/libcore/luni/src/test/java/tests/api/javax/net/ssl/ |
KeyManagerFactorySpiTest.java | 19 import java.security.KeyStore; 46 * javax.net.ssl.KeyManagerFactorySpi#KengineInit(KeyStore ks, char[] password) 50 KeyStore ks; 72 ks = KeyStore.getInstance(KeyStore.getDefaultType()); 82 KeyStore kst = KeyStore.getInstance(KeyStore.getDefaultType());
|
/libcore/luni/src/test/java/tests/targets/security/cert/ |
CertPathBuilderTestPKIX.java | 19 import java.security.KeyStore; 43 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 45 keyStore.load(null, null); 53 keyStore.setCertificateEntry("selfSignedCert", selfSignedcertificate); 68 keyStore, targetConstraints);
|
/libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/ |
KeyManagerFactorySpiImpl.java | 4 import java.security.KeyStore; 16 public void engineInit(KeyStore ks, char[] password)
|
/hardware/qcom/keymaster/ |
Android.mk | 7 LOCAL_MODULE := keystore.$(TARGET_BOARD_PLATFORM)
|
/libcore/luni/src/main/java/java/security/ |
package.html | 10 {@link java.security.Key Keys}, {@link java.security.KeyStore KeyStores}, {@link
|
/libcore/luni/src/main/java/javax/net/ssl/ |
TrustManagerFactorySpi.java | 21 import java.security.KeyStore; 37 * Initializes this factory instance with the specified keystore as source 41 * the keystore or {@code null}. 45 protected abstract void engineInit(KeyStore ks) throws KeyStoreException;
|
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
TrustManagerFactoryTest.java | 21 import java.security.KeyStore.PrivateKeyEntry; 22 import java.security.KeyStore; 99 PKIXParameters pp = new PKIXParameters(getTestKeyStore().keyStore); 108 PKIXBuilderParameters pbp = new PKIXBuilderParameters(getTestKeyStore().keyStore, xcs); 121 // init with null for default KeyStore 122 tmf.init((KeyStore) null); 126 tmf.init(getTestKeyStore().keyStore); 217 // keyStore should contain only the intermediate CA so we can 220 KeyStore keyStore = TestKeyStore.createKeyStore() [all...] |
KeyStoreBuilderParametersTest.java | 19 import java.security.KeyStore.Builder; 20 import java.security.KeyStore.PasswordProtection; 38 Builder builder = Builder.newInstance(testKeyStore.keyStore, 57 Builder builder1 = Builder.newInstance(testKeyStore1.keyStore, 59 Builder builder2 = Builder.newInstance(testKeyStore2.keyStore,
|
/cts/tests/tests/keystore/ |
AndroidManifest.xml | 19 package="com.android.cts.keystore"> 28 android:targetPackage="com.android.cts.keystore" 29 android:label="CTS tests of com.android.cts.keystore"/>
|
/libcore/luni/src/test/java/libcore/java/security/cert/ |
OldPKIXParametersTest.java | 28 import java.security.KeyStore; 174 * Test #4 for <code>PKIXParameters(KeyStore)</code> constructor<br> 183 KeyStore store = KeyStore.getInstance("PKCS12"); 193 store = KeyStore.getInstance("PKCS12"); 205 KeyStore keystore = KeyStore.getInstance(KeyStore.getDefaultType()); local 206 keystore.load(null,null) [all...] |
/system/security/keystore/ |
keystore_get.cpp | 17 #include <keystore/IKeystoreService.h> 20 #include <keystore/keystore_get.h> 26 sp<IBinder> binder = sm->getService(String16("android.security.keystore"));
|
/system/security/keystore-engine/ |
eng_keystore.cpp | 41 #define LOG_TAG "OpenSSL-keystore" 45 #include <keystore/keystore.h> 46 #include <keystore/IKeystoreService.h> 53 const char* kKeystoreEngineId = "keystore"; 54 static const char* kKeystoreEngineDesc = "Android keystore engine"; 58 * ex_data index for keystore's key alias. 111 sp<IBinder> binder = sm->getService(String16("android.security.keystore")); 115 ALOGE("could not contact keystore"); 123 ALOGW("could not contact keystore"); [all...] |
