Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 25 of 119) sorted by relevance

12345

/aosp14/frameworks/base/core/java/android/view/textclassifier/
H A DSelectionSessionLogger.java32 static boolean isPlatformLocalTextClassifierSmartSelection(String signature) { in isPlatformLocalTextClassifierSmartSelection() argument
34 SelectionSessionLogger.SignatureParser.getClassifierId(signature)); in isPlatformLocalTextClassifierSmartSelection()
44 static String getClassifierId(@Nullable String signature) { in getClassifierId() argument
45 if (signature == null) { in getClassifierId()
48 final int end = signature.indexOf("|"); in getClassifierId()
50 return signature.substring(0, end); in getClassifierId()
/aosp14/frameworks/base/core/java/com/android/internal/os/
H A DStatsdHiddenApiUsageLogger.java44 public void hiddenApiUsed(int sampledValue, String packageName, String signature, in hiddenApiUsed() argument
47 logUsage(packageName, signature, accessMethod, accessDenied); in hiddenApiUsed()
51 newLogUsage(signature, accessMethod, accessDenied); in hiddenApiUsed()
55 private void logUsage(String packageName, String signature, int accessMethod, in logUsage() argument
75 .addTaggedData(MetricsEvent.FIELD_HIDDEN_API_SIGNATURE, signature) in logUsage()
86 private void newLogUsage(String signature, int accessMethod, boolean accessDenied) { in newLogUsage() argument
104 FrameworkStatsLog.write(FrameworkStatsLog.HIDDEN_API_USED, uid, signature, in newLogUsage()
/aosp14/frameworks/base/services/tests/PackageManagerServiceTests/server/src/com/android/server/pm/
H A DPackageSignaturesTest.java360 for (Signature signature : signatures) { in testReadXmlWithPastSignerWithNoCapabilities()
361 String signatureValue = HexDump.toHexString(signature.toByteArray(), false); in testReadXmlWithPastSignerWithNoCapabilities()
363 previousSignature = signature; in testReadXmlWithPastSignerWithNoCapabilities()
405 for (Signature signature : signatures) { in verifyReadXmlReturnsExpectedSignaturesAndLineage()
406 String signatureValue = HexDump.toHexString(signature.toByteArray(), false); in verifyReadXmlReturnsExpectedSignaturesAndLineage()
412 mPackageSetting.getSigningDetails().hasCertificate(signature, in verifyReadXmlReturnsExpectedSignaturesAndLineage()
428 for (Signature signature : signatures) { in verifySignaturesContainExpectedValues()
430 if (signature != null) { in verifySignaturesContainExpectedValues()
431 signatureString = HexDump.toHexString(signature.toByteArray(), false); in verifySignaturesContainExpectedValues()
445 for (String signature : signatures) { in createSetOfSignatures()
[all …]
/aosp14/frameworks/base/core/java/android/content/pm/
H A DInstallationFile.java41 long lengthBytes, @Nullable byte[] metadata, @Nullable byte[] signature) { in InstallationFile() argument
47 mParcel.signature = signature; in InstallationFile()
89 return mParcel.signature; in getSignature()
H A DSigningDetails.java318 Signature signature = mPastSigningCertificates[index--]; in mergeLineageWithAncestorOrSelf() local
321 Signature mergedSignature = new Signature(signature); in mergeLineageWithAncestorOrSelf()
322 if (signature.getFlags() != ancestorSignature.getFlags()) { in mergeLineageWithAncestorOrSelf()
423 for (Signature signature : mSignatures) { in hasAncestorOrSelfWithDigest()
425 signature.toByteArray()); in hasAncestorOrSelfWithDigest()
670 public boolean hasCertificate(@NonNull Signature signature) { in hasCertificate() argument
671 return hasCertificateInternal(signature, PAST_CERT_EXISTS); in hasCertificate()
682 return hasCertificateInternal(signature, flags); in hasCertificate()
687 Signature signature = new Signature(certificate); in hasCertificate() local
688 return hasCertificate(signature); in hasCertificate()
[all …]
/aosp14/frameworks/base/services/core/java/com/android/server/signedconfig/
H A DSignatureVerifier.java79 private boolean verifyWithPublicKey(PublicKey key, byte[] data, byte[] signature) in verifyWithPublicKey() argument
84 return verifier.verify(signature); in verifyWithPublicKey()
