HomeSort by relevance Sort by last modified time
    Searched refs:keystore (Results 1 - 25 of 106) sorted by null

1 2 3 4 5

  /system/security/keystore/
test-keystore 50 function keystore() { function
57 run adb shell ls -al /data/misc/keystore
70 log "reset keystore as system user"
71 keystore system r
79 keystore root t
83 keystore system t
88 keystore system p bar
91 expect "-rw------- keystore keystore 84 .masterkey"
94 keystore system
    [all...]
keystore_get.cpp 17 #include <keystore/IKeystoreService.h>
20 #include <keystore/keystore_get.h>
26 sp<IBinder> binder = sm->getService(String16("android.security.keystore"));
Android.mk 24 LOCAL_SRC_FILES := keystore.cpp keyblob_utils.cpp
36 LOCAL_MODULE := keystore
54 # Library for keystore clients
keystore_cli.cpp 22 #include <keystore/IKeystoreService.h>
26 #include <keystore/keystore.h>
174 sp<IBinder> binder = sm->getService(String16("android.security.keystore"));
178 fprintf(stderr, "%s: error: could not connect to keystore service\n", argv[0]);
  /cts/tests/tests/security/src/android/security/cts/
KeystoreExploitTest.java 26 int pid = Proc.findPidFor("/system/bin/keystore");
28 Class<?> keystoreClass = Class.forName("android.security.KeyStore");
32 Object keystore = getInstance.invoke(null); local
53 get.invoke(keystore, keyName);
55 Thread.sleep(2000); // give keystore some time to crash
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/
PKCS12.java 1 package org.bouncycastle.jcajce.provider.keystore;
8 private static final String PREFIX = "org.bouncycastle.jcajce.provider.keystore" + ".pkcs12.";
19 provider.addAlgorithm("KeyStore.PKCS12", PREFIX + "PKCS12KeyStoreSpi$BCPKCS12KeyStore");
21 // provider.addAlgorithm("KeyStore.BCPKCS12", PREFIX + "PKCS12KeyStoreSpi$BCPKCS12KeyStore");
22 // provider.addAlgorithm("KeyStore.PKCS12-DEF", PREFIX + "PKCS12KeyStoreSpi$DefPKCS12KeyStore");
24 // provider.addAlgorithm("KeyStore.PKCS12-3DES-40RC2", PREFIX + "PKCS12KeyStoreSpi$BCPKCS12KeyStore");
25 // provider.addAlgorithm("KeyStore.PKCS12-3DES-3DES", PREFIX + "PKCS12KeyStoreSpi$BCPKCS12KeyStore3DES");
27 // provider.addAlgorithm("KeyStore.PKCS12-DEF-3DES-40RC2", PREFIX + "PKCS12KeyStoreSpi$DefPKCS12KeyStore");
28 // provider.addAlgorithm("KeyStore.PKCS12-DEF-3DES-3DES", PREFIX + "PKCS12KeyStoreSpi$DefPKCS12KeyStore3DES");
BC.java 1 package org.bouncycastle.jcajce.provider.keystore;
8 private static final String PREFIX = "org.bouncycastle.jcajce.provider.keystore" + ".bc.";
19 provider.addAlgorithm("KeyStore.BKS", PREFIX + "BcKeyStoreSpi$Std");
21 // provider.addAlgorithm("KeyStore.BKS-V1", PREFIX + "BcKeyStoreSpi$Version1");
23 provider.addAlgorithm("KeyStore.BouncyCastle", PREFIX + "BcKeyStoreSpi$BouncyCastleStore");
24 provider.addAlgorithm("Alg.Alias.KeyStore.UBER", "BouncyCastle");
25 provider.addAlgorithm("Alg.Alias.KeyStore.BOUNCYCASTLE", "BouncyCastle");
26 provider.addAlgorithm("Alg.Alias.KeyStore.bouncycastle", "BouncyCastle");
  /external/conscrypt/src/main/java/org/conscrypt/
DefaultSSLContextImpl.java 26 import java.security.KeyStore;
67 // find KeyStore, KeyManagers
68 String keystore = System.getProperty("javax.net.ssl.keyStore"); local
69 if (keystore == null) {
75 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType());
78 is = new BufferedInputStream(new FileInputStream(keystore));
100 String keystore = System.getProperty("javax.net.ssl.trustStore") local
    [all...]
  /external/apache-http/src/org/apache/http/conn/ssl/
SSLSocketFactory.java 52 import java.security.KeyStore;
69 * a {@link KeyStore truststore} file containg one or several trusted
78 * keytool -import -alias "my server cert" -file server.crt -keystore my.truststore
84 * a {@link KeyStore keystore} file containg a private key/public certificate
93 * Use the following sequence of actions to generate a keystore file
99 * <pre>keytool -genkey -v -alias "my client key" -validity 365 -keystore my.keystore</pre>
100 * For simplicity use the same password for the key as that of the keystore
106 * <pre>keytool -certreq -alias "my client key" -file mycertreq.csr -keystore my.keystore</pre
    [all...]
  /packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/
SSLSocketFactory.java 58 import java.security.KeyStore;
75 * a {@link KeyStore truststore} file containg one or several trusted
84 * keytool -import -alias "my server cert" -file server.crt -keystore my.truststore
