Searched refs:hashingInfo (Results 1 – 6 of 6) sorted by relevance
/frameworks/base/core/java/android/os/incremental/ |
D | V4Signature.java | 181 @Nullable public final byte[] hashingInfo; field in V4Signature 227 public static byte[] getSignedData(long fileSize, HashingInfo hashingInfo, in getSignedData() argument 231 hashingInfo.salt) + bytesSize(hashingInfo.rawRootHash) + bytesSize( in getSignedData() 237 buffer.putInt(hashingInfo.hashAlgorithm); in getSignedData() 238 buffer.put(hashingInfo.log2BlockSize); in getSignedData() 239 writeBytes(buffer, hashingInfo.salt); in getSignedData() 240 writeBytes(buffer, hashingInfo.rawRootHash); in getSignedData() 251 private V4Signature(int version, @Nullable byte[] hashingInfo, @Nullable byte[] signingInfos) { in V4Signature() argument 253 this.hashingInfo = hashingInfo; in V4Signature() 263 final byte[] hashingInfo = readBytes(stream, maxSize); in readFrom() [all …]
|
D | IncrementalStorage.java | 507 final V4Signature.HashingInfo hashingInfo = V4Signature.HashingInfo.fromByteArray( in validateV4Signature() local 508 signature.hashingInfo); in validateV4Signature() 512 if (hashingInfo.hashAlgorithm != V4Signature.HASHING_ALGORITHM_SHA256) { in validateV4Signature() 513 throw new IOException("Unsupported hashAlgorithm: " + hashingInfo.hashAlgorithm); in validateV4Signature() 515 if (hashingInfo.log2BlockSize != V4Signature.LOG2_BLOCK_SIZE_4096_BYTES) { in validateV4Signature() 516 throw new IOException("Unsupported log2BlockSize: " + hashingInfo.log2BlockSize); in validateV4Signature() 518 if (hashingInfo.salt != null && hashingInfo.salt.length > 0) { in validateV4Signature() 519 throw new IOException("Unsupported salt: " + Arrays.toString(hashingInfo.salt)); in validateV4Signature() 521 if (hashingInfo.rawRootHash.length != INCFS_MAX_HASH_SIZE) { in validateV4Signature()
|
/frameworks/base/core/java/android/util/apk/ |
D | ApkSignatureSchemeV4Verifier.java | 112 final V4Signature.HashingInfo hashingInfo = V4Signature.HashingInfo.fromByteArray( in extractSignature() local 113 signature.hashingInfo); in extractSignature() 123 VerityUtils.generateFsVerityDigest(apk.length(), hashingInfo); in extractSignature() 129 return Pair.create(hashingInfo, signingInfos); in extractSignature() 143 public static VerifiedSigner verify(String apkFile, final V4Signature.HashingInfo hashingInfo, in verify() argument 150 final byte[] signedData = V4Signature.getSignedData(new File(apkFile).length(), hashingInfo, in verify() 156 contentDigests.put(convertToContentDigestType(hashingInfo.hashAlgorithm), in verify() 157 hashingInfo.rawRootHash); in verify()
|
D | ApkSignatureVerifier.java | 255 final V4Signature.HashingInfo hashingInfo = v4Pair.first; in verifyV4Signature() local 298 ApkSignatureSchemeV4Verifier.verify(apkPath, hashingInfo, signingInfos, in verifyV4Signature()
|
/frameworks/base/core/java/com/android/internal/security/ |
D | VerityUtils.java | 218 @NonNull V4Signature.HashingInfo hashingInfo) in generateFsVerityDigest() argument 220 if (hashingInfo.rawRootHash == null || hashingInfo.rawRootHash.length != 32) { in generateFsVerityDigest() 223 if (hashingInfo.log2BlockSize != 12) { in generateFsVerityDigest() 225 "Unsupported log2BlockSize: " + hashingInfo.log2BlockSize); in generateFsVerityDigest() 232 buffer.put(hashingInfo.log2BlockSize); // log2(block-size), only log2(4096) is supported in generateFsVerityDigest() 236 buffer.put(hashingInfo.rawRootHash); // Merkle tree root hash in generateFsVerityDigest()
|
/frameworks/base/services/core/java/com/android/server/pm/ |
D | PackageManagerServiceUtils.java | 1143 if (signature.hashingInfo == null) { in getRootHash() 1147 HashingInfo.fromByteArray(signature.hashingInfo); in getRootHash()
|