HomeSort by relevance Sort by last modified time
    Searched full:keystore (Results 76 - 100 of 464) sorted by null

1 2 34 5 6 7 8 91011>>

  /libcore/luni/src/test/java/tests/api/javax/net/ssl/
KeyManagerFactorySpiTest.java 19 import java.security.KeyStore;
46 * javax.net.ssl.KeyManagerFactorySpi#KengineInit(KeyStore ks, char[] password)
50 KeyStore ks;
72 ks = KeyStore.getInstance(KeyStore.getDefaultType());
82 KeyStore kst = KeyStore.getInstance(KeyStore.getDefaultType());
  /libcore/luni/src/test/java/tests/targets/security/cert/
CertPathBuilderTestPKIX.java 19 import java.security.KeyStore;
43 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType());
45 keyStore.load(null, null);
53 keyStore.setCertificateEntry("selfSignedCert", selfSignedcertificate);
68 keyStore, targetConstraints);
  /libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/
KeyManagerFactorySpiImpl.java 4 import java.security.KeyStore;
16 public void engineInit(KeyStore ks, char[] password)
  /hardware/qcom/keymaster/
Android.mk 7 LOCAL_MODULE := keystore.$(TARGET_BOARD_PLATFORM)
  /libcore/luni/src/main/java/java/security/
package.html 10 {@link java.security.Key Keys}, {@link java.security.KeyStore KeyStores}, {@link
  /libcore/luni/src/main/java/javax/net/ssl/
TrustManagerFactorySpi.java 21 import java.security.KeyStore;
37 * Initializes this factory instance with the specified keystore as source
41 * the keystore or {@code null}.
45 protected abstract void engineInit(KeyStore ks) throws KeyStoreException;
  /libcore/luni/src/test/java/libcore/javax/net/ssl/
TrustManagerFactoryTest.java 21 import java.security.KeyStore.PrivateKeyEntry;
22 import java.security.KeyStore;
99 PKIXParameters pp = new PKIXParameters(getTestKeyStore().keyStore);
108 PKIXBuilderParameters pbp = new PKIXBuilderParameters(getTestKeyStore().keyStore, xcs);
121 // init with null for default KeyStore
122 tmf.init((KeyStore) null);
126 tmf.init(getTestKeyStore().keyStore);
217 // keyStore should contain only the intermediate CA so we can
220 KeyStore keyStore = TestKeyStore.createKeyStore()
    [all...]
KeyStoreBuilderParametersTest.java 19 import java.security.KeyStore.Builder;
20 import java.security.KeyStore.PasswordProtection;
38 Builder builder = Builder.newInstance(testKeyStore.keyStore,
57 Builder builder1 = Builder.newInstance(testKeyStore1.keyStore,
59 Builder builder2 = Builder.newInstance(testKeyStore2.keyStore,
  /cts/tests/tests/keystore/
AndroidManifest.xml 19 package="com.android.cts.keystore">
28 android:targetPackage="com.android.cts.keystore"
29 android:label="CTS tests of com.android.cts.keystore"/>
  /libcore/luni/src/test/java/libcore/java/security/cert/
OldPKIXParametersTest.java 28 import java.security.KeyStore;
174 * Test #4 for <code>PKIXParameters(KeyStore)</code> constructor<br>
183 KeyStore store = KeyStore.getInstance("PKCS12");
193 store = KeyStore.getInstance("PKCS12");
205 KeyStore keystore = KeyStore.getInstance(KeyStore.getDefaultType()); local
206 keystore.load(null,null)
    [all...]
  /system/security/keystore/
keystore_get.cpp 17 #include <keystore/IKeystoreService.h>
20 #include <keystore/keystore_get.h>
26 sp<IBinder> binder = sm->getService(String16("android.security.keystore"));
  /system/security/keystore-engine/
eng_keystore.cpp 41 #define LOG_TAG "OpenSSL-keystore"
45 #include <keystore/keystore.h>
46 #include <keystore/IKeystoreService.h>
53 const char* kKeystoreEngineId = "keystore";
54 static const char* kKeystoreEngineDesc = "Android keystore engine";
58 * ex_data index for keystore's key alias.
