/libcore/luni/src/main/java/javax/net/ssl/ |
HttpsURLConnection.java | 39 * created based on a {@code KeyStore} using a {@code 42 * trusted by including them in a {@code KeyStore}. 44 * <p>For example, to trust a set of certificates specified by a {@code KeyStore}: 46 * KeyStore keyStore = ...; 49 * tmf.init(keyStore); 67 * custom {@code KeyStore} implementation to pass to the {@code 76 * based on a {@code KeyStore} using a {@code KeyManagerFactory}. 78 * <p>For example, to supply client certificates from a {@code KeyStore}: 80 * KeyStore keyStore = ... [all...] |
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
DigitalSignatureTest.java | 20 import java.security.KeyStore; 40 KeyStore ks = JSSETestData.getKeyStore(); 41 KeyStore.PrivateKeyEntry entry = (KeyStore.PrivateKeyEntry) ks 43 new KeyStore.PasswordProtection(pwd));
|
TrustManagerImplTest.java | 23 import java.security.KeyStore; 75 KeyStore ks = KeyStore.getInstance("BKS"); 84 KeyStore ks = JSSETestData.getKeyStore();
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
TrustAnchor_ImplTest.java | 24 import java.security.KeyStore; 61 KeyStore ks = TestUtils.getKeyStore(true, TestUtils.TRUSTED); 63 fail(getName() + ": not performed (could not create test KeyStore)"); 93 KeyStore ks = TestUtils.getKeyStore(true, TestUtils.TRUSTED); 95 fail(getName() + ": not performed (could not create test KeyStore)"); 112 KeyStore ks = TestUtils.getKeyStore(true, TestUtils.TRUSTED); 114 fail(getName() + ": not performed (could not create test KeyStore)"); 140 KeyStore ks = TestUtils.getKeyStore(true, TestUtils.TRUSTED); 142 fail(getName() + ": not performed (could not create test KeyStore)"); 161 KeyStore ks = TestUtils.getKeyStore(true, TestUtils.TRUSTED) [all...] |
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/ |
KeySelectionPage.java | 40 import java.security.KeyStore; 48 * Key Selection Page. This is used when an existing keystore is used. 152 // keystore password is wrong 155 // get the alias list (also used as a keystore password test) 156 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 158 keyStore.load(fis, mWizard.getKeystorePassword().toCharArray()); 161 Enumeration<String> aliases = keyStore.aliases() [all...] |
ExportWizard.java | 53 import java.security.KeyStore; 54 import java.security.KeyStore.PrivateKeyEntry; 73 static final String PROPERTY_KEYSTORE = "keystore"; //$NON-NLS-1$ 88 /** bit mask constant for keystore data change event */ 236 // if needed, create the keystore and/or key. 259 // keystore creation error! 264 // keystore is created, now load the private key and certificate. 265 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()) [all...] |
/libcore/crypto/src/main/java/org/conscrypt/ |
TrustManagerImpl.java | 21 import java.security.KeyStore; 58 private final KeyStore rootKeyStore; 92 * Creates X509TrustManager based on a keystore 96 public TrustManagerImpl(KeyStore keyStore) { 97 this(keyStore, null); 103 public TrustManagerImpl(KeyStore keyStore, CertPinManager manager) { 106 KeyStore rootKeyStoreLocal = null; 116 if ("AndroidCAStore".equals(keyStore.getType())) [all...] |
/frameworks/base/docs/html-intl/ja/guide/publishing/ |
app-signing.jd | 119 <li>?????? ? ?debug.keystore?</li> 151 <p>????????????<code>debug.keystore</code> ???????????AVD ?????????????OS X ? Linux ???? <code>~/.android/avd</code>?Windows XP ???? <code>C:\Documents and Settings\<user>\.android\</code>?Windows Vista ???? <code>C:\Users\<user>\.android\</code> ???</p> 225 <td><code>-keystore <keystore-name>.keystore</code></td><td>???????????????</td> 251 <pre>$ keytool -genkey -v -keystore my-release-key.keystore 254 <p>???????????????Keytool ?????????????????????????????????????????????? <code>my-release-key.keystore</code> ??????????????????????????????????????????????????? 1 ?????????10000 ????????????????????????????????????????????????????????? </p> 272 <td><code>-keystore <keystore-name>.keystore</code></td><td>???????????????</td [all...] |
/libcore/luni/src/test/java/tests/api/javax/net/ssl/ |
SSLContextSpiTest.java | 29 import java.security.KeyStore; 165 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); 204 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType());
|
/frameworks/base/docs/html/tools/publishing/ |
