Searched defs:cert (Results 1 - 22 of 22) sorted by relevance

/frameworks/base/core/java/android/security/net/config/
H A DCertificateSource.java19 import java.security.cert.X509Certificate;
25 X509Certificate findBySubjectAndPublicKey(X509Certificate cert); argument
26 X509Certificate findByIssuerAndSignature(X509Certificate cert); argument
27 Set<X509Certificate> findAllByIssuerAndSignature(X509Certificate cert); argument
H A DCertificatesEntryRef.java20 import java.security.cert.X509Certificate;
40 for (X509Certificate cert : mSource.getCertificates()) {
41 anchors.add(new TrustAnchor(cert, mOverridesPins));
46 public TrustAnchor findBySubjectAndPublicKey(X509Certificate cert) { argument
47 X509Certificate foundCert = mSource.findBySubjectAndPublicKey(cert);
55 public TrustAnchor findByIssuerAndSignature(X509Certificate cert) { argument
56 X509Certificate foundCert = mSource.findByIssuerAndSignature(cert);
64 public Set<X509Certificate> findAllCertificatesByIssuerAndSignature(X509Certificate cert) { argument
65 return mSource.findAllByIssuerAndSignature(cert);
H A DKeyStoreCertificateSource.java22 import java.security.cert.Certificate;
23 import java.security.cert.X509Certificate;
61 X509Certificate cert = (X509Certificate) mKeyStore.getCertificate(alias);
62 if (cert != null) {
63 certificates.add(cert);
64 localIndex.index(cert);
76 public X509Certificate findBySubjectAndPublicKey(X509Certificate cert) { argument
78 java.security.cert.TrustAnchor anchor = mIndex.findBySubjectAndPublicKey(cert);
86 public X509Certificate findByIssuerAndSignature(X509Certificate cert) { argument
96 findAllByIssuerAndSignature(X509Certificate cert) argument
[all...]
H A DResourceCertificateSource.java23 import java.security.cert.Certificate;
24 import java.security.cert.CertificateException;
25 import java.security.cert.CertificateFactory;
26 import java.security.cert.X509Certificate;
69 for (Certificate cert : certs) {
70 certificates.add((X509Certificate) cert);
71 indexLocal.index((X509Certificate) cert);
86 public X509Certificate findBySubjectAndPublicKey(X509Certificate cert) { argument
88 java.security.cert.TrustAnchor anchor = mIndex.findBySubjectAndPublicKey(cert);
96 findByIssuerAndSignature(X509Certificate cert) argument
106 findAllByIssuerAndSignature(X509Certificate cert) argument
[all...]
H A DTrustedCertificateStoreAdapter.java20 import java.security.cert.Certificate;
21 import java.security.cert.X509Certificate;
36 public X509Certificate findIssuer(X509Certificate cert) { argument
37 TrustAnchor anchor = mConfig.findTrustAnchorByIssuerAndSignature(cert);
45 public Set<X509Certificate> findAllIssuers(X509Certificate cert) { argument
46 return mConfig.findAllCertificatesByIssuerAndSignature(cert);
50 public X509Certificate getTrustAnchor(X509Certificate cert) { argument
51 TrustAnchor anchor = mConfig.findTrustAnchorBySubjectAndPublicKey(cert);
59 public boolean isUserAddedCertificate(X509Certificate cert) { argument
61 TrustAnchor anchor = mConfig.findTrustAnchorBySubjectAndPublicKey(cert);
[all...]
H A DDirectoryCertificateSource.java29 import java.security.cert.Certificate;
30 import java.security.cert.CertificateException;
31 import java.security.cert.CertificateFactory;
32 import java.security.cert.X509Certificate;
80 X509Certificate cert = readCertificate(caFile);
81 if (cert != null) {
82 certs.add(cert);
92 public X509Certificate findBySubjectAndPublicKey(final X509Certificate cert) { argument
93 return findCert(cert.getSubjectX500Principal(), new CertSelector() {
96 return ca.getPublicKey().equals(cert
102 findByIssuerAndSignature(final X509Certificate cert) argument
117 findAllByIssuerAndSignature(final X509Certificate cert) argument
139 match(X509Certificate cert) argument
[all...]
H A DNetworkSecurityConfig.java22 import java.security.cert.X509Certificate;
86 X509Certificate cert = anchor.certificate;
87 if (!anchorMap.containsKey(cert)) {
88 anchorMap.put(cert, anchor);
121 public TrustAnchor findTrustAnchorBySubjectAndPublicKey(X509Certificate cert) { argument
123 TrustAnchor anchor = ref.findBySubjectAndPublicKey(cert);
132 public TrustAnchor findTrustAnchorByIssuerAndSignature(X509Certificate cert) { argument
134 TrustAnchor anchor = ref.findByIssuerAndSignature(cert);
143 public Set<X509Certificate> findAllCertificatesByIssuerAndSignature(X509Certificate cert) { argument
146 certs.addAll(ref.findAllCertificatesByIssuerAndSignature(cert));
[all...]
