/frameworks/base/core/java/android/security/net/config/ |
D | NetworkSecurityTrustManager.java | 67 public void checkClientTrusted(X509Certificate[] chain, String authType) in checkClientTrusted() argument 69 mDelegate.checkClientTrusted(chain, authType); in checkClientTrusted() 118 private void checkPins(List<X509Certificate> chain) throws CertificateException { in checkPins() argument 122 || !isPinningEnforced(chain)) { in checkPins() 128 for (int i = chain.size() - 1; i >= 0 ; i--) { in checkPins() 129 X509Certificate cert = chain.get(i); in checkPins() 151 private boolean isPinningEnforced(List<X509Certificate> chain) throws CertificateException { in isPinningEnforced() argument 152 if (chain.isEmpty()) { in isPinningEnforced() 155 X509Certificate anchorCert = chain.get(chain.size() - 1); in isPinningEnforced()
|
D | RootTrustManager.java | 51 public void checkClientTrusted(X509Certificate[] chain, String authType) in checkClientTrusted() argument 56 config.getTrustManager().checkClientTrusted(chain, authType); in checkClientTrusted()
|
/frameworks/base/services/tests/servicestests/src/com/android/server/ |
D | NetworkManagementInternalTest.java | 127 BiFunction<Integer, Integer, String> errorMsg = (chain, state) -> { in testIsNetworkRestrictedForUid() 129 valueToString(NetworkPolicyManager.class, "FIREWALL_CHAIN_", chain), in testIsNetworkRestrictedForUid() 132 for (int chain : chains) { in testIsNetworkRestrictedForUid() 133 final ArrayMap<Integer, Boolean> expectedValues = expected.get(chain); in testIsNetworkRestrictedForUid() 134 mInjector.setFirewallChainState(chain, true); in testIsNetworkRestrictedForUid() 136 mInjector.setFirewallRule(chain, TEST_UID, state); in testIsNetworkRestrictedForUid() 137 assertEquals(errorMsg.apply(chain, state), in testIsNetworkRestrictedForUid()
|
/frameworks/base/services/core/java/com/android/server/ |
D | NetworkManagementService.java | 525 private void syncFirewallChainLocked(int chain, String name) { in syncFirewallChainLocked() argument 528 final SparseIntArray uidFirewallRules = getUidFirewallRulesLR(chain); in syncFirewallChainLocked() 544 setFirewallUidRuleLocked(chain, rules.keyAt(i), rules.valueAt(i)); in syncFirewallChainLocked() 672 for (int chain : chains) { in prepareNativeDaemon() 673 if (getFirewallChainState(chain)) { in prepareNativeDaemon() 674 setFirewallChainEnabled(chain, true); in prepareNativeDaemon() 1640 final String chain = blacklist ? "naughtyapps" : "niceapps"; in setUidOnMeteredNetworkList() 1657 mConnector.execute("bandwidth", suffix + chain, uid); in setUidOnMeteredNetworkList() 1965 private void closeSocketsForFirewallChainLocked(int chain, String chainName) { in closeSocketsForFirewallChainLocked() argument 1973 if (getFirewallType(chain) == FIREWALL_TYPE_WHITELIST) { in closeSocketsForFirewallChainLocked() [all …]
|
/frameworks/av/services/audioflinger/ |
D | Threads.cpp | 865 sp<EffectChain> chain = mEffectChains[i]; in dumpEffectChains() local 866 if (chain != 0) { in dumpEffectChains() 867 chain->dump(fd, args); in dumpEffectChains() 1008 sp<EffectChain> chain = getEffectChain_l(sessionId); in setEffectSuspended_l() local 1009 if (chain != 0) { in setEffectSuspended_l() 1011 chain->setEffectSuspended_l(type, suspend); in setEffectSuspended_l() 1013 chain->setEffectSuspendedAll_l(suspend); in setEffectSuspended_l() 1020 void AudioFlinger::ThreadBase::checkSuspendOnAddEffectChain_l(const sp<EffectChain>& chain) in checkSuspendOnAddEffectChain_l() argument 1022 ssize_t index = mSuspendedSessions.indexOfKey(chain->sessionId()); in checkSuspendOnAddEffectChain_l() 1034 chain->setEffectSuspendedAll_l(true); in checkSuspendOnAddEffectChain_l() [all …]
