/frameworks/base/core/java/android/security/net/config/ |
TrustAnchor.java | 23 public final X509Certificate certificate; field in class:TrustAnchor 26 public TrustAnchor(X509Certificate certificate, boolean overridesPins) { 27 if (certificate == null) { 28 throw new NullPointerException("certificate"); 30 this.certificate = certificate;
|
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/certificate/ |
CertParsingException.java | 17 package com.android.server.locksettings.recoverablekeystore.certificate;
|
CertValidationException.java | 17 package com.android.server.locksettings.recoverablekeystore.certificate;
|
/cts/tests/tests/security/src/android/security/cts/ |
CertificateTest.java | 29 import java.security.cert.Certificate; 61 * <p>If you have a CA certificate which needs to be trusted by a particular app/service, 66 * <p>If you have a CA certificate that you believe should be present on all Android devices, 89 * This test exists because adding new ca certificate or removing the ca certificates trusted by 143 Certificate cert = certFactory.generateCertificate(fis); 161 X509Certificate certificate = (X509Certificate) wfaKeyStore.getCertificate(alias); local 162 assertEquals(certificate.getSubjectUniqueID(), certificate.getIssuerUniqueID()); 163 assertNotNull(certificate.getSubjectDN()); 164 assertNotNull(certificate.getIssuerDN()) 182 X509Certificate certificate = (X509Certificate) keyStore.getCertificate(alias); local [all...] |
/build/soong/java/ |
app.go | 35 // path to a certificate, or the name of a certificate in the default 36 // certificate directory, or blank to use the default product certificate 37 Certificate *string 61 certificate certificate 76 type certificate struct { type 143 c := String(a.appProperties.Certificate) 147 a.certificate = certificate{pem, key [all...] |
/external/apache-http/android/src/android/net/http/ |
LoggingEventHandler.java | 69 public void certificate(SslCertificate certificate) { method in class:LoggingEventHandler 71 HttpLog.v("LoggingEventHandler: certificate(): " + certificate);
|
EventHandler.java | 24 * there is an SSL certificate error. error() can occur anywhere 107 * SSL certificate callback called before resource request is 110 public void certificate(SslCertificate certificate); method in interface:EventHandler 120 * SSL certificate error callback. Handles SSL error(s) on the way
|
/external/webrtc/webrtc/base/ |
rtccertificate_unittests.cc | 28 static const char* kTestCertCommonName = "RTCCertificateTest's certificate"; 76 // Certificate type does not matter for our purposes, using ECDSA because it 86 // Generate a real certificate without specifying the expiration time. 87 // Certificate type doesn't matter, using ECDSA because it's fast to generate. 90 scoped_refptr<RTCCertificate> certificate = local 94 EXPECT_FALSE(HasExpiredSeconds(certificate, now)); 97 EXPECT_FALSE(HasExpiredSeconds(certificate, now + 30*60)); 102 scoped_refptr<RTCCertificate> certificate = local 104 EXPECT_EQ(now, ExpiresSeconds(certificate)); 108 // Generate a certificate that expires in 1s 110 scoped_refptr<RTCCertificate> certificate = local [all...] |
fakesslidentity.h | 100 virtual const FakeSSLCertificate& certificate() const { return cert_; } function in class:rtc::FakeSSLIdentity
|
/external/webrtc/webrtc/p2p/base/ |
transportdescriptionfactory.h | 37 // The certificate to use when setting up DTLS. 38 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate() const { function in class:cricket::TransportDescriptionFactory 44 // Specifies the certificate to use (only used when secure != SEC_DISABLED). 46 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) { 47 certificate_ = certificate;
|
/libcore/luni/src/test/java/tests/security/ |
CertificateFactoryTest.java | 20 import java.security.cert.Certificate; 43 Certificate certificate = certificateFactory.generateCertificate( local 45 assertNotNull(certificate);
