| /libcore/luni/src/main/java/javax/net/ssl/ |
| TrustManagerFactory.java | 21 import java.security.KeyStore; 30 * The factory for {@code TrustManager}s based on {@code KeyStore} or provider 186 * Initializes this factory instance with the specified keystore as source 190 * the keystore or {@code null}. 194 public final void init(KeyStore ks) throws KeyStoreException {
|
| KeyManagerFactory.java | 21 import java.security.KeyStore; 199 public final void init(KeyStore ks, char[] password) throws KeyStoreException,
|
| /libcore/luni/src/test/java/libcore/javax/net/ssl/ |
| KeyStoreBuilderParametersTest.java | 19 import java.security.KeyStore.Builder; 20 import java.security.KeyStore.PasswordProtection; 38 Builder builder = Builder.newInstance(testKeyStore.keyStore, 57 Builder builder1 = Builder.newInstance(testKeyStore1.keyStore, 59 Builder builder2 = Builder.newInstance(testKeyStore2.keyStore,
|
| TrustManagerFactoryTest.java | 21 import java.security.KeyStore.PrivateKeyEntry; 22 import java.security.KeyStore; 99 PKIXParameters pp = new PKIXParameters(getTestKeyStore().keyStore); 108 PKIXBuilderParameters pbp = new PKIXBuilderParameters(getTestKeyStore().keyStore, xcs); 121 // init with null for default KeyStore 122 tmf.init((KeyStore) null); 126 tmf.init(getTestKeyStore().keyStore); 217 // keyStore should contain only the intermediate CA so we can 220 KeyStore keyStore = TestKeyStore.createKeyStore() [all...] |
| /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
| KeyStore3Test.java | 31 import java.security.KeyStore; 45 private KeyStore mockKeyStore; 154 assertTrue(ks instanceof KeyStore); 162 assertTrue(ks instanceof KeyStore); 174 private static class MyKeyStore extends KeyStore { 250 public void engineStore(KeyStore.LoadStoreParameter param){
|
| /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/ |
| KeyCheckPage.java | 45 import java.security.KeyStore; 46 import java.security.KeyStore.PrivateKeyEntry; 191 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 193 keyStore.load(fis, mWizard.getKeystorePassword().toCharArray()); 195 PrivateKeyEntry entry = (KeyStore.PrivateKeyEntry)keyStore.getEntry( 197 new KeyStore.PasswordProtection [all...] |
| KeySelectionPage.java | 40 import java.security.KeyStore; 48 * Key Selection Page. This is used when an existing keystore is used. 152 // keystore password is wrong 155 // get the alias list (also used as a keystore password test) 156 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 158 keyStore.load(fis, mWizard.getKeystorePassword().toCharArray()); 161 Enumeration<String> aliases = keyStore.aliases() [all...] |
| /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
| SSLContext1Test.java | 22 import java.security.KeyStore; 457 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); 494 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); 532 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()) [all...] |
| KeyManagerFactory1Test.java | 22 import java.security.KeyStore; 435 * Test for <code>init(KeyStore keyStore, char[] password)</code> and 448 KeyStore ksNull = null; 457 KeyStore ks; 459 ks = KeyStore.getInstance(KeyStore.getDefaultType()); 462 fail(e.toString() + "default KeyStore type is not supported"); 504 KeyStore.ProtectionParameter pp = new ProtectionParameterImpl(); 505 KeyStore.Builder bld = KeyStore.Builder.newInstance("testType", null, pp) [all...] |
| KeyManagerFactory2Test.java | 21 import java.security.KeyStore; 79 KeyStore kStore = null; 103 kStore = KeyStore.getInstance(KeyStore.getDefaultType()); 106 fail("default keystore is not supported");
|
| SSLServerSocketTest.java | 27 import java.security.KeyStore; 327 * Defines the keystore contents for the server, BKS version. Holds just a 357 * Defines the keystore contents for the server, JKS version. Holds just a 389 * Loads a keystore from a base64-encoded String. Returns the KeyManager[] 397 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 398 keyStore.load(inputStream, PASSWORD.toCharArray()); 403 keyManagerFactory.init(keyStore, PASSWORD.toCharArray()) [all...] |
| TrustManagerFactory2Test.java | 21 import java.security.KeyStore; 75 KeyStore kStore = null; 92 kStore = KeyStore.getInstance(KeyStore.getDefaultType()); 95 fail("default keystore is not supported");
|
| /packages/apps/KeyChain/tests/src/com/android/keychain/tests/ |
| KeyChainServiceTest.java | 27 import android.security.KeyStore; 30 import java.security.KeyStore.PrivateKeyEntry; 145 Log.d(TAG, "test_KeyChainService setup keystore"); 146 KeyStore keyStore = KeyStore.getInstance(); 192 assertEquals(KeyStore.State.UNLOCKED, keyStore.state());
|
| /cts/tests/tests/security/src/android/security/cts/ |