|
D | AudioFlinger.cpp | 1684 sp<EffectChain> chain = getOrphanEffectChain_l(lSessionId); in openRecord() local 1685 if (chain != 0) { in openRecord() 1687 thread->addEffectChain_l(chain); in openRecord() 2400 sp<EffectChain> chain; in closeInput_nonvirtual() local 2406 chain = effectChains[0]; in closeInput_nonvirtual() 2409 if (chain != 0) { in closeInput_nonvirtual() 2419 if (t->hasAudioSession(chain->sessionId()) != 0) { in closeInput_nonvirtual() 2422 t->id(), chain->sessionId()); in closeInput_nonvirtual() 2423 t->addEffectChain_l(chain); in closeInput_nonvirtual() 2429 putOrphanEffectChain_l(chain); in closeInput_nonvirtual() [all …]
|
D | Effects.h | 46 const wp<AudioFlinger::EffectChain>& chain, 97 void setChain(const wp<EffectChain>& chain) { mChain = chain; } in setChain() argument 107 wp<EffectChain>& chain() { return mChain; } in chain() function
|
D | Threads.h | 323 virtual status_t addEffectChain_l(const sp<EffectChain>& chain) = 0; 325 virtual size_t removeEffectChain_l(const sp<EffectChain>& chain) = 0; 429 void checkSuspendOnAddEffectChain_l(const sp<EffectChain>& chain); 750 virtual status_t addEffectChain_l(const sp<EffectChain>& chain); 751 virtual size_t removeEffectChain_l(const sp<EffectChain>& chain); 1364 virtual status_t addEffectChain_l(const sp<EffectChain>& chain); 1365 virtual size_t removeEffectChain_l(const sp<EffectChain>& chain); 1510 virtual status_t addEffectChain_l(const sp<EffectChain>& chain); 1511 virtual size_t removeEffectChain_l(const sp<EffectChain>& chain);
|
/frameworks/opt/net/voip/src/jni/rtp/ |
D | AudioGroup.cpp | 107 void encode(int tick, AudioStream *chain); 266 void AudioStream::encode(int tick, AudioStream *chain) in encode() argument 310 while (chain) { in encode() 311 if (chain != this) { in encode() 312 data |= chain->mix(buffer, tick - mInterval, tick, mSampleRate); in encode() 314 chain = chain->mNext; in encode() 703 for (AudioStream *chain = mChain; chain->mNext; chain = chain->mNext) { in remove() local 704 if (chain->mNext == stream) { in remove() 709 chain->mNext = stream->mNext; in remove() 725 AudioStream *chain = mGroup->mChain; in threadLoop() local [all …]
|
/frameworks/base/core/java/android/net/http/ |
D | X509TrustManagerExtensions.java | 97 public List<X509Certificate> checkServerTrusted(X509Certificate[] chain, String authType, in checkServerTrusted() argument 100 return mDelegate.checkServerTrusted(chain, authType, host); in checkServerTrusted() 103 return (List<X509Certificate>) mCheckServerTrusted.invoke(mTrustManager, chain, in checkServerTrusted()
|
/frameworks/base/core/java/android/util/jar/ |
D | StrictJarFile.java | 189 for (Certificate[] chain : certChains) { in getCertificates() 190 count += chain.length; in getCertificates() 196 for (Certificate[] chain : certChains) { in getCertificates() 197 System.arraycopy(chain, 0, certs, i, chain.length); in getCertificates() 198 i += chain.length; in getCertificates()
|
/frameworks/base/keystore/java/android/security/ |
D | KeyChain.java | 498 Collection<X509Certificate> chain = toCertificates(certChainBytes); in getCertificateChain() local 499 ArrayList<X509Certificate> fullChain = new ArrayList<>(chain.size() + 1); in getCertificateChain() 501 fullChain.addAll(chain); in getCertificateChain() 515 List<X509Certificate> chain = store.getCertificateChain(leafCert); in getCertificateChain() local 516 return chain.toArray(new X509Certificate[chain.size()]); in getCertificateChain()
