HomeSort by relevance Sort by last modified time
    Searched full:keystore (Results 1 - 25 of 464) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/sepolicy/
keystore.te 1 type keystore, domain;
2 permissive keystore;
5 # keystore daemon
6 init_daemon_domain(keystore)
7 unconfined_domain(keystore)
  /libcore/luni/src/test/java/libcore/java/security/
KeyStoreTest.java 28 import java.security.KeyStore;
29 import java.security.KeyStore.Builder;
30 import java.security.KeyStore.Entry;
31 import java.security.KeyStore.LoadStoreParameter;
32 import java.security.KeyStore.PasswordProtection;
33 import java.security.KeyStore.PrivateKeyEntry;
34 import java.security.KeyStore.ProtectionParameter;
35 import java.security.KeyStore.SecretKeyEntry;
36 import java.security.KeyStore.TrustedCertificateEntry;
126 public static List<KeyStore> keyStores() throws Exception
    [all...]
  /device/lge/mako/sepolicy/
keystore.te 1 # Grant keystore daemon access to Qualcomm Secure Execution Environment Communicator (QSEECOM) device
2 allow keystore qseecom_device:chr_file rw_file_perms;
  /system/security/keystore/
test-keystore 50 function keystore() { function
57 run adb shell ls -al /data/misc/keystore
70 log "reset keystore as system user"
71 keystore system r
79 keystore root t
83 keystore system t
88 keystore system p bar
91 expect "-rw------- keystore keystore 84 .masterkey"
94 keystore system
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/
BC.java 1 package org.bouncycastle.jcajce.provider.keystore;
8 private static final String PREFIX = "org.bouncycastle.jcajce.provider.keystore" + ".bc.";
19 provider.addAlgorithm("KeyStore.BKS", PREFIX + "BcKeyStoreSpi$Std");
21 // provider.addAlgorithm("KeyStore.BKS-V1", PREFIX + "BcKeyStoreSpi$Version1");
23 provider.addAlgorithm("KeyStore.BouncyCastle", PREFIX + "BcKeyStoreSpi$BouncyCastleStore");
24 provider.addAlgorithm("Alg.Alias.KeyStore.UBER", "BouncyCastle");
25 provider.addAlgorithm("Alg.Alias.KeyStore.BOUNCYCASTLE", "BouncyCastle");
26 provider.addAlgorithm("Alg.Alias.KeyStore.bouncycastle", "BouncyCastle");
PKCS12.java 1 package org.bouncycastle.jcajce.provider.keystore;
8 private static final String PREFIX = "org.bouncycastle.jcajce.provider.keystore" + ".pkcs12.";
19 provider.addAlgorithm("KeyStore.PKCS12", PREFIX + "PKCS12KeyStoreSpi$BCPKCS12KeyStore");
21 // provider.addAlgorithm("KeyStore.BCPKCS12", PREFIX + "PKCS12KeyStoreSpi$BCPKCS12KeyStore");
22 // provider.addAlgorithm("KeyStore.PKCS12-DEF", PREFIX + "PKCS12KeyStoreSpi$DefPKCS12KeyStore");
24 // provider.addAlgorithm("KeyStore.PKCS12-3DES-40RC2", PREFIX + "PKCS12KeyStoreSpi$BCPKCS12KeyStore");
25 // provider.addAlgorithm("KeyStore.PKCS12-3DES-3DES", PREFIX + "PKCS12KeyStoreSpi$BCPKCS12KeyStore3DES");
27 // provider.addAlgorithm("KeyStore.PKCS12-DEF-3DES-40RC2", PREFIX + "PKCS12KeyStoreSpi$DefPKCS12KeyStore");
28 // provider.addAlgorithm("KeyStore.PKCS12-DEF-3DES-3DES", PREFIX + "PKCS12KeyStoreSpi$DefPKCS12KeyStore3DES");
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyStore2Test.java 29 import java.security.KeyStore;
143 KeyStore keyTest = KeyStore.getInstance(KeyStore.getDefaultType());
162 * java.security.KeyStore#aliases()
166 // java.security.KeyStore.aliases()
172 KeyStore keyTest = KeyStore.getInstance(KeyStore.getDefaultType());
182 // KeyStore keyTest
    [all...]
