/frameworks/base/tools/aapt2/filter/ |
H A D | Filter_test.cpp | 29 FilterChain chain; local 30 ASSERT_TRUE(chain.Keep("some/random/path")); 32 chain.AddFilter(util::make_unique<PrefixFilter>("keep/")); 34 ASSERT_FALSE(chain.Keep("removed/path")); 35 ASSERT_TRUE(chain.Keep("keep/path/1")); 36 ASSERT_TRUE(chain.Keep("keep/path/2")); 38 chain.AddFilter(util::make_unique<PrefixFilter>("keep/")); 39 chain.AddFilter(util::make_unique<PrefixFilter>("keep/really/")); 41 ASSERT_FALSE(chain.Keep("removed/path")); 42 ASSERT_FALSE(chain [all...] |
/frameworks/base/core/java/android/webkit/ |
H A D | ClientCertRequest.java | 70 * Proceed with the specified private key and client certificate chain. 73 public abstract void proceed(PrivateKey privateKey, X509Certificate[] chain); argument
|
/frameworks/base/services/tests/servicestests/src/com/android/server/ |
H A D | NetworkManagementInternalTest.java | 98 // Dozable chain 104 // Powersaver chain 110 // Standby chain 127 BiFunction<Integer, Integer, String> errorMsg = (chain, state) -> { 128 return String.format("Unexpected value for chain: %s and state: %s", 129 valueToString(NetworkPolicyManager.class, "FIREWALL_CHAIN_", chain), 132 for (int chain : chains) { 133 final ArrayMap<Integer, Boolean> expectedValues = expected.get(chain); 134 mInjector.setFirewallChainState(chain, true); 136 mInjector.setFirewallRule(chain, TEST_UI [all...] |
/frameworks/base/core/java/android/security/net/config/ |
H A D | NetworkSecurityTrustManager.java | 67 public void checkClientTrusted(X509Certificate[] chain, String authType) argument 69 mDelegate.checkClientTrusted(chain, authType); 118 private void checkPins(List<X509Certificate> chain) throws CertificateException { argument 122 || !isPinningEnforced(chain)) { 128 for (int i = chain.size() - 1; i >= 0 ; i--) { 129 X509Certificate cert = chain.get(i); 151 private boolean isPinningEnforced(List<X509Certificate> chain) throws CertificateException { argument 152 if (chain.isEmpty()) { 155 X509Certificate anchorCert = chain.get(chain [all...] |
H A D | RootTrustManager.java | 51 public void checkClientTrusted(X509Certificate[] chain, String authType) argument 56 config.getTrustManager().checkClientTrusted(chain, authType);
|
/frameworks/base/core/tests/coretests/src/android/net/http/ |
H A D | X509TrustManagerExtensionsTest.java | 34 public void checkClientTrusted(X509Certificate[] chain, String authType) {} argument 36 public void checkServerTrusted(X509Certificate[] chain, String authType) {} argument
|
/frameworks/base/services/core/java/com/android/server/net/ |
H A D | NetworkPolicyLogger.java | 161 void uidFirewallRuleChanged(int chain, int uid, int rule) { argument 163 if (LOGV) Slog.v(TAG, getUidFirewallRuleChangedLog(chain, uid, rule)); 164 mEventsBuffer.uidFirewallRuleChanged(chain, uid, rule); 168 void firewallChainEnabled(int chain, boolean enabled) { argument 170 if (LOGD) Slog.d(TAG, getFirewallChainEnabledLog(chain, enabled)); 171 mEventsBuffer.firewallChainEnabled(chain, enabled); 175 void firewallRulesChanged(int chain, int[] uids, int[] rules) { argument 177 final String log = "Firewall rules changed for " + getFirewallChainName(chain) 269 private static String getUidFirewallRuleChangedLog(int chain, int uid, int rule) { argument 271 uid, getFirewallChainName(chain), getFirewallRuleNam 274 getFirewallChainEnabledLog(int chain, boolean enabled) argument 278 getFirewallChainName(int chain) argument 432 uidFirewallRuleChanged(int chain, int uid, int rule) argument 444 firewallChainEnabled(int chain, boolean enabled) argument [all...] |
/frameworks/base/core/java/android/net/http/ |
