/frameworks/base/core/java/android/webkit/ |
H A D | WebViewProviderInfo.java | 32 boolean availableByDefault, boolean isFallback, String[] signatures) { 37 if (signatures == null) { 38 this.signatures = new Signature[0]; 40 this.signatures = new Signature[signatures.length]; 41 for (int n = 0; n < signatures.length; n++) { 42 this.signatures[n] = new Signature(Base64.decode(signatures[n], Base64.DEFAULT)); 64 signatures = in.createTypedArray(Signature.CREATOR); 78 out.writeTypedArray(signatures, 31 WebViewProviderInfo(String packageName, String description, boolean availableByDefault, boolean isFallback, String[] signatures) argument 86 public final Signature[] signatures; field in class:WebViewProviderInfo [all...] |
/frameworks/base/core/java/android/util/ |
H A D | PackageUtils.java | 40 * Computes the SHA256 digests of a list of signatures. Items in the 41 * resulting array of hashes correspond to the signatures in the 43 * @param signatures The signatures. 47 @NonNull Signature[] signatures) { 48 final int signatureCount = signatures.length; 51 digests[i] = computeSha256Digest(signatures[i].toByteArray()); 56 * Computes a SHA256 digest of the signatures' SHA256 digests. First, 60 * @param signatures The signatures 46 computeSignaturesSha256Digests( @onNull Signature[] signatures) argument 63 computeSignaturesSha256Digest( @onNull Signature[] signatures) argument [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | SigningInfo.java | 56 return mSigningDetails.signatures != null && mSigningDetails.signatures.length > 1; 68 return mSigningDetails.signatures != null 96 return mSigningDetails.signatures; 114 return mSigningDetails.signatures;
|
H A D | PackageInfo.java | 234 * Array of all signatures read from the package file. This is only filled 243 * in case multiple signatures are reported you cannot assume the one at 256 public Signature[] signatures; field in class:PackageInfo 264 * Use this field instead of the deprecated {@code signatures} field. 449 dest.writeTypedArray(signatures, parcelableFlags); 511 signatures = source.createTypedArray(Signature.CREATOR);
|
/frameworks/compile/mclinker/include/mcld/LD/ |
H A D | ObjectReader.h | 47 GroupSignatureMap& signatures() { return f_GroupSignatureMap; } function in class:mcld::ObjectReader 49 const GroupSignatureMap& signatures() const { return f_GroupSignatureMap; } function in class:mcld::ObjectReader
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | PackageSignatures.java | 57 if (mSigningDetails.signatures == null) { 61 serializer.attribute(null, "count", Integer.toString(mSigningDetails.signatures.length)); 64 writeCertsListXml(serializer, writtenSignatures, mSigningDetails.signatures, null); 80 Signature[] signatures, int[] flags) throws IOException { 81 for (int i=0; i<signatures.length; i++) { 83 final Signature sig = signatures[i]; 131 Signature[] signatures = new Signature[count]; 132 int pos = readCertsListXml(parser, readSignatures, signatures, null, builder); 133 builder.setSignatures(signatures); 139 System.arraycopy(signatures, 79 writeCertsListXml(XmlSerializer serializer, ArrayList<Signature> writtenSignatures, Signature[] signatures, int[] flags) argument 156 readCertsListXml(XmlPullParser parser, ArrayList<Signature> readSignatures, Signature[] signatures, int[] flags, PackageParser.SigningDetails.Builder builder) argument [all...] |
H A D | PackageManagerServiceUtils.java | 398 * Compares two sets of signatures. Returns: 440 // Make sure s2 contains all signatures in s1. 456 for (Signature sig : packageSignatures.mSigningDetails.signatures) { 460 for (Signature sig : parsedSignatures.signatures) { 470 // make sure the expanded scanned set contains all signatures in the existing one 472 // migrate the old signatures to the new scheme 518 if (pkgSetting.signatures.mSigningDetails.checkCapability( 519 disabledPkgSetting.signatures.mSigningDetails, 521 || disabledPkgSetting.signatures.mSigningDetails.checkCapability( 522 pkgSetting.signatures [all...] |
