/system/connectivity/shill/ |
H A D | mock_crypto_util_proxy.cc | 48 const std::string& public_key, 56 return CryptoUtilProxy::VerifyDestination(certificate, public_key, 63 const std::string& public_key, 67 return CryptoUtilProxy::EncryptData(public_key, data, 46 RealVerifyDestination( const std::string& certificate, const std::string& public_key, const std::string& nonce, const std::string& signed_data, const std::string& destination_udn, const std::vector<uint8_t>& ssid, const std::string& bssid, const ResultBoolCallback& result_callback, Error* error) argument 62 RealEncryptData( const std::string& public_key, const std::string& data, const ResultStringCallback& result_callback, Error* error) argument
|
H A D | mock_crypto_util_proxy.h | 42 const std::string& public_key, 50 MOCK_METHOD4(EncryptData, bool(const std::string& public_key, 56 const std::string& public_key, 65 bool RealEncryptData(const std::string& public_key,
|
H A D | crypto_util_proxy.h | 58 // |public_key| is a base64 encoded DER RSAPublicKey format public key. 65 const std::string& public_key, 74 // Encrypt |data| under |public_key|. This is a fairly time consuming 80 // |public_key| is a base64 encoded DER RSAPublicKey format public key. 82 virtual bool EncryptData(const std::string& public_key,
|
H A D | crypto_util_proxy.cc | 78 const string& public_key, 92 public_key.c_str(), 127 const string& public_key, 132 if (!brillo::data_encoding::Base64Decode(public_key, &decoded_public_key)) { 76 VerifyDestination( const string& certificate, const string& public_key, const string& nonce, const string& signed_data, const string& destination_udn, const vector<uint8_t>& ssid, const string& bssid, const ResultBoolCallback& result_callback, Error* error) argument 126 EncryptData( const string& public_key, const string& data, const ResultStringCallback& result_callback, Error* error) argument
|
H A D | manager.h | 457 // |certificate| is a PEM encoded x509 certificate, |public_key| is a base64 462 const std::string& public_key, 472 // |public_key|, the base64 encoded public half of an RSA key pair. Returns 477 const std::string& public_key, 488 // under |public_key|. Similar to EncryptData above except that the 492 const std::string& public_key, 766 void VerifyToEncryptLink(std::string public_key, std::string data,
|
/system/tpm/attestation/common/ |
H A D | crypto_utility.h | 62 // Convert |public_key| from PKCS #1 RSAPublicKey to X.509 65 virtual bool GetRSASubjectPublicKeyInfo(const std::string& public_key, 69 // RSAPublicKey. On success returns true and provides the |public_key|. 71 std::string* public_key) = 0; 84 // |public_key| must be provided in X.509 SubjectPublicKeyInfo format. 85 virtual bool EncryptForUnbind(const std::string& public_key, 89 // Verifies a PKCS #1 v1.5 SHA-256 |signature| over |data|. The |public_key| 91 virtual bool VerifySignature(const std::string& public_key,
|
H A D | crypto_utility_impl_test.cc | 157 std::string public_key = HexDecode(kValidPublicKeyHex); local 159 EXPECT_TRUE(crypto_utility_->GetRSASubjectPublicKeyInfo(public_key, &output)); 163 std::string public_key = "bad_public_key"; local 165 EXPECT_FALSE(crypto_utility_->GetRSASubjectPublicKeyInfo(public_key, 170 std::string public_key = HexDecode(kValidPublicKeyHex); local 172 EXPECT_TRUE(crypto_utility_->GetRSASubjectPublicKeyInfo(public_key, &output)); 175 EXPECT_EQ(public_key, public_key2); 179 std::string public_key = HexDecode(kValidPublicKeyHex); local 181 EXPECT_TRUE(crypto_utility_->GetRSASubjectPublicKeyInfo(public_key, 201 std::string public_key local 217 std::string public_key = HexDecode(kValidPublicKeyHex); local 228 std::string public_key = HexDecode(kValidPublicKeyHex); local [all...] |
H A D | crypto_utility_impl.h | 50 bool GetRSASubjectPublicKeyInfo(const std::string& public_key, 53 std::string* public_key) override; 59 bool EncryptForUnbind(const std::string& public_key, 62 bool VerifySignature(const std::string& public_key,
|
H A D | tpm_utility.h | 62 std::string* public_key, 77 virtual bool GetEndorsementPublicKey(std::string* public_key) = 0;
|