| CertificateTest.java | 25 import java.security.KeyStore; 116 KeyStore keyStore = KeyStore.getInstance("AndroidCAStore"); 117 keyStore.load(null, null); 119 List<String> aliases = Collections.list(keyStore.aliases()); 124 assertTrue(keyStore.isCertificateEntry(alias)); 125 X509Certificate certificate = (X509Certificate) keyStore.getCertificate(alias);
|
| /packages/apps/Settings/src/com/android/settings/vpn2/ |
| VpnSettings.java | 37 import android.security.KeyStore; 80 private final KeyStore mKeyStore = KeyStore.getInstance(); 190 // Check KeyStore here, so others do not need to deal with it. 193 // Let us unlock KeyStore. See you later! 203 // Now KeyStore is always unlocked. Reset the flag. 206 // Currently we are the only user of profiles in KeyStore. 207 // Assuming KeyStore and KeyGuard do the right thing, we can 269 mKeyStore.put(Credentials.VPN + profile.key, profile.encode(), KeyStore.UID_SELF, 270 KeyStore.FLAG_ENCRYPTED) [all...] |
| /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
| PKIXBuilderParametersTest.java | 25 import java.security.KeyStore; 175 * Test #4 for <code>PKIXBuilderParameters(KeyStore, CertSelector)</code> 178 * if the <code>keystore</code> is <code>null</code> 183 new PKIXBuilderParameters((KeyStore) null, null);
|
| /external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
| ServerHandshakeImplTest.java | 22 import java.security.KeyStore; 44 KeyStore ks = JSSETestData.getKeyStore();
|
| /external/conscrypt/src/test/java/org/conscrypt/ |
| TrustManagerImplTest.java | 24 import java.security.KeyStore; 76 KeyStore.PrivateKeyEntry pke = TestKeyStore.getServer().getPrivateKey("RSA", "RSA"); 109 KeyStore.PrivateKeyEntry pke = TestKeyStore.getServer().getPrivateKey("RSA", "RSA"); 123 KeyStore.PrivateKeyEntry pke = TestKeyStore.getServer().getPrivateKey("RSA", "RSA"); 145 KeyStore.PrivateKeyEntry pke = TestKeyStore.getServer().getPrivateKey("RSA", "RSA"); 174 KeyStore keyStore = TestKeyStore.createKeyStore(); 175 keyStore.setCertificateEntry("alias", ca); 179 tmf.init(keyStore); 188 KeyStore keyStore = TestKeyStore.createKeyStore() [all...] |
| /external/apache-harmony/x-net/src/test/api/java/org/apache/harmony/xnet/tests/javax/net/ssl/ |
| KeyManagerFactory2Test.java | 21 import java.security.KeyStore; 81 KeyStore kStore = null; 105 kStore = KeyStore.getInstance(KeyStore.getDefaultType()); 108 fail("default keystore is not supported");
|
| TrustManagerFactory2Test.java | 21 import java.security.KeyStore; 77 KeyStore kStore = null; 94 kStore = KeyStore.getInstance(KeyStore.getDefaultType()); 97 fail("default keystore is not supported");
|
| /external/smack/src/org/jivesoftware/smack/ |
| ServerTrustManager.java | 54 private KeyStore trustStore; 56 private static Map<KeyStoreOptions, KeyStore> stores = new HashMap<KeyStoreOptions, KeyStore>(); 70 trustStore = KeyStore.getInstance(options.getType());
|
| /frameworks/base/keystore/java/android/security/ |
| KeyPairGeneratorSpec.java | 38 * <a href="{@docRoot}training/articles/keystore.html">Android KeyStore 39 * facility</a>. The Android KeyStore facility is accessed through a 42 * the user to unlock or initialize the Android KeyStore facility. 45 * {@link java.security.KeyStore#getEntry(String, java.security.KeyStore.ProtectionParameter)} 59 * These must be kept in sync with system/security/keystore/defaults.h 101 * to unlock or initialize the Android keystore facility. 104 * {@link java.security.KeyStore#getEntry(String, java.security.KeyStore.ProtectionParameter) [all...] |
| /libcore/luni/src/test/java/tests/targets/security/cert/ |
| CertificateTest.java | 20 import java.security.KeyStore; [all...] |
| /external/chromium_org/net/android/java/src/org/chromium/net/ |
| X509Util.java | 23 import java.security.KeyStore; 129 * BroadcastReceiver that listens to change in the system keystore to invalidate certificate 139 private static KeyStore sTestKeyStore; 145 private static KeyStore sSystemKeyStore; 149 * trust anchor is a system trust anchor or user-installed. The KeyStore API alone is not 163 * True if the system key store has been loaded. If the "AndroidCAStore" KeyStore instance 194 sSystemKeyStore = KeyStore.getInstance("AndroidCAStore"); 214 sTestKeyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 238 private static X509TrustManagerImplementation createTrustManager(KeyStore keyStore) throw [all...] |
| /external/conscrypt/src/platform/java/org/conscrypt/ |
| TrustManagerImpl.java | 22 import java.security.KeyStore; 64 private final KeyStore rootKeyStore; 98 * Creates X509TrustManager based on a keystore 100 * @param keyStore 102 public TrustManagerImpl(KeyStore keyStore) { 103 this(keyStore, null); 109 public TrustManagerImpl(KeyStore keyStore, CertPinManager manager) { 110 this(keyStore, manager, null) [all...] |