HomeSort by relevance Sort by last modified time
    Searched refs:KeyStore (Results 101 - 125 of 189) sorted by null

1 2 3 45 6 7 8

  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/
KeyCheckPage.java 45 import java.security.KeyStore;
46 import java.security.KeyStore.PrivateKeyEntry;
191 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType());
193 keyStore.load(fis, mWizard.getKeystorePassword().toCharArray());
195 PrivateKeyEntry entry = (KeyStore.PrivateKeyEntry)keyStore.getEntry(
197 new KeyStore.PasswordProtection
    [all...]
KeySelectionPage.java 40 import java.security.KeyStore;
48 * Key Selection Page. This is used when an existing keystore is used.
152 // keystore password is wrong
155 // get the alias list (also used as a keystore password test)
156 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType());
158 keyStore.load(fis, mWizard.getKeystorePassword().toCharArray());
161 Enumeration<String> aliases = keyStore.aliases()
    [all...]
ExportWizard.java 53 import java.security.KeyStore;
54 import java.security.KeyStore.PrivateKeyEntry;
73 static final String PROPERTY_KEYSTORE = "keystore"; //$NON-NLS-1$
88 /** bit mask constant for keystore data change event */
236 // if needed, create the keystore and/or key.
259 // keystore creation error!
264 // keystore is created, now load the private key and certificate.
265 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType())
    [all...]
  /libcore/luni/src/test/java/tests/api/javax/net/ssl/
SSLContext1Test.java 22 import java.security.KeyStore;
457 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType());
494 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType());
532 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType())
    [all...]
KeyManagerFactory1Test.java 22 import java.security.KeyStore;
435 * Test for <code>init(KeyStore keyStore, char[] password)</code> and
448 KeyStore ksNull = null;
457 KeyStore ks;
459 ks = KeyStore.getInstance(KeyStore.getDefaultType());
462 fail(e.toString() + "default KeyStore type is not supported");
504 KeyStore.ProtectionParameter pp = new ProtectionParameterImpl();
505 KeyStore.Builder bld = KeyStore.Builder.newInstance("testType", null, pp)
    [all...]
KeyManagerFactory2Test.java 21 import java.security.KeyStore;
79 KeyStore kStore = null;
103 kStore = KeyStore.getInstance(KeyStore.getDefaultType());
106 fail("default keystore is not supported");
SSLServerSocketTest.java 27 import java.security.KeyStore;
327 * Defines the keystore contents for the server, BKS version. Holds just a
357 * Defines the keystore contents for the server, JKS version. Holds just a
389 * Loads a keystore from a base64-encoded String. Returns the KeyManager[]
397 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType());
398 keyStore.load(inputStream, PASSWORD.toCharArray());
403 keyManagerFactory.init(keyStore, PASSWORD.toCharArray())
    [all...]
TrustManagerFactory2Test.java 21 import java.security.KeyStore;
75 KeyStore kStore = null;
92 kStore = KeyStore.getInstance(KeyStore.getDefaultType());
95 fail("default keystore is not supported");
  /external/chromium_org/net/android/java/src/org/chromium/net/
X509Util.java 18 import java.security.KeyStore;
72 * BroadcastReceiver that listens to change in the system keystore to invalidate certificate
82 private static KeyStore sTestKeyStore;
109 sTestKeyStore = KeyStore.getInstance(KeyStore.getDefaultType());
133 private static X509TrustManager createTrustManager(KeyStore keyStore) throws KeyStoreException,
137 tmf.init(keyStore);
  /packages/apps/KeyChain/tests/src/com/android/keychain/tests/
KeyChainServiceTest.java 27 import android.security.KeyStore;
30 import java.security.KeyStore.PrivateKeyEntry;
145 Log.d(TAG, "test_KeyChainService setup keystore");
146 KeyStore keyStore = KeyStore.getInstance();
192 assertEquals(KeyStore.State.UNLOCKED, keyStore.state());
  /cts/tests/tests/security/src/android/security/cts/
CertificateTest.java 25 import java.security.KeyStore;
116 KeyStore keyStore = KeyStore.getInstance("AndroidCAStore");
117 keyStore.load(null, null);
119 List<String> aliases = Collections.list(keyStore.aliases());
124 assertTrue(keyStore.isCertificateEntry(alias));
125 X509Certificate certificate = (X509Certificate) keyStore.getCertificate(alias);
  /packages/apps/Settings/src/com/android/settings/vpn2/
VpnSettings.java 35 import android.security.KeyStore;
75 private final KeyStore mKeyStore = KeyStore.getInstance();
165 // Check KeyStore here, so others do not need to deal with it.
168 // Let us unlock KeyStore. See you later!
178 // Now KeyStore is always unlocked. Reset the flag.
