/aosp12/system/security/ondevice-signing/ |
H A D | odsign_main.cpp | 141 std::map<std::string, std::string> digests; in computeDigests() local 152 digests[it->path()] = toHex(*digest); in computeDigests() 160 return digests; in computeDigests() 165 for (const auto& path_digest : digests) { in verifyDigests() 177 if (digests.size() > 0) { in verifyDigests() 262 google::protobuf::Map<std::string, std::string> proto_hashes(digests.begin(), digests.end()); in persistDigests() 424 Result<std::map<std::string, std::string>> digests; in main() local 430 digests = computeDigests(kArtArtifactsDir); in main() 432 if (!digests.ok()) { in main() 433 LOG(ERROR) << digests.error().message(); in main() [all …]
|
H A D | VerityUtils.cpp | 202 std::map<std::string, std::string> digests; in addFilesToVerityRecursive() local 217 digests[it->path()] = *result; in addFilesToVerityRecursive() 220 digests[it->path()] = *digest; in addFilesToVerityRecursive() 229 return digests; in addFilesToVerityRecursive() 233 std::map<std::string, std::string> digests; in verifyAllFilesInVerity() local 246 digests[it->path()] = *result; in verifyAllFilesInVerity() 260 return digests; in verifyAllFilesInVerity()
|
/aosp12/frameworks/base/core/tests/coretests/src/android/content/pm/ |
H A D | SigningDetailsTest.java | 836 Set<String> digests = createDigestSet(FIRST_SIGNATURE); in hasAncestorOrSelfWithDigest_unknownDetails_returnsFalse() local 838 assertFalse(details.hasAncestorOrSelfWithDigest(digests)); in hasAncestorOrSelfWithDigest_unknownDetails_returnsFalse() 848 assertTrue(details.hasAncestorOrSelfWithDigest(digests)); in hasAncestorOrSelfWithDigest_singleSignerInSet_returnsTrue() 868 assertTrue(details.hasAncestorOrSelfWithDigest(digests)); in hasAncestorOrSelfWithDigest_multipleSignersInSet_returnsTrue() 889 Set<String> digests = createDigestSet(FIRST_SIGNATURE); in hasAncestorOrSelfWithDigest_multipleSignersOneInSet_returnsFalse() local 901 assertTrue(details.hasAncestorOrSelfWithDigest(digests)); in hasAncestorOrSelfWithDigest_lineageSignerInSet_returnsTrue() 922 Set<String> digests = createDigestSet(SECOND_SIGNATURE); in hasAncestorOrSelfWithDigest_lastSignerInLineageInSet_returnsTrue() local 924 assertTrue(details.hasAncestorOrSelfWithDigest(digests)); in hasAncestorOrSelfWithDigest_lastSignerInLineageInSet_returnsTrue() 982 Set<String> digests = new ArraySet<>(); in createDigestSet() local 985 digests.add(digest); in createDigestSet() [all …]
|
/aosp12/frameworks/base/core/java/android/util/apk/ |
H A D | SourceStampVerifier.java | 379 ByteBuffer digests = getLengthPrefixedSlice(signedData); in getApkContentDigestsFromSignatureBlock() local 380 while (digests.hasRemaining()) { in getApkContentDigestsFromSignatureBlock() 381 ByteBuffer digest = getLengthPrefixedSlice(digests); in getApkContentDigestsFromSignatureBlock() 393 Map<Integer, byte[]> digests = new HashMap<>(); in getSignatureSchemeDigests() local 398 digests.put( in getSignatureSchemeDigests() 401 return digests; in getSignatureSchemeDigests() 406 List<Pair<Integer, byte[]>> digests = new ArrayList<>(); in getApkDigests() local 408 digests.add(Pair.create(apkContentDigest.getKey(), apkContentDigest.getValue())); in getApkDigests() 410 digests.sort(Comparator.comparing(pair -> pair.first)); in getApkDigests() 411 return digests; in getApkDigests()
|
H A D | ApkSignatureSchemeV2Verifier.java | 293 ByteBuffer digests = getLengthPrefixedSlice(signedData); in verifySigner() local 296 while (digests.hasRemaining()) { in verifySigner() 299 ByteBuffer digest = getLengthPrefixedSlice(digests); in verifySigner()
|
H A D | ApkSignatureSchemeV3Verifier.java | 307 ByteBuffer digests = getLengthPrefixedSlice(signedData); in verifySigner() local 310 while (digests.hasRemaining()) { in verifySigner() 313 ByteBuffer digest = getLengthPrefixedSlice(digests); in verifySigner()
