/system/core/adb/daemon/ |
D | auth.cpp | 117 const std::string& pubkey = split[0]; in adbd_tls_client_ca_list() local 118 if (b64_pton(pubkey.c_str(), keybuf, sizeof(keybuf)) != ANDROID_PUBKEY_ENCODED_SIZE) { in adbd_tls_client_ca_list() 119 LOG(ERROR) << "Invalid base64 key " << pubkey; in adbd_tls_client_ca_list() 125 LOG(ERROR) << "Failed to parse key " << pubkey; in adbd_tls_client_ca_list() 164 const std::string& pubkey = split[0]; in adbd_auth_verify() local 165 if (b64_pton(pubkey.c_str(), keybuf, sizeof(keybuf)) != ANDROID_PUBKEY_ENCODED_SIZE) { in adbd_auth_verify() 166 LOG(ERROR) << "Invalid base64 key " << pubkey; in adbd_auth_verify() 172 LOG(ERROR) << "Failed to parse key " << pubkey; in adbd_auth_verify() 305 const std::string& pubkey = split[0]; in adbd_tls_verify_cert() local 306 if (b64_pton(pubkey.c_str(), keybuf, sizeof(keybuf)) != ANDROID_PUBKEY_ENCODED_SIZE) { in adbd_tls_verify_cert() [all …]
|
/system/security/keystore-engine/ |
D | keystore_backend_hidl.cpp | 65 const char *key_id, uint8_t** pubkey, size_t* pubkey_len) { in get_pubkey() argument 66 if (key_id == nullptr || pubkey == nullptr || pubkey_len == nullptr) { in get_pubkey() 82 *pubkey = publicKey.releaseData(); in get_pubkey()
|
D | keystore_backend.h | 33 virtual int32_t get_pubkey(const char *key_id, uint8_t** pubkey,
|
D | keystore_backend_binder.h | 34 int32_t get_pubkey(const char *key_id, uint8_t** pubkey,
|
D | keystore_backend_hidl.h | 34 int32_t get_pubkey(const char *key_id, uint8_t** pubkey,
|
D | android_engine.cpp | 340 uint8_t *pubkey = nullptr; in EVP_PKEY_from_keystore() local 342 int32_t ret = g_keystore_backend->get_pubkey(key_id, &pubkey, &pubkey_len); in EVP_PKEY_from_keystore() 346 } else if (ret != 0 || pubkey == nullptr) { in EVP_PKEY_from_keystore() 351 const uint8_t *inp = pubkey; in EVP_PKEY_from_keystore()
|
D | keystore_backend_binder.cpp | 245 int32_t KeystoreBackendBinder::get_pubkey(const char* key_id, uint8_t** pubkey, in get_pubkey() argument 282 if (pubkey) { in get_pubkey() 283 *pubkey = export_result.exportData.releaseData(); in get_pubkey()
|
/system/core/adb/client/ |
D | auth.cpp | 71 std::string pubkey; in generate_key() local 76 if (!CalculatePublicKey(&pubkey, rsa)) { in generate_key() 99 if (!android::base::WriteStringToFile(pubkey, file + ".pub")) { in generate_key() 108 unsigned char* pubkey = nullptr; in hash_key() local 109 int len = i2d_RSA_PUBKEY(key, &pubkey); in hash_key() 117 SHA256(pubkey, len, reinterpret_cast<unsigned char*>(&result[0])); in hash_key() 118 OPENSSL_free(pubkey); in hash_key() 330 std::string pubkey; in adb_auth_pubkey() local 331 if (!pubkey_from_privkey(&pubkey, filename)) { in adb_auth_pubkey() 334 pubkey.push_back('\n'); in adb_auth_pubkey() [all …]
|
/system/core/adb/crypto/tests/ |
D | key_test.cpp | 58 const std::string& pubkey = split[0]; in TEST() local 59 ASSERT_EQ(b64_pton(pubkey.c_str(), keybuf, sizeof(keybuf)), ANDROID_PUBKEY_ENCODED_SIZE); in TEST()
|
D | rsa_2048_key_test.cpp | 61 const std::string& pubkey = split[0]; in TEST() local 62 ASSERT_EQ(b64_pton(pubkey.c_str(), keybuf, sizeof(keybuf)), ANDROID_PUBKEY_ENCODED_SIZE); in TEST()
|
/system/keymaster/key_blob_utils/ |
D | software_keyblobs.cpp | 94 keymaster_error_t FakeKeyAuthorizations(EVP_PKEY* pubkey, in FakeKeyAuthorizations() argument 100 switch (EVP_PKEY_type(pubkey->type)) { in FakeKeyAuthorizations() 121 RSA_Ptr rsa(EVP_PKEY_get1_RSA(pubkey)); in FakeKeyAuthorizations() 145 UniquePtr<EC_KEY, EC_KEY_Delete> ec_key(EVP_PKEY_get1_EC_KEY(pubkey)); in FakeKeyAuthorizations()
|
/system/keymaster/include/keymaster/key_blob_utils/ |
D | software_keyblobs.h | 38 keymaster_error_t FakeKeyAuthorizations(EVP_PKEY* pubkey,
|
/system/apex/apexd/ |
D | apex_file.cpp | 61 std::string pubkey; in Open() local 101 pubkey.resize(length, '\0'); in Open() 103 reinterpret_cast<uint8_t*>(&(pubkey)[0]), length); in Open() 115 return ApexFile(path, image_offset, image_size, std::move(*manifest), pubkey, in Open()
|
/system/apex/shim/build/ |
D | Android.bp | 24 name: "com.android.apex.cts.shim.pubkey", 26 out: ["com.android.apex.cts.shim.pubkey"], 34 public_key: ":com.android.apex.cts.shim.pubkey", 215 name: "com.android.apex.cts.shim_not_pre_installed.pubkey", 217 out: ["com.android.apex.cts.shim_not_pre_installed.pubkey"], 225 public_key: ":com.android.apex.cts.shim_not_pre_installed.pubkey",
|
/system/apex/apexer/ |
D | apexer.py | 621 if args.pubkey: 622 shutil.copyfile(args.pubkey, os.path.join(content_dir, 'apex_pubkey'))
|
/system/keymaster/tests/ |
D | android_keymaster_test.cpp | 1102 string pubkey; in TEST_P() local 1103 EXPECT_EQ(KM_ERROR_OK, ExportKey(KM_KEY_FORMAT_X509, &pubkey)); in TEST_P() 1105 const uint8_t* p = reinterpret_cast<const uint8_t*>(pubkey.data()); in TEST_P() 1107 d2i_PUBKEY(nullptr /* alloc new */, &p, pubkey.size())); in TEST_P() 1197 string pubkey; in TEST_P() local 1198 EXPECT_EQ(KM_ERROR_OK, ExportKey(KM_KEY_FORMAT_X509, &pubkey)); in TEST_P() 1200 const uint8_t* p = reinterpret_cast<const uint8_t*>(pubkey.data()); in TEST_P() 1202 d2i_PUBKEY(nullptr /* alloc new */, &p, pubkey.size())); in TEST_P()
|