/system/security/keystore/ |
test-keystore | 50 function keystore() { function 57 run adb shell ls -al /data/misc/keystore 70 log "reset keystore as system user" 71 keystore system r 79 keystore root t 83 keystore system t 88 keystore system p bar 91 expect "-rw------- keystore keystore 84 .masterkey" 94 keystore system [all...] |
keystore_get.cpp | 17 #include <keystore/IKeystoreService.h> 20 #include <keystore/keystore_get.h> 26 sp<IBinder> binder = sm->getService(String16("android.security.keystore"));
|
Android.mk | 21 LOCAL_SRC_FILES := keystore.cpp keyblob_utils.cpp 24 LOCAL_MODULE := keystore 39 # Library for keystore clients
|
keystore_cli.cpp | 22 #include <keystore/IKeystoreService.h> 26 #include <keystore/keystore.h> 174 sp<IBinder> binder = sm->getService(String16("android.security.keystore")); 178 fprintf(stderr, "%s: error: could not connect to keystore service\n", argv[0]);
|
/hardware/samsung_slsi/exynos5/ |
exynos5.mk | 38 # Keystore 40 keystore.exynos5
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
DefaultSSLContextImpl.java | 26 import java.security.KeyStore; 67 // find KeyStore, KeyManagers 68 String keystore = System.getProperty("javax.net.ssl.keyStore"); local 69 if (keystore == null) { 75 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); 78 is = new BufferedInputStream(new FileInputStream(keystore)); 100 String keystore = System.getProperty("javax.net.ssl.trustStore") local [all...] |
/external/apache-http/src/org/apache/http/conn/ssl/ |
SSLSocketFactory.java | 52 import java.security.KeyStore; 69 * a {@link KeyStore truststore} file containg one or several trusted 78 * keytool -import -alias "my server cert" -file server.crt -keystore my.truststore 84 * a {@link KeyStore keystore} file containg a private key/public certificate 93 * Use the following sequence of actions to generate a keystore file 99 * <pre>keytool -genkey -v -alias "my client key" -validity 365 -keystore my.keystore</pre> 100 * For simplicity use the same password for the key as that of the keystore 106 * <pre>keytool -certreq -alias "my client key" -file mycertreq.csr -keystore my.keystore</pre [all...] |
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/ |
SSLSocketFactory.java | 58 import java.security.KeyStore; 75 * a {@link KeyStore truststore} file containg one or several trusted 84 * keytool -import -alias "my server cert" -file server.crt -keystore my.truststore 90 * a {@link KeyStore keystore} file containg a private key/public certificate 99 * Use the following sequence of actions to generate a keystore file 105 * <pre>keytool -genkey -v -alias "my client key" -validity 365 -keystore my.keystore</pre> 106 * For simplicity use the same password for the key as that of the keystore 112 * <pre>keytool -certreq -alias "my client key" -file mycertreq.csr -keystore my.keystore</pre [all...] |
/build/target/product/ |
core_minimal.mk | 60 keystore \ 61 keystore.default \
|
/hardware/qcom/keymaster/ |
Android.mk | 7 LOCAL_MODULE := keystore.msm8960
|
/system/security/softkeymaster/ |
Android.mk | 19 LOCAL_MODULE := keystore.default 26 system/security/keystore \
|
/frameworks/base/keystore/java/android/security/ |
Credentials.java | 217 static boolean deleteAllTypesForAlias(KeyStore keystore, String alias) { 222 return keystore.delKey(Credentials.USER_PRIVATE_KEY + alias) 223 | deleteCertificateTypesForAlias(keystore, alias); 231 static boolean deleteCertificateTypesForAlias(KeyStore keystore, String alias) { 236 return keystore.delete(Credentials.USER_CERTIFICATE + alias) 237 | keystore.delete(Credentials.CA_CERTIFICATE + alias);