96 byte[] signature; in verifySignature()
98 signature = Base64.getDecoder().decode(base64Signature); in verifySignature()
111 if (verifyWithPublicKey(mDebugKey, data, signature)) { in verifySignature()
130 if (verifyWithPublicKey(mProdKey, data, signature)) { in verifySignature()
H A DGlobalSettingsConfigApplicator.java81 private boolean checkSignature(String data, String signature) { in checkSignature() argument
83 return mVerifier.verifySignature(data, signature); in checkSignature()
108 void applyConfig(String configStr, String signature) { in applyConfig() argument
109 if (!checkSignature(configStr, signature)) { in applyConfig()
/aosp14/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/certificate/
H A DSigXml.java44 private final byte[] signature; field in SigXml
47 List<X509Certificate> intermediateCerts, X509Certificate signerCert, byte[] signature) { in SigXml() argument
50 this.signature = signature; in SigXml()
75 CertUtils.verifyRsaSha256Signature(signerCert.getPublicKey(), signature, signedFileBytes); in verifyFileSignature() local
/aosp14/frameworks/base/core/jni/
H A Dandroid_os_incremental_IncrementalManager.cpp51 char signature[INCFS_MAX_SIGNATURE_SIZE]; in nativeUnsafeGetFileSignature() local
52 size_t size = sizeof(signature); in nativeUnsafeGetFileSignature()
53 if (IncFs_UnsafeGetSignatureByPath(path.c_str(), signature, &size) < 0) { in nativeUnsafeGetFileSignature()
59 env->SetByteArrayRegion(result, 0, size, (const jbyte*)signature); in nativeUnsafeGetFileSignature()
H A Dandroid_animation_PropertyValuesHolder.cpp54 char *signature = new char[parameterCount + 4]; in getMultiparameterMethod() local
55 signature[0] = '('; in getMultiparameterMethod()
56 memset(&(signature[1]), parameterType, parameterCount); in getMultiparameterMethod()
57 strcpy(&(signature[parameterCount + 1]), ")V"); in getMultiparameterMethod()
58 jmethodID mid = env->GetMethodID(targetClass, nativeString, signature); in getMultiparameterMethod()
59 delete[] signature; in getMultiparameterMethod()
/aosp14/frameworks/base/tools/lint/framework/checks/src/main/java/com/google/android/lint/parcel/
H A DSaferParcelChecker.kt36 val signature = getSignature(method) regex
37 val migrator = MIGRATORS.firstOrNull { it.method.signature == signature } ?: return
43 val signature = method.getSignature(PsiSubstitutor.EMPTY) regex
45 signature.parameterTypes.joinToString(transform = PsiType::getCanonicalText)
46 val types = signature.typeParameters.map(PsiTypeParameter::getName)
/aosp14/frameworks/base/core/java/android/graphics/fonts/
H A DFontFileUpdateRequest.java43 @NonNull byte[] signature) { in FontFileUpdateRequest() argument
45 Objects.requireNonNull(signature); in FontFileUpdateRequest()
47 mSignature = signature; in FontFileUpdateRequest()
/aosp14/frameworks/base/services/core/java/com/android/server/oemlock/
H A DVendorLockAidl.java53 void setOemUnlockAllowedByCarrier(boolean allowed, @Nullable byte[] signature) { in setOemUnlockAllowedByCarrier() argument
56 if (signature == null) { in setOemUnlockAllowedByCarrier()
59 status = mOemLock.setOemUnlockAllowedByCarrier(allowed, signature); in setOemUnlockAllowedByCarrier()
67 if (signature == null) { in setOemUnlockAllowedByCarrier()
/aosp14/frameworks/base/keystore/java/android/security/keystore2/
H A DKeyStoreCryptoOperationChunkedStreamer.java79 byte[] finish(byte[] input, byte[] signature) throws KeyStoreException; in finish() argument
178 byte[] signature) throws KeyStoreException { in doFinal() argument
181 byte[] o = mKeyStoreStream.finish(finalChunk, signature); in doFinal()
226 public byte[] finish(byte[] input, byte[] signature) in finish() argument
228 return mOperation.finish(input, signature); in finish()
H A DAndroidKeyStoreSignatureSpiBase.java321 byte[] signature; in engineSign()
328 signature = mMessageStreamer.doFinal( in engineSign()
336 return signature; in engineSign()
340 protected final boolean engineVerify(byte[] signature) throws SignatureException { in engineVerify() argument
342 return mSignature.verify(signature); in engineVerify()
