/frameworks/base/core/java/android/net/http/ |
H A D | X509TrustManagerExtensions.java | 21 import java.security.cert.CertificateException; 22 import java.security.cert.X509Certificate; 80 public boolean isUserAddedCertificate(X509Certificate cert) { argument 81 return mDelegate.isUserAddedCertificate(cert);
|
H A D | SslError.java | 19 import java.security.cert.X509Certificate; 140 int error, SslCertificate cert, String url) { 145 return new SslError(SSL_IDMISMATCH, cert, url); 147 return new SslError(SSL_DATE_INVALID, cert, url); 149 return new SslError(SSL_UNTRUSTED, cert, url); 151 return new SslError(SSL_INVALID, cert, url); 139 SslErrorFromChromiumErrorCode( int error, SslCertificate cert, String url) argument
|
H A D | SslCertificate.java | 30 import java.security.cert.Certificate; 31 import java.security.cert.CertificateEncodingException; 32 import java.security.cert.CertificateException; 33 import java.security.cert.CertificateFactory; 34 import java.security.cert.X509Certificate; 130 Certificate cert = certFactory.generateCertificate(new ByteArrayInputStream(bytes)); 131 x509Certificate = (X509Certificate) cert;
|
/frameworks/base/core/java/org/apache/http/conn/ssl/ |
H A D | X509HostnameVerifier.java | 39 import java.security.cert.X509Certificate; 71 void verify(String host, X509Certificate cert) throws SSLException; argument
|
H A D | AbstractVerifier.java | 37 import java.security.cert.Certificate; 38 import java.security.cert.CertificateParsingException; 39 import java.security.cert.X509Certificate; 117 public final void verify(String host, X509Certificate cert) argument 119 String[] cns = getCNs(cert); 120 String[] subjectAlts = getDNSSubjectAlts(cert); 211 public static String[] getCNs(X509Certificate cert) { argument 213 new DistinguishedNameParser(cert.getSubjectX500Principal()); 237 * @param cert X509Certificate 240 public static String[] getDNSSubjectAlts(X509Certificate cert) { argument [all...] |
/frameworks/base/packages/StatementService/src/com/android/statementservice/retriever/ |
H A D | AndroidAppAssetMatcher.java | 43 for (String cert : androidAppAsset.getCertFingerprints()) { 44 if (certs.contains(cert)) {
|
/frameworks/base/core/java/android/webkit/ |
H A D | ClientCertRequest.java | 21 import java.security.cert.X509Certificate; 27 * such as the host name and the port number requesting the cert, the acceptable
|
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | DelegatingX509Certificate.java | 26 import java.security.cert.CertificateEncodingException; 27 import java.security.cert.CertificateException; 28 import java.security.cert.CertificateExpiredException; 29 import java.security.cert.CertificateNotYetValidException; 30 import java.security.cert.CertificateParsingException; 31 import java.security.cert.X509Certificate;
|
H A D | AndroidKeyStoreSpi.java | 47 import java.security.cert.Certificate; 48 import java.security.cert.CertificateEncodingException; 49 import java.security.cert.CertificateException; 50 import java.security.cert.CertificateFactory; 51 import java.security.cert.X509Certificate; 179 X509Certificate cert = toCertificate(encodedCert); 180 if (cert == null) { 192 return wrapIntoKeyStoreCertificate(privateKeyAlias, cert); 198 return cert; 369 throw new KeyStoreException("Certificates must be in X.509 format: invalid cert #" 737 engineSetCertificateEntry(String alias, Certificate cert) argument 853 engineGetCertificateAlias(Certificate cert) argument [all...] |
H A D | AndroidKeyStoreKeyPairGeneratorSpi.java | 59 import java.security.cert.CertificateEncodingException; 60 import java.security.cert.X509Certificate; 500 final X509Certificate cert; 502 cert = generateSelfSignedCertificate(result.getPrivate(), result.getPublic()); 509 certBytes = cert.getEncoded();
|
/frameworks/base/core/java/android/content/pm/ |
H A D | Signature.java | 28 import java.security.cert.Certificate; 29 import java.security.cert.CertificateEncodingException; 30 import java.security.cert.CertificateException; 31 import java.security.cert.CertificateFactory; 32 import java.security.cert.X509Certificate; 176 final Certificate cert = certFactory.generateCertificate(bais); 177 return cert.getPublicKey(); 296 final X509Certificate cert = (X509Certificate) cf.generateCertificate(is); 297 final Signature sPrime = new Signature(cert.getEncoded()); 300 throw new CertificateException("Bounced cert lengt [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/updates/ |
H A D | CertPinInstallReceiverTest.java | 33 import java.security.cert.CertificateFactory; 34 import java.security.cert.Certificate; 35 import java.security.cert.X509Certificate; 174 String signature, X509Certificate cert) throws Exception { 176 signer.initVerify(cert); 193 private String runTest(String cert, String content, String version, String required, String sig) argument 196 overrideCert(cert); 203 private String runTestWithoutSig(String cert, String content, String version, String required) argument 206 return runTest(cert, content, version, required, sig); 173 verifySignature(String content, String version, String requiredPrevious, String signature, X509Certificate cert) argument
|
/frameworks/base/wifi/java/android/net/wifi/ |
