Home
last modified time | relevance | path

Searched refs:pubkey (Results 1 – 10 of 10) sorted by relevance

/packages/modules/adb/daemon/
Dauth.cpp118 const std::string& pubkey = split[0]; in adbd_tls_client_ca_list() local
119 if (b64_pton(pubkey.c_str(), keybuf, sizeof(keybuf)) != ANDROID_PUBKEY_ENCODED_SIZE) { in adbd_tls_client_ca_list()
120 LOG(ERROR) << "Invalid base64 key " << pubkey; in adbd_tls_client_ca_list()
126 LOG(ERROR) << "Failed to parse key " << pubkey; in adbd_tls_client_ca_list()
165 const std::string& pubkey = split[0]; in adbd_auth_verify() local
166 if (b64_pton(pubkey.c_str(), keybuf, sizeof(keybuf)) != ANDROID_PUBKEY_ENCODED_SIZE) { in adbd_auth_verify()
167 LOG(ERROR) << "Invalid base64 key " << pubkey; in adbd_auth_verify()
173 LOG(ERROR) << "Failed to parse key " << pubkey; in adbd_auth_verify()
324 const std::string& pubkey = split[0]; in adbd_tls_verify_cert() local
325 if (b64_pton(pubkey.c_str(), keybuf, sizeof(keybuf)) != ANDROID_PUBKEY_ENCODED_SIZE) { in adbd_tls_verify_cert()
[all …]
/packages/modules/adb/client/
Dauth.cpp71 std::string pubkey; in generate_key() local
76 if (!CalculatePublicKey(&pubkey, rsa)) { in generate_key()
99 if (!android::base::WriteStringToFile(pubkey, file + ".pub")) { in generate_key()
108 unsigned char* pubkey = nullptr; in hash_key() local
109 int len = i2d_RSA_PUBKEY(key, &pubkey); in hash_key()
117 SHA256(pubkey, len, reinterpret_cast<unsigned char*>(&result[0])); in hash_key()
118 OPENSSL_free(pubkey); in hash_key()
330 std::string pubkey; in adb_auth_pubkey() local
331 if (!pubkey_from_privkey(&pubkey, filename)) { in adb_auth_pubkey()
334 fprintf(stdout, "%s\n", pubkey.data()); in adb_auth_pubkey()
/packages/services/BuiltInPrintService/src/com/android/bips/ipp/
DCertificateStore.java130 byte[] pubkey = null; in loadItem()
140 pubkey = hexToBytes(reader.nextString()); in loadItem()
149 if (uuid != null && pubkey != null) { in loadItem()
150 mCertificates.put(uuid, pubkey); in loadItem()
/packages/modules/adb/crypto/tests/
Dkey_test.cpp58 const std::string& pubkey = split[0]; in TEST() local
59 ASSERT_EQ(b64_pton(pubkey.c_str(), keybuf, sizeof(keybuf)), ANDROID_PUBKEY_ENCODED_SIZE); in TEST()
Drsa_2048_key_test.cpp61 const std::string& pubkey = split[0]; in TEST() local
62 ASSERT_EQ(b64_pton(pubkey.c_str(), keybuf, sizeof(keybuf)), ANDROID_PUBKEY_ENCODED_SIZE); in TEST()
/packages/modules/Virtualization/microdroid/derive_microdroid_vendor_dice_node/src/
Dmain.rs70 let authority_hash = if let Some(pubkey) = vbmeta.public_key() { in dice_derivation()
71 hash(pubkey).context("hash pubkey")? in dice_derivation()
/packages/modules/Virtualization/libs/vbmeta/src/
Dlib.rs246 let pubkey = vbmeta.public_key().unwrap(); in signed_image_has_valid_vbmeta() localVariable
258 assert_eq!(pubkey, fs::read(test_pubkey_file).context("read public key")?); in signed_image_has_valid_vbmeta()
/packages/modules/vndk/apex/
DAndroid.bp30 public_key: "com.android.vndk.pubkey",
/packages/modules/Virtualization/apex/
Dsign_virt_apex.py735 pubkey = f.read()
736 pubkey_digest = hashlib.sha1(pubkey).hexdigest()
/packages/modules/Virtualization/microdroid/
DAndroid.bp399 // for microdroid. However, the key signing VBmeta should match with the pubkey embedded in