/tools/apksig/src/apksigner/java/com/android/apksigner/ |
D | help_rotate.txt | 24 These options specify the configuration of a particular signer. To rotate keys, two signers must be 27 --old-signer The signing information for the signer from which to be rotated. This will 29 addition of the new-signer. If an input SigningCertificateLineage object was 30 provided, this signer must match the leaf descendant so that the existing 33 --new-signer The signing information for the signer to which you want to rotate. This will 34 be the last key in the SigningCertificate object, signed by the old-signer. 37 There are two ways to provide the signer's private key and certificate: (1) Java 43 by a newer signing certificate. By default, the new signer will have all 44 capabilities, but the capability options can be specified for the new signer 75 order of old-signer then new-signer and, within each [all …]
|
D | ApkSignerTool.java | 273 for (SignerParams signer : signers) { in sign() 275 signer.setName("signer #" + signerNumber); in sign() 277 signer.loadPrivateKeyAndCerts(passwordRetriever); in sign() 280 "Failed to load signer \"" + signer.getName() + "\": " in sign() 285 System.err.println("Failed to load signer \"" + signer.getName() + "\""); in sign() 291 if (signer.getV1SigFileBasename() != null) { in sign() 292 v1SigBasename = signer.getV1SigFileBasename(); in sign() 293 } else if (signer.getKeystoreKeyAlias() != null) { in sign() 294 v1SigBasename = signer.getKeystoreKeyAlias(); in sign() 295 } else if (signer.getKeyFile() != null) { in sign() [all …]
|
D | help_sign.txt | 6 signer. For each signer, you need to provide the signer's private key and 41 an appropriate signer on all supported platform versions. 69 entry in the lineage must have a signer provided, so that 74 versions when the newest signer in the lineage is 84 These options specify the configuration of a particular signer. To delimit 85 options of different signers, use --next-signer. 87 --next-signer Delimits options of two different signers. There is no 88 need to use this option when only one signer is used. 90 --v1-signer-name Basename for files comprising the JAR signature scheme 91 (aka v1 scheme) signature of this signer. By default, [all …]
|
D | help_lineage.txt | 28 This option is required for each signer to be modified in the provided SigningCertificateLineage. 30 --signer Indicates the start of a new signing certificate to be modified. 34 To modify the capabilities of a previous signer in the lineage the signer's 36 the signer's private key and certificate: (1) Java KeyStore (see --ks), or 42 by a newer signing certificate. By default, the new signer will have all 43 capabilities, but the capability options can be specified for the new signer 72 order of old-signer then new-signer and, within each 73 signer, KeyStore password is read before the key password 95 order of old-signer then new-signer and, within each 96 signer, KeyStore password is read before the key password [all …]
|
/tools/apksig/src/main/java/com/android/apksig/ |
D | ApkVerifier.java | 307 for (Result.V1SchemeSignerInfo signer : v1Signers) { in verify() 309 v1SignerCerts.add(new ByteArray(signer.getCertificate().getEncoded())); in verify() 312 "Failed to encode JAR signer " + signer.getName() + " certs", e); in verify() 315 for (Result.V2SchemeSignerInfo signer : v2Signers) { in verify() 317 v2SignerCerts.add(new ByteArray(signer.getCertificate().getEncoded())); in verify() 321 + signer.getIndex() + ") certs", in verify() 638 for (V1SchemeVerifier.Result.SignerInfo signer : source.signers) { in mergeFrom() 639 mV1SchemeSigners.add(new V1SchemeSignerInfo(signer)); in mergeFrom() 641 for (V1SchemeVerifier.Result.SignerInfo signer : source.ignoredSigners) { in mergeFrom() 642 mV1SchemeIgnoredSigners.add(new V1SchemeSignerInfo(signer)); in mergeFrom() [all …]
|
D | SigningCertificateLineage.java | 213 ByteBuffer signer = getLengthPrefixedSlice(signers); in readFromApkDataSource() local 214 ByteBuffer signedData = getLengthPrefixedSlice(signer); in readFromApkDataSource()
|
/tools/apksig/src/main/java/com/android/apksig/internal/apk/v1/ |
D | V1SchemeVerifier.java | 299 Signer signer = new Signer(signerName, sigBlockEntry, sigFileEntry, signerInfo); in verify() local 300 signers.add(signer); in verify() 310 for (Signer signer : signers) { in verify() 311 signer.verifySigBlockAgainstSigFile( in verify() 313 if (signer.getResult().containsErrors()) { in verify() 314 result.signers.add(signer.getResult()); in verify() 326 for (Signer signer : signers) { in verify() 327 signer.verifySigFileAgainstManifest( in verify() 335 if (signer.isIgnored()) { in verify() 336 result.ignoredSigners.add(signer.getResult()); in verify() [all …]
|
/tools/apksig/src/test/java/com/android/apksig/ |