/frameworks/base/core/java/org/apache/http/conn/ssl/
H A DX509HostnameVerifier.java39 import java.security.cert.X509Certificate;
71 void verify(String host, X509Certificate cert) throws SSLException; argument
H A DAbstractVerifier.java37 import java.security.cert.Certificate;
38 import java.security.cert.CertificateParsingException;
39 import java.security.cert.X509Certificate;
116 public final void verify(String host, X509Certificate cert) argument
118 String[] cns = getCNs(cert);
119 String[] subjectAlts = getDNSSubjectAlts(cert);
210 public static String[] getCNs(X509Certificate cert) { argument
212 new AndroidDistinguishedNameParser(cert.getSubjectX500Principal());
236 * @param cert X509Certificate
239 public static String[] getDNSSubjectAlts(X509Certificate cert) { argument
[all...]
/frameworks/base/tests/NetworkSecurityConfigTest/src/android/security/net/config/
H A DTestCertificateSource.java20 import java.security.cert.X509Certificate;
32 for (X509Certificate cert : certificates) {
33 mIndex.index(cert);
43 public X509Certificate findBySubjectAndPublicKey(X509Certificate cert) { argument
44 java.security.cert.TrustAnchor anchor = mIndex.findBySubjectAndPublicKey(cert);
52 public X509Certificate findByIssuerAndSignature(X509Certificate cert) { argument
53 java.security.cert.TrustAnchor anchor = mIndex.findByIssuerAndSignature(cert);
61 public Set<X509Certificate> findAllByIssuerAndSignature(X509Certificate cert) { argument
[all...]
/frameworks/base/wifi/java/android/net/wifi/
H A DParcelUtil.java25 import java.security.cert.CertificateEncodingException;
26 import java.security.cert.CertificateException;
27 import java.security.cert.CertificateFactory;
28 import java.security.cert.X509Certificate;
87 * Write a X509Certificate object |cert| to a Parcel object |dest|.
91 * @param cert X509Certificate object to read from
93 public static void writeCertificate(Parcel dest, X509Certificate cert) { argument
95 if (cert != null) {
97 certBytes = cert.getEncoded();
H A DWifiEnterpriseConfig.java30 import java.security.cert.CertificateEncodingException;
31 import java.security.cert.CertificateException;
32 import java.security.cert.CertificateFactory;
33 import java.security.cert.X509Certificate;
595 // Backwards compatibility: use the original cert prefix if setting only one alias.
653 * @param cert X.509 CA certificate
656 public void setCaCertificate(@Nullable X509Certificate cert) { argument
657 if (cert != null) {
658 if (cert.getBasicConstraints() >= 0) {
659 mCaCerts = new X509Certificate[] {cert};
[all...]
/frameworks/base/core/java/android/net/http/
H A DX509TrustManagerExtensions.java27 import java.security.cert.CertificateException;
28 import java.security.cert.X509Certificate;
129 public boolean isUserAddedCertificate(X509Certificate cert) { argument
130 return UserCertificateSource.getInstance().findBySubjectAndPublicKey(cert) != null;
H A DSslError.java19 import java.security.cert.X509Certificate;
140 int error, SslCertificate cert, String url) {
145 return new SslError(SSL_IDMISMATCH, cert, url);
147 return new SslError(SSL_DATE_INVALID, cert, url);
149 return new SslError(SSL_UNTRUSTED, cert, url);
151 return new SslError(SSL_INVALID, cert, url);
139 SslErrorFromChromiumErrorCode( int error, SslCertificate cert, String url) argument
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/
H A DWifiKeyStore.java31 import java.security.cert.Certificate;
32 import java.security.cert.CertificateException;
33 import java.security.cert.X509Certificate;
129 // Remove client key+cert
166 * @param cert The certificate to be installed
169 public boolean putCertInKeyStore(String name, Certificate cert) { argument
170 return putCertsInKeyStore(name, new Certificate[] {cert});
226 if (mVerboseLoggingEnabled) Log.d(TAG, "removing client private key and user cert");
236 if (mVerboseLoggingEnabled) Log.d(TAG, "removing CA cert: " + ca);
/frameworks/base/keystore/java/android/security/keystore/
H A DAndroidKeyStoreSpi.java47 import java.security.cert.Certificate;
48 import java.security.cert.CertificateEncodingException;
49 import java.security.cert.CertificateException;
50 import java.security.cert.CertificateFactory;
51 import java.security.cert.X509Certificate;
180 X509Certificate cert = toCertificate(encodedCert);
181 if (cert == null) {
193 return wrapIntoKeyStoreCertificate(privateKeyAlias, mUid, cert);
199 return cert;
373 throw new KeyStoreException("Certificates must be in X.509 format: invalid cert #"
753 engineSetCertificateEntry(String alias, Certificate cert) argument
863 engineGetCertificateAlias(Certificate cert) argument
[all...]
