/aosp14/frameworks/base/core/java/android/view/textclassifier/ |
H A D | SelectionSessionLogger.java | 32 static boolean isPlatformLocalTextClassifierSmartSelection(String signature) { in isPlatformLocalTextClassifierSmartSelection() argument 34 SelectionSessionLogger.SignatureParser.getClassifierId(signature)); in isPlatformLocalTextClassifierSmartSelection() 44 static String getClassifierId(@Nullable String signature) { in getClassifierId() argument 45 if (signature == null) { in getClassifierId() 48 final int end = signature.indexOf("|"); in getClassifierId() 50 return signature.substring(0, end); in getClassifierId()
|
/aosp14/frameworks/base/core/java/com/android/internal/os/ |
H A D | StatsdHiddenApiUsageLogger.java | 44 public void hiddenApiUsed(int sampledValue, String packageName, String signature, in hiddenApiUsed() argument 47 logUsage(packageName, signature, accessMethod, accessDenied); in hiddenApiUsed() 51 newLogUsage(signature, accessMethod, accessDenied); in hiddenApiUsed() 55 private void logUsage(String packageName, String signature, int accessMethod, in logUsage() argument 75 .addTaggedData(MetricsEvent.FIELD_HIDDEN_API_SIGNATURE, signature) in logUsage() 86 private void newLogUsage(String signature, int accessMethod, boolean accessDenied) { in newLogUsage() argument 104 FrameworkStatsLog.write(FrameworkStatsLog.HIDDEN_API_USED, uid, signature, in newLogUsage()
|
/aosp14/frameworks/base/services/tests/PackageManagerServiceTests/server/src/com/android/server/pm/ |
H A D | PackageSignaturesTest.java | 360 for (Signature signature : signatures) { in testReadXmlWithPastSignerWithNoCapabilities() 361 String signatureValue = HexDump.toHexString(signature.toByteArray(), false); in testReadXmlWithPastSignerWithNoCapabilities() 363 previousSignature = signature; in testReadXmlWithPastSignerWithNoCapabilities() 405 for (Signature signature : signatures) { in verifyReadXmlReturnsExpectedSignaturesAndLineage() 406 String signatureValue = HexDump.toHexString(signature.toByteArray(), false); in verifyReadXmlReturnsExpectedSignaturesAndLineage() 412 mPackageSetting.getSigningDetails().hasCertificate(signature, in verifyReadXmlReturnsExpectedSignaturesAndLineage() 428 for (Signature signature : signatures) { in verifySignaturesContainExpectedValues() 430 if (signature != null) { in verifySignaturesContainExpectedValues() 431 signatureString = HexDump.toHexString(signature.toByteArray(), false); in verifySignaturesContainExpectedValues() 445 for (String signature : signatures) { in createSetOfSignatures() [all …]
|
/aosp14/frameworks/base/core/java/android/content/pm/ |
H A D | InstallationFile.java | 41 long lengthBytes, @Nullable byte[] metadata, @Nullable byte[] signature) { in InstallationFile() argument 47 mParcel.signature = signature; in InstallationFile() 89 return mParcel.signature; in getSignature()
|
H A D | SigningDetails.java | 318 Signature signature = mPastSigningCertificates[index--]; in mergeLineageWithAncestorOrSelf() local 321 Signature mergedSignature = new Signature(signature); in mergeLineageWithAncestorOrSelf() 322 if (signature.getFlags() != ancestorSignature.getFlags()) { in mergeLineageWithAncestorOrSelf() 423 for (Signature signature : mSignatures) { in hasAncestorOrSelfWithDigest() 425 signature.toByteArray()); in hasAncestorOrSelfWithDigest() 670 public boolean hasCertificate(@NonNull Signature signature) { in hasCertificate() argument 671 return hasCertificateInternal(signature, PAST_CERT_EXISTS); in hasCertificate() 682 return hasCertificateInternal(signature, flags); in hasCertificate() 687 Signature signature = new Signature(certificate); in hasCertificate() local 688 return hasCertificate(signature); in hasCertificate() [all …]
|
/aosp14/frameworks/base/services/core/java/com/android/server/signedconfig/ |
H A D | SignatureVerifier.java | 79 private boolean verifyWithPublicKey(PublicKey key, byte[] data, byte[] signature) in verifyWithPublicKey() argument 84 return verifier.verify(signature); in verifyWithPublicKey() 96 byte[] signature; in verifySignature() 98 signature = Base64.getDecoder().decode(base64Signature); in verifySignature() 111 if (verifyWithPublicKey(mDebugKey, data, signature)) { in verifySignature() 130 if (verifyWithPublicKey(mProdKey, data, signature)) { in verifySignature()
