Home
last modified time | relevance | path

Searched refs:pubkey (Results 1 – 16 of 16) sorted by relevance

/system/core/adb/daemon/
Dauth.cpp117 const std::string& pubkey = split[0]; in adbd_tls_client_ca_list() local
118 if (b64_pton(pubkey.c_str(), keybuf, sizeof(keybuf)) != ANDROID_PUBKEY_ENCODED_SIZE) { in adbd_tls_client_ca_list()
119 LOG(ERROR) << "Invalid base64 key " << pubkey; in adbd_tls_client_ca_list()
125 LOG(ERROR) << "Failed to parse key " << pubkey; in adbd_tls_client_ca_list()
164 const std::string& pubkey = split[0]; in adbd_auth_verify() local
165 if (b64_pton(pubkey.c_str(), keybuf, sizeof(keybuf)) != ANDROID_PUBKEY_ENCODED_SIZE) { in adbd_auth_verify()
166 LOG(ERROR) << "Invalid base64 key " << pubkey; in adbd_auth_verify()
172 LOG(ERROR) << "Failed to parse key " << pubkey; in adbd_auth_verify()
305 const std::string& pubkey = split[0]; in adbd_tls_verify_cert() local
306 if (b64_pton(pubkey.c_str(), keybuf, sizeof(keybuf)) != ANDROID_PUBKEY_ENCODED_SIZE) { in adbd_tls_verify_cert()
[all …]
/system/security/keystore-engine/
Dkeystore_backend_hidl.cpp65 const char *key_id, uint8_t** pubkey, size_t* pubkey_len) { in get_pubkey() argument
66 if (key_id == nullptr || pubkey == nullptr || pubkey_len == nullptr) { in get_pubkey()
82 *pubkey = publicKey.releaseData(); in get_pubkey()
Dkeystore_backend.h33 virtual int32_t get_pubkey(const char *key_id, uint8_t** pubkey,
Dkeystore_backend_binder.h34 int32_t get_pubkey(const char *key_id, uint8_t** pubkey,
Dkeystore_backend_hidl.h34 int32_t get_pubkey(const char *key_id, uint8_t** pubkey,
Dandroid_engine.cpp340 uint8_t *pubkey = nullptr; in EVP_PKEY_from_keystore() local
342 int32_t ret = g_keystore_backend->get_pubkey(key_id, &pubkey, &pubkey_len); in EVP_PKEY_from_keystore()
346 } else if (ret != 0 || pubkey == nullptr) { in EVP_PKEY_from_keystore()
351 const uint8_t *inp = pubkey; in EVP_PKEY_from_keystore()
Dkeystore_backend_binder.cpp245 int32_t KeystoreBackendBinder::get_pubkey(const char* key_id, uint8_t** pubkey, in get_pubkey() argument
282 if (pubkey) { in get_pubkey()
283 *pubkey = export_result.exportData.releaseData(); in get_pubkey()
/system/core/adb/client/
Dauth.cpp71 std::string pubkey; in generate_key() local
76 if (!CalculatePublicKey(&pubkey, rsa)) { in generate_key()
99 if (!android::base::WriteStringToFile(pubkey, file + ".pub")) { in generate_key()
108 unsigned char* pubkey = nullptr; in hash_key() local
109 int len = i2d_RSA_PUBKEY(key, &pubkey); in hash_key()
117 SHA256(pubkey, len, reinterpret_cast<unsigned char*>(&result[0])); in hash_key()
118 OPENSSL_free(pubkey); in hash_key()
330 std::string pubkey; in adb_auth_pubkey() local
331 if (!pubkey_from_privkey(&pubkey, filename)) { in adb_auth_pubkey()
334 pubkey.push_back('\n'); in adb_auth_pubkey()
[all …]
/system/core/adb/crypto/tests/
Dkey_test.cpp58 const std::string& pubkey = split[0]; in TEST() local
59 ASSERT_EQ(b64_pton(pubkey.c_str(), keybuf, sizeof(keybuf)), ANDROID_PUBKEY_ENCODED_SIZE); in TEST()
Drsa_2048_key_test.cpp61 const std::string& pubkey = split[0]; in TEST() local
62 ASSERT_EQ(b64_pton(pubkey.c_str(), keybuf, sizeof(keybuf)), ANDROID_PUBKEY_ENCODED_SIZE); in TEST()
/system/keymaster/key_blob_utils/
Dsoftware_keyblobs.cpp94 keymaster_error_t FakeKeyAuthorizations(EVP_PKEY* pubkey, in FakeKeyAuthorizations() argument
100 switch (EVP_PKEY_type(pubkey->type)) { in FakeKeyAuthorizations()
121 RSA_Ptr rsa(EVP_PKEY_get1_RSA(pubkey)); in FakeKeyAuthorizations()
145 UniquePtr<EC_KEY, EC_KEY_Delete> ec_key(EVP_PKEY_get1_EC_KEY(pubkey)); in FakeKeyAuthorizations()
/system/keymaster/include/keymaster/key_blob_utils/
Dsoftware_keyblobs.h38 keymaster_error_t FakeKeyAuthorizations(EVP_PKEY* pubkey,
/system/apex/apexd/
Dapex_file.cpp61 std::string pubkey; in Open() local
101 pubkey.resize(length, '\0'); in Open()
103 reinterpret_cast<uint8_t*>(&(pubkey)[0]), length); in Open()
115 return ApexFile(path, image_offset, image_size, std::move(*manifest), pubkey, in Open()
/system/apex/shim/build/
DAndroid.bp24 name: "com.android.apex.cts.shim.pubkey",
26 out: ["com.android.apex.cts.shim.pubkey"],
34 public_key: ":com.android.apex.cts.shim.pubkey",
215 name: "com.android.apex.cts.shim_not_pre_installed.pubkey",
217 out: ["com.android.apex.cts.shim_not_pre_installed.pubkey"],
225 public_key: ":com.android.apex.cts.shim_not_pre_installed.pubkey",
/system/apex/apexer/
Dapexer.py621 if args.pubkey:
622 shutil.copyfile(args.pubkey, os.path.join(content_dir, 'apex_pubkey'))
/system/keymaster/tests/
Dandroid_keymaster_test.cpp1102 string pubkey; in TEST_P() local
1103 EXPECT_EQ(KM_ERROR_OK, ExportKey(KM_KEY_FORMAT_X509, &pubkey)); in TEST_P()
1105 const uint8_t* p = reinterpret_cast<const uint8_t*>(pubkey.data()); in TEST_P()
1107 d2i_PUBKEY(nullptr /* alloc new */, &p, pubkey.size())); in TEST_P()
1197 string pubkey; in TEST_P() local
1198 EXPECT_EQ(KM_ERROR_OK, ExportKey(KM_KEY_FORMAT_X509, &pubkey)); in TEST_P()
1200 const uint8_t* p = reinterpret_cast<const uint8_t*>(pubkey.data()); in TEST_P()
1202 d2i_PUBKEY(nullptr /* alloc new */, &p, pubkey.size())); in TEST_P()