/frameworks/base/core/java/android/net/http/ |
H A D | X509TrustManagerExtensions.java | 53 * Verifies the given certificate chain. 56 * description of the chain and authType parameters. The final parameter, host, should be the 59 * @throws CertificateException if the chain does not verify correctly. 60 * @return the properly ordered chain used for verification as a list of X509Certificates. 62 public List<X509Certificate> checkServerTrusted(X509Certificate[] chain, String authType, argument 64 return mDelegate.checkServerTrusted(chain, authType, host);
|
H A D | CertificateChainValidator.java | 43 * The singleton instance of the certificate chain validator 52 * @return The singleton instance of the certificates chain validator 59 * Creates a new certificate chain validator. This is a private constructor. 60 * If you need a Certificate chain validator, call getInstance(). 66 * Notice a new chain will be rebuilt by tracing the issuer and subject 83 // retrieve the chain of the server peer certificates 105 * by Chromium HTTPS stack to validate the cert chain. 108 * @param authType The authentication type for the cert chain 116 throw new IllegalArgumentException("bad certificate chain"); 146 * @param chain th 151 verifyServerDomainAndCertificates( X509Certificate[] chain, String domain, String authType) argument [all...] |
/frameworks/base/core/java/android/webkit/ |
H A D | SslClientCertLookupTable.java | 47 public void Allow(String host_and_port, PrivateKey privateKey, byte[][] chain) { argument 49 certificateChains.put(host_and_port, chain);
|
H A D | ClientCertRequestHandler.java | 52 * Proceed with the specified private key and client certificate chain. 54 public void proceed(PrivateKey privateKey, X509Certificate[] chain) { argument 56 byte[][] chainBytes = NativeCrypto.encodeCertificates(chain); 79 * Proceed with the specified private key bytes and client certificate chain. 90 * Proceed with the specified private key context and client certificate chain.
|
/frameworks/base/core/tests/coretests/src/android/net/http/ |
H A D | X509TrustManagerExtensionsTest.java | 34 public void checkClientTrusted(X509Certificate[] chain, String authType) {} argument 36 public void checkServerTrusted(X509Certificate[] chain, String authType) {} argument
|
/frameworks/base/keystore/java/android/security/ |
H A D | AndroidKeyStore.java | 60 * Credentials.USER_CERTIFICATE as the first certificate in the chain (the one 62 * entry which will have the rest of the chain concatenated in BER format. 195 public void engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain) argument 202 setPrivateKeyEntry(alias, (PrivateKey) key, chain); 208 private void setPrivateKeyEntry(String alias, PrivateKey key, Certificate[] chain) argument 247 // Make sure the chain exists since this is a PrivateKey 248 if ((chain == null) || (chain.length == 0)) { 252 // Do chain type checking. 253 X509Certificate[] x509chain = new X509Certificate[chain 338 engineSetKeyEntry(String alias, byte[] userKey, Certificate[] chain) argument [all...] |
H A D | KeyChain.java | 161 * private key and associated certificate chain will be installed. 324 * Returns the {@code X509Certificate} chain for the requested 327 * @param alias The alias of the desired certificate chain, typically 341 List<X509Certificate> chain = store 343 return chain.toArray(new X509Certificate[chain.size()]);
|
/frameworks/base/voip/jni/rtp/ |
H A D | AudioGroup.cpp | 105 void encode(int tick, AudioStream *chain); 264 void AudioStream::encode(int tick, AudioStream *chain) argument 308 while (chain) { 309 if (chain != this) { 310 data |= chain->mix(buffer, tick - mInterval, tick, mSampleRate); 312 chain = chain->mNext; 698 for (AudioStream *chain = mChain; chain->mNext; chain 720 AudioStream *chain = mGroup->mChain; local [all...] |
/frameworks/base/tests/CoreTests/android/core/ |
H A D | SSLSocketTest.java | 583 * chain it sees, so it can later be queried. 587 private X509Certificate[] chain; field in class:SSLSocketTest.TestTrustManager 591 public void checkClientTrusted(X509Certificate[] chain, String authType) { argument 592 this.chain = chain; 596 public void checkServerTrusted(X509Certificate[] chain, String authType) { argument 597 this.chain = chain; 606 return chain; 812 // Caution: The clientChain is the certificate chain fro [all...] |