/system/security/softkeymaster/ |
Android.mk | 18 LOCAL_MODULE := keystore.default 22 system/security/keystore \ 34 system/security/keystore \
|
/packages/apps/Settings/src/com/android/settings/ |
CredentialStorage.java | 32 import android.security.KeyStore; 52 * CredentialStorage handles KeyStore reset, unlock, and install. 55 * from the old style separate keystore password to a new key guard 59 * KeyStore: UNINITALIZED 64 * KeyStore: UNINITALIZED 67 * Notes: user had key guard but no keystore and upgraded from pre-ICS 68 * OR user had key guard and pre-ICS keystore password which was then reset 70 * KeyStore: LOCKED 77 * KeyStore: UNLOCKED 82 * KeyStore: UNLOCKE [all...] |
/packages/apps/Settings/src/com/android/settings/vpn2/ |
VpnSettings.java | 35 import android.security.KeyStore; 75 private final KeyStore mKeyStore = KeyStore.getInstance(); 165 // Check KeyStore here, so others do not need to deal with it. 168 // Let us unlock KeyStore. See you later! 178 // Now KeyStore is always unlocked. Reset the flag. 181 // Currently we are the only user of profiles in KeyStore. 182 // Assuming KeyStore and KeyGuard do the right thing, we can 240 mKeyStore.put(Credentials.VPN + profile.key, profile.encode(), KeyStore.UID_SELF, 241 KeyStore.FLAG_ENCRYPTED) [all...] |
/external/apache-harmony/x-net/src/test/java/javax/net/ssl/ |
KeyManagerFactorySpiTests.java | 25 import java.security.KeyStore; 58 KeyStore kStore = null; 82 kStore = KeyStore.getInstance(KeyStore.getDefaultType()); 85 fail("default keystore type is not supported");
|
TrustManagerFactorySpiTests.java | 25 import java.security.KeyStore; 55 KeyStore kStore = null; 72 kStore = KeyStore.getInstance(KeyStore.getDefaultType()); 75 fail("default keystore is not supported");
|
/external/smack/src/org/jivesoftware/smack/sasl/ |
SASLExternalMechanism.java | 31 * Create a java keystore with your SSL certificate in it:
36 * <li>javax.net.ssl.keyStore to the location of the keyStore
37 * <li>javax.net.ssl.keyStorePassword to the password of the keyStore
43 * simply provide the one in the keyStore.
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KeyStore3Test.java | 29 import java.security.KeyStore; 35 import java.security.KeyStore.Builder; 36 import java.security.KeyStore.PasswordProtection; 37 import java.security.KeyStore.ProtectionParameter; 48 private KeyStore mockKeyStore; 170 KeyStore ks = KeyStore.getInstance(alias); 173 KeyStore firstKeyStore = b.getKeyStore(); 180 new KeyStore.PasswordProtection(pwd)); 192 private static class MyKeyStore extends KeyStore { [all...] |
KeyStoreSpiTest.java | 25 import java.security.KeyStore; 61 * <code>engineLoad(KeyStore.LoadStoreParameter param)</code> 62 * <code>engineStore(KeyStore.LoadStoreParameter param)</code> 63 * <code>engineGetEntry(String alias, KeyStore.ProtectionParameter param)</code> 64 * <code>engineSetEntry(String alias, KeyStore.Entry entry, KeyStore.ProtectionParameter param)</code> 95 ksSpi.engineSetEntry("", new KeyStore.TrustedCertificateEntry( 157 * @tests java.security.KeyStoreSpi#engineLoad(KeyStore.LoadStoreParameter) 196 * Additional class implements KeyStore.Entry interface 198 class tmpEntry implements KeyStore.Entry [all...] |