H A D | X509TrustManagerExtensions.java | 87 * Verifies the given certificate chain. 90 * description of the chain and authType parameters. The final parameter, host, should be the 93 * @throws CertificateException if the chain does not verify correctly. 94 * @return the properly ordered chain used for verification as a list of X509Certificates. 96 public List<X509Certificate> checkServerTrusted(X509Certificate[] chain, String authType, argument 99 return mDelegate.checkServerTrusted(chain, authType, host); 102 return (List<X509Certificate>) mCheckServerTrusted.invoke(mTrustManager, chain, 121 * <p>Since {@link X509TrustManager#checkServerTrusted} may allow its parameter {@code chain} to 122 * chain up to user-added CA certificates, this method can be used to perform additional
|
/frameworks/base/tools/aapt2/optimize/ |
H A D | MultiApkGenerator.h | 56 FilterChain* chain);
|
H A D | MultiApkGenerator_test.cpp | 109 FilterChain chain; local 115 generator.FilterTable(ctx.get(), artifact, *apk.GetResourceTable(), &chain); 136 FilterChain chain; local 142 generator.FilterTable(ctx.get(), artifact, *apk.GetResourceTable(), &chain); 161 FilterChain chain; local 167 generator.FilterTable(ctx.get(), artifact, *apk.GetResourceTable(), &chain);
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | NetworkManagementService.java | 296 /** Set of states for the child firewall chains. True if the chain is active. */ 587 // Sync the state of the given chain with the native daemon. 588 private void syncFirewallChainLocked(int chain, String name) { argument 591 final SparseIntArray uidFirewallRules = getUidFirewallRulesLR(chain); 595 // the specified chain. If we don't clear the rules, setFirewallUidRuleInternal 603 // chain. 607 setFirewallUidRuleLocked(chain, rules.keyAt(i), rules.valueAt(i)); 722 for (int chain : chains) { 723 if (getFirewallChainState(chain)) { 724 setFirewallChainEnabled(chain, tru 2032 closeSocketsForFirewallChainLocked(int chain, String chainName) argument 2097 setFirewallChainEnabled(int chain, boolean enable) argument 2142 getFirewallType(int chain) argument 2156 setFirewallUidRules(int chain, int[] uids, int[] rules) argument 2205 setFirewallUidRule(int chain, int uid, int rule) argument 2212 setFirewallUidRuleLocked(int chain, int uid, int rule) argument 2224 updateFirewallUidRuleLocked(int chain, int uid, int rule) argument 2251 getFirewallRuleName(int chain, int rule) argument 2269 getUidFirewallRulesLR(int chain) argument 2284 getFirewallChainName(int chain) argument 2728 setFirewallChainState(int chain, boolean state) argument 2734 getFirewallChainState(int chain) argument 2759 setFirewallChainState(int chain, boolean state) argument 2763 setFirewallRule(int chain, int uid, int rule) argument [all...] |
/frameworks/base/tools/locked_region_code_injection/src/lockedregioncodeinjection/ |
H A D | LockFindingClassVisitor.java | 52 public LockFindingClassVisitor(List<LockTarget> targets, ClassVisitor chain) { argument 53 super(Utils.ASM_VERSION, chain); 62 MethodVisitor chain = super.visitMethod(access, name, desc, signature, exceptions); 63 return new LockFindingMethodVisitor(this.className, mn, chain); 75 private MethodVisitor chain; field in class:LockFindingClassVisitor.LockFindingMethodVisitor 77 public LockFindingMethodVisitor(String owner, MethodNode mn, MethodVisitor chain) { argument 81 this.chain = chain; 182 mn.accept(chain);
|
/frameworks/av/services/audioflinger/ |
