HomeSort by relevance Sort by last modified time
    Searched refs:KeyStore (Results 126 - 150 of 189) sorted by null

1 2 3 4 56 7 8

  /libcore/crypto/src/main/java/org/conscrypt/
TrustManagerImpl.java 21 import java.security.KeyStore;
58 private final KeyStore rootKeyStore;
92 * Creates X509TrustManager based on a keystore
96 public TrustManagerImpl(KeyStore keyStore) {
97 this(keyStore, null);
103 public TrustManagerImpl(KeyStore keyStore, CertPinManager manager) {
106 KeyStore rootKeyStoreLocal = null;
116 if ("AndroidCAStore".equals(keyStore.getType()))
    [all...]
SSLParametersImpl.java 21 import java.security.KeyStore;
400 tmf.init((KeyStore) null);
  /packages/apps/CertInstaller/src/com/android/certinstaller/
CertInstaller.java 32 import android.security.KeyStore;
49 * Installs certificates to the system keystore.
67 // key to KeyStore
74 private final KeyStore mKeyStore = KeyStore.getInstance();
277 if (!mKeyStore.put(PKEY_MAP_KEY, bytes, KeyStore.UID_SELF, KeyStore.FLAG_ENCRYPTED)) {
380 mCredentials.setInstallAsUid(KeyStore.UID_SELF);
411 // install everything to system keystore
460 // Note: one key takes about 1300 bytes in the keystore, so b
    [all...]
CredentialHelper.java 36 import java.security.KeyStore.PasswordProtection;
37 import java.security.KeyStore.PrivateKeyEntry;
38 import java.security.KeyStore;
326 java.security.KeyStore keystore = java.security.KeyStore.getInstance("PKCS12"); local
328 keystore.load(new ByteArrayInputStream(getData(KeyChain.EXTRA_PKCS12)),
331 Enumeration<String> aliases = keystore.aliases();
338 KeyStore.Entry entry = keystore.getEntry(alias, passwordProtection)
    [all...]
  /libcore/crypto/src/test/java/org/conscrypt/
CertPinManagerTest.java 22 import java.security.KeyStore;
59 KeyStore.PrivateKeyEntry pke = TestKeyStore.getServer().getPrivateKey("RSA", "RSA");
  /external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/
TestUtils.java 30 import java.security.KeyStore;
60 // The file name prefix to load keystore from
64 // The file name suffixes to load keystore from
65 // *.ks1 - keystore containing untrusted certificates only
66 // *.ks2 - keystore containing trusted certificates only
67 // *.ks3 - keystore containing both trusted and untrusted certificates
133 * Creates test <code>KeyStore</code> instance
136 * Do not initialize returned <code>KeyStore</code> if false
141 * 1 - <code>KeyStore</code> with untrusted certificates only<br>
142 * 2 - <code>KeyStore</code> with trusted certificates only<br
    [all...]
  /external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/
MyKeyStore.java 29 import java.security.KeyStore;
41 * Additional class for KeyStoreSpi and KeyStore verification
224 public void engineStore(KeyStore.LoadStoreParameter param)
231 public void engineLoad(KeyStore.LoadStoreParameter param)
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/
MyKeyStore.java 30 import java.security.KeyStore;
42 * Additional class for KeyStoreSpi and KeyStore verification
225 public void engineStore(KeyStore.LoadStoreParameter param)
232 public void engineLoad(KeyStore.LoadStoreParameter param)
TestKeyStoreSpi.java 14 import java.security.KeyStore.LoadStoreParameter;
15 import java.security.KeyStore.PasswordProtection;
16 import java.security.KeyStore.ProtectionParameter;
  /frameworks/base/tests/CoreTests/android/core/
SSLSocketTest.java 35 import java.security.KeyStore;
322 KeyStore ks = KeyStore.getInstance("BKS");
328 assertEquals("BKS", KeyStore.getDefaultType());
458 * Defines the keystore contents for the server, JKS version. Holds just a
488 * Defines the keystore contents for the server, BKS version. Holds just a
518 * Defines the keystore contents for the client, JKS version. Holds just a
548 * Defines the keystore contents for the client, BKS version. Holds just a
577 * Defines the password for the keystore.
    [all...]
  /frameworks/base/services/java/com/android/server/net/
LockdownVpnTracker.java 36 import android.security.KeyStore;
84 return KeyStore.getInstance().contains(Credentials.LOCKDOWN_VPN);
155 mVpn.startLegacyVpn(mProfile, KeyStore.getInstance(), egressProp);
  /libcore/luni/src/test/java/libcore/javax/net/ssl/
KeyManagerFactoryTest.java 20 import java.security.KeyStore.Builder;
21 import java.security.KeyStore.PasswordProtection;
22 import java.security.KeyStore.PrivateKeyEntry;
105 Builder builder = Builder.newInstance(getTestKeyStore().keyStore, pp);
123 kmf.init(getTestKeyStore().keyStore, getTestKeyStore().storePassword);
  /packages/apps/KeyChain/src/com/android/keychain/
KeyChainService.java 34 import android.security.KeyStore;
83 private final KeyStore mKeyStore = KeyStore.getInstance();
115 throw new IllegalStateException("keystore is "
KeyChainActivity.java 32 import android.security.KeyStore;
71 // beware that some of these KeyStore operations such as saw and
72 // get do file I/O in the remote keystore process and while they
75 private KeyStore mKeyStore = KeyStore.getInstance();
108 // see if KeyStore has been unlocked, if not start activity to do so