|
H A D | GlobalSettingsConfigApplicator.java | 81 private boolean checkSignature(String data, String signature) { in checkSignature() argument 83 return mVerifier.verifySignature(data, signature); in checkSignature() 108 void applyConfig(String configStr, String signature) { in applyConfig() argument 109 if (!checkSignature(configStr, signature)) { in applyConfig()
|
/aosp14/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/certificate/ |
H A D | SigXml.java | 44 private final byte[] signature; field in SigXml 47 List<X509Certificate> intermediateCerts, X509Certificate signerCert, byte[] signature) { in SigXml() argument 50 this.signature = signature; in SigXml() 75 CertUtils.verifyRsaSha256Signature(signerCert.getPublicKey(), signature, signedFileBytes); in verifyFileSignature() local
|
/aosp14/frameworks/base/core/jni/ |
H A D | android_os_incremental_IncrementalManager.cpp | 51 char signature[INCFS_MAX_SIGNATURE_SIZE]; in nativeUnsafeGetFileSignature() local 52 size_t size = sizeof(signature); in nativeUnsafeGetFileSignature() 53 if (IncFs_UnsafeGetSignatureByPath(path.c_str(), signature, &size) < 0) { in nativeUnsafeGetFileSignature() 59 env->SetByteArrayRegion(result, 0, size, (const jbyte*)signature); in nativeUnsafeGetFileSignature()
|
H A D | android_animation_PropertyValuesHolder.cpp | 54 char *signature = new char[parameterCount + 4]; in getMultiparameterMethod() local 55 signature[0] = '('; in getMultiparameterMethod() 56 memset(&(signature[1]), parameterType, parameterCount); in getMultiparameterMethod() 57 strcpy(&(signature[parameterCount + 1]), ")V"); in getMultiparameterMethod() 58 jmethodID mid = env->GetMethodID(targetClass, nativeString, signature); in getMultiparameterMethod() 59 delete[] signature; in getMultiparameterMethod()
|
/aosp14/frameworks/base/tools/lint/framework/checks/src/main/java/com/google/android/lint/parcel/ |
H A D | SaferParcelChecker.kt | 36 val signature = getSignature(method) regex 37 val migrator = MIGRATORS.firstOrNull { it.method.signature == signature } ?: return 43 val signature = method.getSignature(PsiSubstitutor.EMPTY) regex 45 signature.parameterTypes.joinToString(transform = PsiType::getCanonicalText) 46 val types = signature.typeParameters.map(PsiTypeParameter::getName)
|
/aosp14/frameworks/base/core/java/android/graphics/fonts/ |
H A D | FontFileUpdateRequest.java | 43 @NonNull byte[] signature) { in FontFileUpdateRequest() argument 45 Objects.requireNonNull(signature); in FontFileUpdateRequest() 47 mSignature = signature; in FontFileUpdateRequest()
|
/aosp14/frameworks/base/services/core/java/com/android/server/oemlock/ |
H A D | VendorLockAidl.java | 53 void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { in setOemUnlockAllowedByCarrier() argument 56 if (signature == null) { in setOemUnlockAllowedByCarrier() 59 status = mOemLock.setOemUnlockAllowedByCarrier(allowed, signature); in setOemUnlockAllowedByCarrier() 67 if (signature == null) { in setOemUnlockAllowedByCarrier()
|
/aosp14/frameworks/base/keystore/java/android/security/keystore2/ |
H A D | KeyStoreCryptoOperationChunkedStreamer.java | 79 byte[] finish(byte[] input, byte[] signature) throws KeyStoreException; in finish() argument 178 byte[] signature) throws KeyStoreException { in doFinal() argument 181 byte[] o = mKeyStoreStream.finish(finalChunk, signature); in doFinal() 226 public byte[] finish(byte[] input, byte[] signature) in finish() argument 228 return mOperation.finish(input, signature); in finish()
|
H A D | AndroidKeyStoreSignatureSpiBase.java | 321 byte[] signature; in engineSign() 328 signature = mMessageStreamer.doFinal( in engineSign() 336 return signature; in engineSign() 340 protected final boolean engineVerify(byte[] signature) throws SignatureException { in engineVerify() argument 342 return mSignature.verify(signature); in engineVerify()
|
/aosp14/frameworks/base/services/core/java/com/android/server/backup/ |
