[go: nahoru, domu]

Searched refs:chain (Results 1 - 25 of 30) sorted by relevance

12

/frameworks/base/core/java/android/webkit/
H A DClientCertRequest.java66 * Proceed with the specified private key and client certificate chain.
69 public abstract void proceed(PrivateKey privateKey, X509Certificate[] chain); argument
/frameworks/base/core/java/android/security/net/config/
H A DNetworkSecurityTrustManager.java67 public void checkClientTrusted(X509Certificate[] chain, String authType) argument
69 mDelegate.checkClientTrusted(chain, authType);
118 private void checkPins(List<X509Certificate> chain) throws CertificateException { argument
122 || !isPinningEnforced(chain)) {
128 for (int i = chain.size() - 1; i >= 0 ; i--) {
129 X509Certificate cert = chain.get(i);
151 private boolean isPinningEnforced(List<X509Certificate> chain) throws CertificateException { argument
152 if (chain.isEmpty()) {
155 X509Certificate anchorCert = chain.get(chain
[all...]
H A DRootTrustManager.java51 public void checkClientTrusted(X509Certificate[] chain, String authType) argument
56 config.getTrustManager().checkClientTrusted(chain, authType);
/frameworks/base/core/tests/coretests/src/android/net/http/
H A DX509TrustManagerExtensionsTest.java34 public void checkClientTrusted(X509Certificate[] chain, String authType) {} argument
36 public void checkServerTrusted(X509Certificate[] chain, String authType) {} argument
/frameworks/base/core/java/android/net/http/
H A DX509TrustManagerExtensions.java88 * Verifies the given certificate chain.
91 * description of the chain and authType parameters. The final parameter, host, should be the
94 * @throws CertificateException if the chain does not verify correctly.
95 * @return the properly ordered chain used for verification as a list of X509Certificates.
97 public List<X509Certificate> checkServerTrusted(X509Certificate[] chain, String authType, argument
100 return mDelegate.checkServerTrusted(chain, authType, host);
103 return (List<X509Certificate>) mCheckServerTrusted.invoke(mTrustManager, chain,
122 * <p>Since {@link X509TrustManager#checkServerTrusted} may allow its parameter {@code chain} to
123 * chain up to user-added CA certificates, this method can be used to perform additional
/frameworks/base/core/java/android/util/jar/
H A DStrictJarFile.java160 for (Certificate[] chain : certChains) {
161 count += chain.length;
167 for (Certificate[] chain : certChains) {
168 System.arraycopy(chain, 0, certs, i, chain.length);
169 i += chain.length;
/frameworks/base/keystore/java/android/security/
H A DKeyChain.java174 * private key and associated certificate chain will be installed.
393 * Returns the {@code X509Certificate} chain for the requested
396 * <strong>Note:</strong> If a certificate chain was explicitly specified when the alias was
397 * installed, this method will return that chain. If only the client certificate was specified
398 * at the installation time, this method will try to build a certificate chain using all
404 * @param alias The alias of the desired certificate chain, typically
425 // If the keypair is installed with a certificate chain by either
426 // DevicePolicyManager.installKeyPair or CertInstaller, return that chain.
428 Collection<X509Certificate> chain = toCertificates(certChainBytes);
429 ArrayList<X509Certificate> fullChain = new ArrayList<>(chain
[all...]
/frameworks/opt/net/voip/src/jni/rtp/
H A DAudioGroup.cpp107 void encode(int tick, AudioStream *chain);
266 void AudioStream::encode(int tick, AudioStream *chain) argument
310 while (chain) {
311 if (chain != this) {
312 data |= chain->mix(buffer, tick - mInterval, tick, mSampleRate);
314 chain = chain->mNext;
703 for (AudioStream *chain = mChain; chain->mNext; chain
725 AudioStream *chain = mGroup->mChain; local
[all...]
/frameworks/base/services/core/java/com/android/server/
H A DNetworkManagementService.java261 /** Set of states for the child firewall chains. True if the chain is active. */
542 // Sync the state of the given chain with the native daemon.
543 private void syncFirewallChainLocked(int chain, SparseIntArray uidFirewallRules, String name) { argument
549 // specified chain. If we don't clear the rules, setFirewallUidRuleInternal will do
556 // chain.
559 setFirewallUidRuleLocked(chain, rules.keyAt(i), rules.valueAt(i));
1796 final String chain = blacklist ? "naughtyapps" : "niceapps";
1807 mConnector.execute("bandwidth", suffix + chain, uid);
2133 private void closeSocketsForFirewallChainLocked(int chain, String chainName) { argument
2139 final SparseIntArray rules = getUidFirewallRules(chain);
2193 setFirewallChainEnabled(int chain, boolean enable) argument
2236 getFirewallType(int chain) argument
2250 setFirewallUidRules(int chain, int[] uids, int[] rules) argument
2297 setFirewallUidRule(int chain, int uid, int rule) argument
2304 setFirewallUidRuleLocked(int chain, int uid, int rule) argument
