/system/security/keystore/tests/ |
D | aaid_truncation_test.cpp | 80 KeyAttestationPackageInfo::SignaturesVector signatures) { in make_package_info_with_signatures() argument 83 std::make_shared<KeyAttestationPackageInfo::SignaturesVector>(std::move(signatures))); in make_package_info_with_signatures() 111 KeyAttestationPackageInfo::SignaturesVector signatures; in TEST() local 114 signatures.push_back(std::make_unique<Signature>(dummy_sig_data)); in TEST() 118 make_package_info_with_signatures(kDummyPackageName, std::move(signatures))); in TEST() 131 KeyAttestationPackageInfo::SignaturesVector signatures; in TEST() local 134 signatures.push_back(std::make_unique<Signature>(dummy_sig_data)); in TEST() 137 make_package_info_with_signatures(kReasonablePackageName, std::move(signatures))); in TEST()
|
/system/update_engine/payload_consumer/ |
D | payload_verifier.cc | 57 Signatures signatures; in VerifySignature() local 59 TEST_AND_RETURN_FALSE(signatures.ParseFromString(signature_proto)); in VerifySignature() 61 if (!signatures.signatures_size()) { in VerifySignature() 68 for (int i = 0; i < signatures.signatures_size(); i++) { in VerifySignature() 69 const Signatures::Signature& signature = signatures.signatures(i); in VerifySignature() 79 << signatures.signatures_size() << " signatures."; in VerifySignature() 84 LOG(ERROR) << "None of the " << signatures.signatures_size() in VerifySignature()
|
D | delta_performer_integration_test.cc | 179 vector<brillo::Blob> signatures; in InsertSignaturePlaceholder() local 180 signatures.push_back(brillo::Blob(signature_size, 0)); in InsertSignaturePlaceholder() 183 payload_path, signatures, {}, payload_path, out_metadata_size); in InsertSignaturePlaceholder() 599 const Signatures::Signature& signature = sigs_message.signatures(0); in ApplyDeltaFile()
|
/system/update_engine/payload_generator/ |
D | payload_signer_unittest.cc | 114 Signatures signatures; in TEST_F() local 115 EXPECT_TRUE(signatures.ParseFromString(signature)); in TEST_F() 116 EXPECT_EQ(1, signatures.signatures_size()); in TEST_F() 117 const Signatures::Signature& sig = signatures.signatures(0); in TEST_F()
|
D | payload_signer.cc | 57 bool ConvertSignaturesToProtobuf(const vector<brillo::Blob>& signatures, in ConvertSignaturesToProtobuf() argument 61 for (const brillo::Blob& signature : signatures) { in ConvertSignaturesToProtobuf() 311 vector<brillo::Blob> signatures; in SignHashWithKeys() local 315 signatures.push_back(signature); in SignHashWithKeys() 318 ConvertSignaturesToProtobuf(signatures, out_serialized_signature)); in SignHashWithKeys() 360 vector<brillo::Blob> signatures; in HashPayloadForSigning() local 362 signatures.emplace_back(signature_size, 0); in HashPayloadForSigning() 365 TEST_AND_RETURN_FALSE(ConvertSignaturesToProtobuf(signatures, &signature)); in HashPayloadForSigning()
|
D | generate_delta_main.cc | 129 vector<brillo::Blob>* signatures) { in SignatureFileFlagToBlobs() argument 135 signatures->push_back(signature); in SignatureFileFlagToBlobs()
|
/system/update_engine/scripts/ |
D | payload_info.py | 115 signatures = update_payload.update_metadata_pb2.Signatures() 116 signatures.ParseFromString(signatures_blob) 118 (signature_name, len(signatures.signatures))) 119 for signature in signatures.signatures: 216 if self.options.signatures:
|
D | payload_info_unittest.py | 44 self.signatures = False 154 new_signature = proto.signatures.add() 311 FakeOption(action='show', signatures=True)) 327 FakeOption(action='show', signatures=True))
|
/system/security/keystore/ |
D | KeyAttestationPackageInfo.cpp | 30 SharedSignaturesVector signatures) in KeyAttestationPackageInfo() argument 31 : packageName_(new String16(packageName)), versionCode_(versionCode), signatures_(signatures) {} in KeyAttestationPackageInfo()
|
/system/security/keystore/include/keystore/ |
D | KeyAttestationPackageInfo.h | 41 SharedSignaturesVector signatures);
|
/system/update_engine/ |
D | update_metadata.proto | 122 // many signatures to support many different types of client. Then client 132 repeated Signature signatures = 1; field 242 // If present, a list of signatures of the new_partition_info.hash signed with 244 // and has its public key installed, one of the signatures should be valid 317 // If signatures are present, the offset into the blobs, generally 320 // If either is absent, it means signatures aren't supported in this
|
/system/update_engine/update_engine/ |
D | update_metadata.proto | 122 // many signatures to support many different types of client. Then client 132 repeated Signature signatures = 1; field 242 // If present, a list of signatures of the new_partition_info.hash signed with 244 // and has its public key installed, one of the signatures should be valid 317 // If signatures are present, the offset into the blobs, generally 320 // If either is absent, it means signatures aren't supported in this
|
/system/update_engine/scripts/update_payload/ |
D | test_utils.py | 124 sig = self.sigs.signatures.add()
|
D | checker.py | 1251 if not sigs.signatures: 1279 for sig, sig_name in common.SignatureIter(sigs.signatures, 'signatures'):
|
/system/media/camera/docs/ |
D | ndk_camera_metadata_tags.mako | 30 * Do not change method signatures.
|
/system/core/llkd/ |
D | README.md | 183 This subset of processes are not monitored for live lock stack signatures.
|
/system/extras/ioblame/ |
D | ioblame-gmail-run.example | 85 File: /data/com.google.android.gsf/files/signatures/sig-281206196 922 /data/com.google.android.gsf/files/signatures/sig-281206196 Reads: 4 KB i_size: 1 KB
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | system_server.te | 1011 # needs these privileges to compare file signatures while processing installs.
|
/system/sepolicy/private/ |
D | system_server.te | 1011 # needs these privileges to compare file signatures while processing installs.
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | domain.te | 483 # and invalidate dm-verity signatures.
|
/system/sepolicy/public/ |
D | domain.te | 473 # and invalidate dm-verity signatures.
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | domain.te | 473 # and invalidate dm-verity signatures.
|