/frameworks/base/core/java/android/webkit/ |
H A D | ClientCertRequest.java | 66 * Proceed with the specified private key and client certificate chain. 69 public abstract void proceed(PrivateKey privateKey, X509Certificate[] chain); argument
|
/frameworks/base/services/tests/servicestests/src/com/android/server/ |
H A D | NetworkManagementInternalTest.java | 98 // Dozable chain 104 // Powersaver chain 110 // Standby chain 127 BiFunction<Integer, Integer, String> errorMsg = (chain, state) -> { 128 return String.format("Unexpected value for chain: %s and state: %s", 129 valueToString(NetworkPolicyManager.class, "FIREWALL_CHAIN_", chain), 132 for (int chain : chains) { 133 final ArrayMap<Integer, Boolean> expectedValues = expected.get(chain); 134 mInjector.setFirewallChainState(chain, true); 136 mInjector.setFirewallRule(chain, TEST_UI [all...] |
/frameworks/base/core/java/android/security/net/config/ |
H A D | NetworkSecurityTrustManager.java | 67 public void checkClientTrusted(X509Certificate[] chain, String authType) argument 69 mDelegate.checkClientTrusted(chain, authType); 118 private void checkPins(List<X509Certificate> chain) throws CertificateException { argument 122 || !isPinningEnforced(chain)) { 128 for (int i = chain.size() - 1; i >= 0 ; i--) { 129 X509Certificate cert = chain.get(i); 151 private boolean isPinningEnforced(List<X509Certificate> chain) throws CertificateException { argument 152 if (chain.isEmpty()) { 155 X509Certificate anchorCert = chain.get(chain [all...] |
H A D | RootTrustManager.java | 51 public void checkClientTrusted(X509Certificate[] chain, String authType) argument 56 config.getTrustManager().checkClientTrusted(chain, authType);
|
/frameworks/base/core/tests/coretests/src/android/net/http/ |
H A D | X509TrustManagerExtensionsTest.java | 34 public void checkClientTrusted(X509Certificate[] chain, String authType) {} argument 36 public void checkServerTrusted(X509Certificate[] chain, String authType) {} argument
|
/frameworks/base/core/java/android/net/http/ |
H A D | X509TrustManagerExtensions.java | 88 * Verifies the given certificate chain. 91 * description of the chain and authType parameters. The final parameter, host, should be the 94 * @throws CertificateException if the chain does not verify correctly. 95 * @return the properly ordered chain used for verification as a list of X509Certificates. 97 public List<X509Certificate> checkServerTrusted(X509Certificate[] chain, String authType, argument 100 return mDelegate.checkServerTrusted(chain, authType, host); 103 return (List<X509Certificate>) mCheckServerTrusted.invoke(mTrustManager, chain, 122 * <p>Since {@link X509TrustManager#checkServerTrusted} may allow its parameter {@code chain} to 123 * chain up to user-added CA certificates, this method can be used to perform additional
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | NetworkManagementService.java | 272 /** Set of states for the child firewall chains. True if the chain is active. */ 524 // Sync the state of the given chain with the native daemon. 525 private void syncFirewallChainLocked(int chain, String name) { argument 528 final SparseIntArray uidFirewallRules = getUidFirewallRulesLR(chain); 532 // the specified chain. If we don't clear the rules, setFirewallUidRuleInternal 540 // chain. 544 setFirewallUidRuleLocked(chain, rules.keyAt(i), rules.valueAt(i)); 672 for (int chain : chains) { 673 if (getFirewallChainState(chain)) { 674 setFirewallChainEnabled(chain, tru 1965 closeSocketsForFirewallChainLocked(int chain, String chainName) argument 2030 setFirewallChainEnabled(int chain, boolean enable) argument 2075 getFirewallType(int chain) argument 2089 setFirewallUidRules(int chain, int[] uids, int[] rules) argument 2138 setFirewallUidRule(int chain, int uid, int rule) argument 2145 setFirewallUidRuleLocked(int chain, int uid, int rule) argument 2157 updateFirewallUidRuleLocked(int chain, int uid, int rule) argument 2184 getFirewallRuleName(int chain, int rule) argument 2202 getUidFirewallRulesLR(int chain) argument 2217 getFirewallChainName(int chain) argument 2621 setFirewallChainState(int chain, boolean state) argument 2627 getFirewallChainState(int chain) argument 2678 setFirewallChainState(int chain, boolean state) argument 2682 setFirewallRule(int chain, int uid, int rule) argument [all...] |