2316 updateFirewallUidRuleLocked(int chain, int uid, int rule) argument
2341 getFirewallRuleName(int chain, int rule) argument
2359 getUidFirewallRules(int chain) argument
2374 getFirewallChainName(int chain) argument
[all...]
/frameworks/base/core/java/android/content/pm/
H A DSignature.java57 * Create signature from a certificate chain. Used for backward
181 * Used for compatibility code that needs to check the certificate chain
192 Signature[] chain = new Signature[1 + mCertificateChain.length];
193 chain[0] = this;
197 chain[i++] = new Signature(c.getEncoded());
200 return chain;
/frameworks/av/services/audioflinger/
H A DThreads.cpp978 sp<EffectChain> chain = mEffectChains[i]; local
979 if (chain != 0) {
980 chain->dump(fd, args);
1133 sp<EffectChain> chain = getEffectChain_l(sessionId); local
1134 if (chain != 0) {
1136 chain->setEffectSuspended_l(type, suspend);
1138 chain->setEffectSuspendedAll_l(suspend);
1145 void AudioFlinger::ThreadBase::checkSuspendOnAddEffectChain_l(const sp<EffectChain>& chain) argument
1147 ssize_t index = mSuspendedSessions.indexOfKey(chain->sessionId());
1159 chain
1253 sp<EffectChain> chain = getEffectChain_l(sessionId); local
1272 sp<EffectChain> chain; local
1413 sp<EffectChain> chain = getEffectChain_l(sessionId); local
1423 sp<EffectChain> chain = getEffectChain_l(sessionId); local
1471 sp<EffectChain> chain = effect->chain().promote(); local
1912 sp<EffectChain> chain = getEffectChain_l(sessionId); local
2053 sp<EffectChain> chain = getEffectChain_l(track->sessionId()); local
2097 sp<EffectChain> chain = getEffectChain_l(track->sessionId()); local
2682 addEffectChain_l(const sp<EffectChain>& chain) argument
2754 removeEffectChain_l(const sp<EffectChain>& chain) argument
3259 sp<EffectChain> chain = getEffectChain_l(track->sessionId()); local
3842 sp<EffectChain> chain = getEffectChain_l(AUDIO_SESSION_OUTPUT_MIX); local
7254 addEffectChain_l(const sp<EffectChain>& chain) argument
7277 removeEffectChain_l(const sp<EffectChain>& chain) argument
[all...]
H A DEffects.h45 const wp<AudioFlinger::EffectChain>& chain,
91 void setChain(const wp<EffectChain>& chain) { mChain = chain; } argument
100 wp<EffectChain>& chain() { return mChain; } function in class:EffectModule
142 wp<EffectChain> mChain; // parent effect chain
240 // Effects in this chain can be insert or auxiliary. Effects in other chains (attached to
321 // At least one non offloadable effect in the chain is enabled
368 int16_t *mInBuffer; // chain input buffer
369 int16_t *mOutBuffer; // chain output buffer
377 bool mOwnInBuffer; // true if the chain own
[all...]
H A DAudioFlinger.cpp657 // check if an effect chain with the same session ID is present on another
683 // move effect chain to this output thread if an effect on same session was waiting
1562 // Check if one effect chain was awaiting for an AudioRecord to be created on this
1564 sp<EffectChain> chain = getOrphanEffectChain_l(lSessionId); local
1565 if (chain != 0) {
1567 thread->addEffectChain_l(chain);
2242 // on at least one effect. We must either move the chain to an existing thread with the
2245 sp<EffectChain> chain; local
2249 // Note: maximum one chain per record thread
2251 chain
2754 sp<EffectChain> chain = getOrphanEffectChain_l(sessionId); local
2816 sp<EffectChain> chain = srcThread->getEffectChain_l(sessionId); local
2932 putOrphanEffectChain_l(const sp<AudioFlinger::EffectChain>& chain) argument
2947 sp<EffectChain> chain; local
2964 sp<EffectChain> chain = mOrphanEffectChains.valueAt(index); local
[all...]
H A DThreads.h308 // get effect chain corresponding to session Id.
312 // add an effect chain to the chain list (mEffectChains)
313 virtual status_t addEffectChain_l(const sp<EffectChain>& chain) = 0;
314 // remove an effect chain from the chain list (mEffectChains)
315 virtual size_t removeEffectChain_l(const sp<EffectChain>& chain) = 0;
330 // add and effect module. Also creates the effect chain is none exists for
333 // remove and effect module. Also removes the effect chain is this was the last
339 // chain, o
[all...]
H A DEffects.cpp59 const wp<AudioFlinger::EffectChain>& chain,
64 mThread(thread), mChain(chain), mId(id), mSessionId(sessionId),
298 sp<EffectChain> chain = mChain.promote(); local
299 if (chain != 0 && chain->activeTrackCnt() != 0) {
368 // last effect in the chain accumulates in output buffer: input buffer != output buffer
492 sp<EffectChain> chain = mChain.promote(); local
493 if (chain != 0) {
494 chain->forceVolume();
1495 // they are processed first and accumulated in chain inpu
58 EffectModule(ThreadBase *thread, const wp<AudioFlinger::EffectChain>& chain, effect_descriptor_t *desc, int id, audio_session_t sessionId) argument
[all...]
/frameworks/base/core/java/android/os/
H A DINetworkManagementService.aidl341 void setFirewallUidRule(int chain, int uid, int rule);
342 void setFirewallUidRules(int chain, in int[] uids, in int[] rules);
