/frameworks/base/core/java/android/webkit/ |
H A D | ClientCertRequest.java | 66 * Proceed with the specified private key and client certificate chain. 69 public abstract void proceed(PrivateKey privateKey, X509Certificate[] chain); argument
|
/frameworks/base/core/java/android/security/net/config/ |
H A D | NetworkSecurityTrustManager.java | 67 public void checkClientTrusted(X509Certificate[] chain, String authType) argument 69 mDelegate.checkClientTrusted(chain, authType); 118 private void checkPins(List<X509Certificate> chain) throws CertificateException { argument 122 || !isPinningEnforced(chain)) { 128 for (int i = chain.size() - 1; i >= 0 ; i--) { 129 X509Certificate cert = chain.get(i); 151 private boolean isPinningEnforced(List<X509Certificate> chain) throws CertificateException { argument 152 if (chain.isEmpty()) { 155 X509Certificate anchorCert = chain.get(chain [all...] |
H A D | RootTrustManager.java | 51 public void checkClientTrusted(X509Certificate[] chain, String authType) argument 56 config.getTrustManager().checkClientTrusted(chain, authType);
|
/frameworks/base/core/tests/coretests/src/android/net/http/ |
H A D | X509TrustManagerExtensionsTest.java | 34 public void checkClientTrusted(X509Certificate[] chain, String authType) {} argument 36 public void checkServerTrusted(X509Certificate[] chain, String authType) {} argument
|
/frameworks/base/core/java/android/net/http/ |
H A D | X509TrustManagerExtensions.java | 88 * Verifies the given certificate chain. 91 * description of the chain and authType parameters. The final parameter, host, should be the 94 * @throws CertificateException if the chain does not verify correctly. 95 * @return the properly ordered chain used for verification as a list of X509Certificates. 97 public List<X509Certificate> checkServerTrusted(X509Certificate[] chain, String authType, argument 100 return mDelegate.checkServerTrusted(chain, authType, host); 103 return (List<X509Certificate>) mCheckServerTrusted.invoke(mTrustManager, chain, 122 * <p>Since {@link X509TrustManager#checkServerTrusted} may allow its parameter {@code chain} to 123 * chain up to user-added CA certificates, this method can be used to perform additional
|
/frameworks/base/core/java/android/util/jar/ |
H A D | StrictJarFile.java | 160 for (Certificate[] chain : certChains) { 161 count += chain.length; 167 for (Certificate[] chain : certChains) { 168 System.arraycopy(chain, 0, certs, i, chain.length); 169 i += chain.length;
|
/frameworks/base/keystore/java/android/security/ |
H A D | KeyChain.java | 174 * private key and associated certificate chain will be installed. 393 * Returns the {@code X509Certificate} chain for the requested 396 * <strong>Note:</strong> If a certificate chain was explicitly specified when the alias was 397 * installed, this method will return that chain. If only the client certificate was specified 398 * at the installation time, this method will try to build a certificate chain using all 404 * @param alias The alias of the desired certificate chain, typically 425 // If the keypair is installed with a certificate chain by either 426 // DevicePolicyManager.installKeyPair or CertInstaller, return that chain. 428 Collection<X509Certificate> chain = toCertificates(certChainBytes); 429 ArrayList<X509Certificate> fullChain = new ArrayList<>(chain [all...] |
/frameworks/opt/net/voip/src/jni/rtp/ |
H A D | AudioGroup.cpp | 107 void encode(int tick, AudioStream *chain); 266 void AudioStream::encode(int tick, AudioStream *chain) argument 310 while (chain) { 311 if (chain != this) { 312 data |= chain->mix(buffer, tick - mInterval, tick, mSampleRate); 314 chain = chain->mNext; 703 for (AudioStream *chain = mChain; chain->mNext; chain 725 AudioStream *chain = mGroup->mChain; local [all...] |
