/aosp12/system/core/fs_mgr/libfs_avb/tests/ |
H A D | fs_avb_test_util.cpp | 74 const base::FilePath& key_path, in GenerateVBMetaImage() argument 84 std::string(" --algorithm ") + avb_algorithm + " --key " + key_path.value() + " "; in GenerateVBMetaImage() 163 const base::FilePath& key_path, const std::string& salt, in AddAvbFooter() argument 174 std::string(" --algorithm ") + avb_algorithm + " --key " + key_path.value() + " "; in AddAvbFooter() 248 base::FilePath BaseFsAvbTest::ExtractPublicKeyAvb(const base::FilePath& key_path) { in ExtractPublicKeyAvb() argument 249 std::string file_name = key_path.RemoveExtension().BaseName().value(); in ExtractPublicKeyAvb() 254 key_path.value().c_str(), tmp_path.value().c_str()); in ExtractPublicKeyAvb() 258 std::string BaseFsAvbTest::ExtractPublicKeyAvbBlob(const base::FilePath& key_path) { in ExtractPublicKeyAvbBlob() argument 263 key_path.value().c_str(), tmp_path.value().c_str()); in ExtractPublicKeyAvbBlob()
|
H A D | fs_avb_test_util.h | 83 const base::FilePath& key_path, 123 base::FilePath ExtractPublicKeyAvb(const base::FilePath& key_path); 125 std::string ExtractPublicKeyAvbBlob(const base::FilePath& key_path);
|
H A D | avb_util_test.cpp | 425 base::FilePath key_path = GenerateImage("key.bin", key_size); in TEST_F() local 428 EXPECT_EQ(key_size, base::ReadFile(key_path, (char*)key_data, key_size)); in TEST_F() 431 EXPECT_TRUE(base::ReadFileToString(key_path, &expected_key_blob)); in TEST_F() 443 base::FilePath key_path = GenerateImage("key.bin", key_size); in TEST_F() local 446 EXPECT_EQ(key_size, base::ReadFile(key_path, (char*)key_data, key_size)); in TEST_F()
|
/aosp12/system/vold/ |
H A D | KeyUtil.cpp | 395 bool retrieveOrGenerateKey(const std::string& key_path, const std::string& tmp_path, in retrieveOrGenerateKey() argument 398 if (pathExists(key_path)) { in retrieveOrGenerateKey() 399 LOG(DEBUG) << "Key exists, using: " << key_path; in retrieveOrGenerateKey() 400 if (!retrieveKey(key_path, key_authentication, key)) return false; in retrieveOrGenerateKey() 403 LOG(ERROR) << "No key found in " << key_path; in retrieveOrGenerateKey() 406 LOG(INFO) << "Creating new key in " << key_path; in retrieveOrGenerateKey() 408 if (!storeKeyAtomically(key_path, tmp_path, key_authentication, *key)) return false; in retrieveOrGenerateKey()
|
H A D | MetadataCrypt.cpp | 338 const auto key_path = dsu_metadata_key_dir + suffix; in destroy_dsu_metadata_key() local 339 if (pathExists(key_path)) { in destroy_dsu_metadata_key() 340 LOG(DEBUG) << "Destroy key: " << key_path; in destroy_dsu_metadata_key() 341 if (!android::vold::destroyKey(key_path)) { in destroy_dsu_metadata_key() 342 LOG(ERROR) << "Failed to destroyKey(): " << key_path; in destroy_dsu_metadata_key()
|
H A D | KeyStorage.cpp | 601 bool storeKeyAtomically(const std::string& key_path, const std::string& tmp_path, in storeKeyAtomically() argument 603 if (pathExists(key_path)) { in storeKeyAtomically() 604 LOG(ERROR) << "Already exists, cannot create key at: " << key_path; in storeKeyAtomically() 613 if (!RenameKeyDir(tmp_path, key_path)) { in storeKeyAtomically() 614 PLOG(ERROR) << "Unable to move new key to location: " << key_path; in storeKeyAtomically() 617 if (!FsyncParentDirectory(key_path)) return false; in storeKeyAtomically() 618 LOG(DEBUG) << "Created key: " << key_path; in storeKeyAtomically()
|
H A D | KeyUtil.h | 79 bool retrieveOrGenerateKey(const std::string& key_path, const std::string& tmp_path,
|
H A D | FsCrypt.cpp | 403 auto key_path = de_dir + "/" + entry->d_name; in load_all_de_keys() local 405 if (!retrieveKey(key_path, kEmptyAuthentication, &de_key)) return false; in load_all_de_keys() 658 auto key_path = volkey_path(misc_path, volume_uuid); in read_or_create_volkey() local 659 if (!android::vold::MkdirsSync(key_path, 0700)) return false; in read_or_create_volkey() 665 if (!retrieveOrGenerateKey(key_path, key_path + "_tmp", auth, makeGen(options), &key)) in read_or_create_volkey()
|
H A D | KeyStorage.h | 55 bool storeKeyAtomically(const std::string& key_path, const std::string& tmp_path,
|
/aosp12/hardware/invensense/65xx/libsensors_iio/software/core/mllite/linux/ |
H A D | ml_sysfs_helper.c | 244 char key_path[100]; in process_sysfs_request() local 257 memset(key_path, 0, 100); in process_sysfs_request() 281 memset(key_path, 0, 100); in process_sysfs_request() 283 sprintf(key_path, "/sys/bus/iio/devices/iio:device%d/key", iio_dev_num); in process_sysfs_request() 285 sprintf(key_path, "%s%s", sysfs_path, "/device/invensense/mpu/key"); in process_sysfs_request() 287 if((fp = fopen(key_path, "rt")) == NULL) in process_sysfs_request()