H A D | ShortcutPackageInfo.java | 170 Slog.e(TAG, "Can't get signatures: package=" + packageName); 174 Signature[] signatures = signingInfo.getApkContentsSigners(); 176 pi.lastUpdateTime, BackupUtils.hashSignatureArray(signatures), /* shadow=*/ false); 204 Signature[] signatures = signingInfo.getApkContentsSigners(); 205 mSigHashes = BackupUtils.hashSignatureArray(signatures);
|
H A D | PackageSettingBase.java | 102 PackageSignatures signatures; field in class:PackageSettingBase 180 this.signatures = new PackageSignatures(); 216 return signatures.mSigningDetails.signatures; 220 return signatures.mSigningDetails; 226 * NOTE: For some fields [such as keySetData, signatures, userState, verificationInfo, etc...], 253 signatures = orig.signatures;
|
/frameworks/base/packages/StatementService/src/com/android/statementservice/retriever/ |
H A D | Utils.java | 101 Signature[] signatures = context.getPackageManager().getPackageInfo(packageName, 102 PackageManager.GET_SIGNATURES).signatures; 103 ArrayList<String> result = new ArrayList<String>(signatures.length); 104 for (Signature sig : signatures) {
|
/frameworks/base/services/backup/java/com/android/server/backup/utils/ |
H A D | FullBackupUtils.java | 94 // number of signatures == N 116 Signature[] signatures = signingInfo.getApkContentsSigners(); 117 printer.println(Integer.toString(signatures.length)); 118 for (Signature sig : signatures) {
|
/frameworks/base/tools/stats_log_api_gen/ |
H A D | test_collation.cpp | 89 EXPECT_EQ(3ul, atoms.signatures.size()); 92 EXPECT_SET_CONTAINS_SIGNATURE(atoms.signatures, JAVA_TYPE_INT); 95 EXPECT_SET_CONTAINS_SIGNATURE(atoms.signatures, JAVA_TYPE_INT, JAVA_TYPE_INT); 99 atoms.signatures,
|
H A D | main.cpp | 217 for (set<vector<java_type_t>>::const_iterator signature = atoms.signatures.begin(); 218 signature != atoms.signatures.end(); signature++) { 299 for (set<vector<java_type_t>>::const_iterator signature = atoms.signatures.begin(); 300 signature != atoms.signatures.end(); signature++) { 502 FILE* out, const string& method_name, const set<vector<java_type_t>>& signatures, 504 for (set<vector<java_type_t>>::const_iterator signature = signatures.begin(); 505 signature != signatures.end(); signature++) { 612 write_cpp_method_header(out, "stats_write", atoms.signatures, attributionDecl); 647 FILE* out, const string& method_name, const set<vector<java_type_t>>& signatures, 649 for (set<vector<java_type_t>>::const_iterator signature = signatures 501 write_cpp_method_header( FILE* out, const string& method_name, const set<vector<java_type_t>>& signatures, const AtomDecl &attributionDecl) argument 646 write_java_method( FILE* out, const string& method_name, const set<vector<java_type_t>>& signatures, const AtomDecl &attributionDecl) argument 853 write_stats_log_jni(FILE* out, const string& java_method_name, const string& cpp_method_name, const set<vector<java_type_t>>& signatures, const AtomDecl &attributionDecl) argument 1003 write_jni_registration(FILE* out, const string& java_method_name, const set<vector<java_type_t>>& signatures, const AtomDecl &attributionDecl) argument [all...] |
H A D | Collation.h | 100 set<vector<java_type_t>> signatures; member in struct:android::stats_log_api_gen::Atoms
|
/frameworks/base/services/tests/servicestests/src/com/android/server/backup/utils/ |
H A D | TarBackupReaderTest.java | 146 Signature[] signatures = tarBackupReader.readAppManifestAndReturnSignatures( 149 mPackageManagerStub, false /* allowApks */, fileMetadata, signatures, 160 signatures = tarBackupReader.readAppManifestAndReturnSignatures( 163 mPackageManagerStub, false /* allowApks */, fileMetadata, signatures, 184 Signature[] signatures = tarBackupReader.readAppManifestAndReturnSignatures(fileMetadata); 188 assertThat(signatures).isNotNull(); 189 assertThat(signatures).hasLength(1); 191 String signatureSha256 = Hashing.sha256().hashBytes(signatures[0].toByteArray()).toString(); 205 Signature[] signatures = tarBackupReader.readAppManifestAndReturnSignatures(fileMetadata); 209 assertThat(signatures) [all...] |
