/external/sepolicy/ |
keystore.te | 1 type keystore, domain; 2 permissive keystore; 5 # keystore daemon 6 init_daemon_domain(keystore) 7 unconfined_domain(keystore)
|
/libcore/luni/src/test/java/libcore/java/security/ |
KeyStoreTest.java | 28 import java.security.KeyStore; 29 import java.security.KeyStore.Builder; 30 import java.security.KeyStore.Entry; 31 import java.security.KeyStore.LoadStoreParameter; 32 import java.security.KeyStore.PasswordProtection; 33 import java.security.KeyStore.PrivateKeyEntry; 34 import java.security.KeyStore.ProtectionParameter; 35 import java.security.KeyStore.SecretKeyEntry; 36 import java.security.KeyStore.TrustedCertificateEntry; 126 public static List<KeyStore> keyStores() throws Exception [all...] |
/device/lge/mako/sepolicy/ |
keystore.te | 1 # Grant keystore daemon access to Qualcomm Secure Execution Environment Communicator (QSEECOM) device 2 allow keystore qseecom_device:chr_file rw_file_perms;
|
/system/security/keystore/ |
test-keystore | 50 function keystore() { function 57 run adb shell ls -al /data/misc/keystore 70 log "reset keystore as system user" 71 keystore system r 79 keystore root t 83 keystore system t 88 keystore system p bar 91 expect "-rw------- keystore keystore 84 .masterkey" 94 keystore system [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/ |
BC.java | 1 package org.bouncycastle.jcajce.provider.keystore; 8 private static final String PREFIX = "org.bouncycastle.jcajce.provider.keystore" + ".bc."; 19 provider.addAlgorithm("KeyStore.BKS", PREFIX + "BcKeyStoreSpi$Std"); 21 // provider.addAlgorithm("KeyStore.BKS-V1", PREFIX + "BcKeyStoreSpi$Version1"); 23 provider.addAlgorithm("KeyStore.BouncyCastle", PREFIX + "BcKeyStoreSpi$BouncyCastleStore"); 24 provider.addAlgorithm("Alg.Alias.KeyStore.UBER", "BouncyCastle"); 25 provider.addAlgorithm("Alg.Alias.KeyStore.BOUNCYCASTLE", "BouncyCastle"); 26 provider.addAlgorithm("Alg.Alias.KeyStore.bouncycastle", "BouncyCastle");
|
PKCS12.java | 1 package org.bouncycastle.jcajce.provider.keystore; 8 private static final String PREFIX = "org.bouncycastle.jcajce.provider.keystore" + ".pkcs12."; 19 provider.addAlgorithm("KeyStore.PKCS12", PREFIX + "PKCS12KeyStoreSpi$BCPKCS12KeyStore"); 21 // provider.addAlgorithm("KeyStore.BCPKCS12", PREFIX + "PKCS12KeyStoreSpi$BCPKCS12KeyStore"); 22 // provider.addAlgorithm("KeyStore.PKCS12-DEF", PREFIX + "PKCS12KeyStoreSpi$DefPKCS12KeyStore"); 24 // provider.addAlgorithm("KeyStore.PKCS12-3DES-40RC2", PREFIX + "PKCS12KeyStoreSpi$BCPKCS12KeyStore"); 25 // provider.addAlgorithm("KeyStore.PKCS12-3DES-3DES", PREFIX + "PKCS12KeyStoreSpi$BCPKCS12KeyStore3DES"); 27 // provider.addAlgorithm("KeyStore.PKCS12-DEF-3DES-40RC2", PREFIX + "PKCS12KeyStoreSpi$DefPKCS12KeyStore"); 28 // provider.addAlgorithm("KeyStore.PKCS12-DEF-3DES-3DES", PREFIX + "PKCS12KeyStoreSpi$DefPKCS12KeyStore3DES");
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStore2Test.java | 29 import java.security.KeyStore; 143 KeyStore keyTest = KeyStore.getInstance(KeyStore.getDefaultType()); 162 * java.security.KeyStore#aliases() 166 // java.security.KeyStore.aliases() 172 KeyStore keyTest = KeyStore.getInstance(KeyStore.getDefaultType()); 182 // KeyStore keyTest [all...] |
KeyStore4Test.java | 15 import java.security.KeyStore; 23 import java.security.KeyStore.Entry; 24 import java.security.KeyStore.ProtectionParameter; 31 KeyStore keyStore; 32 KeyStore uninitialized; 33 KeyStore failing; 43 keyStore = KeyStore.getInstance(KEY_STORE_TYPE); 44 keyStore.load(null, "PASSWORD".toCharArray()) [all...] |
