/system/update_engine/payload_generator/ |
H A D | payload_file.cc | 214 // are both the same kind of signature for the same kind of hash. 306 // Add the hash of the data blobs for this operation 319 brillo::Blob hash; local 320 TEST_AND_RETURN_FALSE(HashCalculator::RawHashOfData(buf, &hash)); 321 op->set_data_sha256_hash(hash.data(), hash.size());
|
H A D | payload_signer.cc | 184 // calculate hash for payload and metadata, save it to |out_hash_data| and 193 // Calculates the hash on the manifest. 199 // Calculates the hash on the updated payload. Note that we skip metadata 348 bool PayloadSigner::SignHash(const brillo::Blob& hash, argument 351 LOG(INFO) << "Signing hash with private key: " << private_key_path; 352 // We expect unpadded SHA256 hash coming in 353 TEST_AND_RETURN_FALSE(hash.size() == 32); 354 brillo::Blob padded_hash(hash); 375 LOG(ERROR) << "Signing hash failed: " 506 // Calculates the hash o [all...] |
H A D | delta_diff_utils.cc | 900 const brillo::Blob& hash = hasher.raw_hash(); local 901 info->set_hash(hash.data(), hash.size()); 903 << " hash=" << brillo::data_encoding::Base64Encode(hash);
|
/system/update_engine/ |
H A D | payload_state_unittest.cc | 63 static void SetupPayloadStateWith2Urls(string hash, argument 73 .hash = hash, 98 hash.c_str(), 152 .hash = "hash"}); 185 " Sha256 Hash = hash\n" 207 .hash = "rhash"}); 621 // have the same hash as before so as to not trivially reset because the 808 // Change the response hash s [all...] |
H A D | omaha_request_action_unittest.cc | 121 "<packages><package hash=\"not-used\" name=\"" + 123 "\" hash_sha256=\"" + hash + "\"/>" + 182 string hash = "4841534831323334"; member in struct:__anon2715::FakeUpdateResponse 556 EXPECT_EQ(fake_update_response_.hash, response.packages[0].hash); 587 EXPECT_EQ(fake_update_response_.hash, response.packages[0].hash); 592 EXPECT_EQ(string("hash2"), response.packages[1].hash); 617 EXPECT_EQ(fake_update_response_.hash, response.packages[0].hash); [all...] |
H A D | omaha_request_action.cc | 446 string hash; member in struct:chromeos_update_engine::OmahaParserData::App::Package 517 .hash = attrs["hash_sha256"]}); 908 out_package.hash = package.hash; 909 if (out_package.hash.empty()) { 914 LOG(INFO) << "Payload hash = " << out_package.hash; 1312 if (!base::HexStringToBytes(response.packages[0].hash, &raw_hash))
|
/system/core/liblog/ |
H A D | event_tag_map.cpp | 91 struct std::hash<MapString> struct in class:std 95 return std::hash<std::string_view>()(std::string_view(__t)); 102 struct std::hash<TagFmt> : public std::unary_function<const TagFmt&, size_t> { struct in class:std 105 // unordered_map lookup if we instead did a hash that combined 108 // return std::hash<MapString>()(__t.first) ^ 109 // std::hash<MapString>()(__t.second); 110 return std::hash<MapString>()(__t.first);
|
/system/extras/ksmutils/ |
H A D | ksminfo.c | 48 uint32_t hash; member in struct:ksm_page 202 uint32_t hash; local 259 hash = hashword(data, pm_kernel_pagesize(ker) / sizeof(*data), 17); 262 if (kp->pages[k].hash == hash) break; 285 kp->pages[kp->len].hash = hash; 352 printf("KSM CRC 0x%08x:", kp->pages[i].hash);
|
/system/security/keystore/ |
H A D | keymaster_enforcement.cpp | 433 uint8_t hash[EVP_MAX_MD_SIZE]; local 437 EVP_DigestFinal_ex(ctx.get(), hash, &hash_len)) { 439 memcpy(keyid, hash, sizeof(*keyid));
|
/system/extras/ioshark/ |
H A D | ioshark_bench_subr.c | 55 u_int32_t hash; local 59 hash = fileno % FILE_DB_HASHSIZE; 60 db_node = h->files_db_buckets[hash]; 71 u_int32_t hash = fileno % FILE_DB_HASHSIZE; local 84 db_node->next = h->files_db_buckets[hash]; 85 h->files_db_buckets[hash] = db_node;
|
/system/vold/ |
H A D | KeyStorage.cpp | 186 bool createSecdiscardable(const std::string& filename, std::string* hash) { argument 190 hashWithPrefix(kHashPrefix_secdiscardable, secdiscardable, hash); 194 bool readSecdiscardable(const std::string& filename, std::string* hash) { argument 197 hashWithPrefix(kHashPrefix_secdiscardable, secdiscardable, hash);
|
/system/core/logd/ |
H A D | LogStatistics.h | 575 struct std::hash<TagNameKey> struct in class:std 579 return std::hash<std::string_view>()(std::string_view(__t));
|
/system/update_engine/payload_consumer/ |
H A D | delta_performer_integration_test.cc | 171 brillo::Blob hash; local 172 EXPECT_TRUE(HashCalculator::RawHashOfData(data, &hash)); 174 EXPECT_TRUE(PayloadSigner::SignHash(hash, 198 brillo::Blob hash; local 200 payload_path, {signature_size}, &hash, nullptr)); 202 ASSERT_TRUE(PayloadSigner::SignHash(hash, private_key_path, &signature)); 244 ASSERT_TRUE(utils::MakeTempFile("hash.XXXXXX", &hash_file, nullptr)); 262 // Sign the hash 263 brillo::Blob hash, signature; local 264 ASSERT_TRUE(utils::ReadFile(hash_file, &hash)); [all...] |
/system/core/libziparchive/ |
H A D | zip_archive.cc | 70 * central directory, and load a hash table with pointers to the filenames 82 * of the string length into the hash table entry. 104 return std::hash<std::string_view>{}( 108 uint32_t hash = 0; 113 hash = hash * 31 + *str++; 116 return hash; 121 * Convert a ZipEntry to a hash table index, verifying that it's in a 126 const uint32_t hash = ComputeHash(name); local 129 uint32_t ent = hash 147 const uint64_t hash = ComputeHash(name); local [all...] |
/system/tpm/trunks/ |
H A D | tpm_generated.h | 1049 TPMI_ALG_HASH hash; member in struct:trunks::TPMS_PCR_SELECTION 1459 TPMI_ALG_HASH hash; member in struct:trunks::TPMS_SIGNATURE_RSASSA 1464 TPMI_ALG_HASH hash; member in struct:trunks::TPMS_SIGNATURE_RSAPSS 1469 TPMI_ALG_HASH hash; member in struct:trunks::TPMS_SIGNATURE_ECDSA
|