/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
H A D | WiFiKeyManager.java | 12 import java.security.cert.Certificate; 13 import java.security.cert.X509Certificate; 45 Certificate cert = mKeyStore.getCertificate(alias); 46 if ((cert instanceof X509Certificate) && mKeyStore.getKey(alias, null) != null) { 47 X509Certificate x509Certificate = (X509Certificate) cert; 50 mAliases.put(issuer, new String[]{alias, cert.getPublicKey().getAlgorithm()});
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | SELinuxMMAC.java | 158 * Loop over a signer tag looking for seinfo, package and cert tags. A {@link Policy} 177 // Check for a cert attached to the signer tag. We allow a signature 178 // to appear as an attribute as well as those attached to cert tags. 179 String cert = parser.getAttributeValue(null, "signature"); 180 if (cert != null) { 181 pb.addSignature(cert); 196 } else if ("cert".equals(tagName)) { 245 parser.require(XmlPullParser.START_TAG, null, "cert"); 397 for (Signature cert : mCerts) { 398 sb.append("cert 484 addSignature(String cert) argument [all...] |
/frameworks/base/keystore/java/android/security/ |
H A D | Credentials.java | 37 import java.security.cert.Certificate; 38 import java.security.cert.CertificateEncodingException; 39 import java.security.cert.CertificateException; 40 import java.security.cert.CertificateFactory; 41 import java.security.cert.X509Certificate;
|
H A D | KeyChain.java | 46 import java.security.cert.Certificate; 47 import java.security.cert.CertificateException; 48 import java.security.cert.CertificateFactory; 49 import java.security.cert.X509Certificate; 572 Certificate cert = certFactory.generateCertificate(new ByteArrayInputStream(bytes)); 573 return (X509Certificate) cert;
|
H A D | KeyPairGeneratorSpec.java | 30 import java.security.cert.Certificate;
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
H A D | WifiKeyStore.java | 31 import java.security.cert.Certificate; 32 import java.security.cert.CertificateException; 33 import java.security.cert.X509Certificate; 129 // Remove client key+cert 166 * @param cert The certificate to be installed 169 public boolean putCertInKeyStore(String name, Certificate cert) { argument 170 return putCertsInKeyStore(name, new Certificate[] {cert}); 226 if (mVerboseLoggingEnabled) Log.d(TAG, "removing client private key and user cert"); 236 if (mVerboseLoggingEnabled) Log.d(TAG, "removing CA cert: " + ca);
|
/frameworks/base/core/java/android/security/net/config/ |
H A D | NetworkSecurityTrustManager.java | 24 import java.security.cert.CertificateException; 25 import java.security.cert.X509Certificate; 129 X509Certificate cert = chain.get(i); 130 byte[] encodedSPKI = cert.getPublicKey().getEncoded();
|
H A D | RootTrustManager.java | 20 import java.security.cert.CertificateException; 21 import java.security.cert.X509Certificate;
|
/frameworks/base/core/tests/coretests/src/android/net/http/ |
H A D | X509TrustManagerExtensionsTest.java | 20 import java.security.cert.X509Certificate;
|
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | AndroidKeyStoreSpi.java | 47 import java.security.cert.Certificate; 48 import java.security.cert.CertificateEncodingException; 49 import java.security.cert.CertificateException; 50 import java.security.cert.CertificateFactory; 51 import java.security.cert.X509Certificate; 180 X509Certificate cert = toCertificate(encodedCert); 181 if (cert == null) { 193 return wrapIntoKeyStoreCertificate(privateKeyAlias, mUid, cert); 199 return cert; 373 throw new KeyStoreException("Certificates must be in X.509 format: invalid cert #" 753 engineSetCertificateEntry(String alias, Certificate cert) argument 863 engineGetCertificateAlias(Certificate cert) argument [all...] |
/frameworks/base/core/java/android/net/http/ |
H A D | SslCertificate.java | 32 import java.security.cert.Certificate; 33 import java.security.cert.CertificateEncodingException; 34 import java.security.cert.CertificateException; 35 import java.security.cert.CertificateFactory; 36 import java.security.cert.X509Certificate; 132 Certificate cert = certFactory.generateCertificate(new ByteArrayInputStream(bytes)); 133 x509Certificate = (X509Certificate) cert;
|
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
H A D | CertificateMonitor.java | 48 import java.security.cert.CertificateException; 49 import java.security.cert.CertificateFactory; 50 import java.security.cert.X509Certificate; 83 X509Certificate cert = parseCert(certBuffer); 84 pemCert = Credentials.convertToPem(cert); 86 Log.e(LOG_TAG, "Problem converting cert", ce);
|
/frameworks/base/tests/NetworkSecurityConfigTest/src/android/security/net/config/ |
