/frameworks/base/core/java/android/security/net/config/ |
D | NetworkSecurityTrustManager.java | 67 public void checkClientTrusted(X509Certificate[] chain, String authType) in checkClientTrusted() argument 69 mDelegate.checkClientTrusted(chain, authType); in checkClientTrusted() 118 private void checkPins(List<X509Certificate> chain) throws CertificateException { in checkPins() argument 122 || !isPinningEnforced(chain)) { in checkPins() 128 for (int i = chain.size() - 1; i >= 0 ; i--) { in checkPins() 129 X509Certificate cert = chain.get(i); in checkPins() 151 private boolean isPinningEnforced(List<X509Certificate> chain) throws CertificateException { in isPinningEnforced() argument 152 if (chain.isEmpty()) { in isPinningEnforced() 155 X509Certificate anchorCert = chain.get(chain.size() - 1); in isPinningEnforced()
|
D | RootTrustManager.java | 51 public void checkClientTrusted(X509Certificate[] chain, String authType) in checkClientTrusted() argument 56 config.getTrustManager().checkClientTrusted(chain, authType); in checkClientTrusted()
|
/frameworks/opt/net/voip/src/jni/rtp/ |
D | AudioGroup.cpp | 107 void encode(int tick, AudioStream *chain); 266 void AudioStream::encode(int tick, AudioStream *chain) in encode() argument 310 while (chain) { in encode() 311 if (chain != this) { in encode() 312 data |= chain->mix(buffer, tick - mInterval, tick, mSampleRate); in encode() 314 chain = chain->mNext; in encode() 703 for (AudioStream *chain = mChain; chain->mNext; chain = chain->mNext) { in remove() local 704 if (chain->mNext == stream) { in remove() 709 chain->mNext = stream->mNext; in remove() 725 AudioStream *chain = mGroup->mChain; in threadLoop() local [all …]
|
/frameworks/base/services/core/java/com/android/server/ |
D | NetworkManagementService.java | 543 private void syncFirewallChainLocked(int chain, SparseIntArray uidFirewallRules, String name) { in syncFirewallChainLocked() argument 559 setFirewallUidRuleLocked(chain, rules.keyAt(i), rules.valueAt(i)); in syncFirewallChainLocked() 1796 final String chain = blacklist ? "naughtyapps" : "niceapps"; in setUidOnMeteredNetworkList() 1807 mConnector.execute("bandwidth", suffix + chain, uid); in setUidOnMeteredNetworkList() 2133 private void closeSocketsForFirewallChainLocked(int chain, String chainName) { in closeSocketsForFirewallChainLocked() argument 2139 final SparseIntArray rules = getUidFirewallRules(chain); in closeSocketsForFirewallChainLocked() 2142 if (getFirewallType(chain) == FIREWALL_TYPE_WHITELIST) { in closeSocketsForFirewallChainLocked() 2193 public void setFirewallChainEnabled(int chain, boolean enable) { in setFirewallChainEnabled() argument 2196 if (mFirewallChainStates.get(chain) == enable) { in setFirewallChainEnabled() 2201 mFirewallChainStates.put(chain, enable); in setFirewallChainEnabled() [all …]
|
/frameworks/av/services/audioflinger/ |
D | Threads.cpp | 978 sp<EffectChain> chain = mEffectChains[i]; in dumpEffectChains() local 979 if (chain != 0) { in dumpEffectChains() 980 chain->dump(fd, args); in dumpEffectChains() 1133 sp<EffectChain> chain = getEffectChain_l(sessionId); in setEffectSuspended_l() local 1134 if (chain != 0) { in setEffectSuspended_l() 1136 chain->setEffectSuspended_l(type, suspend); in setEffectSuspended_l() 1138 chain->setEffectSuspendedAll_l(suspend); in setEffectSuspended_l() 1145 void AudioFlinger::ThreadBase::checkSuspendOnAddEffectChain_l(const sp<EffectChain>& chain) in checkSuspendOnAddEffectChain_l() argument 1147 ssize_t index = mSuspendedSessions.indexOfKey(chain->sessionId()); in checkSuspendOnAddEffectChain_l() 1159 chain->setEffectSuspendedAll_l(true); in checkSuspendOnAddEffectChain_l() [all …]
