/frameworks/av/drm/libdrmframework/plugins/forward-lock/FwdLockEngine/src/ |
H A D | FwdLockEngine.cpp | 461 (char *)convSession->output.fromCloseSession.signatures,
|
/frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/converter/ |
H A D | FwdLockConv.c | 573 // Set the signatures to all zeros for now; they will have to be updated later. 1214 HMAC_Final(&pSession->signingContext, pOutput->fromCloseSession.signatures, 1227 HMAC_Update(&pSession->signingContext, pOutput->fromCloseSession.signatures, 1230 &pOutput->fromCloseSession.signatures[SHA1_HASH_SIZE], &signatureSize); 1309 } else if (fpWriteFunc(outputFileDesc, output.fromCloseSession.signatures,
|
H A D | FwdLockConv.h | 27 * The size of the data and header signatures combined. The signatures are adjacent to each other in 50 /// The final set of signatures. 51 unsigned char signatures[FWD_LOCK_SIGNATURES_SIZE]; member in struct:FwdLockConv_CloseSession_Output 53 /// The offset in the produced output file where the signatures are located. 200 * the final set of signatures.
|
/frameworks/base/core/java/android/content/pm/ |
H A D | PackageInfo.java | 190 * Array of all signatures read from the package file. This is only filled 193 public Signature[] signatures; field in class:PackageInfo 322 dest.writeTypedArray(signatures, parcelableFlags); 373 signatures = source.createTypedArray(Signature.CREATOR);
|
H A D | PackageParser.java | 465 public final Signature[] signatures; field in class:PackageParser.ApkLite 476 int installLocation, List<VerifierInfo> verifiers, Signature[] signatures, 490 this.signatures = signatures; 766 pi.signatures = new Signature[N]; 767 System.arraycopy(p.mSignatures, 0, pi.signatures, 0, N); 1433 // add signatures to child packages 1488 Signature[] signatures = null; 1492 signatures = convertToSignatures(allSignersCerts); 1520 pkg.mSignatures = signatures; 474 ApkLite(String codePath, String packageName, String splitName, boolean isFeatureSplit, String configForSplit, String usesSplitName, int versionCode, int revisionCode, int installLocation, List<VerifierInfo> verifiers, Signature[] signatures, Certificate[][] certificates, boolean coreApp, boolean debuggable, boolean multiArch, boolean use32bitAbi, boolean extractNativeLibs, boolean isolatedSplits) argument 1774 parseApkLite(String codePath, XmlPullParser parser, AttributeSet attrs, int flags, Signature[] signatures, Certificate[][] certificates) argument 5951 setSignatures(Signature[] signatures) argument [all...] |
/frameworks/base/core/java/android/net/ |
H A D | NetworkPolicyManager.java | 337 pm.getPackageInfo("android", GET_SIGNATURES).signatures); 346 pm.getPackageInfo(packageName, GET_SIGNATURES).signatures);
|
/frameworks/base/core/java/android/provider/ |
H A D | FontsContract.java | 702 List<byte[]> signatures; 705 signatures = convertToByteArrayList(packageInfo.signatures); 706 Collections.sort(signatures, sByteArrayComparator); 713 if (equalsByteArrayList(signatures, requestSignatures)) { 733 List<byte[]> signatures, List<byte[]> requestSignatures) { 734 if (signatures.size() != requestSignatures.size()) { 737 for (int i = 0; i < signatures.size(); ++i) { 738 if (!Arrays.equals(signatures.get(i), requestSignatures.get(i))) { 745 private static List<byte[]> convertToByteArrayList(Signature[] signatures) { argument 732 equalsByteArrayList( List<byte[]> signatures, List<byte[]> requestSignatures) argument [all...] |
/frameworks/base/core/java/android/util/ |
H A D | PackageUtils.java | 55 return computeCertSha256Digest(packageInfo.signatures[0]);
|
/frameworks/base/core/java/android/util/apk/ |
H A D | ApkSignatureSchemeV2Verifier.java | 97 * Verifies APK Signature Scheme v2 signatures of the provided APK and returns the certificates 112 * Verifies APK Signature Scheme v2 signatures of the provided APK and returns the certificates 127 * APK Signature Scheme v2 block and additional information relevant to verifying the signatures 257 ByteBuffer signatures = getLengthPrefixedSlice(signerBlock); 264 while (signatures.hasRemaining()) { 267 ByteBuffer signature = getLengthPrefixedSlice(signatures); 289 throw new SecurityException("No signatures found"); 291 throw new SecurityException("No supported signatures found"); 347 "Signature algorithms don't match between digests and signatures records");
|
/frameworks/base/core/java/android/util/jar/ |
H A D | StrictJarVerifier.java | 75 private final Hashtable<String, HashMap<String, Attributes>> signatures = field in class:StrictJarVerifier 197 if (manifest == null || signatures.isEmpty()) { 208 Iterator<Map.Entry<String, HashMap<String, Attributes>>> it = signatures.entrySet().iterator(); 264 * known signatures. 383 // were used to sign this APK. If an ID is known to us, it means signatures of that 415 // Do we actually have any signatures to look at? 454 signatures.put(signatureFile, entries);
