Searched refs:V4Signature (Results 1 – 5 of 5) sorted by relevance
/packages/modules/Virtualization/libs/apkverify/src/ |
D | v4.rs | 61 pub struct V4Signature<R: Read + Seek> { struct 122 impl V4Signature<fs::File> { impl 130 impl<R: Read + Seek> V4Signature<R> { impl 132 pub fn from_idsig(mut r: R) -> Result<V4Signature<R>> { in from_idsig() 133 Ok(V4Signature { in from_idsig() 156 ) -> Result<V4Signature<Cursor<Vec<u8>>>> { in create() 168 let mut ret = V4Signature { in create() 320 let parsed = V4Signature::from_idsig_path(format!("{}.idsig", TEST_APK_PATH)).unwrap(); in parse_idsig_file() 355 let mut v4_signature = V4Signature::from_idsig_path(&idsig_path).unwrap(); in parse_and_compose() 370 V4Signature::create(&mut input, current_sdk, 4096, &[], HashAlgorithm::SHA256).unwrap(); in digest_from_apk() [all …]
|
D | lib.rs | 30 pub use v4::{get_apk_digest, V4Signature};
|
/packages/modules/Virtualization/apkdmverity/src/ |
D | main.rs | 27 use apkverify::{HashAlgorithm, V4Signature}; 122 let sig = V4Signature::from_idsig_path(&idsig)?; in enable_verity() 274 let offset = V4Signature::from_idsig_path("testdata/test.apk.idsig") in incorrect_merkle_tree() 388 let roothash = V4Signature::from_idsig_path("testdata/test.apk.idsig") in correct_custom_roothash()
|
/packages/modules/Virtualization/microdroid_manager/src/ |
D | verify.rs | 20 use apkverify::{extract_signed_data, verify, V4Signature}; 239 Ok(V4Signature::from_idsig_path(idsig_path)?.hashing_info.raw_root_hash) in get_apk_root_hash_from_idsig()
|
/packages/modules/Virtualization/virtualizationmanager/src/ |
D | aidl.rs | 62 use apkverify::{HashAlgorithm, V4Signature}; 140 V4Signature::create(&mut input, get_current_sdk()?, 4096, &[], HashAlgorithm::SHA256) in create_or_update_idsig_file() 148 if let Ok(out_sig) = V4Signature::from_idsig(&mut output) { in create_or_update_idsig_file()
|