|
D | AudioFlinger.cpp | 1564 sp<EffectChain> chain = getOrphanEffectChain_l(lSessionId); in openRecord() local 1565 if (chain != 0) { in openRecord() 1567 thread->addEffectChain_l(chain); in openRecord() 2245 sp<EffectChain> chain; in closeInput_nonvirtual() local 2251 chain = effectChains[0]; in closeInput_nonvirtual() 2254 if (chain != 0) { in closeInput_nonvirtual() 2264 if (t->hasAudioSession(chain->sessionId()) != 0) { in closeInput_nonvirtual() 2267 t->id(), chain->sessionId()); in closeInput_nonvirtual() 2268 t->addEffectChain_l(chain); in closeInput_nonvirtual() 2274 putOrphanEffectChain_l(chain); in closeInput_nonvirtual() [all …]
|
D | Effects.h | 45 const wp<AudioFlinger::EffectChain>& chain, 91 void setChain(const wp<EffectChain>& chain) { mChain = chain; } in setChain() argument 100 wp<EffectChain>& chain() { return mChain; } in chain() function
|
D | Threads.h | 313 virtual status_t addEffectChain_l(const sp<EffectChain>& chain) = 0; 315 virtual size_t removeEffectChain_l(const sp<EffectChain>& chain) = 0; 405 void checkSuspendOnAddEffectChain_l(const sp<EffectChain>& chain); 606 virtual status_t addEffectChain_l(const sp<EffectChain>& chain); 607 virtual size_t removeEffectChain_l(const sp<EffectChain>& chain); 1293 virtual status_t addEffectChain_l(const sp<EffectChain>& chain); 1294 virtual size_t removeEffectChain_l(const sp<EffectChain>& chain);
|
D | Effects.cpp | 59 const wp<AudioFlinger::EffectChain>& chain, in EffectModule() argument 64 mThread(thread), mChain(chain), mId(id), mSessionId(sessionId), in EffectModule() 298 sp<EffectChain> chain = mChain.promote(); in process() local 299 if (chain != 0 && chain->activeTrackCnt() != 0) { in process() 492 sp<EffectChain> chain = mChain.promote(); in start_l() local 493 if (chain != 0) { in start_l() 494 chain->forceVolume(); in start_l()
|
/frameworks/base/core/java/android/util/jar/ |
D | StrictJarFile.java | 160 for (Certificate[] chain : certChains) { in getCertificates() 161 count += chain.length; in getCertificates() 167 for (Certificate[] chain : certChains) { in getCertificates() 168 System.arraycopy(chain, 0, certs, i, chain.length); in getCertificates() 169 i += chain.length; in getCertificates()
|
/frameworks/base/core/java/android/net/http/ |
D | X509TrustManagerExtensions.java | 97 public List<X509Certificate> checkServerTrusted(X509Certificate[] chain, String authType, in checkServerTrusted() argument 100 return mDelegate.checkServerTrusted(chain, authType, host); in checkServerTrusted() 103 return (List<X509Certificate>) mCheckServerTrusted.invoke(mTrustManager, chain, in checkServerTrusted()
|
/frameworks/base/keystore/java/android/security/ |
D | KeyChain.java | 428 Collection<X509Certificate> chain = toCertificates(certChainBytes); in getCertificateChain() local 429 ArrayList<X509Certificate> fullChain = new ArrayList<>(chain.size() + 1); in getCertificateChain() 431 fullChain.addAll(chain); in getCertificateChain() 445 List<X509Certificate> chain = store.getCertificateChain(leafCert); in getCertificateChain() local 446 return chain.toArray(new X509Certificate[chain.size()]); in getCertificateChain()
|
/frameworks/base/keystore/java/android/security/keystore/ |
