/frameworks/base/core/java/android/security/net/config/ |
H A D | TrustAnchor.java | 23 public final X509Certificate certificate; field in class:TrustAnchor 26 public TrustAnchor(X509Certificate certificate, boolean overridesPins) { argument 27 if (certificate == null) { 28 throw new NullPointerException("certificate"); 30 this.certificate = certificate;
|
H A D | TrustedCertificateStoreAdapter.java | 41 return anchor.certificate; 55 return anchor.certificate;
|
/frameworks/base/core/java/android/net/http/ |
H A D | SslError.java | 23 * certificate. 32 * The certificate is not yet valid 36 * The certificate has expired 44 * The certificate authority is not trusted 48 * The date of the certificate is invalid 73 * The SSL certificate associated with the error set 83 * Creates a new SslError object using the supplied error and certificate. 86 * @param certificate The associated SSL certificate 90 public SslError(int error, SslCertificate certificate) { argument 102 SslError(int error, X509Certificate certificate) argument 113 SslError(int error, SslCertificate certificate, String url) argument 128 SslError(int error, X509Certificate certificate, String url) argument [all...] |
H A D | SslCertificate.java | 45 * SSL certificate info (certificate details) class 55 * Name of the entity this certificate is issued to 60 * Name of the entity this certificate is issued by 75 * The original source certificate, if available. 90 private static final String X509_CERTIFICATE = "x509-certificate"; 93 * Saves the certificate state to a bundle 94 * @param certificate The SSL certificate to store 95 * @return A bundle with the certificate store 97 saveState(SslCertificate certificate) argument 179 SslCertificate(X509Certificate certificate) argument [all...] |
/frameworks/base/media/lib/signer/java/com/android/mediadrm/signer/ |
H A D | MediaDrmSigner.java | 23 * Provides certificate request generation, response handling and 30 * Specify X.509 certificate type 35 * Contains the opaque data an app uses to request a certificate from a provisioning 53 * Get the default URL to use when sending the certificate request 55 * certificate server URL obtained from other sources. 63 * Contains the wrapped private key and public certificate data associated 64 * with a certificate. 69 Certificate(MediaDrm.Certificate certificate) { argument 70 mCertificate = certificate; 81 * Get the PEM-encoded public certificate chai [all...] |
/frameworks/support/frameworks/support/samples/Support4Demos/src/com/example/android/supportv4/media/ |
H A D | PackageValidator.java | 47 * Map allowed callers' certificate keys to the expected caller information. 68 String certificate = parser.nextText().replaceAll("\\s|\\n", ""); 70 CallerInfo info = new CallerInfo(name, packageName, isRelease, certificate); 72 ArrayList<CallerInfo> infos = validCertificates.get(certificate); 75 validCertificates.put(certificate, infos); 78 + info.packageName + " release=" + info.release + " certificate=" 79 + certificate); 109 Log.w(TAG, "Caller has more than one signature certificate!"); 127 // Check if the package name is valid for the certificate: 138 Log.i(TAG, "Caller has a valid certificate, bu [all...] |
/frameworks/support/samples/Support4Demos/src/com/example/android/supportv4/media/ |
H A D | PackageValidator.java | 47 * Map allowed callers' certificate keys to the expected caller information. 68 String certificate = parser.nextText().replaceAll("\\s|\\n", ""); 70 CallerInfo info = new CallerInfo(name, packageName, isRelease, certificate); 72 ArrayList<CallerInfo> infos = validCertificates.get(certificate); 75 validCertificates.put(certificate, infos); 78 + info.packageName + " release=" + info.release + " certificate=" 79 + certificate); 109 Log.w(TAG, "Caller has more than one signature certificate!"); 127 // Check if the package name is valid for the certificate: 138 Log.i(TAG, "Caller has a valid certificate, bu [all...] |
/frameworks/base/wifi/java/android/net/wifi/hotspot2/ |
H A D | ConfigParser.java | 125 * [base64 encoded X509 CA certificate data] 130 * [base64 encoded PKCS#12 ASN.1 structure containing client certificate chain] 135 * (required), CA (Certificate Authority) certificate (optional), and client 136 * certificate chain (optional). 185 // Parse CA (Certificate Authority) certificate. 195 // Parse PKCS12 data for client private key and certificate chain. 436 * Parse a CA (Certificate Authority) certificate data and convert it to a 455 // Only expects one set of key and certificate chain. 470 for (Certificate certificate : chain) { 471 if (!(certificate instanceo [all...] |
/frameworks/base/packages/Osu/src/com/android/configparse/ |
H A D | ConfigBuilder.java | 137 throw new IOException("Invalid certificate type for TLS: " + 143 for (X509Certificate certificate : clientChain) { 145 byte[] fingerprint = digester.digest(certificate.getEncoded()); 147 clientCertificate = certificate; 152 throw new IOException("No certificate in chain matches supplied fingerprint");
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