/frameworks/base/keystore/java/android/security/ |
AndroidKeyStore.java | 30 import java.security.KeyStore.Entry; 31 import java.security.KeyStore.PrivateKeyEntry; 32 import java.security.KeyStore.ProtectionParameter; 33 import java.security.KeyStore; 54 * A java.security.KeyStore interface for the Android KeyStore. An instance of 55 * it can be created via the {@link java.security.KeyStore#getInstance(String) 56 * KeyStore.getInstance("AndroidKeyStore")} interface. This returns a 57 * java.security.KeyStore backed by this "AndroidKeyStore" implementation. 59 * This is built on top of Android's keystore daemon. The convention of alia [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStoreSpiTest.java | 24 import java.security.KeyStore.LoadStoreParameter; 25 import java.security.KeyStore.Entry; 26 import java.security.KeyStore.ProtectionParameter; 27 import java.security.KeyStore; 60 * java.security.KeyStore.engineEntryInstanceOf(String, Class<? 69 KeyStore.PrivateKeyEntry.class)); 73 KeyStore.SecretKeyEntry.class)); 77 KeyStore.TrustedCertificateEntry.class)); 81 KeyStore.TrustedCertificateEntry.class)); 106 KeyStore.SecretKeyEntry dummyEntry = new KeyStore.SecretKeyEntry(new SecretKey() [all...] |
/development/samples/ApiDemos/src/com/example/android/apis/security/ |
KeyStoreUsage.java | 48 import java.security.KeyStore; 49 import java.security.KeyStore.PrivateKeyEntry; 69 * An instance of {@link java.security.KeyStore} through which this app 72 KeyStore mKeyStore; 76 * our {@code KeyStore} by their alias names. 82 * {@code KeyStore}. 88 * the list available in the {@code KeyStore}. 94 * the list available in the {@code KeyStore}. 100 * {@code KeyStore}. 115 * The alias of the selected entry in the KeyStore [all...] |
/developers/build/prebuilts/gradle/BasicAndroidKeyStore/BasicAndroidKeyStoreSample/src/main/java/com/example/android/basicandroidkeystore/ |
BasicAndroidKeyStoreFragment.java | 34 import java.security.KeyStore; 100 Log.w(TAG, "KeyStore not Initialized", e); 124 Log.w(TAG, "KeyStore not Initialized", e); 184 // and the KeyStore. This example uses the AndroidKeyStore. 205 KeyStore ks = KeyStore.getInstance(SecurityConstants.KEYSTORE_PROVIDER_ANDROID_KEYSTORE); 212 KeyStore.Entry entry = ks.getEntry(mAlias, null); 216 * -Check the list of aliases by iterating over Keystore.aliases(), be sure the alias 218 * -If that's empty, verify they were both stored and pulled from the same keystore 227 /* If entry is not a KeyStore.PrivateKeyEntry, it might have gotten stored in a previou [all...] |
/developers/samples/android/security/keystore/BasicAndroidKeyStore/BasicAndroidKeyStoreSample/src/main/java/com/example/android/basicandroidkeystore/ |
BasicAndroidKeyStoreFragment.java | 34 import java.security.KeyStore; 100 Log.w(TAG, "KeyStore not Initialized", e); 124 Log.w(TAG, "KeyStore not Initialized", e); 184 // and the KeyStore. This example uses the AndroidKeyStore. 205 KeyStore ks = KeyStore.getInstance(SecurityConstants.KEYSTORE_PROVIDER_ANDROID_KEYSTORE); 212 KeyStore.Entry entry = ks.getEntry(mAlias, null); 216 * -Check the list of aliases by iterating over Keystore.aliases(), be sure the alias 218 * -If that's empty, verify they were both stored and pulled from the same keystore 227 /* If entry is not a KeyStore.PrivateKeyEntry, it might have gotten stored in a previou [all...] |