/system/keymaster/include/keymaster/km_openssl/ |
H A D | rsa_key.h | 20 #include <openssl/rsa.h> 45 RsaKey(RSA* rsa, AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, argument 47 : AsymmetricKey(move(hw_enforced), move(sw_enforced), key_factory), rsa_key_(rsa) {}
|
/system/tpm/trunks/ |
H A D | session_manager_test.cc | 66 TPM2B_PUBLIC_KEY_RSA rsa; local 67 rsa.size = bytes.size(); 68 memcpy(rsa.buffer, bytes.data(), bytes.size()); 69 return rsa; 105 public_data.public_area.unique.rsa = GetValidRSAPublicKey(); 121 public_data.public_area.unique.rsa.size = 32; 128 public_data.public_area.unique.rsa.size = 256; 139 public_data.public_area.unique.rsa = GetValidRSAPublicKey(); 154 public_data.public_area.unique.rsa = GetValidRSAPublicKey();
|
H A D | tpm_generated.h | 1492 BYTE rsa[MAX_RSA_KEY_BYTES]; member in union:trunks::TPMU_ENCRYPTED_SECRET 1541 TPM2B_PUBLIC_KEY_RSA rsa; member in union:trunks::TPMU_PUBLIC_ID 1565 TPM2B_PRIVATE_KEY_RSA rsa; member in union:trunks::TPMU_SENSITIVE_COMPOSITE
|
/system/update_engine/payload_consumer/ |
H A D | payload_verifier.cc | 148 RSA* rsa = PEM_read_RSA_PUBKEY(fpubkey, nullptr, nullptr, dummy_password); local 150 TEST_AND_RETURN_FALSE(rsa != nullptr); 151 unsigned int keysize = RSA_size(rsa); 154 RSA_free(rsa); 163 rsa, 165 RSA_free(rsa);
|
H A D | delta_performer_integration_test.cc | 229 RSA* rsa = RSA_new(); local 232 EXPECT_EQ(1, RSA_generate_key_ex(rsa, 2048, e, nullptr)); 238 fprikey, rsa, nullptr, nullptr, 0, nullptr, nullptr)); 240 RSA_free(rsa);
|
/system/extras/verity/ |
H A D | generate_verity_key.c | 31 #include <openssl/rsa.h> 66 RSA *rsa = NULL; local 91 rsa = EVP_PKEY_get1_RSA(pkey); 92 if (!rsa) { 97 if (write_public_keyfile(rsa, key_file) < 0) { 114 if (rsa) { 115 RSA_free(rsa); 125 RSA* rsa = RSA_new(); local 129 if (!pkey || !exponent || !rsa) { 135 RSA_generate_key_ex(rsa, 204 [all...] |
/system/keymaster/legacy_support/ |
H A D | keymaster0_engine.cpp | 164 unique_ptr<RSA, RSA_Delete> rsa(RSA_new_method(engine_)); 165 if (!rsa) 169 if (!blob_copy->key_material || !RSA_set_ex_data(rsa.get(), rsa_index_, blob_copy)) 179 rsa->n = BN_dup(public_rsa->n); 180 rsa->e = BN_dup(public_rsa->e); 181 if (!rsa->n || !rsa->e) 184 return rsa.release(); 213 const keymaster_key_blob_t* Keymaster0Engine::RsaKeyToBlob(const RSA* rsa) const { 214 return reinterpret_cast<keymaster_key_blob_t*>(RSA_get_ex_data(rsa, rsa_index 245 rsa_private_transform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) argument 293 data_too_large_for_public_modulus(const uint8_t* data, size_t len, const RSA* rsa) argument 299 RsaPrivateTransform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) const argument [all...] |
H A D | keymaster1_engine.cpp | 139 unique_ptr<RSA, RSA_Delete> rsa(RSA_new_method(engine_.get())); 140 if (!rsa) { 146 if (!RSA_set_ex_data(rsa.get(), rsa_index_, key_data)) { 164 rsa->n = BN_dup(public_rsa->n); 165 rsa->e = BN_dup(public_rsa->e); 166 if (!rsa->n || !rsa->e) { 172 return rsa.release(); 217 unique_ptr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(key)); 218 return GetData(rsa 284 rsa_sign_raw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument 309 rsa_decrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument [all...] |
/system/security/keystore-engine/ |
H A D | android_engine.cpp | 39 #include <openssl/rsa.h> 86 const char* rsa_get_key_id(const RSA* rsa); 92 int rsa_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in, size_t len) { argument 93 ALOGV("rsa_private_transform(%p, %p, %p, %u)", rsa, out, in, (unsigned) len); 97 const char *key_id = rsa_get_key_id(rsa); 136 ALOGV("rsa=%p keystore_rsa_priv_dec successful", rsa); 245 const char* rsa_get_key_id(const RSA* rsa) { argument 247 RSA_get_ex_data(rsa, g_keystore_engine->rsa_ex_index())); 280 Unique_RSA rsa(RSA_new_metho [all...] |
/system/core/adb/ |
H A D | adb_auth_host.cpp | 41 #include <openssl/rsa.h> 117 RSA* rsa = RSA_new(); local 118 if (!pkey || !exponent || !rsa) { 124 RSA_generate_key_ex(rsa, 2048, exponent, NULL); 125 EVP_PKEY_set1_RSA(pkey, rsa); 143 if (!write_public_keyfile(rsa, file)) { 153 RSA_free(rsa);
|
/system/update_engine/payload_generator/ |
H A D | payload_signer.cc | 364 RSA* rsa = PEM_read_RSAPrivateKey(fprikey, nullptr, nullptr, nullptr); local 366 TEST_AND_RETURN_FALSE(rsa != nullptr); 367 brillo::Blob signature(RSA_size(rsa)); 371 rsa, 373 RSA_free(rsa);
|