H A D | WiFiKeyManager.java | 151 for (Certificate certificate : mKeyStore.getCertificateChain(alias)) { 152 if (certificate instanceof X509Certificate) { 153 certs.add((X509Certificate) certificate);
|
H A D | OSUSocketFactory.java | 173 for (X509Certificate certificate : mTrustManager.getTrustChain()) { 174 for (List<?> name : certificate.getSubjectAlternativeNames()) { 178 return certificate;
|
H A D | SPVerifier.java | 311 throw new IOException("Friendly name '" + osuName + " not in certificate"); 316 private static Asn1Object getExtension(X509Certificate certificate, String extension) argument 318 byte[] data = certificate.getExtensionValue(extension);
|
/frameworks/base/tests/CoreTests/android/core/ |
H A D | TestEventHandler.java | 445 * Implements the EventHandler certificate method called every 448 public void certificate(SslCertificate certificate) {} argument 496 * SSL certificate error callback. Handles SSL error(s) on the way 505 " certificate: " + error.getCertificate()); 527 if (expectSslErrors == -1) // && expectSslCertificate == certificate? 730 public void expectSSLCertificateError(SslCertificate certificate) { argument 732 expectCertificate = certificate;
|
/frameworks/av/drm/mediadrm/plugins/clearkey/ |
H A D | DrmPlugin.h | 100 Vector<uint8_t>& certificate, 102 UNUSED(certificate); 98 provideProvisionResponse( const Vector<uint8_t>& response, Vector<uint8_t>& certificate, Vector<uint8_t>& wrappedKey) argument
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
H A D | WifiKeyStore.java | 40 * This class provides the methods to access keystore for certificate management. 71 private static boolean hasHardwareBackedKey(Certificate certificate) { argument 72 return isHardwareBackedKey(certificate.getPublicKey()); 163 * Install a certificate into the keystore. 165 * @param name The alias name of the certificate to be installed 166 * @param cert The certificate to be installed 174 * Install a client certificate chain into the keystore. 176 * @param name The alias name of the certificate to be installed 177 * @param certs The certificate chain to be installed 184 Log.d(TAG, "putting " + certs.length + " certificate( [all...] |
/frameworks/base/tests/NetworkSecurityConfigTest/src/android/security/net/config/ |
H A D | NetworkSecurityConfigTests.java | 278 preNCerts.add(anchor.certificate); 282 nCerts.add(anchor.certificate);
|
/frameworks/base/media/jni/ |
H A D | android_media_MediaDrm.cpp | 143 CertificateFields certificate; member in struct:android::fields_t 645 GET_FIELD_ID(gFields.certificate.wrappedPrivateKey, clazz, "mWrappedKey", "[B"); 646 GET_FIELD_ID(gFields.certificate.certificateData, clazz, "mCertificateData", "[B"); 1034 Vector<uint8_t> certificate, wrappedKey; local 1036 status_t err = drm->provideProvisionResponse(response, certificate, wrappedKey); 1043 if (clazz && certificate.size() && wrappedKey.size()) { 1045 jbyteArray jcertificate = VectorToJByteArray(env, certificate); 1046 env->SetObjectField(certificateObj, gFields.certificate.certificateData, jcertificate); 1049 env->SetObjectField(certificateObj, gFields.certificate.wrappedPrivateKey, jwrappedKey);
|
/frameworks/av/drm/libmediadrm/ |
H A D | IDrm.cpp | 264 Vector<uint8_t> &certificate, 275 readVector(reply, certificate); 736 Vector<uint8_t> certificate; local 739 status_t result = provideProvisionResponse(response, certificate, wrappedKey); 740 writeVector(reply, certificate); 263 provideProvisionResponse(Vector<uint8_t> const &response, Vector<uint8_t> &certificate, Vector<uint8_t> &wrappedKey) argument
|
/frameworks/base/core/java/android/util/apk/ |
H A D | ApkSignatureSchemeV2Verifier.java | 364 X509Certificate certificate; 366 certificate = (X509Certificate) 369 throw new SecurityException("Failed to decode certificate #" + certificateCount, e); 371 certificate = new VerbatimX509Certificate(certificate, encodedCert); 372 certs.add(certificate); 382 "Public key mismatch between certificate and signature record"); 1125 * For legacy reasons we need to return exactly the original encoded certificate bytes, instead
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/ |
H A D | PasspointProvider.java | 73 * is a suffix of the actual certificate or key name installed in the keystore. The 74 * certificate or key name in the keystore is consist of |Type|_|alias|. 173 // Install CA certificate. 197 // Install the client certificate. 203 Log.e(TAG, "Failed to locate client certificate"); 209 Log.e(TAG, "Failed to install client certificate"); 422 * Retrieve the client certificate from the certificates chain. The certificate 423 * with the matching SHA256 digest is the client certificate. 426 * @param expectedSha256Fingerprint The expected SHA256 digest of the client certificate [all...] |
/frameworks/av/drm/mediadrm/plugins/mock/ |
H A D | MockDrmCryptoPlugin.h | 87 Vector<uint8_t> &certificate,
|
/frameworks/av/include/media/ |
H A D | Drm.h | 77 Vector<uint8_t> &certificate,
|
H A D | DrmHal.h | 92 Vector<uint8_t> &certificate,
|
H A D | IDrm.h | 72 Vector<uint8_t> &certificate,
|
/frameworks/av/media/libmedia/include/media/ |
H A D | Drm.h | 77 Vector<uint8_t> &certificate,
|