/libcore/crypto/src/main/java/org/conscrypt/ |
TrustManagerImpl.java | 21 import java.security.KeyStore; 58 private final KeyStore rootKeyStore; 92 * Creates X509TrustManager based on a keystore 96 public TrustManagerImpl(KeyStore keyStore) { 97 this(keyStore, null); 103 public TrustManagerImpl(KeyStore keyStore, CertPinManager manager) { 106 KeyStore rootKeyStoreLocal = null; 116 if ("AndroidCAStore".equals(keyStore.getType())) [all...] |
SSLParametersImpl.java | 21 import java.security.KeyStore; 400 tmf.init((KeyStore) null);
|
/packages/apps/CertInstaller/src/com/android/certinstaller/ |
CertInstaller.java | 32 import android.security.KeyStore; 49 * Installs certificates to the system keystore. 67 // key to KeyStore 74 private final KeyStore mKeyStore = KeyStore.getInstance(); 277 if (!mKeyStore.put(PKEY_MAP_KEY, bytes, KeyStore.UID_SELF, KeyStore.FLAG_ENCRYPTED)) { 380 mCredentials.setInstallAsUid(KeyStore.UID_SELF); 411 // install everything to system keystore 460 // Note: one key takes about 1300 bytes in the keystore, so b [all...] |
CredentialHelper.java | 36 import java.security.KeyStore.PasswordProtection; 37 import java.security.KeyStore.PrivateKeyEntry; 38 import java.security.KeyStore; 326 java.security.KeyStore keystore = java.security.KeyStore.getInstance("PKCS12"); local 328 keystore.load(new ByteArrayInputStream(getData(KeyChain.EXTRA_PKCS12)), 331 Enumeration<String> aliases = keystore.aliases(); 338 KeyStore.Entry entry = keystore.getEntry(alias, passwordProtection) [all...] |
/libcore/crypto/src/test/java/org/conscrypt/ |
CertPinManagerTest.java | 22 import java.security.KeyStore; 59 KeyStore.PrivateKeyEntry pke = TestKeyStore.getServer().getPrivateKey("RSA", "RSA");
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/ |
TestUtils.java | 30 import java.security.KeyStore; 60 // The file name prefix to load keystore from 64 // The file name suffixes to load keystore from 65 // *.ks1 - keystore containing untrusted certificates only 66 // *.ks2 - keystore containing trusted certificates only 67 // *.ks3 - keystore containing both trusted and untrusted certificates 133 * Creates test <code>KeyStore</code> instance 136 * Do not initialize returned <code>KeyStore</code> if false 141 * 1 - <code>KeyStore</code> with untrusted certificates only<br> 142 * 2 - <code>KeyStore</code> with trusted certificates only<br [all...] |
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
MyKeyStore.java | 29 import java.security.KeyStore; 41 * Additional class for KeyStoreSpi and KeyStore verification 224 public void engineStore(KeyStore.LoadStoreParameter param) 231 public void engineLoad(KeyStore.LoadStoreParameter param)
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
MyKeyStore.java | 30 import java.security.KeyStore; 42 * Additional class for KeyStoreSpi and KeyStore verification 225 public void engineStore(KeyStore.LoadStoreParameter param) 232 public void engineLoad(KeyStore.LoadStoreParameter param)
|
TestKeyStoreSpi.java | 14 import java.security.KeyStore.LoadStoreParameter; 15 import java.security.KeyStore.PasswordProtection; 16 import java.security.KeyStore.ProtectionParameter;
|
/frameworks/base/tests/CoreTests/android/core/ |
SSLSocketTest.java | 35 import java.security.KeyStore; 322 KeyStore ks = KeyStore.getInstance("BKS"); 328 assertEquals("BKS", KeyStore.getDefaultType()); 458 * Defines the keystore contents for the server, JKS version. Holds just a 488 * Defines the keystore contents for the server, BKS version. Holds just a 518 * Defines the keystore contents for the client, JKS version. Holds just a 548 * Defines the keystore contents for the client, BKS version. Holds just a 577 * Defines the password for the keystore. [all...] |
/frameworks/base/services/java/com/android/server/net/ |
LockdownVpnTracker.java | 36 import android.security.KeyStore; 84 return KeyStore.getInstance().contains(Credentials.LOCKDOWN_VPN); 155 mVpn.startLegacyVpn(mProfile, KeyStore.getInstance(), egressProp);
|
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
KeyManagerFactoryTest.java | 20 import java.security.KeyStore.Builder; 21 import java.security.KeyStore.PasswordProtection; 22 import java.security.KeyStore.PrivateKeyEntry; 105 Builder builder = Builder.newInstance(getTestKeyStore().keyStore, pp); 123 kmf.init(getTestKeyStore().keyStore, getTestKeyStore().storePassword);
|
/packages/apps/KeyChain/src/com/android/keychain/ |
KeyChainService.java | 34 import android.security.KeyStore; 83 private final KeyStore mKeyStore = KeyStore.getInstance(); 115 throw new IllegalStateException("keystore is "
|
KeyChainActivity.java | 32 import android.security.KeyStore; 71 // beware that some of these KeyStore operations such as saw and 72 // get do file I/O in the remote keystore process and while they 75 private KeyStore mKeyStore = KeyStore.getInstance(); 108 // see if KeyStore has been unlocked, if not start activity to do so
|
/frameworks/base/keystore/tests/src/android/security/ |
