/frameworks/base/core/java/android/net/http/ |
H A D | X509TrustManagerExtensions.java | 21 import java.security.cert.CertificateException; 22 import java.security.cert.X509Certificate; 80 public boolean isUserAddedCertificate(X509Certificate cert) { argument 81 return mDelegate.isUserAddedCertificate(cert);
|
H A D | SslError.java | 19 import java.security.cert.X509Certificate; 140 int error, SslCertificate cert, String url) { 145 return new SslError(SSL_IDMISMATCH, cert, url); 147 return new SslError(SSL_DATE_INVALID, cert, url); 149 return new SslError(SSL_UNTRUSTED, cert, url); 151 return new SslError(SSL_INVALID, cert, url); 139 SslErrorFromChromiumErrorCode( int error, SslCertificate cert, String url) argument
|
/frameworks/base/core/java/org/apache/http/conn/ssl/ |
H A D | X509HostnameVerifier.java | 39 import java.security.cert.X509Certificate; 71 void verify(String host, X509Certificate cert) throws SSLException; argument
|
H A D | AbstractVerifier.java | 37 import java.security.cert.Certificate; 38 import java.security.cert.CertificateParsingException; 39 import java.security.cert.X509Certificate; 117 public final void verify(String host, X509Certificate cert) argument 119 String[] cns = getCNs(cert); 120 String[] subjectAlts = getDNSSubjectAlts(cert); 211 public static String[] getCNs(X509Certificate cert) { argument 213 new DistinguishedNameParser(cert.getSubjectX500Principal()); 237 * @param cert X509Certificate 240 public static String[] getDNSSubjectAlts(X509Certificate cert) { argument [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | AndroidKeyStoreSpi.java | 47 import java.security.cert.Certificate; 48 import java.security.cert.CertificateEncodingException; 49 import java.security.cert.CertificateException; 50 import java.security.cert.CertificateFactory; 51 import java.security.cert.X509Certificate; 179 X509Certificate cert = toCertificate(encodedCert); 180 if (cert == null) { 192 return wrapIntoKeyStoreCertificate(privateKeyAlias, cert); 198 return cert; 369 throw new KeyStoreException("Certificates must be in X.509 format: invalid cert #" 737 engineSetCertificateEntry(String alias, Certificate cert) argument 853 engineGetCertificateAlias(Certificate cert) argument [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/updates/ |
H A D | CertPinInstallReceiverTest.java | 33 import java.security.cert.CertificateFactory; 34 import java.security.cert.Certificate; 35 import java.security.cert.X509Certificate; 174 String signature, X509Certificate cert) throws Exception { 176 signer.initVerify(cert); 193 private String runTest(String cert, String content, String version, String required, String sig) argument 196 overrideCert(cert); 203 private String runTestWithoutSig(String cert, String content, String version, String required) argument 206 return runTest(cert, content, version, required, sig); 173 verifySignature(String content, String version, String requiredPrevious, String signature, X509Certificate cert) argument
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | SELinuxMMAC.java | 185 * Loop over a signer tag looking for seinfo, package and cert tags. A {@link Policy} 204 // Check for a cert attached to the signer tag. We allow a signature 205 // to appear as an attribute as well as those attached to cert tags. 206 String cert = parser.getAttributeValue(null, "signature"); 207 if (cert != null) { 208 pb.addSignature(cert); 223 } else if ("cert".equals(tagName)) { 311 parser.require(XmlPullParser.START_TAG, null, "cert"); 591 for (Signature cert : mCerts) { 592 sb.append("cert 701 addSignature(String cert) argument [all...] |
/frameworks/base/keystore/tests/src/android/security/keystore/ |
H A D | AndroidKeyStoreTest.java | 41 import java.security.cert.Certificate; 42 import java.security.cert.CertificateFactory; 43 import java.security.cert.X509Certificate; 95 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650 469 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650 1179 byte[] cert, byte[] ca) throws Exception { 1184 Certificate expectedCert = certFact.generateCertificate(new ByteArrayInputStream(cert)); 1214 assertEquals("First certificate in chain should be user cert", expectedCert, actualChain[0]); 1422 final Certificate cert = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_CA_1)); 1425 mKeyStore.setCertificateEntry(TEST_ALIAS_1, cert); 1178 assertPrivateKeyEntryEquals(PrivateKeyEntry keyEntry, String keyType, byte[] key, byte[] cert, byte[] ca) argument [all...] |
/frameworks/base/wifi/java/android/net/wifi/ |
H A D | WifiEnterpriseConfig.java | 27 import java.security.cert.CertificateEncodingException; 28 import java.security.cert.CertificateException; 29 import java.security.cert.CertificateFactory; 30 import java.security.cert.X509Certificate; 154 private void writeCertificate(Parcel dest, X509Certificate cert) { argument 155 if (cert != null) { 157 byte[] certBytes = cert.getEncoded(); 203 X509Certificate cert = null; 210 cert = (X509Certificate) cFactory 213 cert 434 setCaCertificate(X509Certificate cert) argument [all...] |
/frameworks/base/core/java/android/app/admin/ |
H A D | DevicePolicyManager.java | 58 import java.security.cert.Certificate; 59 import java.security.cert.CertificateException; 60 import java.security.cert.CertificateFactory; 61 import java.security.cert.X509Certificate; 2306 * @param cert The certificate to install. 2311 public boolean installKeyPair(@Nullable ComponentName admin, PrivateKey privKey, Certificate cert, argument 2314 final byte[] pemCert = Credentials.convertToPem(cert); 2334 final X509Certificate cert = (X509Certificate) certFactory.generateCertificate( 2336 return new TrustedCertificateStore().getCertificateAlias(cert);
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
H A D | WifiConfigStore.java | 88 import java.security.cert.Certificate; 89 import java.security.cert.CertificateException; 3949 Certificate cert = (X509Certificate) factory.generateCertificate( 3952 if (cert != null) { 3953 mNeedsSoftwareKeystore = hasHardwareBackedKey(cert); 4324 // Remove client key+cert 4346 private boolean putCertInKeyStore(String name, Certificate cert) { argument 4348 byte[] certData = Credentials.convertToPem(cert); 4363 if (DBG) Log.d(TAG, "removing client private key and user cert"); 4371 if (DBG) Log.d(TAG, "removing CA cert"); [all...] |
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
H A D | DevicePolicyManagerService.java | 134 import java.security.cert.CertificateException; 135 import java.security.cert.CertificateFactory; 136 import java.security.cert.X509Certificate; 186 private static final String ATTR_DELEGATED_CERT_INSTALLER = "delegated-cert-installer"; 1027 // Check if delegated cert installer package is removed. 3143 X509Certificate cert = parseCert(certBuffer); 3144 pemCert = Credentials.convertToPem(cert); 3146 Log.e(LOG_TAG, "Problem converting cert", ce); 3149 Log.e(LOG_TAG, "Problem reading cert", ioe); 3206 public boolean installKeyPair(ComponentName who, byte[] privKey, byte[] cert, Strin argument [all...] |