/system/extras/verity/ |
D | generate_verity_key.c | 66 RSA *rsa = NULL; in convert_x509() local 91 rsa = EVP_PKEY_get1_RSA(pkey); in convert_x509() 92 if (!rsa) { in convert_x509() 97 if (write_public_keyfile(rsa, key_file) < 0) { in convert_x509() 114 if (rsa) { in convert_x509() 115 RSA_free(rsa); in convert_x509() 125 RSA* rsa = RSA_new(); in generate_key() local 129 if (!pkey || !exponent || !rsa) { in generate_key() 135 RSA_generate_key_ex(rsa, 2048, exponent, NULL); in generate_key() 136 EVP_PKEY_set1_RSA(pkey, rsa); in generate_key() [all …]
|
/system/security/keystore-engine/ |
D | android_engine.cpp | 86 const char* rsa_get_key_id(const RSA* rsa); 92 int rsa_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in, size_t len) { in rsa_private_transform() argument 93 ALOGV("rsa_private_transform(%p, %p, %p, %u)", rsa, out, in, (unsigned) len); in rsa_private_transform() 97 const char *key_id = rsa_get_key_id(rsa); in rsa_private_transform() 136 ALOGV("rsa=%p keystore_rsa_priv_dec successful", rsa); in rsa_private_transform() 245 const char* rsa_get_key_id(const RSA* rsa) { in rsa_get_key_id() argument 247 RSA_get_ex_data(rsa, g_keystore_engine->rsa_ex_index())); in rsa_get_key_id() 280 Unique_RSA rsa(RSA_new_method(g_keystore_engine->engine())); in wrap_rsa() local 281 if (rsa.get() == NULL) { in wrap_rsa() 290 if (!RSA_set_ex_data(rsa.get(), g_keystore_engine->rsa_ex_index(), in wrap_rsa() [all …]
|
/system/keymaster/legacy_support/ |
D | keymaster0_engine.cpp | 164 unique_ptr<RSA, RSA_Delete> rsa(RSA_new_method(engine_)); in BlobToRsaKey() local 165 if (!rsa) in BlobToRsaKey() 169 if (!blob_copy->key_material || !RSA_set_ex_data(rsa.get(), rsa_index_, blob_copy)) in BlobToRsaKey() 179 rsa->n = BN_dup(public_rsa->n); in BlobToRsaKey() 180 rsa->e = BN_dup(public_rsa->e); in BlobToRsaKey() 181 if (!rsa->n || !rsa->e) in BlobToRsaKey() 184 return rsa.release(); in BlobToRsaKey() 213 const keymaster_key_blob_t* Keymaster0Engine::RsaKeyToBlob(const RSA* rsa) const { in RsaKeyToBlob() 214 return reinterpret_cast<keymaster_key_blob_t*>(RSA_get_ex_data(rsa, rsa_index_)); in RsaKeyToBlob() 245 int Keymaster0Engine::rsa_private_transform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) { in rsa_private_transform() argument [all …]
|
D | keymaster1_engine.cpp | 139 unique_ptr<RSA, RSA_Delete> rsa(RSA_new_method(engine_.get())); in BuildRsaKey() local 140 if (!rsa) { in BuildRsaKey() 146 if (!RSA_set_ex_data(rsa.get(), rsa_index_, key_data)) { in BuildRsaKey() 164 rsa->n = BN_dup(public_rsa->n); in BuildRsaKey() 165 rsa->e = BN_dup(public_rsa->e); in BuildRsaKey() 166 if (!rsa->n || !rsa->e) { in BuildRsaKey() 172 return rsa.release(); in BuildRsaKey() 217 unique_ptr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(key)); in GetData() local 218 return GetData(rsa.get()); in GetData() 231 Keymaster1Engine::KeyData* Keymaster1Engine::GetData(const RSA* rsa) const { in GetData() [all …]
|
D | rsa_keymaster1_operation.cpp | 124 unique_ptr<EVP_PKEY, EVP_PKEY_Delete> rsa(GetEvpKey(rsa_km1_key, error)); in CreateOperation() local 125 if (!rsa) return nullptr; in CreateOperation() 130 key.hw_enforced_move(), key.sw_enforced_move(), digest, padding, rsa.release(), in CreateOperation() 134 key.hw_enforced_move(), key.sw_enforced_move(), digest, padding, rsa.release(), in CreateOperation()