KeyPairGeneratorSpecTest.java | 87 assertEquals("encryption flag should be on", KeyStore.FLAG_ENCRYPTED, spec.getFlags());
|
/libcore/luni/src/test/java/tests/api/javax/net/ssl/ |
HandshakeCompletedEventTest.java | 26 import java.security.KeyStore; 210 * Defines the keystore contents for the server, BKS version. Holds just a 240 * Defines the keystore contents for the server, JKS version. Holds just a 270 * Defines the keystore contents for the client, JKS version. Holds just a 300 * Defines the keystore contents for the client, BKS version. Holds just a 536 * Loads a keystore from a base64-encoded String. Returns the KeyManager[] 543 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()) [all...] |
SSLSocketTest.java | 25 import java.security.KeyStore; 425 * Defines the keystore contents for the server, BKS version. Holds just a 455 * Defines the keystore contents for the server, JKS version. Holds just a 586 * Loads a keystore from a base64-encoded String. Returns the KeyManager[] 593 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 594 keyStore.load(inputStream, PASSWORD.toCharArray()); 599 keyManagerFactory.init(keyStore, PASSWORD.toCharArray()) [all...] |
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/ |
TestUtils.java | 32 import java.security.KeyStore; 70 // The file name prefix to load keystore from 74 // The file name suffixes to load keystore from 75 // *.ks1 - keystore containing untrusted certificates only 76 // *.ks2 - keystore containing trusted certificates only 77 // *.ks3 - keystore containing both trusted and untrusted certificates 141 * Creates test <code>KeyStore</code> instance 144 * Do not initialize returned <code>KeyStore</code> if false 149 * 1 - <code>KeyStore</code> with untrusted certificates only<br> 150 * 2 - <code>KeyStore</code> with trusted certificates only<br [all...] |
/frameworks/base/keystore/java/android/security/ |
Credentials.java | 217 static boolean deleteAllTypesForAlias(KeyStore keystore, String alias) { 222 return keystore.delKey(Credentials.USER_PRIVATE_KEY + alias) 223 | deleteCertificateTypesForAlias(keystore, alias); 231 static boolean deleteCertificateTypesForAlias(KeyStore keystore, String alias) { 236 return keystore.delete(Credentials.USER_CERTIFICATE + alias) 237 | keystore.delete(Credentials.CA_CERTIFICATE + alias);
|
/libcore/luni/src/main/java/java/security/cert/ |
PKIXParameters.java | 21 import java.security.KeyStore; 90 * X509Certificate} entries from the specified {@code KeyStore}. 92 * @param keyStore 95 * if the {@code keyStore} is not initialized. 97 * if {@code keyStore} does not contained any trusted 100 public PKIXParameters(KeyStore keyStore) 103 if (keyStore == null) { 104 throw new NullPointerException("keyStore == null"); 107 // keyStore has not been initialized (loaded [all...] |
/external/smack/src/org/jivesoftware/smack/ |
XMPPConnection.java | 51 import java.security.KeyStore; 124 * to prompt for a password to unlock the keystore containing the SSL certificate. 127 * @param callbackHandler the CallbackHandler used to prompt for the password to the keystore. 140 * with no callback handler for password prompting of the keystore. This will work 156 * with no callback handler for password prompting of the keystore. This will work 180 * to prompt for a password to unlock the keystore containing the SSL certificate. 183 * @param callbackHandler the CallbackHandler used to prompt for the password to the keystore. 807 KeyStore ks = null; 814 //System.out.println("Keystore type: "+configuration.getKeystoreType()); 826 ks = KeyStore.getInstance("PKCS11",p) [all...] |
/cts/tests/tests/keystore/src/android/keystore/cts/ |
AndroidKeyPairGeneratorTest.java | 17 package android.keystore.cts; 27 import java.security.KeyStore; 63 private KeyStore mKeyStore; 87 mKeyStore = KeyStore.getInstance("AndroidKeyStore"); 442 KeyStore.Entry entry = mKeyStore.getEntry(alias, null); 445 assertTrue("Entry should be a PrivateKeyEntry", entry instanceof KeyStore.PrivateKeyEntry); 446 KeyStore.PrivateKeyEntry privEntry = (KeyStore.PrivateKeyEntry) entry; 489 TestKeyStore.getIntermediateCa().keyStore); 495 serverKeyStore.keyStore.setCertificateEntry("client-selfSigned", x509userCert) [all...] |
/external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/internal/net/www/protocol/https/ |
HttpsURLConnectionTest.java | 36 import java.security.KeyStore; 57 * type of the default KeyStore installed in the system in lower case. <br> 58 * For example: if default KeyStore type in the system is BKS (i.e. 59 * java.security file sets up the property keystore.type=BKS), thus classpath [all...] |
/packages/apps/Settings/src/com/android/settings/ |
ChooseLockGeneric.java | 33 import android.security.KeyStore; 87 private KeyStore mKeyStore; 97 mKeyStore = KeyStore.getInstance();
|
/packages/apps/Settings/src/com/android/settings/vpn2/ |
VpnDialog.java | 27 import android.security.KeyStore; 43 private final KeyStore mKeyStore = KeyStore.getInstance();
|