/frameworks/compile/mclinker/include/mcld/LD/ |
H A D | ObjectReader.h | 48 GroupSignatureMap& signatures() function in class:mcld::ObjectReader 51 const GroupSignatureMap& signatures() const function in class:mcld::ObjectReader
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | SharedUserSetting.java | 34 final PackageSignatures signatures = new PackageSignatures(); field in class:SharedUserSetting
|
H A D | PackageSettingBase.java | 93 PackageSignatures signatures = new PackageSignatures(); field in class:PackageSettingBase 147 signatures = new PackageSignatures(base.signatures); 213 signatures = base.signatures;
|
H A D | Settings.java | 529 PackageSignatures s = p.signatures; 531 p.signatures = s; 587 // Copy signatures from previous setting 588 if (dis.signatures.mSignatures != null) { 589 p.signatures.mSignatures = dis.signatures.mSignatures.clone(); 686 // Update signatures if needed. 687 if (p.signatures.mSignatures == null) { 688 p.signatures.assignSignatures(pkg.mSignatures); 695 // the shared user signatures a [all...] |
H A D | PackageInstallerSession.java | 607 mSignatures = apk.signatures; 694 if (!Signature.areExactMatch(mSignatures, apk.signatures)) { 696 tag + " signatures are inconsistent");
|
H A D | PackageManagerService.java | 2761 s1 = ((SharedUserSetting)obj).signatures.mSignatures; 2763 s1 = ((PackageSetting)obj).signatures.mSignatures; 2773 s2 = ((SharedUserSetting)obj).signatures.mSignatures; 2775 s2 = ((PackageSetting)obj).signatures.mSignatures; 2787 * Compares two sets of signatures. Returns: 2829 // Make sure s2 contains all signatures in s1. 2838 * external storage) is less than the version where package signatures 2876 * Make sure the expanded scanned set contains all signatures in the 2880 // Migrate the old signatures to the new scheme. 4214 if (ps.signatures [all...] |
/frameworks/base/services/core/java/com/android/server/ |
H A D | ServiceWatcher.java | 87 Signature[] sigs = pm.getPackageInfo(pkg, PackageManager.GET_SIGNATURES).signatures; 113 // A list of package names used to create the signatures. 180 if (!isSignatureMatch(pInfo.signatures)) { 248 public static boolean isSignatureMatch(Signature[] signatures, argument 250 if (signatures == null) return false; 254 for (Signature s : signatures) { 267 private boolean isSignatureMatch(Signature[] signatures) { argument 268 return isSignatureMatch(signatures, mSignatureSets);
|
H A D | LocationManagerService.java | 348 if (!ServiceWatcher.isSignatureMatch(pInfo.signatures, sigSets)) {
|
/frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/converter/ |
H A D | FwdLockConv.h | 27 * The size of the data and header signatures combined. The signatures are adjacent to each other in 50 /// The final set of signatures. 51 unsigned char signatures[FWD_LOCK_SIGNATURES_SIZE]; member in struct:FwdLockConv_CloseSession_Output 53 /// The offset in the produced output file where the signatures are located. 200 * the final set of signatures.
