/aosp14/frameworks/base/libs/hwui/tests/unit/ |
H A D | main.cpp | 36 static void gtestSigHandler(int sig, siginfo_t* siginfo, void* context) { in gtestSigHandler() argument 43 struct sigaction sa = gSigChain[sig]; in gtestSigHandler() 44 sigaction(sig, &sa, nullptr); in gtestSigHandler() 45 raise(sig); in gtestSigHandler() 59 for (auto sig : CRASH_SIGNALS) { in main() local 61 sigaction(sig, &sa, &old_sa); in main() 62 gSigChain.insert(pair<int, struct sigaction>(sig, old_sa)); in main()
|
/aosp14/frameworks/base/tests/UpdatableSystemFontTest/testdata/ |
H A D | Android.bp | 101 name: "UpdatableSystemFontTest_NotoColorEmoji.sig", 104 out: ["UpdatableSystemFontTest_NotoColorEmoji.sig"], 108 name: "UpdatableSystemFontTest_NotoColorEmojiV0.sig", 111 out: ["UpdatableSystemFontTest_NotoColorEmojiV0.sig"], 115 name: "UpdatableSystemFontTest_NotoColorEmojiVPlus1.sig", 118 out: ["UpdatableSystemFontTest_NotoColorEmojiVPlus1.sig"], 122 name: "UpdatableSystemFontTest_NotoColorEmojiVPlus2.sig", 129 name: "UpdatableSystemFontTest_NotoSerif-Regular.sig", 132 out: ["UpdatableSystemFontTest_NotoSerif-Regular.sig"], 136 name: "UpdatableSystemFontTest_NotoSerif-Bold.sig", [all …]
|
/aosp14/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | PackageSignatures.java | 83 final Signature sig = signatures[i]; in writeCertsListXml() local 84 final int sigHash = sig.hashCode(); in writeCertsListXml() 95 writtenSignatures.add(sig); in writeCertsListXml() 97 sig.writeToXmlAttributeBytesHex(serializer, null, "key"); in writeCertsListXml() 102 serializer.attributeInt(null, "flags", sig.getFlags()); in writeCertsListXml() 175 Signature sig = readSignatures.get(index); in readCertsListXml() local 176 if (sig != null) { in readCertsListXml() 185 signatures.add(sig); in readCertsListXml() 203 Signature sig = new Signature(key); in readCertsListXml() local 207 readSignatures.add(sig); in readCertsListXml() [all …]
|
H A D | PackageManagerServiceUtils.java | 429 for (Signature sig : s1) { in compareSignatures() 430 set1.add(sig); in compareSignatures() 433 for (Signature sig : s2) { in compareSignatures() 434 set2.add(sig); in compareSignatures() 464 for (Signature sig : packageSignatures.mSigningDetails.getSignatures()) { in matchSignaturesCompat() 465 existingSet.add(sig); in matchSignaturesCompat() 468 for (Signature sig : parsedSignatures.getSignatures()) { in matchSignaturesCompat() 470 Signature[] chainSignatures = sig.getChainSignatures(); in matchSignaturesCompat() 475 scannedCompatSet.add(sig); in matchSignaturesCompat()
|
H A D | SELinuxMMAC.java | 277 String sig = parser.getAttributeValue(null, "signature"); in readSignerOrThrow() local 278 pb.addSignature(sig); in readSignerOrThrow()
|
/aosp14/frameworks/base/tests/UpdatableSystemFontTest/ |
H A D | Android.bp | 43 ":UpdatableSystemFontTest_NotoColorEmoji.sig", 45 ":UpdatableSystemFontTest_NotoColorEmojiV0.sig", 47 ":UpdatableSystemFontTest_NotoColorEmojiVPlus1.sig", 49 ":UpdatableSystemFontTest_NotoColorEmojiVPlus2.sig", 51 ":UpdatableSystemFontTest_NotoSerif-Regular.sig", 53 ":UpdatableSystemFontTest_NotoSerif-Bold.sig",
|
/aosp14/frameworks/base/services/tests/servicestests/src/com/android/server/updates/ |
H A D | CertPinInstallReceiverTest.java | 169 String sig = new String(Base64.encode(signer.sign(), Base64.DEFAULT)); in createSignature() local 171 verifySignature(content, version, requiredHash, sig, createCertificate())); in createSignature() 172 return sig; in createSignature() 185 private void sendIntent(String contentPath, String version, String required, String sig) { in sendIntent() argument 191 i.putExtra(EXTRA_SIGNATURE, sig); in sendIntent() 195 private String runTest(String cert, String content, String version, String required, String sig) in runTest() argument 200 sendIntent(contentPath, version, required, sig); in runTest() 207 String sig = createSignature(content, version, required); in runTestWithoutSig() local 208 return runTest(cert, content, version, required, sig); in runTestWithoutSig()
