/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/ |
KeyCheckPage.java | 45 import java.security.KeyStore; 46 import java.security.KeyStore.PrivateKeyEntry; 191 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 193 keyStore.load(fis, mWizard.getKeystorePassword().toCharArray()); 195 PrivateKeyEntry entry = (KeyStore.PrivateKeyEntry)keyStore.getEntry( 197 new KeyStore.PasswordProtection [all...] |
ExportWizard.java | 53 import java.security.KeyStore; 54 import java.security.KeyStore.PrivateKeyEntry; 73 static final String PROPERTY_KEYSTORE = "keystore"; //$NON-NLS-1$ 88 /** bit mask constant for keystore data change event */ 236 // if needed, create the keystore and/or key. 259 // keystore creation error! 264 // keystore is created, now load the private key and certificate. 265 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()) [all...] |
/libcore/luni/src/test/java/tests/api/javax/net/ssl/ |
SSLSocketTest.java | 25 import java.security.KeyStore; 425 * Defines the keystore contents for the server, BKS version. Holds just a 455 * Defines the keystore contents for the server, JKS version. Holds just a 586 * Loads a keystore from a base64-encoded String. Returns the KeyManager[] 593 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 594 keyStore.load(inputStream, PASSWORD.toCharArray()); 599 keyManagerFactory.init(keyStore, PASSWORD.toCharArray()) [all...] |
HandshakeCompletedEventTest.java | 26 import java.security.KeyStore; 210 * Defines the keystore contents for the server, BKS version. Holds just a 240 * Defines the keystore contents for the server, JKS version. Holds just a 270 * Defines the keystore contents for the client, JKS version. Holds just a 300 * Defines the keystore contents for the client, BKS version. Holds just a 536 * Loads a keystore from a base64-encoded String. Returns the KeyManager[] 543 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()) [all...] |
SSLSessionTest.java | 25 import java.security.KeyStore; 74 KeyStore store = server.getStore(); 133 KeyStore store = client.getStore(); 144 KeyStore store = client.getStore(); 328 * Defines the keystore contents for the server, BKS version. Holds just a 358 * Defines the keystore contents for the client, BKS version. Holds just a 389 * Defines the keystore contents for the server, JKS version. Holds just a 419 * Defines the keystore contents for the client, JKS version. Holds just a 482 private KeyStore store; 543 public KeyStore getStore() [all...] |
/libcore/crypto/src/test/java/org/conscrypt/ |
TrustManagerImplTest.java | 23 import java.security.KeyStore; 72 KeyStore.PrivateKeyEntry pke = TestKeyStore.getServer().getPrivateKey("RSA", "RSA"); 105 KeyStore.PrivateKeyEntry pke = TestKeyStore.getServer().getPrivateKey("RSA", "RSA"); 119 KeyStore.PrivateKeyEntry pke = TestKeyStore.getServer().getPrivateKey("RSA", "RSA"); 140 KeyStore.PrivateKeyEntry pke = TestKeyStore.getServer().getPrivateKey("RSA", "RSA"); 164 KeyStore keyStore = TestKeyStore.createKeyStore(); 165 keyStore.setCertificateEntry("alias", ca); 169 tmf.init(keyStore); 178 KeyStore keyStore = TestKeyStore.createKeyStore() [all...] |
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
TrustManagerFactoryTest.java | 21 import java.security.KeyStore.PrivateKeyEntry; 22 import java.security.KeyStore; 99 PKIXParameters pp = new PKIXParameters(getTestKeyStore().keyStore); 108 PKIXBuilderParameters pbp = new PKIXBuilderParameters(getTestKeyStore().keyStore, xcs); 121 // init with null for default KeyStore 122 tmf.init((KeyStore) null); 126 tmf.init(getTestKeyStore().keyStore); 217 // keyStore should contain only the intermediate CA so we can 220 KeyStore keyStore = TestKeyStore.createKeyStore() [all...] |
/packages/apps/KeyChain/tests/src/com/android/keychain/tests/ |
KeyChainServiceTest.java | 27 import android.security.KeyStore; 30 import java.security.KeyStore.PrivateKeyEntry; 145 Log.d(TAG, "test_KeyChainService setup keystore"); 146 KeyStore keyStore = KeyStore.getInstance(); 192 assertEquals(KeyStore.State.UNLOCKED, keyStore.state());
|
/external/chromium_org/net/test/android/javatests/src/org/chromium/net/test/util/ |
TestWebServer.java | 36 import java.security.KeyStore; 428 * Defines the keystore contents for the server, BKS version. Holds just a 460 * Loads a keystore from a base64-encoded String. Returns the KeyManager[] 467 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 468 keyStore.load(inputStream, PASSWORD.toCharArray()); 473 keyManagerFactory.init(keyStore, PASSWORD.toCharArray());
