/frameworks/base/core/java/android/security/net/config/ |
H A D | CertificateSource.java | 19 import java.security.cert.X509Certificate; 25 X509Certificate findBySubjectAndPublicKey(X509Certificate cert); argument 26 X509Certificate findByIssuerAndSignature(X509Certificate cert); argument 27 Set<X509Certificate> findAllByIssuerAndSignature(X509Certificate cert); argument
|
H A D | CertificatesEntryRef.java | 20 import java.security.cert.X509Certificate; 40 for (X509Certificate cert : mSource.getCertificates()) { 41 anchors.add(new TrustAnchor(cert, mOverridesPins)); 46 public TrustAnchor findBySubjectAndPublicKey(X509Certificate cert) { argument 47 X509Certificate foundCert = mSource.findBySubjectAndPublicKey(cert); 55 public TrustAnchor findByIssuerAndSignature(X509Certificate cert) { argument 56 X509Certificate foundCert = mSource.findByIssuerAndSignature(cert); 64 public Set<X509Certificate> findAllCertificatesByIssuerAndSignature(X509Certificate cert) { argument 65 return mSource.findAllByIssuerAndSignature(cert);
|
H A D | KeyStoreCertificateSource.java | 22 import java.security.cert.Certificate; 23 import java.security.cert.X509Certificate; 61 X509Certificate cert = (X509Certificate) mKeyStore.getCertificate(alias); 62 if (cert != null) { 63 certificates.add(cert); 64 localIndex.index(cert); 76 public X509Certificate findBySubjectAndPublicKey(X509Certificate cert) { argument 78 java.security.cert.TrustAnchor anchor = mIndex.findBySubjectAndPublicKey(cert); 86 public X509Certificate findByIssuerAndSignature(X509Certificate cert) { argument 96 findAllByIssuerAndSignature(X509Certificate cert) argument [all...] |
H A D | ResourceCertificateSource.java | 23 import java.security.cert.Certificate; 24 import java.security.cert.CertificateException; 25 import java.security.cert.CertificateFactory; 26 import java.security.cert.X509Certificate; 69 for (Certificate cert : certs) { 70 certificates.add((X509Certificate) cert); 71 indexLocal.index((X509Certificate) cert); 86 public X509Certificate findBySubjectAndPublicKey(X509Certificate cert) { argument 88 java.security.cert.TrustAnchor anchor = mIndex.findBySubjectAndPublicKey(cert); 96 findByIssuerAndSignature(X509Certificate cert) argument 106 findAllByIssuerAndSignature(X509Certificate cert) argument [all...] |
H A D | TrustedCertificateStoreAdapter.java | 20 import java.security.cert.Certificate; 21 import java.security.cert.X509Certificate; 36 public X509Certificate findIssuer(X509Certificate cert) { argument 37 TrustAnchor anchor = mConfig.findTrustAnchorByIssuerAndSignature(cert); 45 public Set<X509Certificate> findAllIssuers(X509Certificate cert) { argument 46 return mConfig.findAllCertificatesByIssuerAndSignature(cert); 50 public X509Certificate getTrustAnchor(X509Certificate cert) { argument 51 TrustAnchor anchor = mConfig.findTrustAnchorBySubjectAndPublicKey(cert); 59 public boolean isUserAddedCertificate(X509Certificate cert) { argument 61 TrustAnchor anchor = mConfig.findTrustAnchorBySubjectAndPublicKey(cert); [all...] |
H A D | DirectoryCertificateSource.java | 29 import java.security.cert.Certificate; 30 import java.security.cert.CertificateException; 31 import java.security.cert.CertificateFactory; 32 import java.security.cert.X509Certificate; 80 X509Certificate cert = readCertificate(caFile); 81 if (cert != null) { 82 certs.add(cert); 92 public X509Certificate findBySubjectAndPublicKey(final X509Certificate cert) { argument 93 return findCert(cert.getSubjectX500Principal(), new CertSelector() { 96 return ca.getPublicKey().equals(cert 102 findByIssuerAndSignature(final X509Certificate cert) argument 117 findAllByIssuerAndSignature(final X509Certificate cert) argument 139 match(X509Certificate cert) argument [all...] |
H A D | NetworkSecurityConfig.java | 22 import java.security.cert.X509Certificate; 86 X509Certificate cert = anchor.certificate; 87 if (!anchorMap.containsKey(cert)) { 88 anchorMap.put(cert, anchor); 121 public TrustAnchor findTrustAnchorBySubjectAndPublicKey(X509Certificate cert) { argument 123 TrustAnchor anchor = ref.findBySubjectAndPublicKey(cert); 132 public TrustAnchor findTrustAnchorByIssuerAndSignature(X509Certificate cert) { argument 134 TrustAnchor anchor = ref.findByIssuerAndSignature(cert); 143 public Set<X509Certificate> findAllCertificatesByIssuerAndSignature(X509Certificate cert) { argument 146 certs.addAll(ref.findAllCertificatesByIssuerAndSignature(cert)); [all...] |
/frameworks/base/core/java/org/apache/http/conn/ssl/ |
