Home
last modified time | relevance | path

Searched refs:rsa (Results 1 – 25 of 30) sorted by relevance

12

/system/extras/verity/
Dgenerate_verity_key.c66 RSA *rsa = NULL; in convert_x509() local
91 rsa = EVP_PKEY_get1_RSA(pkey); in convert_x509()
92 if (!rsa) { in convert_x509()
97 if (write_public_keyfile(rsa, key_file) < 0) { in convert_x509()
114 if (rsa) { in convert_x509()
115 RSA_free(rsa); in convert_x509()
125 RSA* rsa = RSA_new(); in generate_key() local
129 if (!pkey || !exponent || !rsa) { in generate_key()
135 RSA_generate_key_ex(rsa, 2048, exponent, NULL); in generate_key()
136 EVP_PKEY_set1_RSA(pkey, rsa); in generate_key()
[all …]
/system/security/keystore-engine/
Dandroid_engine.cpp86 const char* rsa_get_key_id(const RSA* rsa);
92 int rsa_private_transform(RSA *rsa, uint8_t *out, const uint8_t *in, size_t len) { in rsa_private_transform() argument
93 ALOGV("rsa_private_transform(%p, %p, %p, %u)", rsa, out, in, (unsigned) len); in rsa_private_transform()
97 const char *key_id = rsa_get_key_id(rsa); in rsa_private_transform()
136 ALOGV("rsa=%p keystore_rsa_priv_dec successful", rsa); in rsa_private_transform()
245 const char* rsa_get_key_id(const RSA* rsa) { in rsa_get_key_id() argument
247 RSA_get_ex_data(rsa, g_keystore_engine->rsa_ex_index())); in rsa_get_key_id()
280 Unique_RSA rsa(RSA_new_method(g_keystore_engine->engine())); in wrap_rsa() local
281 if (rsa.get() == NULL) { in wrap_rsa()
290 if (!RSA_set_ex_data(rsa.get(), g_keystore_engine->rsa_ex_index(), in wrap_rsa()
[all …]
/system/keymaster/legacy_support/
Dkeymaster0_engine.cpp164 unique_ptr<RSA, RSA_Delete> rsa(RSA_new_method(engine_)); in BlobToRsaKey() local
165 if (!rsa) in BlobToRsaKey()
169 if (!blob_copy->key_material || !RSA_set_ex_data(rsa.get(), rsa_index_, blob_copy)) in BlobToRsaKey()
179 rsa->n = BN_dup(public_rsa->n); in BlobToRsaKey()
180 rsa->e = BN_dup(public_rsa->e); in BlobToRsaKey()
181 if (!rsa->n || !rsa->e) in BlobToRsaKey()
184 return rsa.release(); in BlobToRsaKey()
213 const keymaster_key_blob_t* Keymaster0Engine::RsaKeyToBlob(const RSA* rsa) const { in RsaKeyToBlob()
214 return reinterpret_cast<keymaster_key_blob_t*>(RSA_get_ex_data(rsa, rsa_index_)); in RsaKeyToBlob()
245 int Keymaster0Engine::rsa_private_transform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) { in rsa_private_transform() argument
[all …]
Dkeymaster1_engine.cpp139 unique_ptr<RSA, RSA_Delete> rsa(RSA_new_method(engine_.get())); in BuildRsaKey() local
140 if (!rsa) { in BuildRsaKey()
146 if (!RSA_set_ex_data(rsa.get(), rsa_index_, key_data)) { in BuildRsaKey()
164 rsa->n = BN_dup(public_rsa->n); in BuildRsaKey()
165 rsa->e = BN_dup(public_rsa->e); in BuildRsaKey()
166 if (!rsa->n || !rsa->e) { in BuildRsaKey()
172 return rsa.release(); in BuildRsaKey()
217 unique_ptr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(key)); in GetData() local
218 return GetData(rsa.get()); in GetData()
231 Keymaster1Engine::KeyData* Keymaster1Engine::GetData(const RSA* rsa) const { in GetData()
[all …]
Drsa_keymaster1_operation.cpp124 unique_ptr<EVP_PKEY, EVP_PKEY_Delete> rsa(GetEvpKey(rsa_km1_key, error)); in CreateOperation() local
