/frameworks/base/services/core/java/com/android/server/pm/ |
SELinuxMMAC.java | 158 * Loop over a signer tag looking for seinfo, package and cert tags. A {@link Policy} 177 // Check for a cert attached to the signer tag. We allow a signature 178 // to appear as an attribute as well as those attached to cert tags. 179 String cert = parser.getAttributeValue(null, "signature"); local 180 if (cert != null) { 181 pb.addSignature(cert); 196 } else if ("cert".equals(tagName)) { 245 parser.require(XmlPullParser.START_TAG, null, "cert"); 397 for (Signature cert : mCerts) { 398 sb.append("cert=" + cert.toCharsString().substring(0, 11) + "... ") [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
CertStore1Test.java | 23 package tests.security.cert; 28 import org.apache.harmony.security.tests.support.cert.MyCertStoreParameters; 29 import org.apache.harmony.security.tests.support.cert.MyCertStoreSpi; 36 import java.security.cert.CertStore; 37 import java.security.cert.CertStoreException; 38 import java.security.cert.CertStoreParameters; 39 import java.security.cert.CertStoreSpi; 40 import java.security.cert.CollectionCertStoreParameters; 41 import java.security.cert.LDAPCertStoreParameters; 136 String def = "Proba.cert.store.type" [all...] |
TrustAnchorTest.java | 23 package tests.security.cert; 33 import org.apache.harmony.security.tests.support.cert.TestUtils; 39 import java.security.cert.CertificateException; 40 import java.security.cert.CertificateFactory; 41 import java.security.cert.TrustAnchor; 42 import java.security.cert.X509Certificate; 471 X509Certificate cert = new TestCertUtils.TestX509Certificate(x500p, x500p); local 472 TrustAnchor ta2 = new TrustAnchor(cert, null); 473 assertSame(cert, ta2.getTrustedCert());
|
CertPathBuilder2Test.java | 23 package tests.security.cert; 27 import tests.security.cert.myCertPathBuilder.MyProvider; 34 import java.security.cert.CertPathBuilder; 35 import java.security.cert.CertPathBuilderException; 36 import java.security.cert.CertPathBuilderResult; 45 private static final String CertPathBuilderProviderClass = "org.apache.harmony.security.tests.support.cert.MyCertPathBuilderSpi";
|
/libcore/ojluni/src/main/java/sun/security/pkcs/ |
SignerInfo.java | 45 import java.security.cert.CertificateException; 46 import java.security.cert.CertificateFactory; 47 import java.security.cert.CertPath; 48 import java.security.cert.X509Certificate; 291 // next cert in chain found 293 // if selected cert is self-signed, we're done 418 X509Certificate cert = getCertificate(block); local 419 PublicKey key = cert.getPublicKey(); 420 if (cert == null) { 430 if (cert.hasUnsupportedCriticalExtension()) [all...] |
/bootable/recovery/tools/dumpkey/ |
DumpPublicKey.java | 23 import java.security.cert.CertificateFactory; 24 import java.security.cert.X509Certificate; 241 X509Certificate cert = (X509Certificate) cf.generateCertificate(input); local 244 String sigAlg = cert.getSigAlgName(); 259 PublicKey key = cert.getPublicKey();
|
/cts/tests/tests/networksecurityconfig/networksecurityconfig-downloadmanager/src/android/security/net/config/cts/ |
DownloadManagerTest.java | 42 import java.security.cert.Certificate; 43 import java.security.cert.CertificateFactory; 44 import java.security.cert.X509Certificate; 133 for (Certificate cert : certs) { 134 chain[i++] = (X509Certificate) cert;
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/ |
JcaContentVerifierProviderBuilder.java | 10 import java.security.cert.CertificateEncodingException; 11 import java.security.cert.CertificateException; 12 import java.security.cert.X509Certificate; 16 import org.bouncycastle.cert.X509CertificateHolder; 17 import org.bouncycastle.cert.jcajce.JcaX509CertificateHolder;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/ |
PKIXExtendedParameters.java | 3 import java.security.cert.CertPathParameters; 4 import java.security.cert.CertSelector; 5 import java.security.cert.CertStore; 6 import java.security.cert.PKIXParameters; 7 import java.security.cert.TrustAnchor;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
ExtendedPKIXParameters.java | 7 import java.security.cert.CertSelector; 8 import java.security.cert.CertStore; 9 import java.security.cert.PKIXParameters; 10 import java.security.cert.TrustAnchor; 11 import java.security.cert.X509CertSelector; 59 * is not of type <code>java.security.cert.TrustAnchor</code>
|
X509CRLStoreSelector.java | 5 import java.security.cert.CRL; 6 import java.security.cert.X509CRL; 7 import java.security.cert.X509CRLSelector;
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ct/ |
CTVerifier.java | 19 import java.security.cert.CertificateEncodingException; 20 import java.security.cert.CertificateException; 21 import java.security.cert.X509Certificate; 39 for(X509Certificate cert : chain) { 40 certs[i++] = OpenSSLX509Certificate.fromCertificate(cert); 78 // Avoid creating the cert entry if we don't need it 114 // Avoid creating the cert entry if we don't need it