111 sp<IBinder> binder = sm->getService(String16("android.security.keystore"));
115 ALOGE("could not contact keystore");
123 ALOGW("could not contact keystore");
    [all...]
  /system/security/softkeymaster/
Android.mk 18 LOCAL_MODULE := keystore.default
22 system/security/keystore \
34 system/security/keystore \
  /packages/apps/Settings/src/com/android/settings/
CredentialStorage.java 32 import android.security.KeyStore;
52 * CredentialStorage handles KeyStore reset, unlock, and install.
55 * from the old style separate keystore password to a new key guard
59 * KeyStore: UNINITALIZED
64 * KeyStore: UNINITALIZED
67 * Notes: user had key guard but no keystore and upgraded from pre-ICS
68 * OR user had key guard and pre-ICS keystore password which was then reset
70 * KeyStore: LOCKED
77 * KeyStore: UNLOCKED
82 * KeyStore: UNLOCKE
    [all...]
  /packages/apps/Settings/src/com/android/settings/vpn2/
VpnSettings.java 35 import android.security.KeyStore;
75 private final KeyStore mKeyStore = KeyStore.getInstance();
165 // Check KeyStore here, so others do not need to deal with it.
168 // Let us unlock KeyStore. See you later!
178 // Now KeyStore is always unlocked. Reset the flag.
181 // Currently we are the only user of profiles in KeyStore.
182 // Assuming KeyStore and KeyGuard do the right thing, we can
240 mKeyStore.put(Credentials.VPN + profile.key, profile.encode(), KeyStore.UID_SELF,
241 KeyStore.FLAG_ENCRYPTED)
    [all...]
  /external/apache-harmony/x-net/src/test/java/javax/net/ssl/
KeyManagerFactorySpiTests.java 25 import java.security.KeyStore;
58 KeyStore kStore = null;
82 kStore = KeyStore.getInstance(KeyStore.getDefaultType());
85 fail("default keystore type is not supported");
TrustManagerFactorySpiTests.java 25 import java.security.KeyStore;
55 KeyStore kStore = null;
72 kStore = KeyStore.getInstance(KeyStore.getDefaultType());
75 fail("default keystore is not supported");
  /external/smack/src/org/jivesoftware/smack/sasl/
SASLExternalMechanism.java 31 * Create a java keystore with your SSL certificate in it:
36 * <li>javax.net.ssl.keyStore to the location of the keyStore
37 * <li>javax.net.ssl.keyStorePassword to the password of the keyStore
43 * simply provide the one in the keyStore.
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
KeyStore3Test.java 29 import java.security.KeyStore;
35 import java.security.KeyStore.Builder;
36 import java.security.KeyStore.PasswordProtection;
37 import java.security.KeyStore.ProtectionParameter;
48 private KeyStore mockKeyStore;
170 KeyStore ks = KeyStore.getInstance(alias);
173 KeyStore firstKeyStore = b.getKeyStore();
180 new KeyStore.PasswordProtection(pwd));
192 private static class MyKeyStore extends KeyStore {
    [all...]
KeyStoreSpiTest.java 25 import java.security.KeyStore;
61 * <code>engineLoad(KeyStore.LoadStoreParameter param)</code>
62 * <code>engineStore(KeyStore.LoadStoreParameter param)</code>
63 * <code>engineGetEntry(String alias, KeyStore.ProtectionParameter param)</code>
64 * <code>engineSetEntry(String alias, KeyStore.Entry entry, KeyStore.ProtectionParameter param)</code>
95 ksSpi.engineSetEntry("", new KeyStore.TrustedCertificateEntry(
157 * @tests java.security.KeyStoreSpi#engineLoad(KeyStore.LoadStoreParameter)
196 * Additional class implements KeyStore.Entry interface
198 class tmpEntry implements KeyStore.Entry
    [all...]
