/system/security/keystore/ |
test-keystore | 50 function keystore() { function 57 run adb shell ls -al /data/misc/keystore 70 log "reset keystore as system user" 71 keystore system r 79 keystore root t 83 keystore system t 88 keystore system p bar 91 expect "-rw------- keystore keystore 84 .masterkey" 94 keystore system [all...] |
keystore_get.cpp | 17 #include <keystore/IKeystoreService.h> 20 #include <keystore/keystore_get.h> 26 sp<IBinder> binder = sm->getService(String16("android.security.keystore"));
|
Android.mk | 21 LOCAL_SRC_FILES := keystore.cpp keyblob_utils.cpp 32 LOCAL_MODULE := keystore 47 # Library for keystore clients
|
keystore_cli.cpp | 22 #include <keystore/IKeystoreService.h> 26 #include <keystore/keystore.h> 174 sp<IBinder> binder = sm->getService(String16("android.security.keystore")); 178 fprintf(stderr, "%s: error: could not connect to keystore service\n", argv[0]);
|
/cts/tests/tests/security/src/android/security/cts/ |
KeystoreExploitTest.java | 26 int pid = Proc.findPidFor("/system/bin/keystore"); 28 Class<?> keystoreClass = Class.forName("android.security.KeyStore"); 32 Object keystore = getInstance.invoke(null); local 53 get.invoke(keystore, keyName); 55 Thread.sleep(2000); // give keystore some time to crash
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
KeyChainTest.java | 17 package android.keystore.cts;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/ |
PKCS12.java | 1 package org.bouncycastle.jcajce.provider.keystore; 8 private static final String PREFIX = "org.bouncycastle.jcajce.provider.keystore" + ".pkcs12."; 19 provider.addAlgorithm("KeyStore.PKCS12", PREFIX + "PKCS12KeyStoreSpi$BCPKCS12KeyStore"); 21 // provider.addAlgorithm("KeyStore.BCPKCS12", PREFIX + "PKCS12KeyStoreSpi$BCPKCS12KeyStore"); 22 // provider.addAlgorithm("KeyStore.PKCS12-DEF", PREFIX + "PKCS12KeyStoreSpi$DefPKCS12KeyStore"); 24 // provider.addAlgorithm("KeyStore.PKCS12-3DES-40RC2", PREFIX + "PKCS12KeyStoreSpi$BCPKCS12KeyStore"); 25 // provider.addAlgorithm("KeyStore.PKCS12-3DES-3DES", PREFIX + "PKCS12KeyStoreSpi$BCPKCS12KeyStore3DES"); 27 // provider.addAlgorithm("KeyStore.PKCS12-DEF-3DES-40RC2", PREFIX + "PKCS12KeyStoreSpi$DefPKCS12KeyStore"); 28 // provider.addAlgorithm("KeyStore.PKCS12-DEF-3DES-3DES", PREFIX + "PKCS12KeyStoreSpi$DefPKCS12KeyStore3DES");
|
BC.java | 1 package org.bouncycastle.jcajce.provider.keystore; 8 private static final String PREFIX = "org.bouncycastle.jcajce.provider.keystore" + ".bc."; 19 provider.addAlgorithm("KeyStore.BKS", PREFIX + "BcKeyStoreSpi$Std"); 21 // provider.addAlgorithm("KeyStore.BKS-V1", PREFIX + "BcKeyStoreSpi$Version1"); 23 provider.addAlgorithm("KeyStore.BouncyCastle", PREFIX + "BcKeyStoreSpi$BouncyCastleStore"); 24 provider.addAlgorithm("Alg.Alias.KeyStore.UBER", "BouncyCastle"); 25 provider.addAlgorithm("Alg.Alias.KeyStore.BOUNCYCASTLE", "BouncyCastle"); 26 provider.addAlgorithm("Alg.Alias.KeyStore.bouncycastle", "BouncyCastle");
|
/libcore/crypto/src/main/java/org/conscrypt/ |
DefaultSSLContextImpl.java | 26 import java.security.KeyStore; 67 // find KeyStore, KeyManagers 68 String keystore = System.getProperty("javax.net.ssl.keyStore"); local 69 if (keystore == null) { 75 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); 78 is = new BufferedInputStream(new FileInputStream(keystore)); 100 String keystore = System.getProperty("javax.net.ssl.trustStore") local [all...] |
/external/apache-http/src/org/apache/http/conn/ssl/ |
SSLSocketFactory.java | 52 import java.security.KeyStore; 69 * a {@link KeyStore truststore} file containg one or several trusted 78 * keytool -import -alias "my server cert" -file server.crt -keystore my.truststore 84 * a {@link KeyStore keystore} file containg a private key/public certificate 93 * Use the following sequence of actions to generate a keystore file 99 * <pre>keytool -genkey -v -alias "my client key" -validity 365 -keystore my.keystore</pre> 100 * For simplicity use the same password for the key as that of the keystore 106 * <pre>keytool -certreq -alias "my client key" -file mycertreq.csr -keystore my.keystore</pre [all...] |
