Searched refs:chain (Results 1 - 16 of 16) sorted by relevance

/frameworks/base/core/java/android/net/http/
H A DX509TrustManagerExtensions.java53 * Verifies the given certificate chain.
56 * description of the chain and authType parameters. The final parameter, host, should be the
59 * @throws CertificateException if the chain does not verify correctly.
60 * @return the properly ordered chain used for verification as a list of X509Certificates.
62 public List<X509Certificate> checkServerTrusted(X509Certificate[] chain, String authType, argument
64 return mDelegate.checkServerTrusted(chain, authType, host);
H A DCertificateChainValidator.java43 * The singleton instance of the certificate chain validator
52 * @return The singleton instance of the certificates chain validator
59 * Creates a new certificate chain validator. This is a private constructor.
60 * If you need a Certificate chain validator, call getInstance().
66 * Notice a new chain will be rebuilt by tracing the issuer and subject
83 // retrieve the chain of the server peer certificates
105 * by Chromium HTTPS stack to validate the cert chain.
108 * @param authType The authentication type for the cert chain
116 throw new IllegalArgumentException("bad certificate chain");
146 * @param chain th
151 verifyServerDomainAndCertificates( X509Certificate[] chain, String domain, String authType) argument
[all...]
/frameworks/base/core/java/android/webkit/
H A DSslClientCertLookupTable.java47 public void Allow(String host_and_port, PrivateKey privateKey, byte[][] chain) { argument
49 certificateChains.put(host_and_port, chain);
H A DClientCertRequestHandler.java52 * Proceed with the specified private key and client certificate chain.
54 public void proceed(PrivateKey privateKey, X509Certificate[] chain) { argument
56 byte[][] chainBytes = NativeCrypto.encodeCertificates(chain);
79 * Proceed with the specified private key bytes and client certificate chain.
90 * Proceed with the specified private key context and client certificate chain.
/frameworks/base/core/tests/coretests/src/android/net/http/
H A DX509TrustManagerExtensionsTest.java34 public void checkClientTrusted(X509Certificate[] chain, String authType) {} argument
36 public void checkServerTrusted(X509Certificate[] chain, String authType) {} argument
/frameworks/base/keystore/java/android/security/
H A DAndroidKeyStore.java60 * Credentials.USER_CERTIFICATE as the first certificate in the chain (the one
62 * entry which will have the rest of the chain concatenated in BER format.
195 public void engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain) argument
202 setPrivateKeyEntry(alias, (PrivateKey) key, chain);
208 private void setPrivateKeyEntry(String alias, PrivateKey key, Certificate[] chain) argument
247 // Make sure the chain exists since this is a PrivateKey
248 if ((chain == null) || (chain.length == 0)) {
252 // Do chain type checking.
253 X509Certificate[] x509chain = new X509Certificate[chain
338 engineSetKeyEntry(String alias, byte[] userKey, Certificate[] chain) argument
[all...]
H A DKeyChain.java161 * private key and associated certificate chain will be installed.
324 * Returns the {@code X509Certificate} chain for the requested
327 * @param alias The alias of the desired certificate chain, typically
341 List<X509Certificate> chain = store
343 return chain.toArray(new X509Certificate[chain.size()]);
/frameworks/base/voip/jni/rtp/
H A DAudioGroup.cpp105 void encode(int tick, AudioStream *chain);
264 void AudioStream::encode(int tick, AudioStream *chain) argument
308 while (chain) {
309 if (chain != this) {
310 data |= chain->mix(buffer, tick - mInterval, tick, mSampleRate);
312 chain = chain->mNext;
698 for (AudioStream *chain = mChain; chain->mNext; chain
720 AudioStream *chain = mGroup->mChain; local
[all...]
/frameworks/base/tests/CoreTests/android/core/
H A DSSLSocketTest.java583 * chain it sees, so it can later be queried.
587 private X509Certificate[] chain; field in class:SSLSocketTest.TestTrustManager
591 public void checkClientTrusted(X509Certificate[] chain, String authType) { argument
592 this.chain = chain;
596 public void checkServerTrusted(X509Certificate[] chain, String authType) { argument
597 this.chain = chain;
606 return chain;
812 // Caution: The clientChain is the certificate chain fro
[all...]
