Searched defs:public_key (Results 1 - 13 of 13) sorted by relevance

/system/connectivity/shill/
H A Dmock_crypto_util_proxy.cc48 const std::string& public_key,
56 return CryptoUtilProxy::VerifyDestination(certificate, public_key,
63 const std::string& public_key,
67 return CryptoUtilProxy::EncryptData(public_key, data,
46 RealVerifyDestination( const std::string& certificate, const std::string& public_key, const std::string& nonce, const std::string& signed_data, const std::string& destination_udn, const std::vector<uint8_t>& ssid, const std::string& bssid, const ResultBoolCallback& result_callback, Error* error) argument
62 RealEncryptData( const std::string& public_key, const std::string& data, const ResultStringCallback& result_callback, Error* error) argument
H A Dcrypto_util_proxy.cc78 const string& public_key,
92 public_key.c_str(),
127 const string& public_key,
132 if (!brillo::data_encoding::Base64Decode(public_key, &decoded_public_key)) {
76 VerifyDestination( const string& certificate, const string& public_key, const string& nonce, const string& signed_data, const string& destination_udn, const vector<uint8_t>& ssid, const string& bssid, const ResultBoolCallback& result_callback, Error* error) argument
126 EncryptData( const string& public_key, const string& data, const ResultStringCallback& result_callback, Error* error) argument
H A Dmanager.cc1542 const string& public_key,
1583 crypto_util_proxy_->VerifyDestination(certificate, public_key, nonce,
1588 void Manager::VerifyToEncryptLink(string public_key, argument
1600 if (!crypto_util_proxy_->EncryptData(public_key, data, cb, &encrypt_error)) {
1608 const string& public_key,
1618 &Manager::VerifyToEncryptLink, AsWeakPtr(), public_key, data, cb);
1619 VerifyDestination(certificate, public_key, nonce, signed_data,
1625 const string& public_key,
1541 VerifyDestination(const string& certificate, const string& public_key, const string& nonce, const string& signed_data, const string& destination_udn, const string& hotspot_ssid, const string& hotspot_bssid, const ResultBoolCallback& cb, Error* error) argument
1607 VerifyAndEncryptData(const string& certificate, const string& public_key, const string& nonce, const string& signed_data, const string& destination_udn, const string& hotspot_ssid, const string& hotspot_bssid, const string& data, const ResultStringCallback& cb, Error* error) argument
1624 VerifyAndEncryptCredentials(const string& certificate, const string& public_key, const string& nonce, const string& signed_data, const string& destination_udn, const string& hotspot_ssid, const string& hotspot_bssid, const string& network_path, const ResultStringCallback& cb, Error* error) argument
/system/tpm/attestation/common/
H A Dcrypto_utility_impl_test.cc157 std::string public_key = HexDecode(kValidPublicKeyHex); local
159 EXPECT_TRUE(crypto_utility_->GetRSASubjectPublicKeyInfo(public_key, &output));
163 std::string public_key = "bad_public_key"; local
165 EXPECT_FALSE(crypto_utility_->GetRSASubjectPublicKeyInfo(public_key,
170 std::string public_key = HexDecode(kValidPublicKeyHex); local
172 EXPECT_TRUE(crypto_utility_->GetRSASubjectPublicKeyInfo(public_key, &output));
175 EXPECT_EQ(public_key, public_key2);
179 std::string public_key = HexDecode(kValidPublicKeyHex); local
181 EXPECT_TRUE(crypto_utility_->GetRSASubjectPublicKeyInfo(public_key,
201 std::string public_key local
217 std::string public_key = HexDecode(kValidPublicKeyHex); local
228 std::string public_key = HexDecode(kValidPublicKeyHex); local
[all...]
H A Dcrypto_utility_impl.cc166 const std::string& public_key,
168 auto asn1_ptr = reinterpret_cast<const unsigned char*>(public_key.data());
170 public_key.size()));
189 std::string* public_key) {
207 public_key->assign(reinterpret_cast<char*>(buffer), length);
270 bool CryptoUtilityImpl::EncryptForUnbind(const std::string& public_key, argument
279 auto asn1_ptr = reinterpret_cast<const unsigned char*>(public_key.data());
280 crypto::ScopedRSA rsa(d2i_RSA_PUBKEY(NULL, &asn1_ptr, public_key.size()));
293 bool CryptoUtilityImpl::VerifySignature(const std::string& public_key, argument
296 auto asn1_ptr = reinterpret_cast<const unsigned char*>(public_key
165 GetRSASubjectPublicKeyInfo( const std::string& public_key, std::string* public_key_info) argument
188 GetRSAPublicKey(const std::string& public_key_info, std::string* public_key) argument
[all...]
