Home
last modified time | relevance | path

Searched refs:digests (Results 1 – 25 of 49) sorted by relevance

12

/aosp12/system/security/ondevice-signing/
H A Dodsign_main.cpp141 std::map<std::string, std::string> digests; in computeDigests() local
152 digests[it->path()] = toHex(*digest); in computeDigests()
160 return digests; in computeDigests()
165 for (const auto& path_digest : digests) { in verifyDigests()
177 if (digests.size() > 0) { in verifyDigests()
262 google::protobuf::Map<std::string, std::string> proto_hashes(digests.begin(), digests.end()); in persistDigests()
424 Result<std::map<std::string, std::string>> digests; in main() local
430 digests = computeDigests(kArtArtifactsDir); in main()
432 if (!digests.ok()) { in main()
433 LOG(ERROR) << digests.error().message(); in main()
[all …]
H A DVerityUtils.cpp202 std::map<std::string, std::string> digests; in addFilesToVerityRecursive() local
217 digests[it->path()] = *result; in addFilesToVerityRecursive()
220 digests[it->path()] = *digest; in addFilesToVerityRecursive()
229 return digests; in addFilesToVerityRecursive()
233 std::map<std::string, std::string> digests; in verifyAllFilesInVerity() local
246 digests[it->path()] = *result; in verifyAllFilesInVerity()
260 return digests; in verifyAllFilesInVerity()
/aosp12/frameworks/base/core/tests/coretests/src/android/content/pm/
H A DSigningDetailsTest.java836 Set<String> digests = createDigestSet(FIRST_SIGNATURE); in hasAncestorOrSelfWithDigest_unknownDetails_returnsFalse() local
838 assertFalse(details.hasAncestorOrSelfWithDigest(digests)); in hasAncestorOrSelfWithDigest_unknownDetails_returnsFalse()
848 assertTrue(details.hasAncestorOrSelfWithDigest(digests)); in hasAncestorOrSelfWithDigest_singleSignerInSet_returnsTrue()
868 assertTrue(details.hasAncestorOrSelfWithDigest(digests)); in hasAncestorOrSelfWithDigest_multipleSignersInSet_returnsTrue()
889 Set<String> digests = createDigestSet(FIRST_SIGNATURE); in hasAncestorOrSelfWithDigest_multipleSignersOneInSet_returnsFalse() local
901 assertTrue(details.hasAncestorOrSelfWithDigest(digests)); in hasAncestorOrSelfWithDigest_lineageSignerInSet_returnsTrue()
922 Set<String> digests = createDigestSet(SECOND_SIGNATURE); in hasAncestorOrSelfWithDigest_lastSignerInLineageInSet_returnsTrue() local
924 assertTrue(details.hasAncestorOrSelfWithDigest(digests)); in hasAncestorOrSelfWithDigest_lastSignerInLineageInSet_returnsTrue()
982 Set<String> digests = new ArraySet<>(); in createDigestSet() local
985 digests.add(digest); in createDigestSet()
[all …]
/aosp12/frameworks/base/core/java/android/util/apk/
H A DSourceStampVerifier.java379 ByteBuffer digests = getLengthPrefixedSlice(signedData); in getApkContentDigestsFromSignatureBlock() local
380 while (digests.hasRemaining()) { in getApkContentDigestsFromSignatureBlock()
381 ByteBuffer digest = getLengthPrefixedSlice(digests); in getApkContentDigestsFromSignatureBlock()
393 Map<Integer, byte[]> digests = new HashMap<>(); in getSignatureSchemeDigests() local
398 digests.put( in getSignatureSchemeDigests()
401 return digests; in getSignatureSchemeDigests()
406 List<Pair<Integer, byte[]>> digests = new ArrayList<>(); in getApkDigests() local
408 digests.add(Pair.create(apkContentDigest.getKey(), apkContentDigest.getValue())); in getApkDigests()
410 digests.sort(Comparator.comparing(pair -> pair.first)); in getApkDigests()
411 return digests; in getApkDigests()
H A DApkSignatureSchemeV2Verifier.java293 ByteBuffer digests = getLengthPrefixedSlice(signedData); in verifySigner() local
296 while (digests.hasRemaining()) { in verifySigner()
299 ByteBuffer digest = getLengthPrefixedSlice(digests); in verifySigner()
H A DApkSignatureSchemeV3Verifier.java307 ByteBuffer digests = getLengthPrefixedSlice(signedData); in verifySigner() local