181 // Currently we are the only user of profiles in KeyStore.
182 // Assuming KeyStore and KeyGuard do the right thing, we can
240 mKeyStore.put(Credentials.VPN + profile.key, profile.encode(), KeyStore.UID_SELF,
241 KeyStore.FLAG_ENCRYPTED)
    [all...]
  /libcore/luni/src/test/java/libcore/javax/net/ssl/
TrustManagerFactoryTest.java 21 import java.security.KeyStore.PrivateKeyEntry;
22 import java.security.KeyStore;
99 PKIXParameters pp = new PKIXParameters(getTestKeyStore().keyStore);
108 PKIXBuilderParameters pbp = new PKIXBuilderParameters(getTestKeyStore().keyStore, xcs);
121 // init with null for default KeyStore
122 tmf.init((KeyStore) null);
126 tmf.init(getTestKeyStore().keyStore);
217 // keyStore should contain only the intermediate CA so we can
220 KeyStore keyStore = TestKeyStore.createKeyStore()
    [all...]
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/
PKIXBuilderParametersTest.java 25 import java.security.KeyStore;
169 * Test #4 for <code>PKIXBuilderParameters(KeyStore, CertSelector)</code>
172 * if the <code>keystore</code> is <code>null</code>
177 new PKIXBuilderParameters((KeyStore)null, null);
  /external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/
ServerHandshakeImplTest.java 22 import java.security.KeyStore;
45 KeyStore ks = JSSETestData.getKeyStore();
  /libcore/luni/src/main/java/javax/net/ssl/
KeyManagerFactory.java 21 import java.security.KeyStore;
199 public final void init(KeyStore ks, char[] password) throws KeyStoreException,
  /external/apache-harmony/x-net/src/test/api/java/org/apache/harmony/xnet/tests/javax/net/ssl/
KeyManagerFactory2Test.java 21 import java.security.KeyStore;
82 KeyStore kStore = null;
106 kStore = KeyStore.getInstance(KeyStore.getDefaultType());
109 fail("default keystore is not supported");
TrustManagerFactory2Test.java 21 import java.security.KeyStore;
78 KeyStore kStore = null;
95 kStore = KeyStore.getInstance(KeyStore.getDefaultType());
98 fail("default keystore is not supported");
KeyManagerFactory1Test.java 21 import java.security.KeyStore;
371 * Test for <code>init(KeyStore keyStore, char[] password)</code> and
382 KeyStore ksNull = null;
391 KeyStore ks;
392 ks = KeyStore.getInstance(KeyStore.getDefaultType());
TrustManagerFactory1Test.java 21 import java.security.KeyStore;
371 * Test for <code>init(KeyStore keyStore)</code> and
380 KeyStore ks;
381 KeyStore ksNull = null;
382 ks = KeyStore.getInstance(KeyStore.getDefaultType());
  /external/smack/src/org/jivesoftware/smack/
ServerTrustManager.java 54 private KeyStore trustStore;
56 private static Map<KeyStoreOptions, KeyStore> stores = new HashMap<KeyStoreOptions, KeyStore>();
70 trustStore = KeyStore.getInstance(options.getType());
  /frameworks/base/keystore/java/android/security/
KeyPairGeneratorSpec.java 38 * <a href="{@docRoot}guide/topics/security/keystore.html">Android KeyStore
39 * facility</a>. The Android KeyStore facility is accessed through a
42 * the user to unlock or initialize the Android KeyStore facility.
45 * {@link java.security.KeyStore#getEntry(String, java.security.KeyStore.ProtectionParameter)}
59 * These must be kept in sync with system/security/keystore/defaults.h
101 * to unlock or initialize the Android keystore facility.
104 * {@link java.security.KeyStore#getEntry(String, java.security.KeyStore.ProtectionParameter)
    [all...]
KeyStore.java 32 public class KeyStore {
33 private static final String TAG = "KeyStore";
61 private KeyStore(IKeystoreService binder) {
65 public static KeyStore getInstance() {
66 IKeystoreService keystore = IKeystoreService.Stub.asInterface(ServiceManager local
67 .getService("android.security.keystore"));
68 return new KeyStore(keystore);
88 Log.w(TAG, "Cannot connect to keystore", e);
108 Log.w(TAG, "Cannot connect to keystore", e)
    [all...]
  /libcore/luni/src/test/java/tests/targets/security/cert/
CertificateTest.java 20 import java.security.KeyStore;
    [all...]
  /frameworks/base/wifi/java/android/net/wifi/
WifiEnterpriseConfig.java 23 import android.security.KeyStore;
51 * configurations use the key_id field with the engine_id set to "keystore".
58 * String representing the keystore OpenSSL ENGINE's ID.
60 private static final String ENGINE_ID_KEYSTORE = "keystore";
63 * String representing the keystore URI used for wpa_supplicant.
65 private static final String KEYSTORE_URI = "keystore://";
528 boolean installKeys(android.security.KeyStore keyStore, String name) {
540 ret = keyStore.importKey(privKeyName, privKeyData, Process.WIFI_UID,
541 KeyStore.FLAG_NONE)
    [all...]

Completed in 1463 milliseconds

1 2 3 45 6 7 8