/frameworks/base/services/core/java/com/android/server/accounts/ |
H A D | AccountManagerBackupHelper.java | 138 packageInfo.signatures); 141 if (!certDigest.equals(signaturesSha256Digest) && (packageInfo.signatures.length <= 1 193 packageInfo.signatures);
|
/frameworks/base/tools/stats_log_api_gen/ |
H A D | Collation.cpp | 234 // All enums are treated as ints when it comes to function signatures. 318 // All enums are treated as ints when it comes to function signatures. 362 atoms->signatures.insert(signature); 374 printf("signatures = [\n"); 376 atoms->signatures.begin(); 377 it != atoms->signatures.end(); it++) {
|
/frameworks/compile/mclinker/lib/LD/ |
H A D | ELFObjectReader.cpp | 129 signatures().insert((*section)->name(), exist); 131 signatures().insert(signature->name(), exist); 159 signatures().insert(name.split(".").second, exist);
|
/frameworks/base/core/java/android/util/jar/ |
H A D | StrictJarVerifier.java | 87 private final Hashtable<String, HashMap<String, Attributes>> signatures = field in class:StrictJarVerifier 209 if (manifest == null || signatures.isEmpty()) { 220 Iterator<Map.Entry<String, HashMap<String, Attributes>>> it = signatures.entrySet().iterator(); 276 * known signatures. 394 // were used to sign this APK. If an ID is known to us, it means signatures of that 438 // Do we actually have any signatures to look at? 477 signatures.put(signatureFile, entries);
|
/frameworks/ml/nn/runtime/test/ |
H A D | TestPartitioningRandom.cpp | 87 // operations they can execute by checking operation signatures. Once 88 // we have built the model and know the set of signatures, we randomly 481 // operations with the specified signatures. 482 TestDriver(const char* name, std::set<Signature> signatures) : argument 483 SampleDriver(name), mSignatures(std::move(signatures)) { } 597 // Collect the signatures of operations in this model. 598 std::set<Signature> signatures; local 648 signatures.insert(Signature(operationPattern.mOperationType, activationFunction)); 919 assert(!signatures.empty()); 920 std::vector<std::set<Signature>> signaturesForDriver(signatures [all...] |
/frameworks/base/core/java/android/net/ |
H A D | NetworkPolicyManager.java | 299 pm.getPackageInfo("android", GET_SIGNATURES).signatures); 308 pm.getPackageInfo(packageName, GET_SIGNATURES).signatures);
|
/frameworks/base/services/tests/servicestests/src/com/android/server/pm/ |
H A D | ShortcutManagerTest5.java | 78 assertNull(pi.signatures); 84 assertNull(pi.signatures);
|
H A D | PackageManagerSettingsTests.java | 484 final PackageSignatures originalSignatures = originalPkgSetting01.signatures; 515 // signatures object must be different 516 assertNotSame(testPkgSetting01.signatures, originalSignatures); 617 final PackageSignatures disabledSignatures = disabledPkgSetting01.signatures; 649 assertNotSame(testPkgSetting01.signatures, disabledSignatures); 739 assertSame(origPkgSetting.signatures, testPkgSetting.signatures); 740 assertThat(origPkgSetting.signatures, is(testPkgSetting.signatures));
|
H A D | BaseShortcutManagerTest.java | 1028 protected Signature[] genSignatures(String... signatures) { argument 1029 final Signature[] sigs = new Signature[signatures.length]; 1030 for (int i = 0; i < signatures.length; i++){ 1031 sigs[i] = new Signature(signatures[i].getBytes()); 1036 protected PackageInfo genPackage(String packageName, int uid, int version, String... signatures) { argument 1045 pi.signatures = null; 1048 genSignatures(signatures), 1056 protected void addPackage(String packageName, int uid, int version, String... signatures) { argument 1057 mInjectedPackages.put(packageName, genPackage(packageName, uid, version, signatures)); 1139 ret.signatures [all...] |
