Searched refs:chain (Results 1 - 25 of 39) sorted by relevance

12

/frameworks/base/tools/aapt2/filter/
H A DFilter_test.cpp29 FilterChain chain; local
30 ASSERT_TRUE(chain.Keep("some/random/path"));
32 chain.AddFilter(util::make_unique<PrefixFilter>("keep/"));
34 ASSERT_FALSE(chain.Keep("removed/path"));
35 ASSERT_TRUE(chain.Keep("keep/path/1"));
36 ASSERT_TRUE(chain.Keep("keep/path/2"));
38 chain.AddFilter(util::make_unique<PrefixFilter>("keep/"));
39 chain.AddFilter(util::make_unique<PrefixFilter>("keep/really/"));
41 ASSERT_FALSE(chain.Keep("removed/path"));
42 ASSERT_FALSE(chain
[all...]
/frameworks/base/core/java/android/webkit/
H A DClientCertRequest.java70 * Proceed with the specified private key and client certificate chain.
73 public abstract void proceed(PrivateKey privateKey, X509Certificate[] chain); argument
/frameworks/base/services/tests/servicestests/src/com/android/server/
H A DNetworkManagementInternalTest.java98 // Dozable chain
104 // Powersaver chain
110 // Standby chain
127 BiFunction<Integer, Integer, String> errorMsg = (chain, state) -> {
128 return String.format("Unexpected value for chain: %s and state: %s",
129 valueToString(NetworkPolicyManager.class, "FIREWALL_CHAIN_", chain),
132 for (int chain : chains) {
133 final ArrayMap<Integer, Boolean> expectedValues = expected.get(chain);
134 mInjector.setFirewallChainState(chain, true);
136 mInjector.setFirewallRule(chain, TEST_UI
[all...]
/frameworks/base/core/java/android/security/net/config/
H A DNetworkSecurityTrustManager.java67 public void checkClientTrusted(X509Certificate[] chain, String authType) argument
69 mDelegate.checkClientTrusted(chain, authType);
118 private void checkPins(List<X509Certificate> chain) throws CertificateException { argument
122 || !isPinningEnforced(chain)) {
128 for (int i = chain.size() - 1; i >= 0 ; i--) {
129 X509Certificate cert = chain.get(i);
151 private boolean isPinningEnforced(List<X509Certificate> chain) throws CertificateException { argument
152 if (chain.isEmpty()) {
155 X509Certificate anchorCert = chain.get(chain
[all...]
H A DRootTrustManager.java51 public void checkClientTrusted(X509Certificate[] chain, String authType) argument
56 config.getTrustManager().checkClientTrusted(chain, authType);
/frameworks/base/core/tests/coretests/src/android/net/http/
H A DX509TrustManagerExtensionsTest.java34 public void checkClientTrusted(X509Certificate[] chain, String authType) {} argument
36 public void checkServerTrusted(X509Certificate[] chain, String authType) {} argument
/frameworks/base/services/core/java/com/android/server/net/
H A DNetworkPolicyLogger.java161 void uidFirewallRuleChanged(int chain, int uid, int rule) { argument
163 if (LOGV) Slog.v(TAG, getUidFirewallRuleChangedLog(chain, uid, rule));
164 mEventsBuffer.uidFirewallRuleChanged(chain, uid, rule);
168 void firewallChainEnabled(int chain, boolean enabled) { argument
170 if (LOGD) Slog.d(TAG, getFirewallChainEnabledLog(chain, enabled));
171 mEventsBuffer.firewallChainEnabled(chain, enabled);
175 void firewallRulesChanged(int chain, int[] uids, int[] rules) { argument
177 final String log = "Firewall rules changed for " + getFirewallChainName(chain)
269 private static String getUidFirewallRuleChangedLog(int chain, int uid, int rule) { argument
271 uid, getFirewallChainName(chain), getFirewallRuleNam
274 getFirewallChainEnabledLog(int chain, boolean enabled) argument
278 getFirewallChainName(int chain) argument
432 uidFirewallRuleChanged(int chain, int uid, int rule) argument
444 firewallChainEnabled(int chain, boolean enabled) argument
[all...]