125 if (!rsa) return nullptr; in CreateOperation()
130 key.hw_enforced_move(), key.sw_enforced_move(), digest, padding, rsa.release(), in CreateOperation()
134 key.hw_enforced_move(), key.sw_enforced_move(), digest, padding, rsa.release(), in CreateOperation()
Drsa_keymaster1_key.cpp110 RSA_Ptr rsa(engine_->BuildRsaKey(key_material, additional_params, &error)); in LoadKey() local
111 if (!rsa.get()) in LoadKey()
115 RsaKeymaster1Key(rsa.release(), move(hw_enforced), move(sw_enforced), this)); in LoadKey()
Drsa_keymaster0_key.cpp113 unique_ptr<RSA, RSA_Delete> rsa(engine_->BlobToRsaKey(key_material)); in LoadKey() local
114 if (!rsa) in LoadKey()
118 RsaKeymaster0Key(rsa.release(), move(hw_enforced), move(sw_enforced), this)); in LoadKey()
/system/update_engine/payload_consumer/
Dpayload_verifier.cc148 RSA* rsa = PEM_read_RSA_PUBKEY(fpubkey, nullptr, nullptr, dummy_password); in GetRawHashFromSignature() local
150 TEST_AND_RETURN_FALSE(rsa != nullptr); in GetRawHashFromSignature()
151 unsigned int keysize = RSA_size(rsa); in GetRawHashFromSignature()
154 RSA_free(rsa); in GetRawHashFromSignature()
163 rsa, in GetRawHashFromSignature()
165 RSA_free(rsa); in GetRawHashFromSignature()
Ddelta_performer_integration_test.cc229 RSA* rsa = RSA_new(); in SignGeneratedShellPayload() local
232 EXPECT_EQ(1, RSA_generate_key_ex(rsa, 2048, e, nullptr)); in SignGeneratedShellPayload()
238 fprikey, rsa, nullptr, nullptr, 0, nullptr, nullptr)); in SignGeneratedShellPayload()
240 RSA_free(rsa); in SignGeneratedShellPayload()
/system/tpm/trunks/
Dsession_manager_test.cc66 TPM2B_PUBLIC_KEY_RSA rsa; in GetValidRSAPublicKey() local
67 rsa.size = bytes.size(); in GetValidRSAPublicKey()
68 memcpy(rsa.buffer, bytes.data(), bytes.size()); in GetValidRSAPublicKey()
69 return rsa; in GetValidRSAPublicKey()
105 public_data.public_area.unique.rsa = GetValidRSAPublicKey(); in TEST_F()
121 public_data.public_area.unique.rsa.size = 32; in TEST_F()
128 public_data.public_area.unique.rsa.size = 256; in TEST_F()
139 public_data.public_area.unique.rsa = GetValidRSAPublicKey(); in TEST_F()
154 public_data.public_area.unique.rsa = GetValidRSAPublicKey(); in TEST_F()
Dsession_manager_impl.cc150 public_data.public_area.unique.rsa.size = 0; in EncryptSalt()
160 public_data.public_area.unique.rsa.size != 256) { in EncryptSalt()
172 BN_bin2bn(public_data.public_area.unique.rsa.buffer, in EncryptSalt()
173 public_data.public_area.unique.rsa.size, nullptr); in EncryptSalt()
Dtrunks_client_test.cc1022 bssl::UniquePtr<RSA> rsa(RSA_new()); in GenerateRSAKeyPair() local
1025 CHECK(RSA_generate_key_ex(rsa.get(), 2048, exponent.get(), nullptr)) in GenerateRSAKeyPair()
1028 bssl::UniquePtr<RSA> rsa(RSA_generate_key(2048, 0x10001, nullptr, nullptr)); in GenerateRSAKeyPair()
1029 CHECK(rsa.get()); in GenerateRSAKeyPair()
1031 modulus->resize(BN_num_bytes(rsa.get()->n), 0); in GenerateRSAKeyPair()
1032 BN_bn2bin(rsa.get()->n, in GenerateRSAKeyPair()
1034 prime_factor->resize(BN_num_bytes(rsa.get()->p), 0); in GenerateRSAKeyPair()