H A D | tpm_utility_v1.h | 53 std::string* public_key, 59 bool GetEndorsementPublicKey(std::string* public_key) override; 107 bool ConvertPublicKeyToDER(const std::string& public_key,
|
H A D | crypto_utility_impl.cc | 166 const std::string& public_key, 168 auto asn1_ptr = reinterpret_cast<const unsigned char*>(public_key.data()); 170 public_key.size())); 189 std::string* public_key) { 207 public_key->assign(reinterpret_cast<char*>(buffer), length); 270 bool CryptoUtilityImpl::EncryptForUnbind(const std::string& public_key, argument 279 auto asn1_ptr = reinterpret_cast<const unsigned char*>(public_key.data()); 280 crypto::ScopedRSA rsa(d2i_RSA_PUBKEY(NULL, &asn1_ptr, public_key.size())); 293 bool CryptoUtilityImpl::VerifySignature(const std::string& public_key, argument 296 auto asn1_ptr = reinterpret_cast<const unsigned char*>(public_key 165 GetRSASubjectPublicKeyInfo( const std::string& public_key, std::string* public_key_info) argument 188 GetRSAPublicKey(const std::string& public_key_info, std::string* public_key) argument [all...] |
H A D | tpm_utility_v1.cc | 175 std::string* public_key, 179 CHECK(key_blob && public_key && public_key_tpm_format && key_info && proof); 262 if (!ConvertPublicKeyToDER(*public_key_tpm_format, public_key)) { 397 bool TpmUtilityV1::GetEndorsementPublicKey(std::string* public_key) { argument 417 if (!ConvertPublicKeyToDER(ek_public_key_blob, public_key)) { 678 bool TpmUtilityV1::ConvertPublicKeyToDER(const std::string& public_key, argument 682 std::string mutable_public_key(public_key); 170 CreateCertifiedKey(KeyType key_type, KeyUsage key_usage, const std::string& identity_key_blob, const std::string& external_data, std::string* key_blob, std::string* public_key, std::string* public_key_tpm_format, std::string* key_info, std::string* proof) argument
|
H A D | print_interface_proto.cc | 202 output += indent + " public_key: "; 204 base::HexEncode(value.public_key().data(), 205 value.public_key().size()).c_str()); 332 output += indent + " public_key: "; 334 base::HexEncode(value.public_key().data(), 335 value.public_key().size()).c_str()); 493 output += indent + " public_key: "; 495 base::HexEncode(value.public_key().data(), 496 value.public_key().size()).c_str());
|
/system/tpm/trunks/ |
H A D | trunks_client_test.h | 116 // into the TPM. The |public_key| may be NULL, but if it is not, will be 120 std::string* public_key); 123 // |public_key| is as produced by GenerateRSAKeyPair(). Returns true on 125 bool VerifyRSASignature(const std::string& public_key, 130 // |public_key|. Returns true on success. 131 bool LoadSigningKey(ScopedKeyHandle* key_handle, std::string* public_key); 134 // verifies the signature with |public_key|. Returns true on success. 136 const std::string& public_key,
|
H A D | trunks_client_test.cc | 894 std::string public_key; local 895 if (!LoadSigningKey(key_handle.get(), &public_key)) { 898 public_key_map[key_handle->get()] = public_key; 907 const std::string& public_key = public_key_map[key_handle.get()]; local 908 if (!SignAndVerify(key_handle, public_key, delegate.get())) { 915 const std::string& public_key = public_key_map[key_handle.get()]; local 916 if (!SignAndVerify(key_handle, public_key, delegate.get())) { 939 std::string public_key; local 940 if (!LoadSigningKey(&key_handle, &public_key)) { 944 if (!SignAndVerify(key_handle, public_key, session 988 GenerateRSAKeyPair(std::string* modulus, std::string* prime_factor, std::string* public_key) argument 1016 VerifyRSASignature(const std::string& public_key, const std::string& data, const std::string& signature) argument 1032 LoadSigningKey(ScopedKeyHandle* key_handle, std::string* public_key) argument 1061 SignAndVerify(const ScopedKeyHandle& key_handle, const std::string& public_key, AuthorizationDelegate* delegate) argument [all...] |
/system/keymaster/ |
H A D | nist_curve_key_exchange_test.cpp | 108 uint8_t* public_key = new uint8_t[public_key_len]; local 110 public_key, public_key_len, nullptr /* ctx */); 119 ASSERT_FALSE(key_exchange->CalculateSharedKey(reinterpret_cast<const uint8_t*>(public_key),
|
/system/connectivity/shill/shims/ |
