/system/core/fs_mgr/libfs_avb/tests/ |
D | avb_util_test.cpp | 55 bool TestVBMetaModification(VBMetaVerifyResult expected_result, const VBMetaData& vbmeta, 280 auto vbmeta = LoadVBMetaData("vbmeta.img"); in TEST_F() local 284 vbmeta_images.emplace_back(std::move(vbmeta)); in TEST_F() 321 auto vbmeta = LoadVBMetaData("vbmeta.img"); in TEST_F() local 326 vbmeta_images.emplace_back(std::move(vbmeta)); in TEST_F() 367 VBMetaData vbmeta((uint8_t*)content.data(), content.size(), "boot-vbmeta"); in TEST_F() local 368 EXPECT_EQ(content.size(), vbmeta.size()); in TEST_F() 371 auto vbmeta_header = vbmeta.GetVBMetaHeader(false /* update_vbmeta_size */); in TEST_F() 482 auto vbmeta = GenerateImageAndExtractVBMetaData("system", image_size, partition_size, in TEST_F() local 488 VerifyVBMetaSignature(vbmeta, expected_public_key_blob, in TEST_F() [all …]
|
D | fs_avb_device_test.cpp | 47 std::unique_ptr<VBMetaData> vbmeta = in TEST() local 51 EXPECT_NE(nullptr, vbmeta); in TEST()
|
/system/core/fs_mgr/libfs_avb/ |
D | avb_util.cpp | 41 for (const auto& vbmeta : vbmeta_images) { in GetAvbPropertyDescriptor() local 42 const char* value = avb_property_lookup(vbmeta.data(), vbmeta.size(), key.data(), in GetAvbPropertyDescriptor() 133 for (const auto& vbmeta : vbmeta_images) { in GetHashDescriptor() local 136 avb_descriptor_get_all(vbmeta.data(), vbmeta.size(), &num_descriptors), avb_free); in GetHashDescriptor() 191 for (const auto& vbmeta : vbmeta_images) { in GetHashtreeDescriptor() local 194 avb_descriptor_get_all(vbmeta.data(), vbmeta.size(), &num_descriptors), avb_free); in GetHashtreeDescriptor() 395 VBMetaVerifyResult VerifyVBMetaSignature(const VBMetaData& vbmeta, in VerifyVBMetaSignature() argument 402 vbmeta_ret = avb_vbmeta_image_verify(vbmeta.data(), vbmeta.size(), &pk_data, &pk_len); in VerifyVBMetaSignature() 414 LERROR << vbmeta.partition() in VerifyVBMetaSignature() 419 LERROR << vbmeta.partition() << ": Error verifying vbmeta image: public key used to" in VerifyVBMetaSignature() [all …]
|
D | fs_avb_util.cpp | 69 const std::string& avb_partition_name, VBMetaData&& vbmeta) { in GetHashtreeDescriptor() argument 70 if (!vbmeta.size()) return nullptr; in GetHashtreeDescriptor() 73 vbmeta_images.emplace_back(std::move(vbmeta)); in GetHashtreeDescriptor() 79 VBMetaData&& vbmeta) { in GetHashDescriptor() argument 80 if (!vbmeta.size()) return nullptr; in GetHashDescriptor() 83 vbmeta_images.emplace_back(std::move(vbmeta)); in GetHashDescriptor()
|
D | fs_avb.cpp | 57 for (const auto& vbmeta : vbmeta_images) { in VerifyVbmetaDigest() local 58 hasher.update(vbmeta.data(), vbmeta.size()); in VerifyVbmetaDigest() 59 total_size += vbmeta.size(); in VerifyVbmetaDigest() 73 for (const auto& vbmeta : vbmeta_images) { in CalculateVbmetaDigest() local 74 hasher.update(vbmeta.data(), vbmeta.size()); in CalculateVbmetaDigest() 75 total_size += vbmeta.size(); in CalculateVbmetaDigest() 297 std::unique_ptr<VBMetaData> vbmeta = LoadAndVerifyVbmetaByPath( in LoadAndVerifyVbmeta() local 303 if (!vbmeta) { in LoadAndVerifyVbmeta() 313 avb_handle->vbmeta_images_.emplace_back(std::move(*vbmeta)); in LoadAndVerifyVbmeta()
|
D | avb_util.h | 80 VBMetaVerifyResult VerifyVBMetaSignature(const VBMetaData& vbmeta, 93 std::vector<ChainInfo> GetChainPartitionInfo(const VBMetaData& vbmeta, bool* fatal_error);
|
/system/extras/libfec/ |
D | avb_utils.cpp | 24 int parse_vbmeta_from_footer(fec_handle *f, std::vector<uint8_t> *vbmeta) { in parse_vbmeta_from_footer() argument 61 *vbmeta = std::move(vbmeta_data); in parse_vbmeta_from_footer() 65 int parse_avb_image(fec_handle *f, const std::vector<uint8_t> &vbmeta) { in parse_avb_image() argument 83 avb_descriptor_foreach(vbmeta.data(), vbmeta.size(), parse_descriptor, in parse_avb_image() 105 check(hashtree_descriptor.salt_len < vbmeta.size()); in parse_avb_image() 106 check(salt_offset < vbmeta.size() - hashtree_descriptor.salt_len); in parse_avb_image() 107 check(hashtree_descriptor.root_digest_len < vbmeta.size()); in parse_avb_image() 108 check(root_offset < vbmeta.size() - hashtree_descriptor.root_digest_len); in parse_avb_image() 159 .vbmeta = vbmeta, in parse_avb_image()
|
D | avb_utils.h | 27 int parse_vbmeta_from_footer(fec_handle *f, std::vector<uint8_t> *vbmeta); 30 int parse_avb_image(fec_handle *f, const std::vector<uint8_t> &vbmeta);
|
D | fec_open.cpp | 552 std::vector<uint8_t> vbmeta; in fec_open() local 553 if (parse_vbmeta_from_footer(f.get(), &vbmeta) == 0) { in fec_open() 554 if (parse_avb_image(f.get(), vbmeta) != 0) { in fec_open()
|
D | fec_private.h | 129 std::vector<uint8_t> vbmeta; member
|
/system/core/fs_mgr/libfs_avb/include/fs_avb/ |
D | fs_avb_util.h | 44 const std::string& avb_partition_name, VBMetaData&& vbmeta); 48 VBMetaData&& vbmeta);
|
/system/apex/docs/ |
D | README.md | 142 the vbmeta descriptor appended to `apex_payload.img`) file is signed with a key. 148 the vbmeta descriptor is installed. The APEX manager uses the public key to 359 ### vbmeta signing 556 system image that is paired with a hash tree and a vbmeta descriptor. Without
|
/system/libvintf/test/ |
D | LibVintfTest.cpp | 91 void setAvb(RuntimeInfo &ki, Version vbmeta, Version boot) { in setAvb() 92 ki.mBootVbmetaAvbVersion = vbmeta; in setAvb()
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | property_contexts | 173 ro.boot.vbmeta.avb_version u:object_r:exported2_default_prop:s0 exact string
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | property_contexts | 227 ro.boot.vbmeta.avb_version u:object_r:exported2_default_prop:s0 exact string
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | property_contexts | 252 ro.boot.vbmeta.avb_version u:object_r:exported2_default_prop:s0 exact string
|
/system/sepolicy/private/ |
D | property_contexts | 562 ro.boot.vbmeta.avb_version u:object_r:bootloader_prop:s0 exact string
|