Searched refs:signedData (Results 1 – 7 of 7) sorted by relevance
/aosp14/frameworks/base/core/java/com/android/internal/security/ |
H A D | VerityUtils.java | 134 CMSSignedData signedData = new CMSSignedData( in verifyPkcs7DetachedSignature() local 138 if (!signedData.isDetachedSignature()) { in verifyPkcs7DetachedSignature() 142 if (!signedData.getCertificates().getMatches(null).isEmpty()) { in verifyPkcs7DetachedSignature() 146 if (!signedData.getCRLs().getMatches(null).isEmpty()) { in verifyPkcs7DetachedSignature() 157 for (SignerInformation si : signedData.getSignerInfos().getSigners()) { in verifyPkcs7DetachedSignature()
|
/aosp14/frameworks/base/core/java/android/util/apk/ |
H A D | ApkSignatureSchemeV3Verifier.java | 273 ByteBuffer signedData = getLengthPrefixedSlice(signerBlock); in verifySigner() local 347 sig.update(signedData); in verifySigner() 361 signedData.clear(); in verifySigner() 362 ByteBuffer digests = getLengthPrefixedSlice(signedData); in verifySigner() 396 ByteBuffer certificates = getLengthPrefixedSlice(signedData); in verifySigner() 423 int signedMinSDK = signedData.getInt(); in verifySigner() 430 int signedMaxSDK = signedData.getInt(); in verifySigner() 436 ByteBuffer additionalAttrs = getLengthPrefixedSlice(signedData); in verifySigner()
|
H A D | ApkSignatureSchemeV2Verifier.java | 235 ByteBuffer signedData = getLengthPrefixedSlice(signerBlock); in verifySigner() local 289 sig.update(signedData); in verifySigner() 303 signedData.clear(); in verifySigner() 304 ByteBuffer digests = getLengthPrefixedSlice(signedData); in verifySigner() 337 ByteBuffer certificates = getLengthPrefixedSlice(signedData); in verifySigner() 364 ByteBuffer additionalAttrs = getLengthPrefixedSlice(signedData); in verifySigner()
|
H A D | ApkSignatureSchemeV4Verifier.java | 106 final byte[] signedData = V4Signature.getSignedData(new File(apkFile).length(), hashingInfo, in verify() 108 final Pair<Certificate, byte[]> result = verifySigner(signingInfo, signedData); in verify() 141 final byte[] signedData) throws SecurityException { in verifySigner() argument 166 sig.update(signedData); in verifySigner()
|
H A D | ApkSigningBlockUtils.java | 851 ByteBuffer signedData = getLengthPrefixedSlice(level); in verifyProofOfRotationStruct() local 866 sig.update(signedData); in verifyProofOfRotationStruct() 874 signedData.rewind(); in verifyProofOfRotationStruct() 875 byte[] encodedCert = readLengthPrefixedByteArray(signedData); in verifyProofOfRotationStruct() 876 int signedSigAlgorithm = signedData.getInt(); in verifyProofOfRotationStruct()
|
H A D | SourceStampVerifier.java | 378 ByteBuffer signedData = getLengthPrefixedSlice(signer); in getApkContentDigestsFromSignatureBlock() local 379 ByteBuffer digests = getLengthPrefixedSlice(signedData); in getApkContentDigestsFromSignatureBlock()
|
/aosp14/frameworks/base/core/tests/coretests/src/com/android/internal/security/ |
H A D | VerityUtilsTest.java | 257 ContentSigner contentSigner, X509CertificateHolder certificateHolder, byte[] signedData) in generatePkcs7Signature() argument 261 return generatePkcs7SignatureInternal(generator, signedData, /* encapsulate */ false); in generatePkcs7Signature() 265 CMSSignedDataGenerator generator, byte[] signedData, boolean encapsulate) in generatePkcs7SignatureInternal() argument 268 generator.generate(new CMSProcessableByteArray(signedData), encapsulate); in generatePkcs7SignatureInternal()
|