diff options
| author | 2020-07-14 16:36:53 -0700 | |
|---|---|---|
| committer | 2020-07-14 21:48:48 -0700 | |
| commit | fb27b477d8b33ba1a53d528c33c1d318e8d5d27c (patch) | |
| tree | 1c46bf4f78093eafdf4e213423c0b3892c0cfae1 /tools/warn/java_warn_patterns.py | |
| parent | b751b7754818f1d9c536ed442faea68a39d045d0 (diff) | |
Use apksigner in check_target_files_signatures
Some apk files, e.g. Chrome.apk has switched to use v2+ scheme.
And the apk file no longer has a META-INF/CERT.RSA. So, the
signature parsing script should use apksigner to dump the cert
info.
Leave the parsing of META-INF/CERT.RSA as a fallback, as some apks
fail the `apksigner verify`. The script also switches to store the
digest of the cert instead of the raw bytes.
Bug: 157735036
Test: run check_target_files_signatures on aosp|signed target-files
(cherry picked from commit a9a50cf6e37dbcd73bfed3759e2848cc064af454)
Change-Id: I910cd1aa91d1e446bef7097871af4171c285685d
Diffstat (limited to 'tools/warn/java_warn_patterns.py')
0 files changed, 0 insertions, 0 deletions