/frameworks/av/services/audioflinger/
H A DAudioFlinger.cpp483 // check if an effect chain with the same session ID is present on another
508 // move effect chain to this output thread if an effect on same session was waiting
1334 sp<EffectChain> chain = mEffectChains[i]; local
1335 if (chain != 0) {
1336 chain->dump(fd, args);
1415 sp<EffectChain> chain = getEffectChain_l(sessionId); local
1416 if (chain != 0) {
1418 chain->setEffectSuspended_l(type, suspend);
1420 chain->setEffectSuspendedAll_l(suspend);
1427 void AudioFlinger::ThreadBase::checkSuspendOnAddEffectChain_l(const sp<EffectChain>& chain) argument
1535 sp<EffectChain> chain = getEffectChain_l(sessionId); local
1849 sp<EffectChain> chain = getEffectChain_l(sessionId); local
1960 sp<EffectChain> chain = getEffectChain_l(track->sessionId()); local
2001 sp<EffectChain> chain = getEffectChain_l(track->sessionId()); local
2920 sp<EffectChain> chain = getEffectChain_l(AUDIO_SESSION_OUTPUT_MIX); local
4739 sp<EffectChain> chain = srcThread->getEffectChain_l(AUDIO_SESSION_OUTPUT_MIX); local
7687 sp<EffectChain> chain = srcThread->getEffectChain_l(sessionId); local
7754 sp<EffectChain> chain; local
7863 sp<EffectChain> chain = getEffectChain_l(sessionId); local
7873 sp<EffectChain> chain = getEffectChain_l(sessionId); local
7915 sp<EffectChain> chain = effect->chain().promote(); local
7984 addEffectChain_l(const sp<EffectChain>& chain) argument
8046 removeEffectChain_l(const sp<EffectChain>& chain) argument
8120 addEffectChain_l(const sp<EffectChain>& chain) argument
8138 removeEffectChain_l(const sp<EffectChain>& chain) argument
8157 EffectModule(ThreadBase *thread, const wp<AudioFlinger::EffectChain>& chain, effect_descriptor_t *desc, int id, int sessionId) argument
8382 sp<EffectChain> chain = mChain.promote(); local
[all...]
H A DAudioFlinger.h605 // get effect chain corresponding to session Id.
609 // add an effect chain to the chain list (mEffectChains)
610 virtual status_t addEffectChain_l(const sp<EffectChain>& chain) = 0;
611 // remove an effect chain from the chain list (mEffectChains)
612 virtual size_t removeEffectChain_l(const sp<EffectChain>& chain) = 0;
625 // add and effect module. Also creates the effect chain is none exists for
628 // remove and effect module. Also removes the effect chain is this was the last
634 // chain, o
[all...]
/frameworks/base/libs/androidfw/
H A DInputTransport.cpp543 uint32_t chain = 0;
550 seqChain.chain = chain;
556 chain = msg.body.motion.seq;
560 *outSeq = chain;
802 // Send finished signals for the batch sequence chain first.
811 currentSeq = seqChain.chain;
821 // An error occurred so at least one signal was not sent, reconstruct the chain.
825 seqChain.chain = chainSeqs[chainIndex];
/frameworks/base/keystore/tests/src/android/security/
H A DAndroidKeyStoreTest.java717 assertNotNull("Returned certificate chain should not be null", actual);
718 assertEquals("Returned certificate chain should be correct size", expected.length,
817 assertEquals("First certificate in chain should be user cert", expectedCert, actualChain[0]);
820 assertEquals("Certificate chain should not include CAs", 1, actualChain.length);
825 assertEquals("CA chain certificate should equal what we put in", it.next(),
1185 // Replace with PrivateKeyEntry that has no chain
1256 final Certificate[] chain = new Certificate[2];
1257 chain[0] = f.generateCertificate(new ByteArrayInputStream(FAKE_USER_1));
1258 chain[1] = caCert;
1261 mKeyStore.setKeyEntry(TEST_ALIAS_1, privKey, "foo".toCharArray(), chain);
[all...]
/frameworks/base/include/androidfw/
H A DInputTransport.h406 // chain to individually finish all input messages that were part of the batch.
409 uint32_t chain; // sequence number of previous batched input message member in struct:android::InputConsumer::SeqChain
/frameworks/compile/mclinker/lib/Target/Mips/
H A DMipsLDBackend.cpp439 uint32_t* chain = (bucket + nbucket); local
449 chain[sym_idx] = bucket[bucket_pos];
/frameworks/compile/mclinker/lib/Target/
H A DGNULDBackend.cpp1055 uint32_t* chain = (bucket + nbucket); local
1066 chain[sym_idx] = bucket[bucket_pos];
1074 chain[sym_idx] = bucket[bucket_pos];

Completed in 599 milliseconds