Home
last modified time | relevance | path

Searched refs:certificate (Results 1 – 25 of 58) sorted by relevance

123

/frameworks/base/core/java/android/net/http/
DSslError.java90 public SslError(int error, SslCertificate certificate) { in SslError() argument
91 this(error, certificate, ""); in SslError()
102 public SslError(int error, X509Certificate certificate) { in SslError() argument
103 this(error, certificate, ""); in SslError()
113 public SslError(int error, SslCertificate certificate, String url) { in SslError() argument
114 assert certificate != null; in SslError()
117 mCertificate = certificate; in SslError()
128 public SslError(int error, X509Certificate certificate, String url) { in SslError() argument
129 this(error, new SslCertificate(certificate), url); in SslError()
DSslCertificate.java97 public static Bundle saveState(SslCertificate certificate) { in saveState() argument
98 if (certificate == null) { in saveState()
102 bundle.putString(ISSUED_TO, certificate.getIssuedTo().getDName()); in saveState()
103 bundle.putString(ISSUED_BY, certificate.getIssuedBy().getDName()); in saveState()
104 bundle.putString(VALID_NOT_BEFORE, certificate.getValidNotBefore()); in saveState()
105 bundle.putString(VALID_NOT_AFTER, certificate.getValidNotAfter()); in saveState()
106 X509Certificate x509Certificate = certificate.mX509Certificate; in saveState()
179 public SslCertificate(X509Certificate certificate) { in SslCertificate() argument
180 this(certificate.getSubjectDN().getName(), in SslCertificate()
181 certificate.getIssuerDN().getName(), in SslCertificate()
[all …]
/frameworks/base/core/java/android/security/net/config/
DTrustAnchor.java23 public final X509Certificate certificate; field in TrustAnchor
26 public TrustAnchor(X509Certificate certificate, boolean overridesPins) { in TrustAnchor() argument
27 if (certificate == null) { in TrustAnchor()
30 this.certificate = certificate; in TrustAnchor()
DTrustedCertificateStoreAdapter.java41 return anchor.certificate; in findIssuer()
55 return anchor.certificate; in getTrustAnchor()
/frameworks/base/docs/html/training/articles/
Dsecurity-ssl.jd15 <li><a href="#UnknownCa">Unknown certificate authority</a></li>
16 <li><a href="#SelfSigned">Self-signed server certificate</a></li>
17 <li><a href="#MissingCa">Missing intermediate certificate authority</a></li>
51 <p>In a typical SSL usage scenario, a server is configured with a certificate containing a
53 and server, the server proves it has the private key by signing its certificate with <a
56 <p>However, anyone can generate their own certificate and private key, so a simple handshake
58 matches the public key of the certificate. One way to solve this problem is to have the client
59 have a set of one or more certificates it trusts. If the certificate is not in the set, the
64 certificate with a new one. Unfortunately, now the client app has to be updated due to what
75 in each release. Similar to a server, a CA has a certificate and a private key. When issuing
[all …]
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/configparse/
DConfigBuilder.java147 for (Certificate certificate : chain) { in parse()
148 if (!(certificate instanceof X509Certificate)) { in parse()
150 certificate.getClass()); in parse()
152 clientChain.add((X509Certificate) certificate); in parse()
281 for (X509Certificate certificate : clientChain) { in buildTLSConfig()
283 byte[] fingerprint = digester.digest(certificate.getEncoded()); in buildTLSConfig()
285 clientCertificate = certificate; in buildTLSConfig()
/frameworks/base/docs/html/preview/features/
Dkey-attestation.jd3 page.keywords="android N", "security", "TEE", "hardware-backed", "keystore", "certificate", "key at…
21 interpret the schema of the attestation certificate's extension data.
30 tool, in return, provides a certificate chain, which you can use to verify
35 The root certificate within this chain is signed using an attestation key,
42 services, the root certificate is issued by Google. You should verify that
43 this root certificate appears within Google’s list of root certificates.
60 Check each certificate’s validity using a
75 the certificate chain as an argument:</p>
78 // "certificates" contains the certificate chain associated with a specific key
85 An attestation object extracts the extension data within this certificate
[all …]
Dsecurity-config.jd90 <li>Connecting to a host with a custom certificate authority(self-signed,
116 certificate or to a host whose SSL certificate is issued by a non-public CA
136 Add the self-signed or non-public CA certificate, in PEM or DER format, to
188 app can do this by specifying multiple certificate sources for a
212 certificate for your production server. In order to support this without any
277 to issue a fradulent certificate the app would be at risk from a MiTM
279 by either limiting the set of CAs they trust or by certificate pinning.
284 public key (SubjectPublicKeyInfo of the X.509 certificate). A certificate
285 chain is then only valid if the certificate chain contains at least one of
290 Note that when using certificate pinning you should always include a backup
[all …]
/frameworks/base/media/lib/signer/java/com/android/mediadrm/signer/
DMediaDrmSigner.java69 Certificate(MediaDrm.Certificate certificate) { in Certificate() argument