|
/frameworks/base/core/java/android/content/pm/ |
D | Signature.java | 192 Signature[] chain = new Signature[1 + mCertificateChain.length]; in getChainSignatures() local 193 chain[0] = this; in getChainSignatures() 197 chain[i++] = new Signature(c.getEncoded()); in getChainSignatures() 200 return chain; in getChainSignatures()
|
/frameworks/base/core/tests/coretests/src/android/net/http/ |
D | X509TrustManagerExtensionsTest.java | 34 public void checkClientTrusted(X509Certificate[] chain, String authType) {} in checkClientTrusted() argument 36 public void checkServerTrusted(X509Certificate[] chain, String authType) {} in checkServerTrusted() argument
|
/frameworks/base/keystore/java/android/security/keystore/ |
D | AndroidKeyStoreSpi.java | 272 public void engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain) in engineSetKeyEntry() argument 279 setPrivateKeyEntry(alias, (PrivateKey) key, chain, null); in engineSetKeyEntry() 340 private void setPrivateKeyEntry(String alias, PrivateKey key, Certificate[] chain, in setPrivateKeyEntry() argument 365 if ((chain == null) || (chain.length == 0)) { in setPrivateKeyEntry() 370 X509Certificate[] x509chain = new X509Certificate[chain.length]; in setPrivateKeyEntry() 371 for (int i = 0; i < chain.length; i++) { in setPrivateKeyEntry() 372 if (!"X.509".equals(chain[i].getType())) { in setPrivateKeyEntry() 377 if (!(chain[i] instanceof X509Certificate)) { in setPrivateKeyEntry() 382 x509chain[i] = (X509Certificate) chain[i]; in setPrivateKeyEntry() 398 if (chain.length > 1) { in setPrivateKeyEntry() [all …]
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
D | OSUSocketFactory.java | 232 public void checkClientTrusted(X509Certificate[] chain, String authType) in checkClientTrusted() argument 238 public void checkServerTrusted(X509Certificate[] chain, String authType) in checkServerTrusted() argument 240 Log.d("TLSOSU", "Checking " + chain.length + " certs."); in checkServerTrusted() 247 Arrays.asList(chain)); in checkServerTrusted() 274 mTrustChain = chain; in checkServerTrusted() 278 mTrustChain = chain; in checkServerTrusted()
|
/frameworks/base/core/java/android/os/ |
D | INetworkManagementService.aidl | 320 void setFirewallUidRule(int chain, int uid, int rule); in setFirewallUidRule() argument 321 void setFirewallUidRules(int chain, in int[] uids, in int[] rules); in setFirewallUidRules() argument 322 void setFirewallChainEnabled(int chain, boolean enable); in setFirewallChainEnabled() argument
|
/frameworks/base/core/java/android/security/ |
D | IKeystoreService.aidl | 78 int attestKey(String alias, in KeymasterArguments params, out KeymasterCertificateChain chain); in attestKey() argument 79 int attestDeviceIds(in KeymasterArguments params, out KeymasterCertificateChain chain); in attestDeviceIds() argument
|
/frameworks/base/core/java/android/webkit/ |
D | ClientCertRequest.java | 69 public abstract void proceed(PrivateKey privateKey, X509Certificate[] chain); in proceed() argument
|
/frameworks/native/vulkan/libvulkan/ |