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/ |
JcaContentVerifierProviderBuilder.java | 56 public ContentVerifierProvider build(final X509Certificate certificate) 63 certHolder = new JcaX509CertificateHolder(certificate); 67 throw new OperatorCreationException("cannot process certificate: " + e.getMessage(), e); 91 sig.initVerify(certificate.getPublicKey()); 100 Signature rawSig = createRawSig(algorithm, certificate.getPublicKey());
|
/frameworks/base/core/java/android/net/http/ |
SslCertificate.java | 32 import java.security.cert.Certificate; 45 * SSL certificate info (certificate details) class 55 * Name of the entity this certificate is issued to 60 * Name of the entity this certificate is issued by 75 * The original source certificate, if available. 90 private static final String X509_CERTIFICATE = "x509-certificate"; 93 * Saves the certificate state to a bundle 94 * @param certificate The SSL certificate to stor 184 certificate); local [all...] |
/external/conscrypt/platform/src/main/java/org/conscrypt/ct/ |
CertificateEntry.java | 57 If entryType == X509_ENTRY, this is the encoded leaf certificate. */ 58 private final byte[] certificate; field in class:CertificateEntry 60 private CertificateEntry(LogEntryType entryType, byte[] certificate, byte[] issuerKeyHash) { 73 this.certificate = certificate; 87 throw new CertificateException("Certificate does not contain embedded signed timestamps"); 118 return certificate; 132 Serialization.writeVariableBytes(output, certificate, CTConstants.CERTIFICATE_LENGTH_BYTES);
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/tls/ |
HostnameVerifierTest.java | 49 + "-----BEGIN CERTIFICATE-----\n" 73 + "-----END CERTIFICATE-----\n"); 84 + "-----BEGIN CERTIFICATE-----\n" 108 + "-----END CERTIFICATE-----\n"); 118 + "-----BEGIN CERTIFICATE-----\n" 143 + "-----END CERTIFICATE-----\n"); 159 + "-----BEGIN CERTIFICATE-----\n" 184 + "-----END CERTIFICATE-----\n"); 200 + "-----BEGIN CERTIFICATE-----\n" 224 + "-----END CERTIFICATE-----\n") 409 X509Certificate certificate = certificate("" local 561 private X509Certificate certificate(String certificate) throws Exception { method in class:HostnameVerifierTest [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/certificate/ |
SigXmlTest.java | 17 package com.android.server.locksettings.recoverablekeystore.certificate;
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStorePrivateKeyEntryTest.java | 26 import java.security.cert.Certificate; 36 String certificateData = "-----BEGIN CERTIFICATE-----\n" 50 + "-----END CERTIFICATE-----\n"; 62 Certificate certificate = cf.generateCertificate(certArray); local 63 assertTrue(certificate instanceof X509Certificate); 65 String algorithm = certificate.getPublicKey().getAlgorithm(); 71 // If all the certificate in the chain is X509Certificate, 74 privateKey, new Certificate[] { certificate }); [all...] |
/libcore/luni/src/test/java/tests/targets/security/ |
KeyStoreTest.java | 33 import java.security.cert.Certificate; 103 Certificate certificate = null; local 105 certificate = certificateFactory 114 generator = KeyPairGenerator.getInstance(certificate.getPublicKey() 123 .getPrivate(), new Certificate[] {certificate}); 167 private String encodedCertificate = "-----BEGIN CERTIFICATE-----\n" 189 + "-----END CERTIFICATE-----\n";
|
/prebuilts/go/darwin-x86/src/encoding/pem/ |
pem_test.go | 42 if !reflect.DeepEqual(result, certificate) { 43 t.Errorf("#0 got:%#v want:%#v", result, certificate) 283 -----BEGIN CERTIFICATE----- 285 -----BEGIN CERTIFICATE----- 287 Certificate chain 290 -----BEGIN CERTIFICATE----- 292 -----BEGIN CERTIFICATE----- 293 -----BEGIN CERTIFICATE----- 315 -----END CERTIFICATE----- 362 var certificate = &Block{Type: "CERTIFICATE" var [all...] |
/prebuilts/go/linux-x86/src/encoding/pem/ |
