/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/ |
KeyCheckPage.java | 45 import java.security.KeyStore; 46 import java.security.KeyStore.PrivateKeyEntry; 191 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 193 keyStore.load(fis, mWizard.getKeystorePassword().toCharArray()); 195 PrivateKeyEntry entry = (KeyStore.PrivateKeyEntry)keyStore.getEntry( 197 new KeyStore.PasswordProtection [all...] |
KeySelectionPage.java | 40 import java.security.KeyStore; 48 * Key Selection Page. This is used when an existing keystore is used. 152 // keystore password is wrong 155 // get the alias list (also used as a keystore password test) 156 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 158 keyStore.load(fis, mWizard.getKeystorePassword().toCharArray()); 161 Enumeration<String> aliases = keyStore.aliases() [all...] |
ExportWizard.java | 53 import java.security.KeyStore; 54 import java.security.KeyStore.PrivateKeyEntry; 73 static final String PROPERTY_KEYSTORE = "keystore"; //$NON-NLS-1$ 88 /** bit mask constant for keystore data change event */ 236 // if needed, create the keystore and/or key. 259 // keystore creation error! 264 // keystore is created, now load the private key and certificate. 265 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()) [all...] |
/libcore/luni/src/test/java/tests/api/javax/net/ssl/ |
SSLContext1Test.java | 22 import java.security.KeyStore; 457 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); 494 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); 532 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()) [all...] |
KeyManagerFactory1Test.java | 22 import java.security.KeyStore; 435 * Test for <code>init(KeyStore keyStore, char[] password)</code> and 448 KeyStore ksNull = null; 457 KeyStore ks; 459 ks = KeyStore.getInstance(KeyStore.getDefaultType()); 462 fail(e.toString() + "default KeyStore type is not supported"); 504 KeyStore.ProtectionParameter pp = new ProtectionParameterImpl(); 505 KeyStore.Builder bld = KeyStore.Builder.newInstance("testType", null, pp) [all...] |
KeyManagerFactory2Test.java | 21 import java.security.KeyStore; 79 KeyStore kStore = null; 103 kStore = KeyStore.getInstance(KeyStore.getDefaultType()); 106 fail("default keystore is not supported");
|
SSLServerSocketTest.java | 27 import java.security.KeyStore; 327 * Defines the keystore contents for the server, BKS version. Holds just a 357 * Defines the keystore contents for the server, JKS version. Holds just a 389 * Loads a keystore from a base64-encoded String. Returns the KeyManager[] 397 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 398 keyStore.load(inputStream, PASSWORD.toCharArray()); 403 keyManagerFactory.init(keyStore, PASSWORD.toCharArray()) [all...] |
TrustManagerFactory2Test.java | 21 import java.security.KeyStore; 75 KeyStore kStore = null; 92 kStore = KeyStore.getInstance(KeyStore.getDefaultType()); 95 fail("default keystore is not supported");
|
/external/chromium_org/net/android/java/src/org/chromium/net/ |
X509Util.java | 18 import java.security.KeyStore; 72 * BroadcastReceiver that listens to change in the system keystore to invalidate certificate 82 private static KeyStore sTestKeyStore; 109 sTestKeyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 133 private static X509TrustManager createTrustManager(KeyStore keyStore) throws KeyStoreException, 137 tmf.init(keyStore);
|
/packages/apps/KeyChain/tests/src/com/android/keychain/tests/ |
KeyChainServiceTest.java | 27 import android.security.KeyStore; 30 import java.security.KeyStore.PrivateKeyEntry; 145 Log.d(TAG, "test_KeyChainService setup keystore"); 146 KeyStore keyStore = KeyStore.getInstance(); 192 assertEquals(KeyStore.State.UNLOCKED, keyStore.state());
|
/cts/tests/tests/security/src/android/security/cts/ |
CertificateTest.java | 25 import java.security.KeyStore; 116 KeyStore keyStore = KeyStore.getInstance("AndroidCAStore"); 117 keyStore.load(null, null); 119 List<String> aliases = Collections.list(keyStore.aliases()); 124 assertTrue(keyStore.isCertificateEntry(alias)); 125 X509Certificate certificate = (X509Certificate) keyStore.getCertificate(alias);
|
/packages/apps/Settings/src/com/android/settings/vpn2/ |
VpnSettings.java | 35 import android.security.KeyStore; 75 private final KeyStore mKeyStore = KeyStore.getInstance(); 165 // Check KeyStore here, so others do not need to deal with it. 168 // Let us unlock KeyStore. See you later! 178 // Now KeyStore is always unlocked. Reset the flag. 181 // Currently we are the only user of profiles in KeyStore. 182 // Assuming KeyStore and KeyGuard do the right thing, we can 240 mKeyStore.put(Credentials.VPN + profile.key, profile.encode(), KeyStore.UID_SELF, 241 KeyStore.FLAG_ENCRYPTED) [all...] |
