/system/extras/verity/ |
H A D | generate_verity_key.c | 31 #include <openssl/rsa.h> 66 RSA *rsa = NULL; local 91 rsa = EVP_PKEY_get1_RSA(pkey); 92 if (!rsa) { 97 if (write_public_keyfile(rsa, key_file) < 0) { 114 if (rsa) { 115 RSA_free(rsa); 125 RSA* rsa = RSA_new(); local 129 if (!pkey || !exponent || !rsa) { 135 RSA_generate_key_ex(rsa, 204 [all...] |
/system/keymaster/ |
H A D | rsa_key.h | 20 #include <openssl/rsa.h> 45 RsaKey(RSA* rsa, const AuthorizationSet& hw_enforced, const AuthorizationSet& sw_enforced, argument 47 : AsymmetricKey(hw_enforced, sw_enforced, error), rsa_key_(rsa) {}
|
H A D | keymaster0_engine.h | 25 #include <openssl/rsa.h> 59 const keymaster_key_blob_t* RsaKeyToBlob(const RSA* rsa) const; 60 const keymaster_key_blob_t* EcKeyToBlob(const EC_KEY* rsa) const; 74 static int rsa_private_transform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len); 87 int RsaPrivateTransform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) const;
|
H A D | keymaster1_engine.h | 25 #include <openssl/rsa.h> 77 KeyData* GetData(const RSA* rsa) const; 78 KeyData* GetData(const EC_KEY* rsa) const; 103 static int rsa_sign_raw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, 105 static int rsa_decrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out,
|
H A D | keymaster0_engine.cpp | 164 unique_ptr<RSA, RSA_Delete> rsa(RSA_new_method(engine_)); 165 if (!rsa) 169 if (!blob_copy->key_material || !RSA_set_ex_data(rsa.get(), rsa_index_, blob_copy)) 179 rsa->n = BN_dup(public_rsa->n); 180 rsa->e = BN_dup(public_rsa->e); 181 if (!rsa->n || !rsa->e) 184 return rsa.release(); 213 const keymaster_key_blob_t* Keymaster0Engine::RsaKeyToBlob(const RSA* rsa) const { 214 return reinterpret_cast<keymaster_key_blob_t*>(RSA_get_ex_data(rsa, rsa_index 245 rsa_private_transform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) argument 293 data_too_large_for_public_modulus(const uint8_t* data, size_t len, const RSA* rsa) argument 299 RsaPrivateTransform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) const argument [all...] |
H A D | keymaster1_engine.cpp | 140 unique_ptr<RSA, RSA_Delete> rsa(RSA_new_method(engine_.get())); 141 if (!rsa) { 147 if (!RSA_set_ex_data(rsa.get(), rsa_index_, key_data)) { 165 rsa->n = BN_dup(public_rsa->n); 166 rsa->e = BN_dup(public_rsa->e); 167 if (!rsa->n || !rsa->e) { 173 return rsa.release(); 218 unique_ptr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(key)); 219 return GetData(rsa 285 rsa_sign_raw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument 310 rsa_decrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument [all...] |
H A D | rsa_keymaster0_key.cpp | 112 unique_ptr<RSA, RSA_Delete> rsa(engine_->BlobToRsaKey(key_material)); 113 if (!rsa) 118 RsaKeymaster0Key(rsa.release(), hw_enforced, sw_enforced, &error));
|
H A D | rsa_keymaster1_key.cpp | 113 unique_ptr<RSA, RSA_Delete> rsa(engine_->BuildRsaKey(key_material, additional_params, &error)); 114 if (!rsa) 118 RsaKeymaster1Key(rsa.release(), hw_enforced, sw_enforced, &error));
|
H A D | rsa_keymaster1_operation.cpp | 95 Keymaster1Engine::KeyData* key_data = engine_->GetData(rsa_key); // key_data is owned by rsa 127 unique_ptr<EVP_PKEY, EVP_PKEY_Delete> rsa(GetEvpKey(rsa_km1_key, error)); 128 if (!rsa) 133 return new RsaKeymaster1Operation<RsaSignOperation>(digest, padding, rsa.release(), 136 return new RsaKeymaster1Operation<RsaDecryptOperation>(digest, padding, rsa.release(),
|
H A D | rsa_operation.cpp | 79 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> rsa(GetRsaKey(key, error)); 80 if (!rsa.get()) 83 RsaOperation* op = InstantiateOperation(digest, padding, rsa.release()); 323 UniquePtr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(const_cast<EVP_PKEY*>(rsa_key_))); 324 if (!rsa.get()) 327 if (!output->Reinitialize(RSA_size(rsa.get()))) 344 bytes_encrypted = RSA_private_encrypt(key_len, to_encrypt, output->peek_write(), rsa.get(), 356 output->peek_write(), rsa.get(), RSA_PKCS1_PADDING); 430 UniquePtr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(const_cast<EVP_PKEY*>(rsa_key_))); 431 if (!rsa [all...] |
H A D | rsa_keymaster0_key.h | 20 #include <openssl/rsa.h>
|
H A D | rsa_keymaster1_key.h | 20 #include <openssl/rsa.h>
|
/system/core/libcrypto_utils/include/crypto_utils/ |
H A D | android_pubkey.h | 24 #include <openssl/rsa.h>