|
D | rsa_keymaster1_key.cpp | 110 RSA_Ptr rsa(engine_->BuildRsaKey(key_material, additional_params, &error)); in LoadKey() local 111 if (!rsa.get()) in LoadKey() 115 RsaKeymaster1Key(rsa.release(), move(hw_enforced), move(sw_enforced), this)); in LoadKey()
|
D | rsa_keymaster0_key.cpp | 113 unique_ptr<RSA, RSA_Delete> rsa(engine_->BlobToRsaKey(key_material)); in LoadKey() local 114 if (!rsa) in LoadKey() 118 RsaKeymaster0Key(rsa.release(), move(hw_enforced), move(sw_enforced), this)); in LoadKey()
|
/system/update_engine/payload_consumer/ |
D | payload_verifier.cc | 148 RSA* rsa = PEM_read_RSA_PUBKEY(fpubkey, nullptr, nullptr, dummy_password); in GetRawHashFromSignature() local 150 TEST_AND_RETURN_FALSE(rsa != nullptr); in GetRawHashFromSignature() 151 unsigned int keysize = RSA_size(rsa); in GetRawHashFromSignature() 154 RSA_free(rsa); in GetRawHashFromSignature() 163 rsa, in GetRawHashFromSignature() 165 RSA_free(rsa); in GetRawHashFromSignature()
|
D | delta_performer_integration_test.cc | 229 RSA* rsa = RSA_new(); in SignGeneratedShellPayload() local 232 EXPECT_EQ(1, RSA_generate_key_ex(rsa, 2048, e, nullptr)); in SignGeneratedShellPayload() 238 fprikey, rsa, nullptr, nullptr, 0, nullptr, nullptr)); in SignGeneratedShellPayload() 240 RSA_free(rsa); in SignGeneratedShellPayload()
|
/system/tpm/trunks/ |
D | session_manager_test.cc | 66 TPM2B_PUBLIC_KEY_RSA rsa; in GetValidRSAPublicKey() local 67 rsa.size = bytes.size(); in GetValidRSAPublicKey() 68 memcpy(rsa.buffer, bytes.data(), bytes.size()); in GetValidRSAPublicKey() 69 return rsa; in GetValidRSAPublicKey() 105 public_data.public_area.unique.rsa = GetValidRSAPublicKey(); in TEST_F() 121 public_data.public_area.unique.rsa.size = 32; in TEST_F() 128 public_data.public_area.unique.rsa.size = 256; in TEST_F() 139 public_data.public_area.unique.rsa = GetValidRSAPublicKey(); in TEST_F() 154 public_data.public_area.unique.rsa = GetValidRSAPublicKey(); in TEST_F()
|
D | session_manager_impl.cc | 150 public_data.public_area.unique.rsa.size = 0; in EncryptSalt() 160 public_data.public_area.unique.rsa.size != 256) { in EncryptSalt() 172 BN_bin2bn(public_data.public_area.unique.rsa.buffer, in EncryptSalt() 173 public_data.public_area.unique.rsa.size, nullptr); in EncryptSalt()
|
D | trunks_client_test.cc | 1022 bssl::UniquePtr<RSA> rsa(RSA_new()); in GenerateRSAKeyPair() local 1025 CHECK(RSA_generate_key_ex(rsa.get(), 2048, exponent.get(), nullptr)) in GenerateRSAKeyPair() 1028 bssl::UniquePtr<RSA> rsa(RSA_generate_key(2048, 0x10001, nullptr, nullptr)); in GenerateRSAKeyPair() 1029 CHECK(rsa.get()); in GenerateRSAKeyPair() 1031 modulus->resize(BN_num_bytes(rsa.get()->n), 0); in GenerateRSAKeyPair() 1032 BN_bn2bin(rsa.get()->n, in GenerateRSAKeyPair() 1034 prime_factor->resize(BN_num_bytes(rsa.get()->p), 0); in GenerateRSAKeyPair() 1035 BN_bn2bin(rsa.get()->p, reinterpret_cast<unsigned char*>( in GenerateRSAKeyPair() 1039 int length = i2d_RSAPublicKey(rsa.get(), &buffer); in GenerateRSAKeyPair() 1050 bssl::UniquePtr<RSA> rsa( in VerifyRSASignature() local [all …]