/frameworks/base/core/java/android/net/http/
H A DX509TrustManagerExtensions.java87 * Verifies the given certificate chain.
90 * description of the chain and authType parameters. The final parameter, host, should be the
93 * @throws CertificateException if the chain does not verify correctly.
94 * @return the properly ordered chain used for verification as a list of X509Certificates.
96 public List<X509Certificate> checkServerTrusted(X509Certificate[] chain, String authType, argument
99 return mDelegate.checkServerTrusted(chain, authType, host);
102 return (List<X509Certificate>) mCheckServerTrusted.invoke(mTrustManager, chain,
121 * <p>Since {@link X509TrustManager#checkServerTrusted} may allow its parameter {@code chain} to
122 * chain up to user-added CA certificates, this method can be used to perform additional
/frameworks/base/tools/aapt2/optimize/
H A DMultiApkGenerator.h56 FilterChain* chain);
H A DMultiApkGenerator_test.cpp109 FilterChain chain; local
115 generator.FilterTable(ctx.get(), artifact, *apk.GetResourceTable(), &chain);
136 FilterChain chain; local
142 generator.FilterTable(ctx.get(), artifact, *apk.GetResourceTable(), &chain);
161 FilterChain chain; local
167 generator.FilterTable(ctx.get(), artifact, *apk.GetResourceTable(), &chain);
/frameworks/base/services/core/java/com/android/server/
H A DNetworkManagementService.java296 /** Set of states for the child firewall chains. True if the chain is active. */
587 // Sync the state of the given chain with the native daemon.
588 private void syncFirewallChainLocked(int chain, String name) { argument
591 final SparseIntArray uidFirewallRules = getUidFirewallRulesLR(chain);
595 // the specified chain. If we don't clear the rules, setFirewallUidRuleInternal
603 // chain.
607 setFirewallUidRuleLocked(chain, rules.keyAt(i), rules.valueAt(i));
722 for (int chain : chains) {
723 if (getFirewallChainState(chain)) {
724 setFirewallChainEnabled(chain, tru
2032 closeSocketsForFirewallChainLocked(int chain, String chainName) argument
2097 setFirewallChainEnabled(int chain, boolean enable) argument
2142 getFirewallType(int chain) argument
2156 setFirewallUidRules(int chain, int[] uids, int[] rules) argument
2205 setFirewallUidRule(int chain, int uid, int rule) argument
2212 setFirewallUidRuleLocked(int chain, int uid, int rule) argument
2224 updateFirewallUidRuleLocked(int chain, int uid, int rule) argument
2251 getFirewallRuleName(int chain, int rule) argument
2269 getUidFirewallRulesLR(int chain) argument
2284 getFirewallChainName(int chain) argument
2728 setFirewallChainState(int chain, boolean state) argument
2734 getFirewallChainState(int chain) argument
2759 setFirewallChainState(int chain, boolean state) argument
2763 setFirewallRule(int chain, int uid, int rule) argument
[all...]