H A Dtpm_utility_v1.cc175 std::string* public_key,
179 CHECK(key_blob && public_key && public_key_tpm_format && key_info && proof);
262 if (!ConvertPublicKeyToDER(*public_key_tpm_format, public_key)) {
397 bool TpmUtilityV1::GetEndorsementPublicKey(std::string* public_key) { argument
417 if (!ConvertPublicKeyToDER(ek_public_key_blob, public_key)) {
678 bool TpmUtilityV1::ConvertPublicKeyToDER(const std::string& public_key, argument
682 std::string mutable_public_key(public_key);
170 CreateCertifiedKey(KeyType key_type, KeyUsage key_usage, const std::string& identity_key_blob, const std::string& external_data, std::string* key_blob, std::string* public_key, std::string* public_key_tpm_format, std::string* key_info, std::string* proof) argument
/system/keymaster/
H A Dnist_curve_key_exchange_test.cpp108 uint8_t* public_key = new uint8_t[public_key_len]; local
110 public_key, public_key_len, nullptr /* ctx */);
119 ASSERT_FALSE(key_exchange->CalculateSharedKey(reinterpret_cast<const uint8_t*>(public_key),
/system/connectivity/shill/shims/
H A Dcrypto_util.cc61 // Encrypt |data| with |public_key|. |public_key| is the raw bytes of a key in
63 // maximum length permissable for encryption with a key of |public_key| size.
68 bool EncryptByteStringImpl(const string& public_key, argument
78 reinterpret_cast<const unsigned char*>(public_key.data());
79 *rsa_ptr = d2i_RSAPublicKey(NULL, &throwaway_ptr, public_key.length());
124 message.public_key(), message.data(), &rsa, &encrypted_output);
/system/tpm/trunks/
H A Dtrunks_client_test.cc894 std::string public_key; local
895 if (!LoadSigningKey(key_handle.get(), &public_key)) {
898 public_key_map[key_handle->get()] = public_key;
907 const std::string& public_key = public_key_map[key_handle.get()]; local
908 if (!SignAndVerify(key_handle, public_key, delegate.get())) {
915 const std::string& public_key = public_key_map[key_handle.get()]; local
916 if (!SignAndVerify(key_handle, public_key, delegate.get())) {
939 std::string public_key; local
940 if (!LoadSigningKey(&key_handle, &public_key)) {
944 if (!SignAndVerify(key_handle, public_key, session
988 GenerateRSAKeyPair(std::string* modulus, std::string* prime_factor, std::string* public_key) argument
1016 VerifyRSASignature(const std::string& public_key, const std::string& data, const std::string& signature) argument
1032 LoadSigningKey(ScopedKeyHandle* key_handle, std::string* public_key) argument
1061 SignAndVerify(const ScopedKeyHandle& key_handle, const std::string& public_key, AuthorizationDelegate* delegate) argument
[all...]
/system/update_engine/payload_generator/
H A Dgenerate_delta_main.cc171 const string& public_key) {
175 LOG_IF(FATAL, public_key.empty())
176 << "Must pass --public_key to verify signed payload.";
177 CHECK(PayloadSigner::VerifySignedPayload(in_file, public_key));
279 DEFINE_string(public_key, "", "Path to public key in .pem format");
170 VerifySignedPayload(const string& in_file, const string& public_key) argument
/system/connectivity/shill/dbus/
H A Dchromeos_manager_dbus_adaptor.cc420 const string& public_key,
430 manager_->VerifyDestination(certificate, public_key, nonce,
448 const string& public_key,
460 manager_->VerifyAndEncryptCredentials(certificate, public_key, nonce,
480 const string& public_key,
492 manager_->VerifyAndEncryptData(certificate, public_key, nonce,
417 VerifyDestination( DBusMethodResponsePtr<bool> response, const string& certificate, const string& public_key, const string& nonce, const string& signed_data, const string& destination_udn, const string& hotspot_ssid, const string& hotspot_bssid) argument
445 VerifyAndEncryptCredentials( DBusMethodResponsePtr<string> response, const string& certificate, const string& public_key, const string& nonce, const string& signed_data, const string& destination_udn, const string& hotspot_ssid, const string& hotspot_bssid, const dbus::ObjectPath& network) argument
477 VerifyAndEncryptData( DBusMethodResponsePtr<string> response, const string& certificate, const string& public_key, const string& nonce, const string& signed_data, const string& destination_udn, const string& hotspot_ssid, const string& hotspot_bssid, const string& data) argument
/system/tpm/attestation/server/
H A Dattestation_service.cc200 if (!GetSubjectPublicKeyInfo(key.key_type(), key.public_key(),
246 std::string public_key; local
247 if (!tpm_utility_->GetEndorsementPublicKey(&public_key)) {
251 database_pb.mutable_credentials()->set_endorsement_public_key(public_key);
401 if (!GetSubjectPublicKeyInfo(key.key_type(), key.public_key(),
502 key.public_key(), key.certified_key_credential())) {
740 std::string public_key; local
751 &public_key,
758 key->set_public_key(public_key);
923 const std::string& public_key,
921 GetSubjectPublicKeyInfo( KeyType key_type, const std::string& public_key, std::string* public_key_info) const argument
[all...]
/system/bt/stack/smp/
H A Dsmp_keys.c1072 Point public_key; local
1078 ECC_PointMult(&public_key, &(curve_p256.G), (DWORD*) private_key, KEY_LENGTH_DWORDS_P256);
1079 memcpy(p_cb->loc_publ_key.x, public_key.x, BT_OCTET32_LEN);
1080 memcpy(p_cb->loc_publ_key.y, public_key.y, BT_OCTET32_LEN);

Completed in 1396 milliseconds