/frameworks/av/services/audioflinger/ |
H A D | Threads.cpp | 865 sp<EffectChain> chain = mEffectChains[i]; local 866 if (chain != 0) { 867 chain->dump(fd, args); 1008 sp<EffectChain> chain = getEffectChain_l(sessionId); local 1009 if (chain != 0) { 1011 chain->setEffectSuspended_l(type, suspend); 1013 chain->setEffectSuspendedAll_l(suspend); 1020 void AudioFlinger::ThreadBase::checkSuspendOnAddEffectChain_l(const sp<EffectChain>& chain) argument 1022 ssize_t index = mSuspendedSessions.indexOfKey(chain->sessionId()); 1034 chain 1128 sp<EffectChain> chain = getEffectChain_l(sessionId); local 1286 sp<EffectChain> chain; local 1411 sp<EffectChain> chain = getEffectChain_l(sessionId); local 1421 sp<EffectChain> chain = getEffectChain_l(sessionId); local 1469 sp<EffectChain> chain = effect->chain().promote(); local 1901 sp<EffectChain> chain = getEffectChain_l(session); local 2036 sp<EffectChain> chain = getEffectChain_l(sessionId); local 2177 sp<EffectChain> chain = getEffectChain_l(track->sessionId()); local 2230 sp<EffectChain> chain = getEffectChain_l(track->sessionId()); local 2784 addEffectChain_l(const sp<EffectChain>& chain) argument 2859 removeEffectChain_l(const sp<EffectChain>& chain) argument 3405 sp<EffectChain> chain = getEffectChain_l(track->sessionId()); local 4022 sp<EffectChain> chain = getEffectChain_l(AUDIO_SESSION_OUTPUT_MIX); local 6633 sp<EffectChain> chain = getEffectChain_l(sessionId); local 7339 addEffectChain_l(const sp<EffectChain>& chain) argument 7362 removeEffectChain_l(const sp<EffectChain>& chain) argument 7698 sp<EffectChain> chain = getEffectChain_l(sessionId); local 7747 sp<EffectChain> chain = getEffectChain_l(track->sessionId()); local 8026 addEffectChain_l(const sp<EffectChain>& chain) argument 8050 removeEffectChain_l(const sp<EffectChain>& chain) argument [all...] |
H A D | Effects.h | 46 const wp<AudioFlinger::EffectChain>& chain, 97 void setChain(const wp<EffectChain>& chain) { mChain = chain; } argument 107 wp<EffectChain>& chain() { return mChain; } function in class:EffectModule 154 wp<EffectChain> mChain; // parent effect chain 259 // Effects in this chain can be insert or auxiliary. Effects in other chains (attached to 347 // At least one non offloadable effect in the chain is enabled 402 sp<EffectBufferHalInterface> mInBuffer; // chain input buffer 403 sp<EffectBufferHalInterface> mOutBuffer; // chain output buffer 416 uint32_t mStrategy; // strategy for this effect chain [all...] |
H A D | AudioFlinger.cpp | 724 // check if an effect chain with the same session ID is present on another 751 // move effect chain to this output thread if an effect on same session was waiting 1682 // Check if one effect chain was awaiting for an AudioRecord to be created on this 1684 sp<EffectChain> chain = getOrphanEffectChain_l(lSessionId); local 1685 if (chain != 0) { 1687 thread->addEffectChain_l(chain); 2397 // on at least one effect. We must either move the chain to an existing thread with the 2400 sp<EffectChain> chain; local 2404 // Note: maximum one chain per record thread 2406 chain 3038 sp<EffectChain> chain = getOrphanEffectChain_l(sessionId); local 3101 sp<EffectChain> chain = srcThread->getEffectChain_l(sessionId); local 3214 putOrphanEffectChain_l(const sp<AudioFlinger::EffectChain>& chain) argument 3229 sp<EffectChain> chain; local 3246 sp<EffectChain> chain = mOrphanEffectChains.valueAt(index); local [all...] |