|
/system/security/keystore-engine/ |
H A D | android_engine.cpp | 39 #include <openssl/rsa.h> 140 const char* rsa_get_key_id(const RSA* rsa) { argument 142 RSA_get_ex_data(rsa, g_keystore_engine->rsa_ex_index())); 149 int rsa_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in, size_t len) { argument 150 ALOGV("rsa_private_transform(%p, %p, %p, %u)", rsa, out, in, (unsigned) len); 154 const char *key_id = rsa_get_key_id(rsa); 193 ALOGV("rsa=%p keystore_rsa_priv_dec successful", rsa); 305 Unique_RSA rsa(RSA_new_method(g_keystore_engine->engine())); 306 if (rsa [all...] |
/system/core/adb/ |
H A D | adb_auth.h | 25 #include <openssl/rsa.h>
|
H A D | adb_auth_host.cpp | 41 #include <openssl/rsa.h> 117 RSA* rsa = RSA_new(); local 118 if (!pkey || !exponent || !rsa) { 124 RSA_generate_key_ex(rsa, 2048, exponent, NULL); 125 EVP_PKEY_set1_RSA(pkey, rsa); 143 if (!write_public_keyfile(rsa, file)) { 153 RSA_free(rsa);
|
/system/tpm/trunks/ |
H A D | session_manager_test.cc | 66 TPM2B_PUBLIC_KEY_RSA rsa; local 67 rsa.size = bytes.size(); 68 memcpy(rsa.buffer, bytes.data(), bytes.size()); 69 return rsa; 105 public_data.public_area.unique.rsa = GetValidRSAPublicKey(); 121 public_data.public_area.unique.rsa.size = 32; 128 public_data.public_area.unique.rsa.size = 256; 139 public_data.public_area.unique.rsa = GetValidRSAPublicKey(); 154 public_data.public_area.unique.rsa = GetValidRSAPublicKey();
|
H A D | session_manager_impl.cc | 31 #include <openssl/rsa.h> 149 public_data.public_area.unique.rsa.size = 0; 159 public_data.public_area.unique.rsa.size != 256) { 171 BN_bin2bn(public_data.public_area.unique.rsa.buffer, 172 public_data.public_area.unique.rsa.size, nullptr); 174 LOG(ERROR) << "Error setting public area of rsa key: " << GetOpenSSLError();
|
H A D | trunks_client_test.cc | 34 #include <openssl/rsa.h> 1020 crypto::ScopedRSA rsa(RSA_new()); 1023 CHECK(RSA_generate_key_ex(rsa.get(), 2048, exponent.get(), nullptr)) 1026 crypto::ScopedRSA rsa(RSA_generate_key(2048, 0x10001, nullptr, nullptr)); 1027 CHECK(rsa.get()); 1029 modulus->resize(BN_num_bytes(rsa.get()->n), 0); 1030 BN_bn2bin(rsa.get()->n, 1032 prime_factor->resize(BN_num_bytes(rsa.get()->p), 0); 1033 BN_bn2bin(rsa.get()->p, 1037 int length = i2d_RSAPublicKey(rsa [all...] |
/system/tpm/attestation/common/ |
H A D | crypto_utility_impl.cc | 33 #include <openssl/rsa.h> 168 crypto::ScopedRSA rsa( 170 if (!rsa.get()) { 176 int length = i2d_RSA_PUBKEY(rsa.get(), &buffer); 191 crypto::ScopedRSA rsa( 193 if (!rsa.get()) { 199 int length = i2d_RSAPublicKey(rsa.get(), &buffer); 242 crypto::ScopedRSA rsa( 244 if (!rsa.get()) { 250 if (!TpmCompatibleOAEPEncrypt(asym_content, rsa [all...] |
H A D | tpm_utility_v1.cc | 26 #include <openssl/rsa.h> 647 crypto::ScopedRSA rsa(RSA_new()); 648 CHECK(rsa.get()); 651 rsa.get()->e = BN_new(); 652 CHECK(rsa.get()->e); 653 BN_set_word(rsa.get()->e, kWellKnownExponent); 655 rsa.get()->e = BN_bin2bn(parms->exponent, parms->exponentSize, nullptr); 656 CHECK(rsa.get()->e); 659 rsa.get()->n = BN_bin2bn(parsed.pubKey.key, parsed.pubKey.keyLength, nullptr); 660 CHECK(rsa [all...] |
/system/update_engine/payload_consumer/ |
H A D | payload_verifier.cc | 148 RSA* rsa = PEM_read_RSA_PUBKEY(fpubkey, nullptr, nullptr, dummy_password); local 150 TEST_AND_RETURN_FALSE(rsa != nullptr); 151 unsigned int keysize = RSA_size(rsa); 154 RSA_free(rsa); 163 rsa, 165 RSA_free(rsa);
|
/system/security/softkeymaster/ |
H A D | keymaster_openssl.cpp | 28 #include <openssl/rsa.h> 338 Unique_RSA rsa(RSA_new()); 339 if (rsa.get() == NULL) { 344 if (!RSA_generate_key_ex(rsa.get(), rsa_params->modulus_size, bn.get(), NULL) || 345 RSA_check_key(rsa.get()) < 0) { 350 if (EVP_PKEY_assign_RSA(pkey, rsa.get()) == 0) { 354 release_because_ownership_transferred(rsa); 542 Unique_RSA rsa(EVP_PKEY_get1_RSA(pkey)); 543 if (rsa.get() == NULL) { 555 if (RSA_private_encrypt(dataLength, data, tmp, rsa [all...] |
/system/keymaster/include/keymaster/ |
H A D | rsa_key_factory.h | 21 #include <openssl/rsa.h>
|
/system/netd/tests/dns_responder/ |
H A D | dns_tls_frontend.cpp | 90 bssl::UniquePtr<RSA> rsa(RSA_new()); 91 if (!rsa) { 95 if (!RSA_generate_key_ex(rsa.get(), 2048, e.get(), NULL)) { 105 if(!EVP_PKEY_assign_RSA(privkey.get(), rsa.get())) { 110 // |rsa| is now owned by |privkey|, so no need to free it. 111 rsa.release();
|