Home
last modified time | relevance | path

Searched refs:signatures (Results 1 – 18 of 18) sorted by relevance

/system/update_engine/payload_consumer/
Dpayload_verifier.cc92 Signatures signatures; in VerifySignature() local
94 TEST_AND_RETURN_FALSE(signatures.ParseFromArray(signature_blob.data(), in VerifySignature()
97 if (!signatures.signatures_size()) { in VerifySignature()
104 for (int i = 0; i < signatures.signatures_size(); i++) { in VerifySignature()
105 const Signatures_Signature& signature = signatures.signatures(i); in VerifySignature()
113 << signatures.signatures_size() << " signatures."; in VerifySignature()
118 LOG(ERROR) << "None of the " << signatures.signatures_size() in VerifySignature()
Ddelta_performer_integration_test.cc183 vector<brillo::Blob> signatures; in InsertSignaturePlaceholder() local
184 signatures.push_back(brillo::Blob(signature_size, 0)); in InsertSignaturePlaceholder()
188 signatures, in InsertSignaturePlaceholder()
620 const Signatures_Signature& signature = sigs_message.signatures(0); in ApplyDeltaFile()
/system/update_engine/payload_generator/
Dpayload_signer_unittest.cc171 Signatures signatures; in TEST_F() local
172 EXPECT_TRUE(signatures.ParseFromArray(signature_blob.data(), in TEST_F()
174 EXPECT_EQ(1, signatures.signatures_size()); in TEST_F()
175 const Signatures_Signature& signature = signatures.signatures(0); in TEST_F()
Dpayload_signer.cc57 bool ConvertSignatureToProtobufBlob(const vector<brillo::Blob>& signatures, in ConvertSignatureToProtobufBlob() argument
61 for (const brillo::Blob& signature : signatures) { in ConvertSignatureToProtobufBlob()
388 vector<brillo::Blob> signatures; in SignHashWithKeys() local
392 signatures.push_back(signature); in SignHashWithKeys()
394 TEST_AND_RETURN_FALSE(ConvertSignatureToProtobufBlob(signatures, in SignHashWithKeys()
439 vector<brillo::Blob> signatures; in HashPayloadForSigning() local
441 signatures.emplace_back(signature_size, 0); in HashPayloadForSigning()
444 TEST_AND_RETURN_FALSE(ConvertSignatureToProtobufBlob(signatures, in HashPayloadForSigning()
Dgenerate_delta_main.cc131 vector<brillo::Blob>* signatures) { in SignatureFileFlagToBlobs() argument
138 signatures->push_back(signature); in SignatureFileFlagToBlobs()
154 vector<brillo::Blob> signatures, metadata_signatures; in SignPayload() local
155 SignatureFileFlagToBlobs(payload_signature_file, &signatures); in SignPayload()
158 CHECK(PayloadSigner::AddSignatureToPayload(in_file, signatures, in SignPayload()
/system/security/keystore/
DKeyAttestationPackageInfo.cpp30 SharedSignaturesVector signatures) in KeyAttestationPackageInfo() argument
31 : packageName_(new String16(packageName)), versionCode_(versionCode), signatures_(signatures) {} in KeyAttestationPackageInfo()
/system/security/keystore/include/keystore/
DKeyAttestationPackageInfo.h41 SharedSignaturesVector signatures);
/system/update_engine/
Dupdate_metadata.proto112 // many signatures to support many different types of client. Then client
127 repeated Signature signatures = 1; field
234 // If present, a list of signatures of the new_partition_info.hash signed with
236 // and has its public key installed, one of the signatures should be valid
263 // If signatures are present, the offset into the blobs, generally
266 // If either is absent, it means signatures aren't supported in this
/system/update_engine/scripts/update_payload/
Dtest_utils.py112 sig = self.sigs.signatures.add()
Dchecker.py1172 if not sigs.signatures:
1197 for sig, sig_name in common.SignatureIter(sigs.signatures, 'signatures'):
/system/media/camera/docs/
Dndk_camera_metadata_tags.mako30 * Do not change method signatures.
/system/extras/ioblame/
Dioblame-gmail-run.example85 File: /data/com.google.android.gsf/files/signatures/sig-281206196
922 /data/com.google.android.gsf/files/signatures/sig-281206196 Reads: 4 KB i_size: 1 KB
/system/sepolicy/prebuilts/api/28.0/public/
Ddomain.te483 # and invalidate dm-verity signatures.
/system/sepolicy/public/
Ddomain.te483 # and invalidate dm-verity signatures.
/system/tpm/trunks/generator/
Draw_structures_fixed.txt13722 key. This would allow the TPM to validate signatures using the smaller key but would prevent the TPM
14138 A TPMU_SIGNATURE_COMPOSITE is a union of the various signatures that is supported by a particular
14151 The table below is illustrative. It would be modified to reflect the signatures produced by the TPM.
Draw_structures.txt13707 key. This would allow the TPM to validate signatures using the smaller key but would prevent the TPM
14123 A TPMU_SIGNATURE_COMPOSITE is a union of the various signatures that is supported by a particular
14136 The table below is illustrative. It would be modified to reflect the signatures produced by the TPM.
Draw_commands.txt14568 perform digital signatures
Draw_commands_fixed.txt14581 perform digital signatures