/frameworks/av/services/audioflinger/ |
H A D | AudioFlinger.cpp | 483 // check if an effect chain with the same session ID is present on another 508 // move effect chain to this output thread if an effect on same session was waiting 1334 sp<EffectChain> chain = mEffectChains[i]; local 1335 if (chain != 0) { 1336 chain->dump(fd, args); 1415 sp<EffectChain> chain = getEffectChain_l(sessionId); local 1416 if (chain != 0) { 1418 chain->setEffectSuspended_l(type, suspend); 1420 chain->setEffectSuspendedAll_l(suspend); 1427 void AudioFlinger::ThreadBase::checkSuspendOnAddEffectChain_l(const sp<EffectChain>& chain) argument 1535 sp<EffectChain> chain = getEffectChain_l(sessionId); local 1849 sp<EffectChain> chain = getEffectChain_l(sessionId); local 1960 sp<EffectChain> chain = getEffectChain_l(track->sessionId()); local 2001 sp<EffectChain> chain = getEffectChain_l(track->sessionId()); local 2920 sp<EffectChain> chain = getEffectChain_l(AUDIO_SESSION_OUTPUT_MIX); local 4739 sp<EffectChain> chain = srcThread->getEffectChain_l(AUDIO_SESSION_OUTPUT_MIX); local 7687 sp<EffectChain> chain = srcThread->getEffectChain_l(sessionId); local 7754 sp<EffectChain> chain; local 7863 sp<EffectChain> chain = getEffectChain_l(sessionId); local 7873 sp<EffectChain> chain = getEffectChain_l(sessionId); local 7915 sp<EffectChain> chain = effect->chain().promote(); local 7984 addEffectChain_l(const sp<EffectChain>& chain) argument 8046 removeEffectChain_l(const sp<EffectChain>& chain) argument 8120 addEffectChain_l(const sp<EffectChain>& chain) argument 8138 removeEffectChain_l(const sp<EffectChain>& chain) argument 8157 EffectModule(ThreadBase *thread, const wp<AudioFlinger::EffectChain>& chain, effect_descriptor_t *desc, int id, int sessionId) argument 8382 sp<EffectChain> chain = mChain.promote(); local [all...] |
H A D | AudioFlinger.h | 605 // get effect chain corresponding to session Id. 609 // add an effect chain to the chain list (mEffectChains) 610 virtual status_t addEffectChain_l(const sp<EffectChain>& chain) = 0; 611 // remove an effect chain from the chain list (mEffectChains) 612 virtual size_t removeEffectChain_l(const sp<EffectChain>& chain) = 0; 625 // add and effect module. Also creates the effect chain is none exists for 628 // remove and effect module. Also removes the effect chain is this was the last 634 // chain, o [all...] |
/frameworks/base/libs/androidfw/ |
H A D | InputTransport.cpp | 543 uint32_t chain = 0; 550 seqChain.chain = chain; 556 chain = msg.body.motion.seq; 560 *outSeq = chain; 802 // Send finished signals for the batch sequence chain first. 811 currentSeq = seqChain.chain; 821 // An error occurred so at least one signal was not sent, reconstruct the chain. 825 seqChain.chain = chainSeqs[chainIndex];
|
/frameworks/base/keystore/tests/src/android/security/ |
H A D | AndroidKeyStoreTest.java | 717 assertNotNull("Returned certificate chain should not be null", actual); 718 assertEquals("Returned certificate chain should be correct size", expected.length, 817 assertEquals("First certificate in chain should be user cert", expectedCert, actualChain[0]); 820 assertEquals("Certificate chain should not include CAs", 1, actualChain.length); 825 assertEquals("CA chain certificate should equal what we put in", it.next(), 1185 // Replace with PrivateKeyEntry that has no chain 1256 final Certificate[] chain = new Certificate[2]; 1257 chain[0] = f.generateCertificate(new ByteArrayInputStream(FAKE_USER_1)); 1258 chain[1] = caCert; 1261 mKeyStore.setKeyEntry(TEST_ALIAS_1, privKey, "foo".toCharArray(), chain); [all...] |
/frameworks/base/include/androidfw/ |
H A D | InputTransport.h | 406 // chain to individually finish all input messages that were part of the batch. 409 uint32_t chain; // sequence number of previous batched input message member in struct:android::InputConsumer::SeqChain
|
/frameworks/compile/mclinker/lib/Target/Mips/ |
H A D | MipsLDBackend.cpp | 439 uint32_t* chain = (bucket + nbucket); local 449 chain[sym_idx] = bucket[bucket_pos];
|
/frameworks/compile/mclinker/lib/Target/ |
H A D | GNULDBackend.cpp | 1055 uint32_t* chain = (bucket + nbucket); local 1066 chain[sym_idx] = bucket[bucket_pos]; 1074 chain[sym_idx] = bucket[bucket_pos];
|