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
TrustManagerFactoryTest.java | 21 import java.security.KeyStore.PrivateKeyEntry; 22 import java.security.KeyStore; 99 PKIXParameters pp = new PKIXParameters(getTestKeyStore().keyStore); 108 PKIXBuilderParameters pbp = new PKIXBuilderParameters(getTestKeyStore().keyStore, xcs); 121 // init with null for default KeyStore 122 tmf.init((KeyStore) null); 126 tmf.init(getTestKeyStore().keyStore); 217 // keyStore should contain only the intermediate CA so we can 220 KeyStore keyStore = TestKeyStore.createKeyStore() [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
PKIXBuilderParametersTest.java | 25 import java.security.KeyStore; 169 * Test #4 for <code>PKIXBuilderParameters(KeyStore, CertSelector)</code> 172 * if the <code>keystore</code> is <code>null</code> 177 new PKIXBuilderParameters((KeyStore)null, null);
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
ServerHandshakeImplTest.java | 22 import java.security.KeyStore; 45 KeyStore ks = JSSETestData.getKeyStore();
|
/libcore/luni/src/main/java/javax/net/ssl/ |
KeyManagerFactory.java | 21 import java.security.KeyStore; 199 public final void init(KeyStore ks, char[] password) throws KeyStoreException,
|
/external/apache-harmony/x-net/src/test/api/java/org/apache/harmony/xnet/tests/javax/net/ssl/ |
KeyManagerFactory2Test.java | 21 import java.security.KeyStore; 82 KeyStore kStore = null; 106 kStore = KeyStore.getInstance(KeyStore.getDefaultType()); 109 fail("default keystore is not supported");
|
TrustManagerFactory2Test.java | 21 import java.security.KeyStore; 78 KeyStore kStore = null; 95 kStore = KeyStore.getInstance(KeyStore.getDefaultType()); 98 fail("default keystore is not supported");
|
KeyManagerFactory1Test.java | 21 import java.security.KeyStore; 371 * Test for <code>init(KeyStore keyStore, char[] password)</code> and 382 KeyStore ksNull = null; 391 KeyStore ks; 392 ks = KeyStore.getInstance(KeyStore.getDefaultType());
|
TrustManagerFactory1Test.java | 21 import java.security.KeyStore; 371 * Test for <code>init(KeyStore keyStore)</code> and 380 KeyStore ks; 381 KeyStore ksNull = null; 382 ks = KeyStore.getInstance(KeyStore.getDefaultType());
|
/external/smack/src/org/jivesoftware/smack/ |
ServerTrustManager.java | 54 private KeyStore trustStore; 56 private static Map<KeyStoreOptions, KeyStore> stores = new HashMap<KeyStoreOptions, KeyStore>(); 70 trustStore = KeyStore.getInstance(options.getType());
|
/frameworks/base/keystore/java/android/security/ |
KeyPairGeneratorSpec.java | 38 * <a href="{@docRoot}guide/topics/security/keystore.html">Android KeyStore 39 * facility</a>. The Android KeyStore facility is accessed through a 42 * the user to unlock or initialize the Android KeyStore facility. 45 * {@link java.security.KeyStore#getEntry(String, java.security.KeyStore.ProtectionParameter)} 59 * These must be kept in sync with system/security/keystore/defaults.h 101 * to unlock or initialize the Android keystore facility. 104 * {@link java.security.KeyStore#getEntry(String, java.security.KeyStore.ProtectionParameter) [all...] |
KeyStore.java | 32 public class KeyStore { 33 private static final String TAG = "KeyStore"; 61 private KeyStore(IKeystoreService binder) { 65 public static KeyStore getInstance() { 66 IKeystoreService keystore = IKeystoreService.Stub.asInterface(ServiceManager local 67 .getService("android.security.keystore")); 68 return new KeyStore(keystore); 88 Log.w(TAG, "Cannot connect to keystore", e); 108 Log.w(TAG, "Cannot connect to keystore", e) [all...] |
/libcore/luni/src/test/java/tests/targets/security/cert/ |
CertificateTest.java | 20 import java.security.KeyStore; [all...] |
/frameworks/base/wifi/java/android/net/wifi/ |
WifiEnterpriseConfig.java | 23 import android.security.KeyStore; 51 * configurations use the key_id field with the engine_id set to "keystore". 58 * String representing the keystore OpenSSL ENGINE's ID. 60 private static final String ENGINE_ID_KEYSTORE = "keystore"; 63 * String representing the keystore URI used for wpa_supplicant. 65 private static final String KEYSTORE_URI = "keystore://"; 528 boolean installKeys(android.security.KeyStore keyStore, String name) { 540 ret = keyStore.importKey(privKeyName, privKeyData, Process.WIFI_UID, 541 KeyStore.FLAG_NONE) [all...] |