D | AndroidKeyStoreSpi.java | 272 public void engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain) in engineSetKeyEntry() argument 279 setPrivateKeyEntry(alias, (PrivateKey) key, chain, null); in engineSetKeyEntry() 340 private void setPrivateKeyEntry(String alias, PrivateKey key, Certificate[] chain, in setPrivateKeyEntry() argument 362 if ((chain == null) || (chain.length == 0)) { in setPrivateKeyEntry() 367 X509Certificate[] x509chain = new X509Certificate[chain.length]; in setPrivateKeyEntry() 368 for (int i = 0; i < chain.length; i++) { in setPrivateKeyEntry() 369 if (!"X.509".equals(chain[i].getType())) { in setPrivateKeyEntry() 374 if (!(chain[i] instanceof X509Certificate)) { in setPrivateKeyEntry() 379 x509chain[i] = (X509Certificate) chain[i]; in setPrivateKeyEntry() 395 if (chain.length > 1) { in setPrivateKeyEntry() [all …]
|
D | AndroidKeyStoreKeyPairGeneratorSpi.java | 604 Collection<byte[]> chain = outChain.getCertificates(); in getAttestationChain() local 605 if (chain.size() < 2) { in getAttestationChain() 607 + chain.size() + " entries. At least two are required."); in getAttestationChain() 609 return chain; in getAttestationChain()
|
/frameworks/base/core/java/android/content/pm/ |
D | Signature.java | 192 Signature[] chain = new Signature[1 + mCertificateChain.length]; in getChainSignatures() local 193 chain[0] = this; in getChainSignatures() 197 chain[i++] = new Signature(c.getEncoded()); in getChainSignatures() 200 return chain; in getChainSignatures()
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
D | OSUSocketFactory.java | 229 public void checkClientTrusted(X509Certificate[] chain, String authType) in checkClientTrusted() argument 235 public void checkServerTrusted(X509Certificate[] chain, String authType) in checkServerTrusted() argument 237 Log.d("TLSOSU", "Checking " + chain.length + " certs."); in checkServerTrusted() 244 Arrays.asList(chain)); in checkServerTrusted() 270 mTrustChain = chain; in checkServerTrusted() 274 mTrustChain = chain; in checkServerTrusted()
|
/frameworks/base/core/tests/coretests/src/android/net/http/ |
D | X509TrustManagerExtensionsTest.java | 34 public void checkClientTrusted(X509Certificate[] chain, String authType) {} in checkClientTrusted() argument 36 public void checkServerTrusted(X509Certificate[] chain, String authType) {} in checkServerTrusted() argument
|
/frameworks/base/core/java/android/os/ |
D | INetworkManagementService.aidl | 341 void setFirewallUidRule(int chain, int uid, int rule); in setFirewallUidRule() argument 342 void setFirewallUidRules(int chain, in int[] uids, in int[] rules); in setFirewallUidRules() argument 343 void setFirewallChainEnabled(int chain, boolean enable); in setFirewallChainEnabled() argument
|
/frameworks/native/vulkan/libvulkan/ |
D | api.cpp | 1051 LayerChain chain(true, driver::DebugReportLogger(*create_info), in CreateInstance() local 1054 VkResult result = chain.ActivateLayers(create_info->ppEnabledLayerNames, in CreateInstance() 1063 if (!chain.Empty()) { in CreateInstance() 1065 chain.ModifyCreateInfo(local_create_info); in CreateInstance() 1069 return chain.Create(create_info, allocator, instance_out); in CreateInstance() 1076 LayerChain chain( in CreateDevice() local 1080 VkResult result = chain.ActivateLayers( in CreateDevice() 1089 if (!chain.Empty()) { in CreateDevice() 1091 chain.ModifyCreateInfo(local_create_info); in CreateDevice() 1095 return chain.Create(physical_dev, create_info, allocator, dev_out); in CreateDevice()
|
/frameworks/base/keystore/tests/src/android/security/keystore/ |
