Searched refs:certificate (Results 1 - 25 of 39) sorted by relevance

12

/frameworks/base/core/java/android/security/net/config/
H A DTrustAnchor.java23 public final X509Certificate certificate; field in class:TrustAnchor
26 public TrustAnchor(X509Certificate certificate, boolean overridesPins) { argument
27 if (certificate == null) {
28 throw new NullPointerException("certificate");
30 this.certificate = certificate;
H A DTrustedCertificateStoreAdapter.java41 return anchor.certificate;
55 return anchor.certificate;
/frameworks/base/core/java/android/net/http/
H A DSslError.java23 * certificate.
32 * The certificate is not yet valid
36 * The certificate has expired
44 * The certificate authority is not trusted
48 * The date of the certificate is invalid
73 * The SSL certificate associated with the error set
83 * Creates a new SslError object using the supplied error and certificate.
86 * @param certificate The associated SSL certificate
90 public SslError(int error, SslCertificate certificate) { argument
102 SslError(int error, X509Certificate certificate) argument
113 SslError(int error, SslCertificate certificate, String url) argument
128 SslError(int error, X509Certificate certificate, String url) argument
[all...]
H A DSslCertificate.java45 * SSL certificate info (certificate details) class
55 * Name of the entity this certificate is issued to
60 * Name of the entity this certificate is issued by
75 * The original source certificate, if available.
90 private static final String X509_CERTIFICATE = "x509-certificate";
93 * Saves the certificate state to a bundle
94 * @param certificate The SSL certificate to store
95 * @return A bundle with the certificate store
97 saveState(SslCertificate certificate) argument
179 SslCertificate(X509Certificate certificate) argument
[all...]
/frameworks/base/media/lib/signer/java/com/android/mediadrm/signer/
H A DMediaDrmSigner.java23 * Provides certificate request generation, response handling and
30 * Specify X.509 certificate type
35 * Contains the opaque data an app uses to request a certificate from a provisioning
53 * Get the default URL to use when sending the certificate request
55 * certificate server URL obtained from other sources.
63 * Contains the wrapped private key and public certificate data associated
64 * with a certificate.
69 Certificate(MediaDrm.Certificate certificate) { argument
70 mCertificate = certificate;
81 * Get the PEM-encoded public certificate chai
[all...]
/frameworks/support/frameworks/support/samples/Support4Demos/src/com/example/android/supportv4/media/
H A DPackageValidator.java47 * Map allowed callers' certificate keys to the expected caller information.
68 String certificate = parser.nextText().replaceAll("\\s|\\n", "");
70 CallerInfo info = new CallerInfo(name, packageName, isRelease, certificate);
72 ArrayList<CallerInfo> infos = validCertificates.get(certificate);
75 validCertificates.put(certificate, infos);
78 + info.packageName + " release=" + info.release + " certificate="
79 + certificate);
109 Log.w(TAG, "Caller has more than one signature certificate!");
127 // Check if the package name is valid for the certificate:
138 Log.i(TAG, "Caller has a valid certificate, bu
[all...]
/frameworks/support/samples/Support4Demos/src/com/example/android/supportv4/media/
H A DPackageValidator.java47 * Map allowed callers' certificate keys to the expected caller information.
68 String certificate = parser.nextText().replaceAll("\\s|\\n", "");
70 CallerInfo info = new CallerInfo(name, packageName, isRelease, certificate);
72 ArrayList<CallerInfo> infos = validCertificates.get(certificate);
75 validCertificates.put(certificate, infos);
78 + info.packageName + " release=" + info.release + " certificate="
79 + certificate);
109 Log.w(TAG, "Caller has more than one signature certificate!");
127 // Check if the package name is valid for the certificate:
138 Log.i(TAG, "Caller has a valid certificate, bu
[all...]
/frameworks/base/wifi/java/android/net/wifi/hotspot2/
H A DConfigParser.java125 * [base64 encoded X509 CA certificate data]
130 * [base64 encoded PKCS#12 ASN.1 structure containing client certificate chain]
135 * (required), CA (Certificate Authority) certificate (optional), and client
136 * certificate chain (optional).
185 // Parse CA (Certificate Authority) certificate.
195 // Parse PKCS12 data for client private key and certificate chain.
436 * Parse a CA (Certificate Authority) certificate data and convert it to a
455 // Only expects one set of key and certificate chain.
470 for (Certificate certificate : chain) {
471 if (!(certificate instanceo
[all...]
/frameworks/base/packages/Osu/src/com/android/configparse/
H A DConfigBuilder.java137 throw new IOException("Invalid certificate type for TLS: " +
143 for (X509Certificate certificate : clientChain) {
145 byte[] fingerprint = digester.digest(certificate.getEncoded());
147 clientCertificate = certificate;
152 throw new IOException("No certificate in chain matches supplied fingerprint");
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/
