/frameworks/base/keystore/java/android/security/ |
H A D | Credentials.java | 37 import java.security.cert.Certificate; 38 import java.security.cert.CertificateEncodingException; 39 import java.security.cert.CertificateException; 40 import java.security.cert.CertificateFactory; 41 import java.security.cert.X509Certificate;
|
H A D | KeyChain.java | 41 import java.security.cert.Certificate; 42 import java.security.cert.CertificateException; 43 import java.security.cert.CertificateFactory; 44 import java.security.cert.X509Certificate; 509 Certificate cert = certFactory.generateCertificate(new ByteArrayInputStream(bytes)); 510 return (X509Certificate) cert;
|
H A D | KeyPairGeneratorSpec.java | 30 import java.security.cert.Certificate;
|
/frameworks/base/core/java/android/security/net/config/ |
H A D | NetworkSecurityTrustManager.java | 24 import java.security.cert.CertificateException; 25 import java.security.cert.X509Certificate; 129 X509Certificate cert = chain.get(i); 130 byte[] encodedSPKI = cert.getPublicKey().getEncoded();
|
H A D | RootTrustManager.java | 20 import java.security.cert.CertificateException; 21 import java.security.cert.X509Certificate;
|
/frameworks/base/core/tests/coretests/src/android/net/http/ |
H A D | X509TrustManagerExtensionsTest.java | 20 import java.security.cert.X509Certificate;
|
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | AndroidKeyStoreSpi.java | 47 import java.security.cert.Certificate; 48 import java.security.cert.CertificateEncodingException; 49 import java.security.cert.CertificateException; 50 import java.security.cert.CertificateFactory; 51 import java.security.cert.X509Certificate; 180 X509Certificate cert = toCertificate(encodedCert); 181 if (cert == null) { 193 return wrapIntoKeyStoreCertificate(privateKeyAlias, mUid, cert); 199 return cert; 370 throw new KeyStoreException("Certificates must be in X.509 format: invalid cert #" 744 engineSetCertificateEntry(String alias, Certificate cert) argument 854 engineGetCertificateAlias(Certificate cert) argument [all...] |
H A D | KeyProtection.java | 28 import java.security.cert.Certificate;
|
/frameworks/base/core/java/android/net/http/ |
H A D | SslCertificate.java | 32 import java.security.cert.Certificate; 33 import java.security.cert.CertificateEncodingException; 34 import java.security.cert.CertificateException; 35 import java.security.cert.CertificateFactory; 36 import java.security.cert.X509Certificate; 132 Certificate cert = certFactory.generateCertificate(new ByteArrayInputStream(bytes)); 133 x509Certificate = (X509Certificate) cert;
|
/frameworks/base/tests/NetworkSecurityConfigTest/src/android/security/net/config/ |
H A D | NetworkSecurityConfigTests.java | 28 import java.security.cert.Certificate; 29 import java.security.cert.CertificateFactory; 30 import java.security.cert.X509Certificate; 89 Certificate cert = factory.generateCertificate(new ByteArrayInputStream(TEST_CA_BYTES)); 90 TEST_CA_CERT = (X509Certificate) cert;
|
H A D | XmlConfigTests.java | 31 import java.security.cert.X509Certificate; 404 for (X509Certificate cert : SystemCertificateSource.getInstance().getCertificates()) { 406 new KeyStore.TrustedCertificateEntry(cert),
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
H A D | OSUManager.java | 38 import java.security.cert.Certificate; 39 import java.security.cert.CertificateException; 40 import java.security.cert.CertificateFactory; 41 import java.security.cert.X509Certificate; 146 Certificate cert = keyStore.getCertificate(alias); 147 if (cert == null) { 156 if (cert.equals(diskCert)) { 172 Certificate cert = keyStore.getCertificate(alias); 173 if (cert == null) { 226 Certificate cert [all...] |
H A D | HTTPHandler.java | 24 import java.security.cert.X509Certificate;
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
H A D | UiccCarrierPrivilegeRules.java | 44 import java.security.cert.Certificate; 45 import java.security.cert.CertificateException; 46 import java.security.cert.CertificateFactory; 47 import java.security.cert.X509Certificate; 85 * DEVICE_APP_ID_REF_DO = TAG_DEVICE_APP_ID_REF_DO + len + sha256 hexstring of cert 140 return "cert: " + IccUtils.bytesToHexString(certificateHash) + " pkg: " + 495 for (String cert : mUiccPkcs15.getRules()) { 497 IccUtils.hexStringToBytes(cert), "", 0x00);
|
H A D | UiccPkcs15.java | 339 for (String cert : mRules) { 340 pw.println(" " + cert);
|
/frameworks/base/keystore/tests/src/android/security/keystore/ |
H A D | AndroidKeyPairGeneratorTest.java | 33 import java.security.cert.Certificate; 34 import java.security.cert.CertificateFactory; 35 import java.security.cert.X509Certificate; 406 // Assert that the cert's signature verifies using the public key from generated KeyPair 408 // Assert that the cert's signature verifies using the public key from the cert itself.