KeyStore4Test.java 15 import java.security.KeyStore;
23 import java.security.KeyStore.Entry;
24 import java.security.KeyStore.ProtectionParameter;
31 KeyStore keyStore;
32 KeyStore uninitialized;
33 KeyStore failing;
43 keyStore = KeyStore.getInstance(KEY_STORE_TYPE);
44 keyStore.load(null, "PASSWORD".toCharArray())
    [all...]
KeyStoreBuilderTest.java 27 import java.security.KeyStore;
47 private KeyStore.PasswordProtection protPass = new KeyStore.PasswordProtection(
52 private KeyStore.CallbackHandlerProtection callbackHand = new KeyStore.CallbackHandlerProtection(
67 "KeyStore." + KeyStore.getDefaultType())[0];
87 * test for method newInstance(KeyStore, KeyStore.ProtectionParameter)
95 KeyStore.Builder.newInstance(null, null)
    [all...]
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/
KeyStore_Impl3Test.java 27 import java.security.KeyStore;
39 * Tests for <code>KeyStore</code> constructor and methods
47 private static final String defaultType = "KeyStore";
55 private static String NotSupportMsg = "Default KeyStore type is not supported";
59 public KeyStore[] createKS() throws Exception {
61 KeyStore[] kpg = new KeyStore[3];
63 kpg[0] = KeyStore.getInstance(defaultType);
64 kpg[1] = KeyStore.getInstance(defaultType, defaultProvider);
65 kpg[2] = KeyStore.getInstance(defaultType, defaultProviderName)
    [all...]
KSBuilder_ImplTest.java 28 import java.security.KeyStore;
50 * Tests for <code>KeyStore.Builder</code> class
56 private KeyStore.PasswordProtection protPass = new KeyStore.PasswordProtection(pass);
58 private KeyStore.CallbackHandlerProtection callbackHand = new KeyStore.CallbackHandlerProtection(tmpCall);
74 // Creates empty KeyStore and loads it to file
77 File ff = File.createTempFile("KSBuilder_ImplTest", "keystore");
81 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType())
    [all...]
  /libcore/crypto/src/main/java/org/conscrypt/
TrustManagerFactoryImpl.java 22 import java.security.KeyStore;
38 private KeyStore keyStore;
41 * @see javax.net.ssl.TrustManagerFactorySpi#engineInit(KeyStore)
44 public void engineInit(KeyStore ks) throws KeyStoreException {
46 keyStore = ks;
48 keyStore = KeyStore.getInstance("AndroidCAStore");
50 keyStore.load(null, null);
76 if (keyStore == null)
    [all...]
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/
PKIXBuilderParameters_ImplTest.java 26 import java.security.KeyStore;
44 * Test #1 for <code>PKIXBuilderParameters(KeyStore, CertSelector)</code>
53 KeyStore ks = TestUtils.getKeyStore(true, TestUtils.TRUSTED);
55 fail(getName() + ": not performed (could not create test KeyStore)");
65 * Test #2 for <code>PKIXBuilderParameters(KeyStore, CertSelector)</code>
74 KeyStore ks = TestUtils.getKeyStore(true, TestUtils.TRUSTED);
76 fail(getName() + ": not performed (could not create test KeyStore)");
86 * Test #3 for <code>PKIXBuilderParameters(KeyStore, CertSelector)</code>
88 * Assertion: Only keystore entries that contain trusted
97 KeyStore ks = TestUtils.getKeyStore(true, TestUtils.TRUSTED_AND_UNTRUSTED)
    [all...]
