Searched refs:pubkey (Results 1 – 10 of 10) sorted by relevance
/packages/modules/adb/daemon/ |
D | auth.cpp | 118 const std::string& pubkey = split[0]; in adbd_tls_client_ca_list() local 119 if (b64_pton(pubkey.c_str(), keybuf, sizeof(keybuf)) != ANDROID_PUBKEY_ENCODED_SIZE) { in adbd_tls_client_ca_list() 120 LOG(ERROR) << "Invalid base64 key " << pubkey; in adbd_tls_client_ca_list() 126 LOG(ERROR) << "Failed to parse key " << pubkey; in adbd_tls_client_ca_list() 165 const std::string& pubkey = split[0]; in adbd_auth_verify() local 166 if (b64_pton(pubkey.c_str(), keybuf, sizeof(keybuf)) != ANDROID_PUBKEY_ENCODED_SIZE) { in adbd_auth_verify() 167 LOG(ERROR) << "Invalid base64 key " << pubkey; in adbd_auth_verify() 173 LOG(ERROR) << "Failed to parse key " << pubkey; in adbd_auth_verify() 324 const std::string& pubkey = split[0]; in adbd_tls_verify_cert() local 325 if (b64_pton(pubkey.c_str(), keybuf, sizeof(keybuf)) != ANDROID_PUBKEY_ENCODED_SIZE) { in adbd_tls_verify_cert() [all …]
|
/packages/modules/adb/client/ |
D | auth.cpp | 71 std::string pubkey; in generate_key() local 76 if (!CalculatePublicKey(&pubkey, rsa)) { in generate_key() 99 if (!android::base::WriteStringToFile(pubkey, file + ".pub")) { in generate_key() 108 unsigned char* pubkey = nullptr; in hash_key() local 109 int len = i2d_RSA_PUBKEY(key, &pubkey); in hash_key() 117 SHA256(pubkey, len, reinterpret_cast<unsigned char*>(&result[0])); in hash_key() 118 OPENSSL_free(pubkey); in hash_key() 330 std::string pubkey; in adb_auth_pubkey() local 331 if (!pubkey_from_privkey(&pubkey, filename)) { in adb_auth_pubkey() 334 fprintf(stdout, "%s\n", pubkey.data()); in adb_auth_pubkey()
|
/packages/services/BuiltInPrintService/src/com/android/bips/ipp/ |
D | CertificateStore.java | 130 byte[] pubkey = null; in loadItem() 140 pubkey = hexToBytes(reader.nextString()); in loadItem() 149 if (uuid != null && pubkey != null) { in loadItem() 150 mCertificates.put(uuid, pubkey); in loadItem()
|
/packages/modules/adb/crypto/tests/ |
D | key_test.cpp | 58 const std::string& pubkey = split[0]; in TEST() local 59 ASSERT_EQ(b64_pton(pubkey.c_str(), keybuf, sizeof(keybuf)), ANDROID_PUBKEY_ENCODED_SIZE); in TEST()
|
D | rsa_2048_key_test.cpp | 61 const std::string& pubkey = split[0]; in TEST() local 62 ASSERT_EQ(b64_pton(pubkey.c_str(), keybuf, sizeof(keybuf)), ANDROID_PUBKEY_ENCODED_SIZE); in TEST()
|
/packages/modules/Virtualization/microdroid/derive_microdroid_vendor_dice_node/src/ |
D | main.rs | 70 let authority_hash = if let Some(pubkey) = vbmeta.public_key() { in dice_derivation() 71 hash(pubkey).context("hash pubkey")? in dice_derivation()
|
/packages/modules/Virtualization/libs/vbmeta/src/ |
D | lib.rs | 246 let pubkey = vbmeta.public_key().unwrap(); in signed_image_has_valid_vbmeta() localVariable 258 assert_eq!(pubkey, fs::read(test_pubkey_file).context("read public key")?); in signed_image_has_valid_vbmeta()
|
/packages/modules/vndk/apex/ |
D | Android.bp | 30 public_key: "com.android.vndk.pubkey",
|
/packages/modules/Virtualization/apex/ |
D | sign_virt_apex.py | 735 pubkey = f.read() 736 pubkey_digest = hashlib.sha1(pubkey).hexdigest()
|
/packages/modules/Virtualization/microdroid/ |
D | Android.bp | 399 // for microdroid. However, the key signing VBmeta should match with the pubkey embedded in
|