H A D | BackupUtils.java | 106 public static byte[] hashSignature(byte[] signature) { in hashSignature() argument 109 digest.update(signature); in hashSignature() 117 public static byte[] hashSignature(Signature signature) { in hashSignature() argument 118 return hashSignature(signature.toByteArray()); in hashSignature()
|
/aosp14/frameworks/base/core/java/android/util/apk/ |
H A D | ApkSignatureSchemeV4Verifier.java | 80 final V4Signature signature = V4Signature.readFrom(signatureBytes); in extractSignature() local 81 if (!signature.isVersionSupported()) { in extractSignature() 83 "v4 signature version " + signature.version + " is not supported"); in extractSignature() 86 signature.hashingInfo); in extractSignature() 88 signature.signingInfos); in extractSignature() 147 final byte[] signatureBytes = signingInfo.signature; in verifySigner()
|
/aosp14/frameworks/base/services/core/java/com/android/server/compat/overrides/ |
H A D | AppCompatOverridesParser.java | 210 final String signature = signatureAndConfig.first; in parsePackageOverrides() local 213 if (!verifySignature(packageName, signature)) { in parsePackageOverrides() 303 private boolean verifySignature(String packageName, String signature) { in verifySignature() argument 305 final boolean signatureValid = signature.isEmpty() in verifySignature() 307 HexEncoding.decode(signature), CERT_INPUT_SHA256); in verifySignature() 310 Slog.w(TAG, packageName + " did not have expected signature: " + signature); in verifySignature() 314 Slog.w(TAG, "Unable to verify signature " + signature + " for " + packageName, e); in verifySignature()
|
/aosp14/system/core/trusty/keymaster/keymint/ |
H A D | TrustyKeyMintOperation.cpp | 115 const optional<vector<uint8_t>>& signature, // in finish() argument 138 if (signature) request.signature.Reinitialize(signature->data(), signature->size()); in finish()
|
/aosp14/frameworks/base/core/java/android/os/incremental/ |
H A D | IncrementalStorage.java | 193 params.signature = v4signatureBytes; in makeFile() 495 final V4Signature signature; in validateV4Signature() local 497 signature = V4Signature.readFrom(v4signatureBytes); in validateV4Signature() 502 if (!signature.isVersionSupported()) { in validateV4Signature() 503 throw new IOException("v4 signature version " + signature.version in validateV4Signature() 508 signature.hashingInfo); in validateV4Signature() 510 signature.signingInfos); in validateV4Signature()
|
H A D | V4Signature.java | 86 public final byte[] signature; field in V4Signature.SigningInfo 89 byte[] publicKey, int signatureAlgorithmId, byte[] signature) { in SigningInfo() argument 95 this.signature = signature; in SigningInfo() 114 byte[] signature = readBytes(buffer); in fromByteBuffer() 116 signatureAlgorithmId, signature); in fromByteBuffer()
|
/aosp14/frameworks/base/tests/Camera2Tests/SmartCamera/SimpleCamera/tests/src/androidx/media/filterfw/ |
H A D | MffFilterTestCase.java | 138 Signature signature = filter.getSignature(); in connectInputPorts() local 139 for (Entry<String, PortInfo> inputPortEntry : signature.getInputPorts().entrySet()) { in connectInputPorts() 148 Signature signature = filter.getSignature(); in connectOutputPorts() local 151 for (Entry<String, PortInfo> outputPortEntry : signature.getOutputPorts().entrySet()) { in connectOutputPorts()
|
/aosp14/frameworks/base/tools/traceinjection/src/com/android/traceinjection/ |
H A D | TraceInjectionClassVisitor.java | 36 public MethodVisitor visitMethod(int access, String name, String desc, String signature, in visitMethod() argument 38 MethodVisitor chain = super.visitMethod(access, name, desc, signature, exceptions); in visitMethod()
|
/aosp14/frameworks/base/tools/aapt2/java/ |
H A D | ProguardRules.h | 44 std::string signature; member 121 return lhs.signature < rhs.signature;
|
/aosp14/frameworks/base/tools/sdkparcelables/src/com/android/sdkparcelables/ |
H A D | AncestorCollector.kt | 33 override fun visit(version: Int, access: Int, name: String?, signature: String?, 42 super.visit(version, access, name, signature, superName, interfaces)
|