310 while (digests.hasRemaining()) { in verifySigner()
313 ByteBuffer digest = getLengthPrefixedSlice(digests); in verifySigner()
/aosp12/frameworks/base/services/core/java/com/android/server/net/watchlist/
H A DHarmfulDigests.java36 HarmfulDigests(List<byte[]> digests) { in HarmfulDigests() argument
38 final int size = digests.size(); in HarmfulDigests()
40 tmpDigestSet.add(HexDump.toHexString(digests.get(i))); in HarmfulDigests()
H A DHarmfulCrcs.java36 HarmfulCrcs(List<byte[]> digests) { in HarmfulCrcs() argument
38 final int size = digests.size(); in HarmfulCrcs()
40 byte[] bytes = digests.get(i); in HarmfulCrcs()
/aosp12/frameworks/base/core/java/android/content/pm/
H A DInstantAppResolveInfo.java287 ArrayList<byte[]> digests = new ArrayList<>(); in generateDigest() local
292 digests.add(digest.digest(hostBytes)); in generateDigest()
298 digests.add(digest.digest(hostName.getBytes())); in generateDigest()
302 digests.add(digest.digest(hostBytes)); in generateDigest()
308 digests.add(digest.digest(hostBytes)); in generateDigest()
316 return digests.toArray(new byte[digests.size()][]); in generateDigest()
/aosp12/frameworks/base/keystore/java/android/security/keystore/
H A DKeyProperties.java701 public static @DigestEnum String[] allFromKeymaster(@NonNull Collection<Integer> digests) { in allFromKeymaster() argument
702 if (digests.isEmpty()) { in allFromKeymaster()
705 String[] result = new String[digests.size()]; in allFromKeymaster()
707 for (int digest : digests) { in allFromKeymaster()
715 public static int[] allToKeymaster(@Nullable @DigestEnum String[] digests) { in allToKeymaster() argument
716 if ((digests == null) || (digests.length == 0)) { in allToKeymaster()
719 int[] result = new int[digests.length]; in allToKeymaster()
721 for (@DigestEnum String digest : digests) { in allToKeymaster()
H A DKeyProtection.java248 @KeyProperties.DigestEnum String[] digests, in KeyProtection() argument
271 mDigests = ArrayUtils.cloneIfNotEmpty(digests); in KeyProtection()
721 public Builder setDigests(@KeyProperties.DigestEnum String... digests) { in setDigests() argument
722 mDigests = ArrayUtils.cloneIfNotEmpty(digests); in setDigests()
H A DKeyInfo.java103 @KeyProperties.DigestEnum String[] digests, in KeyInfo() argument
127 mDigests = ArrayUtils.cloneIfNotEmpty(ArrayUtils.nullToEmpty(digests)); in KeyInfo()
H A DKeyGenParameterSpec.java345 @KeyProperties.DigestEnum String[] digests, in KeyGenParameterSpec() argument
403 mDigests = ArrayUtils.cloneIfNotEmpty(digests); in KeyGenParameterSpec()
1211 public Builder setDigests(@KeyProperties.DigestEnum String... digests) { in setDigests() argument
1212 mDigests = ArrayUtils.cloneIfNotEmpty(digests); in setDigests()
H A DParcelableKeyGenParameterSpec.java154 final String[] digests = in.createStringArray(); in ParcelableKeyGenParameterSpec() local
191 digests, in ParcelableKeyGenParameterSpec()
/aosp12/frameworks/base/core/java/android/util/
H A DPackageUtils.java61 final String[] digests = new String[signatureCount]; in computeSignaturesSha256Digests() local
63 digests[i] = computeSha256Digest(signatures[i].toByteArray(), separator); in computeSignaturesSha256Digests()
65 return digests; in computeSignaturesSha256Digests()
/aosp12/hardware/interfaces/security/keymint/support/
H A Dauthorization_set.cpp227 AuthorizationSetBuilder& AuthorizationSetBuilder::Digest(std::vector<keymint::Digest> digests) { in Digest() argument
228 for (auto digest : digests) { in Digest()
235 const std::vector<android::hardware::security::keymint::Digest>& digests) { in OaepMGFDigest() argument
236 for (auto digest : digests) { in OaepMGFDigest()
/aosp12/system/keymaster/legacy_support/
