Home
last modified time | relevance | path

Searched refs:signedData (Results 1 – 8 of 8) sorted by relevance

/aosp12/frameworks/base/core/java/android/util/apk/
H A DApkSignatureSchemeV3Verifier.java226 ByteBuffer signedData = getLengthPrefixedSlice(signerBlock); in verifySigner() local
292 sig.update(signedData); in verifySigner()
306 signedData.clear(); in verifySigner()
307 ByteBuffer digests = getLengthPrefixedSlice(signedData); in verifySigner()
341 ByteBuffer certificates = getLengthPrefixedSlice(signedData); in verifySigner()
368 int signedMinSDK = signedData.getInt(); in verifySigner()
374 int signedMaxSDK = signedData.getInt(); in verifySigner()
380 ByteBuffer additionalAttrs = getLengthPrefixedSlice(signedData); in verifySigner()
H A DApkSignatureSchemeV4Verifier.java86 final byte[] signedData = V4Signature.getSignedData(apk.length(), hashingInfo, in extractCertificates()
88 final Pair<Certificate, byte[]> result = verifySigner(signingInfo, signedData); in extractCertificates()
99 final byte[] signedData) throws SecurityException { in verifySigner() argument
124 sig.update(signedData); in verifySigner()
H A DApkSignatureSchemeV2Verifier.java224 ByteBuffer signedData = getLengthPrefixedSlice(signerBlock); in verifySigner() local
278 sig.update(signedData); in verifySigner()
292 signedData.clear(); in verifySigner()
293 ByteBuffer digests = getLengthPrefixedSlice(signedData); in verifySigner()
326 ByteBuffer certificates = getLengthPrefixedSlice(signedData); in verifySigner()
353 ByteBuffer additionalAttrs = getLengthPrefixedSlice(signedData); in verifySigner()
H A DApkSigningBlockUtils.java851 ByteBuffer signedData = getLengthPrefixedSlice(level); in verifyProofOfRotationStruct() local
866 sig.update(signedData); in verifyProofOfRotationStruct()
874 signedData.rewind(); in verifyProofOfRotationStruct()
875 byte[] encodedCert = readLengthPrefixedByteArray(signedData); in verifyProofOfRotationStruct()
876 int signedSigAlgorithm = signedData.getInt(); in verifyProofOfRotationStruct()
H A DSourceStampVerifier.java378 ByteBuffer signedData = getLengthPrefixedSlice(signer); in getApkContentDigestsFromSignatureBlock() local
379 ByteBuffer digests = getLengthPrefixedSlice(signedData); in getApkContentDigestsFromSignatureBlock()
/aosp12/hardware/qcom/keymaster/
H A Dkeymaster_qcom.cpp473 uint8_t** signedData, size_t* signedDataLength) in qcom_km_sign_data() argument
486 } else if (signedData == NULL || signedDataLength == NULL) { in qcom_km_sign_data()
564 *signedData = signedDataPtr.release(); in qcom_km_sign_data()
573 const uint8_t* signedData, const size_t signedDataLength, in qcom_km_verify_data() argument
581 if (signedData == NULL || signature == NULL) { in qcom_km_verify_data()
631 memcpy((unsigned char *)ihandle.ion_sbuffer, signedData, signedDataLength); in qcom_km_verify_data()
/aosp12/system/hardware/interfaces/wifi/keystore/1.0/
H A DIKeystore.hal72 * @return signedData the signed data.
75 generates (KeystoreStatusCode status, vec<uint8_t> signedData);
/aosp12/system/security/ondevice-signing/
H A DCertUtils.h25 android::base::Result<std::vector<uint8_t>> createPkcs7(const std::vector<uint8_t>& signedData);