Searched refs:rsa (Results 1 - 25 of 44) sorted by relevance

12

/system/extras/verity/
H A Dgenerate_verity_key.c31 #include <openssl/rsa.h>
66 RSA *rsa = NULL; local
91 rsa = EVP_PKEY_get1_RSA(pkey);
92 if (!rsa) {
97 if (write_public_keyfile(rsa, key_file) < 0) {
114 if (rsa) {
115 RSA_free(rsa);
125 RSA* rsa = RSA_new(); local
129 if (!pkey || !exponent || !rsa) {
135 RSA_generate_key_ex(rsa, 204
[all...]
/system/keymaster/
H A Drsa_key.h20 #include <openssl/rsa.h>
45 RsaKey(RSA* rsa, const AuthorizationSet& hw_enforced, const AuthorizationSet& sw_enforced, argument
47 : AsymmetricKey(hw_enforced, sw_enforced, error), rsa_key_(rsa) {}
H A Dkeymaster0_engine.h25 #include <openssl/rsa.h>
59 const keymaster_key_blob_t* RsaKeyToBlob(const RSA* rsa) const;
60 const keymaster_key_blob_t* EcKeyToBlob(const EC_KEY* rsa) const;
74 static int rsa_private_transform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len);
87 int RsaPrivateTransform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) const;
H A Dkeymaster1_engine.h25 #include <openssl/rsa.h>
77 KeyData* GetData(const RSA* rsa) const;
78 KeyData* GetData(const EC_KEY* rsa) const;
103 static int rsa_sign_raw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out,
105 static int rsa_decrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out,
H A Dkeymaster0_engine.cpp164 unique_ptr<RSA, RSA_Delete> rsa(RSA_new_method(engine_));
165 if (!rsa)
169 if (!blob_copy->key_material || !RSA_set_ex_data(rsa.get(), rsa_index_, blob_copy))
179 rsa->n = BN_dup(public_rsa->n);
180 rsa->e = BN_dup(public_rsa->e);
181 if (!rsa->n || !rsa->e)
184 return rsa.release();
213 const keymaster_key_blob_t* Keymaster0Engine::RsaKeyToBlob(const RSA* rsa) const {
214 return reinterpret_cast<keymaster_key_blob_t*>(RSA_get_ex_data(rsa, rsa_index
245 rsa_private_transform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) argument
293 data_too_large_for_public_modulus(const uint8_t* data, size_t len, const RSA* rsa) argument
299 RsaPrivateTransform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) const argument
[all...]
H A Dkeymaster1_engine.cpp140 unique_ptr<RSA, RSA_Delete> rsa(RSA_new_method(engine_.get()));
141 if (!rsa) {
147 if (!RSA_set_ex_data(rsa.get(), rsa_index_, key_data)) {
165 rsa->n = BN_dup(public_rsa->n);
166 rsa->e = BN_dup(public_rsa->e);
167 if (!rsa->n || !rsa->e) {
173 return rsa.release();
218 unique_ptr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(key));
219 return GetData(rsa
285 rsa_sign_raw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument
310 rsa_decrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument
[all...]
H A Drsa_keymaster0_key.cpp112 unique_ptr<RSA, RSA_Delete> rsa(engine_->BlobToRsaKey(key_material));
113 if (!rsa)
118 RsaKeymaster0Key(rsa.release(), hw_enforced, sw_enforced, &error));
H A Drsa_keymaster1_key.cpp113 unique_ptr<RSA, RSA_Delete> rsa(engine_->BuildRsaKey(key_material, additional_params, &error));
114 if (!rsa)
118 RsaKeymaster1Key(rsa.release(), hw_enforced, sw_enforced, &error));
H A Drsa_keymaster1_operation.cpp95 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); // key_data is owned by rsa
127 unique_ptr<EVP_PKEY, EVP_PKEY_Delete> rsa(GetEvpKey(rsa_km1_key, error));
128 if (!rsa)
133 return new RsaKeymaster1Operation<RsaSignOperation>(digest, padding, rsa.release(),
136 return new RsaKeymaster1Operation<RsaDecryptOperation>(digest, padding, rsa.release(),
H A Drsa_operation.cpp79 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> rsa(GetRsaKey(key, error));
80 if (!rsa.get())
83 RsaOperation* op = InstantiateOperation(digest, padding, rsa.release());
323 UniquePtr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(const_cast<EVP_PKEY*>(rsa_key_)));
324 if (!rsa.get())
327 if (!output->Reinitialize(RSA_size(rsa.get())))
344 bytes_encrypted = RSA_private_encrypt(key_len, to_encrypt, output->peek_write(), rsa.get(),
356 output->peek_write(), rsa.get(), RSA_PKCS1_PADDING);
430 UniquePtr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(const_cast<EVP_PKEY*>(rsa_key_)));
431 if (!rsa
[all...]
H A Drsa_keymaster0_key.h20 #include <openssl/rsa.h>
H A Drsa_keymaster1_key.h20 #include <openssl/rsa.h>
/system/core/libcrypto_utils/include/crypto_utils/
H A Dandroid_pubkey.h24 #include <openssl/rsa.h>