/frameworks/base/core/java/android/util/apk/ |
H A D | ApkSignatureSchemeV2Verifier.java | 101 * Verifies APK Signature Scheme v2 signatures of the provided APK and returns the certificates 137 * Verifies APK Signature Scheme v2 signatures of the provided APK and returns the certificates 231 ByteBuffer signatures = getLengthPrefixedSlice(signerBlock); 238 while (signatures.hasRemaining()) { 241 ByteBuffer signature = getLengthPrefixedSlice(signatures); 263 throw new SecurityException("No signatures found"); 265 throw new SecurityException("No supported signatures found"); 321 "Signature algorithms don't match between digests and signatures records");
|
H A D | ApkSignatureSchemeV3Verifier.java | 98 * Verifies APK Signature Scheme v3 signatures of the provided APK and returns the certificates 133 * Verifies APK Signature Scheme v3 signatures of the provided APK and returns the certificates 244 ByteBuffer signatures = getLengthPrefixedSlice(signerBlock); 251 while (signatures.hasRemaining()) { 254 ByteBuffer signature = getLengthPrefixedSlice(signatures); 276 throw new SecurityException("No signatures found"); 278 throw new SecurityException("No supported signatures found"); 334 "Signature algorithms don't match between digests and signatures records");
|
/frameworks/base/packages/SettingsLib/src/com/android/settingslib/ |
H A D | Utils.java | 293 if (pkg != null && pkg.signatures != null && pkg.signatures.length > 0) { 294 return pkg.signatures[0];
|
/frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/converter/ |
H A D | FwdLockConv.c | 573 // Set the signatures to all zeros for now; they will have to be updated later. 1214 HMAC_Final(&pSession->signingContext, pOutput->fromCloseSession.signatures, 1227 HMAC_Update(&pSession->signingContext, pOutput->fromCloseSession.signatures, 1230 &pOutput->fromCloseSession.signatures[SHA1_HASH_SIZE], &signatureSize); 1309 } else if (fpWriteFunc(outputFileDesc, output.fromCloseSession.signatures,
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | SharedUserSetting.java | 48 final PackageSignatures signatures = new PackageSignatures(); field in class:SharedUserSetting
|
H A D | SELinuxMMAC.java | 499 && !Signature.areExactMatch(certs, pkg.mSigningDetails.signatures)) {
|
/frameworks/base/services/tests/servicestests/src/com/android/server/webkit/ |
H A D | WebViewUpdateServiceTest.java | 84 true /* isDebuggable == true -> don't check package signatures */); 183 boolean installed, Signature[] signatures, long updateTime) { 185 p.signatures = signatures; 191 boolean installed, Signature[] signatures, long updateTime, boolean hidden) { 193 createPackageInfo(packageName, enabled, valid, installed, signatures, updateTime); 203 boolean installed, Signature[] signatures, long updateTime, boolean hidden, 205 PackageInfo p = createPackageInfo(packageName, enabled, valid, installed, signatures, 275 // Ensure that package with valid signatures is chosen rather than package with invalid 276 // signatures 182 createPackageInfo(String packageName, boolean enabled, boolean valid, boolean installed, Signature[] signatures, long updateTime) argument 190 createPackageInfo(String packageName, boolean enabled, boolean valid, boolean installed, Signature[] signatures, long updateTime, boolean hidden) argument 202 createPackageInfo(String packageName, boolean enabled, boolean valid, boolean installed, Signature[] signatures, long updateTime, boolean hidden, long versionCode, boolean isSystemApp) argument [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | PackageParser.java | 801 pi.signatures = new Signature[1]; 802 pi.signatures[0] = p.mSigningDetails.pastSigningCertificates[0]; 805 int numberOfSigs = p.mSigningDetails.signatures.length; 