsa) { 125 EVP_PKEY_set1_RSA(pkey, rsa); 138 if (!PEM_write_PrivateKey(f, pkey, NULL, NULL, 0, NULL, NULL)) { 152 EVP_PKEY_free(pkey);
|
/system/security/softkeymaster/ |
H A D | keymaster_openssl.cpp | 109 static int wrap_key(EVP_PKEY* pkey, int type, uint8_t** keyBlob, size_t* keyBlobLength) { argument 115 int privateLen = i2d_PrivateKey(pkey, NULL); 152 if (i2d_PrivateKey(pkey, &p) != privateLen) { 211 Unique_EVP_PKEY pkey(d2i_PrivateKey(type, nullptr, &p, privateLen)); 212 if (pkey.get() == NULL) { 217 return pkey.release(); 220 static int generate_dsa_keypair(EVP_PKEY* pkey, const keymaster_dsa_keygen_params_t* dsa_params) { argument 261 if (EVP_PKEY_assign_DSA(pkey, dsa.get()) == 0) { 270 static int generate_ec_keypair(EVP_PKEY* pkey, const keymaster_ec_keygen_params_t* ec_params) { argument 316 if (EVP_PKEY_assign_EC_KEY(pkey, ecke 325 generate_rsa_keypair(EVP_PKEY* pkey, const keymaster_rsa_keygen_params_t* rsa_params) argument 468 sign_dsa(EVP_PKEY* pkey, keymaster_dsa_sign_params_t* sign_params, const uint8_t* data, const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) argument 500 sign_ec(EVP_PKEY* pkey, keymaster_ec_sign_params_t* sign_params, const uint8_t* data, const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) argument 532 sign_rsa(EVP_PKEY* pkey, keymaster_rsa_sign_params_t* sign_params, const uint8_t* data, const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) argument 605 verify_dsa(EVP_PKEY* pkey, keymaster_dsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument 627 verify_ec(EVP_PKEY* pkey, keymaster_ec_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument 650 verify_rsa(EVP_PKEY* pkey, keymaster_rsa_sign_params_t* sign_params, const uint8_t* signedData, const size_t signedDataLength, const uint8_t* signature, const size_t signatureLength) argument [all...] |