/system/security/keystore-engine/ |
D | keystore_backend_hidl.cpp | 65 const char *key_id, uint8_t** pubkey, size_t* pubkey_len) { in get_pubkey() argument 66 if (key_id == nullptr || pubkey == nullptr || pubkey_len == nullptr) { in get_pubkey() 82 *pubkey = publicKey.releaseData(); in get_pubkey()
|
D | keystore_backend.h | 33 virtual int32_t get_pubkey(const char *key_id, uint8_t** pubkey,
|
D | keystore_backend_hidl.h | 34 int32_t get_pubkey(const char *key_id, uint8_t** pubkey,
|
D | keystore_backend_binder.h | 34 int32_t get_pubkey(const char *key_id, uint8_t** pubkey,
|
D | android_engine.cpp | 361 uint8_t *pubkey = nullptr; in EVP_PKEY_from_keystore() local 363 int32_t ret = g_keystore_backend->get_pubkey(key_id, &pubkey, &pubkey_len); in EVP_PKEY_from_keystore() 367 } else if (ret != 0 || pubkey == nullptr) { in EVP_PKEY_from_keystore() 372 const uint8_t *inp = pubkey; in EVP_PKEY_from_keystore()
|
D | keystore_backend_binder.cpp | 245 int32_t KeystoreBackendBinder::get_pubkey(const char* key_id, uint8_t** pubkey, in get_pubkey() argument 282 if (pubkey) { in get_pubkey() 283 *pubkey = export_result.exportData.releaseData(); in get_pubkey()
|
/system/core/adb/client/ |
D | auth.cpp | 122 unsigned char* pubkey = nullptr; in hash_key() local 123 int len = i2d_RSA_PUBKEY(key, &pubkey); in hash_key() 131 SHA256(pubkey, len, reinterpret_cast<unsigned char*>(&result[0])); in hash_key() 132 OPENSSL_free(pubkey); in hash_key() 318 std::string pubkey; in adb_auth_pubkey() local 319 if (!pubkey_from_privkey(&pubkey, filename)) { in adb_auth_pubkey() 322 pubkey.push_back('\n'); in adb_auth_pubkey() 324 return WriteFdExactly(STDOUT_FILENO, pubkey.data(), pubkey.size()) ? 0 : 1; in adb_auth_pubkey()
|
/system/apex/shim/build/ |
D | Android.bp | 24 name: "com.android.apex.cts.shim.pubkey", 26 out: ["com.android.apex.cts.shim.pubkey"], 34 public_key: ":com.android.apex.cts.shim.pubkey", 181 name: "com.android.apex.cts.shim_not_pre_installed.pubkey", 183 out: ["com.android.apex.cts.shim_not_pre_installed.pubkey"], 191 public_key: ":com.android.apex.cts.shim_not_pre_installed.pubkey",
|
/system/keymaster/key_blob_utils/ |
D | software_keyblobs.cpp | 94 keymaster_error_t FakeKeyAuthorizations(EVP_PKEY* pubkey, in FakeKeyAuthorizations() argument 100 switch (EVP_PKEY_type(pubkey->type)) { in FakeKeyAuthorizations() 121 RSA_Ptr rsa(EVP_PKEY_get1_RSA(pubkey)); in FakeKeyAuthorizations() 145 UniquePtr<EC_KEY, EC_KEY_Delete> ec_key(EVP_PKEY_get1_EC_KEY(pubkey)); in FakeKeyAuthorizations()
|
/system/keymaster/include/keymaster/key_blob_utils/ |
D | software_keyblobs.h | 38 keymaster_error_t FakeKeyAuthorizations(EVP_PKEY* pubkey,
|
/system/apex/apexd/ |
D | apex_file.cpp | 88 std::string pubkey; in Open() local 104 if (!android::base::ReadFileToString(pubkey_path, &pubkey)) { in Open() 159 pubkey.resize(length, '\0'); in Open() 161 reinterpret_cast<uint8_t*>(&(pubkey)[0]), length); in Open() 177 pubkey); in Open()
|
/system/apex/apexer/ |
D | apexer.py | 349 if args.pubkey: 350 shutil.copyfile(args.pubkey, os.path.join(content_dir, "apex_pubkey"))
|
/system/keymaster/tests/ |
D | android_keymaster_test.cpp | 1102 string pubkey; in TEST_P() local 1103 EXPECT_EQ(KM_ERROR_OK, ExportKey(KM_KEY_FORMAT_X509, &pubkey)); in TEST_P() 1105 const uint8_t* p = reinterpret_cast<const uint8_t*>(pubkey.data()); in TEST_P() 1107 d2i_PUBKEY(nullptr /* alloc new */, &p, pubkey.size())); in TEST_P() 1197 string pubkey; in TEST_P() local 1198 EXPECT_EQ(KM_ERROR_OK, ExportKey(KM_KEY_FORMAT_X509, &pubkey)); in TEST_P() 1200 const uint8_t* p = reinterpret_cast<const uint8_t*>(pubkey.data()); in TEST_P() 1202 d2i_PUBKEY(nullptr /* alloc new */, &p, pubkey.size())); in TEST_P()
|