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/ |
SSLSocketFactory.java | 58 import java.security.KeyStore; 75 * a {@link KeyStore truststore} file containg one or several trusted 84 * keytool -import -alias "my server cert" -file server.crt -keystore my.truststore 90 * a {@link KeyStore keystore} file containg a private key/public certificate 99 * Use the following sequence of actions to generate a keystore file 105 * <pre>keytool -genkey -v -alias "my client key" -validity 365 -keystore my.keystore</pre> 106 * For simplicity use the same password for the key as that of the keystore 112 * <pre>keytool -certreq -alias "my client key" -file mycertreq.csr -keystore my.keystore</pre [all...] |
/hardware/samsung_slsi/exynos5/ |
exynos5.mk | 38 # Keystore 40 keystore.exynos5
|
/system/security/softkeymaster/ |
Android.mk | 18 LOCAL_MODULE := keystore.default 22 system/security/keystore \ 34 system/security/keystore \
|
module.cpp | 22 #include <keystore/keystore.h>
|
/build/target/product/ |
core_minimal.mk | 45 keystore \ 46 keystore.default \
|
/hardware/qcom/keymaster/ |
Android.mk | 7 LOCAL_MODULE := keystore.$(TARGET_BOARD_PLATFORM)
|
/frameworks/base/keystore/java/android/security/ |
Credentials.java | 217 static boolean deleteAllTypesForAlias(KeyStore keystore, String alias) { 222 return keystore.delKey(Credentials.USER_PRIVATE_KEY + alias) 223 | deleteCertificateTypesForAlias(keystore, alias); 231 static boolean deleteCertificateTypesForAlias(KeyStore keystore, String alias) { 236 return keystore.delete(Credentials.USER_CERTIFICATE + alias) 237 | keystore.delete(Credentials.CA_CERTIFICATE + alias);
|
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/ |
KeystoreSelectionPage.java | 40 * Keystore selection page. This page allows to choose to create a new keystore or use an 58 setTitle("Keystore selection"); 72 mUseExistingKeystore.setText("Use existing keystore"); 78 mCreateKeystore.setText("Create new keystore"); 93 fileDialog.setText("Load Keystore"); 96 fileDialog.setText("Select Keystore Name"); 175 // reset the keystore/alias from the content of the project 181 String keystore = ProjectHelper.loadStringProperty(project, local 183 if (keystore != null) 211 String keystore = mKeystore.getText().trim(); local [all...] |
/system/security/keystore-engine/ |
eng_keystore.cpp | 41 #define LOG_TAG "OpenSSL-keystore" 45 #include <keystore/keystore.h> 46 #include <keystore/IKeystoreService.h> 53 const char* kKeystoreEngineId = "keystore"; 54 static const char* kKeystoreEngineDesc = "Android keystore engine"; 58 * ex_data index for keystore's key alias. 111 sp<IBinder> binder = sm->getService(String16("android.security.keystore")); 115 ALOGE("could not contact keystore"); 123 ALOGW("could not contact keystore"); [all...] |
/device/asus/grouper/keymaster/ |
Android.mk | 18 # This is a nasty hack. keystore.grouper is Open Source, but it 27 LOCAL_MODULE := keystore.grouper
|
/external/sepolicy/ |
app.te | 10 # Allow apps to connect to the keystore 11 unix_socket_connect(appdomain, keystore, keystore)
|
/libcore/luni/src/test/java/libcore/java/security/cert/ |
OldPKIXParametersTest.java | 28 import java.security.KeyStore; 174 * Test #4 for <code>PKIXParameters(KeyStore)</code> constructor<br> 183 KeyStore store = KeyStore.getInstance("PKCS12"); 193 store = KeyStore.getInstance("PKCS12"); 205 KeyStore keystore = KeyStore.getInstance(KeyStore.getDefaultType()); local 206 keystore.load(null,null) [all...] |
/device/asus/grouper/self-extractors/nvidia/staging/ |
device-partial.mk | 74 PRODUCT_PACKAGES += keystore.grouper
|
/device/asus/grouper/self-extractors/nvidia/staging/keymaster/ |
Android.mk | 22 LOCAL_MODULE := keystore.grouper
|
/device/asus/tilapia/self-extractors/nvidia/staging/ |
device-partial.mk | 74 PRODUCT_PACKAGES += keystore.grouper
|