343 void setFirewallChainEnabled(int chain, boolean enable);
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/
H A DOSUSocketFactory.java229 public void checkClientTrusted(X509Certificate[] chain, String authType) argument
235 public void checkServerTrusted(X509Certificate[] chain, String authType) argument
237 Log.d("TLSOSU", "Checking " + chain.length + " certs.");
244 Arrays.asList(chain));
270 mTrustChain = chain;
274 mTrustChain = chain;
/frameworks/base/keystore/java/android/security/keystore/
H A DAndroidKeyStoreSpi.java74 * Credentials.USER_CERTIFICATE as the first certificate in the chain (the one
76 * entry which will have the rest of the chain concatenated in BER format.
272 public void engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain) argument
279 setPrivateKeyEntry(alias, (PrivateKey) key, chain, null);
340 private void setPrivateKeyEntry(String alias, PrivateKey key, Certificate[] chain, argument
361 // Make sure the chain exists since this is a PrivateKey
362 if ((chain == null) || (chain.length == 0)) {
366 // Do chain type checking.
367 X509Certificate[] x509chain = new X509Certificate[chain
738 engineSetKeyEntry(String alias, byte[] userKey, Certificate[] chain) argument
[all...]
H A DAndroidKeyStoreKeyPairGeneratorSpi.java492 // Very short certificate chain in the non-attestation case.
601 throw new ProviderException("Failed to generate attestation certificate chain",
604 Collection<byte[]> chain = outChain.getCertificates();
605 if (chain.size() < 2) {
606 throw new ProviderException("Attestation certificate chain contained "
607 + chain.size() + " entries. At least two are required.");
609 return chain;
/frameworks/base/core/java/android/security/
H A DIKeystoreService.aidl78 int attestKey(String alias, in KeymasterArguments params, out KeymasterCertificateChain chain);
/frameworks/native/vulkan/libvulkan/
H A Dapi.cpp522 // point head of chain to the driver
583 // point head of chain to the driver
597 // no need to and cannot chain non-global layers
651 // point head of chain to the first layer
655 // point tail of chain to the driver
675 // point head of chain to the first layer
681 // point tail of chain to the driver
773 // call down the chain
847 // call down the chain
1051 LayerChain chain(tru
[all...]
/frameworks/native/libs/input/
H A DInputTransport.cpp560 uint32_t chain = 0;
567 seqChain.chain = chain;
573 chain = msg.body.motion.seq;
577 *outSeq = chain;
824 // Send finished signals for the batch sequence chain first.
834 currentSeq = seqChain.chain;
845 // An error occurred so at least one signal was not sent, reconstruct the chain.
849 seqChain.chain = chainSeqs[chainIndex];
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/configparse/
H A DConfigBuilder.java144 Certificate[] chain = ks.getCertificateChain(alias);
145 if (chain != null) {
147 for (Certificate certificate : chain) {
149 Log.w(TAG, "Element in cert chain is not an X509Certificate: " +
290 throw new IOException("No certificate in chain matches supplied fingerprint");
/frameworks/base/services/core/java/com/android/server/net/
H A DNetworkPolicyManagerService.java309 /** Set of states for the child firewall chains. True if the chain is active. */
2568 private void updateRulesForWhitelistedPowerSaveLocked(boolean enabled, int chain, argument
2571 // Sync the whitelists before enabling the chain. We don't care about the rules if
2572 // we are disabling the chain.
2596 setUidFirewallRules(chain, uidRules);
2599 enableFirewallChainLocked(chain, enabled);
2613 private void updateRulesForWhitelistedPowerSaveLocked(int uid, boolean enabled, int chain) { argument
2617 setUidFirewallRule(chain, uid, FIREWALL_RULE_ALLOW);
2619 setUidFirewallRule(chain, uid, FIREWALL_RULE_DEFAULT);
2628 // Fully update the app idle firewall chain
3317 setUidFirewallRules(int chain, SparseIntArray uidRules) argument
3337 setUidFirewallRule(int chain, int uid, int rule) argument
3358 enableFirewallChainLocked(int chain, boolean enable) argument
[all...]
/frameworks/base/keystore/tests/src/android/security/keystore/
H A DAndroidKeyStoreTest.java1032 assertNotNull("Returned certificate chain should not be null", actual);
1033 assertEquals("Returned certificate chain should be correct size", expected.length,
1214 assertEquals("First certificate in chain should be user cert", expectedCert, actualChain[0]);
1217 assertEquals("Certificate chain should not include CAs", 1, actualChain.length);
1222 assertEquals("CA chain certificate should equal what we put in", it.next(),
1747 // Replace with PrivateKeyEntry that has no chain
1822 final Certificate[] chain = new Certificate[2];
1823 chain[0] = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_USER_1));
1824 chain[1] = caCert;
1827 mKeyStore.setKeyEntry(TEST_ALIAS_1, privKey, "foo".toCharArray(), chain);
[all...]

Completed in 766 milliseconds

12