  /frameworks/base/keystore/java/android/security/
AndroidKeyStore.java 30 import java.security.KeyStore.Entry;
31 import java.security.KeyStore.PrivateKeyEntry;
32 import java.security.KeyStore.ProtectionParameter;
33 import java.security.KeyStore;
54 * A java.security.KeyStore interface for the Android KeyStore. An instance of
55 * it can be created via the {@link java.security.KeyStore#getInstance(String)
56 * KeyStore.getInstance("AndroidKeyStore")} interface. This returns a
57 * java.security.KeyStore backed by this "AndroidKeyStore" implementation.
59 * This is built on top of Android's keystore daemon. The convention of alia
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyStoreSpiTest.java 24 import java.security.KeyStore.LoadStoreParameter;
25 import java.security.KeyStore.Entry;
26 import java.security.KeyStore.ProtectionParameter;
27 import java.security.KeyStore;
60 * java.security.KeyStore.engineEntryInstanceOf(String, Class<?
69 KeyStore.PrivateKeyEntry.class));
73 KeyStore.SecretKeyEntry.class));
77 KeyStore.TrustedCertificateEntry.class));
81 KeyStore.TrustedCertificateEntry.class));
106 KeyStore.SecretKeyEntry dummyEntry = new KeyStore.SecretKeyEntry(new SecretKey()
    [all...]
  /development/samples/ApiDemos/src/com/example/android/apis/security/
KeyStoreUsage.java 48 import java.security.KeyStore;
49 import java.security.KeyStore.PrivateKeyEntry;
69 * An instance of {@link java.security.KeyStore} through which this app
72 KeyStore mKeyStore;
76 * our {@code KeyStore} by their alias names.
82 * {@code KeyStore}.
88 * the list available in the {@code KeyStore}.
94 * the list available in the {@code KeyStore}.
100 * {@code KeyStore}.
115 * The alias of the selected entry in the KeyStore
    [all...]
  /developers/build/prebuilts/gradle/BasicAndroidKeyStore/BasicAndroidKeyStoreSample/src/main/java/com/example/android/basicandroidkeystore/
BasicAndroidKeyStoreFragment.java 34 import java.security.KeyStore;
100 Log.w(TAG, "KeyStore not Initialized", e);
124 Log.w(TAG, "KeyStore not Initialized", e);
184 // and the KeyStore. This example uses the AndroidKeyStore.
205 KeyStore ks = KeyStore.getInstance(SecurityConstants.KEYSTORE_PROVIDER_ANDROID_KEYSTORE);
212 KeyStore.Entry entry = ks.getEntry(mAlias, null);
216 * -Check the list of aliases by iterating over Keystore.aliases(), be sure the alias
218 * -If that's empty, verify they were both stored and pulled from the same keystore
227 /* If entry is not a KeyStore.PrivateKeyEntry, it might have gotten stored in a previou
    [all...]
  /developers/samples/android/security/keystore/BasicAndroidKeyStore/BasicAndroidKeyStoreSample/src/main/java/com/example/android/basicandroidkeystore/
BasicAndroidKeyStoreFragment.java 34 import java.security.KeyStore;
100 Log.w(TAG, "KeyStore not Initialized", e);
124 Log.w(TAG, "KeyStore not Initialized", e);
184 // and the KeyStore. This example uses the AndroidKeyStore.
205 KeyStore ks = KeyStore.getInstance(SecurityConstants.KEYSTORE_PROVIDER_ANDROID_KEYSTORE);
212 KeyStore.Entry entry = ks.getEntry(mAlias, null);
216 * -Check the list of aliases by iterating over Keystore.aliases(), be sure the alias
218 * -If that's empty, verify they were both stored and pulled from the same keystore
227 /* If entry is not a KeyStore.PrivateKeyEntry, it might have gotten stored in a previou
    [all...]

Completed in 530 milliseconds

1 2 34 5 6 7 8 91011>>