/frameworks/base/core/java/android/net/http/ |
H A D | X509TrustManagerExtensions.java | 21 import java.security.cert.CertificateException; 22 import java.security.cert.X509Certificate; 81 public boolean isUserAddedCertificate(X509Certificate cert) { argument 82 return mDelegate.isUserAddedCertificate(cert);
|
H A D | SslError.java | 19 import java.security.cert.X509Certificate; 140 int error, SslCertificate cert, String url) { 145 return new SslError(SSL_IDMISMATCH, cert, url); 147 return new SslError(SSL_DATE_INVALID, cert, url); 149 return new SslError(SSL_UNTRUSTED, cert, url); 151 return new SslError(SSL_INVALID, cert, url); 139 SslErrorFromChromiumErrorCode( int error, SslCertificate cert, String url) argument
|
H A D | DelegatingSSLSession.java | 20 import java.security.cert.Certificate; 21 import java.security.cert.X509Certificate; 94 public javax.security.cert.X509Certificate[] getPeerCertificateChain()
|
H A D | CertificateChainValidator.java | 31 import java.security.cert.Certificate; 32 import java.security.cert.CertificateException; 33 import java.security.cert.CertificateFactory; 34 import java.security.cert.X509Certificate; 141 * by Chromium HTTPS stack to validate the cert chain. 144 * @param authType The authentication type for the cert chain 205 * @param chain the cert chain in X509 cert format. 207 * @param authType The authentication type for the cert chain
|
H A D | SslCertificate.java | 30 import java.security.cert.Certificate; 31 import java.security.cert.CertificateEncodingException; 32 import java.security.cert.CertificateException; 33 import java.security.cert.CertificateFactory; 34 import java.security.cert.X509Certificate; 130 Certificate cert = certFactory.generateCertificate(new ByteArrayInputStream(bytes)); 131 x509Certificate = (X509Certificate) cert;
|
H A D | HttpsConnection.java | 45 import java.security.cert.X509Certificate;
|
/frameworks/base/core/java/android/webkit/ |
H A D | ClientCertRequest.java | 21 import java.security.cert.X509Certificate; 27 * such as the host name and the port number requesting the cert, the acceptable
|
/frameworks/base/core/java/android/content/pm/ |
H A D | Signature.java | 28 import java.security.cert.Certificate; 29 import java.security.cert.CertificateEncodingException; 30 import java.security.cert.CertificateException; 31 import java.security.cert.CertificateFactory; 32 import java.security.cert.X509Certificate; 176 final Certificate cert = certFactory.generateCertificate(bais); 177 return cert.getPublicKey(); 296 final X509Certificate cert = (X509Certificate) cf.generateCertificate(is); 297 final Signature sPrime = new Signature(cert.getEncoded()); 300 throw new CertificateException("Bounced cert lengt [all...] |
/frameworks/base/services/core/java/com/android/server/updates/ |
H A D | ConfigUpdateInstallReceiver.java | 36 import java.security.cert.CertificateException; 37 import java.security.cert.CertificateFactory; 38 import java.security.cert.X509Certificate; 76 X509Certificate cert = getCert(context.getContentResolver()); 95 cert)) { 119 // get the cert from settings 120 String cert = Settings.Secure.getString(cr, UPDATE_CERTIFICATE_KEY); 123 byte[] derCert = Base64.decode(cert.getBytes(), Base64.DEFAULT); 220 String signature, X509Certificate cert) throws Exception { 222 signer.initVerify(cert); 219 verifySignature(byte[] content, int version, String requiredPrevious, String signature, X509Certificate cert) argument [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/updates/ |
H A D | CertPinInstallReceiverTest.java | 33 import java.security.cert.CertificateFactory; 34 import java.security.cert.Certificate; 35 import java.security.cert.X509Certificate; 174 String signature, X509Certificate cert) throws Exception { 176 signer.initVerify(cert); 193 private String runTest(String cert, String content, String version, String required, String sig) argument 196 overrideCert(cert); 203 private String runTestWithoutSig(String cert, String content, String version, String required) argument 206 return runTest(cert, content, version, required, sig); 173 verifySignature(String content, String version, String requiredPrevious, String signature, X509Certificate cert) argument
|
/frameworks/base/wifi/java/android/net/wifi/ |
H A D | WifiEnterpriseConfig.java | 27 import java.security.cert.CertificateEncodingException; 28 import java.security.cert.CertificateException; 29 import java.security.cert.CertificateFactory; 30 import java.security.cert.X509Certificate; 145 private void writeCertificate(Parcel dest, X509Certificate cert) { argument 146 if (cert != null) { 148 byte[] certBytes = cert.getEncoded(); 194 X509Certificate cert = null; 201 cert = (X509Certificate) cFactory 204 cert 422 setCaCertificate(X509Certificate cert) argument [all...] |
/frameworks/base/core/tests/coretests/src/android/net/http/ |