H A D | Threads.cpp | 864 sp<EffectChain> chain = mEffectChains[i]; local 865 if (chain != 0) { 866 chain->dump(fd, args); 1000 sp<EffectChain> chain = getEffectChain_l(sessionId); local 1001 if (chain != 0) { 1003 chain->setEffectSuspended_l(type, suspend); 1005 chain->setEffectSuspendedAll_l(suspend); 1012 void AudioFlinger::ThreadBase::checkSuspendOnAddEffectChain_l(const sp<EffectChain>& chain) argument 1014 ssize_t index = mSuspendedSessions.indexOfKey(chain->sessionId()); 1026 chain 1120 sp<EffectChain> chain = getEffectChain_l(sessionId); local 1283 sp<EffectChain> chain; local 1408 sp<EffectChain> chain = getEffectChain_l(sessionId); local 1418 sp<EffectChain> chain = getEffectChain_l(sessionId); local 1467 sp<EffectChain> chain = effect->chain().promote(); local 1939 sp<EffectChain> chain = getEffectChain_l(session); local 2153 sp<EffectChain> chain = getEffectChain_l(sessionId); local 2341 sp<EffectChain> chain = getEffectChain_l(track->sessionId()); local 2387 sp<EffectChain> chain = getEffectChain_l(track->sessionId()); local 2971 addEffectChain_l(const sp<EffectChain>& chain) argument 3049 removeEffectChain_l(const sp<EffectChain>& chain) argument 3609 sp<EffectChain> chain = getEffectChain_l(track->sessionId()); local 4245 sp<EffectChain> chain = getEffectChain_l(AUDIO_SESSION_OUTPUT_MIX); local 6982 sp<EffectChain> chain = getEffectChain_l(sessionId); local 7750 addEffectChain_l(const sp<EffectChain>& chain) argument 7773 removeEffectChain_l(const sp<EffectChain>& chain) argument 8115 sp<EffectChain> chain = getEffectChain_l(mSessionId); local 8168 sp<EffectChain> chain = getEffectChain_l(track->sessionId()); local 8471 addEffectChain_l(const sp<EffectChain>& chain) argument 8495 removeEffectChain_l(const sp<EffectChain>& chain) argument [all...] |
H A D | Effects.h | 46 const wp<AudioFlinger::EffectChain>& chain, 97 void setChain(const wp<EffectChain>& chain) { mChain = chain; } argument 107 wp<EffectChain>& chain() { return mChain; } function in class:EffectModule 153 wp<EffectChain> mChain; // parent effect chain 265 // Effects in this chain can be insert or auxiliary. Effects in other chains (attached to 354 // At least one non offloadable effect in the chain is enabled 410 sp<EffectBufferHalInterface> mInBuffer; // chain input buffer 411 sp<EffectBufferHalInterface> mOutBuffer; // chain output buffer 424 uint32_t mStrategy; // strategy for this effect chain [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/ |
H A D | OsuServerConnection.java | 156 public void checkClientTrusted(X509Certificate[] chain, String authType) argument 164 public void checkServerTrusted(X509Certificate[] chain, String authType) argument 172 mServerCerts = mDelegate.getTrustedChainForServer(chain, authType,
|
/frameworks/base/core/java/android/util/jar/ |
H A D | StrictJarFile.java | 189 for (Certificate[] chain : certChains) { 190 count += chain.length; 196 for (Certificate[] chain : certChains) { 197 System.arraycopy(chain, 0, certs, i, chain.length); 198 i += chain.length;
|
/frameworks/base/keystore/java/android/security/ |
H A D | IKeyChainService.aidl | 38 out KeymasterCertificateChain chain);
|
H A D | KeyChain.java | 180 * private key and associated certificate chain will be installed. 548 * Returns the {@code X509Certificate} chain for the requested 551 * <strong>Note:</strong> If a certificate chain was explicitly specified when the alias was 552 * installed, this method will return that chain. If only the client certificate was specified 553 * at the installation time, this method will try to build a certificate chain using all 562 * @param alias The alias of the desired certificate chain, typically 592 // If the keypair is installed with a certificate chain by either 593 // DevicePolicyManager.installKeyPair or CertInstaller, return that chain. 595 Collection<X509Certificate> chain = toCertificates(certChainBytes); 596 ArrayList<X509Certificate> fullChain = new ArrayList<>(chain [all...] |