/frameworks/base/services/core/java/com/android/server/ |
H A D | NetworkManagementService.java | 261 /** Set of states for the child firewall chains. True if the chain is active. */ 542 // Sync the state of the given chain with the native daemon. 543 private void syncFirewallChainLocked(int chain, SparseIntArray uidFirewallRules, String name) { argument 549 // specified chain. If we don't clear the rules, setFirewallUidRuleInternal will do 556 // chain. 559 setFirewallUidRuleLocked(chain, rules.keyAt(i), rules.valueAt(i)); 1796 final String chain = blacklist ? "naughtyapps" : "niceapps"; 1807 mConnector.execute("bandwidth", suffix + chain, uid); 2133 private void closeSocketsForFirewallChainLocked(int chain, String chainName) { argument 2139 final SparseIntArray rules = getUidFirewallRules(chain); 2193 setFirewallChainEnabled(int chain, boolean enable) argument 2236 getFirewallType(int chain) argument 2250 setFirewallUidRules(int chain, int[] uids, int[] rules) argument 2297 setFirewallUidRule(int chain, int uid, int rule) argument 2304 setFirewallUidRuleLocked(int chain, int uid, int rule) argument 2316 updateFirewallUidRuleLocked(int chain, int uid, int rule) argument 2341 getFirewallRuleName(int chain, int rule) argument 2359 getUidFirewallRules(int chain) argument 2374 getFirewallChainName(int chain) argument [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | Signature.java | 57 * Create signature from a certificate chain. Used for backward 181 * Used for compatibility code that needs to check the certificate chain 192 Signature[] chain = new Signature[1 + mCertificateChain.length]; 193 chain[0] = this; 197 chain[i++] = new Signature(c.getEncoded()); 200 return chain;
|
/frameworks/av/services/audioflinger/ |
H A D | Threads.cpp | 978 sp<EffectChain> chain = mEffectChains[i]; local 979 if (chain != 0) { 980 chain->dump(fd, args); 1133 sp<EffectChain> chain = getEffectChain_l(sessionId); local 1134 if (chain != 0) { 1136 chain->setEffectSuspended_l(type, suspend); 1138 chain->setEffectSuspendedAll_l(suspend); 1145 void AudioFlinger::ThreadBase::checkSuspendOnAddEffectChain_l(const sp<EffectChain>& chain) argument 1147 ssize_t index = mSuspendedSessions.indexOfKey(chain->sessionId()); 1159 chain 1253 sp<EffectChain> chain = getEffectChain_l(sessionId); local 1272 sp<EffectChain> chain; local 1413 sp<EffectChain> chain = getEffectChain_l(sessionId); local 1423 sp<EffectChain> chain = getEffectChain_l(sessionId); local 1471 sp<EffectChain> chain = effect->chain().promote(); local 1912 sp<EffectChain> chain = getEffectChain_l(sessionId); local 2053 sp<EffectChain> chain = getEffectChain_l(track->sessionId()); local 2097 sp<EffectChain> chain = getEffectChain_l(track->sessionId()); local 2682 addEffectChain_l(const sp<EffectChain>& chain) argument 2754 removeEffectChain_l(const sp<EffectChain>& chain) argument 3259 sp<EffectChain> chain = getEffectChain_l(track->sessionId()); local 3842 sp<EffectChain> chain = getEffectChain_l(AUDIO_SESSION_OUTPUT_MIX); local 7254 addEffectChain_l(const sp<EffectChain>& chain) argument 7277 removeEffectChain_l(const sp<EffectChain>& chain) argument [all...] |
H A D | Effects.h | 45 const wp<AudioFlinger::EffectChain>& chain, 91 void setChain(const wp<EffectChain>& chain) { mChain = chain; } argument 100 wp<EffectChain>& chain() { return mChain; } function in class:EffectModule 142 wp<EffectChain> mChain; // parent effect chain 240 // Effects in this chain can be insert or auxiliary. Effects in other chains (attached to 321 // At least one non offloadable effect in the chain is enabled 368 int16_t *mInBuffer; // chain input buffer 369 int16_t *mOutBuffer; // chain output buffer 377 bool mOwnInBuffer; // true if the chain own [all...] |
