Searched refs:certificate (Results 1 - 24 of 24) sorted by relevance

/frameworks/base/core/java/android/net/http/
H A DSslError.java23 * certificate.
32 * The certificate is not yet valid
36 * The certificate has expired
44 * The certificate authority is not trusted
48 * The date of the certificate is invalid
73 * The SSL certificate associated with the error set
83 * Creates a new SslError object using the supplied error and certificate.
86 * @param certificate The associated SSL certificate
90 public SslError(int error, SslCertificate certificate) { argument
102 SslError(int error, X509Certificate certificate) argument
113 SslError(int error, SslCertificate certificate, String url) argument
128 SslError(int error, X509Certificate certificate, String url) argument
[all...]
H A DEventHandler.java24 * there is an SSL certificate error. error() can occur anywhere
109 * SSL certificate callback called before resource request is
112 public void certificate(SslCertificate certificate); argument
122 * SSL certificate error callback. Handles SSL error(s) on the way
H A DLoggingEventHandler.java72 public void certificate(SslCertificate certificate) { argument
74 HttpLog.v("LoggingEventHandler: certificate(): " + certificate);
H A DSslCertificate.java43 * SSL certificate info (certificate details) class
53 * Name of the entity this certificate is issued to
58 * Name of the entity this certificate is issued by
73 * The original source certificate, if available.
88 private static final String X509_CERTIFICATE = "x509-certificate";
91 * Saves the certificate state to a bundle
92 * @param certificate The SSL certificate to store
93 * @return A bundle with the certificate store
95 saveState(SslCertificate certificate) argument
177 SslCertificate(X509Certificate certificate) argument
[all...]
H A DDelegatingSSLSession.java30 * This is only used when a {@code certificate} is available but usage
42 public CertificateWrap(Certificate certificate) { argument
43 mCertificate = certificate;
H A DHttpConnection.java49 // Update the certificate info (connection not secure - set to null)
52 eventHandler.certificate(mCertificate);
H A DHttpsConnection.java148 * Sets the server SSL certificate associated with this
150 * @param certificate The SSL certificate
152 /* package */ void setCertificate(SslCertificate certificate) { argument
153 mCertificate = certificate;
316 // allow the certificate anyway.
H A DConnection.java61 * The server SSL certificate associated with this connection
63 * It would be nice to store the whole certificate chain, but
135 * @return The server SSL certificate associated with this
225 * know of any associated certificate,
228 req.mEventHandler.certificate(mCertificate);
355 // reset the certificate to null before opening a connection
/frameworks/base/media/lib/signer/java/com/android/mediadrm/signer/
H A DMediaDrmSigner.java23 * Provides certificate request generation, response handling and
30 * Specify X.509 certificate type
35 * Contains the opaque data an app uses to request a certificate from a provisioning
53 * Get the default URL to use when sending the certificate request
55 * certificate server URL obtained from other sources.
63 * Contains the wrapped private key and public certificate data associated
64 * with a certificate.
69 Certificate(MediaDrm.Certificate certificate) { argument
70 mCertificate = certificate;
81 * Get the PEM-encoded public certificate chai
[all...]
/frameworks/base/keystore/java/android/security/
H A DAndroidKeyStore.java63 * Credentials.USER_CERTIFICATE as the first certificate in the chain (the one
68 * with a single certificate.
133 byte[] certificate = mKeyStore.get(Credentials.USER_CERTIFICATE + alias);
134 if (certificate != null) {
135 return toCertificate(certificate);
138 certificate = mKeyStore.get(Credentials.CA_CERTIFICATE + alias);
139 if (certificate != null) {
140 return toCertificate(certificate);
152 Log.w(NAME, "Couldn't parse certificate in keystore", e);
273 throw new KeyStoreException("Couldn't encode certificate #
[all...]
/frameworks/base/tests/CoreTests/android/core/
H A DTestEventHandler.java445 * Implements the EventHandler certificate method called every
448 public void certificate(SslCertificate certificate) {} argument
496 * SSL certificate error callback. Handles SSL error(s) on the way
505 " certificate: " + error.getCertificate());
527 if (expectSslErrors == -1) // && expectSslCertificate == certificate?
