/frameworks/webview/chromium/java/com/android/webview/chromium/ |
H A D | WebViewContentsClientAdapter.java | 72 import java.security.cert.X509Certificate;
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
H A D | UiccCarrierPrivilegeRules.java | 42 import java.security.cert.Certificate; 43 import java.security.cert.CertificateException; 44 import java.security.cert.CertificateFactory; 45 import java.security.cert.X509Certificate; 89 * DEVICE_APP_ID_REF_DO = TAG_DEVICE_APP_ID_REF_DO + len + sha256 hexstring of cert 139 return "cert: " + IccUtils.bytesToHexString(certificateHash) + " pkg: " +
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
H A D | WifiConfigStore.java | 76 import java.security.cert.Certificate; 77 import java.security.cert.CertificateException; 3902 Certificate cert = (X509Certificate) factory.generateCertificate( 3905 if (cert != null) { 3906 mNeedsSoftwareKeystore = hasHardwareBackedKey(cert); 4142 // Remove client key+cert 4164 private boolean putCertInKeyStore(String name, Certificate cert) { argument 4166 byte[] certData = Credentials.convertToPem(cert); 4181 if (DBG) Log.d(TAG, "removing client private key and user cert"); 4189 if (DBG) Log.d(TAG, "removing CA cert"); [all...] |
/frameworks/base/wifi/java/android/net/wifi/ |
H A D | WifiEnterpriseConfig.java | 27 import java.security.cert.CertificateEncodingException; 28 import java.security.cert.CertificateException; 29 import java.security.cert.CertificateFactory; 30 import java.security.cert.X509Certificate; 145 private void writeCertificate(Parcel dest, X509Certificate cert) { argument 146 if (cert != null) { 148 byte[] certBytes = cert.getEncoded(); 194 X509Certificate cert = null; 201 cert = (X509Certificate) cFactory 204 cert 422 setCaCertificate(X509Certificate cert) argument [all...] |
/frameworks/base/packages/SystemUI/tests/ |
H A D | Android.mk | 35 # sign this with platform cert, so this test is allowed to inject key events into
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | PackageManagerService.java | 198 import java.security.cert.CertificateEncodingException; 199 import java.security.cert.CertificateException; 8578 // not signed with the same cert as the caller. 8584 "Caller does not have same cert as new installer package " 8590 // be signed with the same cert as the caller. 8601 "Caller does not have same cert as old installer package " 10655 // If the defining package is signed with our cert, it's okay. This
|
H A D | SELinuxMMAC.java | 162 String cert = parser.getAttributeValue(null, "signature"); 163 if (cert == null) { 171 signature = new Signature(cert);
|
/frameworks/base/services/core/java/com/android/server/updates/ |
H A D | ConfigUpdateInstallReceiver.java | 36 import java.security.cert.CertificateException; 37 import java.security.cert.CertificateFactory; 38 import java.security.cert.X509Certificate; 76 X509Certificate cert = getCert(context.getContentResolver()); 95 cert)) { 119 // get the cert from settings 120 String cert = Settings.Secure.getString(cr, UPDATE_CERTIFICATE_KEY); 123 byte[] derCert = Base64.decode(cert.getBytes(), Base64.DEFAULT); 220 String signature, X509Certificate cert) throws Exception { 222 signer.initVerify(cert); 219 verifySignature(byte[] content, int version, String requiredPrevious, String signature, X509Certificate cert) argument [all...] |
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
H A D | DevicePolicyManagerService.java | 124 import java.security.cert.CertificateException; 125 import java.security.cert.CertificateFactory; 126 import java.security.cert.X509Certificate; 2894 X509Certificate cert = parseCert(certBuffer); 2895 pemCert = Credentials.convertToPem(cert); 2897 Log.e(LOG_TAG, "Problem converting cert", ce); 2900 Log.e(LOG_TAG, "Problem reading cert", ioe); 2955 public boolean installKeyPair(ComponentName who, byte[] privKey, byte[] cert, String alias) { argument 2968 return keyChain.installKeyPair(privKey, cert, alias);
|
/frameworks/base/services/tests/servicestests/src/com/android/server/updates/ |
H A D | CertPinInstallReceiverTest.java | 33 import java.security.cert.CertificateFactory; 34 import java.security.cert.Certificate; 35 import java.security.cert.X509Certificate; 174 String signature, X509Certificate cert) throws Exception { 176 signer.initVerify(cert); 193 private String runTest(String cert, String content, String version, String required, String sig) argument 196 overrideCert(cert); 203 private String runTestWithoutSig(String cert, String content, String version, String required) argument 206 return runTest(cert, content, version, required, sig); 173 verifySignature(String content, String version, String requiredPrevious, String signature, X509Certificate cert) argument
|
/frameworks/base/tests/CoreTests/android/core/ |