H A D | AudioFlinger.cpp | 657 // check if an effect chain with the same session ID is present on another 683 // move effect chain to this output thread if an effect on same session was waiting 1562 // Check if one effect chain was awaiting for an AudioRecord to be created on this 1564 sp<EffectChain> chain = getOrphanEffectChain_l(lSessionId); local 1565 if (chain != 0) { 1567 thread->addEffectChain_l(chain); 2242 // on at least one effect. We must either move the chain to an existing thread with the 2245 sp<EffectChain> chain; local 2249 // Note: maximum one chain per record thread 2251 chain 2754 sp<EffectChain> chain = getOrphanEffectChain_l(sessionId); local 2816 sp<EffectChain> chain = srcThread->getEffectChain_l(sessionId); local 2932 putOrphanEffectChain_l(const sp<AudioFlinger::EffectChain>& chain) argument 2947 sp<EffectChain> chain; local 2964 sp<EffectChain> chain = mOrphanEffectChains.valueAt(index); local [all...] |
H A D | Threads.h | 308 // get effect chain corresponding to session Id. 312 // add an effect chain to the chain list (mEffectChains) 313 virtual status_t addEffectChain_l(const sp<EffectChain>& chain) = 0; 314 // remove an effect chain from the chain list (mEffectChains) 315 virtual size_t removeEffectChain_l(const sp<EffectChain>& chain) = 0; 330 // add and effect module. Also creates the effect chain is none exists for 333 // remove and effect module. Also removes the effect chain is this was the last 339 // chain, o [all...] |
H A D | Effects.cpp | 59 const wp<AudioFlinger::EffectChain>& chain, 64 mThread(thread), mChain(chain), mId(id), mSessionId(sessionId), 298 sp<EffectChain> chain = mChain.promote(); local 299 if (chain != 0 && chain->activeTrackCnt() != 0) { 368 // last effect in the chain accumulates in output buffer: input buffer != output buffer 492 sp<EffectChain> chain = mChain.promote(); local 493 if (chain != 0) { 494 chain->forceVolume(); 1495 // they are processed first and accumulated in chain inpu 58 EffectModule(ThreadBase *thread, const wp<AudioFlinger::EffectChain>& chain, effect_descriptor_t *desc, int id, audio_session_t sessionId) argument [all...] |
/frameworks/base/core/java/android/os/ |
H A D | INetworkManagementService.aidl | 341 void setFirewallUidRule(int chain, int uid, int rule); 342 void setFirewallUidRules(int chain, in int[] uids, in int[] rules); 343 void setFirewallChainEnabled(int chain, boolean enable);
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
H A D | OSUSocketFactory.java | 229 public void checkClientTrusted(X509Certificate[] chain, String authType) argument 235 public void checkServerTrusted(X509Certificate[] chain, String authType) argument 237 Log.d("TLSOSU", "Checking " + chain.length + " certs."); 244 Arrays.asList(chain)); 270 mTrustChain = chain; 274 mTrustChain = chain;
|
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | AndroidKeyStoreSpi.java | 74 * Credentials.USER_CERTIFICATE as the first certificate in the chain (the one 76 * entry which will have the rest of the chain concatenated in BER format. 272 public void engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain) argument 279 setPrivateKeyEntry(alias, (PrivateKey) key, chain, null); 340 private void setPrivateKeyEntry(String alias, PrivateKey key, Certificate[] chain, argument 361 // Make sure the chain exists since this is a PrivateKey 362 if ((chain == null) || (chain.length == 0)) { 366 // Do chain type checking. 367 X509Certificate[] x509chain = new X509Certificate[chain 738 engineSetKeyEntry(String alias, byte[] userKey, Certificate[] chain) argument [all...] |
