/frameworks/base/core/java/android/net/http/ |
D | SslError.java | 90 public SslError(int error, SslCertificate certificate) { in SslError() argument 91 this(error, certificate, ""); in SslError() 102 public SslError(int error, X509Certificate certificate) { in SslError() argument 103 this(error, certificate, ""); in SslError() 113 public SslError(int error, SslCertificate certificate, String url) { in SslError() argument 114 assert certificate != null; in SslError() 117 mCertificate = certificate; in SslError() 128 public SslError(int error, X509Certificate certificate, String url) { in SslError() argument 129 this(error, new SslCertificate(certificate), url); in SslError()
|
D | SslCertificate.java | 95 public static Bundle saveState(SslCertificate certificate) { in saveState() argument 96 if (certificate == null) { in saveState() 100 bundle.putString(ISSUED_TO, certificate.getIssuedTo().getDName()); in saveState() 101 bundle.putString(ISSUED_BY, certificate.getIssuedBy().getDName()); in saveState() 102 bundle.putString(VALID_NOT_BEFORE, certificate.getValidNotBefore()); in saveState() 103 bundle.putString(VALID_NOT_AFTER, certificate.getValidNotAfter()); in saveState() 104 X509Certificate x509Certificate = certificate.mX509Certificate; in saveState() 177 public SslCertificate(X509Certificate certificate) { in SslCertificate() argument 178 this(certificate.getSubjectDN().getName(), in SslCertificate() 179 certificate.getIssuerDN().getName(), in SslCertificate() [all …]
|
D | LoggingEventHandler.java | 72 public void certificate(SslCertificate certificate) { in certificate() method in LoggingEventHandler 74 HttpLog.v("LoggingEventHandler: certificate(): " + certificate); in certificate()
|
D | EventHandler.java | 112 public void certificate(SslCertificate certificate); in certificate() method
|
D | HttpConnection.java | 54 eventHandler.certificate(mCertificate); in openConnection()
|
D | HttpsConnection.java | 152 /* package */ void setCertificate(SslCertificate certificate) { in setCertificate() argument 153 mCertificate = certificate; in setCertificate()
|
D | Connection.java | 229 req.mEventHandler.certificate(mCertificate); in processRequests()
|
/frameworks/base/docs/html/training/articles/ |
D | security-ssl.jd | 15 <li><a href="#UnknownCa">Unknown certificate authority</a></li> 16 <li><a href="#SelfSigned">Self-signed server certificate</a></li> 17 <li><a href="#MissingCa">Missing intermediate certificate authority</a></li> 50 <p>In a typical SSL usage scenario, a server is configured with a certificate containing a 52 and server, the server proves it has the private key by signing its certificate with <a 55 <p>However, anyone can generate their own certificate and private key, so a simple handshake 57 matches the public key of the certificate. One way to solve this problem is to have the client 58 have a set of one or more certificates it trusts. If the certificate is not in the set, the 63 certificate with a new one. Unfortunately, now the client app has to be updated due to what 74 in each release. Similar to a server, a CA has a certificate and a private key. When issuing [all …]
|
/frameworks/base/keystore/java/android/security/ |
D | AndroidKeyStore.java | 133 byte[] certificate = mKeyStore.get(Credentials.USER_CERTIFICATE + alias); in engineGetCertificate() 134 if (certificate != null) { in engineGetCertificate() 135 return toCertificate(certificate); in engineGetCertificate() 138 certificate = mKeyStore.get(Credentials.CA_CERTIFICATE + alias); in engineGetCertificate() 139 if (certificate != null) { in engineGetCertificate() 140 return toCertificate(certificate); in engineGetCertificate()
|
/frameworks/base/docs/html/tools/publishing/ |
D | app-signing.jd | 47 certificate whose private key is held by the application's developer. The Android system uses the 48 certificate as a means of identifying the author of an application and establishing trust 49 relationships between applications. The certificate is not used to control which applications the 50 user can install. The certificate does not need to be signed by a certificate authority: it is 63 <li>You can use self-signed certificates to sign your applications. No certificate authority is 65 <li>The system tests a signer certificate's expiration date only at install time. If an 66 application's signer certificate expires after the application is installed, the application 98 Jarsigner utility to sign your application's <code>.apk</code> file. Because the certificate and 114 all of your applications with the same certificate, throughout the expected 119 must continue to sign the updates with the same certificate or set of certificates, [all …]