H A D | X509HostnameVerifier.java | 39 import java.security.cert.X509Certificate; 71 void verify(String host, X509Certificate cert) throws SSLException; argument
|
H A D | AbstractVerifier.java | 37 import java.security.cert.Certificate; 38 import java.security.cert.CertificateParsingException; 39 import java.security.cert.X509Certificate; 116 public final void verify(String host, X509Certificate cert) argument 118 String[] cns = getCNs(cert); 119 String[] subjectAlts = getDNSSubjectAlts(cert); 210 public static String[] getCNs(X509Certificate cert) { argument 212 new AndroidDistinguishedNameParser(cert.getSubjectX500Principal()); 236 * @param cert X509Certificate 239 public static String[] getDNSSubjectAlts(X509Certificate cert) { argument [all...] |
/frameworks/base/tests/NetworkSecurityConfigTest/src/android/security/net/config/ |
H A D | TestCertificateSource.java | 20 import java.security.cert.X509Certificate; 32 for (X509Certificate cert : certificates) { 33 mIndex.index(cert); 43 public X509Certificate findBySubjectAndPublicKey(X509Certificate cert) { argument 44 java.security.cert.TrustAnchor anchor = mIndex.findBySubjectAndPublicKey(cert); 52 public X509Certificate findByIssuerAndSignature(X509Certificate cert) { argument 53 java.security.cert.TrustAnchor anchor = mIndex.findByIssuerAndSignature(cert); 61 public Set<X509Certificate> findAllByIssuerAndSignature(X509Certificate cert) { argument [all...] |
/frameworks/base/wifi/java/android/net/wifi/ |
H A D | ParcelUtil.java | 25 import java.security.cert.CertificateEncodingException; 26 import java.security.cert.CertificateException; 27 import java.security.cert.CertificateFactory; 28 import java.security.cert.X509Certificate; 87 * Write a X509Certificate object |cert| to a Parcel object |dest|. 91 * @param cert X509Certificate object to read from 93 public static void writeCertificate(Parcel dest, X509Certificate cert) { argument 95 if (cert != null) { 97 certBytes = cert.getEncoded();
|
H A D | WifiEnterpriseConfig.java | 30 import java.security.cert.CertificateEncodingException; 31 import java.security.cert.CertificateException; 32 import java.security.cert.CertificateFactory; 33 import java.security.cert.X509Certificate; 595 // Backwards compatibility: use the original cert prefix if setting only one alias. 653 * @param cert X.509 CA certificate 656 public void setCaCertificate(@Nullable X509Certificate cert) { argument 657 if (cert != null) { 658 if (cert.getBasicConstraints() >= 0) { 659 mCaCerts = new X509Certificate[] {cert}; [all...] |
/frameworks/base/core/java/android/net/http/ |
H A D | X509TrustManagerExtensions.java | 27 import java.security.cert.CertificateException; 28 import java.security.cert.X509Certificate; 129 public boolean isUserAddedCertificate(X509Certificate cert) { argument 130 return UserCertificateSource.getInstance().findBySubjectAndPublicKey(cert) != null;
|
H A D | SslError.java | 19 import java.security.cert.X509Certificate; 140 int error, SslCertificate cert, String url) { 145 return new SslError(SSL_IDMISMATCH, cert, url); 147 return new SslError(SSL_DATE_INVALID, cert, url); 149 return new SslError(SSL_UNTRUSTED, cert, url); 151 return new SslError(SSL_INVALID, cert, url); 139 SslErrorFromChromiumErrorCode( int error, SslCertificate cert, String url) argument
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
H A D | WifiKeyStore.java | 31 import java.security.cert.Certificate; 32 import java.security.cert.CertificateException; 33 import java.security.cert.X509Certificate; 129 // Remove client key+cert 166 * @param cert The certificate to be installed 169 public boolean putCertInKeyStore(String name, Certificate cert) { argument 170 return putCertsInKeyStore(name, new Certificate[] {cert}); 226 if (mVerboseLoggingEnabled) Log.d(TAG, "removing client private key and user cert"); 236 if (mVerboseLoggingEnabled) Log.d(TAG, "removing CA cert: " + ca);
|
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | AndroidKeyStoreSpi.java | 47 import java.security.cert.Certificate; 48 import java.security.cert.CertificateEncodingException; 49 import java.security.cert.CertificateException; 50 import java.security.cert.CertificateFactory; 51 import java.security.cert.X509Certificate; 180 X509Certificate cert = toCertificate(encodedCert); 181 if (cert == null) { 193 return wrapIntoKeyStoreCertificate(privateKeyAlias, mUid, cert); 199 return cert; 373 throw new KeyStoreException("Certificates must be in X.509 format: invalid cert #" 753 engineSetCertificateEntry(String alias, Certificate cert) argument 863 engineGetCertificateAlias(Certificate cert) argument [all...] |