  /frameworks/base/keystore/tests/src/android/security/
KeyPairGeneratorSpecTest.java 87 assertEquals("encryption flag should be on", KeyStore.FLAG_ENCRYPTED, spec.getFlags());
  /libcore/luni/src/test/java/tests/api/javax/net/ssl/
HandshakeCompletedEventTest.java 26 import java.security.KeyStore;
210 * Defines the keystore contents for the server, BKS version. Holds just a
240 * Defines the keystore contents for the server, JKS version. Holds just a
270 * Defines the keystore contents for the client, JKS version. Holds just a
300 * Defines the keystore contents for the client, BKS version. Holds just a
536 * Loads a keystore from a base64-encoded String. Returns the KeyManager[]
543 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType())
    [all...]
SSLSocketTest.java 25 import java.security.KeyStore;
425 * Defines the keystore contents for the server, BKS version. Holds just a
455 * Defines the keystore contents for the server, JKS version. Holds just a
586 * Loads a keystore from a base64-encoded String. Returns the KeyManager[]
593 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType());
594 keyStore.load(inputStream, PASSWORD.toCharArray());
599 keyManagerFactory.init(keyStore, PASSWORD.toCharArray())
    [all...]
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/
TestUtils.java 32 import java.security.KeyStore;
70 // The file name prefix to load keystore from
74 // The file name suffixes to load keystore from
75 // *.ks1 - keystore containing untrusted certificates only
76 // *.ks2 - keystore containing trusted certificates only
77 // *.ks3 - keystore containing both trusted and untrusted certificates
141 * Creates test <code>KeyStore</code> instance
144 * Do not initialize returned <code>KeyStore</code> if false
149 * 1 - <code>KeyStore</code> with untrusted certificates only<br>
150 * 2 - <code>KeyStore</code> with trusted certificates only<br
    [all...]
  /frameworks/base/keystore/java/android/security/
Credentials.java 217 static boolean deleteAllTypesForAlias(KeyStore keystore, String alias) {
222 return keystore.delKey(Credentials.USER_PRIVATE_KEY + alias)
223 | deleteCertificateTypesForAlias(keystore, alias);
231 static boolean deleteCertificateTypesForAlias(KeyStore keystore, String alias) {
236 return keystore.delete(Credentials.USER_CERTIFICATE + alias)
237 | keystore.delete(Credentials.CA_CERTIFICATE + alias);
  /libcore/luni/src/main/java/java/security/cert/
PKIXParameters.java 21 import java.security.KeyStore;
90 * X509Certificate} entries from the specified {@code KeyStore}.
92 * @param keyStore
95 * if the {@code keyStore} is not initialized.
97 * if {@code keyStore} does not contained any trusted
100 public PKIXParameters(KeyStore keyStore)
103 if (keyStore == null) {
104 throw new NullPointerException("keyStore == null");
107 // keyStore has not been initialized (loaded
    [all...]
  /external/smack/src/org/jivesoftware/smack/
XMPPConnection.java 51 import java.security.KeyStore;
124 * to prompt for a password to unlock the keystore containing the SSL certificate.
127 * @param callbackHandler the CallbackHandler used to prompt for the password to the keystore.
140 * with no callback handler for password prompting of the keystore. This will work
156 * with no callback handler for password prompting of the keystore. This will work
180 * to prompt for a password to unlock the keystore containing the SSL certificate.
183 * @param callbackHandler the CallbackHandler used to prompt for the password to the keystore.
807 KeyStore ks = null;
814 //System.out.println("Keystore type: "+configuration.getKeystoreType());
826 ks = KeyStore.getInstance("PKCS11",p)
    [all...]
  /cts/tests/tests/keystore/src/android/keystore/cts/
AndroidKeyPairGeneratorTest.java 17 package android.keystore.cts;
27 import java.security.KeyStore;
63 private KeyStore mKeyStore;
87 mKeyStore = KeyStore.getInstance("AndroidKeyStore");
442 KeyStore.Entry entry = mKeyStore.getEntry(alias, null);
445 assertTrue("Entry should be a PrivateKeyEntry", entry instanceof KeyStore.PrivateKeyEntry);
446 KeyStore.PrivateKeyEntry privEntry = (KeyStore.PrivateKeyEntry) entry;
489 TestKeyStore.getIntermediateCa().keyStore);
495 serverKeyStore.keyStore.setCertificateEntry("client-selfSigned", x509userCert)
    [all...]
  /external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/internal/net/www/protocol/https/
HttpsURLConnectionTest.java 36 import java.security.KeyStore;
57 * type of the default KeyStore installed in the system in lower case. <br>
58 * For example: if default KeyStore type in the system is BKS (i.e.
59 * java.security file sets up the property keystore.type=BKS), thus classpath
    [all...]
  /packages/apps/Settings/src/com/android/settings/
ChooseLockGeneric.java 33 import android.security.KeyStore;
87 private KeyStore mKeyStore;
97 mKeyStore = KeyStore.getInstance();
  /packages/apps/Settings/src/com/android/settings/vpn2/
VpnDialog.java 27 import android.security.KeyStore;
43 private final KeyStore mKeyStore = KeyStore.getInstance();

Completed in 2197 milliseconds

1 2 3 4 56 7 8