  /external/apache-harmony/x-net/src/test/java/javax/net/ssl/
MyKeyManagerFactorySpi.java 25 import java.security.KeyStore;
39 protected void engineInit(KeyStore ks, char[] password)
46 throw new UnrecoverableKeyException("Incorrect keystore");
73 private KeyStore keyStore;
75 public Parameters (KeyStore ks, char[] pass) {
76 this.keyStore = ks;
79 public KeyStore getKeyStore() {
80 return keyStore;
MyTrustManagerFactorySpi.java 25 import java.security.KeyStore;
36 protected void engineInit(KeyStore ks) throws KeyStoreException {
38 throw new KeyStoreException("Not supported operation for null KeyStore");
66 private KeyStore keyStore;
67 public Parameters (KeyStore ks) {
68 this.keyStore = ks;
70 public KeyStore getKeyStore() {
71 return keyStore;
  /external/apache-harmony/x-net/src/test/support/common/java/org/apache/harmony/xnet/tests/support/
MyKeyManagerFactorySpi.java 21 import java.security.KeyStore;
39 protected void engineInit(KeyStore ks, char[] password)
46 throw new UnrecoverableKeyException("Incorrect keystore");
73 private KeyStore keyStore;
75 public Parameters (KeyStore ks, char[] pass) {
76 this.keyStore = ks;
79 public KeyStore getKeyStore() {
80 return keyStore;
MyTrustManagerFactorySpi.java 21 import java.security.KeyStore;
36 protected void engineInit(KeyStore ks) throws KeyStoreException {
38 throw new KeyStoreException("Not supported operation for null KeyStore");
66 private KeyStore keyStore;
67 public Parameters (KeyStore ks) {
68 this.keyStore = ks;
70 public KeyStore getKeyStore() {
71 return keyStore;
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/
MyTrustManagerFactorySpi.java 21 import java.security.KeyStore;
35 protected void engineInit(KeyStore ks) throws KeyStoreException {
37 throw new KeyStoreException("Not supported operation for null KeyStore");
63 private KeyStore keyStore;
64 public Parameters (KeyStore ks) {
65 this.keyStore = ks;
67 public KeyStore getKeyStore() {
68 return keyStore;
  /libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/
MyKeyManagerFactorySpi.java 21 import java.security.KeyStore;
38 protected void engineInit(KeyStore ks, char[] password)
45 throw new UnrecoverableKeyException("Incorrect keystore");
70 private KeyStore keyStore;
72 public Parameters (KeyStore ks, char[] pass) {
73 this.keyStore = ks;
76 public KeyStore getKeyStore() {
77 return keyStore;
MyTrustManagerFactorySpi.java 21 import java.security.KeyStore;
35 protected void engineInit(KeyStore ks) throws KeyStoreException {
37 throw new KeyStoreException("Not supported operation for null KeyStore");
63 private KeyStore keyStore;
64 public Parameters (KeyStore ks) {
65 this.keyStore = ks;
67 public KeyStore getKeyStore() {
68 return keyStore;
  /frameworks/base/keystore/java/android/security/
KeyStoreParameter.java 24 import java.security.KeyStore.ProtectionParameter;
29 * {@code KeyStore} entries that work with
30 * <a href="{@docRoot}guide/topics/security/keystore.html">Android KeyStore
31 * facility</a>. The Android KeyStore facility is accessed through a
32 * {@link java.security.KeyStore} API using the {@code AndroidKeyStore}
34 * the user to unlock or initialize the Android KeyStore facility.
36 * Any entries placed in the {@code KeyStore} may be retrieved later. Note that
37 * there is only one logical instance of the {@code KeyStore} per application
39 * {@code KeyStore}
    [all...]
  /frameworks/base/keystore/tests/src/android/security/
KeyStoreTest.java 21 import android.security.KeyStore;
32 * Junit / Instrumentation test case for KeyStore class
36 * runtest keystore-unit
40 * runtest --path frameworks/base/keystore/tests/src/android/security/KeyStoreTest.java
63 private KeyStore mKeyStore = null;
118 mKeyStore = KeyStore.getInstance();
119 if (mKeyStore.state() != KeyStore.State.UNINITIALIZED) {
122 assertEquals("KeyStore should be in an uninitialized state",
123 KeyStore.State.UNINITIALIZED, mKeyStore.state());
134 assertEquals(KeyStore.State.UNINITIALIZED, mKeyStore.state())
    [all...]
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
KeyStore2Test.java 28 import java.security.KeyStore;
140 KeyStore keyTest = KeyStore.getInstance(KeyStore.getDefaultType());
159 * @tests java.security.KeyStore#aliases()
163 // java.security.KeyStore.aliases()
169 KeyStore keyTest = KeyStore.getInstance(KeyStore.getDefaultType());
172 // KeyStore keyTest
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/config/
PKCS12StoreParameter.java 4 import java.security.KeyStore;
5 import java.security.KeyStore.LoadStoreParameter;
6 import java.security.KeyStore.ProtectionParameter;
27 this(out, new KeyStore.PasswordProtection(password), forDEREncoding);
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
JDKPKCS12StoreParameter.java 4 import java.security.KeyStore;
5 import java.security.KeyStore.LoadStoreParameter;
6 import java.security.KeyStore.ProtectionParameter;
39 this.protectionParameter = new KeyStore.PasswordProtection(password);

Completed in 700 milliseconds

1 2 3 4 5 6 7 8 91011>>