/system/security/keystore/tests/ |
D | aaid_truncation_test.cpp | 80 KeyAttestationPackageInfo::SignaturesVector signatures) { in make_package_info_with_signatures() argument 83 std::make_shared<KeyAttestationPackageInfo::SignaturesVector>(std::move(signatures))); in make_package_info_with_signatures() 111 KeyAttestationPackageInfo::SignaturesVector signatures; in TEST() local 114 signatures.push_back(std::make_unique<Signature>(dummy_sig_data)); in TEST() 118 make_package_info_with_signatures(kDummyPackageName, std::move(signatures))); in TEST() 131 KeyAttestationPackageInfo::SignaturesVector signatures; in TEST() local 134 signatures.push_back(std::make_unique<Signature>(dummy_sig_data)); in TEST() 137 make_package_info_with_signatures(kReasonablePackageName, std::move(signatures))); in TEST()
|
/system/update_engine/payload_consumer/ |
D | payload_verifier.cc | 101 Signatures signatures; in VerifySignature() local 103 TEST_AND_RETURN_FALSE(signatures.ParseFromString(signature_proto)); in VerifySignature() 105 if (!signatures.signatures_size()) { in VerifySignature() 112 for (int i = 0; i < signatures.signatures_size(); i++) { in VerifySignature() 113 const Signatures::Signature& signature = signatures.signatures(i); in VerifySignature() 130 << signatures.signatures_size() << " signatures."; in VerifySignature() 137 LOG(ERROR) << "None of the " << signatures.signatures_size() in VerifySignature()
|
D | delta_performer_integration_test.cc | 176 vector<brillo::Blob> signatures; in InsertSignaturePlaceholder() local 177 signatures.push_back(brillo::Blob(signature_size, 0)); in InsertSignaturePlaceholder() 181 signatures, in InsertSignaturePlaceholder() 656 const Signatures::Signature& signature = sigs_message.signatures(0); in ApplyDeltaFile()
|
/system/update_engine/scripts/ |
D | payload_info.py | 112 signatures = update_payload.update_metadata_pb2.Signatures() 113 signatures.ParseFromString(signatures_blob) 115 (signature_name, len(signatures.signatures))) 116 for signature in signatures.signatures: 203 if self.options.signatures:
|
D | payload_info_unittest.py | 51 self.signatures = False 172 new_signature = proto.signatures.add() 286 FakeOption(action='show', signatures=True)) 303 FakeOption(action='show', signatures=True))
|
/system/update_engine/payload_generator/ |
D | payload_signer_unittest.cc | 117 Signatures signatures; in TEST_F() local 118 EXPECT_TRUE(signatures.ParseFromString(signature)); in TEST_F() 119 EXPECT_EQ(1, signatures.signatures_size()); in TEST_F() 120 const Signatures::Signature& sig = signatures.signatures(0); in TEST_F()
|
D | payload_signer.cc | 52 bool ConvertSignaturesToProtobuf(const vector<brillo::Blob>& signatures, in ConvertSignaturesToProtobuf() argument 55 TEST_AND_RETURN_FALSE(signatures.size() == padded_signature_sizes.size()); in ConvertSignaturesToProtobuf() 58 for (size_t i = 0; i < signatures.size(); i++) { in ConvertSignaturesToProtobuf() 59 const auto& signature = signatures[i]; in ConvertSignaturesToProtobuf() 365 vector<brillo::Blob> signatures; in SignHashWithKeys() local 370 signatures.push_back(signature); in SignHashWithKeys() 378 signatures, padded_signature_sizes, out_serialized_signature)); in SignHashWithKeys() 420 vector<brillo::Blob> signatures; in HashPayloadForSigning() local 422 signatures.emplace_back(signature_size, 0); in HashPayloadForSigning() 426 ConvertSignaturesToProtobuf(signatures, signature_sizes, &signature)); in HashPayloadForSigning()
|
D | payload_properties.cc | 115 for (const auto& sig : metadata_signatures.signatures()) { in LoadFromPayload()
|
D | generate_delta_main.cc | 130 vector<brillo::Blob>* signatures) { in SignatureFileFlagToBlobs() argument 136 signatures->push_back(signature); in SignatureFileFlagToBlobs()
|
/system/security/keystore/ |
D | KeyAttestationPackageInfo.cpp | 30 SharedSignaturesVector signatures) in KeyAttestationPackageInfo() argument 31 : packageName_(new String16(packageName)), versionCode_(versionCode), signatures_(signatures) {} in KeyAttestationPackageInfo()
|
/system/security/keystore/include/keystore/ |
D | KeyAttestationPackageInfo.h | 41 SharedSignaturesVector signatures);
|
/system/update_engine/ |
D | update_metadata.proto | 122 // many signatures to support many different types of client. Then client 134 // serialized signatures protobuf string to be fixed before signing; 141 repeated Signature signatures = 1; field 251 // If present, a list of signatures of the new_partition_info.hash signed with 253 // and has its public key installed, one of the signatures should be valid 332 // If signatures are present, the offset into the blobs, generally 335 // If either is absent, it means signatures aren't supported in this
|
D | README.md | 59 payloads, the metadata signatures, the payload size and hash, etc. The updater 68 cryptographically verifies it using the provided signatures from the update 282 …tures]|The signature of the first five fields. There could be multiple signatures if the key has c… 285 … entire payload except the metadata signature. There could be multiple signatures if the key has c…
|
/system/update_engine/update_engine/ |
D | update_metadata.proto | 122 // many signatures to support many different types of client. Then client 134 // serialized signatures protobuf string to be fixed before signing; 141 repeated Signature signatures = 1; field 251 // If present, a list of signatures of the new_partition_info.hash signed with 253 // and has its public key installed, one of the signatures should be valid 332 // If signatures are present, the offset into the blobs, generally 335 // If either is absent, it means signatures aren't supported in this
|
/system/update_engine/scripts/update_payload/ |
D | test_utils.py | 125 sig = self.sigs.signatures.add()
|
D | checker.py | 1123 if not sigs.signatures: 1147 for sig, sig_name in common.SignatureIter(sigs.signatures, 'signatures'):
|
/system/media/camera/docs/ |
D | ndk_camera_metadata_tags.mako | 30 * Do not change method signatures.
|
/system/sepolicy/private/ |
D | system_server.te | 1118 # needs these privileges to compare file signatures while processing installs. 1126 # these packages to inspect the signatures and other metadata.
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | system_server.te | 1095 # needs these privileges to compare file signatures while processing installs. 1103 # these packages to inspect the signatures and other metadata.
|
/system/extras/ioblame/ |
D | ioblame-gmail-run.example | 85 File: /data/com.google.android.gsf/files/signatures/sig-281206196 922 /data/com.google.android.gsf/files/signatures/sig-281206196 Reads: 4 KB i_size: 1 KB
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | system_server.te | 1013 # needs these privileges to compare file signatures while processing installs.
|
/system/sepolicy/public/ |
D | domain.te | 484 # and invalidate dm-verity signatures.
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | domain.te | 483 # and invalidate dm-verity signatures.
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | domain.te | 473 # and invalidate dm-verity signatures.
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | domain.te | 471 # and invalidate dm-verity signatures.
|