D | api.cpp | 1054 LayerChain chain(true, logger, in CreateInstance() local 1057 VkResult result = chain.ActivateLayers(create_info->ppEnabledLayerNames, in CreateInstance() 1066 if (!chain.Empty()) { in CreateInstance() 1068 chain.ModifyCreateInfo(local_create_info); in CreateInstance() 1072 return chain.Create(create_info, allocator, instance_out); in CreateInstance() 1080 LayerChain chain( in CreateDevice() local 1084 VkResult result = chain.ActivateLayers( in CreateDevice() 1093 if (!chain.Empty()) { in CreateDevice() 1095 chain.ModifyCreateInfo(local_create_info); in CreateDevice() 1099 return chain.Create(physical_dev, create_info, allocator, dev_out); in CreateDevice()
|
/frameworks/base/keystore/tests/src/android/security/keystore/ |
D | AndroidKeyStoreTest.java | 1822 final Certificate[] chain = new Certificate[2]; in testKeyStore_SetKeyEntry_ProtectedKey_Encrypted_Failure() local 1823 chain[0] = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_USER_1)); in testKeyStore_SetKeyEntry_ProtectedKey_Encrypted_Failure() 1824 chain[1] = caCert; in testKeyStore_SetKeyEntry_ProtectedKey_Encrypted_Failure() 1827 mKeyStore.setKeyEntry(TEST_ALIAS_1, privKey, "foo".toCharArray(), chain); in testKeyStore_SetKeyEntry_ProtectedKey_Encrypted_Failure() 1843 final Certificate[] chain = new Certificate[2]; in testKeyStore_SetKeyEntry_Encrypted_Success() local 1844 chain[0] = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_USER_1)); in testKeyStore_SetKeyEntry_Encrypted_Success() 1845 chain[1] = caCert; in testKeyStore_SetKeyEntry_Encrypted_Success() 1847 mKeyStore.setKeyEntry(TEST_ALIAS_1, privKey, null, chain); in testKeyStore_SetKeyEntry_Encrypted_Success() 1872 final Certificate[] chain = new Certificate[2]; in testKeyStore_SetKeyEntry_Replaced_Encrypted_Success() local 1873 chain[0] = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_USER_1)); in testKeyStore_SetKeyEntry_Replaced_Encrypted_Success() [all …]
|
/frameworks/base/services/core/java/com/android/server/net/ |
D | NetworkPolicyManagerService.java | 2872 private void updateRulesForWhitelistedPowerSaveUL(boolean enabled, int chain, in updateRulesForWhitelistedPowerSaveUL() argument 2884 if (chain == FIREWALL_CHAIN_POWERSAVE) { in updateRulesForWhitelistedPowerSaveUL() 2894 setUidFirewallRulesAsync(chain, uidRules, CHAIN_TOGGLE_ENABLE); in updateRulesForWhitelistedPowerSaveUL() 2896 setUidFirewallRulesAsync(chain, null, CHAIN_TOGGLE_DISABLE); in updateRulesForWhitelistedPowerSaveUL() 2928 private void updateRulesForWhitelistedPowerSaveUL(int uid, boolean enabled, int chain) { in updateRulesForWhitelistedPowerSaveUL() argument 2931 chain == FIREWALL_CHAIN_DOZABLE); in updateRulesForWhitelistedPowerSaveUL() 2933 setUidFirewallRule(chain, uid, FIREWALL_RULE_ALLOW); in updateRulesForWhitelistedPowerSaveUL() 2935 setUidFirewallRule(chain, uid, FIREWALL_RULE_DEFAULT); in updateRulesForWhitelistedPowerSaveUL() 3665 final int chain = msg.arg1; 3669 setUidFirewallRules(chain, uidRules); [all …]
|
/frameworks/base/wifi/java/android/net/wifi/hotspot2/ |
D | ConfigParser.java | 467 Certificate[] chain = ks.getCertificateChain(alias); in parsePkcs12() local 468 if (chain != null) { in parsePkcs12() 470 for (Certificate certificate : chain) { in parsePkcs12()
|
/frameworks/native/libs/input/ |
D | InputTransport.cpp | 559 uint32_t chain = 0; in consumeSamples() local 566 seqChain.chain = chain; in consumeSamples() 572 chain = msg.body.motion.seq; in consumeSamples() 576 *outSeq = chain; in consumeSamples() 833 currentSeq = seqChain.chain; in sendFinishedSignal() 848 seqChain.chain = chainSeqs[chainIndex]; in sendFinishedSignal()
|
/frameworks/av/media/libstagefright/codec2/include/ |
D | C2Work.h | 155 std::list<node_id> chain; member
|