/frameworks/base/tools/locked_region_code_injection/src/lockedregioncodeinjection/
H A DLockFindingClassVisitor.java52 public LockFindingClassVisitor(List<LockTarget> targets, ClassVisitor chain) { argument
53 super(Utils.ASM_VERSION, chain);
62 MethodVisitor chain = super.visitMethod(access, name, desc, signature, exceptions);
63 return new LockFindingMethodVisitor(this.className, mn, chain);
75 private MethodVisitor chain; field in class:LockFindingClassVisitor.LockFindingMethodVisitor
77 public LockFindingMethodVisitor(String owner, MethodNode mn, MethodVisitor chain) { argument
81 this.chain = chain;
182 mn.accept(chain);
/frameworks/av/services/audioflinger/
H A DThreads.cpp864 sp<EffectChain> chain = mEffectChains[i]; local
865 if (chain != 0) {
866 chain->dump(fd, args);
1000 sp<EffectChain> chain = getEffectChain_l(sessionId); local
1001 if (chain != 0) {
1003 chain->setEffectSuspended_l(type, suspend);
1005 chain->setEffectSuspendedAll_l(suspend);
1012 void AudioFlinger::ThreadBase::checkSuspendOnAddEffectChain_l(const sp<EffectChain>& chain) argument
1014 ssize_t index = mSuspendedSessions.indexOfKey(chain->sessionId());
1026 chain
1120 sp<EffectChain> chain = getEffectChain_l(sessionId); local
1283 sp<EffectChain> chain; local
1408 sp<EffectChain> chain = getEffectChain_l(sessionId); local
1418 sp<EffectChain> chain = getEffectChain_l(sessionId); local
1467 sp<EffectChain> chain = effect->chain().promote(); local
1939 sp<EffectChain> chain = getEffectChain_l(session); local
2153 sp<EffectChain> chain = getEffectChain_l(sessionId); local
2341 sp<EffectChain> chain = getEffectChain_l(track->sessionId()); local
2387 sp<EffectChain> chain = getEffectChain_l(track->sessionId()); local
2971 addEffectChain_l(const sp<EffectChain>& chain) argument
3049 removeEffectChain_l(const sp<EffectChain>& chain) argument
3609 sp<EffectChain> chain = getEffectChain_l(track->sessionId()); local
4245 sp<EffectChain> chain = getEffectChain_l(AUDIO_SESSION_OUTPUT_MIX); local
6982 sp<EffectChain> chain = getEffectChain_l(sessionId); local
7750 addEffectChain_l(const sp<EffectChain>& chain) argument
7773 removeEffectChain_l(const sp<EffectChain>& chain) argument
8115 sp<EffectChain> chain = getEffectChain_l(mSessionId); local
8168 sp<EffectChain> chain = getEffectChain_l(track->sessionId()); local
8471 addEffectChain_l(const sp<EffectChain>& chain) argument
8495 removeEffectChain_l(const sp<EffectChain>& chain) argument
[all...]
H A DEffects.h46 const wp<AudioFlinger::EffectChain>& chain,
97 void setChain(const wp<EffectChain>& chain) { mChain = chain; } argument
107 wp<EffectChain>& chain() { return mChain; } function in class:EffectModule
153 wp<EffectChain> mChain; // parent effect chain
265 // Effects in this chain can be insert or auxiliary. Effects in other chains (attached to
354 // At least one non offloadable effect in the chain is enabled
410 sp<EffectBufferHalInterface> mInBuffer; // chain input buffer
411 sp<EffectBufferHalInterface> mOutBuffer; // chain output buffer
424 uint32_t mStrategy; // strategy for this effect chain
[all...]
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/
H A DOsuServerConnection.java156 public void checkClientTrusted(X509Certificate[] chain, String authType) argument
164 public void checkServerTrusted(X509Certificate[] chain, String authType) argument
172 mServerCerts = mDelegate.getTrustedChainForServer(chain, authType,
/frameworks/base/core/java/android/util/jar/
H A DStrictJarFile.java189 for (Certificate[] chain : certChains) {
190 count += chain.length;
196 for (Certificate[] chain : certChains) {
197 System.arraycopy(chain, 0, certs, i, chain.length);
198 i += chain.length;
/frameworks/base/keystore/java/android/security/
H A DIKeyChainService.aidl38 out KeymasterCertificateChain chain);
H A DKeyChain.java180 * private key and associated certificate chain will be installed.