|
/aosp12/frameworks/base/services/core/java/com/android/server/net/watchlist/ |
H A D | HarmfulDigests.java | 36 HarmfulDigests(List<byte[]> digests) { in HarmfulDigests() argument 38 final int size = digests.size(); in HarmfulDigests() 40 tmpDigestSet.add(HexDump.toHexString(digests.get(i))); in HarmfulDigests()
|
H A D | HarmfulCrcs.java | 36 HarmfulCrcs(List<byte[]> digests) { in HarmfulCrcs() argument 38 final int size = digests.size(); in HarmfulCrcs() 40 byte[] bytes = digests.get(i); in HarmfulCrcs()
|
/aosp12/frameworks/base/core/java/android/content/pm/ |
H A D | InstantAppResolveInfo.java | 287 ArrayList<byte[]> digests = new ArrayList<>(); in generateDigest() local 292 digests.add(digest.digest(hostBytes)); in generateDigest() 298 digests.add(digest.digest(hostName.getBytes())); in generateDigest() 302 digests.add(digest.digest(hostBytes)); in generateDigest() 308 digests.add(digest.digest(hostBytes)); in generateDigest() 316 return digests.toArray(new byte[digests.size()][]); in generateDigest()
|
/aosp12/frameworks/base/keystore/java/android/security/keystore/ |
H A D | KeyProperties.java | 701 public static @DigestEnum String[] allFromKeymaster(@NonNull Collection<Integer> digests) { in allFromKeymaster() argument 702 if (digests.isEmpty()) { in allFromKeymaster() 705 String[] result = new String[digests.size()]; in allFromKeymaster() 707 for (int digest : digests) { in allFromKeymaster() 715 public static int[] allToKeymaster(@Nullable @DigestEnum String[] digests) { in allToKeymaster() argument 716 if ((digests == null) || (digests.length == 0)) { in allToKeymaster() 719 int[] result = new int[digests.length]; in allToKeymaster() 721 for (@DigestEnum String digest : digests) { in allToKeymaster()
|
H A D | KeyProtection.java | 248 @KeyProperties.DigestEnum String[] digests, in KeyProtection() argument 271 mDigests = ArrayUtils.cloneIfNotEmpty(digests); in KeyProtection() 721 public Builder setDigests(@KeyProperties.DigestEnum String... digests) { in setDigests() argument 722 mDigests = ArrayUtils.cloneIfNotEmpty(digests); in setDigests()
|
H A D | KeyInfo.java | 103 @KeyProperties.DigestEnum String[] digests, in KeyInfo() argument 127 mDigests = ArrayUtils.cloneIfNotEmpty(ArrayUtils.nullToEmpty(digests)); in KeyInfo()
|
H A D | KeyGenParameterSpec.java | 345 @KeyProperties.DigestEnum String[] digests, in KeyGenParameterSpec() argument 403 mDigests = ArrayUtils.cloneIfNotEmpty(digests); in KeyGenParameterSpec() 1211 public Builder setDigests(@KeyProperties.DigestEnum String... digests) { in setDigests() argument 1212 mDigests = ArrayUtils.cloneIfNotEmpty(digests); in setDigests()
|
H A D | ParcelableKeyGenParameterSpec.java | 154 final String[] digests = in.createStringArray(); in ParcelableKeyGenParameterSpec() local 191 digests, in ParcelableKeyGenParameterSpec()
|
/aosp12/frameworks/base/core/java/android/util/ |
H A D | PackageUtils.java | 61 final String[] digests = new String[signatureCount]; in computeSignaturesSha256Digests() local 63 digests[i] = computeSha256Digest(signatures[i].toByteArray(), separator); in computeSignaturesSha256Digests() 65 return digests; in computeSignaturesSha256Digests()
|
/aosp12/hardware/interfaces/security/keymint/support/ |
H A D | authorization_set.cpp | 227 AuthorizationSetBuilder& AuthorizationSetBuilder::Digest(std::vector<keymint::Digest> digests) { in Digest() argument 228 for (auto digest : digests) { in Digest() 235 const std::vector<android::hardware::security::keymint::Digest>& digests) { in OaepMGFDigest() argument 236 for (auto digest : digests) { in OaepMGFDigest()
|
/aosp12/system/keymaster/legacy_support/ |
