Home
last modified time | relevance | path

Searched refs:pubkey (Results 1 – 13 of 13) sorted by relevance

/system/security/keystore-engine/
Dkeystore_backend_hidl.cpp65 const char *key_id, uint8_t** pubkey, size_t* pubkey_len) { in get_pubkey() argument
66 if (key_id == nullptr || pubkey == nullptr || pubkey_len == nullptr) { in get_pubkey()
82 *pubkey = publicKey.releaseData(); in get_pubkey()
Dkeystore_backend.h33 virtual int32_t get_pubkey(const char *key_id, uint8_t** pubkey,
Dkeystore_backend_hidl.h34 int32_t get_pubkey(const char *key_id, uint8_t** pubkey,
Dkeystore_backend_binder.h34 int32_t get_pubkey(const char *key_id, uint8_t** pubkey,
Dandroid_engine.cpp361 uint8_t *pubkey = nullptr; in EVP_PKEY_from_keystore() local
363 int32_t ret = g_keystore_backend->get_pubkey(key_id, &pubkey, &pubkey_len); in EVP_PKEY_from_keystore()
367 } else if (ret != 0 || pubkey == nullptr) { in EVP_PKEY_from_keystore()
372 const uint8_t *inp = pubkey; in EVP_PKEY_from_keystore()
Dkeystore_backend_binder.cpp245 int32_t KeystoreBackendBinder::get_pubkey(const char* key_id, uint8_t** pubkey, in get_pubkey() argument
282 if (pubkey) { in get_pubkey()
283 *pubkey = export_result.exportData.releaseData(); in get_pubkey()
/system/core/adb/client/
Dauth.cpp122 unsigned char* pubkey = nullptr; in hash_key() local
123 int len = i2d_RSA_PUBKEY(key, &pubkey); in hash_key()
131 SHA256(pubkey, len, reinterpret_cast<unsigned char*>(&result[0])); in hash_key()
132 OPENSSL_free(pubkey); in hash_key()
318 std::string pubkey; in adb_auth_pubkey() local
319 if (!pubkey_from_privkey(&pubkey, filename)) { in adb_auth_pubkey()
322 pubkey.push_back('\n'); in adb_auth_pubkey()
324 return WriteFdExactly(STDOUT_FILENO, pubkey.data(), pubkey.size()) ? 0 : 1; in adb_auth_pubkey()
/system/apex/shim/build/
DAndroid.bp24 name: "com.android.apex.cts.shim.pubkey",
26 out: ["com.android.apex.cts.shim.pubkey"],
34 public_key: ":com.android.apex.cts.shim.pubkey",
181 name: "com.android.apex.cts.shim_not_pre_installed.pubkey",
183 out: ["com.android.apex.cts.shim_not_pre_installed.pubkey"],
191 public_key: ":com.android.apex.cts.shim_not_pre_installed.pubkey",
/system/keymaster/key_blob_utils/
Dsoftware_keyblobs.cpp94 keymaster_error_t FakeKeyAuthorizations(EVP_PKEY* pubkey, in FakeKeyAuthorizations() argument
100 switch (EVP_PKEY_type(pubkey->type)) { in FakeKeyAuthorizations()
121 RSA_Ptr rsa(EVP_PKEY_get1_RSA(pubkey)); in FakeKeyAuthorizations()
145 UniquePtr<EC_KEY, EC_KEY_Delete> ec_key(EVP_PKEY_get1_EC_KEY(pubkey)); in FakeKeyAuthorizations()
/system/keymaster/include/keymaster/key_blob_utils/
Dsoftware_keyblobs.h38 keymaster_error_t FakeKeyAuthorizations(EVP_PKEY* pubkey,
/system/apex/apexd/
Dapex_file.cpp88 std::string pubkey; in Open() local
104 if (!android::base::ReadFileToString(pubkey_path, &pubkey)) { in Open()
159 pubkey.resize(length, '\0'); in Open()
161 reinterpret_cast<uint8_t*>(&(pubkey)[0]), length); in Open()
177 pubkey); in Open()
/system/apex/apexer/
Dapexer.py349 if args.pubkey:
350 shutil.copyfile(args.pubkey, os.path.join(content_dir, "apex_pubkey"))
/system/keymaster/tests/
Dandroid_keymaster_test.cpp1102 string pubkey; in TEST_P() local
1103 EXPECT_EQ(KM_ERROR_OK, ExportKey(KM_KEY_FORMAT_X509, &pubkey)); in TEST_P()
1105 const uint8_t* p = reinterpret_cast<const uint8_t*>(pubkey.data()); in TEST_P()
1107 d2i_PUBKEY(nullptr /* alloc new */, &p, pubkey.size())); in TEST_P()
1197 string pubkey; in TEST_P() local
1198 EXPECT_EQ(KM_ERROR_OK, ExportKey(KM_KEY_FORMAT_X509, &pubkey)); in TEST_P()
1200 const uint8_t* p = reinterpret_cast<const uint8_t*>(pubkey.data()); in TEST_P()
1202 d2i_PUBKEY(nullptr /* alloc new */, &p, pubkey.size())); in TEST_P()