548 * Returns the {@code X509Certificate} chain for the requested
551 * <strong>Note:</strong> If a certificate chain was explicitly specified when the alias was
552 * installed, this method will return that chain. If only the client certificate was specified
553 * at the installation time, this method will try to build a certificate chain using all
562 * @param alias The alias of the desired certificate chain, typically
592 // If the keypair is installed with a certificate chain by either
593 // DevicePolicyManager.installKeyPair or CertInstaller, return that chain.
595 Collection<X509Certificate> chain = toCertificates(certChainBytes);
596 ArrayList<X509Certificate> fullChain = new ArrayList<>(chain
[all...]
/frameworks/opt/net/voip/src/jni/rtp/
H A DAudioGroup.cpp107 void encode(int tick, AudioStream *chain);
266 void AudioStream::encode(int tick, AudioStream *chain) argument
310 while (chain) {
311 if (chain != this) {
312 data |= chain->mix(buffer, tick - mInterval, tick, mSampleRate);
314 chain = chain->mNext;
703 for (AudioStream *chain = mChain; chain->mNext; chain
725 AudioStream *chain = mGroup->mChain; local
[all...]
/frameworks/base/core/java/android/content/pm/
H A DSignature.java57 * Create signature from a certificate chain. Used for backward
181 * Used for compatibility code that needs to check the certificate chain
192 Signature[] chain = new Signature[1 + mCertificateChain.length];
193 chain[0] = this;
197 chain[i++] = new Signature(c.getEncoded());
200 return chain;
/frameworks/base/core/java/android/os/
H A DINetworkManagementService.aidl350 void setFirewallUidRule(int chain, int uid, int rule);
351 void setFirewallUidRules(int chain, in int[] uids, in int[] rules);
352 void setFirewallChainEnabled(int chain, boolean enable);
/frameworks/base/keystore/java/android/security/keystore/
H A DAndroidKeyStoreSpi.java77 * Credentials.USER_CERTIFICATE as the first certificate in the chain (the one
79 * entry which will have the rest of the chain concatenated in BER format.
271 public void engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain) argument
278 setPrivateKeyEntry(alias, (PrivateKey) key, chain, null);
339 private void setPrivateKeyEntry(String alias, PrivateKey key, Certificate[] chain, argument
367 // Make sure the chain exists since this is a PrivateKey
368 if ((chain == null) || (chain.length == 0)) {
372 // Do chain type checking.
373 X509Certificate[] x509chain = new X509Certificate[chain
832 engineSetKeyEntry(String alias, byte[] userKey, Certificate[] chain) argument
[all...]
H A DAttestationUtils.java83 // Extract certificate chain.
86 throw new KeyAttestationException("Attestation certificate chain contained "
98 throw new KeyAttestationException("Unable to construct certificate chain", e);
185 * Performs attestation of the device's identifiers. This method returns a certificate chain
188 * If the device supports attestation in secure hardware, the chain will be rooted at a
189 * trustworthy CA key. Otherwise, the chain will be rooted at an untrusted certificate. See
207 * @return a certificate chain containing the requested device identifiers in the first element
236 * Returns true if the attestation chain provided is a valid key attestation chain.
239 public static boolean isChainValid(KeymasterCertificateChain chain) { argument
[all...]
/frameworks/base/wifi/java/android/net/wifi/hotspot2/
H A DConfigParser.java130 * [base64 encoded PKCS#12 ASN.1 structure containing client certificate chain]
136 * certificate chain (optional).
195 // Parse PKCS12 data for client private key and certificate chain.
455 // Only expects one set of key and certificate chain.
467 Certificate[] chain = ks.getCertificateChain(alias);
468 if (chain != null) {
470 for (Certificate certificate : chain) {
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/
H A DBaseIDevicePolicyManager.java86 byte[] cert, byte[] chain, boolean isUserSelectable) {
85 setKeyPairCertificate(ComponentName who, String callerPackage, String alias, byte[] cert, byte[] chain, boolean isUserSelectable) argument

Completed in 684 milliseconds

12