/system/iot/attestation/partner-tools/ |
H A D | ec_helper_native.c | 72 * bytes to public_key. Returns -1 on failure. 75 uint8_t public_key[ECDH_KEY_LEN]) { 82 if (!private_key || !private_key_len || !public_key) { 106 public_key, ECDH_KEY_LEN, NULL)) { 74 generate_p256_key(uint8_t** private_key, uint32_t* private_key_len, uint8_t public_key[ECDH_KEY_LEN]) argument
|
/system/tpm/attestation/common/ |
H A D | crypto_utility_impl_test.cc | 156 std::string public_key = HexDecode(kValidPublicKeyHex); local 158 EXPECT_TRUE(crypto_utility_->GetRSASubjectPublicKeyInfo(public_key, &output)); 162 std::string public_key = "bad_public_key"; local 165 crypto_utility_->GetRSASubjectPublicKeyInfo(public_key, &output)); 169 std::string public_key = HexDecode(kValidPublicKeyHex); local 171 EXPECT_TRUE(crypto_utility_->GetRSASubjectPublicKeyInfo(public_key, &output)); 174 EXPECT_EQ(public_key, public_key2); 178 std::string public_key = HexDecode(kValidPublicKeyHex); local 180 EXPECT_TRUE(crypto_utility_->GetRSASubjectPublicKeyInfo(public_key, 196 std::string public_key local 212 std::string public_key = HexDecode(kValidPublicKeyHex); local 223 std::string public_key = HexDecode(kValidPublicKeyHex); local [all...] |
H A D | crypto_utility_impl.cc | 165 const std::string& public_key, 167 auto asn1_ptr = reinterpret_cast<const unsigned char*>(public_key.data()); 169 d2i_RSAPublicKey(nullptr, &asn1_ptr, public_key.size())); 188 std::string* public_key) { 206 public_key->assign(reinterpret_cast<char*>(buffer), length); 269 bool CryptoUtilityImpl::EncryptForUnbind(const std::string& public_key, argument 278 auto asn1_ptr = reinterpret_cast<const unsigned char*>(public_key.data()); 279 crypto::ScopedRSA rsa(d2i_RSA_PUBKEY(NULL, &asn1_ptr, public_key.size())); 292 bool CryptoUtilityImpl::VerifySignature(const std::string& public_key, argument 295 auto asn1_ptr = reinterpret_cast<const unsigned char*>(public_key 164 GetRSASubjectPublicKeyInfo( const std::string& public_key, std::string* public_key_info) argument 187 GetRSAPublicKey(const std::string& public_key_info, std::string* public_key) argument [all...] |
H A D | tpm_utility_v1.cc | 168 std::string* public_key, 172 CHECK(key_blob && public_key && public_key_tpm_format && key_info && proof); 247 if (!ConvertPublicKeyToDER(*public_key_tpm_format, public_key)) { 368 bool TpmUtilityV1::GetEndorsementPublicKey(std::string* public_key) { argument 386 if (!ConvertPublicKeyToDER(ek_public_key_blob, public_key)) { 631 bool TpmUtilityV1::ConvertPublicKeyToDER(const std::string& public_key, argument 635 std::string mutable_public_key(public_key); 163 CreateCertifiedKey(KeyType key_type, KeyUsage key_usage, const std::string& identity_key_blob, const std::string& external_data, std::string* key_blob, std::string* public_key, std::string* public_key_tpm_format, std::string* key_info, std::string* proof) argument
|
/system/keymaster/tests/ |
H A D | nist_curve_key_exchange_test.cpp | 108 uint8_t* public_key = new uint8_t[public_key_len]; local 110 public_key, public_key_len, nullptr /* ctx */); 119 ASSERT_FALSE(key_exchange->CalculateSharedKey(reinterpret_cast<const uint8_t*>(public_key),
|
/system/iot/attestation/atap/ops/ |