70 mCertificate = certificate; in Certificate()
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/
DClientKeyManager.java89 for (Certificate certificate : in getCertificateChain()
91 if (certificate instanceof X509Certificate) { in getCertificateChain()
92 certs.add((X509Certificate) certificate); in getCertificateChain()
DWiFiKeyManager.java151 for (Certificate certificate : mKeyStore.getCertificateChain(alias)) { in getCertificateChain()
152 if (certificate instanceof X509Certificate) { in getCertificateChain()
153 certs.add((X509Certificate) certificate); in getCertificateChain()
DOSUSocketFactory.java170 for (X509Certificate certificate : mTrustManager.getTrustChain()) { in getOSUCertificate()
171 for (List<?> name : certificate.getSubjectAlternativeNames()) { in getOSUCertificate()
175 return certificate; in getOSUCertificate()
DSPVerifier.java315 private static Asn1Object getExtension(X509Certificate certificate, String extension) in getExtension() argument
317 byte[] data = certificate.getExtensionValue(extension); in getExtension()
/frameworks/base/packages/Osu/src/com/android/configparse/
DConfigBuilder.java143 for (X509Certificate certificate : clientChain) { in buildTLSConfig()
145 byte[] fingerprint = digester.digest(certificate.getEncoded()); in buildTLSConfig()
147 clientCertificate = certificate; in buildTLSConfig()
/frameworks/base/tests/CoreTests/android/core/
DTestEventHandler.java448 public void certificate(SslCertificate certificate) {} in certificate() method in TestEventHandler
730 public void expectSSLCertificateError(SslCertificate certificate) { in expectSSLCertificateError() argument
732 expectCertificate = certificate; in expectSSLCertificateError()
/frameworks/base/docs/html/guide/topics/manifest/
Dpermission-element.jd67 same certificate. If a package declares a permission, the system does not permit
69 those packages are signed with the same certificate as the first package. To
116 application is signed with the same certificate as the application
124 certificate as the application that declared the permission. Please avoid using this
/frameworks/av/drm/mediadrm/plugins/clearkey/
DDrmPlugin.h100 Vector<uint8_t>& certificate, in provideProvisionResponse() argument
103 UNUSED(certificate); in provideProvisionResponse()
/frameworks/base/media/jni/
Dandroid_media_MediaDrm.cpp143 CertificateFields certificate; member
644 GET_FIELD_ID(gFields.certificate.wrappedPrivateKey, clazz, "mWrappedKey", "[B"); in android_media_MediaDrm_native_init()
645 GET_FIELD_ID(gFields.certificate.certificateData, clazz, "mCertificateData", "[B"); in android_media_MediaDrm_native_init()
1025 Vector<uint8_t> certificate, wrappedKey; in android_media_MediaDrm_provideProvisionResponseNative() local
1027 status_t err = drm->provideProvisionResponse(response, certificate, wrappedKey); in android_media_MediaDrm_provideProvisionResponseNative()
1034 if (clazz && certificate.size() && wrappedKey.size()) { in android_media_MediaDrm_provideProvisionResponseNative()
1036 jbyteArray jcertificate = VectorToJByteArray(env, certificate); in android_media_MediaDrm_provideProvisionResponseNative()
1037 env->SetObjectField(certificateObj, gFields.certificate.certificateData, jcertificate); in android_media_MediaDrm_provideProvisionResponseNative()
1040 env->SetObjectField(certificateObj, gFields.certificate.wrappedPrivateKey, jwrappedKey); in android_media_MediaDrm_provideProvisionResponseNative()
/frameworks/base/core/java/android/util/apk/
DApkSignatureSchemeV2Verifier.java364 X509Certificate certificate; in verifySigner() local
366 certificate = (X509Certificate) in verifySigner()
371 certificate = new VerbatimX509Certificate(certificate, encodedCert); in verifySigner()
372 certs.add(certificate); in verifySigner()
/frameworks/base/tests/NetworkSecurityConfigTest/src/android/security/net/config/
DNetworkSecurityConfigTests.java278 preNCerts.add(anchor.certificate); in testUserAddedCaOptIn()
282 nCerts.add(anchor.certificate); in testUserAddedCaOptIn()
/frameworks/av/media/libmedia/
DIDrm.cpp262 Vector<uint8_t> &certificate, in provideProvisionResponse()
273 readVector(reply, certificate); in provideProvisionResponse()
729 Vector<uint8_t> certificate; in onTransact() local
732 status_t result = provideProvisionResponse(response, certificate, wrappedKey); in onTransact()
733 writeVector(reply, certificate); in onTransact()
/frameworks/base/media/lib/signer/
DREADME.txt23 This library will eventually be replaced when the provisioned certificate-
/frameworks/base/docs/html/about/versions/
Dandroid-5.1.jd114 that use these functions must be signed by a certificate that matches the certificate in the
/frameworks/base/docs/html/training/safetynet/
Dindex.jd248 certificate used to sign requesting app"],
276 <li>Extract the SSL certificate chain from the JWS message.
279 <li>Validate the SSL certificate chain and use SSL hostname matching to verify that the leaf
280 certificate was issued to the hostname {@code attest.android.com}.
283 <li>Use the certificate to verify the signature of the JWS message.
/frameworks/base/docs/html/training/in-app-billing/
Dtest-iab-app.jd42 …n for Release</a>. Make sure that you are using your final (not debug) certificate and private key…
49 …<li>Your application is signed with the same certificate that you used for the APK that you upload…

123