|
D | tpm_utility_test.cc | 477 public_area.public_area.unique.rsa.size = 0; in TEST_F() 499 public_area.public_area.unique.rsa.size = 0; in TEST_F() 536 public_area.public_area.unique.rsa.size = 0; in TEST_F() 562 public_area.public_area.unique.rsa.size = 0; in TEST_F() 588 public_area.public_area.unique.rsa.size = 0; in TEST_F() 612 public_area.public_area.unique.rsa.size = 0; in TEST_F() 663 public_area.public_area.unique.rsa.size = 0; in TEST_F() 691 public_area.public_area.unique.rsa.size = 0; in TEST_F() 719 public_area.public_area.unique.rsa.size = 0; in TEST_F() 741 public_area.public_area.unique.rsa.size = 0; in TEST_F() [all …]
|
D | tpm_utility_impl.cc | 785 public_area.unique.rsa = Make_TPM2B_PUBLIC_KEY_RSA(modulus); in ImportRSAKey() 800 in_sensitive.sensitive.rsa = Make_TPM2B_PRIVATE_KEY_RSA(prime_factor); in ImportRSAKey() 1697 public_area.unique.rsa = Make_TPM2B_PUBLIC_KEY_RSA(""); in CreateDefaultPublicArea()
|
/system/tpm/attestation/common/ |
D | crypto_utility_impl.cc | 168 crypto::ScopedRSA rsa( in GetRSASubjectPublicKeyInfo() local 170 if (!rsa.get()) { in GetRSASubjectPublicKeyInfo() 176 int length = i2d_RSA_PUBKEY(rsa.get(), &buffer); in GetRSASubjectPublicKeyInfo() 191 crypto::ScopedRSA rsa( in GetRSAPublicKey() local 193 if (!rsa.get()) { in GetRSAPublicKey() 199 int length = i2d_RSAPublicKey(rsa.get(), &buffer); in GetRSAPublicKey() 242 crypto::ScopedRSA rsa( in EncryptIdentityCredential() local 244 if (!rsa.get()) { in EncryptIdentityCredential() 250 if (!TpmCompatibleOAEPEncrypt(asym_content, rsa.get(), in EncryptIdentityCredential() 279 crypto::ScopedRSA rsa(d2i_RSA_PUBKEY(NULL, &asn1_ptr, public_key.size())); in EncryptForUnbind() local [all …]
|
D | tpm_utility_v1.cc | 647 crypto::ScopedRSA rsa(RSA_new()); in ConvertPublicKeyToDER() local 648 CHECK(rsa.get()); in ConvertPublicKeyToDER() 651 rsa.get()->e = BN_new(); in ConvertPublicKeyToDER() 652 CHECK(rsa.get()->e); in ConvertPublicKeyToDER() 653 BN_set_word(rsa.get()->e, kWellKnownExponent); in ConvertPublicKeyToDER() 655 rsa.get()->e = BN_bin2bn(parms->exponent, parms->exponentSize, nullptr); in ConvertPublicKeyToDER() 656 CHECK(rsa.get()->e); in ConvertPublicKeyToDER() 659 rsa.get()->n = BN_bin2bn(parsed.pubKey.key, parsed.pubKey.keyLength, nullptr); in ConvertPublicKeyToDER() 660 CHECK(rsa.get()->n); in ConvertPublicKeyToDER() 663 int der_length = i2d_RSAPublicKey(rsa.get(), nullptr); in ConvertPublicKeyToDER() [all …]
|
/system/keymaster/include/keymaster/legacy_support/ |
D | keymaster0_engine.h | 60 const keymaster_key_blob_t* RsaKeyToBlob(const RSA* rsa) const; 61 const keymaster_key_blob_t* EcKeyToBlob(const EC_KEY* rsa) const; 75 static int rsa_private_transform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len); 88 int RsaPrivateTransform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) const;
|
D | keymaster1_engine.h | 77 KeyData* GetData(const RSA* rsa) const; 78 KeyData* GetData(const EC_KEY* rsa) const; 103 static int rsa_sign_raw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, 105 static int rsa_decrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out,
