Home
last modified time | relevance | path

Searched refs:signatures (Results 1 – 25 of 36) sorted by relevance

12

/system/security/keystore/tests/
Daaid_truncation_test.cpp80 KeyAttestationPackageInfo::SignaturesVector signatures) { in make_package_info_with_signatures() argument
83 std::make_shared<KeyAttestationPackageInfo::SignaturesVector>(std::move(signatures))); in make_package_info_with_signatures()
111 KeyAttestationPackageInfo::SignaturesVector signatures; in TEST() local
114 signatures.push_back(std::make_optional<Signature>(dummy_sig_data)); in TEST()
118 make_package_info_with_signatures(kDummyPackageName, std::move(signatures))); in TEST()
131 KeyAttestationPackageInfo::SignaturesVector signatures; in TEST() local
134 signatures.push_back(std::make_optional<Signature>(dummy_sig_data)); in TEST()
137 make_package_info_with_signatures(kReasonablePackageName, std::move(signatures))); in TEST()
/system/update_engine/payload_consumer/
Dpayload_verifier.cc100 Signatures signatures; in VerifySignature() local
102 TEST_AND_RETURN_FALSE(signatures.ParseFromString(signature_proto)); in VerifySignature()
104 if (!signatures.signatures_size()) { in VerifySignature()
111 for (int i = 0; i < signatures.signatures_size(); i++) { in VerifySignature()
112 const Signatures::Signature& signature = signatures.signatures(i); in VerifySignature()
129 << signatures.signatures_size() << " signatures."; in VerifySignature()
136 LOG(ERROR) << "None of the " << signatures.signatures_size() in VerifySignature()
Ddelta_performer_integration_test.cc209 vector<brillo::Blob> signatures; in InsertSignaturePlaceholder() local
210 signatures.push_back(brillo::Blob(signature_size, 0)); in InsertSignaturePlaceholder()
214 signatures, in InsertSignaturePlaceholder()
666 const Signatures::Signature& signature = sigs_message.signatures(0); in ApplyDeltaFile()
/system/update_engine/payload_generator/
Dpayload_signer_unittest.cc109 Signatures signatures; in TEST_F() local
110 EXPECT_TRUE(signatures.ParseFromString(signature)); in TEST_F()
111 EXPECT_EQ(1, signatures.signatures_size()); in TEST_F()
112 const Signatures::Signature& sig = signatures.signatures(0); in TEST_F()
Dpayload_signer.cc49 bool ConvertSignaturesToProtobuf(const vector<brillo::Blob>& signatures, in ConvertSignaturesToProtobuf() argument
52 TEST_AND_RETURN_FALSE(signatures.size() == padded_signature_sizes.size()); in ConvertSignaturesToProtobuf()
55 for (size_t i = 0; i < signatures.size(); i++) { in ConvertSignaturesToProtobuf()
56 const auto& signature = signatures[i]; in ConvertSignaturesToProtobuf()
349 vector<brillo::Blob> signatures; in SignHashWithKeys() local
354 signatures.push_back(signature); in SignHashWithKeys()
362 signatures, padded_signature_sizes, out_serialized_signature)); in SignHashWithKeys()
404 vector<brillo::Blob> signatures; in HashPayloadForSigning() local
406 signatures.emplace_back(signature_size, 0); in HashPayloadForSigning()
410 ConvertSignaturesToProtobuf(signatures, signature_sizes, &signature)); in HashPayloadForSigning()
Dpayload_properties.cc109 for (const auto& sig : metadata_signatures.signatures()) { in LoadFromPayload()
Dgenerate_delta_main.cc105 vector<brillo::Blob>* signatures) { in SignatureFileFlagToBlobs() argument
111 signatures->push_back(signature); in SignatureFileFlagToBlobs()
/system/update_engine/scripts/
Dpayload_info.py117 signatures = update_payload.update_metadata_pb2.Signatures()
118 signatures.ParseFromString(signatures_blob)
120 (signature_name, len(signatures.signatures)))
121 for signature in signatures.signatures:
208 if self.options.signatures:
Dpayload_info_unittest.py51 self.signatures = False
172 new_signature = proto.signatures.add()
286 FakeOption(action='show', signatures=True))
303 FakeOption(action='show', signatures=True))
/system/security/keystore/
DKeyAttestationPackageInfo.cpp30 SharedSignaturesVector signatures) in KeyAttestationPackageInfo() argument
31 : packageName_(packageName), versionCode_(versionCode), signatures_(signatures) {} in KeyAttestationPackageInfo()
/system/security/keystore/include/keystore/
DKeyAttestationPackageInfo.h41 SharedSignaturesVector signatures);
/system/sepolicy/private/
Dodsign.te57 # Run compos_verify to verify CompOs signatures
/system/sepolicy/prebuilts/api/34.0/private/
Dodsign.te57 # Run compos_verify to verify CompOs signatures
/system/sepolicy/prebuilts/api/33.0/private/
Dodsign.te57 # Run compos_verify to verify CompOs signatures
Dsystem_server.te1361 # needs these privileges to compare file signatures while processing installs.
1369 # these packages to inspect the signatures and other metadata.
/system/update_engine/update_engine/
Dupdate_metadata.proto121 // many signatures to support many different types of client. Then client
133 // serialized signatures protobuf string to be fixed before signing;
140 repeated Signature signatures = 1; field
264 // If present, a list of signatures of the new_partition_info.hash signed with
266 // and has its public key installed, one of the signatures should be valid
397 // If signatures are present, the offset into the blobs, generally
400 // If either is absent, it means signatures aren't supported in this
/system/update_engine/
Dupdate_metadata.proto121 // many signatures to support many different types of client. Then client
133 // serialized signatures protobuf string to be fixed before signing;
140 repeated Signature signatures = 1; field
264 // If present, a list of signatures of the new_partition_info.hash signed with
266 // and has its public key installed, one of the signatures should be valid
397 // If signatures are present, the offset into the blobs, generally
400 // If either is absent, it means signatures aren't supported in this
DREADME.md77 payloads, the metadata signatures, the payload size and hash, etc. The updater
89 cryptographically verifies it using the provided signatures from the update
251 … | The signature of the first five fields. There could be multiple signatures if the key has c…
254 … entire payload except the metadata signature. There could be multiple signatures if the key has c…
/system/update_engine/scripts/update_payload/
Dtest_utils.py125 sig = self.sigs.signatures.add()
Dchecker.py1125 if not sigs.signatures:
1149 for sig, sig_name in common.SignatureIter(sigs.signatures, 'signatures'):
/system/media/camera/docs/
Dndk_camera_metadata_tags.mako30 * Do not change method signatures.
/system/sepolicy/prebuilts/api/30.0/private/
Dsystem_server.te1095 # needs these privileges to compare file signatures while processing installs.
1103 # these packages to inspect the signatures and other metadata.
/system/sepolicy/prebuilts/api/32.0/private/
Dsystem_server.te1283 # needs these privileges to compare file signatures while processing installs.
1291 # these packages to inspect the signatures and other metadata.
/system/sepolicy/prebuilts/api/31.0/private/
Dsystem_server.te1281 # needs these privileges to compare file signatures while processing installs.
1289 # these packages to inspect the signatures and other metadata.
/system/sepolicy/microdroid/system/private/
Ddomain.te360 # and invalidate dm-verity signatures.

12