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
H A D | OSUSocketFactory.java | 21 import java.security.cert.CertPath; 22 import java.security.cert.CertPathValidator; 23 import java.security.cert.CertPathValidatorException; 24 import java.security.cert.Certificate; 25 import java.security.cert.CertificateException; 26 import java.security.cert.CertificateFactory; 27 import java.security.cert.PKIXCertPathChecker; 28 import java.security.cert.PKIXParameters; 29 import java.security.cert.TrustAnchor; 30 import java.security.cert 333 check(Certificate cert, Collection<String> unresolvedCritExts) argument [all...] |
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | SELinuxMMAC.java | 158 * Loop over a signer tag looking for seinfo, package and cert tags. A {@link Policy} 177 // Check for a cert attached to the signer tag. We allow a signature 178 // to appear as an attribute as well as those attached to cert tags. 179 String cert = parser.getAttributeValue(null, "signature"); 180 if (cert != null) { 181 pb.addSignature(cert); 196 } else if ("cert".equals(tagName)) { 245 parser.require(XmlPullParser.START_TAG, null, "cert"); 397 for (Signature cert : mCerts) { 398 sb.append("cert 484 addSignature(String cert) argument [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/updates/ |
H A D | CertPinInstallReceiverTest.java | 35 import java.security.cert.CertificateFactory; 36 import java.security.cert.Certificate; 37 import java.security.cert.X509Certificate; 176 String signature, X509Certificate cert) throws Exception { 178 signer.initVerify(cert); 195 private String runTest(String cert, String content, String version, String required, String sig) argument 198 overrideCert(cert); 205 private String runTestWithoutSig(String cert, String content, String version, String required) argument 208 return runTest(cert, content, version, required, sig); 175 verifySignature(String content, String version, String requiredPrevious, String signature, X509Certificate cert) argument
|
/frameworks/base/keystore/tests/src/android/security/keystore/ |
H A D | AndroidKeyStoreTest.java | 41 import java.security.cert.Certificate; 42 import java.security.cert.CertificateFactory; 43 import java.security.cert.X509Certificate; 95 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650 469 * openssl ca -out usercert.pem -in userkey.req -cert cacert.pem -keyfile cakey.pem -days 3650 1179 byte[] cert, byte[] ca) throws Exception { 1184 Certificate expectedCert = certFact.generateCertificate(new ByteArrayInputStream(cert)); 1214 assertEquals("First certificate in chain should be user cert", expectedCert, actualChain[0]); 1422 final Certificate cert = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_CA_1)); 1425 mKeyStore.setCertificateEntry(TEST_ALIAS_1, cert); 1178 assertPrivateKeyEntryEquals(PrivateKeyEntry keyEntry, String keyType, byte[] key, byte[] cert, byte[] ca) argument [all...] |
/frameworks/base/core/java/android/app/admin/ |
H A D | DevicePolicyManager.java | 77 import java.security.cert.Certificate; 78 import java.security.cert.CertificateException; 79 import java.security.cert.CertificateFactory; 80 import java.security.cert.X509Certificate; 1262 public static final String DELEGATION_CERT_INSTALL = "delegation-cert-install"; 3662 * @param cert The certificate to install. 3672 @NonNull Certificate cert, @NonNull String alias) { 3673 return installKeyPair(admin, privKey, new Certificate[] {cert}, alias, false); 3755 final X509Certificate cert = (X509Certificate) certFactory.generateCertificate( 3757 return new TrustedCertificateStore().getCertificateAlias(cert); 3671 installKeyPair(@ullable ComponentName admin, @NonNull PrivateKey privKey, @NonNull Certificate cert, @NonNull String alias) argument [all...] |
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
H A D | DevicePolicyManagerService.java | 245 private static final String TAG_OWNER_INSTALLED_CA_CERT = "owner-installed-ca-cert"; 273 private static final String ATTR_DELEGATED_CERT_INSTALLER = "delegated-cert-installer"; 2668 for (final String cert : policy.mOwnerInstalledCaCerts) { 2670 out.attribute(null, ATTR_ALIAS, cert); 4792 Log.w(LOG_TAG, "Problem installing cert"); 4830 byte[] cert, byte[] chain, String alias, boolean requestAccess) { 4842 if (!keyChain.installKeyPair(privKey, cert, chain, alias)) { 4829 installKeyPair(ComponentName who, String callerPackage, byte[] privKey, byte[] cert, byte[] chain, String alias, boolean requestAccess) argument
|