H A D | NetworkSecurityConfigTests.java | 28 import java.security.cert.Certificate; 29 import java.security.cert.CertificateFactory; 30 import java.security.cert.X509Certificate; 89 Certificate cert = factory.generateCertificate(new ByteArrayInputStream(TEST_CA_BYTES)); 90 TEST_CA_CERT = (X509Certificate) cert;
|
H A D | XmlConfigTests.java | 31 import java.security.cert.X509Certificate; 404 for (X509Certificate cert : SystemCertificateSource.getInstance().getCertificates()) { 406 new KeyStore.TrustedCertificateEntry(cert),
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | CarrierKeyDownloadManager.java | 57 import java.security.cert.CertificateFactory; 58 import java.security.cert.X509Certificate; 73 // Start trying to renew the cert X days before it expires. 414 String cert = null; 416 cert = key.getString(JSON_CERTIFICATE); 418 cert = key.getString(JSON_CERTIFICATE_ALTERNATE); 428 ByteArrayInputStream inStream = new ByteArrayInputStream(cert.getBytes()); 529 X509Certificate cert = (X509Certificate) cf.generateCertificate(inStream); 531 new Pair(cert.getPublicKey(), cert [all...] |
/frameworks/base/wifi/java/android/net/wifi/ |
H A D | WifiEnterpriseConfig.java | 30 import java.security.cert.CertificateEncodingException; 31 import java.security.cert.CertificateException; 32 import java.security.cert.CertificateFactory; 33 import java.security.cert.X509Certificate; 595 // Backwards compatibility: use the original cert prefix if setting only one alias. 653 * @param cert X.509 CA certificate 656 public void setCaCertificate(@Nullable X509Certificate cert) { argument 657 if (cert != null) { 658 if (cert.getBasicConstraints() >= 0) { 659 mCaCerts = new X509Certificate[] {cert}; [all...] |
/frameworks/base/wifi/tests/assets/hsr1/ |
H A D | HSR1ProfileWithCACert.conf | 50 Content-Type: application/x-x509-ca-cert
|
/frameworks/base/wifi/java/android/net/wifi/hotspot2/ |
H A D | ConfigParser.java | 33 import java.security.cert.Certificate; 34 import java.security.cert.CertificateException; 35 import java.security.cert.CertificateFactory; 36 import java.security.cert.X509Certificate; 56 private static final String TYPE_CA_CERT = "application/x-x509-ca-cert"; 122 * Content-Type: application/x-x509-ca-cert
|
/frameworks/base/wifi/tests/src/android/net/wifi/ |
H A D | ParcelUtilTest.java | 31 import java.security.cert.X509Certificate;
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/flow/ |
H A D | PlatformAdapter.java | 41 import java.security.cert.Certificate; 42 import java.security.cert.X509Certificate; 109 Certificate cert = keyStore.getCertificate(alias); 110 if (cert == null) { 119 if (cert.equals(diskCert)) { 135 Certificate cert = keyStore.getCertificate(alias); 136 if (cert == null) { 413 Certificate cert = keyStore.getCertificate(alias); 414 if (cert != null) {
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/est/ |
H A D | ESTHandler.java | 47 import java.security.cert.CertificateFactory; 48 import java.security.cert.X509Certificate; 182 throw new IOException("Failed to find cert; returned object " + certObject + 188 throw new IOException("No cert payload in: " + certObject); 195 Certificate cert = certFactory.generateCertificate(new ByteArrayInputStream(certBytes)); 196 Log.d(TAG, "EST Cert: " + cert); 224 for (X509Certificate cert : mClientCerts) { 225 Log.d(TAG, cert.toString()); 298 throw new IOException("No cert payload in: " + certObject);
|
/frameworks/base/wifi/tests/src/android/net/wifi/hotspot2/pps/ |
H A D | CredentialTest.java | 30 import java.security.cert.CertificateEncodingException; 31 import java.security.cert.X509Certificate;
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
H A D | UiccPkcs15.java | 341 for (String cert : mRules) { 342 pw.println(" " + cert);
|
/frameworks/base/core/java/android/util/apk/ |
H A D | ApkSignatureSchemeV2Verifier.java | 44 import java.security.cert.CertificateEncodingException; 45 import java.security.cert.CertificateException; 46 import java.security.cert.CertificateExpiredException; 47 import java.security.cert.CertificateFactory; 48 import java.security.cert.CertificateNotYetValidException; 49 import java.security.cert.X509Certificate;
|
/frameworks/base/core/java/android/util/jar/ |
H A D | StrictJarVerifier.java | 27 import java.security.cert.Certificate; 28 import java.security.cert.X509Certificate; 333 throw new GeneralSecurityException("IO exception verifying jar cert", e); 506 * Returns all of the {@link java.security.cert.Certificate} chains that 512 * @return an array of {@link java.security.cert.Certificate} chains.
|