|
/frameworks/base/services/java/com/android/server/ |
LockSettingsService.java | 43 import android.security.KeyStore; 264 final KeyStore keyStore = KeyStore.getInstance(); 265 // Conditionally reset the keystore if empty. If non-empty, we are just 267 if (TextUtils.isEmpty(password) && keyStore.isEmpty()) { 268 keyStore.reset(); 270 // Update the keystore password 271 keyStore.password(password);
|
/frameworks/base/wifi/java/android/net/wifi/ |
WifiEnterpriseConfig.java | 23 import android.security.KeyStore; 51 * configurations use the key_id field with the engine_id set to "keystore". 58 * String representing the keystore OpenSSL ENGINE's ID. 60 private static final String ENGINE_ID_KEYSTORE = "keystore"; 63 * String representing the keystore URI used for wpa_supplicant. 65 private static final String KEYSTORE_URI = "keystore://"; 528 boolean installKeys(android.security.KeyStore keyStore, String name) { 540 ret = keyStore.importKey(privKeyName, privKeyData, Process.WIFI_UID, 541 KeyStore.FLAG_NONE) [all...] |
/libcore/luni/src/main/java/java/security/ |
KeyStore.java | 39 * {@code KeyStore} is responsible for maintaining cryptographic keys and their 43 * 'keystore.type'} property in the file named {@code 49 public class KeyStore { 51 // Store KeyStore SERVICE name 52 private static final String SERVICE = "KeyStore"; 57 // Store KeyStore property name 58 private static final String PROPERTY_NAME = "keystore.type"; 60 // Store default KeyStore type 63 // Store KeyStore state (initialized or not) 76 * Constructs a new instance of {@code KeyStore} with the given arguments [all...] |
/cts/libs/testserver/src/android/webkit/cts/ |
CtsTestServer.java | 64 import java.security.KeyStore; 776 * Defines the keystore contents for the server, BKS version. Holds just a [all...] |
/frameworks/base/tests/CoreTests/android/core/ |
SSLSocketTest.java | 35 import java.security.KeyStore; 322 KeyStore ks = KeyStore.getInstance("BKS"); 328 assertEquals("BKS", KeyStore.getDefaultType()); 458 * Defines the keystore contents for the server, JKS version. Holds just a 488 * Defines the keystore contents for the server, BKS version. Holds just a 518 * Defines the keystore contents for the client, JKS version. Holds just a 548 * Defines the keystore contents for the client, BKS version. Holds just a 577 * Defines the password for the keystore. [all...] |
/packages/apps/Settings/src/com/android/settings/vpn2/ |
VpnSettings.java | 35 import android.security.KeyStore; 75 private final KeyStore mKeyStore = KeyStore.getInstance(); 165 // Check KeyStore here, so others do not need to deal with it. 168 // Let us unlock KeyStore. See you later! 178 // Now KeyStore is always unlocked. Reset the flag. 181 // Currently we are the only user of profiles in KeyStore. 182 // Assuming KeyStore and KeyGuard do the right thing, we can 240 mKeyStore.put(Credentials.VPN + profile.key, profile.encode(), KeyStore.UID_SELF, 241 KeyStore.FLAG_ENCRYPTED) [all...] |
/external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/internal/net/www/protocol/https/ |
HttpsURLConnectionTest.java | 36 import java.security.KeyStore; 57 * type of the default KeyStore installed in the system in lower case. <br> 58 * For example: if default KeyStore type in the system is BKS (i.e. 59 * java.security file sets up the property keystore.type=BKS), thus classpath [all...] |
/libcore/luni/src/test/java/org/apache/harmony/luni/tests/internal/net/www/protocol/https/ |
HttpsURLConnectionTest.java | 36 import java.security.KeyStore; 64 * default KeyStore installed in the system in lower case. 66 * For example: if default KeyStore type in the system is BKS 67 * (i.e. java.security file sets up the property keystore.type=BKS), 608 + KeyStore.getDefaultType().toLowerCase()); 656 * (named as "key_store." + extension equals to the default KeyStore 669 String type = KeyStore.getDefaultType(); 670 String keyStore = getKeyStoreFileName(); 671 File keyStoreFile = new File(keyStore); 674 KeyStore ks = KeyStore.getInstance(type) [all...] |
/frameworks/base/services/java/com/android/server/pm/ |
PackageManagerService.java | 118 import android.security.KeyStore; [all...] |
/prebuilts/devtools/tools/lib/ |
ant-tasks.jar | |
sdklib.jar | |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
org.mortbay.jetty.server_6.1.23.v201004211559.jar | |
/prebuilts/sdk/10/ |
android.jar | |
/prebuilts/sdk/11/ |
android.jar | |
/prebuilts/sdk/13/ |
android.jar | |
/prebuilts/sdk/16/ |
android.jar | |