H A D | WifiEnterpriseConfig.java | 27 import java.security.cert.CertificateEncodingException; 28 import java.security.cert.CertificateException; 29 import java.security.cert.CertificateFactory; 30 import java.security.cert.X509Certificate; 164 private void writeCertificate(Parcel dest, X509Certificate cert) { argument 165 if (cert != null) { 167 byte[] certBytes = cert.getEncoded(); 214 X509Certificate cert = null; 221 cert = (X509Certificate) cFactory 224 cert 465 setCaCertificate(X509Certificate cert) argument [all...] |
/frameworks/base/core/tests/coretests/src/android/net/http/ |
H A D | SslCertificateTest.java | 23 import java.security.cert.CertificateFactory; 24 import java.security.cert.X509Certificate;
|
H A D | X509TrustManagerExtensionsTest.java | 20 import java.security.cert.X509Certificate;
|
/frameworks/base/keystore/java/android/security/ |
H A D | Credentials.java | 35 import java.security.cert.Certificate; 36 import java.security.cert.CertificateEncodingException; 37 import java.security.cert.CertificateException; 38 import java.security.cert.CertificateFactory; 39 import java.security.cert.X509Certificate;
|
H A D | KeyChain.java | 41 import java.security.cert.Certificate; 42 import java.security.cert.CertificateException; 43 import java.security.cert.CertificateFactory; 44 import java.security.cert.X509Certificate; 482 Certificate cert = certFactory.generateCertificate(new ByteArrayInputStream(bytes)); 483 return (X509Certificate) cert;
|
H A D | KeyPairGeneratorSpec.java | 30 import java.security.cert.Certificate;
|
/frameworks/base/core/java/android/os/ |
H A D | RecoverySystem.java | 37 import java.security.cert.CertificateFactory; 38 import java.security.cert.X509Certificate; 212 X509Certificate cert = null; 216 cert = (X509Certificate) cf.generateCertificate(is); 235 PublicKey signatureKey = cert.getPublicKey(); 247 // The signature cert matches a trusted key. Now verify that 248 // the digest in the cert matches the actual file data. 252 // based on the signature algorithm of the cert: 254 // "SHA256withRSA" cert -> "SHA256withRSA" signature 255 // "SHA1withRSA" cert [all...] |
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | SELinuxMMAC.java | 185 * Loop over a signer tag looking for seinfo, package and cert tags. A {@link Policy} 204 // Check for a cert attached to the signer tag. We allow a signature 205 // to appear as an attribute as well as those attached to cert tags. 206 String cert = parser.getAttributeValue(null, "signature"); 207 if (cert != null) { 208 pb.addSignature(cert); 223 } else if ("cert".equals(tagName)) { 311 parser.require(XmlPullParser.START_TAG, null, "cert"); 591 for (Signature cert : mCerts) { 592 sb.append("cert 701 addSignature(String cert) argument [all...] |
/frameworks/base/packages/SystemUI/tests/ |
H A D | Android.mk | 35 # sign this with platform cert, so this test is allowed to inject key events into
|
/frameworks/base/keystore/tests/src/android/security/keystore/ |
H A D | AndroidKeyPairGeneratorTest.java | 33 import java.security.cert.Certificate; 34 import java.security.cert.CertificateFactory; 35 import java.security.cert.X509Certificate; 405 // Assert that the cert's signature verifies using the public key from generated KeyPair 407 // Assert that the cert's signature verifies using the public key from the cert itself.
|
H A D | AndroidKeyStoreTest.java | 41 import java.security.cert.Certificate; 42 import java.security.cert.CertificateFactory; 43 import java.security.cert.X509Certificate; 95 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650 469 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650 1179 byte[] cert, byte[] ca) throws Exception { 1184 Certificate expectedCert = certFact.generateCertificate(new ByteArrayInputStream(cert)); 1214 assertEquals("First certificate in chain should be user cert", expectedCert, actualChain[0]); 1422 final Certificate cert = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_CA_1)); 1425 mKeyStore.setCertificateEntry(TEST_ALIAS_1, cert); 1178 assertPrivateKeyEntryEquals(PrivateKeyEntry keyEntry, String keyType, byte[] key, byte[] cert, byte[] ca) argument [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/configparse/ |
H A D | ConfigBuilder.java | 32 import java.security.cert.Certificate; 33 import java.security.cert.CertificateFactory; 34 import java.security.cert.X509Certificate; 45 private static final String CATag = "application/x-x509-ca-cert"; 113 throw new IOException("Can't read non base64 encoded cert"); 146 Log.w(TAG, "Element in cert chain is not an X509Certificate: " + 181 Log.w(TAG, "Client cert and/or key included with EAP-TTLS profile"); 192 Log.i(TAG, "Client/CA cert and/or key included with " + 217 Certificate cert = ks.getCertificate(alias); 219 if (cert instanceo [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
H A D | UiccCarrierPrivilegeRules.java | 43 import java.security.cert.Certificate; 44 import java.security.cert.CertificateException; 45 import java.security.cert.CertificateFactory; 46 import java.security.cert.X509Certificate; 91 * DEVICE_APP_ID_REF_DO = TAG_DEVICE_APP_ID_REF_DO + len + sha256 hexstring of cert 145 return "cert: " + IccUtils.bytesToHexString(certificateHash) + " pkg: " +
|