Searched refs:hashes (Results 1 – 10 of 10) sorted by relevance
/system/tools/hidl/hashing/ |
D | Hash.cpp | 35 static std::map<std::string, Hash> hashes; in getMutableHash() local 37 auto it = hashes.find(path); in getMutableHash() 39 if (hashes.find(path) == hashes.end()) { in getMutableHash() 40 it = hashes.insert(it, {path, Hash(path)}); in getMutableHash() 102 auto it = hashes.find(fqName); in lookup() 104 if (it == hashes.end()) { in lookup() 147 file->hashes[fqName].push_back(hash); in readHashFile() 153 std::map<std::string, std::vector<std::string>> hashes; member
|
/system/tools/aidl/metadata/ |
D | test.cpp | 40 EXPECT_THAT(info->hashes, ElementsAre("13e24b2fac6a979971819fba2ab0d6d7c4182122", in TEST() 53 EXPECT_THAT(info->hashes, ElementsAre("c544902ab8a1d2e72ae9396032ba113e9b9698c4", in TEST()
|
/system/extras/libfec/ |
D | fec_verity.cpp | 104 uint64_t hashes = file_size / FEC_BLOCKSIZE; in verity_get_size() local 108 level_hashes[level] = hashes; in verity_get_size() 111 hashes = fec_div_round_up(hashes * padded_digest_size, FEC_BLOCKSIZE); in verity_get_size() 112 total += hashes; in verity_get_size() 115 } while (hashes > 1); in verity_get_size() 241 uint32_t hashes[levels]; in verify_tree() local 243 verity_get_size(data_blocks * FEC_BLOCKSIZE, NULL, hashes, in verify_tree() 250 uint32_t blocks = hashes[levels - i]; in verify_tree() 276 uint32_t blocks = hashes[levels - i]; in verify_tree()
|
/system/tools/aidl/metadata/include/aidl/ |
D | metadata.h | 35 std::vector<std::string> hashes; member
|
/system/security/ondevice-signing/proto/ |
D | odsign_info.proto | 22 // Map of artifact files to their hashes
|
/system/tools/aidl/build/ |
D | aidl_interface_metadata_singleton.go | 150 "hashes": readHashes,
|
/system/apex/shim/ |
D | README.md | 15 file called `hash.txt` with a list of allowed SHA512 hashes of versions shim
|
/system/libhidl/transport/base/1.0/ |
D | IBase.hal | 124 * Returns hashes of the source HAL files that define the interfaces of the
|
/system/update_engine/ |
D | README.md | 91 payload can easily be verified cryptographically (mostly through SHA256 hashes). 106 During the download, the updater client hashes the downloaded bytes and when the 356 help with generating metadata and payload hashes or signing the payloads given
|
/system/core/fastboot/fuzzy_fastboot/ |
D | README.md | 196 - **value** - The command that hashes a partition. Note that the name of the partition will be appe…
|