Home
last modified time | relevance | path

Searched refs:signatures (Results 1 – 22 of 22) sorted by relevance

/system/security/keystore/tests/
Daaid_truncation_test.cpp80 KeyAttestationPackageInfo::SignaturesVector signatures) { in make_package_info_with_signatures() argument
83 std::make_shared<KeyAttestationPackageInfo::SignaturesVector>(std::move(signatures))); in make_package_info_with_signatures()
111 KeyAttestationPackageInfo::SignaturesVector signatures; in TEST() local
114 signatures.push_back(std::make_unique<Signature>(dummy_sig_data)); in TEST()
118 make_package_info_with_signatures(kDummyPackageName, std::move(signatures))); in TEST()
131 KeyAttestationPackageInfo::SignaturesVector signatures; in TEST() local
134 signatures.push_back(std::make_unique<Signature>(dummy_sig_data)); in TEST()
137 make_package_info_with_signatures(kReasonablePackageName, std::move(signatures))); in TEST()
/system/update_engine/payload_consumer/
Dpayload_verifier.cc57 Signatures signatures; in VerifySignature() local
59 TEST_AND_RETURN_FALSE(signatures.ParseFromString(signature_proto)); in VerifySignature()
61 if (!signatures.signatures_size()) { in VerifySignature()
68 for (int i = 0; i < signatures.signatures_size(); i++) { in VerifySignature()
69 const Signatures::Signature& signature = signatures.signatures(i); in VerifySignature()
79 << signatures.signatures_size() << " signatures."; in VerifySignature()
84 LOG(ERROR) << "None of the " << signatures.signatures_size() in VerifySignature()
Ddelta_performer_integration_test.cc179 vector<brillo::Blob> signatures; in InsertSignaturePlaceholder() local
180 signatures.push_back(brillo::Blob(signature_size, 0)); in InsertSignaturePlaceholder()
183 payload_path, signatures, {}, payload_path, out_metadata_size); in InsertSignaturePlaceholder()
599 const Signatures::Signature& signature = sigs_message.signatures(0); in ApplyDeltaFile()
/system/update_engine/payload_generator/
Dpayload_signer_unittest.cc114 Signatures signatures; in TEST_F() local
115 EXPECT_TRUE(signatures.ParseFromString(signature)); in TEST_F()
116 EXPECT_EQ(1, signatures.signatures_size()); in TEST_F()
117 const Signatures::Signature& sig = signatures.signatures(0); in TEST_F()
Dpayload_signer.cc57 bool ConvertSignaturesToProtobuf(const vector<brillo::Blob>& signatures, in ConvertSignaturesToProtobuf() argument
61 for (const brillo::Blob& signature : signatures) { in ConvertSignaturesToProtobuf()
311 vector<brillo::Blob> signatures; in SignHashWithKeys() local
315 signatures.push_back(signature); in SignHashWithKeys()
318 ConvertSignaturesToProtobuf(signatures, out_serialized_signature)); in SignHashWithKeys()
360 vector<brillo::Blob> signatures; in HashPayloadForSigning() local
362 signatures.emplace_back(signature_size, 0); in HashPayloadForSigning()
365 TEST_AND_RETURN_FALSE(ConvertSignaturesToProtobuf(signatures, &signature)); in HashPayloadForSigning()
Dgenerate_delta_main.cc129 vector<brillo::Blob>* signatures) { in SignatureFileFlagToBlobs() argument
135 signatures->push_back(signature); in SignatureFileFlagToBlobs()
/system/update_engine/scripts/
Dpayload_info.py115 signatures = update_payload.update_metadata_pb2.Signatures()
116 signatures.ParseFromString(signatures_blob)
118 (signature_name, len(signatures.signatures)))
119 for signature in signatures.signatures:
216 if self.options.signatures:
Dpayload_info_unittest.py44 self.signatures = False
154 new_signature = proto.signatures.add()
311 FakeOption(action='show', signatures=True))
327 FakeOption(action='show', signatures=True))
/system/security/keystore/
DKeyAttestationPackageInfo.cpp30 SharedSignaturesVector signatures) in KeyAttestationPackageInfo() argument
31 : packageName_(new String16(packageName)), versionCode_(versionCode), signatures_(signatures) {} in KeyAttestationPackageInfo()
/system/security/keystore/include/keystore/
DKeyAttestationPackageInfo.h41 SharedSignaturesVector signatures);
/system/update_engine/
Dupdate_metadata.proto122 // many signatures to support many different types of client. Then client
132 repeated Signature signatures = 1; field
242 // If present, a list of signatures of the new_partition_info.hash signed with
244 // and has its public key installed, one of the signatures should be valid
317 // If signatures are present, the offset into the blobs, generally
320 // If either is absent, it means signatures aren't supported in this
/system/update_engine/update_engine/
Dupdate_metadata.proto122 // many signatures to support many different types of client. Then client
132 repeated Signature signatures = 1; field
242 // If present, a list of signatures of the new_partition_info.hash signed with
244 // and has its public key installed, one of the signatures should be valid
317 // If signatures are present, the offset into the blobs, generally
320 // If either is absent, it means signatures aren't supported in this
/system/update_engine/scripts/update_payload/
Dtest_utils.py124 sig = self.sigs.signatures.add()
Dchecker.py1251 if not sigs.signatures:
1279 for sig, sig_name in common.SignatureIter(sigs.signatures, 'signatures'):
/system/media/camera/docs/
Dndk_camera_metadata_tags.mako30 * Do not change method signatures.
/system/core/llkd/
DREADME.md183 This subset of processes are not monitored for live lock stack signatures.
/system/extras/ioblame/
Dioblame-gmail-run.example85 File: /data/com.google.android.gsf/files/signatures/sig-281206196
922 /data/com.google.android.gsf/files/signatures/sig-281206196 Reads: 4 KB i_size: 1 KB
/system/sepolicy/prebuilts/api/29.0/private/
Dsystem_server.te1011 # needs these privileges to compare file signatures while processing installs.
/system/sepolicy/private/
Dsystem_server.te1011 # needs these privileges to compare file signatures while processing installs.
/system/sepolicy/prebuilts/api/28.0/public/
Ddomain.te483 # and invalidate dm-verity signatures.
/system/sepolicy/public/
Ddomain.te473 # and invalidate dm-verity signatures.
/system/sepolicy/prebuilts/api/29.0/public/
Ddomain.te473 # and invalidate dm-verity signatures.