H A D | crypto_util.cc | 61 // Encrypt |data| with |public_key|. |public_key| is the raw bytes of a key in 63 // maximum length permissable for encryption with a key of |public_key| size. 68 bool EncryptByteStringImpl(const string& public_key, argument 78 reinterpret_cast<const unsigned char*>(public_key.data()); 79 *rsa_ptr = d2i_RSAPublicKey(NULL, &throwaway_ptr, public_key.length()); 124 message.public_key(), message.data(), &rsa, &encrypted_output);
|
/system/tpm/attestation/server/ |
H A D | attestation_service.cc | 200 if (!GetSubjectPublicKeyInfo(key.key_type(), key.public_key(), 246 std::string public_key; local 247 if (!tpm_utility_->GetEndorsementPublicKey(&public_key)) { 251 database_pb.mutable_credentials()->set_endorsement_public_key(public_key); 401 if (!GetSubjectPublicKeyInfo(key.key_type(), key.public_key(), 502 key.public_key(), key.certified_key_credential())) { 740 std::string public_key; local 751 &public_key, 758 key->set_public_key(public_key); 923 const std::string& public_key, 921 GetSubjectPublicKeyInfo( KeyType key_type, const std::string& public_key, std::string* public_key_info) const argument [all...] |
H A D | pkcs11_key_store.cc | 265 crypto::ScopedRSA public_key(d2i_RSAPublicKey(nullptr, 268 if (!public_key.get()) { 272 std::string modulus(BN_num_bytes(public_key.get()->n), 0); 273 int length = BN_bn2bin(public_key.get()->n, reinterpret_cast<unsigned char*>(
|
H A D | dbus_service_test.cc | 148 reply.set_public_key("public_key"); 164 EXPECT_EQ("public_key", reply.public_key()); 180 reply.set_ek_public_key("public_key"); 193 EXPECT_EQ("public_key", reply.ek_public_key()); 207 reply.set_public_key("public_key"); 223 EXPECT_EQ("public_key", reply.public_key()); 280 reply.set_public_key("public_key"); 294 EXPECT_EQ("public_key", repl [all...] |
H A D | attestation_service.h | 273 // |public_key|. On success returns true and provides |public_key_info|. 275 const std::string& public_key,
|
/system/connectivity/shill/dbus/ |
H A D | chromeos_manager_dbus_adaptor.cc | 420 const string& public_key, 430 manager_->VerifyDestination(certificate, public_key, nonce, 448 const string& public_key, 460 manager_->VerifyAndEncryptCredentials(certificate, public_key, nonce, 480 const string& public_key, 492 manager_->VerifyAndEncryptData(certificate, public_key, nonce, 417 VerifyDestination( DBusMethodResponsePtr<bool> response, const string& certificate, const string& public_key, const string& nonce, const string& signed_data, const string& destination_udn, const string& hotspot_ssid, const string& hotspot_bssid) argument 445 VerifyAndEncryptCredentials( DBusMethodResponsePtr<string> response, const string& certificate, const string& public_key, const string& nonce, const string& signed_data, const string& destination_udn, const string& hotspot_ssid, const string& hotspot_bssid, const dbus::ObjectPath& network) argument 477 VerifyAndEncryptData( DBusMethodResponsePtr<string> response, const string& certificate, const string& public_key, const string& nonce, const string& signed_data, const string& destination_udn, const string& hotspot_ssid, const string& hotspot_bssid, const string& data) argument
|
H A D | chromeos_manager_dbus_adaptor.h | 134 const std::string& public_key, 142 const std::string& public_key, 151 const std::string& public_key,
|
/system/update_engine/payload_generator/ |
H A D | generate_delta_main.cc | 171 const string& public_key) { 175 LOG_IF(FATAL, public_key.empty()) 176 << "Must pass --public_key to verify signed payload."; 177 CHECK(PayloadSigner::VerifySignedPayload(in_file, public_key)); 279 DEFINE_string(public_key, "", "Path to public key in .pem format"); 170 VerifySignedPayload(const string& in_file, const string& public_key) argument
|
/system/tpm/attestation/client/ |
H A D | dbus_proxy_test.cc | 110 reply_proto.set_public_key("public_key"); 127 EXPECT_EQ("public_key", reply.public_key()); 153 reply_proto.set_ek_public_key("public_key"); 166 EXPECT_EQ("public_key", reply.ek_public_key()); 189 reply_proto.set_public_key("public_key"); 205 EXPECT_EQ("public_key", reply.public_key()); 276 reply_proto.set_public_key("public_key"); 290 EXPECT_EQ("public_key", repl [all...] |