H A Dkeymaster1_legacy_support.cpp62 keymaster_digest_t* digests; in add_digests() local
65 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length); in add_digests()
70 std::unique_ptr<keymaster_digest_t, Malloc_Delete> digests_deleter(digests); in add_digests()
72 auto digest_vec = make_vector(digests, digests_length); in add_digests()
/aosp12/frameworks/base/services/core/java/com/android/server/pm/
H A DApkChecksums.java437 final Checksum[] digests = readChecksums(digestsFile); in getInstallerChecksums() local
442 final Certificate[] certificates = verifySignature(digests, in getInstallerChecksums()
491 for (Checksum digest : digests) { in getInstallerChecksums()
500 for (Checksum digest : digests) { in getInstallerChecksums()
797 byte[][] digests = ApkSigningBlockUtils.computeContentDigestsPer1MbChunk(digestAlgos, in calculatePartialChecksumsIfRequested()
802 checksums.put(checksumKind, new ApkChecksum(split, checksumKind, digests[i])); in calculatePartialChecksumsIfRequested()
/aosp12/system/security/keystore2/src/crypto/tests/
H A Dcertificate_utils_test.cpp74 std::array<Digest, 5> digests = { variable
144 testing::Combine(testing::ValuesIn(ec_curves), testing::ValuesIn(digests)),
237 testing::ValuesIn(digests)),
/aosp12/system/keymaster/contexts/
H A Dsoft_keymaster_device.cpp114 keymaster_digest_t* digests; in add_digests() local
117 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length); in add_digests()
122 std::unique_ptr<keymaster_digest_t, Malloc_Delete> digests_deleter(digests); in add_digests()
124 auto digest_vec = make_vector(digests, digests_length); in add_digests()
472 keymaster_digest_t** digests, in get_supported_digests() argument
476 if (!digests || !digests_length) return KM_ERROR_OUTPUT_PARAMETER_NULL; in get_supported_digests()
480 return km1_dev->get_supported_digests(km1_dev, algorithm, purpose, digests, digests_length); in get_supported_digests()
495 *digests = reinterpret_cast<keymaster_digest_t*>(malloc(*digests_length * sizeof(**digests))); in get_supported_digests()
496 if (!*digests) return KM_ERROR_MEMORY_ALLOCATION_FAILED; in get_supported_digests()
497 std::copy(response.results, response.results + response.results_length, *digests); in get_supported_digests()
/aosp12/hardware/interfaces/keymaster/3.0/vts/functional/
H A Dauthorization_set.h291 AuthorizationSetBuilder& Digest(std::initializer_list<Digest> digests);
405 AuthorizationSetBuilder::Digest(std::initializer_list<V3_0::Digest> digests) { in Digest() argument
406 for (auto digest : digests) { in Digest()
/aosp12/system/keymaster/tests/
H A Dandroid_keymaster_test_utils.cpp829 keymaster_digest_t** digests, in get_supported_digests() argument
832 unwrap(dev), algorithm, purpose, digests, digests_length); in get_supported_digests()
836 std::copy_if(*digests, *digests + *digests_length, std::back_inserter(filtered_digests), in get_supported_digests()
839 free(*digests); in get_supported_digests()
841 *digests = reinterpret_cast<keymaster_digest_t*>( in get_supported_digests()
843 std::copy(filtered_digests.begin(), filtered_digests.end(), *digests); in get_supported_digests()
/aosp12/frameworks/base/keystore/java/android/security/keystore2/
H A DAndroidKeyStoreSecretKeyFactorySpi.java230 String[] digests = digestsList.toArray(new String[0]); in getKeyInfo() local
251 digests, in getKeyInfo()
/aosp12/packages/modules/IPsec/src/java/com/android/internal/net/eap/crypto/
H A DFips186_2Prf.java21 import org.bouncycastle.crypto.digests.SHA1Digest;
/aosp12/hardware/libhardware/modules/sensors/dynamic_sensor/HidUtils/
H A DHidParser.cpp285 std::ostream& operator<<(std::ostream &os, const HidParser::DigestVector &digests) { in operator <<() argument
286 for (const auto &i : digests) { in operator <<()

12