pem_test.go | 42 if !reflect.DeepEqual(result, certificate) { 43 t.Errorf("#0 got:%#v want:%#v", result, certificate) 283 -----BEGIN CERTIFICATE----- 285 -----BEGIN CERTIFICATE----- 287 Certificate chain 290 -----BEGIN CERTIFICATE----- 292 -----BEGIN CERTIFICATE----- 293 -----BEGIN CERTIFICATE----- 315 -----END CERTIFICATE----- 362 var certificate = &Block{Type: "CERTIFICATE" var [all...] |
/system/update_engine/ |
certificate_checker.cc | 42 X509* certificate = X509_STORE_CTX_get_current_cert(x509_ctx); local 43 TEST_AND_RETURN_FALSE(certificate); 50 bool success = X509_digest(certificate, digest_function, out_digest, &len); 87 // which will be called after each server certificate is validated. However, 89 // callback, the certificate check will have to be done statically. Since we 91 // certificate, we hardcode Chrome OS's two known update servers here, and 140 // certificate. We store a report to UMA and just propagate the fail result. 154 LOG(WARNING) << "Failed to generate digest of X509 certificate " 168 // If there's no stored certificate, we just store the current one and return. 171 LOG(WARNING) << "Failed to store server certificate on storage key [all...] |
/libcore/luni/src/test/java/tests/targets/security/cert/ |
CertificateTest.java | 27 import java.security.cert.Certificate; 60 * Following certificate chain was taken from https://www.verisign.com and 61 * uses MD2withRSA for the root certificate. This chain stops validating 66 * A selfsigned certificate using MD2withRSA 69 * Certificate: 106 "-----BEGIN CERTIFICATE-----\n" 119 + "-----END CERTIFICATE-----\n"; 122 * A certificate signed by selfSignedCertMD2 125 * Certificate: 165 * Certificate Sign, CRL Sig 616 Certificate certificate = certificateFactory local 629 Certificate certificate = certificateFactory local [all...] |
/cts/hostsidetests/devicepolicy/app/CertInstaller/src/com/android/cts/certinstaller/ |
CertInstallerReceiver.java | 32 import java.security.cert.Certificate; 36 * Delegated certificate installer app that responds to specific intents and executes various DPM 37 * certificate manipulation APIs. The following APIs are exercised: 128 Certificate certificate = CertificateFactory.getInstance("X.509") local 138 sendResult(context, dpm.installKeyPair(null, privatekey, certificate, alias), 160 Certificate certificateToMatch = readCertificate(toMatch); 162 Certificate cert = readCertificate(certBuffer); 170 private static Certificate readCertificate(byte[] certBuffer) throws CertificateException {
|
/cts/hostsidetests/devicepolicy/app/DelegateApp/src/com/android/cts/delegate/ |
CertInstallDelegateTest.java | 37 import java.security.cert.Certificate; 54 "-----BEGIN CERTIFICATE-----\n" + 74 "-----END CERTIFICATE-----"; 143 assertTrue("Certificate installation failed", mDpm.installCaCert(null, cert)); 146 assertTrue("Certificate is not installed properly", mDpm.hasCaCertInstalled(null, cert)); 149 assertTrue("Certificate is not among installed certs", 154 assertFalse("Certificate was not uninstalled", mDpm.hasCaCertInstalled(null, cert)); 164 Certificate certificate = CertificateFactory.getInstance("X.509").generateCertificate( local 168 mDpm.installKeyPair(null, privatekey, certificate, alias)) [all...] |
/development/samples/browseable/MediaBrowserService/src/com.example.android.mediabrowserservice/ |
PackageValidator.java | 45 * Map allowed callers' certificate keys to the expected caller information. 66 String certificate = parser.nextText().replaceAll("\\s|\\n", ""); local 68 CallerInfo info = new CallerInfo(name, packageName, isRelease, certificate); 70 ArrayList<CallerInfo> infos = validCertificates.get(certificate); 73 validCertificates.put(certificate, infos); 77 " certificate=", certificate); 107 LogHelper.w(TAG, "Caller has more than one signature certificate!"); 126 // Check if the package name is valid for the certificate: 137 LogHelper.i(TAG, "Caller has a valid certificate, but its package doesn't match any " [all...] |