D | AndroidKeyStoreTest.java | 1822 final Certificate[] chain = new Certificate[2]; in testKeyStore_SetKeyEntry_ProtectedKey_Encrypted_Failure() local 1823 chain[0] = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_USER_1)); in testKeyStore_SetKeyEntry_ProtectedKey_Encrypted_Failure() 1824 chain[1] = caCert; in testKeyStore_SetKeyEntry_ProtectedKey_Encrypted_Failure() 1827 mKeyStore.setKeyEntry(TEST_ALIAS_1, privKey, "foo".toCharArray(), chain); in testKeyStore_SetKeyEntry_ProtectedKey_Encrypted_Failure() 1843 final Certificate[] chain = new Certificate[2]; in testKeyStore_SetKeyEntry_Encrypted_Success() local 1844 chain[0] = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_USER_1)); in testKeyStore_SetKeyEntry_Encrypted_Success() 1845 chain[1] = caCert; in testKeyStore_SetKeyEntry_Encrypted_Success() 1847 mKeyStore.setKeyEntry(TEST_ALIAS_1, privKey, null, chain); in testKeyStore_SetKeyEntry_Encrypted_Success() 1872 final Certificate[] chain = new Certificate[2]; in testKeyStore_SetKeyEntry_Replaced_Encrypted_Success() local 1873 chain[0] = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_USER_1)); in testKeyStore_SetKeyEntry_Replaced_Encrypted_Success() [all …]
|
/frameworks/base/core/java/android/webkit/ |
D | ClientCertRequest.java | 69 public abstract void proceed(PrivateKey privateKey, X509Certificate[] chain); in proceed() argument
|
/frameworks/native/libs/input/ |
D | InputTransport.cpp | 560 uint32_t chain = 0; in consumeSamples() local 567 seqChain.chain = chain; in consumeSamples() 573 chain = msg.body.motion.seq; in consumeSamples() 577 *outSeq = chain; in consumeSamples() 834 currentSeq = seqChain.chain; in sendFinishedSignal() 849 seqChain.chain = chainSeqs[chainIndex]; in sendFinishedSignal()
|
/frameworks/base/services/core/java/com/android/server/net/ |
D | NetworkPolicyManagerService.java | 2568 private void updateRulesForWhitelistedPowerSaveLocked(boolean enabled, int chain, in updateRulesForWhitelistedPowerSaveLocked() argument 2596 setUidFirewallRules(chain, uidRules); in updateRulesForWhitelistedPowerSaveLocked() 2599 enableFirewallChainLocked(chain, enabled); in updateRulesForWhitelistedPowerSaveLocked() 2613 private void updateRulesForWhitelistedPowerSaveLocked(int uid, boolean enabled, int chain) { in updateRulesForWhitelistedPowerSaveLocked() argument 2617 setUidFirewallRule(chain, uid, FIREWALL_RULE_ALLOW); in updateRulesForWhitelistedPowerSaveLocked() 2619 setUidFirewallRule(chain, uid, FIREWALL_RULE_DEFAULT); in updateRulesForWhitelistedPowerSaveLocked() 3317 private void setUidFirewallRules(int chain, SparseIntArray uidRules) { in setUidFirewallRules() argument 3326 mNetworkManager.setFirewallUidRules(chain, uids, rules); in setUidFirewallRules() 3337 private void setUidFirewallRule(int chain, int uid, int rule) { in setUidFirewallRule() argument 3338 if (chain == FIREWALL_CHAIN_DOZABLE) { in setUidFirewallRule() [all …]
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/configparse/ |
D | ConfigBuilder.java | 144 Certificate[] chain = ks.getCertificateChain(alias); in parse() local 145 if (chain != null) { in parse() 147 for (Certificate certificate : chain) { in parse()
|
/frameworks/base/docs/html/preview/features/ |
D | key-attestation.jd | 30 tool, in return, provides a certificate chain, which you can use to verify 35 The root certificate within this chain is signed using an attestation key, 54 method to get a reference to the chain of X.509 certificates associated with 75 the certificate chain as an argument:</p> 78 // "certificates" contains the certificate chain associated with a specific key 107 // certificate chain. 135 certificate within the chain in a device’s hardware-backed keystore. The 799 Indicates a full chain of trust, which includes the bootloader, the boot
|