Searched refs:signedData (Results 1 – 8 of 8) sorted by relevance
/aosp12/frameworks/base/core/java/android/util/apk/ |
H A D | ApkSignatureSchemeV3Verifier.java | 226 ByteBuffer signedData = getLengthPrefixedSlice(signerBlock); in verifySigner() local 292 sig.update(signedData); in verifySigner() 306 signedData.clear(); in verifySigner() 307 ByteBuffer digests = getLengthPrefixedSlice(signedData); in verifySigner() 341 ByteBuffer certificates = getLengthPrefixedSlice(signedData); in verifySigner() 368 int signedMinSDK = signedData.getInt(); in verifySigner() 374 int signedMaxSDK = signedData.getInt(); in verifySigner() 380 ByteBuffer additionalAttrs = getLengthPrefixedSlice(signedData); in verifySigner()
|
H A D | ApkSignatureSchemeV4Verifier.java | 86 final byte[] signedData = V4Signature.getSignedData(apk.length(), hashingInfo, in extractCertificates() 88 final Pair<Certificate, byte[]> result = verifySigner(signingInfo, signedData); in extractCertificates() 99 final byte[] signedData) throws SecurityException { in verifySigner() argument 124 sig.update(signedData); in verifySigner()
|
H A D | ApkSignatureSchemeV2Verifier.java | 224 ByteBuffer signedData = getLengthPrefixedSlice(signerBlock); in verifySigner() local 278 sig.update(signedData); in verifySigner() 292 signedData.clear(); in verifySigner() 293 ByteBuffer digests = getLengthPrefixedSlice(signedData); in verifySigner() 326 ByteBuffer certificates = getLengthPrefixedSlice(signedData); in verifySigner() 353 ByteBuffer additionalAttrs = getLengthPrefixedSlice(signedData); in verifySigner()
|
H A D | ApkSigningBlockUtils.java | 851 ByteBuffer signedData = getLengthPrefixedSlice(level); in verifyProofOfRotationStruct() local 866 sig.update(signedData); in verifyProofOfRotationStruct() 874 signedData.rewind(); in verifyProofOfRotationStruct() 875 byte[] encodedCert = readLengthPrefixedByteArray(signedData); in verifyProofOfRotationStruct() 876 int signedSigAlgorithm = signedData.getInt(); in verifyProofOfRotationStruct()
|
H A D | SourceStampVerifier.java | 378 ByteBuffer signedData = getLengthPrefixedSlice(signer); in getApkContentDigestsFromSignatureBlock() local 379 ByteBuffer digests = getLengthPrefixedSlice(signedData); in getApkContentDigestsFromSignatureBlock()
|
/aosp12/hardware/qcom/keymaster/ |
H A D | keymaster_qcom.cpp | 473 uint8_t** signedData, size_t* signedDataLength) in qcom_km_sign_data() argument 486 } else if (signedData == NULL || signedDataLength == NULL) { in qcom_km_sign_data() 564 *signedData = signedDataPtr.release(); in qcom_km_sign_data() 573 const uint8_t* signedData, const size_t signedDataLength, in qcom_km_verify_data() argument 581 if (signedData == NULL || signature == NULL) { in qcom_km_verify_data() 631 memcpy((unsigned char *)ihandle.ion_sbuffer, signedData, signedDataLength); in qcom_km_verify_data()
|
/aosp12/system/hardware/interfaces/wifi/keystore/1.0/ |
H A D | IKeystore.hal | 72 * @return signedData the signed data. 75 generates (KeystoreStatusCode status, vec<uint8_t> signedData);
|
/aosp12/system/security/ondevice-signing/ |
H A D | CertUtils.h | 25 android::base::Result<std::vector<uint8_t>> createPkcs7(const std::vector<uint8_t>& signedData);
|