/frameworks/base/core/java/android/provider/ |
H A D | FontsContract.java | 710 List<byte[]> signatures; 713 signatures = convertToByteArrayList(packageInfo.signatures); 714 Collections.sort(signatures, sByteArrayComparator); 721 if (equalsByteArrayList(signatures, requestSignatures)) { 741 List<byte[]> signatures, List<byte[]> requestSignatures) { 742 if (signatures.size() != requestSignatures.size()) { 745 for (int i = 0; i < signatures.size(); ++i) { 746 if (!Arrays.equals(signatures.get(i), requestSignatures.get(i))) { 753 private static List<byte[]> convertToByteArrayList(Signature[] signatures) { argument 740 equalsByteArrayList( List<byte[]> signatures, List<byte[]> requestSignatures) argument [all...] |
/frameworks/support/compat/src/main/java/androidx/core/provider/ |
H A D | FontsContractCompat.java | 749 List<byte[]> signatures; 750 // We correctly check all signatures returned, as advised in the lint error. 754 signatures = convertToByteArrayList(packageInfo.signatures); 755 Collections.sort(signatures, sByteArrayComparator); 761 if (equalsByteArrayList(signatures, requestSignatures)) { 791 private static boolean equalsByteArrayList(List<byte[]> signatures, argument 793 if (signatures.size() != requestSignatures.size()) { 796 for (int i = 0; i < signatures.size(); ++i) { 797 if (!Arrays.equals(signatures 804 convertToByteArrayList(Signature[] signatures) argument [all...] |
/frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/converter/ |
H A D | FwdLockConv.h | 27 * The size of the data and header signatures combined. The signatures are adjacent to each other in 50 /// The final set of signatures. 51 unsigned char signatures[FWD_LOCK_SIGNATURES_SIZE]; member in struct:FwdLockConv_CloseSession_Output 53 /// The offset in the produced output file where the signatures are located. 200 * the final set of signatures.
|
/frameworks/base/services/core/java/com/android/server/security/ |
H A D | KeyAttestationApplicationIdProviderService.java | 66 packageInfo.getLongVersionCode(), packageInfo.signatures);
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | ServiceWatcher.java | 97 | PackageManager.GET_SIGNATURES).signatures; 123 // A list of package names used to create the signatures. 224 if (!isSignatureMatch(pInfo.signatures)) { 306 public static boolean isSignatureMatch(Signature[] signatures, argument 308 if (signatures == null) return false; 312 for (Signature s : signatures) { 325 private boolean isSignatureMatch(Signature[] signatures) { argument 326 return isSignatureMatch(signatures, mSignatureSets);
|
/frameworks/support/frameworks/support/samples/Support4Demos/src/main/java/com/example/android/supportv4/media/ |
H A D | PackageValidator.java | 108 if (packageInfo.signatures.length != 1) { 113 packageInfo.signatures[0].toByteArray(), Base64.NO_WRAP); 115 // Test for known signatures:
|
/frameworks/support/samples/Support4Demos/src/main/java/com/example/android/supportv4/media/ |
H A D | PackageValidator.java | 108 if (packageInfo.signatures.length != 1) { 113 packageInfo.signatures[0].toByteArray(), Base64.NO_WRAP); 115 // Test for known signatures:
|
/frameworks/base/services/core/java/com/android/server/webkit/ |
H A D | SystemImpl.java | 166 * Reads all signatures at the current depth (within the current provider) from the XML parser. 170 List<String> signatures = new ArrayList<String>(); 176 signatures.add(signature); 181 return signatures.toArray(new String[signatures.size()]);
|
H A D | WebViewUpdater.java | 512 if (provider.signatures == null || provider.signatures.length == 0) { 515 if (packageInfo.signatures.length != 1) return false; 517 // Return whether the package signature matches any of the valid signatures 518 for (Signature signature : provider.signatures) { 519 if (signature.equals(packageInfo.signatures[0])) return true;
|
/frameworks/base/telephony/java/android/telephony/ |
H A D | UiccAccessRule.java | 176 if (packageInfo.signatures == null || packageInfo.signatures.length == 0) { 181 for (Signature sig : packageInfo.signatures) {
|