H A D | SslCertificateTest.java | 23 import java.security.cert.CertificateFactory; 24 import java.security.cert.X509Certificate;
|
H A D | X509TrustManagerExtensionsTest.java | 20 import java.security.cert.X509Certificate;
|
/frameworks/base/keystore/java/android/security/ |
H A D | AndroidKeyPairGenerator.java | 34 import java.security.cert.CertificateEncodingException; 35 import java.security.cert.X509Certificate; 131 final X509Certificate cert; 133 cert = certGen.generate(privKey); 141 certBytes = cert.getEncoded();
|
H A D | AndroidKeyStore.java | 39 import java.security.cert.Certificate; 40 import java.security.cert.CertificateEncodingException; 41 import java.security.cert.CertificateException; 42 import java.security.cert.CertificateFactory; 43 import java.security.cert.X509Certificate; 257 throw new KeyStoreException("Certificates must be in X.509 format: invalid cert #" 262 throw new KeyStoreException("Certificates must be in X.509 format: invalid cert #" 350 public void engineSetCertificateEntry(String alias, Certificate cert) throws KeyStoreException { argument 356 if (cert == null) { 357 throw new NullPointerException("cert 452 engineGetCertificateAlias(Certificate cert) argument [all...] |
H A D | KeyChain.java | 34 import java.security.cert.Certificate; 35 import java.security.cert.CertificateException; 36 import java.security.cert.CertificateFactory; 37 import java.security.cert.X509Certificate; 407 Certificate cert = certFactory.generateCertificate(new ByteArrayInputStream(bytes)); 408 return (X509Certificate) cert;
|
H A D | Credentials.java | 35 import java.security.cert.Certificate; 36 import java.security.cert.CertificateEncodingException; 37 import java.security.cert.CertificateException; 38 import java.security.cert.CertificateFactory; 39 import java.security.cert.X509Certificate;
|
H A D | KeyPairGeneratorSpec.java | 27 import java.security.cert.Certificate;
|
/frameworks/base/core/java/android/os/ |
H A D | RecoverySystem.java | 37 import java.security.cert.CertificateFactory; 38 import java.security.cert.X509Certificate; 211 X509Certificate cert = null; 215 cert = (X509Certificate) cf.generateCertificate(is); 234 PublicKey signatureKey = cert.getPublicKey(); 246 // The signature cert matches a trusted key. Now verify that 247 // the digest in the cert matches the actual file data. 251 // based on the signature algorithm of the cert: 253 // "SHA256withRSA" cert -> "SHA256withRSA" signature 254 // "SHA1withRSA" cert [all...] |
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | SELinuxMMAC.java | 162 String cert = parser.getAttributeValue(null, "signature"); 163 if (cert == null) { 171 signature = new Signature(cert);
|
/frameworks/base/packages/SystemUI/tests/ |
H A D | Android.mk | 35 # sign this with platform cert, so this test is allowed to inject key events into
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
H A D | UiccCarrierPrivilegeRules.java | 42 import java.security.cert.Certificate; 43 import java.security.cert.CertificateException; 44 import java.security.cert.CertificateFactory; 45 import java.security.cert.X509Certificate; 89 * DEVICE_APP_ID_REF_DO = TAG_DEVICE_APP_ID_REF_DO + len + sha256 hexstring of cert 139 return "cert: " + IccUtils.bytesToHexString(certificateHash) + " pkg: " +
|
/frameworks/base/core/java/android/app/admin/ |
H A D | DevicePolicyManager.java | 56 import java.security.cert.Certificate; 57 import java.security.cert.CertificateException; 58 import java.security.cert.CertificateFactory; 59 import java.security.cert.X509Certificate; 1928 * @param cert The certificate to install. 1933 public boolean installKeyPair(ComponentName who, PrivateKey privKey, Certificate cert, argument 1936 final byte[] pemCert = Credentials.convertToPem(cert); 1954 final X509Certificate cert = (X509Certificate) certFactory.generateCertificate( 1956 return new TrustedCertificateStore().getCertificateAlias(cert);
|
/frameworks/base/keystore/tests/src/android/security/ |
H A D | AndroidKeyStoreTest.java | 41 import java.security.cert.Certificate; 42 import java.security.cert.CertificateFactory; 43 import java.security.cert.X509Certificate; 100 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650 474 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650 734 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650 1566 byte[] cert, byte[] ca) throws Exception { 1571 Certificate expectedCert = certFact.generateCertificate(new ByteArrayInputStream(cert)); 1605 assertEquals("First certificate in chain should be user cert", expectedCert, actualChain[0]); 1815 final Certificate cert 1565 assertPrivateKeyEntryEquals(PrivateKeyEntry keyEntry, String keyType, byte[] key, byte[] cert, byte[] ca) argument [all...] |
/frameworks/base/core/java/android/net/ |
H A D | SSLCertificateSocketFactory.java | 30 import java.security.cert.X509Certificate;
|