H A D | atap_ops_provider.cpp | 105 uint8_t public_key[ATAP_ECDH_KEY_LEN], 110 curve, other_public_key, public_key, shared_secret); 101 forward_ecdh_shared_secret_compute( AtapOps* ops, AtapCurveType curve, const uint8_t other_public_key[ATAP_ECDH_KEY_LEN], uint8_t public_key[ATAP_ECDH_KEY_LEN], uint8_t shared_secret[ATAP_ECDH_SHARED_SECRET_LEN]) argument
|
H A D | openssl_ops.cpp | 54 uint8_t public_key[ATAP_ECDH_KEY_LEN], 70 atap_memset(public_key, 0, ATAP_ECDH_KEY_LEN); 71 atap_memcpy(public_key, x25519_pub_key, 32); 112 public_key, 115 atap_error("Serializing public_key failed"); 51 ecdh_shared_secret_compute( AtapCurveType curve, const uint8_t other_public_key[ATAP_ECDH_KEY_LEN], uint8_t public_key[ATAP_ECDH_KEY_LEN], uint8_t shared_secret[ATAP_ECDH_SHARED_SECRET_LEN]) argument
|
/system/update_engine/payload_generator/ |
H A D | generate_delta_main.cc | 170 int VerifySignedPayload(const string& in_file, const string& public_key) { argument 174 LOG_IF(FATAL, public_key.empty()) 175 << "Must pass --public_key to verify signed payload."; 176 if (!PayloadSigner::VerifySignedPayload(in_file, public_key)) { 306 DEFINE_string(public_key, "", "Path to public key in .pem format");
|
/system/tpm/attestation/server/ |
H A D | attestation_service.cc | 180 if (!GetSubjectPublicKeyInfo(key.key_type(), key.public_key(), 221 std::string public_key; local 222 if (!tpm_utility_->GetEndorsementPublicKey(&public_key)) { 226 database_pb.mutable_credentials()->set_endorsement_public_key(public_key); 362 if (!GetSubjectPublicKeyInfo(key.key_type(), key.public_key(), 449 key.public_key(), key.certified_key_credential())) { 683 std::string public_key; local 690 nonce, &key_blob, &public_key, &public_key_tpm_format, &key_info, 695 key->set_public_key(public_key); 859 const std::string& public_key, 857 GetSubjectPublicKeyInfo( KeyType key_type, const std::string& public_key, std::string* public_key_info) const argument [all...] |
/system/tpm/trunks/ |
H A D | trunks_client_test.cc | 925 std::string public_key; local 926 if (!LoadSigningKey(key_handle.get(), &public_key)) { 929 public_key_map[key_handle->get()] = public_key; 938 const std::string& public_key = public_key_map[key_handle.get()]; local 939 if (!SignAndVerify(key_handle, public_key, delegate.get())) { 946 const std::string& public_key = public_key_map[key_handle.get()]; local 947 if (!SignAndVerify(key_handle, public_key, delegate.get())) { 970 std::string public_key; local 971 if (!LoadSigningKey(&key_handle, &public_key)) { 975 if (!SignAndVerify(key_handle, public_key, session 1018 GenerateRSAKeyPair(std::string* modulus, std::string* prime_factor, std::string* public_key) argument 1046 VerifyRSASignature(const std::string& public_key, const std::string& data, const std::string& signature) argument 1062 LoadSigningKey(ScopedKeyHandle* key_handle, std::string* public_key) argument 1088 SignAndVerify(const ScopedKeyHandle& key_handle, const std::string& public_key, AuthorizationDelegate* delegate) argument [all...] |
/system/bt/stack/smp/ |
H A D | smp_keys.cc | 832 Point public_key; local 838 ECC_PointMult(&public_key, &(curve_p256.G), (uint32_t*)private_key, 840 memcpy(p_cb->loc_publ_key.x, public_key.x, BT_OCTET32_LEN); 841 memcpy(p_cb->loc_publ_key.y, public_key.y, BT_OCTET32_LEN);
|