|
/system/keymaster/km_openssl/ |
D | rsa_operation.cpp | 74 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> rsa(GetRsaKey(move(key), error)); in CreateRsaOperation() local 75 if (!rsa.get()) return nullptr; in CreateRsaOperation() 78 padding, rsa.release()); in CreateRsaOperation() 324 UniquePtr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(const_cast<EVP_PKEY*>(rsa_key_))); in SignUndigested() local 325 if (!rsa.get()) in SignUndigested() 328 if (!output->Reinitialize(RSA_size(rsa.get()))) in SignUndigested() 345 bytes_encrypted = RSA_private_encrypt(key_len, to_encrypt, output->peek_write(), rsa.get(), in SignUndigested() 357 output->peek_write(), rsa.get(), RSA_PKCS1_PADDING); in SignUndigested() 431 UniquePtr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(const_cast<EVP_PKEY*>(rsa_key_))); in VerifyUndigested() local 432 if (!rsa.get()) in VerifyUndigested() [all …]
|
/system/keymaster/include/keymaster/km_openssl/ |
D | rsa_key.h | 45 RsaKey(RSA* rsa, AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, in RsaKey() argument 47 : AsymmetricKey(move(hw_enforced), move(sw_enforced), key_factory), rsa_key_(rsa) {} in RsaKey()
|
/system/netd/tests/dns_responder/ |
D | dns_tls_frontend.cpp | 90 bssl::UniquePtr<RSA> rsa(RSA_new()); in make_private_key() local 91 if (!rsa) { in make_private_key() 95 if (!RSA_generate_key_ex(rsa.get(), 2048, e.get(), NULL)) { in make_private_key() 105 if(!EVP_PKEY_assign_RSA(privkey.get(), rsa.get())) { in make_private_key() 111 rsa.release(); in make_private_key()
|
/system/core/adb/ |
D | adb_auth_host.cpp | 117 RSA* rsa = RSA_new(); in generate_key() local 118 if (!pkey || !exponent || !rsa) { in generate_key() 124 RSA_generate_key_ex(rsa, 2048, exponent, NULL); in generate_key() 125 EVP_PKEY_set1_RSA(pkey, rsa); in generate_key() 143 if (!write_public_keyfile(rsa, file)) { in generate_key() 153 RSA_free(rsa); in generate_key()
|
/system/keymaster/key_blob_utils/ |
D | software_keyblobs.cpp | 121 RSA_Ptr rsa(EVP_PKEY_get1_RSA(pubkey)); in FakeKeyAuthorizations() local 122 if (!rsa) in FakeKeyAuthorizations() 124 hw_enforced->push_back(TAG_KEY_SIZE, RSA_size(rsa.get()) * 8); in FakeKeyAuthorizations() 125 uint64_t public_exponent = BN_get_word(rsa->e); in FakeKeyAuthorizations()
|
/system/update_engine/payload_generator/ |
D | payload_signer.cc | 364 RSA* rsa = PEM_read_RSAPrivateKey(fprikey, nullptr, nullptr, nullptr); in SignHash() local 366 TEST_AND_RETURN_FALSE(rsa != nullptr); in SignHash() 367 brillo::Blob signature(RSA_size(rsa)); in SignHash() 371 rsa, in SignHash() 373 RSA_free(rsa); in SignHash()
|
/system/keymaster/tests/ |
D | android_keymaster_test.cpp | 2129 unique_ptr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(pkey.get())); in TEST_P() local 2131 size_t modulus_len = BN_num_bytes(rsa->n); in TEST_P() 2134 BN_bn2bin(rsa->n, modulus_buf.get()); in TEST_P() 2149 BN_sub(rsa->n, rsa->n, BN_value_one()); in TEST_P() 2150 modulus_len = BN_num_bytes(rsa->n); in TEST_P() 2152 BN_bn2bin(rsa->n, modulus_buf.get()); in TEST_P()
|