H A D | keymaster1_legacy_support.cpp | 62 keymaster_digest_t* digests; in add_digests() local 65 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length); in add_digests() 70 std::unique_ptr<keymaster_digest_t, Malloc_Delete> digests_deleter(digests); in add_digests() 72 auto digest_vec = make_vector(digests, digests_length); in add_digests()
|
/aosp12/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | ApkChecksums.java | 437 final Checksum[] digests = readChecksums(digestsFile); in getInstallerChecksums() local 442 final Certificate[] certificates = verifySignature(digests, in getInstallerChecksums() 491 for (Checksum digest : digests) { in getInstallerChecksums() 500 for (Checksum digest : digests) { in getInstallerChecksums() 797 byte[][] digests = ApkSigningBlockUtils.computeContentDigestsPer1MbChunk(digestAlgos, in calculatePartialChecksumsIfRequested() 802 checksums.put(checksumKind, new ApkChecksum(split, checksumKind, digests[i])); in calculatePartialChecksumsIfRequested()
|
/aosp12/system/security/keystore2/src/crypto/tests/ |
H A D | certificate_utils_test.cpp | 74 std::array<Digest, 5> digests = { variable 144 testing::Combine(testing::ValuesIn(ec_curves), testing::ValuesIn(digests)), 237 testing::ValuesIn(digests)),
|
/aosp12/system/keymaster/contexts/ |
H A D | soft_keymaster_device.cpp | 114 keymaster_digest_t* digests; in add_digests() local 117 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length); in add_digests() 122 std::unique_ptr<keymaster_digest_t, Malloc_Delete> digests_deleter(digests); in add_digests() 124 auto digest_vec = make_vector(digests, digests_length); in add_digests() 472 keymaster_digest_t** digests, in get_supported_digests() argument 476 if (!digests || !digests_length) return KM_ERROR_OUTPUT_PARAMETER_NULL; in get_supported_digests() 480 return km1_dev->get_supported_digests(km1_dev, algorithm, purpose, digests, digests_length); in get_supported_digests() 495 *digests = reinterpret_cast<keymaster_digest_t*>(malloc(*digests_length * sizeof(**digests))); in get_supported_digests() 496 if (!*digests) return KM_ERROR_MEMORY_ALLOCATION_FAILED; in get_supported_digests() 497 std::copy(response.results, response.results + response.results_length, *digests); in get_supported_digests()
|
/aosp12/hardware/interfaces/keymaster/3.0/vts/functional/ |
H A D | authorization_set.h | 291 AuthorizationSetBuilder& Digest(std::initializer_list<Digest> digests); 405 AuthorizationSetBuilder::Digest(std::initializer_list<V3_0::Digest> digests) { in Digest() argument 406 for (auto digest : digests) { in Digest()
|
/aosp12/system/keymaster/tests/ |
H A D | android_keymaster_test_utils.cpp | 829 keymaster_digest_t** digests, in get_supported_digests() argument 832 unwrap(dev), algorithm, purpose, digests, digests_length); in get_supported_digests() 836 std::copy_if(*digests, *digests + *digests_length, std::back_inserter(filtered_digests), in get_supported_digests() 839 free(*digests); in get_supported_digests() 841 *digests = reinterpret_cast<keymaster_digest_t*>( in get_supported_digests() 843 std::copy(filtered_digests.begin(), filtered_digests.end(), *digests); in get_supported_digests()
|
/aosp12/frameworks/base/keystore/java/android/security/keystore2/ |
H A D | AndroidKeyStoreSecretKeyFactorySpi.java | 230 String[] digests = digestsList.toArray(new String[0]); in getKeyInfo() local 251 digests, in getKeyInfo()
|
/aosp12/packages/modules/IPsec/src/java/com/android/internal/net/eap/crypto/ |
H A D | Fips186_2Prf.java | 21 import org.bouncycastle.crypto.digests.SHA1Digest;
|
/aosp12/hardware/libhardware/modules/sensors/dynamic_sensor/HidUtils/ |
H A D | HidParser.cpp | 285 std::ostream& operator<<(std::ostream &os, const HidParser::DigestVector &digests) { in operator <<() argument 286 for (const auto &i : digests) { in operator <<()
|