1035 BN_bn2bin(rsa.get()->p, reinterpret_cast<unsigned char*>( in GenerateRSAKeyPair()
1039 int length = i2d_RSAPublicKey(rsa.get(), &buffer); in GenerateRSAKeyPair()
1050 bssl::UniquePtr<RSA> rsa( in VerifyRSASignature() local
[all …]
Dtpm_utility_test.cc477 public_area.public_area.unique.rsa.size = 0; in TEST_F()
499 public_area.public_area.unique.rsa.size = 0; in TEST_F()
536 public_area.public_area.unique.rsa.size = 0; in TEST_F()
562 public_area.public_area.unique.rsa.size = 0; in TEST_F()
588 public_area.public_area.unique.rsa.size = 0; in TEST_F()
612 public_area.public_area.unique.rsa.size = 0; in TEST_F()
663 public_area.public_area.unique.rsa.size = 0; in TEST_F()
691 public_area.public_area.unique.rsa.size = 0; in TEST_F()
719 public_area.public_area.unique.rsa.size = 0; in TEST_F()
741 public_area.public_area.unique.rsa.size = 0; in TEST_F()
[all …]
Dtpm_utility_impl.cc785 public_area.unique.rsa = Make_TPM2B_PUBLIC_KEY_RSA(modulus); in ImportRSAKey()
800 in_sensitive.sensitive.rsa = Make_TPM2B_PRIVATE_KEY_RSA(prime_factor); in ImportRSAKey()
1697 public_area.unique.rsa = Make_TPM2B_PUBLIC_KEY_RSA(""); in CreateDefaultPublicArea()
/system/tpm/attestation/common/
Dcrypto_utility_impl.cc168 crypto::ScopedRSA rsa( in GetRSASubjectPublicKeyInfo() local
170 if (!rsa.get()) { in GetRSASubjectPublicKeyInfo()
176 int length = i2d_RSA_PUBKEY(rsa.get(), &buffer); in GetRSASubjectPublicKeyInfo()
191 crypto::ScopedRSA rsa( in GetRSAPublicKey() local
193 if (!rsa.get()) { in GetRSAPublicKey()
199 int length = i2d_RSAPublicKey(rsa.get(), &buffer); in GetRSAPublicKey()
242 crypto::ScopedRSA rsa( in EncryptIdentityCredential() local
244 if (!rsa.get()) { in EncryptIdentityCredential()
250 if (!TpmCompatibleOAEPEncrypt(asym_content, rsa.get(), in EncryptIdentityCredential()
279 crypto::ScopedRSA rsa(d2i_RSA_PUBKEY(NULL, &asn1_ptr, public_key.size())); in EncryptForUnbind() local
[all …]
Dtpm_utility_v1.cc647 crypto::ScopedRSA rsa(RSA_new()); in ConvertPublicKeyToDER() local
648 CHECK(rsa.get()); in ConvertPublicKeyToDER()
651 rsa.get()->e = BN_new(); in ConvertPublicKeyToDER()
652 CHECK(rsa.get()->e); in ConvertPublicKeyToDER()
653 BN_set_word(rsa.get()->e, kWellKnownExponent); in ConvertPublicKeyToDER()
655 rsa.get()->e = BN_bin2bn(parms->exponent, parms->exponentSize, nullptr); in ConvertPublicKeyToDER()
656 CHECK(rsa.get()->e); in ConvertPublicKeyToDER()
659 rsa.get()->n = BN_bin2bn(parsed.pubKey.key, parsed.pubKey.keyLength, nullptr); in ConvertPublicKeyToDER()
660 CHECK(rsa.get()->n); in ConvertPublicKeyToDER()
663 int der_length = i2d_RSAPublicKey(rsa.get(), nullptr); in ConvertPublicKeyToDER()
[all …]
/system/keymaster/include/keymaster/legacy_support/
Dkeymaster0_engine.h60 const keymaster_key_blob_t* RsaKeyToBlob(const RSA* rsa) const;
61 const keymaster_key_blob_t* EcKeyToBlob(const EC_KEY* rsa) const;
75 static int rsa_private_transform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len);
88 int RsaPrivateTransform(RSA* rsa, uint8_t* out, const uint8_t* in, size_t len) const;
Dkeymaster1_engine.h77 KeyData* GetData(const RSA* rsa) const;
78 KeyData* GetData(const EC_KEY* rsa) const;