|
/frameworks/base/keystore/java/android/security/ |
Credentials.java | 37 import java.security.cert.Certificate; 38 import java.security.cert.CertificateEncodingException; 39 import java.security.cert.CertificateException; 40 import java.security.cert.CertificateFactory; 41 import java.security.cert.X509Certificate;
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
WifiKeyStore.java | 31 import java.security.cert.Certificate; 32 import java.security.cert.CertificateException; 33 import java.security.cert.X509Certificate; 129 // Remove client key+cert 166 * @param cert The certificate to be installed 169 public boolean putCertInKeyStore(String name, Certificate cert) { 170 return putCertsInKeyStore(name, new Certificate[] {cert}); 226 if (mVerboseLoggingEnabled) Log.d(TAG, "removing client private key and user cert"); 236 if (mVerboseLoggingEnabled) Log.d(TAG, "removing CA cert: " + ca);
|
/libcore/luni/src/test/java/libcore/java/security/cert/ |
OldPKIXParametersTest.java | 23 package libcore.java.security.cert; 29 import java.security.cert.CertificateFactory; 30 import java.security.cert.PKIXParameters; 31 import java.security.cert.TrustAnchor; 36 import org.apache.harmony.security.tests.support.cert.TestUtils;
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
MyKeyStore.java | 35 import java.security.cert.Certificate; 36 import java.security.cert.CertificateException; 49 private Hashtable<String, Object> Cert = new Hashtable<String, Object>(); 79 if (Cert.containsKey(alias)) { 80 return (Certificate) Cert.get(alias); 94 if (Cert.containsKey(alias)) { 95 Cert.remove(alias); 109 if (Cert.containsKey(alias)) { 110 Cert.remove(alias); 125 public void engineSetCertificateEntry(String alias, Certificate cert) [all...] |
/cts/tests/tests/networksecurityconfig/src/android/security/net/config/cts/ |
TestUtils.java | 27 import java.security.cert.Certificate; 28 import java.security.cert.CertificateFactory; 29 import java.security.cert.X509Certificate;
|
/external/autotest/client/site_tests/security_RootCA/ |
security_RootCA.py | 62 # Create new empty cert DB. 87 for cert in cert_matches: 91 (tmpdir, cert), retain_output=True) 94 certdict[match] = cert
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ |
X509v3CertificateBuilder.java | 1 package org.bouncycastle.cert; 177 Certificate cert = certHolder.toASN1Structure(); local 179 Extension extension = cert.getTBSCertificate().getExtensions().getExtension(oid);
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ocsp/ |
OCSPReq.java | 1 package org.bouncycastle.cert.ocsp; 21 import org.bouncycastle.cert.CertIOException; 22 import org.bouncycastle.cert.X509CertificateHolder;
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/jcajce/ |
JcaSignerInfoVerifierBuilder.java | 5 import java.security.cert.CertificateException; 6 import java.security.cert.X509Certificate; 8 import org.bouncycastle.cert.X509CertificateHolder;
|
JcaSimpleSignerInfoVerifierBuilder.java | 5 import java.security.cert.CertificateException; 6 import java.security.cert.X509Certificate; 8 import org.bouncycastle.cert.X509CertificateHolder;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
X509CRLObject.java | 13 import java.security.cert.CRLException; 14 import java.security.cert.Certificate; 15 import java.security.cert.CertificateEncodingException; 16 import java.security.cert.X509CRL; 17 import java.security.cert.X509CRLEntry; 18 import java.security.cert.X509Certificate; 556 * @param cert the certificate to check for. 560 public boolean isRevoked(Certificate cert) 562 if (!cert.getType().equals("X.509")) 564 throw new IllegalArgumentException("X.509 CRL used with non X.509 Cert"); [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
X509CRLObject.java | 13 import java.security.cert.CRLException; 14 import java.security.cert.Certificate; 15 import java.security.cert.CertificateEncodingException; 16 import java.security.cert.X509CRL; 17 import java.security.cert.X509CRLEntry; 18 import java.security.cert.X509Certificate; 56 * @deprecated Do not use this class directly - either use org.bouncycastle.cert (bcpkix) or CertificateFactory. 553 * @param cert the certificate to check for. 557 public boolean isRevoked(Certificate cert) 559 if (!cert.getType().equals("X.509") [all...] |
/external/chromium-trace/catapult/telemetry/third_party/web-page-replay/ |
adb_install_cert.py | 185 raise CertRemovalError('Cert Removal Failed') 195 logging.info('cert is already installed') 207 raise CertInstallError('Cert Install Failed') 246 parser = argparse.ArgumentParser(description='Install cert on device.') 248 '-n', '--cert-name', default='dummycert', help='certificate name')
|