Home
last modified time | relevance | path

Searched refs:key_path (Results 1 – 22 of 22) sorted by relevance

/aosp12/system/core/fs_mgr/libfs_avb/tests/
H A Dfs_avb_test_util.cpp74 const base::FilePath& key_path, in GenerateVBMetaImage() argument
84 std::string(" --algorithm ") + avb_algorithm + " --key " + key_path.value() + " "; in GenerateVBMetaImage()
163 const base::FilePath& key_path, const std::string& salt, in AddAvbFooter() argument
174 std::string(" --algorithm ") + avb_algorithm + " --key " + key_path.value() + " "; in AddAvbFooter()
248 base::FilePath BaseFsAvbTest::ExtractPublicKeyAvb(const base::FilePath& key_path) { in ExtractPublicKeyAvb() argument
249 std::string file_name = key_path.RemoveExtension().BaseName().value(); in ExtractPublicKeyAvb()
254 key_path.value().c_str(), tmp_path.value().c_str()); in ExtractPublicKeyAvb()
258 std::string BaseFsAvbTest::ExtractPublicKeyAvbBlob(const base::FilePath& key_path) { in ExtractPublicKeyAvbBlob() argument
263 key_path.value().c_str(), tmp_path.value().c_str()); in ExtractPublicKeyAvbBlob()
H A Dfs_avb_test_util.h83 const base::FilePath& key_path,
123 base::FilePath ExtractPublicKeyAvb(const base::FilePath& key_path);
125 std::string ExtractPublicKeyAvbBlob(const base::FilePath& key_path);
H A Davb_util_test.cpp425 base::FilePath key_path = GenerateImage("key.bin", key_size); in TEST_F() local
428 EXPECT_EQ(key_size, base::ReadFile(key_path, (char*)key_data, key_size)); in TEST_F()
431 EXPECT_TRUE(base::ReadFileToString(key_path, &expected_key_blob)); in TEST_F()
443 base::FilePath key_path = GenerateImage("key.bin", key_size); in TEST_F() local
446 EXPECT_EQ(key_size, base::ReadFile(key_path, (char*)key_data, key_size)); in TEST_F()
/aosp12/system/vold/
H A DKeyUtil.cpp395 bool retrieveOrGenerateKey(const std::string& key_path, const std::string& tmp_path, in retrieveOrGenerateKey() argument
398 if (pathExists(key_path)) { in retrieveOrGenerateKey()
399 LOG(DEBUG) << "Key exists, using: " << key_path; in retrieveOrGenerateKey()
400 if (!retrieveKey(key_path, key_authentication, key)) return false; in retrieveOrGenerateKey()
403 LOG(ERROR) << "No key found in " << key_path; in retrieveOrGenerateKey()
406 LOG(INFO) << "Creating new key in " << key_path; in retrieveOrGenerateKey()
408 if (!storeKeyAtomically(key_path, tmp_path, key_authentication, *key)) return false; in retrieveOrGenerateKey()
H A DMetadataCrypt.cpp338 const auto key_path = dsu_metadata_key_dir + suffix; in destroy_dsu_metadata_key() local
339 if (pathExists(key_path)) { in destroy_dsu_metadata_key()
340 LOG(DEBUG) << "Destroy key: " << key_path; in destroy_dsu_metadata_key()
341 if (!android::vold::destroyKey(key_path)) { in destroy_dsu_metadata_key()
342 LOG(ERROR) << "Failed to destroyKey(): " << key_path; in destroy_dsu_metadata_key()
H A DKeyStorage.cpp601 bool storeKeyAtomically(const std::string& key_path, const std::string& tmp_path, in storeKeyAtomically() argument
603 if (pathExists(key_path)) { in storeKeyAtomically()
604 LOG(ERROR) << "Already exists, cannot create key at: " << key_path; in storeKeyAtomically()
613 if (!RenameKeyDir(tmp_path, key_path)) { in storeKeyAtomically()
614 PLOG(ERROR) << "Unable to move new key to location: " << key_path; in storeKeyAtomically()
617 if (!FsyncParentDirectory(key_path)) return false; in storeKeyAtomically()
618 LOG(DEBUG) << "Created key: " << key_path; in storeKeyAtomically()
H A DKeyUtil.h79 bool retrieveOrGenerateKey(const std::string& key_path, const std::string& tmp_path,
H A DFsCrypt.cpp403 auto key_path = de_dir + "/" + entry->d_name; in load_all_de_keys() local
405 if (!retrieveKey(key_path, kEmptyAuthentication, &de_key)) return false; in load_all_de_keys()
658 auto key_path = volkey_path(misc_path, volume_uuid); in read_or_create_volkey() local
659 if (!android::vold::MkdirsSync(key_path, 0700)) return false; in read_or_create_volkey()
665 if (!retrieveOrGenerateKey(key_path, key_path + "_tmp", auth, makeGen(options), &key)) in read_or_create_volkey()
H A DKeyStorage.h55 bool storeKeyAtomically(const std::string& key_path, const std::string& tmp_path,
/aosp12/hardware/invensense/65xx/libsensors_iio/software/core/mllite/linux/
H A Dml_sysfs_helper.c244 char key_path[100]; in process_sysfs_request() local
257 memset(key_path, 0, 100); in process_sysfs_request()
281 memset(key_path, 0, 100); in process_sysfs_request()
283 sprintf(key_path, "/sys/bus/iio/devices/iio:device%d/key", iio_dev_num); in process_sysfs_request()
285 sprintf(key_path, "%s%s", sysfs_path, "/device/invensense/mpu/key"); in process_sysfs_request()