H A D | SSLSocketTest.java | 37 import java.security.cert.X509Certificate; 452 // Regression test for #1204316: Missing client cert unit test. Passes on 815 assertTrue("Client cert chain must not be null", clientChain != null); 816 assertTrue("Client cert chain must not be empty", clientChain.length != 0); 823 assertTrue("Server cert chain must not be null", serverChain != null); 824 assertTrue("Server cert chain must not be empty", serverChain.length != 0);
|
/frameworks/base/keystore/java/android/security/ |
H A D | AndroidKeyPairGenerator.java | 34 import java.security.cert.CertificateEncodingException; 35 import java.security.cert.X509Certificate; 131 final X509Certificate cert; 133 cert = certGen.generate(privKey); 141 certBytes = cert.getEncoded();
|
H A D | AndroidKeyStore.java | 39 import java.security.cert.Certificate; 40 import java.security.cert.CertificateEncodingException; 41 import java.security.cert.CertificateException; 42 import java.security.cert.CertificateFactory; 43 import java.security.cert.X509Certificate; 257 throw new KeyStoreException("Certificates must be in X.509 format: invalid cert #" 262 throw new KeyStoreException("Certificates must be in X.509 format: invalid cert #" 350 public void engineSetCertificateEntry(String alias, Certificate cert) throws KeyStoreException { argument 356 if (cert == null) { 357 throw new NullPointerException("cert 452 engineGetCertificateAlias(Certificate cert) argument [all...] |
H A D | Credentials.java | 35 import java.security.cert.Certificate; 36 import java.security.cert.CertificateEncodingException; 37 import java.security.cert.CertificateException; 38 import java.security.cert.CertificateFactory; 39 import java.security.cert.X509Certificate;
|
H A D | KeyChain.java | 34 import java.security.cert.Certificate; 35 import java.security.cert.CertificateException; 36 import java.security.cert.CertificateFactory; 37 import java.security.cert.X509Certificate; 407 Certificate cert = certFactory.generateCertificate(new ByteArrayInputStream(bytes)); 408 return (X509Certificate) cert;
|
H A D | KeyPairGeneratorSpec.java | 27 import java.security.cert.Certificate;
|
/frameworks/base/keystore/tests/src/android/security/ |
H A D | AndroidKeyPairGeneratorTest.java | 27 import java.security.cert.Certificate; 28 import java.security.cert.CertificateFactory; 29 import java.security.cert.X509Certificate;
|
H A D | AndroidKeyStoreTest.java | 41 import java.security.cert.Certificate; 42 import java.security.cert.CertificateFactory; 43 import java.security.cert.X509Certificate; 100 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650 474 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650 734 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650 1566 byte[] cert, byte[] ca) throws Exception { 1571 Certificate expectedCert = certFact.generateCertificate(new ByteArrayInputStream(cert)); 1605 assertEquals("First certificate in chain should be user cert", expectedCert, actualChain[0]); 1815 final Certificate cert 1565 assertPrivateKeyEntryEquals(PrivateKeyEntry keyEntry, String keyType, byte[] key, byte[] cert, byte[] ca) argument [all...] |
/frameworks/base/core/tests/coretests/src/android/net/http/ |
H A D | SslCertificateTest.java | 23 import java.security.cert.CertificateFactory; 24 import java.security.cert.X509Certificate;
|
H A D | X509TrustManagerExtensionsTest.java | 20 import java.security.cert.X509Certificate;
|
/frameworks/base/core/java/android/content/pm/ |
H A D | PackageParser.java | 68 import java.security.cert.Certificate; 69 import java.security.cert.CertificateEncodingException;
|
H A D | Signature.java | 28 import java.security.cert.Certificate; 29 import java.security.cert.CertificateEncodingException; 30 import java.security.cert.CertificateException; 31 import java.security.cert.CertificateFactory; 32 import java.security.cert.X509Certificate; 176 final Certificate cert = certFactory.generateCertificate(bais); 177 return cert.getPublicKey(); 296 final X509Certificate cert = (X509Certificate) cf.generateCertificate(is); 297 final Signature sPrime = new Signature(cert.getEncoded()); 300 throw new CertificateException("Bounced cert lengt [all...] |
/frameworks/base/core/java/android/net/ |
H A D | SSLCertificateSocketFactory.java | 30 import java.security.cert.X509Certificate;
|
/frameworks/base/core/java/android/net/http/ |
H A D | CertificateChainValidator.java | 31 import java.security.cert.Certificate; 32 import java.security.cert.CertificateException; 33 import java.security.cert.CertificateFactory; 34 import java.security.cert.X509Certificate; 141 * by Chromium HTTPS stack to validate the cert chain. 144 * @param authType The authentication type for the cert chain 205 * @param chain the cert chain in X509 cert format. 207 * @param authType The authentication type for the cert chain
|
H A D | DelegatingSSLSession.java | 20 import java.security.cert.Certificate; 21 import java.security.cert.X509Certificate; 94 public javax.security.cert.X509Certificate[] getPeerCertificateChain()
|