KeyStoreBuilderTest.java | 27 import java.security.KeyStore; 47 private KeyStore.PasswordProtection protPass = new KeyStore.PasswordProtection( 52 private KeyStore.CallbackHandlerProtection callbackHand = new KeyStore.CallbackHandlerProtection( 67 "KeyStore." + KeyStore.getDefaultType())[0]; 87 * test for method newInstance(KeyStore, KeyStore.ProtectionParameter) 95 KeyStore.Builder.newInstance(null, null) [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
KeyStore_Impl3Test.java | 27 import java.security.KeyStore; 39 * Tests for <code>KeyStore</code> constructor and methods 47 private static final String defaultType = "KeyStore"; 55 private static String NotSupportMsg = "Default KeyStore type is not supported"; 59 public KeyStore[] createKS() throws Exception { 61 KeyStore[] kpg = new KeyStore[3]; 63 kpg[0] = KeyStore.getInstance(defaultType); 64 kpg[1] = KeyStore.getInstance(defaultType, defaultProvider); 65 kpg[2] = KeyStore.getInstance(defaultType, defaultProviderName) [all...] |
KSBuilder_ImplTest.java | 28 import java.security.KeyStore; 50 * Tests for <code>KeyStore.Builder</code> class 56 private KeyStore.PasswordProtection protPass = new KeyStore.PasswordProtection(pass); 58 private KeyStore.CallbackHandlerProtection callbackHand = new KeyStore.CallbackHandlerProtection(tmpCall); 74 // Creates empty KeyStore and loads it to file 77 File ff = File.createTempFile("KSBuilder_ImplTest", "keystore"); 81 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()) [all...] |
/libcore/crypto/src/main/java/org/conscrypt/ |
TrustManagerFactoryImpl.java | 22 import java.security.KeyStore; 38 private KeyStore keyStore; 41 * @see javax.net.ssl.TrustManagerFactorySpi#engineInit(KeyStore) 44 public void engineInit(KeyStore ks) throws KeyStoreException { 46 keyStore = ks; 48 keyStore = KeyStore.getInstance("AndroidCAStore"); 50 keyStore.load(null, null); 76 if (keyStore == null) [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
PKIXBuilderParameters_ImplTest.java | 26 import java.security.KeyStore; 44 * Test #1 for <code>PKIXBuilderParameters(KeyStore, CertSelector)</code> 53 KeyStore ks = TestUtils.getKeyStore(true, TestUtils.TRUSTED); 55 fail(getName() + ": not performed (could not create test KeyStore)"); 65 * Test #2 for <code>PKIXBuilderParameters(KeyStore, CertSelector)</code> 74 KeyStore ks = TestUtils.getKeyStore(true, TestUtils.TRUSTED); 76 fail(getName() + ": not performed (could not create test KeyStore)"); 86 * Test #3 for <code>PKIXBuilderParameters(KeyStore, CertSelector)</code> 88 * Assertion: Only keystore entries that contain trusted 97 KeyStore ks = TestUtils.getKeyStore(true, TestUtils.TRUSTED_AND_UNTRUSTED) [all...] |
/external/apache-harmony/x-net/src/test/java/javax/net/ssl/ |
MyKeyManagerFactorySpi.java | 25 import java.security.KeyStore; 39 protected void engineInit(KeyStore ks, char[] password) 46 throw new UnrecoverableKeyException("Incorrect keystore"); 73 private KeyStore keyStore; 75 public Parameters (KeyStore ks, char[] pass) { 76 this.keyStore = ks; 79 public KeyStore getKeyStore() { 80 return keyStore;
|
MyTrustManagerFactorySpi.java | 25 import java.security.KeyStore; 36 protected void engineInit(KeyStore ks) throws KeyStoreException { 38 throw new KeyStoreException("Not supported operation for null KeyStore"); 66 private KeyStore keyStore; 67 public Parameters (KeyStore ks) { 68 this.keyStore = ks; 70 public KeyStore getKeyStore() { 71 return keyStore;
|
/external/apache-harmony/x-net/src/test/support/common/java/org/apache/harmony/xnet/tests/support/ |
MyKeyManagerFactorySpi.java | 21 import java.security.KeyStore; 39 protected void engineInit(KeyStore ks, char[] password) 46 throw new UnrecoverableKeyException("Incorrect keystore"); 73 private KeyStore keyStore; 75 public Parameters (KeyStore ks, char[] pass) { 76 this.keyStore = ks; 79 public KeyStore getKeyStore() { 80 return keyStore;
|
