Searched defs:cert (Results 1 - 12 of 12) sorted by relevance

/frameworks/base/core/java/android/net/http/
H A DX509TrustManagerExtensions.java21 import java.security.cert.CertificateException;
22 import java.security.cert.X509Certificate;
80 public boolean isUserAddedCertificate(X509Certificate cert) { argument
81 return mDelegate.isUserAddedCertificate(cert);
H A DSslError.java19 import java.security.cert.X509Certificate;
140 int error, SslCertificate cert, String url) {
145 return new SslError(SSL_IDMISMATCH, cert, url);
147 return new SslError(SSL_DATE_INVALID, cert, url);
149 return new SslError(SSL_UNTRUSTED, cert, url);
151 return new SslError(SSL_INVALID, cert, url);
139 SslErrorFromChromiumErrorCode( int error, SslCertificate cert, String url) argument
/frameworks/base/core/java/org/apache/http/conn/ssl/
H A DX509HostnameVerifier.java39 import java.security.cert.X509Certificate;
71 void verify(String host, X509Certificate cert) throws SSLException; argument
H A DAbstractVerifier.java37 import java.security.cert.Certificate;
38 import java.security.cert.CertificateParsingException;
39 import java.security.cert.X509Certificate;
117 public final void verify(String host, X509Certificate cert) argument
119 String[] cns = getCNs(cert);
120 String[] subjectAlts = getDNSSubjectAlts(cert);
211 public static String[] getCNs(X509Certificate cert) { argument
213 new DistinguishedNameParser(cert.getSubjectX500Principal());
237 * @param cert X509Certificate
240 public static String[] getDNSSubjectAlts(X509Certificate cert) { argument
[all...]
/frameworks/base/keystore/java/android/security/keystore/
H A DAndroidKeyStoreSpi.java47 import java.security.cert.Certificate;
48 import java.security.cert.CertificateEncodingException;
49 import java.security.cert.CertificateException;
50 import java.security.cert.CertificateFactory;
51 import java.security.cert.X509Certificate;
179 X509Certificate cert = toCertificate(encodedCert);
180 if (cert == null) {
192 return wrapIntoKeyStoreCertificate(privateKeyAlias, cert);
198 return cert;
369 throw new KeyStoreException("Certificates must be in X.509 format: invalid cert #"
737 engineSetCertificateEntry(String alias, Certificate cert) argument
853 engineGetCertificateAlias(Certificate cert) argument
[all...]
/frameworks/base/services/tests/servicestests/src/com/android/server/updates/
H A DCertPinInstallReceiverTest.java33 import java.security.cert.CertificateFactory;
34 import java.security.cert.Certificate;
35 import java.security.cert.X509Certificate;
174 String signature, X509Certificate cert) throws Exception {
176 signer.initVerify(cert);
193 private String runTest(String cert, String content, String version, String required, String sig) argument
196 overrideCert(cert);
203 private String runTestWithoutSig(String cert, String content, String version, String required) argument
206 return runTest(cert, content, version, required, sig);
173 verifySignature(String content, String version, String requiredPrevious, String signature, X509Certificate cert) argument
/frameworks/base/services/core/java/com/android/server/pm/
H A DSELinuxMMAC.java185 * Loop over a signer tag looking for seinfo, package and cert tags. A {@link Policy}
204 // Check for a cert attached to the signer tag. We allow a signature
205 // to appear as an attribute as well as those attached to cert tags.
206 String cert = parser.getAttributeValue(null, "signature");
207 if (cert != null) {
208 pb.addSignature(cert);
223 } else if ("cert".equals(tagName)) {
311 parser.require(XmlPullParser.START_TAG, null, "cert");
591 for (Signature cert : mCerts) {
592 sb.append("cert
701 addSignature(String cert) argument
[all...]
/frameworks/base/keystore/tests/src/android/security/keystore/
H A DAndroidKeyStoreTest.java41 import java.security.cert.Certificate;
42 import java.security.cert.CertificateFactory;
43 import java.security.cert.X509Certificate;
95 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650
469 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650
1179 byte[] cert, byte[] ca) throws Exception {
1184 Certificate expectedCert = certFact.generateCertificate(new ByteArrayInputStream(cert));
1214 assertEquals("First certificate in chain should be user cert", expectedCert, actualChain[0]);
1422 final Certificate cert = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_CA_1));
1425 mKeyStore.setCertificateEntry(TEST_ALIAS_1, cert);
1178 assertPrivateKeyEntryEquals(PrivateKeyEntry keyEntry, String keyType, byte[] key, byte[] cert, byte[] ca) argument
[all...]
/frameworks/base/wifi/java/android/net/wifi/
H A DWifiEnterpriseConfig.java27 import java.security.cert.CertificateEncodingException;
28 import java.security.cert.CertificateException;
29 import java.security.cert.CertificateFactory;
30 import java.security.cert.X509Certificate;
154 private void writeCertificate(Parcel dest, X509Certificate cert) { argument
155 if (cert != null) {
157 byte[] certBytes = cert.getEncoded();
203 X509Certificate cert = null;
210 cert = (X509Certificate) cFactory
213 cert
434 setCaCertificate(X509Certificate cert) argument
[all...]
/frameworks/base/core/java/android/app/admin/
H A DDevicePolicyManager.java58 import java.security.cert.Certificate;
59 import java.security.cert.CertificateException;
60 import java.security.cert.CertificateFactory;
61 import java.security.cert.X509Certificate;
2306 * @param cert The certificate to install.
2311 public boolean installKeyPair(@Nullable ComponentName admin, PrivateKey privKey, Certificate cert, argument
2314 final byte[] pemCert = Credentials.convertToPem(cert);
2334 final X509Certificate cert = (X509Certificate) certFactory.generateCertificate(
2336 return new TrustedCertificateStore().getCertificateAlias(cert);
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/
H A DWifiConfigStore.java88 import java.security.cert.Certificate;
89 import java.security.cert.CertificateException;
3949 Certificate cert = (X509Certificate) factory.generateCertificate(
3952 if (cert != null) {
3953 mNeedsSoftwareKeystore = hasHardwareBackedKey(cert);
4324 // Remove client key+cert
4346 private boolean putCertInKeyStore(String name, Certificate cert) { argument
4348 byte[] certData = Credentials.convertToPem(cert);
4363 if (DBG) Log.d(TAG, "removing client private key and user cert");
4371 if (DBG) Log.d(TAG, "removing CA cert");
[all...]
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/
H A DDevicePolicyManagerService.java134 import java.security.cert.CertificateException;
135 import java.security.cert.CertificateFactory;
136 import java.security.cert.X509Certificate;
186 private static final String ATTR_DELEGATED_CERT_INSTALLER = "delegated-cert-installer";
1027 // Check if delegated cert installer package is removed.
3143 X509Certificate cert = parseCert(certBuffer);
3144 pemCert = Credentials.convertToPem(cert);
3146 Log.e(LOG_TAG, "Problem converting cert", ce);
3149 Log.e(LOG_TAG, "Problem reading cert", ioe);
3206 public boolean installKeyPair(ComponentName who, byte[] privKey, byte[] cert, Strin argument
[all...]

Completed in 7563 milliseconds