806 pi.signatures = new Signature[numberOfSigs]; 807 System.arraycopy(p.mSigningDetails.signatures, 0, pi.signatures, 0, numberOfSigs); 1461 /** Parses the public keys from the set of signatures. */ 1462 public static ArraySet<PublicKey> toSigningKeys(Signature[] signatures) argument 1464 ArraySet<PublicKey> keys = new ArraySet<>(signatures.length); 1465 for (int i = 0; i < signatures 5665 public final Signature[] signatures; field in class:PackageParser.SigningDetails 5736 SigningDetails(Signature[] signatures, @SignatureSchemeVersion int signatureSchemeVersion, ArraySet<PublicKey> keys, Signature[] pastSigningCertificates, int[] pastSigningCertificatesFlags) argument 5747 SigningDetails(Signature[] signatures, @SignatureSchemeVersion int signatureSchemeVersion, Signature[] pastSigningCertificates, int[] pastSigningCertificatesFlags) argument 5755 SigningDetails(Signature[] signatures, @SignatureSchemeVersion int signatureSchemeVersion) argument 6134 setSignatures(Signature[] signatures) argument [all...] |
/frameworks/base/core/tests/coretests/src/android/content/pm/ |
H A D | PackageManagerTests.java | 2418 pi.signatures.length == 1); 2419 String sigBefore = pi.signatures[0].toCharsString(); 2426 pi.signatures.length == 1); 2427 String sigAfter = pi.signatures[0].toCharsString(); 2428 assertFalse("Package signatures did not change after upgrade!", 2445 pi.signatures.length == 1); 2446 String sigBefore = pi.signatures[0].toCharsString(); 2453 pi.signatures.length == 1); 2454 String sigAfter = pi.signatures[0].toCharsString(); 2455 assertTrue("Package signatures change [all...] |
/frameworks/base/services/backup/java/com/android/server/backup/restore/ |
H A D | FullRestoreEngine.java | 219 Signature[] signatures = tarBackupReader.readAppManifestAndReturnSignatures( 224 mBackupManagerService.getPackageManager(), allowApks, info, signatures, 226 mManifestSignatures.put(info.packageName, signatures);
|
H A D | PerformAdbRestoreTask.java | 478 Signature[] signatures = tarBackupReader.readAppManifestAndReturnSignatures( 487 info, signatures, pmi); 488 mManifestSignatures.put(info.packageName, signatures);
|
/frameworks/support/compat/src/androidTest/java/androidx/core/provider/ |
H A D | FontsContractCompatTest.java | 85 for (Signature sig : info.signatures) { 334 packageInfo.signatures = new Signature[] { signature, signature2 }; 389 packageInfo.signatures = new Signature[] { signature };
|
/frameworks/base/core/java/android/webkit/ |
H A D | WebViewFactory.java | 281 * Returns {@code true} if the signatures match, {@code false} otherwise 317 if (!signaturesEquals(chosen.signatures, toUse.signatures)) { 399 // Fetch signatures for verification
|
/frameworks/base/core/tests/coretests/src/android/provider/ |
H A D | FontsContractE2ETest.java | 64 for (Signature sig : info.signatures) {
|
H A D | FontsContractTest.java | 326 packageInfo.signatures = new Signature[] { signature, signature2 }; 378 packageInfo.signatures = new Signature[] { signature };
|
/frameworks/base/services/backup/java/com/android/server/backup/utils/ |
H A D | TarBackupReader.java | 269 * signatures. 272 * @return array of signatures or null, in case of an error. 385 * @param signatures - array of signatures parsed from backup file. 389 boolean allowApks, FileMetadata info, Signature[] signatures, 391 if (signatures == null) { 409 // Verify signatures against any installed version; if they 416 if (AppBackupUtils.signaturesMatch(signatures, pkgInfo, pmi)) { 465 Slog.w(TAG, "Restore manifest signatures do not match " 388 chooseRestorePolicy(PackageManager packageManager, boolean allowApks, FileMetadata info, Signature[] signatures, PackageManagerInternal pmi) argument
|