|
/aosp14/frameworks/base/core/java/android/content/pm/ |
H A D | Signature.java | 117 final byte[] sig = new byte[N / 2]; in Signature() 123 sig[sigIndex++] = (byte) ((hi << 4) | lo); in Signature() 126 mSignature = sig; in Signature() 178 byte[] sig = mSignature; in toChars() 179 final int N = sig.length; in toChars() 184 byte v = sig[j]; in toChars()
|
/aosp14/frameworks/base/tests/HierarchyViewerTest/src/com/android/test/hierarchyviewer/ |
H A D | Decoder.java | 39 byte sig = mBuf.get(); in readObject() 41 switch (sig) { in readObject() 61 throw new DecoderException(sig, mBuf.position() - 1); in readObject()
|
/aosp14/system/core/debuggerd/libdebuggerd/ |
H A D | tombstone_proto.cpp | 658 Signal sig; in engrave_tombstone_proto() local 659 sig.set_number(main_thread.signo); in engrave_tombstone_proto() 660 sig.set_name(get_signame(main_thread.siginfo)); in engrave_tombstone_proto() 661 sig.set_code(main_thread.siginfo->si_code); in engrave_tombstone_proto() 662 sig.set_code_name(get_sigcode(main_thread.siginfo)); in engrave_tombstone_proto() 665 sig.set_has_sender(true); in engrave_tombstone_proto() 666 sig.set_sender_uid(main_thread.siginfo->si_uid); in engrave_tombstone_proto() 667 sig.set_sender_pid(main_thread.siginfo->si_pid); in engrave_tombstone_proto() 671 sig.set_has_fault_address(true); in engrave_tombstone_proto() 673 sig.set_fault_address(fault_addr); in engrave_tombstone_proto() [all …]
|
/aosp14/frameworks/base/tools/apilint/ |
H A D | deprecated_at_birth.py | 227 def __init__(self, sig, clazz, detail, error, rule, msg): argument 228 self.sig = sig 264 sig = "%s-%s-%s" % (clazz.fullname, repr(detail), msg) 265 sig = sig.replace(" deprecated ", " ") 267 failures[sig] = Failure(sig, clazz, detail, error, rule, msg)
|
/aosp14/frameworks/base/core/java/android/util/apk/ |
H A D | ApkSignatureSchemeV4Verifier.java | 161 Signature sig = Signature.getInstance(jcaSignatureAlgorithm); in verifySigner() local 162 sig.initVerify(publicKey); in verifySigner() 164 sig.setParameter(jcaSignatureAlgorithmParams); in verifySigner() 166 sig.update(signedData); in verifySigner() 167 sigVerified = sig.verify(signatureBytes); in verifySigner()
|
H A D | ApkSignatureSchemeV2Verifier.java | 284 Signature sig = Signature.getInstance(jcaSignatureAlgorithm); in verifySigner() local 285 sig.initVerify(publicKey); in verifySigner() 287 sig.setParameter(jcaSignatureAlgorithmParams); in verifySigner() 289 sig.update(signedData); in verifySigner() 290 sigVerified = sig.verify(bestSigAlgorithmSignatureBytes); in verifySigner()
|
H A D | ApkSignatureSchemeV3Verifier.java | 342 Signature sig = Signature.getInstance(jcaSignatureAlgorithm); in verifySigner() local 343 sig.initVerify(publicKey); in verifySigner() 345 sig.setParameter(jcaSignatureAlgorithmParams); in verifySigner() 347 sig.update(signedData); in verifySigner() 348 sigVerified = sig.verify(bestSigAlgorithmSignatureBytes); in verifySigner()
|
H A D | SourceStampVerifier.java | 315 Signature sig = Signature.getInstance(jcaSignatureAlgorithm); in verifySourceStampSignature() local 316 sig.initVerify(publicKey); in verifySourceStampSignature() 318 sig.setParameter(jcaSignatureAlgorithmParams); in verifySourceStampSignature() 320 sig.update(data); in verifySourceStampSignature() 321 sigVerified = sig.verify(bestSigAlgorithmSignatureBytes); in verifySourceStampSignature()