/system/security/keystore-engine/
H A Dandroid_engine.cpp39 #include <openssl/rsa.h>
140 const char* rsa_get_key_id(const RSA* rsa) { argument
142 RSA_get_ex_data(rsa, g_keystore_engine->rsa_ex_index()));
149 int rsa_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in, size_t len) { argument
150 ALOGV("rsa_private_transform(%p, %p, %p, %u)", rsa, out, in, (unsigned) len);
154 const char *key_id = rsa_get_key_id(rsa);
193 ALOGV("rsa=%p keystore_rsa_priv_dec successful", rsa);
305 Unique_RSA rsa(RSA_new_method(g_keystore_engine->engine()));
306 if (rsa
[all...]
/system/core/adb/
H A Dadb_auth.h25 #include <openssl/rsa.h>
H A Dadb_auth_host.cpp41 #include <openssl/rsa.h>
117 RSA* rsa = RSA_new(); local
118 if (!pkey || !exponent || !rsa) {
124 RSA_generate_key_ex(rsa, 2048, exponent, NULL);
125 EVP_PKEY_set1_RSA(pkey, rsa);
143 if (!write_public_keyfile(rsa, file)) {
153 RSA_free(rsa);
/system/tpm/trunks/
H A Dsession_manager_test.cc66 TPM2B_PUBLIC_KEY_RSA rsa; local
67 rsa.size = bytes.size();
68 memcpy(rsa.buffer, bytes.data(), bytes.size());
69 return rsa;
105 public_data.public_area.unique.rsa = GetValidRSAPublicKey();
121 public_data.public_area.unique.rsa.size = 32;
128 public_data.public_area.unique.rsa.size = 256;
139 public_data.public_area.unique.rsa = GetValidRSAPublicKey();
154 public_data.public_area.unique.rsa = GetValidRSAPublicKey();
H A Dsession_manager_impl.cc31 #include <openssl/rsa.h>
149 public_data.public_area.unique.rsa.size = 0;
159 public_data.public_area.unique.rsa.size != 256) {
171 BN_bin2bn(public_data.public_area.unique.rsa.buffer,
172 public_data.public_area.unique.rsa.size, nullptr);
174 LOG(ERROR) << "Error setting public area of rsa key: " << GetOpenSSLError();
H A Dtrunks_client_test.cc34 #include <openssl/rsa.h>
1020 crypto::ScopedRSA rsa(RSA_new());
1023 CHECK(RSA_generate_key_ex(rsa.get(), 2048, exponent.get(), nullptr))
1026 crypto::ScopedRSA rsa(RSA_generate_key(2048, 0x10001, nullptr, nullptr));
1027 CHECK(rsa.get());
1029 modulus->resize(BN_num_bytes(rsa.get()->n), 0);
1030 BN_bn2bin(rsa.get()->n,
1032 prime_factor->resize(BN_num_bytes(rsa.get()->p), 0);
1033 BN_bn2bin(rsa.get()->p,
1037 int length = i2d_RSAPublicKey(rsa
[all...]
/system/tpm/attestation/common/
H A Dcrypto_utility_impl.cc33 #include <openssl/rsa.h>
168 crypto::ScopedRSA rsa(
170 if (!rsa.get()) {
176 int length = i2d_RSA_PUBKEY(rsa.get(), &buffer);
191 crypto::ScopedRSA rsa(
193 if (!rsa.get()) {
199 int length = i2d_RSAPublicKey(rsa.get(), &buffer);
242 crypto::ScopedRSA rsa(
244 if (!rsa.get()) {
250 if (!TpmCompatibleOAEPEncrypt(asym_content, rsa
[all...]
H A Dtpm_utility_v1.cc26 #include <openssl/rsa.h>
647 crypto::ScopedRSA rsa(RSA_new());
648 CHECK(rsa.get());
651 rsa.get()->e = BN_new();
652 CHECK(rsa.get()->e);
653 BN_set_word(rsa.get()->e, kWellKnownExponent);
655 rsa.get()->e = BN_bin2bn(parms->exponent, parms->exponentSize, nullptr);
656 CHECK(rsa.get()->e);
659 rsa.get()->n = BN_bin2bn(parsed.pubKey.key, parsed.pubKey.keyLength, nullptr);
660 CHECK(rsa
[all...]
/system/update_engine/payload_consumer/
H A Dpayload_verifier.cc148 RSA* rsa = PEM_read_RSA_PUBKEY(fpubkey, nullptr, nullptr, dummy_password); local
150 TEST_AND_RETURN_FALSE(rsa != nullptr);
151 unsigned int keysize = RSA_size(rsa);
154 RSA_free(rsa);
163 rsa,
165 RSA_free(rsa);
/system/security/softkeymaster/
H A Dkeymaster_openssl.cpp28 #include <openssl/rsa.h>
338 Unique_RSA rsa(RSA_new());
339 if (rsa.get() == NULL) {
344 if (!RSA_generate_key_ex(rsa.get(), rsa_params->modulus_size, bn.get(), NULL) ||
345 RSA_check_key(rsa.get()) < 0) {
350 if (EVP_PKEY_assign_RSA(pkey, rsa.get()) == 0) {
354 release_because_ownership_transferred(rsa);
542 Unique_RSA rsa(EVP_PKEY_get1_RSA(pkey));
543 if (rsa.get() == NULL) {
555 if (RSA_private_encrypt(dataLength, data, tmp, rsa
[all...]
/system/keymaster/include/keymaster/
H A Drsa_key_factory.h21 #include <openssl/rsa.h>
/system/netd/tests/dns_responder/
H A Ddns_tls_frontend.cpp90 bssl::UniquePtr<RSA> rsa(RSA_new());
91 if (!rsa) {
95 if (!RSA_generate_key_ex(rsa.get(), 2048, e.get(), NULL)) {
105 if(!EVP_PKEY_assign_RSA(privkey.get(), rsa.get())) {
110 // |rsa| is now owned by |privkey|, so no need to free it.
111 rsa.release();

Completed in 550 milliseconds

12