H A D | Threads.h | 318 // get effect chain corresponding to session Id. 322 // add an effect chain to the chain list (mEffectChains) 323 virtual status_t addEffectChain_l(const sp<EffectChain>& chain) = 0; 324 // remove an effect chain from the chain list (mEffectChains) 325 virtual size_t removeEffectChain_l(const sp<EffectChain>& chain) = 0; 340 // add and effect module. Also creates the effect chain is none exists for 343 // remove and effect module. Also removes the effect chain is this was the last 351 // - EFFECT_SESSION if effects on this audio session exist in one chain [all...] |
/frameworks/base/core/java/android/os/ |
H A D | INetworkManagementService.aidl | 320 void setFirewallUidRule(int chain, int uid, int rule); 321 void setFirewallUidRules(int chain, in int[] uids, in int[] rules); 322 void setFirewallChainEnabled(int chain, boolean enable);
|
/frameworks/base/core/java/android/util/jar/ |
H A D | StrictJarFile.java | 189 for (Certificate[] chain : certChains) { 190 count += chain.length; 196 for (Certificate[] chain : certChains) { 197 System.arraycopy(chain, 0, certs, i, chain.length); 198 i += chain.length;
|
/frameworks/base/keystore/java/android/security/ |
H A D | KeyChain.java | 179 * private key and associated certificate chain will be installed. 451 * Returns the {@code X509Certificate} chain for the requested 454 * <strong>Note:</strong> If a certificate chain was explicitly specified when the alias was 455 * installed, this method will return that chain. If only the client certificate was specified 456 * at the installation time, this method will try to build a certificate chain using all 465 * @param alias The alias of the desired certificate chain, typically 495 // If the keypair is installed with a certificate chain by either 496 // DevicePolicyManager.installKeyPair or CertInstaller, return that chain. 498 Collection<X509Certificate> chain = toCertificates(certChainBytes); 499 ArrayList<X509Certificate> fullChain = new ArrayList<>(chain [all...] |
/frameworks/opt/net/voip/src/jni/rtp/ |
H A D | AudioGroup.cpp | 107 void encode(int tick, AudioStream *chain); 266 void AudioStream::encode(int tick, AudioStream *chain) argument 310 while (chain) { 311 if (chain != this) { 312 data |= chain->mix(buffer, tick - mInterval, tick, mSampleRate); 314 chain = chain->mNext; 703 for (AudioStream *chain = mChain; chain->mNext; chain 725 AudioStream *chain = mGroup->mChain; local [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | Signature.java | 57 * Create signature from a certificate chain. Used for backward 181 * Used for compatibility code that needs to check the certificate chain 192 Signature[] chain = new Signature[1 + mCertificateChain.length]; 193 chain[0] = this; 197 chain[i++] = new Signature(c.getEncoded()); 200 return chain;
|
/frameworks/base/core/java/android/security/ |
H A D | IKeystoreService.aidl | 78 int attestKey(String alias, in KeymasterArguments params, out KeymasterCertificateChain chain); 79 int attestDeviceIds(in KeymasterArguments params, out KeymasterCertificateChain chain);
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
H A D | OSUSocketFactory.java | 232 public void checkClientTrusted(X509Certificate[] chain, String authType) argument 238 public void checkServerTrusted(X509Certificate[] chain, String authType) argument 240 Log.d("TLSOSU", "Checking " + chain.length + " certs."); 247 Arrays.asList(chain)); 274 mTrustChain = chain; 278 mTrustChain = chain;
|
/frameworks/av/media/libstagefright/codec2/include/ |