|
H A D | AndroidKeyStoreTest.java | 41 import java.security.cert.Certificate; 42 import java.security.cert.CertificateFactory; 43 import java.security.cert.X509Certificate; 95 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650 469 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650 1179 byte[] cert, byte[] ca) throws Exception { 1184 Certificate expectedCert = certFact.generateCertificate(new ByteArrayInputStream(cert)); 1214 assertEquals("First certificate in chain should be user cert", expectedCert, actualChain[0]); 1422 final Certificate cert = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_CA_1)); 1425 mKeyStore.setCertificateEntry(TEST_ALIAS_1, cert); 1178 assertPrivateKeyEntryEquals(PrivateKeyEntry keyEntry, String keyType, byte[] key, byte[] cert, byte[] ca) argument [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/configparse/ |
H A D | ConfigBuilder.java | 31 import java.security.cert.Certificate; 32 import java.security.cert.CertificateFactory; 33 import java.security.cert.X509Certificate; 44 private static final String CATag = "application/x-x509-ca-cert"; 116 throw new IOException("Can't read non base64 encoded cert"); 149 Log.w(TAG, "Element in cert chain is not an X509Certificate: " + 184 Log.w(TAG, "Client cert and/or key included with EAP-TTLS profile"); 195 Log.i(TAG, "Client/CA cert and/or key included with " + 219 Certificate cert = ks.getCertificate(alias); 221 if (cert instanceo [all...] |
/frameworks/base/core/java/android/os/ |
H A D | RecoverySystem.java | 40 import java.security.cert.CertificateFactory; 41 import java.security.cert.X509Certificate; 224 X509Certificate cert = certificates[0]; 225 PublicKey signatureKey = cert.getPublicKey(); 248 // The signature cert matches a trusted key. Now verify that 249 // the digest in the cert matches the actual file data.
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/est/ |
H A D | ESTHandler.java | 46 import java.security.cert.CertificateFactory; 47 import java.security.cert.X509Certificate; 181 throw new IOException("Failed to find cert; returned object " + certObject + 187 throw new IOException("No cert payload in: " + certObject); 194 Certificate cert = certFactory.generateCertificate(new ByteArrayInputStream(certBytes)); 195 Log.d(TAG, "EST Cert: " + cert); 223 for (X509Certificate cert : mClientCerts) { 224 Log.d(TAG, cert.toString()); 297 throw new IOException("No cert payload in: " + certObject);
|
/frameworks/base/packages/SystemUI/tests/ |
H A D | Android.mk | 57 # sign this with platform cert, so this test is allowed to inject key events into
|
/frameworks/base/core/java/android/util/apk/ |
H A D | ApkSignatureSchemeV2Verifier.java | 44 import java.security.cert.CertificateEncodingException; 45 import java.security.cert.CertificateException; 46 import java.security.cert.CertificateExpiredException; 47 import java.security.cert.CertificateFactory; 48 import java.security.cert.CertificateNotYetValidException; 49 import java.security.cert.X509Certificate;
|
/frameworks/base/core/java/android/util/jar/ |
H A D | StrictJarVerifier.java | 27 import java.security.cert.Certificate; 28 import java.security.cert.X509Certificate; 337 throw new GeneralSecurityException("IO exception verifying jar cert", e); 500 * Returns all of the {@link java.security.cert.Certificate} chains that 506 * @return an array of {@link java.security.cert.Certificate} chains.
|
/frameworks/base/packages/Osu/src/com/android/configparse/ |
H A D | ConfigBuilder.java | 22 import java.security.cert.X509Certificate; 46 Log.w(TAG, "Client cert and/or key included with EAP-TTLS profile"); 57 Log.i(TAG, "Client/CA cert and/or key included with " + 81 Certificate cert = ks.getCertificate(alias); 83 if (cert instanceof X509Certificate) { 84 X509Certificate x509Certificate = (X509Certificate) cert; 134 throw new IOException("No key and/or cert passed for EAP-TLS");
|
/frameworks/opt/net/wifi/tests/wifitests/src/android/net/wifi/ |
H A D | WifiEnterpriseConfigTest.java | 32 import java.security.cert.X509Certificate;
|