|
H A D | ApkSigningBlockUtils.java | 861 Signature sig = Signature.getInstance(sigAlgParams.first); in verifyProofOfRotationStruct() local 862 sig.initVerify(publicKey); in verifyProofOfRotationStruct() 864 sig.setParameter(sigAlgParams.second); in verifyProofOfRotationStruct() 866 sig.update(signedData); in verifyProofOfRotationStruct() 867 if (!sig.verify(signature)) { in verifyProofOfRotationStruct()
|
/aosp14/frameworks/base/packages/WAPPushManager/tests/src/com/android/smspush/unitTests/ |
H A D | ClientTest.java | 65 CheckBox sig = findViewById(R.id.sig); in onCreate() 76 sig.isChecked(), ftr.isChecked())) { in onCreate() 86 sig.isChecked(), ftr.isChecked()); in onCreate()
|
/aosp14/frameworks/base/rs/java/android/renderscript/ |
H A D | Script.java | 45 KernelID(long id, RenderScript rs, Script s, int slot, int sig) { in KernelID() argument 49 mSig = sig; in KernelID() 57 protected KernelID createKernelID(int slot, int sig, Element ein, in createKernelID() argument 64 long id = mRS.nScriptKernelIDCreate(getID(mRS), slot, sig); in createKernelID() 69 k = new KernelID(id, mRS, this, slot, sig); in createKernelID()
|
H A D | RenderScript.java | 854 native long rsnScriptKernelIDCreate(long con, long sid, int slot, int sig); in rsnScriptKernelIDCreate() argument 855 synchronized long nScriptKernelIDCreate(long sid, int slot, int sig) { in nScriptKernelIDCreate() argument 857 return rsnScriptKernelIDCreate(mContext, sid, slot, sig); in nScriptKernelIDCreate()
|
/aosp14/system/core/trusty/confirmationui/ |
H A D | TrustyConfirmationUI.cpp | 232 auto hsFinalize = [&](const Signature& sig, const Nonce& nCi) -> TeeuiRc { in promptUserConfirmation_() argument 235 nCi, sig); in promptUserConfirmation_() 246 const Signature& sig) -> std::tuple<TeeuiRc, InputResponse> { in promptUserConfirmation_() argument 248 app->issueCmd<DeliverInputEvent, DeliverInputEventResponse>(event, sig); in promptUserConfirmation_()
|
/aosp14/frameworks/base/core/tests/coretests/src/android/provider/ |
H A D | FontsContractE2ETest.java | 64 for (Signature sig : info.signatures) { 65 out.add(sig.toByteArray()); in sig.toByteArray()
|
/aosp14/frameworks/base/services/backup/java/com/android/server/backup/fullbackup/ |
H A D | AppMetadataBackupWriter.java | 150 for (Signature sig : signatures) { in getManifestBytes() 151 printer.println(sig.toCharsString()); in getManifestBytes()
|
/aosp14/frameworks/base/telephony/java/android/telephony/ |
H A D | UiccAccessRule.java | 229 for (Signature sig : signatures) { in getCarrierPrivilegeStatus() 230 int accessStatus = getCarrierPrivilegeStatus(sig, packageInfo.packageName); in getCarrierPrivilegeStatus()
|
/aosp14/frameworks/base/core/tests/coretests/src/com/android/internal/security/ |
H A D | VerityUtilsTest.java | 237 byte[] sig = context.getResources().openRawResource(R.raw.fsverity_sig).readAllBytes(); in testSignatureGeneratedExternally() 243 assertTrue(verifySignature(sig, digest, cert)); in testSignatureGeneratedExternally()
|
/aosp14/frameworks/base/core/jni/ |
H A D | android_util_Process.cpp | 1075 void android_os_Process_sendSignal(JNIEnv* env, jobject clazz, jint pid, jint sig) in android_os_Process_sendSignal() argument 1078 ALOGI("Sending signal. PID: %" PRId32 " SIG: %" PRId32, pid, sig); in android_os_Process_sendSignal() 1079 kill(pid, sig); in android_os_Process_sendSignal() 1083 void android_os_Process_sendSignalQuiet(JNIEnv* env, jobject clazz, jint pid, jint sig) in android_os_Process_sendSignalQuiet() argument 1086 kill(pid, sig); in android_os_Process_sendSignalQuiet()
|