D | ApkVerifierTest.java | 672 ApkVerifier.Result.V1SchemeSignerInfo signer = signers.get(0); in testV1SchemeSignatureCertNotReencoded() local 673 for (IssueWithParams issue : signer.getErrors()) { in testV1SchemeSignatureCertNotReencoded() 1074 for (ApkVerifier.Result.V1SchemeSignerInfo signer : result.getV1SchemeSigners()) { in assertVerified() 1075 String signerName = signer.getName(); in assertVerified() 1076 for (IssueWithParams issue : signer.getErrors()) { in assertVerified() 1084 for (ApkVerifier.Result.V2SchemeSignerInfo signer : result.getV2SchemeSigners()) { in assertVerified() 1085 String signerName = "signer #" + (signer.getIndex() + 1); in assertVerified() 1086 for (IssueWithParams issue : signer.getErrors()) { in assertVerified() 1124 for (ApkVerifier.Result.V1SchemeSignerInfo signer : result.getV1SchemeSigners()) { in assertVerificationFailure() 1125 String signerName = signer.getName(); in assertVerificationFailure() [all …]
|
D | ApkSignerTest.java | 877 ByteBuffer signer = ApkSigningBlockUtils.getLengthPrefixedSlice(signers); in getRSAPublicKeyFromSigningBlock() local 880 ApkSigningBlockUtils.getLengthPrefixedSlice(signer); in getRSAPublicKeyFromSigningBlock() 883 signer.getInt(); in getRSAPublicKeyFromSigningBlock() 884 signer.getInt(); in getRSAPublicKeyFromSigningBlock() 886 ApkSigningBlockUtils.getLengthPrefixedSlice(signer); in getRSAPublicKeyFromSigningBlock() 887 ByteBuffer publicKey = ApkSigningBlockUtils.getLengthPrefixedSlice(signer); in getRSAPublicKeyFromSigningBlock()
|
D | SigningCertificateLineageTest.java | 517 for (SignerConfig signer : signers) { in assertLineageContainsExpectedSigners() 518 assertTrue("The signer " + signer.getCertificate().getSubjectDN() in assertLineageContainsExpectedSigners() 519 + " is expected to be in the lineage", lineage.isSignerInLineage(signer)); in assertLineageContainsExpectedSigners()
|
/tools/apksig/src/main/java/com/android/apksig/internal/apk/v3/ |
D | V3SchemeSigner.java | 209 V3SignatureSchemeBlock.Signer signer = new V3SignatureSchemeBlock.Signer(); in generateSignerBlock() local 211 signer.signedData = encodeSignedData(signedData); in generateSignerBlock() 213 signer.minSdkVersion = signerConfig.minSdkVersion; in generateSignerBlock() 214 signer.maxSdkVersion = signerConfig.maxSdkVersion; in generateSignerBlock() 215 signer.publicKey = encodedPublicKey; in generateSignerBlock() 216 signer.signatures = in generateSignerBlock() 217 ApkSigningBlockUtils.generateSignaturesOverData(signerConfig, signer.signedData); in generateSignerBlock() 220 return encodeSigner(signer); in generateSignerBlock() 223 private static byte[] encodeSigner(V3SignatureSchemeBlock.Signer signer) { in encodeSigner() argument 224 byte[] signedData = encodeAsLengthPrefixedElement(signer.signedData); in encodeSigner() [all …]
|
D | V3SchemeVerifier.java | 165 for (ApkSigningBlockUtils.Result.SignerInfo signer : result.signers) { in verify() 166 sortedSigners.put(signer.minSdkVersion, signer); in verify() 177 for (ApkSigningBlockUtils.Result.SignerInfo signer : sortedSigners.values()) { in verify() 178 int currentMin = signer.minSdkVersion; in verify() 179 int currentMax = signer.maxSdkVersion; in verify() 192 if (signer.signingCertificateLineage != null) { in verify() 193 int currLineageSize = signer.signingCertificateLineage.size(); in verify() 199 lineages.add(signer.signingCertificateLineage); in verify() 262 ByteBuffer signer = getLengthPrefixedSlice(signers); in parseSigners() local 263 parseSigner(signer, certFactory, signerInfo, contentDigestsToVerify); in parseSigners()
|
/tools/apksig/src/main/java/com/android/apksig/internal/apk/v2/ |
D | V2SchemeSigner.java | 222 V2SignatureSchemeBlock.Signer signer = new V2SignatureSchemeBlock.Signer(); in generateSignerBlock() local 233 signer.signedData = encodeAsSequenceOfLengthPrefixedElements(new byte[][] { in generateSignerBlock() 239 signer.publicKey = encodedPublicKey; in generateSignerBlock() 240 signer.signatures = new ArrayList<>(); in generateSignerBlock() 241 signer.signatures = in generateSignerBlock() 242 ApkSigningBlockUtils.generateSignaturesOverData(signerConfig, signer.signedData); in generateSignerBlock() 252 signer.signedData, in generateSignerBlock() 254 signer.signatures), in generateSignerBlock() 255 signer.publicKey, in generateSignerBlock()
|
D | V2SchemeVerifier.java | 213 ByteBuffer signer = ApkSigningBlockUtils.getLengthPrefixedSlice(signers); in parseSigners() local 215 signer, in parseSigners()
|
/tools/apkzlib/src/main/java/com/android/tools/build/apkzlib/sign/ |
D | SigningExtension.java | 101 private final ApkSignerEngine signer; field in SigningExtension 143 signer = in SigningExtension() 253 signer.outputJarEntry(entryName); in onZipEntryOutput() 264 signer.outputJarEntryRemoved(entryName); in onZipEntryRemovedFromOutput() 295 addV1SignatureRequest = signer.outputJarEntries(); in onOutputZipReadyForUpdate() 356 addV2SignatureRequest = signer.outputZipSections(zipEntries, centralDir, eocd); in onOutputZipEntriesWritten() 384 signer.outputDone(); in onOutputClosed()
|
/tools/apkzlib/src/test/java/com/android/tools/build/apkzlib/sign/ |
D | SignatureTestUtils.java | 123 ContentSigner signer = new JcaContentSignerBuilder(full).setProvider( in generateSignature() local 125 X509CertificateHolder holder = builder.build(signer); in generateSignature()
|
/tools/apksig/src/main/java/com/android/apksig/internal/apk/ |
D | ApkSigningBlockUtils.java | 1280 for (SignerInfo signer : signers) { in containsErrors() 1281 if (signer.containsErrors()) { in containsErrors()
|