|
/frameworks/base/core/java/android/webkit/ |
H A D | WebViewFactory.java | 242 * Returns true if the signatures match, false otherwise 277 if (!signaturesEquals(chosen.signatures, toUse.signatures)) { 358 // Fetch signatures for verification
|
H A D | WebViewProviderInfo.java | 32 boolean availableByDefault, boolean isFallback, String[] signatures) { 37 this.signatures = signatures; 57 signatures = in.createStringArray(); 71 out.writeStringArray(signatures); 79 public final String[] signatures; field in class:WebViewProviderInfo 31 WebViewProviderInfo(String packageName, String description, boolean availableByDefault, boolean isFallback, String[] signatures) argument
|
/frameworks/base/core/tests/coretests/src/android/content/pm/ |
H A D | PackageManagerTests.java | 3060 pi.signatures.length == 1); 3061 String sigBefore = pi.signatures[0].toCharsString(); 3068 pi.signatures.length == 1); 3069 String sigAfter = pi.signatures[0].toCharsString(); 3070 assertFalse("Package signatures did not change after upgrade!", 3087 pi.signatures.length == 1); 3088 String sigBefore = pi.signatures[0].toCharsString(); 3095 pi.signatures.length == 1); 3096 String sigAfter = pi.signatures[0].toCharsString(); 3097 assertTrue("Package signatures change [all...] |
/frameworks/base/core/tests/coretests/src/android/provider/ |
H A D | FontsContractE2ETest.java | 64 for (Signature sig : info.signatures) {
|
H A D | FontsContractTest.java | 326 packageInfo.signatures = new Signature[] { signature, signature2 }; 378 packageInfo.signatures = new Signature[] { signature };
|
/frameworks/base/packages/SettingsLib/src/com/android/settingslib/ |
H A D | Utils.java | 248 if (pkg != null && pkg.signatures != null && pkg.signatures.length > 0) { 249 return pkg.signatures[0];
|
/frameworks/base/packages/SettingsProvider/src/com/android/providers/settings/ |
H A D | SettingsProvider.java | 2215 // Mac each of the developer signatures. 2216 for (int i = 0; i < callingPkg.signatures.length; i++) { 2217 byte[] sig = callingPkg.signatures[i].toByteArray();
|
H A D | SettingsState.java | 1101 UserHandle.USER_SYSTEM).signatures[0]; 1107 if (sSystemSignature.equals(packageInfo.signatures[0])) {
|
/frameworks/base/packages/StatementService/src/com/android/statementservice/retriever/ |
H A D | Utils.java | 101 Signature[] signatures = context.getPackageManager().getPackageInfo(packageName, 102 PackageManager.GET_SIGNATURES).signatures; 103 ArrayList<String> result = new ArrayList<String>(signatures.length); 104 for (Signature sig : signatures) {
|
/frameworks/base/services/backup/java/com/android/server/backup/ |
H A D | BackupManagerService.java | 3195 // Look up the package info & signatures. This is first so that if it 4109 // number of signatures == N 4123 if (pkg.signatures == null) { 4126 printer.println(Integer.toString(pkg.signatures.length)); 4127 for (Signature sig : pkg.signatures) { 6361 // So far so good -- do the signatures match the manifest? 6374 + " signatures do not match restore manifest"); 6564 // Verify signatures against any installed version; if they 6614 Slog.w(TAG, "Restore manifest signatures do not match " 7912 // So far so good -- do the signatures matc [all...] |
H A D | PackageManagerBackupAgent.java | 52 * We back up the signatures of each package so that during a system restore, 208 homeSigHashes = BackupUtils.hashSignatureArray(homeInfo.signatures); 221 // the signatures don't match so we treat them as different apps. 293 if (info.signatures == null || info.signatures.length == 0) 296 + " since it appears to have no signatures."); 305 * byte[] signatures -- [len] flattened signature hash array of the package 312 BackupUtils.hashSignatureArray(info.signatures)); 358 // set of app signatures associated with each backed-up app in this restore 420 + " since it appears to have no signatures [all...] |
/frameworks/base/services/core/java/com/android/server/ |
H A D | LocationManagerService.java | 525 if (!ServiceWatcher.isSignatureMatch(pInfo.signatures, sigSets)) {
|
H A D | ServiceWatcher.java | 96 | PackageManager.GET_SIGNATURES).signatures; 122 // A list of package names used to create the signatures. 222 if (!isSignatureMatch(pInfo.signatures)) { 301 public static boolean isSignatureMatch(Signature[] signatures, argument 303 if (signatures == null) return false; 307 for (Signature s : signatures) { 320 private boolean isSignatureMatch(Signature[] signatures) { argument 321 return isSignatureMatch(signatures, mSignatureSets);
|
/frameworks/base/services/core/java/com/android/server/accounts/ |
H A D | AccountManagerBackupHelper.java | 130 packageInfo.signatures[0]);
|
H A D | AccountManagerService.java | 2829 // Distill the caller's package signatures into a single digest. 2981 for (Signature sig : pkgInfo.signatures) { 4566 // Need to return just the accounts that are from matching signatures.
|