|
/aosp12/hardware/invensense/6515/libsensors_iio/software/core/mllite/linux/ |
H A D | ml_sysfs_helper.c | 252 char key_path[100]; in process_sysfs_request() local 265 memset(key_path, 0, 100); in process_sysfs_request() 289 memset(key_path, 0, 100); in process_sysfs_request() 291 sprintf(key_path, "/sys/bus/iio/devices/iio:device%d/key", iio_dev_num); in process_sysfs_request() 293 sprintf(key_path, "%s%s", sysfs_path, "/device/invensense/mpu/key"); in process_sysfs_request() 295 if((fp = fopen(key_path, "rt")) == NULL) in process_sysfs_request()
|
/aosp12/build/make/tools/releasetools/ |
H A D | verity_utils.py | 190 key_path = prop_dict.get("avb_key_path") 200 key_path, 211 key_path, 374 key_path, algorithm, salt, signing_args): argument 381 self.key_path = key_path 505 if self.key_path and self.algorithm: 506 cmd.extend(["--key", self.key_path, "--algorithm", self.algorithm]) 711 key_path, algorithm, signing_args): argument 719 key_path,
|
H A D | sign_target_files_apks | 917 def ReplaceVerityPublicKey(output_zip, filename, key_path): argument 925 print("Replacing verity public key with %s" % (key_path,)) 926 common.ZipWrite(output_zip, key_path, arcname=filename) 929 def ReplaceVerityPrivateKey(misc_info, key_path): argument 936 print("Replacing verity private key with %s" % (key_path,)) 937 misc_info["verity_key"] = key_path 940 def ReplaceVerityKeyId(input_zip, output_zip, key_path): argument 962 p = common.Run(["openssl", "x509", "-in", key_path, "-text"],
|
H A D | sign_target_files_apks.py | 917 def ReplaceVerityPublicKey(output_zip, filename, key_path): argument 925 print("Replacing verity public key with %s" % (key_path,)) 926 common.ZipWrite(output_zip, key_path, arcname=filename) 929 def ReplaceVerityPrivateKey(misc_info, key_path): argument 936 print("Replacing verity private key with %s" % (key_path,)) 937 misc_info["verity_key"] = key_path 940 def ReplaceVerityKeyId(input_zip, output_zip, key_path): argument 962 p = common.Run(["openssl", "x509", "-in", key_path, "-text"],
|
H A D | common.py | 1308 if key_path and not os.path.exists(key_path) and OPTIONS.search_path: 1311 key_path = new_key_path 1313 if key_path and algorithm: 1341 if not key_path: 1428 key_path = OPTIONS.info_dict.get("gki_signing_key_path") 1430 if not key_path: 1433 if not os.path.exists(key_path) and OPTIONS.search_path: 1436 key_path = new_key_path 1439 if not os.path.exists(key_path): 1444 if key_path and algorithm: [all …]
|
H A D | add_img_to_target_files | 365 key_path = OPTIONS.info_dict.get("avb_{}_key_path".format(partition_name)) 374 key_path, algorithm, extra_args)
|
H A D | add_img_to_target_files.py | 365 key_path = OPTIONS.info_dict.get("avb_{}_key_path".format(partition_name)) 374 key_path, algorithm, extra_args)
|
/aosp12/system/apex/apexd/ |
H A D | apex_file_test.cpp | 136 const std::string key_path = in TEST_P() local 139 ASSERT_TRUE(android::base::ReadFileToString(key_path, &key_content)) in TEST_P() 140 << "Failed to read " << key_path; in TEST_P() 205 const std::string key_path = in TEST() local 208 ASSERT_TRUE(android::base::ReadFileToString(key_path, &key_content)) in TEST() 209 << "Failed to read " << key_path; in TEST()
|
/aosp12/system/extras/verity/ |
H A D | build_verity_metadata.py | 49 def sign_verity_table(table, signer_path, key_path, signer_args=None): argument 55 cmd = [signer_path, table_file.name, key_path, signature_file.name] 58 cmd = [signer_path] + args_list + [table_file.name, key_path, signature_file.name]
|
H A D | verity_verifier.cpp | 51 static int verify_table(const char* key_path, const uint8_t* signature, size_t signature_size, in verify_table() argument 58 std::unique_ptr<RSA, decltype(&RSA_free)> key(load_key(key_path), RSA_free); in verify_table()
|
/aosp12/system/apex/tests/testdata/sharedlibs/build/ |
H A D | shared_libs_repack.py | 173 def run_apexer(container_files, payload_dir, key_path, pubkey_path, tmpdir): argument 188 cmd.extend(['--key', key_path])
|
/aosp12/system/update_engine/payload_consumer/ |
H A D | delta_performer_integration_test.cc | 258 for (const auto& key_path : private_key_paths) { in SignGeneratedShellPayloadWithKeys() local 261 PayloadSigner::GetMaximumSignatureSize(key_path, &signature_size)); in SignGeneratedShellPayloadWithKeys() 281 for (const auto& key_path : private_key_paths) { in SignGeneratedShellPayloadWithKeys() local 284 ASSERT_TRUE(PayloadSigner::SignHash(hash, key_path, &signature)); in SignGeneratedShellPayloadWithKeys() 294 PayloadSigner::SignHash(metadata_hash, key_path, &metadata_signature)); in SignGeneratedShellPayloadWithKeys()
|