/system/security/keystore/ |
test-keystore | 50 function keystore() { function 57 run adb shell ls -al /data/misc/keystore 70 log "reset keystore as system user" 71 keystore system r 79 keystore root t 83 keystore system t 88 keystore system p bar 91 expect "-rw------- keystore keystore 84 .masterkey" 94 keystore system [all...] |
Android.mk | 21 LOCAL_SRC_FILES := keystore.cpp keyblob_utils.cpp 24 LOCAL_MODULE := keystore 37 # Library for keystore clients
|
keystore_client.h | 20 #include <keystore.h> 45 * This sends a command to the keystore. The arguments must be of the format:
|
keystore_client.cpp | 17 #include <keystore.h> 28 sock = socket_local_client("keystore", ANDROID_SOCKET_NAMESPACE_RESERVED, SOCK_STREAM); 54 ALOGW("truncated write to keystore"); 65 ALOGW("Error from keystore: %d", code); 82 ALOGW("truncated read from keystore for data"); 90 ALOGW("truncated read from keystore for length");
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
DefaultSSLContextImpl.java | 26 import java.security.KeyStore; 67 // find KeyStore, KeyManagers 68 String keystore = System.getProperty("javax.net.ssl.keyStore"); local 69 if (keystore == null) { 75 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); 78 is = new BufferedInputStream(new FileInputStream(keystore)); 104 String keystore = System.getProperty("javax.net.ssl.trustStore") local [all...] |
/external/apache-http/src/org/apache/http/conn/ssl/ |
SSLSocketFactory.java | 52 import java.security.KeyStore; 69 * a {@link KeyStore truststore} file containg one or several trusted 78 * keytool -import -alias "my server cert" -file server.crt -keystore my.truststore 84 * a {@link KeyStore keystore} file containg a private key/public certificate 93 * Use the following sequence of actions to generate a keystore file 99 * <pre>keytool -genkey -v -alias "my client key" -validity 365 -keystore my.keystore</pre> 100 * For simplicity use the same password for the key as that of the keystore 106 * <pre>keytool -certreq -alias "my client key" -file mycertreq.csr -keystore my.keystore</pre [all...] |
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/ |
SSLSocketFactory.java | 58 import java.security.KeyStore; 75 * a {@link KeyStore truststore} file containg one or several trusted 84 * keytool -import -alias "my server cert" -file server.crt -keystore my.truststore 90 * a {@link KeyStore keystore} file containg a private key/public certificate 99 * Use the following sequence of actions to generate a keystore file 105 * <pre>keytool -genkey -v -alias "my client key" -validity 365 -keystore my.keystore</pre> 106 * For simplicity use the same password for the key as that of the keystore 112 * <pre>keytool -certreq -alias "my client key" -file mycertreq.csr -keystore my.keystore</pre [all...] |
/system/security/softkeymaster/ |
Android.mk | 19 LOCAL_MODULE := keystore.default 26 system/security/keystore \
|
keymaster_openssl.cpp | 20 #include <keystore.h>
|
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/ |
KeystoreSelectionPage.java | 40 * Keystore selection page. This page allows to choose to create a new keystore or use an 58 setTitle("Keystore selection"); 72 mUseExistingKeystore.setText("Use existing keystore"); 78 mCreateKeystore.setText("Create new keystore"); 93 fileDialog.setText("Load Keystore"); 96 fileDialog.setText("Select Keystore Name"); 175 // reset the keystore/alias from the content of the project 181 String keystore = ProjectHelper.loadStringProperty(project, local 183 if (keystore != null) 211 String keystore = mKeystore.getText().trim(); local [all...] |
/build/target/product/ |
core.mk | 71 keystore \ 72 keystore.default \
|
mini.mk | 90 keystore \ 91 keystore.default \
|
/external/sepolicy/ |
system.te | 24 # Talk to keystore. 25 unix_socket_connect(system_app, keystore, keystore) 86 unix_socket_connect(system, keystore, keystore)
|
file_contexts | 58 /dev/socket/keystore u:object_r:keystore_socket:s0 94 /system/bin/keystore u:object_r:keystore_exec:s0 116 /data/misc/keystore(/.*)? u:object_r:keystore_data_file:s0
|
/sdk/anttasks/src/com/android/ant/ |
SignApkTask.java | 29 import java.security.KeyStore; 30 import java.security.KeyStore.PrivateKeyEntry; 44 public void setKeystore(Path keystore) { 45 mKeystore = TaskHelper.checkSinglePath("keystore", keystore); 80 throw new BuildException(String.format("Keystore '%s' is not found!", mKeystore)); 91 * Loads the debug key from the keystore. 92 * @param osKeyStorePath the OS path to the keystore. 93 * @param storeType an optional keystore type, or <code>null</code> if the default is to 95 * @return <code>true</code> if success, <code>false</code> if the keystore does not exist [all...] |
/libcore/luni/src/test/java/libcore/java/security/cert/ |
OldPKIXParametersTest.java | 28 import java.security.KeyStore; 174 * Test #4 for <code>PKIXParameters(KeyStore)</code> constructor<br> 183 KeyStore store = KeyStore.getInstance("PKCS12"); 193 store = KeyStore.getInstance("PKCS12"); 205 KeyStore keystore = KeyStore.getInstance(KeyStore.getDefaultType()); local 206 keystore.load(null,null) [all...] |
/device/samsung/tuna/keymaster/ |
Android.mk | 22 LOCAL_MODULE := keystore.tuna
|
/system/extras/tests/ext4/ |
android_emmc_perf_tests.sh | 67 adb shell stop keystore
|
/system/security/keystore-engine/ |
Android.mk | 30 system/security/keystore \
|
eng_keystore.cpp | 26 #include <keystore.h> 40 #define LOG_TAG "OpenSSL-keystore" 47 #define KEYSTORE_ENGINE_ID "keystore" 48 #define KEYSTORE_ENGINE_NAME "Android keystore engine" 81 * RSA ex_data index for keystore's key handle. 285 ALOGE("Could not set up keystore engine"); 291 ALOGE("Could not set up keystore RSA methods");
|
/frameworks/base/core/java/android/os/ |
RecoverySystem.java | 95 private static HashSet<Certificate> getTrustedCerts(File keystore) 98 if (keystore == null) { 99 keystore = DEFAULT_KEYSTORE; 101 ZipFile zip = new ZipFile(keystore);
|
/build/core/ |
pathmap.mk | 101 keystore \
|
/packages/apps/CertInstaller/src/com/android/certinstaller/ |
CredentialHelper.java | 36 import java.security.KeyStore.PasswordProtection; 37 import java.security.KeyStore.PrivateKeyEntry; 38 import java.security.KeyStore; 311 java.security.KeyStore keystore = java.security.KeyStore.getInstance("PKCS12"); local 313 keystore.load(new ByteArrayInputStream(getData(KeyChain.EXTRA_PKCS12)), 316 Enumeration<String> aliases = keystore.aliases(); 323 KeyStore.Entry entry = keystore.getEntry(alias, passwordProtection) [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/configuration/org.eclipse.osgi/bundles/118/1/.cp/lib/ |
jarprocessor-ant.jar | |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/configuration/org.eclipse.osgi/bundles/46/1/.cp/lib/ |
repository-tools-ant.jar | |