app-signing.jd | 99 private key you use are your own, you must provide the password for the keystore and key alias.</p> 190 a debug keystore and key. This debug key is then used to automatically sign the APK, so 193 <p>The SDK tools create the debug keystore/key with predetermined names/passwords:</p> 195 <li>Keystore name: "debug.keystore"</li> 196 <li>Keystore password: "android"</li> 202 <p>If necessary, you can change the location/name of the debug keystore/key or 203 supply a custom debug keystore/key to use. However, any custom debug 204 keystore/key must use the same keystore/key names and passwords as the defaul [all...] |
/external/apache-harmony/support/src/test/java/tests/support/ |
Support_ProviderJCE.java | 79 // KeyStore 80 put("KeyStore.PKCS#12/Netscape", 81 "made.up.provider.name.KeyStore");
|
Support_ProviderRSA.java | 85 // KeyStore 86 put("KeyStore.PKCS#12/Netscape", 87 "made.up.provider.name.KeyStore");
|
Support_ProviderTrust.java | 81 // KeyStore 82 put("KeyStore.PKCS#12/Netscape", 83 "made.up.provider.name.KeyStore");
|
/external/chromium_org/sync/internal_api/ |
sync_encryption_handler_impl.h | 172 // Helper methods for handling passphrases once keystore migration has taken 222 // 3. Keystore key is available. 228 // Performs the actual migration of the |nigori_node| to support keystore 233 // Fill |encrypted_blob| with the keystore decryptor token if 235 // The keystore decryptor token is the serialized current default encryption 236 // key, encrypted with the keystore key. 250 // Helper method for decrypting pending keys with the keystore bootstrap. 251 // If successful, the default will become the key encrypted in the keystore 286 // The current keystore key provided by the server. 289 // The set of old keystore keys. Every time a key rotation occurs, the serve [all...] |
sync_encryption_handler_impl.cc | 46 // Enumeration of nigori keystore migration results (for use in UMA stats). 68 // is migrated to support keystore encryption. In addition though, we also 69 // want to verify the conditions for proper keystore encryption functionality. 73 // 4. If passphrase state is keystore, keystore_decryptor_token is set. 131 // Keystore Bootstrap Token helper methods. 132 // The bootstrap is a base64 encoded, encrypted, ListValue of keystore key 133 // strings, with the current keystore key as the last value in the list. 147 // The bootstrap is a base64 encoded, encrypted, ListValue of keystore key 148 // strings, with the current keystore key as the last value in the list. 220 // keystore keys into the cryptographer here, in case a migration was pending [all...] |
/frameworks/base/keystore/tests/src/android/security/ |
SystemKeyStoreTest.java | 25 * Junit / Instrumentation test case for KeyStore class 29 * runtest keystore-unit 33 * runtest --path frameworks/base/keystore/tests/src/android/security/SystemKeyStoreTest.java
|
AndroidKeyStoreTest.java | 34 import java.security.KeyStore.Entry; 35 import java.security.KeyStore.PrivateKeyEntry; 36 import java.security.KeyStore.TrustedCertificateEntry; 66 private android.security.KeyStore mAndroidKeyStore; 68 private java.security.KeyStore mKeyStore; [all...] |
/libcore/luni/src/main/java/java/security/ |
security.properties | 49 # Default KeyStore type. 50 # See specification for java/security/KeyStore.html#getDefaultType() 51 keystore.type=BKS
|
/libcore/support/src/test/java/tests/support/ |
Support_ProviderTrust.java | 81 // KeyStore 82 put("KeyStore.PKCS#12/Netscape", 83 "made.up.provider.name.KeyStore");
|
/development/ndk/samples/hello-neon/ |
build.properties | 14 # 'key.store' for the location of your keystore and
|
/development/samples/training/basic/ActivityLifecycle/ |
ant.properties | 14 # 'key.store' for the location of your keystore and
|
build.properties | 14 # 'key.store' for the location of your keystore and
|
/external/chromium_org/third_party/libjingle/source/talk/examples/android/ |
ant.properties | 14 # 'key.store' for the location of your keystore and
|
/frameworks/base/keystore/java/android/security/ |
IKeyChainAliasCallback.aidl | 19 * Used by the {@code KeyChainActivity} to return alias for {@link KeyStore#chooseAlias}.
|
/libcore/luni/src/main/java/java/security/cert/ |
PKIXParameters.java | 21 import java.security.KeyStore; 90 * X509Certificate} entries from the specified {@code KeyStore}. 92 * @param keyStore 95 * if the {@code keyStore} is not initialized. 97 * if {@code keyStore} does not contained any trusted 100 public PKIXParameters(KeyStore keyStore) 103 if (keyStore == null) { 104 throw new NullPointerException("keyStore == null"); 107 // keyStore has not been initialized (loaded [all...] |