Home
last modified time | relevance | path

Searched refs:signatures (Results 1 – 25 of 25) sorted by relevance

/system/security/keystore/tests/
Daaid_truncation_test.cpp80 KeyAttestationPackageInfo::SignaturesVector signatures) { in make_package_info_with_signatures() argument
83 std::make_shared<KeyAttestationPackageInfo::SignaturesVector>(std::move(signatures))); in make_package_info_with_signatures()
111 KeyAttestationPackageInfo::SignaturesVector signatures; in TEST() local
114 signatures.push_back(std::make_unique<Signature>(dummy_sig_data)); in TEST()
118 make_package_info_with_signatures(kDummyPackageName, std::move(signatures))); in TEST()
131 KeyAttestationPackageInfo::SignaturesVector signatures; in TEST() local
134 signatures.push_back(std::make_unique<Signature>(dummy_sig_data)); in TEST()
137 make_package_info_with_signatures(kReasonablePackageName, std::move(signatures))); in TEST()
/system/update_engine/payload_consumer/
Dpayload_verifier.cc101 Signatures signatures; in VerifySignature() local
103 TEST_AND_RETURN_FALSE(signatures.ParseFromString(signature_proto)); in VerifySignature()
105 if (!signatures.signatures_size()) { in VerifySignature()
112 for (int i = 0; i < signatures.signatures_size(); i++) { in VerifySignature()
113 const Signatures::Signature& signature = signatures.signatures(i); in VerifySignature()
130 << signatures.signatures_size() << " signatures."; in VerifySignature()
137 LOG(ERROR) << "None of the " << signatures.signatures_size() in VerifySignature()
Ddelta_performer_integration_test.cc176 vector<brillo::Blob> signatures; in InsertSignaturePlaceholder() local
177 signatures.push_back(brillo::Blob(signature_size, 0)); in InsertSignaturePlaceholder()
181 signatures, in InsertSignaturePlaceholder()
656 const Signatures::Signature& signature = sigs_message.signatures(0); in ApplyDeltaFile()
/system/update_engine/scripts/
Dpayload_info.py112 signatures = update_payload.update_metadata_pb2.Signatures()
113 signatures.ParseFromString(signatures_blob)
115 (signature_name, len(signatures.signatures)))
116 for signature in signatures.signatures:
203 if self.options.signatures:
Dpayload_info_unittest.py51 self.signatures = False
172 new_signature = proto.signatures.add()
286 FakeOption(action='show', signatures=True))
303 FakeOption(action='show', signatures=True))
/system/update_engine/payload_generator/
Dpayload_signer_unittest.cc117 Signatures signatures; in TEST_F() local
118 EXPECT_TRUE(signatures.ParseFromString(signature)); in TEST_F()
119 EXPECT_EQ(1, signatures.signatures_size()); in TEST_F()
120 const Signatures::Signature& sig = signatures.signatures(0); in TEST_F()
Dpayload_signer.cc52 bool ConvertSignaturesToProtobuf(const vector<brillo::Blob>& signatures, in ConvertSignaturesToProtobuf() argument
55 TEST_AND_RETURN_FALSE(signatures.size() == padded_signature_sizes.size()); in ConvertSignaturesToProtobuf()
58 for (size_t i = 0; i < signatures.size(); i++) { in ConvertSignaturesToProtobuf()
59 const auto& signature = signatures[i]; in ConvertSignaturesToProtobuf()
365 vector<brillo::Blob> signatures; in SignHashWithKeys() local
370 signatures.push_back(signature); in SignHashWithKeys()
378 signatures, padded_signature_sizes, out_serialized_signature)); in SignHashWithKeys()
420 vector<brillo::Blob> signatures; in HashPayloadForSigning() local
422 signatures.emplace_back(signature_size, 0); in HashPayloadForSigning()
426 ConvertSignaturesToProtobuf(signatures, signature_sizes, &signature)); in HashPayloadForSigning()
Dpayload_properties.cc115 for (const auto& sig : metadata_signatures.signatures()) { in LoadFromPayload()
Dgenerate_delta_main.cc130 vector<brillo::Blob>* signatures) { in SignatureFileFlagToBlobs() argument
136 signatures->push_back(signature); in SignatureFileFlagToBlobs()
/system/security/keystore/
DKeyAttestationPackageInfo.cpp30 SharedSignaturesVector signatures) in KeyAttestationPackageInfo() argument
31 : packageName_(new String16(packageName)), versionCode_(versionCode), signatures_(signatures) {} in KeyAttestationPackageInfo()
/system/security/keystore/include/keystore/
DKeyAttestationPackageInfo.h41 SharedSignaturesVector signatures);
/system/update_engine/
Dupdate_metadata.proto122 // many signatures to support many different types of client. Then client
134 // serialized signatures protobuf string to be fixed before signing;
141 repeated Signature signatures = 1; field
251 // If present, a list of signatures of the new_partition_info.hash signed with
253 // and has its public key installed, one of the signatures should be valid
332 // If signatures are present, the offset into the blobs, generally
335 // If either is absent, it means signatures aren't supported in this
DREADME.md59 payloads, the metadata signatures, the payload size and hash, etc. The updater
68 cryptographically verifies it using the provided signatures from the update
282 …tures]|The signature of the first five fields. There could be multiple signatures if the key has c…
285 … entire payload except the metadata signature. There could be multiple signatures if the key has c…
/system/update_engine/update_engine/
Dupdate_metadata.proto122 // many signatures to support many different types of client. Then client
134 // serialized signatures protobuf string to be fixed before signing;
141 repeated Signature signatures = 1; field
251 // If present, a list of signatures of the new_partition_info.hash signed with
253 // and has its public key installed, one of the signatures should be valid
332 // If signatures are present, the offset into the blobs, generally
335 // If either is absent, it means signatures aren't supported in this
/system/update_engine/scripts/update_payload/
Dtest_utils.py125 sig = self.sigs.signatures.add()
Dchecker.py1123 if not sigs.signatures:
1147 for sig, sig_name in common.SignatureIter(sigs.signatures, 'signatures'):
/system/media/camera/docs/
Dndk_camera_metadata_tags.mako30 * Do not change method signatures.
/system/sepolicy/private/
Dsystem_server.te1118 # needs these privileges to compare file signatures while processing installs.
1126 # these packages to inspect the signatures and other metadata.
/system/sepolicy/prebuilts/api/30.0/private/
Dsystem_server.te1095 # needs these privileges to compare file signatures while processing installs.
1103 # these packages to inspect the signatures and other metadata.
/system/extras/ioblame/
Dioblame-gmail-run.example85 File: /data/com.google.android.gsf/files/signatures/sig-281206196
922 /data/com.google.android.gsf/files/signatures/sig-281206196 Reads: 4 KB i_size: 1 KB
/system/sepolicy/prebuilts/api/29.0/private/
Dsystem_server.te1013 # needs these privileges to compare file signatures while processing installs.
/system/sepolicy/public/
Ddomain.te484 # and invalidate dm-verity signatures.
/system/sepolicy/prebuilts/api/28.0/public/
Ddomain.te483 # and invalidate dm-verity signatures.
/system/sepolicy/prebuilts/api/29.0/public/
Ddomain.te473 # and invalidate dm-verity signatures.
/system/sepolicy/prebuilts/api/30.0/public/
Ddomain.te471 # and invalidate dm-verity signatures.