|
D | preparing.jd | 71 <code>.apk</code> file, the release-ready <code>.apk</code> file is signed with your own certificate 112 certificate that is owned by the application's developer (that is, a certificate for which the 113 developer holds the private key). The Android system uses the certificate as a means of identifying 115 certificate that you use for signing does not need to be signed by a certificate authority; the 116 Android system allows you to sign your applications with a self-signed certificate. To learn about 117 certificate requirements, see <a href="{@docRoot}tools/publishing/app-signing.html#cert">Obtain a 315 <p>The Export Wizard assumes that you have a <a href="#billing-keys">certificate and private key</a> 316 suitable for signing your application. If you do not have a suitable certificate and private key, 326 Release Mode</a>. This build method assumes you have a <a href="#billing-keys">certificate and 327 private key</a> suitable for signing your application. If you do not have a suitable certificate and
|
/frameworks/base/tests/CoreTests/android/core/ |
D | TestEventHandler.java | 448 public void certificate(SslCertificate certificate) {} in certificate() method in TestEventHandler 730 public void expectSSLCertificateError(SslCertificate certificate) { in expectSSLCertificateError() argument 732 expectCertificate = certificate; in expectSSLCertificateError()
|
/frameworks/base/docs/html/training/in-app-billing/ |
D | test-iab-app.jd | 43 …n for Release</a>. Make sure that you are using your final (not debug) certificate and private key… 50 …<li>Your application is signed with the same certificate that you used for the APK that you upload…
|
D | list-iab-products.jd | 39 …n for Release</a>. Make sure that you are using your final (not debug) certificate and private key…
|
/frameworks/base/docs/html/guide/topics/manifest/ |
D | permission-element.jd | 106 application is signed with the same certificate as the application 114 certificate as the application that declared the permission. Please avoid using this
|
D | manifest-element.jd | 85 by the same certificate. Application with the same user ID can access each
|
/frameworks/base/core/java/android/webkit/ |
D | WebViewProvider.java | 78 public void setCertificate(SslCertificate certificate); in setCertificate() argument
|
D | HTML5VideoViewProxy.java | 546 public void certificate(SslCertificate certificate) { in certificate() method in HTML5VideoViewProxy.PosterDownloader
|
D | WebView.java | 569 public void setCertificate(SslCertificate certificate) { in setCertificate() argument 571 mProvider.setCertificate(certificate); in setCertificate()
|
D | CallbackProxy.java | 889 public void onReceivedCertificate(SslCertificate certificate) { in onReceivedCertificate() argument 891 sendMessage(obtainMessage(RECEIVED_CERTIFICATE, certificate)); in onReceivedCertificate()
|
/frameworks/base/docs/html/guide/faq/ |
D | troubleshooting.jd | 27 …dar">I can't compile my app because the build tools generated an expired debug certificate</a></li> 215 onto the emulator, a copy that is signed with a different certificate (the Android IDE tools will 216 have signed the app with a debug certificate, where the existing version was already signed with 217 a private certificate). The system does not allow this type of reinstallation. </p> 290 …alendar">I can't compile my app because the build tools generated an expired debug certificate</h2>
|
/frameworks/base/docs/html/guide/topics/security/ |
D | permissions.jd | 68 <p>All Android applications (.apk files) must be signed with a certificate 69 whose private key is held by their developer. This certificate identifies 70 the author of the application. The certificate does <em>not</em> need to be 71 signed by a certificate authority: it is perfectly allowable, and typical,
|
/frameworks/base/docs/html/about/versions/ |
D | android-1.6-highlights.jd | 100 <li>L2TP/IPsec certificate based VPN</li>
|
/frameworks/base/docs/html/training/multiple-apks/ |
D | texture.jd | 255 <li>All APKs must be signed with the same certificate</li>
|
D | screensize.jd | 308 <li>All APKs must be signed with the same certificate</li>
|