MyTrustManagerFactorySpi.java | 21 import java.security.KeyStore; 36 protected void engineInit(KeyStore ks) throws KeyStoreException { 38 throw new KeyStoreException("Not supported operation for null KeyStore"); 66 private KeyStore keyStore; 67 public Parameters (KeyStore ks) { 68 this.keyStore = ks; 70 public KeyStore getKeyStore() { 71 return keyStore;
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
MyTrustManagerFactorySpi.java | 21 import java.security.KeyStore; 35 protected void engineInit(KeyStore ks) throws KeyStoreException { 37 throw new KeyStoreException("Not supported operation for null KeyStore"); 63 private KeyStore keyStore; 64 public Parameters (KeyStore ks) { 65 this.keyStore = ks; 67 public KeyStore getKeyStore() { 68 return keyStore;
|
/libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/ |
MyKeyManagerFactorySpi.java | 21 import java.security.KeyStore; 38 protected void engineInit(KeyStore ks, char[] password) 45 throw new UnrecoverableKeyException("Incorrect keystore"); 70 private KeyStore keyStore; 72 public Parameters (KeyStore ks, char[] pass) { 73 this.keyStore = ks; 76 public KeyStore getKeyStore() { 77 return keyStore;
|
MyTrustManagerFactorySpi.java | 21 import java.security.KeyStore; 35 protected void engineInit(KeyStore ks) throws KeyStoreException { 37 throw new KeyStoreException("Not supported operation for null KeyStore"); 63 private KeyStore keyStore; 64 public Parameters (KeyStore ks) { 65 this.keyStore = ks; 67 public KeyStore getKeyStore() { 68 return keyStore;
|
/frameworks/base/keystore/java/android/security/ |
KeyStoreParameter.java | 24 import java.security.KeyStore.ProtectionParameter; 29 * {@code KeyStore} entries that work with 30 * <a href="{@docRoot}guide/topics/security/keystore.html">Android KeyStore 31 * facility</a>. The Android KeyStore facility is accessed through a 32 * {@link java.security.KeyStore} API using the {@code AndroidKeyStore} 34 * the user to unlock or initialize the Android KeyStore facility. 36 * Any entries placed in the {@code KeyStore} may be retrieved later. Note that 37 * there is only one logical instance of the {@code KeyStore} per application 39 * {@code KeyStore} [all...] |
/frameworks/base/keystore/tests/src/android/security/ |
KeyStoreTest.java | 21 import android.security.KeyStore; 32 * Junit / Instrumentation test case for KeyStore class 36 * runtest keystore-unit 40 * runtest --path frameworks/base/keystore/tests/src/android/security/KeyStoreTest.java 63 private KeyStore mKeyStore = null; 118 mKeyStore = KeyStore.getInstance(); 119 if (mKeyStore.state() != KeyStore.State.UNINITIALIZED) { 122 assertEquals("KeyStore should be in an uninitialized state", 123 KeyStore.State.UNINITIALIZED, mKeyStore.state()); 134 assertEquals(KeyStore.State.UNINITIALIZED, mKeyStore.state()) [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KeyStore2Test.java | 28 import java.security.KeyStore; 140 KeyStore keyTest = KeyStore.getInstance(KeyStore.getDefaultType()); 159 * @tests java.security.KeyStore#aliases() 163 // java.security.KeyStore.aliases() 169 KeyStore keyTest = KeyStore.getInstance(KeyStore.getDefaultType()); 172 // KeyStore keyTest [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/config/ |
PKCS12StoreParameter.java | 4 import java.security.KeyStore; 5 import java.security.KeyStore.LoadStoreParameter; 6 import java.security.KeyStore.ProtectionParameter; 27 this(out, new KeyStore.PasswordProtection(password), forDEREncoding);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
JDKPKCS12StoreParameter.java | 4 import java.security.KeyStore; 5 import java.security.KeyStore.LoadStoreParameter; 6 import java.security.KeyStore.ProtectionParameter; 39 this.protectionParameter = new KeyStore.PasswordProtection(password);
|