730 public void expectSSLCertificateError(SslCertificate certificate) { argument
732 expectCertificate = certificate;
/frameworks/av/drm/mediadrm/plugins/clearkey/
H A DDrmPlugin.h99 Vector<uint8_t>& certificate,
102 UNUSED(certificate);
97 provideProvisionResponse( const Vector<uint8_t>& response, Vector<uint8_t>& certificate, Vector<uint8_t>& wrappedKey) argument
/frameworks/base/media/jni/
H A Dandroid_media_MediaDrm.cpp128 CertificateFields certificate; member in struct:android::fields_t
590 GET_FIELD_ID(gFields.certificate.wrappedPrivateKey, clazz, "mWrappedKey", "[B");
591 GET_FIELD_ID(gFields.certificate.certificateData, clazz, "mCertificateData", "[B");
947 Vector<uint8_t> certificate, wrappedKey; local
949 status_t err = drm->provideProvisionResponse(response, certificate, wrappedKey);
956 if (clazz && certificate.size() && wrappedKey.size()) {
958 jbyteArray jcertificate = VectorToJByteArray(env, certificate);
959 env->SetObjectField(certificateObj, gFields.certificate.certificateData, jcertificate);
962 env->SetObjectField(certificateObj, gFields.certificate.wrappedPrivateKey, jwrappedKey);
/frameworks/av/media/libmedia/
H A DIDrm.cpp221 Vector<uint8_t> &certificate,
229 readVector(reply, certificate);
644 Vector<uint8_t> certificate; local
647 status_t result = provideProvisionResponse(response, certificate, wrappedKey);
648 writeVector(reply, certificate);
220 provideProvisionResponse(Vector<uint8_t> const &response, Vector<uint8_t> &certificate, Vector<uint8_t> &wrappedKey) argument
/frameworks/av/drm/mediadrm/plugins/mock/
H A DMockDrmCryptoPlugin.h85 Vector<uint8_t> &certificate,
H A DMockDrmCryptoPlugin.cpp288 Vector<uint8_t> &certificate,
287 provideProvisionResponse(Vector<uint8_t> const &response, Vector<uint8_t> &certificate, Vector<uint8_t> &wrappedKey) argument
/frameworks/av/include/media/
H A DIDrm.h70 Vector<uint8_t> &certificate,
/frameworks/av/media/libmediaplayerservice/
H A DDrm.h75 Vector<uint8_t> &certificate,
H A DDrm.cpp405 Vector<uint8_t> &certificate,
417 return mPlugin->provideProvisionResponse(response, certificate, wrappedKey);
404 provideProvisionResponse(Vector<uint8_t> const &response, Vector<uint8_t> &certificate, Vector<uint8_t> &wrappedKey) argument
/frameworks/base/core/java/android/webkit/
H A DWebViewProvider.java83 public void setCertificate(SslCertificate certificate); argument
H A DWebView.java613 * Gets the SSL certificate for the main top-level page or null if there is
614 * no certificate (the site is not secure).
616 * @return the SSL certificate for the main top-level page
624 * Sets the SSL certificate for the main top-level page.
630 public void setCertificate(SslCertificate certificate) { argument
632 if (TRACE) Log.d(LOGTAG, "setCertificate=" + certificate);
633 mProvider.setCertificate(certificate);
1485 * SSL certificate errors.
1494 * Clears the client certificate preferences stored in response
/frameworks/native/include/media/drm/
H A DDrmAPI.h176 // provisioning server to retrieve a device certificate. getProvisionRequest
189 Vector<uint8_t> &certificate,
/frameworks/webview/chromium/java/com/android/webview/chromium/
H A DWebViewChromium.java446 public void setCertificate(SslCertificate certificate) { argument
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/
H A DWifiConfigStore.java3870 static boolean hasHardwareBackedKey(Certificate certificate) { argument
3871 return KeyChain.isBoundKeyAlgorithm(certificate.getPublicKey().getAlgorithm());
3877 // a valid client certificate is configured
3880 // taking WIFI_UID as a parameter. It always looks for certificate
3891 if (DBG) Slog.d(TAG, "Loading client certificate " + Credentials
3896 Slog.e(TAG, "Error getting certificate factory");
3908 if (DBG) Slog.d(TAG, "Loaded client certificate " + Credentials
3913 Slog.d(TAG, "could not generate certificate");
3916 Slog.e(TAG, "Could not load client certificate " + Credentials
4167 if (DBG) Log.d(TAG, "putting certificate "
[all...]

Completed in 288 milliseconds