H A D | C2Work.h | 121 * The chain of components and associated allocators, tunings and info requests that the data 123 * components of the worklet chain must have been (successfully) pre-registered at the time 140 // pre-chain infos (for portions of a tunneling chain that happend before this work-chain for 155 std::list<node_id> chain; member in struct:android::C2WorkOutline
|
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | AndroidKeyStoreSpi.java | 74 * Credentials.USER_CERTIFICATE as the first certificate in the chain (the one 76 * entry which will have the rest of the chain concatenated in BER format. 272 public void engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain) argument 279 setPrivateKeyEntry(alias, (PrivateKey) key, chain, null); 340 private void setPrivateKeyEntry(String alias, PrivateKey key, Certificate[] chain, argument 364 // Make sure the chain exists since this is a PrivateKey 365 if ((chain == null) || (chain.length == 0)) { 369 // Do chain type checking. 370 X509Certificate[] x509chain = new X509Certificate[chain 747 engineSetKeyEntry(String alias, byte[] userKey, Certificate[] chain) argument [all...] |
H A D | AndroidKeyStoreKeyPairGeneratorSpi.java | 494 // Very short certificate chain in the non-attestation case. 604 throw new ProviderException("Failed to generate attestation certificate chain", 607 Collection<byte[]> chain = outChain.getCertificates(); 608 if (chain.size() < 2) { 609 throw new ProviderException("Attestation certificate chain contained " 610 + chain.size() + " entries. At least two are required."); 612 return chain;
|
/frameworks/base/wifi/java/android/net/wifi/hotspot2/ |
H A D | ConfigParser.java | 130 * [base64 encoded PKCS#12 ASN.1 structure containing client certificate chain] 136 * certificate chain (optional). 195 // Parse PKCS12 data for client private key and certificate chain. 455 // Only expects one set of key and certificate chain. 467 Certificate[] chain = ks.getCertificateChain(alias); 468 if (chain != null) { 470 for (Certificate certificate : chain) {
|
/frameworks/native/vulkan/libvulkan/ |
H A D | api.cpp | 524 // point head of chain to the driver 585 // point head of chain to the driver 599 // no need to and cannot chain non-global layers 653 // point head of chain to the first layer 657 // point tail of chain to the driver 677 // point head of chain to the first layer 683 // point tail of chain to the driver 775 // call down the chain 849 // call down the chain 1054 LayerChain chain(tru [all...] |
/frameworks/native/libs/input/ |
H A D | InputTransport.cpp | 559 uint32_t chain = 0; 566 seqChain.chain = chain; 572 chain = msg.body.motion.seq; 576 *outSeq = chain; 823 // Send finished signals for the batch sequence chain first. 833 currentSeq = seqChain.chain; 844 // An error occurred so at least one signal was not sent, reconstruct the chain. 848 seqChain.chain = chainSeqs[chainIndex];
|
/frameworks/base/services/core/java/com/android/server/net/ |
H A D | NetworkPolicyManagerService.java | 378 /** Set of states for the child firewall chains. True if the chain is active. */ 2872 private void updateRulesForWhitelistedPowerSaveUL(boolean enabled, int chain, argument 2875 // Sync the whitelists before enabling the chain. We don't care about the rules if 2876 // we are disabling the chain. 2884 if (chain == FIREWALL_CHAIN_POWERSAVE) { 2894 setUidFirewallRulesAsync(chain, uidRules, CHAIN_TOGGLE_ENABLE); 2896 setUidFirewallRulesAsync(chain, null, CHAIN_TOGGLE_DISABLE); 2928 private void updateRulesForWhitelistedPowerSaveUL(int uid, boolean enabled, int chain) { argument 2931 chain == FIREWALL_CHAIN_DOZABLE); 2933 setUidFirewallRule(chain, ui 3817 setUidFirewallRulesAsync(int chain, @Nullable SparseIntArray uidRules, @ChainToggleType int toggle) argument 3827 setUidFirewallRules(int chain, SparseIntArray uidRules) argument 3847 setUidFirewallRule(int chain, int uid, int rule) argument 3876 enableFirewallChainUL(int chain, boolean enable) argument [all...] |