|
KeyStore.java | 28 public class KeyStore { 29 private static final String TAG = "KeyStore"; 57 private KeyStore(IKeystoreService binder) { 61 public static KeyStore getInstance() { 62 IKeystoreService keystore = IKeystoreService.Stub.asInterface(ServiceManager local 63 .getService("android.security.keystore")); 64 return new KeyStore(keystore); 72 Log.w(TAG, "Cannot connect to keystore", e); 92 Log.w(TAG, "Cannot connect to keystore", e) [all...] |
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/ |
KeystoreSelectionPage.java | 40 * Keystore selection page. This page allows to choose to create a new keystore or use an 58 setTitle("Keystore selection"); 72 mUseExistingKeystore.setText("Use existing keystore"); 78 mCreateKeystore.setText("Create new keystore"); 93 fileDialog.setText("Load Keystore"); 96 fileDialog.setText("Select Keystore Name"); 175 // reset the keystore/alias from the content of the project 181 String keystore = ProjectHelper.loadStringProperty(project, local 183 if (keystore != null) 211 String keystore = mKeystore.getText().trim(); local [all...] |
/libcore/luni/src/test/java/libcore/java/security/cert/ |
OldPKIXParametersTest.java | 28 import java.security.KeyStore; 174 * Test #4 for <code>PKIXParameters(KeyStore)</code> constructor<br> 183 KeyStore store = KeyStore.getInstance("PKCS12"); 193 store = KeyStore.getInstance("PKCS12"); 205 KeyStore keystore = KeyStore.getInstance(KeyStore.getDefaultType()); local 206 keystore.load(null,null) [all...] |
/device/asus/tilapia/self-extractors/nvidia/staging/ |
device-partial.mk | 74 PRODUCT_PACKAGES += keystore.grouper
|
/device/asus/tilapia/self-extractors/nvidia/staging/keymaster/ |
Android.mk | 22 LOCAL_MODULE := keystore.grouper
|
/device/samsung/tuna/keymaster/ |
Android.mk | 22 LOCAL_MODULE := keystore.tuna
|
/hardware/samsung_slsi/exynos5/libkeymaster/ |
Android.mk | 22 LOCAL_MODULE := keystore.exynos5
|
/frameworks/base/core/java/android/os/ |
RecoverySystem.java | 96 private static HashSet<Certificate> getTrustedCerts(File keystore) 99 if (keystore == null) { 100 keystore = DEFAULT_KEYSTORE; 102 ZipFile zip = new ZipFile(keystore);
|
/system/security/keystore-engine/ |
eng_keystore.cpp | 38 #define LOG_TAG "OpenSSL-keystore" 42 #include <keystore/keystore.h> 43 #include <keystore/IKeystoreService.h> 48 #define KEYSTORE_ENGINE_ID "keystore" 49 #define KEYSTORE_ENGINE_NAME "Android keystore engine" 82 * RSA ex_data index for keystore's key handle. 165 sp<IBinder> binder = sm->getService(String16("android.security.keystore")); 169 ALOGE("could not contact keystore"); 182 ALOGW("Error during signing from keystore: %d", ret) [all...] |
/build/core/ |
pathmap.mk | 98 keystore \
|
/device/lge/mako/ |
BoardConfig.mk | 109 keystore.te \
|
/packages/apps/CertInstaller/src/com/android/certinstaller/ |
CredentialHelper.java | 36 import java.security.KeyStore.PasswordProtection; 37 import java.security.KeyStore.PrivateKeyEntry; 38 import java.security.KeyStore; 326 java.security.KeyStore keystore = java.security.KeyStore.getInstance("PKCS12"); local 328 keystore.load(new ByteArrayInputStream(getData(KeyChain.EXTRA_PKCS12)), 331 Enumeration<String> aliases = keystore.aliases(); 338 KeyStore.Entry entry = keystore.getEntry(alias, passwordProtection) [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/configuration/org.eclipse.osgi/bundles/118/1/.cp/lib/ |
jarprocessor-ant.jar | |