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/
H A DOSUSocketFactory.java21 import java.security.cert.CertPath;
22 import java.security.cert.CertPathValidator;
23 import java.security.cert.CertPathValidatorException;
24 import java.security.cert.Certificate;
25 import java.security.cert.CertificateException;
26 import java.security.cert.CertificateFactory;
27 import java.security.cert.PKIXCertPathChecker;
28 import java.security.cert.PKIXParameters;
29 import java.security.cert.TrustAnchor;
30 import java.security.cert
333 check(Certificate cert, Collection<String> unresolvedCritExts) argument
[all...]
/frameworks/base/services/core/java/com/android/server/pm/
H A DSELinuxMMAC.java158 * Loop over a signer tag looking for seinfo, package and cert tags. A {@link Policy}
177 // Check for a cert attached to the signer tag. We allow a signature
178 // to appear as an attribute as well as those attached to cert tags.
179 String cert = parser.getAttributeValue(null, "signature");
180 if (cert != null) {
181 pb.addSignature(cert);
196 } else if ("cert".equals(tagName)) {
245 parser.require(XmlPullParser.START_TAG, null, "cert");
397 for (Signature cert : mCerts) {
398 sb.append("cert
484 addSignature(String cert) argument
[all...]
/frameworks/base/services/tests/servicestests/src/com/android/server/updates/
H A DCertPinInstallReceiverTest.java35 import java.security.cert.CertificateFactory;
36 import java.security.cert.Certificate;
37 import java.security.cert.X509Certificate;
176 String signature, X509Certificate cert) throws Exception {
178 signer.initVerify(cert);
195 private String runTest(String cert, String content, String version, String required, String sig) argument
198 overrideCert(cert);
205 private String runTestWithoutSig(String cert, String content, String version, String required) argument
208 return runTest(cert, content, version, required, sig);
175 verifySignature(String content, String version, String requiredPrevious, String signature, X509Certificate cert) argument
/frameworks/base/keystore/tests/src/android/security/keystore/
H A DAndroidKeyStoreTest.java41 import java.security.cert.Certificate;
42 import java.security.cert.CertificateFactory;
43 import java.security.cert.X509Certificate;
95 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650
469 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650
1179 byte[] cert, byte[] ca) throws Exception {
1184 Certificate expectedCert = certFact.generateCertificate(new ByteArrayInputStream(cert));
1214 assertEquals("First certificate in chain should be user cert", expectedCert, actualChain[0]);
1422 final Certificate cert = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_CA_1));
1425 mKeyStore.setCertificateEntry(TEST_ALIAS_1, cert);
1178 assertPrivateKeyEntryEquals(PrivateKeyEntry keyEntry, String keyType, byte[] key, byte[] cert, byte[] ca) argument
[all...]
/frameworks/base/core/java/android/app/admin/
H A DDevicePolicyManager.java77 import java.security.cert.Certificate;
78 import java.security.cert.CertificateException;
79 import java.security.cert.CertificateFactory;
80 import java.security.cert.X509Certificate;
1262 public static final String DELEGATION_CERT_INSTALL = "delegation-cert-install";
3662 * @param cert The certificate to install.
3672 @NonNull Certificate cert, @NonNull String alias) {
3673 return installKeyPair(admin, privKey, new Certificate[] {cert}, alias, false);
3755 final X509Certificate cert = (X509Certificate) certFactory.generateCertificate(
3757 return new TrustedCertificateStore().getCertificateAlias(cert);
3671 installKeyPair(@ullable ComponentName admin, @NonNull PrivateKey privKey, @NonNull Certificate cert, @NonNull String alias) argument
[all...]
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/
H A DDevicePolicyManagerService.java245 private static final String TAG_OWNER_INSTALLED_CA_CERT = "owner-installed-ca-cert";
273 private static final String ATTR_DELEGATED_CERT_INSTALLER = "delegated-cert-installer";
2668 for (final String cert : policy.mOwnerInstalledCaCerts) {
2670 out.attribute(null, ATTR_ALIAS, cert);
4792 Log.w(LOG_TAG, "Problem installing cert");
4830 byte[] cert, byte[] chain, String alias, boolean requestAccess) {
4842 if (!keyChain.installKeyPair(privKey, cert, chain, alias)) {
4829 installKeyPair(ComponentName who, String callerPackage, byte[] privKey, byte[] cert, byte[] chain, String alias, boolean requestAccess) argument

Completed in 2321 milliseconds