90 * a {@link KeyStore keystore} file containg a private key/public certificate
99 * Use the following sequence of actions to generate a keystore file
105 * <pre>keytool -genkey -v -alias "my client key" -validity 365 -keystore my.keystore</pre>
106 * For simplicity use the same password for the key as that of the keystore
112 * <pre>keytool -certreq -alias "my client key" -file mycertreq.csr -keystore my.keystore</pre
    [all...]
  /hardware/samsung_slsi/exynos5/
exynos5.mk 38 # Keystore
40 keystore.exynos5
  /cts/tests/tests/keystore/src/android/keystore/cts/
KeyChainTest.java 17 package android.keystore.cts;
  /hardware/qcom/keymaster/
Android.mk 12 LOCAL_MODULE := keystore.$(TARGET_BOARD_PLATFORM)
  /system/security/softkeymaster/
module.cpp 22 #include <keystore/keystore.h>
Android.mk 21 LOCAL_MODULE := keystore.default
25 system/security/keystore \
40 system/security/keystore \
  /external/okhttp/samples/static-server/src/main/java/com/squareup/okhttp/sample/
SampleServer.java 14 import java.security.KeyStore;
103 System.out.println("Usage: SampleServer <keystore> <password> <root file> <port>");
119 KeyStore keystore = KeyStore.getInstance(KeyStore.getDefaultType()); local
122 keystore.load(in, password.toCharArray());
128 keyManagerFactory.init(keystore, password.toCharArray());
132 trustManagerFactory.init(keystore);
  /build/target/product/
core_minimal.mk 52 keystore \
53 keystore.default \
core_tiny.mk 57 keystore \
58 keystore.default \
  /frameworks/base/keystore/java/android/security/
Credentials.java 216 static boolean deleteAllTypesForAlias(KeyStore keystore, String alias) {
221 return keystore.delKey(Credentials.USER_PRIVATE_KEY + alias)
222 | deleteCertificateTypesForAlias(keystore, alias);
230 static boolean deleteCertificateTypesForAlias(KeyStore keystore, String alias) {
235 return keystore.delete(Credentials.USER_CERTIFICATE + alias)
236 | keystore.delete(Credentials.CA_CERTIFICATE + alias);
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/
KeystoreSelectionPage.java 40 * Keystore selection page. This page allows to choose to create a new keystore or use an
58 setTitle("Keystore selection");
72 mUseExistingKeystore.setText("Use existing keystore");
78 mCreateKeystore.setText("Create new keystore");
93 fileDialog.setText("Load Keystore");
96 fileDialog.setText("Select Keystore Name");
175 // reset the keystore/alias from the content of the project
181 String keystore = ProjectHelper.loadStringProperty(project, local
183 if (keystore != null)
211 String keystore = mKeystore.getText().trim(); local
    [all...]
  /packages/apps/Settings/tests/src/com/android/settings/vpn2/
CertInstallerHelper.java 21 import android.security.KeyStore;
42 import java.security.KeyStore.PasswordProtection;
43 import java.security.KeyStore.PrivateKeyEntry;
57 * and install certificates to keystore.
61 /* Define a password to unlock keystore after it is reset */
63 private final int mUid = KeyStore.UID_SELF;
67 private KeyStore mKeyStore = KeyStore.getInstance();
70 * Unlock keystore and set password
80 java.security.KeyStore keystore = null local
    [all...]
  /system/security/keystore-engine/
eng_keystore.cpp 41 #define LOG_TAG "OpenSSL-keystore"
45 #include <keystore/keystore.h>
46 #include <keystore/IKeystoreService.h>
53 const char* kKeystoreEngineId = "keystore";
54 static const char* kKeystoreEngineDesc = "Android keystore engine";
58 * ex_data index for keystore's key alias.
111 sp<IBinder> binder = sm->getService(String16("android.security.keystore"));
115 ALOGE("could not contact keystore");
123 ALOGW("could not contact keystore");
    [all...]
  /device/asus/grouper/keymaster/
Android.mk 18 # This is a nasty hack. keystore.grouper is Open Source, but it
27 LOCAL_MODULE := keystore.grouper
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/digests/
OpenSSLDigest.java 20 import org.bouncycastle.jcajce.provider.keystore.bc.BcKeyStoreSpi;
  /libcore/luni/src/test/java/libcore/java/security/cert/
OldPKIXParametersTest.java 27 import java.security.KeyStore;
173 * Test #4 for <code>PKIXParameters(KeyStore)</code> constructor<br>
182 KeyStore store = KeyStore.getInstance("PKCS12");
192 store = KeyStore.getInstance("PKCS12");
204 KeyStore keystore = KeyStore.getInstance(KeyStore.getDefaultType()); local
205 keystore.load(null,null)
    [all...]

Completed in 688 milliseconds

1 2 3 4 5