287 if((fp = fopen(key_path, "rt")) == NULL) in process_sysfs_request()
/aosp12/hardware/invensense/6515/libsensors_iio/software/core/mllite/linux/
H A Dml_sysfs_helper.c252 char key_path[100]; in process_sysfs_request() local
265 memset(key_path, 0, 100); in process_sysfs_request()
289 memset(key_path, 0, 100); in process_sysfs_request()
291 sprintf(key_path, "/sys/bus/iio/devices/iio:device%d/key", iio_dev_num); in process_sysfs_request()
293 sprintf(key_path, "%s%s", sysfs_path, "/device/invensense/mpu/key"); in process_sysfs_request()
295 if((fp = fopen(key_path, "rt")) == NULL) in process_sysfs_request()
/aosp12/build/make/tools/releasetools/
H A Dverity_utils.py190 key_path = prop_dict.get("avb_key_path")
200 key_path,
211 key_path,
374 key_path, algorithm, salt, signing_args): argument
381 self.key_path = key_path
505 if self.key_path and self.algorithm:
506 cmd.extend(["--key", self.key_path, "--algorithm", self.algorithm])
711 key_path, algorithm, signing_args): argument
719 key_path,
H A Dsign_target_files_apks917 def ReplaceVerityPublicKey(output_zip, filename, key_path): argument
925 print("Replacing verity public key with %s" % (key_path,))
926 common.ZipWrite(output_zip, key_path, arcname=filename)
929 def ReplaceVerityPrivateKey(misc_info, key_path): argument
936 print("Replacing verity private key with %s" % (key_path,))
937 misc_info["verity_key"] = key_path
940 def ReplaceVerityKeyId(input_zip, output_zip, key_path): argument
962 p = common.Run(["openssl", "x509", "-in", key_path, "-text"],
H A Dsign_target_files_apks.py917 def ReplaceVerityPublicKey(output_zip, filename, key_path): argument
925 print("Replacing verity public key with %s" % (key_path,))
926 common.ZipWrite(output_zip, key_path, arcname=filename)
929 def ReplaceVerityPrivateKey(misc_info, key_path): argument
936 print("Replacing verity private key with %s" % (key_path,))
937 misc_info["verity_key"] = key_path
940 def ReplaceVerityKeyId(input_zip, output_zip, key_path): argument
962 p = common.Run(["openssl", "x509", "-in", key_path, "-text"],
H A Dcommon.py1308 if key_path and not os.path.exists(key_path) and OPTIONS.search_path:
1311 key_path = new_key_path
1313 if key_path and algorithm:
1341 if not key_path:
1428 key_path = OPTIONS.info_dict.get("gki_signing_key_path")
1430 if not key_path:
1433 if not os.path.exists(key_path) and OPTIONS.search_path:
1436 key_path = new_key_path
1439 if not os.path.exists(key_path):
1444 if key_path and algorithm:
[all …]
H A Dadd_img_to_target_files365 key_path = OPTIONS.info_dict.get("avb_{}_key_path".format(partition_name))
374 key_path, algorithm, extra_args)
H A Dadd_img_to_target_files.py365 key_path = OPTIONS.info_dict.get("avb_{}_key_path".format(partition_name))
374 key_path, algorithm, extra_args)
/aosp12/system/apex/apexd/
H A Dapex_file_test.cpp136 const std::string key_path = in TEST_P() local
139 ASSERT_TRUE(android::base::ReadFileToString(key_path, &key_content)) in TEST_P()
140 << "Failed to read " << key_path; in TEST_P()
205 const std::string key_path = in TEST() local
208 ASSERT_TRUE(android::base::ReadFileToString(key_path, &key_content)) in TEST()
209 << "Failed to read " << key_path; in TEST()
/aosp12/system/extras/verity/
H A Dbuild_verity_metadata.py49 def sign_verity_table(table, signer_path, key_path, signer_args=None): argument
55 cmd = [signer_path, table_file.name, key_path, signature_file.name]
58 cmd = [signer_path] + args_list + [table_file.name, key_path, signature_file.name]
H A Dverity_verifier.cpp51 static int verify_table(const char* key_path, const uint8_t* signature, size_t signature_size, in verify_table() argument
58 std::unique_ptr<RSA, decltype(&RSA_free)> key(load_key(key_path), RSA_free); in verify_table()
/aosp12/system/apex/tests/testdata/sharedlibs/build/
H A Dshared_libs_repack.py173 def run_apexer(container_files, payload_dir, key_path, pubkey_path, tmpdir): argument
188 cmd.extend(['--key', key_path])
/aosp12/system/update_engine/payload_consumer/
H A Ddelta_performer_integration_test.cc258 for (const auto& key_path : private_key_paths) { in SignGeneratedShellPayloadWithKeys() local
261 PayloadSigner::GetMaximumSignatureSize(key_path, &signature_size)); in SignGeneratedShellPayloadWithKeys()
281 for (const auto& key_path : private_key_paths) { in SignGeneratedShellPayloadWithKeys() local
284 ASSERT_TRUE(PayloadSigner::SignHash(hash, key_path, &signature)); in SignGeneratedShellPayloadWithKeys()
294 PayloadSigner::SignHash(metadata_hash, key_path, &metadata_signature)); in SignGeneratedShellPayloadWithKeys()