Home
last modified time | relevance | path

Searched refs:signedData (Results 1 – 7 of 7) sorted by relevance

/aosp14/frameworks/base/core/java/com/android/internal/security/
H A DVerityUtils.java134 CMSSignedData signedData = new CMSSignedData( in verifyPkcs7DetachedSignature() local
138 if (!signedData.isDetachedSignature()) { in verifyPkcs7DetachedSignature()
142 if (!signedData.getCertificates().getMatches(null).isEmpty()) { in verifyPkcs7DetachedSignature()
146 if (!signedData.getCRLs().getMatches(null).isEmpty()) { in verifyPkcs7DetachedSignature()
157 for (SignerInformation si : signedData.getSignerInfos().getSigners()) { in verifyPkcs7DetachedSignature()
/aosp14/frameworks/base/core/java/android/util/apk/
H A DApkSignatureSchemeV3Verifier.java273 ByteBuffer signedData = getLengthPrefixedSlice(signerBlock); in verifySigner() local
347 sig.update(signedData); in verifySigner()
361 signedData.clear(); in verifySigner()
362 ByteBuffer digests = getLengthPrefixedSlice(signedData); in verifySigner()
396 ByteBuffer certificates = getLengthPrefixedSlice(signedData); in verifySigner()
423 int signedMinSDK = signedData.getInt(); in verifySigner()
430 int signedMaxSDK = signedData.getInt(); in verifySigner()
436 ByteBuffer additionalAttrs = getLengthPrefixedSlice(signedData); in verifySigner()
H A DApkSignatureSchemeV2Verifier.java235 ByteBuffer signedData = getLengthPrefixedSlice(signerBlock); in verifySigner() local
289 sig.update(signedData); in verifySigner()
303 signedData.clear(); in verifySigner()
304 ByteBuffer digests = getLengthPrefixedSlice(signedData); in verifySigner()
337 ByteBuffer certificates = getLengthPrefixedSlice(signedData); in verifySigner()
364 ByteBuffer additionalAttrs = getLengthPrefixedSlice(signedData); in verifySigner()
H A DApkSignatureSchemeV4Verifier.java106 final byte[] signedData = V4Signature.getSignedData(new File(apkFile).length(), hashingInfo, in verify()
108 final Pair<Certificate, byte[]> result = verifySigner(signingInfo, signedData); in verify()
141 final byte[] signedData) throws SecurityException { in verifySigner() argument
166 sig.update(signedData); in verifySigner()
H A DApkSigningBlockUtils.java851 ByteBuffer signedData = getLengthPrefixedSlice(level); in verifyProofOfRotationStruct() local
866 sig.update(signedData); in verifyProofOfRotationStruct()
874 signedData.rewind(); in verifyProofOfRotationStruct()
875 byte[] encodedCert = readLengthPrefixedByteArray(signedData); in verifyProofOfRotationStruct()
876 int signedSigAlgorithm = signedData.getInt(); in verifyProofOfRotationStruct()
H A DSourceStampVerifier.java378 ByteBuffer signedData = getLengthPrefixedSlice(signer); in getApkContentDigestsFromSignatureBlock() local
379 ByteBuffer digests = getLengthPrefixedSlice(signedData); in getApkContentDigestsFromSignatureBlock()
/aosp14/frameworks/base/core/tests/coretests/src/com/android/internal/security/
H A DVerityUtilsTest.java257 ContentSigner contentSigner, X509CertificateHolder certificateHolder, byte[] signedData) in generatePkcs7Signature() argument
261 return generatePkcs7SignatureInternal(generator, signedData, /* encapsulate */ false); in generatePkcs7Signature()
265 CMSSignedDataGenerator generator, byte[] signedData, boolean encapsulate) in generatePkcs7SignatureInternal() argument
268 generator.generate(new CMSProcessableByteArray(signedData), encapsulate); in generatePkcs7SignatureInternal()