103 static int rsa_sign_raw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out,
105 static int rsa_decrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out,
/system/keymaster/km_openssl/
Drsa_operation.cpp74 UniquePtr<EVP_PKEY, EVP_PKEY_Delete> rsa(GetRsaKey(move(key), error)); in CreateRsaOperation() local
75 if (!rsa.get()) return nullptr; in CreateRsaOperation()
78 padding, rsa.release()); in CreateRsaOperation()
324 UniquePtr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(const_cast<EVP_PKEY*>(rsa_key_))); in SignUndigested() local
325 if (!rsa.get()) in SignUndigested()
328 if (!output->Reinitialize(RSA_size(rsa.get()))) in SignUndigested()
345 bytes_encrypted = RSA_private_encrypt(key_len, to_encrypt, output->peek_write(), rsa.get(), in SignUndigested()
357 output->peek_write(), rsa.get(), RSA_PKCS1_PADDING); in SignUndigested()
431 UniquePtr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(const_cast<EVP_PKEY*>(rsa_key_))); in VerifyUndigested() local
432 if (!rsa.get()) in VerifyUndigested()
[all …]
/system/keymaster/include/keymaster/km_openssl/
Drsa_key.h45 RsaKey(RSA* rsa, AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, in RsaKey() argument
47 : AsymmetricKey(move(hw_enforced), move(sw_enforced), key_factory), rsa_key_(rsa) {} in RsaKey()
/system/netd/tests/dns_responder/
Ddns_tls_frontend.cpp90 bssl::UniquePtr<RSA> rsa(RSA_new()); in make_private_key() local
91 if (!rsa) { in make_private_key()
95 if (!RSA_generate_key_ex(rsa.get(), 2048, e.get(), NULL)) { in make_private_key()
105 if(!EVP_PKEY_assign_RSA(privkey.get(), rsa.get())) { in make_private_key()
111 rsa.release(); in make_private_key()
/system/core/adb/
Dadb_auth_host.cpp117 RSA* rsa = RSA_new(); in generate_key() local
118 if (!pkey || !exponent || !rsa) { in generate_key()
124 RSA_generate_key_ex(rsa, 2048, exponent, NULL); in generate_key()
125 EVP_PKEY_set1_RSA(pkey, rsa); in generate_key()
143 if (!write_public_keyfile(rsa, file)) { in generate_key()
153 RSA_free(rsa); in generate_key()
/system/keymaster/key_blob_utils/
Dsoftware_keyblobs.cpp121 RSA_Ptr rsa(EVP_PKEY_get1_RSA(pubkey)); in FakeKeyAuthorizations() local
122 if (!rsa) in FakeKeyAuthorizations()
124 hw_enforced->push_back(TAG_KEY_SIZE, RSA_size(rsa.get()) * 8); in FakeKeyAuthorizations()
125 uint64_t public_exponent = BN_get_word(rsa->e); in FakeKeyAuthorizations()
/system/update_engine/payload_generator/
Dpayload_signer.cc364 RSA* rsa = PEM_read_RSAPrivateKey(fprikey, nullptr, nullptr, nullptr); in SignHash() local
366 TEST_AND_RETURN_FALSE(rsa != nullptr); in SignHash()
367 brillo::Blob signature(RSA_size(rsa)); in SignHash()
371 rsa, in SignHash()
373 RSA_free(rsa); in SignHash()
/system/keymaster/tests/
Dandroid_keymaster_test.cpp2129 unique_ptr<RSA, RSA_Delete> rsa(EVP_PKEY_get1_RSA(pkey.get())); in TEST_P() local
2131 size_t modulus_len = BN_num_bytes(rsa->n); in TEST_P()
2134 BN_bn2bin(rsa->n, modulus_buf.get()); in TEST_P()
2149 BN_sub(rsa->n, rsa->n, BN_value_one()); in TEST_P()
2150 modulus_len = BN_num_bytes(rsa->n); in TEST_P()
2152 BN_bn2bin(rsa->n, modulus_buf.get()); in TEST_P()

12