/aosp14/frameworks/base/services/core/java/com/android/server/backup/
H A DBackupUtils.java106 public static byte[] hashSignature(byte[] signature) { in hashSignature() argument
109 digest.update(signature); in hashSignature()
117 public static byte[] hashSignature(Signature signature) { in hashSignature() argument
118 return hashSignature(signature.toByteArray()); in hashSignature()
/aosp14/frameworks/base/core/java/android/util/apk/
H A DApkSignatureSchemeV4Verifier.java80 final V4Signature signature = V4Signature.readFrom(signatureBytes); in extractSignature() local
81 if (!signature.isVersionSupported()) { in extractSignature()
83 "v4 signature version " + signature.version + " is not supported"); in extractSignature()
86 signature.hashingInfo); in extractSignature()
88 signature.signingInfos); in extractSignature()
147 final byte[] signatureBytes = signingInfo.signature; in verifySigner()
/aosp14/frameworks/base/services/core/java/com/android/server/compat/overrides/
H A DAppCompatOverridesParser.java210 final String signature = signatureAndConfig.first; in parsePackageOverrides() local
213 if (!verifySignature(packageName, signature)) { in parsePackageOverrides()
303 private boolean verifySignature(String packageName, String signature) { in verifySignature() argument
305 final boolean signatureValid = signature.isEmpty() in verifySignature()
307 HexEncoding.decode(signature), CERT_INPUT_SHA256); in verifySignature()
310 Slog.w(TAG, packageName + " did not have expected signature: " + signature); in verifySignature()
314 Slog.w(TAG, "Unable to verify signature " + signature + " for " + packageName, e); in verifySignature()
/aosp14/system/core/trusty/keymaster/keymint/
H A DTrustyKeyMintOperation.cpp115 const optional<vector<uint8_t>>& signature, // in finish() argument
138 if (signature) request.signature.Reinitialize(signature->data(), signature->size()); in finish()
/aosp14/frameworks/base/core/java/android/os/incremental/
H A DIncrementalStorage.java193 params.signature = v4signatureBytes; in makeFile()
495 final V4Signature signature; in validateV4Signature() local
497 signature = V4Signature.readFrom(v4signatureBytes); in validateV4Signature()
502 if (!signature.isVersionSupported()) { in validateV4Signature()
503 throw new IOException("v4 signature version " + signature.version in validateV4Signature()
508 signature.hashingInfo); in validateV4Signature()
510 signature.signingInfos); in validateV4Signature()
H A DV4Signature.java86 public final byte[] signature; field in V4Signature.SigningInfo
89 byte[] publicKey, int signatureAlgorithmId, byte[] signature) { in SigningInfo() argument
95 this.signature = signature; in SigningInfo()
114 byte[] signature = readBytes(buffer); in fromByteBuffer()
116 signatureAlgorithmId, signature); in fromByteBuffer()
/aosp14/frameworks/base/tests/Camera2Tests/SmartCamera/SimpleCamera/tests/src/androidx/media/filterfw/
H A DMffFilterTestCase.java138 Signature signature = filter.getSignature(); in connectInputPorts() local
139 for (Entry<String, PortInfo> inputPortEntry : signature.getInputPorts().entrySet()) { in connectInputPorts()
148 Signature signature = filter.getSignature(); in connectOutputPorts() local
151 for (Entry<String, PortInfo> outputPortEntry : signature.getOutputPorts().entrySet()) { in connectOutputPorts()
/aosp14/frameworks/base/tools/traceinjection/src/com/android/traceinjection/
H A DTraceInjectionClassVisitor.java36 public MethodVisitor visitMethod(int access, String name, String desc, String signature, in visitMethod() argument
38 MethodVisitor chain = super.visitMethod(access, name, desc, signature, exceptions); in visitMethod()
/aosp14/frameworks/base/tools/aapt2/java/
H A DProguardRules.h44 std::string signature; member
121 return lhs.signature < rhs.signature;
/aosp14/frameworks/base/tools/sdkparcelables/src/com/android/sdkparcelables/
H A DAncestorCollector.kt33 override fun visit(version: Int, access: Int, name: String?, signature: String?,
42 super.visit(version, access, name, signature, superName, interfaces)

12345