/frameworks/opt/net/voip/src/jni/rtp/ |
H A D | AudioGroup.cpp | 107 void encode(int tick, AudioStream *chain); 266 void AudioStream::encode(int tick, AudioStream *chain) argument 310 while (chain) { 311 if (chain != this) { 312 data |= chain->mix(buffer, tick - mInterval, tick, mSampleRate); 314 chain = chain->mNext; 703 for (AudioStream *chain = mChain; chain->mNext; chain 725 AudioStream *chain = mGroup->mChain; local [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | Signature.java | 57 * Create signature from a certificate chain. Used for backward 181 * Used for compatibility code that needs to check the certificate chain 192 Signature[] chain = new Signature[1 + mCertificateChain.length]; 193 chain[0] = this; 197 chain[i++] = new Signature(c.getEncoded()); 200 return chain;
|
/frameworks/base/core/java/android/os/ |
H A D | INetworkManagementService.aidl | 350 void setFirewallUidRule(int chain, int uid, int rule); 351 void setFirewallUidRules(int chain, in int[] uids, in int[] rules); 352 void setFirewallChainEnabled(int chain, boolean enable);
|
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | AndroidKeyStoreSpi.java | 77 * Credentials.USER_CERTIFICATE as the first certificate in the chain (the one 79 * entry which will have the rest of the chain concatenated in BER format. 271 public void engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain) argument 278 setPrivateKeyEntry(alias, (PrivateKey) key, chain, null); 339 private void setPrivateKeyEntry(String alias, PrivateKey key, Certificate[] chain, argument 367 // Make sure the chain exists since this is a PrivateKey 368 if ((chain == null) || (chain.length == 0)) { 372 // Do chain type checking. 373 X509Certificate[] x509chain = new X509Certificate[chain 832 engineSetKeyEntry(String alias, byte[] userKey, Certificate[] chain) argument [all...] |
H A D | AttestationUtils.java | 83 // Extract certificate chain. 86 throw new KeyAttestationException("Attestation certificate chain contained " 98 throw new KeyAttestationException("Unable to construct certificate chain", e); 185 * Performs attestation of the device's identifiers. This method returns a certificate chain 188 * If the device supports attestation in secure hardware, the chain will be rooted at a 189 * trustworthy CA key. Otherwise, the chain will be rooted at an untrusted certificate. See 207 * @return a certificate chain containing the requested device identifiers in the first element 236 * Returns true if the attestation chain provided is a valid key attestation chain. 239 public static boolean isChainValid(KeymasterCertificateChain chain) { argument [all...] |
/frameworks/base/wifi/java/android/net/wifi/hotspot2/ |
H A D | ConfigParser.java | 130 * [base64 encoded PKCS#12 ASN.1 structure containing client certificate chain] 136 * certificate chain (optional). 195 // Parse PKCS12 data for client private key and certificate chain. 455 // Only expects one set of key and certificate chain. 467 Certificate[] chain = ks.getCertificateChain(alias); 468 if (chain != null) { 470 for (Certificate certificate : chain) {
|
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
H A D | BaseIDevicePolicyManager.java | 86 byte[] cert, byte[] chain, boolean isUserSelectable) { 85 setKeyPairCertificate(ComponentName who, String callerPackage, String alias, byte[] cert, byte[] chain, boolean isUserSelectable) argument
|