/frameworks/base/docs/html/training/articles/ |
security-ssl.jd | 173 an {@link java.io.InputStream}, uses it to create a {@link java.security.KeyStore}, 177 and—by creating one from a {@link java.security.KeyStore} with one or more CAs—those 204 // Create a KeyStore containing our trusted CAs 205 String keyStoreType = KeyStore.getDefaultType(); 206 KeyStore keyStore = KeyStore.getInstance(keyStoreType); 207 keyStore.load(null, null); 208 keyStore.setCertificateEntry("ca", ca); 210 // Create a TrustManager that trusts the CAs in our KeyStore [all...] |
/external/apache-harmony/support/src/test/java/tests/support/ |
Support_TestProvider.java | 38 + "SHA1PRNG SecureRandom; PKCS#12/Netscape KeyStore"; 112 put("KeyStore.PKCS#12/Netscape",
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
ServerHandshakeImplTest.java | 22 import java.security.KeyStore; 45 KeyStore ks = JSSETestData.getKeyStore();
|
/external/chromium_org/sync/sessions/ |
sync_session_context.h | 201 // Temporary variable while keystore encryption is behind a flag. True if 202 // we should attempt performing keystore encryption related work, false if
|
sync_session_unittest.cc | 66 true, // enable keystore encryption
|
/external/ipsec-tools/ |
main.c | 168 e = ENGINE_by_id("keystore"); 170 do_plog(LLV_ERROR, "ipsec-tools: cannot load keystore engine");
|
/libcore/crypto/src/test/java/org/conscrypt/ |
CertPinManagerTest.java | 22 import java.security.KeyStore; 59 KeyStore.PrivateKeyEntry pke = TestKeyStore.getServer().getPrivateKey("RSA", "RSA");
|
/libcore/luni/src/main/java/javax/net/ssl/ |
KeyManagerFactory.java | 21 import java.security.KeyStore; 199 public final void init(KeyStore ks, char[] password) throws KeyStoreException,
|
/libcore/support/src/test/java/tests/support/ |
Support_TestProvider.java | 38 + "SHA1PRNG SecureRandom; PKCS#12/Netscape KeyStore"; 112 put("KeyStore.PKCS#12/Netscape",
|
/system/core/rootdir/ |
init.rc | 211 mkdir /data/misc/keystore 0700 keystore keystore 547 service keystore /system/bin/keystore /data/misc/keystore 549 user keystore 550 group keystore drmrpc
|
/frameworks/base/keystore/java/android/security/ |
KeyChain.java | 156 * java.security.KeyStore#store} on a "PKCS12" instance. 161 * java.security.KeyStore.PrivateKeyEntry} entries and both the 307 throw new KeyChainException("keystore had a problem"); 310 final OpenSSLEngine engine = OpenSSLEngine.getInstance("keystore"); 384 return KeyStore.getInstance().isHardwareBacked(algorithm);
|
/cts/libs/testserver/src/android/webkit/cts/ |
CtsTestServer.java | 65 import java.security.KeyStore; 803 * Defines the keystore contents for the server, BKS version. Holds just a [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
Security2Test.java | 216 filter.put("KeyStore.BKS", ""); 220 assertEquals("Filter : <KeyStore.BKS>,<Signature.SHA1withDSA>", 223 assertEquals("Filter : <KeyStore.BKS>,<Signature.SHA1withDSA>",
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.eclipse.pde.build_3.6.1.R36x_v20100823/templates/headless-build/ |
build.properties | 107 #sign.keystore=<keystore location> 108 #sign.storepass=<keystore password>
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
Security2Test.java | 183 filter.put("KeyStore.BKS", ""); 187 assertEquals("Filter : <KeyStore.BKS>,<Signature.SHA1withDSA>", 190 assertEquals("Filter : <KeyStore.BKS>,<Signature.SHA1withDSA>",
|
/sdk/eclipse/buildConfig/ |
build.properties | 90 #sign.keystore=<keystore location> 91 #sign.storepass=<keystore password>
|
/build/core/ |
pathmap.mk | 92 keystore \
|
/development/samples/KeyChainDemo/ |
_index.html | 36 any keystore updates. The easiest way to do this is to dismiss the app in the Recent Apps list.
|
/development/samples/Vault/src/com/example/android/vault/ |
VaultProvider.java | 50 import java.security.KeyStore; 70 * stored in the platform {@link KeyStore}. This allows us to protect our 74 * KeyStore before use. 117 * hardware-backed. A software keystore is more vulnerable to offline
|
/device/asus/grouper/ |
proprietary-blobs.txt | 37 /system/lib/hw/keystore.grouper.so
|
/device/asus/tilapia/ |
proprietary-blobs.txt | 38 /system/lib/hw/keystore.grouper.so
|
/device/lge/mako/ |
BoardConfig.mk | 108 keystore.te \
|
/docs/source.android.com/src/devices/tech/security/ |
enhancements43.jd | 44 Android now has a keystore provider that allows
|
/external/chromium_org/crypto/ |
apple_keychain_ios.mm | 20 // Creates a dictionary that can be used to query the keystore.
|
/external/chromium_org/net/android/ |
keystore.cc | 5 #include "net/android/keystore.h"
|