|
H A D | FwdLockConv.c | 572 // Set the signatures to all zeros for now; they will have to be updated later. 1213 HMAC_Final(&pSession->signingContext, pOutput->fromCloseSession.signatures, 1226 HMAC_Update(&pSession->signingContext, pOutput->fromCloseSession.signatures, 1229 &pOutput->fromCloseSession.signatures[SHA1_HASH_SIZE], &signatureSize); 1308 } else if (fpWriteFunc(outputFileDesc, output.fromCloseSession.signatures,
|
/frameworks/base/core/java/android/content/pm/ |
H A D | PackageInfo.java | 189 * Array of all signatures read from the package file. This is only filled 192 public Signature[] signatures; field in class:PackageInfo 315 dest.writeTypedArray(signatures, parcelableFlags); 364 signatures = source.createTypedArray(Signature.CREATOR);
|
H A D | PackageParser.java | 309 public final Signature[] signatures; field in class:PackageParser.ApkLite 315 Signature[] signatures, boolean coreApp, boolean multiArch) { 323 this.signatures = signatures; 583 pi.signatures = new Signature[N]; 584 System.arraycopy(p.mSignatures, 0, pi.signatures, 0, N); 1169 final Signature[] signatures; 1174 signatures = tempPkg.mSignatures; 1176 signatures = null; 1180 return parseApkLite(apkPath, res, parser, attrs, flags, signatures); 313 ApkLite(String codePath, String packageName, String splitName, int versionCode, int revisionCode, int installLocation, List<VerifierInfo> verifiers, Signature[] signatures, boolean coreApp, boolean multiArch) argument 1261 parseApkLite(String codePath, Resources res, XmlPullParser parser, AttributeSet attrs, int flags, Signature[] signatures) argument [all...] |
/frameworks/compile/mclinker/lib/LD/ |
H A D | ELFObjectReader.cpp | 133 signatures().insert((*section)->name(), exist); 135 signatures().insert(signature->name(), exist); 161 signatures().insert(name.split(".").second, exist);
|
/frameworks/base/core/java/android/net/ |
H A D | NetworkPolicyManager.java | 283 pm.getPackageInfo("android", GET_SIGNATURES).signatures); 292 pm.getPackageInfo(packageName, GET_SIGNATURES).signatures);
|
/frameworks/base/services/backup/java/com/android/server/backup/ |
H A D | PackageManagerBackupAgent.java | 52 * We back up the signatures of each package so that during a system restore, 208 homeSigHashes = hashSignatureArray(homeInfo.signatures); 221 // the signatures don't match so we treat them as different apps. 293 if (info.signatures == null || info.signatures.length == 0) 296 + " since it appears to have no signatures."); 305 * byte[] signatures -- [len] flattened signature hash array of the package 312 hashSignatureArray(info.signatures)); 354 // set of app signatures associated with each backed-up app in this restore 416 + " since it appears to have no signatures [all...] |
H A D | BackupManagerService.java | 2639 // Look up the package info & signatures. This is first so that if it 3292 // number of signatures == N 3306 if (pkg.signatures == null) { 3309 printer.println(Integer.toString(pkg.signatures.length)); 3310 for (Signature sig : pkg.signatures) { 4894 // So far so good -- do the signatures match the manifest? 4907 + " signatures do not match restore manifest"); 5075 // Verify signatures against any installed version; if they 5103 Slog.w(TAG, "Restore manifest signatures do not match " 6238 // So far so good -- do the signatures matc [all...] |
/frameworks/base/core/tests/coretests/src/android/content/pm/ |
H A D | PackageManagerTests.java | 3177 pi.signatures.length == 1); 3178 String sigBefore = pi.signatures[0].toCharsString(); 3185 pi.signatures.length == 1); 3186 String sigAfter = pi.signatures[0].toCharsString(); 3187 assertFalse("Package signatures did not change after upgrade!", 3204 pi.signatures.length == 1); 3205 String sigBefore = pi.signatures[0].toCharsString(); 3212 pi.signatures.length == 1); 3213 String sigAfter = pi.signatures[0].toCharsString(); 3214 assertTrue("Package signatures change [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
H A D | UiccCarrierPrivilegeRules.java | 270 * @param packageManager PackageManager for getting signatures. 278 Signature[] signatures = pInfo.signatures; 279 for (Signature sig : signatures) { 294 * @param packageManager PackageManager for getting signatures and package names.
|
/frameworks/av/drm/libdrmframework/plugins/forward-lock/FwdLockEngine/src/ |
H A D | FwdLockEngine.cpp | 456 (char *)convSession->output.fromCloseSession.signatures,
|
/frameworks/base/services/tests/servicestests/src/com/android/server/ |
H A D | NetworkPolicyManagerServiceTest.java | 169 info.signatures = new Signature[] { signature };
|