/system/security/keystore/tests/ |
D | aaid_truncation_test.cpp | 80 KeyAttestationPackageInfo::SignaturesVector signatures) { in make_package_info_with_signatures() argument 83 std::make_shared<KeyAttestationPackageInfo::SignaturesVector>(std::move(signatures))); in make_package_info_with_signatures() 111 KeyAttestationPackageInfo::SignaturesVector signatures; in TEST() local 114 signatures.push_back(std::make_optional<Signature>(dummy_sig_data)); in TEST() 118 make_package_info_with_signatures(kDummyPackageName, std::move(signatures))); in TEST() 131 KeyAttestationPackageInfo::SignaturesVector signatures; in TEST() local 134 signatures.push_back(std::make_optional<Signature>(dummy_sig_data)); in TEST() 137 make_package_info_with_signatures(kReasonablePackageName, std::move(signatures))); in TEST()
|
/system/update_engine/payload_consumer/ |
D | payload_verifier.cc | 100 Signatures signatures; in VerifySignature() local 102 TEST_AND_RETURN_FALSE(signatures.ParseFromString(signature_proto)); in VerifySignature() 104 if (!signatures.signatures_size()) { in VerifySignature() 111 for (int i = 0; i < signatures.signatures_size(); i++) { in VerifySignature() 112 const Signatures::Signature& signature = signatures.signatures(i); in VerifySignature() 129 << signatures.signatures_size() << " signatures."; in VerifySignature() 136 LOG(ERROR) << "None of the " << signatures.signatures_size() in VerifySignature()
|
D | delta_performer_integration_test.cc | 209 vector<brillo::Blob> signatures; in InsertSignaturePlaceholder() local 210 signatures.push_back(brillo::Blob(signature_size, 0)); in InsertSignaturePlaceholder() 214 signatures, in InsertSignaturePlaceholder() 666 const Signatures::Signature& signature = sigs_message.signatures(0); in ApplyDeltaFile()
|
/system/update_engine/payload_generator/ |
D | payload_signer_unittest.cc | 109 Signatures signatures; in TEST_F() local 110 EXPECT_TRUE(signatures.ParseFromString(signature)); in TEST_F() 111 EXPECT_EQ(1, signatures.signatures_size()); in TEST_F() 112 const Signatures::Signature& sig = signatures.signatures(0); in TEST_F()
|
D | payload_signer.cc | 49 bool ConvertSignaturesToProtobuf(const vector<brillo::Blob>& signatures, in ConvertSignaturesToProtobuf() argument 52 TEST_AND_RETURN_FALSE(signatures.size() == padded_signature_sizes.size()); in ConvertSignaturesToProtobuf() 55 for (size_t i = 0; i < signatures.size(); i++) { in ConvertSignaturesToProtobuf() 56 const auto& signature = signatures[i]; in ConvertSignaturesToProtobuf() 349 vector<brillo::Blob> signatures; in SignHashWithKeys() local 354 signatures.push_back(signature); in SignHashWithKeys() 362 signatures, padded_signature_sizes, out_serialized_signature)); in SignHashWithKeys() 404 vector<brillo::Blob> signatures; in HashPayloadForSigning() local 406 signatures.emplace_back(signature_size, 0); in HashPayloadForSigning() 410 ConvertSignaturesToProtobuf(signatures, signature_sizes, &signature)); in HashPayloadForSigning()
|
D | payload_properties.cc | 109 for (const auto& sig : metadata_signatures.signatures()) { in LoadFromPayload()
|
D | generate_delta_main.cc | 105 vector<brillo::Blob>* signatures) { in SignatureFileFlagToBlobs() argument 111 signatures->push_back(signature); in SignatureFileFlagToBlobs()
|
/system/update_engine/scripts/ |
D | payload_info.py | 117 signatures = update_payload.update_metadata_pb2.Signatures() 118 signatures.ParseFromString(signatures_blob) 120 (signature_name, len(signatures.signatures))) 121 for signature in signatures.signatures: 208 if self.options.signatures:
|
D | payload_info_unittest.py | 51 self.signatures = False 172 new_signature = proto.signatures.add() 286 FakeOption(action='show', signatures=True)) 303 FakeOption(action='show', signatures=True))
|
/system/security/keystore/ |
D | KeyAttestationPackageInfo.cpp | 30 SharedSignaturesVector signatures) in KeyAttestationPackageInfo() argument 31 : packageName_(packageName), versionCode_(versionCode), signatures_(signatures) {} in KeyAttestationPackageInfo()
|
/system/security/keystore/include/keystore/ |
D | KeyAttestationPackageInfo.h | 41 SharedSignaturesVector signatures);
|
/system/sepolicy/private/ |
D | odsign.te | 57 # Run compos_verify to verify CompOs signatures
|
/system/sepolicy/prebuilts/api/34.0/private/ |
D | odsign.te | 57 # Run compos_verify to verify CompOs signatures
|
/system/sepolicy/prebuilts/api/33.0/private/ |
D | odsign.te | 57 # Run compos_verify to verify CompOs signatures
|
D | system_server.te | 1361 # needs these privileges to compare file signatures while processing installs. 1369 # these packages to inspect the signatures and other metadata.
|
/system/update_engine/update_engine/ |
D | update_metadata.proto | 121 // many signatures to support many different types of client. Then client 133 // serialized signatures protobuf string to be fixed before signing; 140 repeated Signature signatures = 1; field 264 // If present, a list of signatures of the new_partition_info.hash signed with 266 // and has its public key installed, one of the signatures should be valid 397 // If signatures are present, the offset into the blobs, generally 400 // If either is absent, it means signatures aren't supported in this
|
/system/update_engine/ |
D | update_metadata.proto | 121 // many signatures to support many different types of client. Then client 133 // serialized signatures protobuf string to be fixed before signing; 140 repeated Signature signatures = 1; field 264 // If present, a list of signatures of the new_partition_info.hash signed with 266 // and has its public key installed, one of the signatures should be valid 397 // If signatures are present, the offset into the blobs, generally 400 // If either is absent, it means signatures aren't supported in this
|
D | README.md | 77 payloads, the metadata signatures, the payload size and hash, etc. The updater 89 cryptographically verifies it using the provided signatures from the update 251 … | The signature of the first five fields. There could be multiple signatures if the key has c… 254 … entire payload except the metadata signature. There could be multiple signatures if the key has c…
|
/system/update_engine/scripts/update_payload/ |
D | test_utils.py | 125 sig = self.sigs.signatures.add()
|
D | checker.py | 1125 if not sigs.signatures: 1149 for sig, sig_name in common.SignatureIter(sigs.signatures, 'signatures'):
|
/system/media/camera/docs/ |
D | ndk_camera_metadata_tags.mako | 30 * Do not change method signatures.
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | system_server.te | 1095 # needs these privileges to compare file signatures while processing installs. 1103 # these packages to inspect the signatures and other metadata.
|
/system/sepolicy/prebuilts/api/32.0/private/ |
D | system_server.te | 1283 # needs these privileges to compare file signatures while processing installs. 1291 # these packages to inspect the signatures and other metadata.
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | system_server.te | 1281 # needs these privileges to compare file signatures while processing installs. 1289 # these packages to inspect the signatures and other metadata.
|
/system/sepolicy/microdroid/system/private/ |
D | domain.te | 360 # and invalidate dm-verity signatures.
|