H A D | AndroidKeyStoreKeyPairGeneratorSpi.java | 492 // Very short certificate chain in the non-attestation case. 601 throw new ProviderException("Failed to generate attestation certificate chain", 604 Collection<byte[]> chain = outChain.getCertificates(); 605 if (chain.size() < 2) { 606 throw new ProviderException("Attestation certificate chain contained " 607 + chain.size() + " entries. At least two are required."); 609 return chain;
|
/frameworks/base/core/java/android/security/ |
H A D | IKeystoreService.aidl | 78 int attestKey(String alias, in KeymasterArguments params, out KeymasterCertificateChain chain);
|
/frameworks/native/vulkan/libvulkan/ |
H A D | api.cpp | 522 // point head of chain to the driver 583 // point head of chain to the driver 597 // no need to and cannot chain non-global layers 651 // point head of chain to the first layer 655 // point tail of chain to the driver 675 // point head of chain to the first layer 681 // point tail of chain to the driver 773 // call down the chain 847 // call down the chain 1051 LayerChain chain(tru [all...] |
/frameworks/native/libs/input/ |
H A D | InputTransport.cpp | 560 uint32_t chain = 0; 567 seqChain.chain = chain; 573 chain = msg.body.motion.seq; 577 *outSeq = chain; 824 // Send finished signals for the batch sequence chain first. 834 currentSeq = seqChain.chain; 845 // An error occurred so at least one signal was not sent, reconstruct the chain. 849 seqChain.chain = chainSeqs[chainIndex];
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/configparse/ |
H A D | ConfigBuilder.java | 144 Certificate[] chain = ks.getCertificateChain(alias); 145 if (chain != null) { 147 for (Certificate certificate : chain) { 149 Log.w(TAG, "Element in cert chain is not an X509Certificate: " + 290 throw new IOException("No certificate in chain matches supplied fingerprint");
|
/frameworks/base/services/core/java/com/android/server/net/ |
H A D | NetworkPolicyManagerService.java | 309 /** Set of states for the child firewall chains. True if the chain is active. */ 2568 private void updateRulesForWhitelistedPowerSaveLocked(boolean enabled, int chain, argument 2571 // Sync the whitelists before enabling the chain. We don't care about the rules if 2572 // we are disabling the chain. 2596 setUidFirewallRules(chain, uidRules); 2599 enableFirewallChainLocked(chain, enabled); 2613 private void updateRulesForWhitelistedPowerSaveLocked(int uid, boolean enabled, int chain) { argument 2617 setUidFirewallRule(chain, uid, FIREWALL_RULE_ALLOW); 2619 setUidFirewallRule(chain, uid, FIREWALL_RULE_DEFAULT); 2628 // Fully update the app idle firewall chain 3317 setUidFirewallRules(int chain, SparseIntArray uidRules) argument 3337 setUidFirewallRule(int chain, int uid, int rule) argument 3358 enableFirewallChainLocked(int chain, boolean enable) argument [all...] |
/frameworks/base/keystore/tests/src/android/security/keystore/ |
H A D | AndroidKeyStoreTest.java | 1032 assertNotNull("Returned certificate chain should not be null", actual); 1033 assertEquals("Returned certificate chain should be correct size", expected.length, 1214 assertEquals("First certificate in chain should be user cert", expectedCert, actualChain[0]); 1217 assertEquals("Certificate chain should not include CAs", 1, actualChain.length); 1222 assertEquals("CA chain certificate should equal what we put in", it.next(), 1747 // Replace with PrivateKeyEntry that has no chain 1822 final Certificate[] chain = new Certificate[2]; 1823 chain[0] = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_USER_1)); 1824 chain[1] = caCert; 1827 mKeyStore.setKeyEntry(TEST_ALIAS_1, privKey, "foo".toCharArray(), chain); [all...] |