H A DWiFiKeyManager.java151 for (Certificate certificate : mKeyStore.getCertificateChain(alias)) {
152 if (certificate instanceof X509Certificate) {
153 certs.add((X509Certificate) certificate);
H A DOSUSocketFactory.java173 for (X509Certificate certificate : mTrustManager.getTrustChain()) {
174 for (List<?> name : certificate.getSubjectAlternativeNames()) {
178 return certificate;
H A DSPVerifier.java311 throw new IOException("Friendly name '" + osuName + " not in certificate");
316 private static Asn1Object getExtension(X509Certificate certificate, String extension) argument
318 byte[] data = certificate.getExtensionValue(extension);
/frameworks/base/tests/CoreTests/android/core/
H A DTestEventHandler.java445 * Implements the EventHandler certificate method called every
448 public void certificate(SslCertificate certificate) {} argument
496 * SSL certificate error callback. Handles SSL error(s) on the way
505 " certificate: " + error.getCertificate());
527 if (expectSslErrors == -1) // && expectSslCertificate == certificate?
730 public void expectSSLCertificateError(SslCertificate certificate) { argument
732 expectCertificate = certificate;
/frameworks/av/drm/mediadrm/plugins/clearkey/
H A DDrmPlugin.h100 Vector<uint8_t>& certificate,
102 UNUSED(certificate);
98 provideProvisionResponse( const Vector<uint8_t>& response, Vector<uint8_t>& certificate, Vector<uint8_t>& wrappedKey) argument
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/
H A DWifiKeyStore.java40 * This class provides the methods to access keystore for certificate management.
71 private static boolean hasHardwareBackedKey(Certificate certificate) { argument
72 return isHardwareBackedKey(certificate.getPublicKey());
163 * Install a certificate into the keystore.
165 * @param name The alias name of the certificate to be installed
166 * @param cert The certificate to be installed
174 * Install a client certificate chain into the keystore.
176 * @param name The alias name of the certificate to be installed
177 * @param certs The certificate chain to be installed
184 Log.d(TAG, "putting " + certs.length + " certificate(
[all...]
/frameworks/base/tests/NetworkSecurityConfigTest/src/android/security/net/config/
H A DNetworkSecurityConfigTests.java278 preNCerts.add(anchor.certificate);
282 nCerts.add(anchor.certificate);
/frameworks/base/media/jni/
H A Dandroid_media_MediaDrm.cpp143 CertificateFields certificate; member in struct:android::fields_t
645 GET_FIELD_ID(gFields.certificate.wrappedPrivateKey, clazz, "mWrappedKey", "[B");
646 GET_FIELD_ID(gFields.certificate.certificateData, clazz, "mCertificateData", "[B");
1034 Vector<uint8_t> certificate, wrappedKey; local
1036 status_t err = drm->provideProvisionResponse(response, certificate, wrappedKey);
1043 if (clazz && certificate.size() && wrappedKey.size()) {
1045 jbyteArray jcertificate = VectorToJByteArray(env, certificate);
1046 env->SetObjectField(certificateObj, gFields.certificate.certificateData, jcertificate);
1049 env->SetObjectField(certificateObj, gFields.certificate.wrappedPrivateKey, jwrappedKey);
/frameworks/av/drm/libmediadrm/
H A DIDrm.cpp264 Vector<uint8_t> &certificate,
275 readVector(reply, certificate);
736 Vector<uint8_t> certificate; local
739 status_t result = provideProvisionResponse(response, certificate, wrappedKey);
740 writeVector(reply, certificate);
263 provideProvisionResponse(Vector<uint8_t> const &response, Vector<uint8_t> &certificate, Vector<uint8_t> &wrappedKey) argument
/frameworks/base/core/java/android/util/apk/
H A DApkSignatureSchemeV2Verifier.java364 X509Certificate certificate;
366 certificate = (X509Certificate)
369 throw new SecurityException("Failed to decode certificate #" + certificateCount, e);
371 certificate = new VerbatimX509Certificate(certificate, encodedCert);
372 certs.add(certificate);
382 "Public key mismatch between certificate and signature record");
1125 * For legacy reasons we need to return exactly the original encoded certificate bytes, instead
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/
H A DPasspointProvider.java73 * is a suffix of the actual certificate or key name installed in the keystore. The
74 * certificate or key name in the keystore is consist of |Type|_|alias|.
173 // Install CA certificate.
197 // Install the client certificate.
203 Log.e(TAG, "Failed to locate client certificate");
209 Log.e(TAG, "Failed to install client certificate");
422 * Retrieve the client certificate from the certificates chain. The certificate
423 * with the matching SHA256 digest is the client certificate.
426 * @param expectedSha256Fingerprint The expected SHA256 digest of the client certificate
[all...]
/frameworks/av/drm/mediadrm/plugins/mock/
H A DMockDrmCryptoPlugin.h87 Vector<uint8_t> &certificate,
/frameworks/av/include/media/
H A DDrm.h77 Vector<uint8_t> &certificate,
H A DDrmHal.h92 Vector<uint8_t> &certificate,
H A DIDrm.h72 Vector<uint8_t> &certificate,
/frameworks/av/media/libmedia/include/media/
H A DDrm.h77 Vector<uint8_t> &certificate,

Completed in 694 milliseconds

12