HomeSort by relevance Sort by last modified time
    Searched refs:KeyStore (Results 101 - 125 of 204) sorted by null

1 2 3 45 6 7 8 9

  /libcore/luni/src/main/java/javax/net/ssl/
TrustManagerFactory.java 21 import java.security.KeyStore;
30 * The factory for {@code TrustManager}s based on {@code KeyStore} or provider
186 * Initializes this factory instance with the specified keystore as source
190 * the keystore or {@code null}.
194 public final void init(KeyStore ks) throws KeyStoreException {
KeyManagerFactory.java 21 import java.security.KeyStore;
199 public final void init(KeyStore ks, char[] password) throws KeyStoreException,
  /libcore/luni/src/test/java/libcore/javax/net/ssl/
KeyStoreBuilderParametersTest.java 19 import java.security.KeyStore.Builder;
20 import java.security.KeyStore.PasswordProtection;
38 Builder builder = Builder.newInstance(testKeyStore.keyStore,
57 Builder builder1 = Builder.newInstance(testKeyStore1.keyStore,
59 Builder builder2 = Builder.newInstance(testKeyStore2.keyStore,
TrustManagerFactoryTest.java 21 import java.security.KeyStore.PrivateKeyEntry;
22 import java.security.KeyStore;
99 PKIXParameters pp = new PKIXParameters(getTestKeyStore().keyStore);
108 PKIXBuilderParameters pbp = new PKIXBuilderParameters(getTestKeyStore().keyStore, xcs);
121 // init with null for default KeyStore
122 tmf.init((KeyStore) null);
126 tmf.init(getTestKeyStore().keyStore);
217 // keyStore should contain only the intermediate CA so we can
220 KeyStore keyStore = TestKeyStore.createKeyStore()
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyStore3Test.java 31 import java.security.KeyStore;
45 private KeyStore mockKeyStore;
154 assertTrue(ks instanceof KeyStore);
162 assertTrue(ks instanceof KeyStore);
174 private static class MyKeyStore extends KeyStore {
250 public void engineStore(KeyStore.LoadStoreParameter param){
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/
KeyCheckPage.java 45 import java.security.KeyStore;
46 import java.security.KeyStore.PrivateKeyEntry;
191 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType());
193 keyStore.load(fis, mWizard.getKeystorePassword().toCharArray());
195 PrivateKeyEntry entry = (KeyStore.PrivateKeyEntry)keyStore.getEntry(
197 new KeyStore.PasswordProtection
    [all...]
KeySelectionPage.java 40 import java.security.KeyStore;
48 * Key Selection Page. This is used when an existing keystore is used.
152 // keystore password is wrong
155 // get the alias list (also used as a keystore password test)
156 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType());
158 keyStore.load(fis, mWizard.getKeystorePassword().toCharArray());
161 Enumeration<String> aliases = keyStore.aliases()
    [all...]
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/
SSLContext1Test.java 22 import java.security.KeyStore;
457 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType());
494 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType());
532 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType())
    [all...]
KeyManagerFactory1Test.java 22 import java.security.KeyStore;
435 * Test for <code>init(KeyStore keyStore, char[] password)</code> and
448 KeyStore ksNull = null;
457 KeyStore ks;
459 ks = KeyStore.getInstance(KeyStore.getDefaultType());
462 fail(e.toString() + "default KeyStore type is not supported");
504 KeyStore.ProtectionParameter pp = new ProtectionParameterImpl();
505 KeyStore.Builder bld = KeyStore.Builder.newInstance("testType", null, pp)
    [all...]
KeyManagerFactory2Test.java 21 import java.security.KeyStore;
79 KeyStore kStore = null;
103 kStore = KeyStore.getInstance(KeyStore.getDefaultType());
106 fail("default keystore is not supported");
SSLServerSocketTest.java 27 import java.security.KeyStore;
327 * Defines the keystore contents for the server, BKS version. Holds just a
357 * Defines the keystore contents for the server, JKS version. Holds just a
389 * Loads a keystore from a base64-encoded String. Returns the KeyManager[]
397 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType());
398 keyStore.load(inputStream, PASSWORD.toCharArray());
403 keyManagerFactory.init(keyStore, PASSWORD.toCharArray())
    [all...]
TrustManagerFactory2Test.java 21 import java.security.KeyStore;
75 KeyStore kStore = null;
92 kStore = KeyStore.getInstance(KeyStore.getDefaultType());
95 fail("default keystore is not supported");
  /packages/apps/KeyChain/tests/src/com/android/keychain/tests/
KeyChainServiceTest.java 27 import android.security.KeyStore;
30 import java.security.KeyStore.PrivateKeyEntry;
145 Log.d(TAG, "test_KeyChainService setup keystore");
146 KeyStore keyStore = KeyStore.getInstance();
192 assertEquals(KeyStore.State.UNLOCKED, keyStore.state());
  /cts/tests/tests/security/src/android/security/cts/
CertificateTest.java 25 import java.security.KeyStore;
116 KeyStore keyStore = KeyStore.getInstance("AndroidCAStore");
117 keyStore.load(null, null);
119 List<String> aliases = Collections.list(keyStore.aliases());
124 assertTrue(keyStore.isCertificateEntry(alias));
125 X509Certificate certificate = (X509Certificate) keyStore.getCertificate(alias);
  /packages/apps/Settings/src/com/android/settings/vpn2/
VpnSettings.java 37 import android.security.KeyStore;
80 private final KeyStore mKeyStore = KeyStore.getInstance();
190 // Check KeyStore here, so others do not need to deal with it.
193 // Let us unlock KeyStore. See you later!
203 // Now KeyStore is always unlocked. Reset the flag.
206 // Currently we are the only user of profiles in KeyStore.
207 // Assuming KeyStore and KeyGuard do the right thing, we can
269 mKeyStore.put(Credentials.VPN + profile.key, profile.encode(), KeyStore.UID_SELF,
270 KeyStore.FLAG_ENCRYPTED)
    [all...]
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/
PKIXBuilderParametersTest.java 25 import java.security.KeyStore;
175 * Test #4 for <code>PKIXBuilderParameters(KeyStore, CertSelector)</code>
178 * if the <code>keystore</code> is <code>null</code>
183 new PKIXBuilderParameters((KeyStore) null, null);
  /external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/
ServerHandshakeImplTest.java 22 import java.security.KeyStore;
44 KeyStore ks = JSSETestData.getKeyStore();
  /external/conscrypt/src/test/java/org/conscrypt/
TrustManagerImplTest.java 24 import java.security.KeyStore;
76 KeyStore.PrivateKeyEntry pke = TestKeyStore.getServer().getPrivateKey("RSA", "RSA");
109 KeyStore.PrivateKeyEntry pke = TestKeyStore.getServer().getPrivateKey("RSA", "RSA");
123 KeyStore.PrivateKeyEntry pke = TestKeyStore.getServer().getPrivateKey("RSA", "RSA");
145 KeyStore.PrivateKeyEntry pke = TestKeyStore.getServer().getPrivateKey("RSA", "RSA");
174 KeyStore keyStore = TestKeyStore.createKeyStore();
175 keyStore.setCertificateEntry("alias", ca);
179 tmf.init(keyStore);
188 KeyStore keyStore = TestKeyStore.createKeyStore()
    [all...]
  /external/apache-harmony/x-net/src/test/api/java/org/apache/harmony/xnet/tests/javax/net/ssl/
KeyManagerFactory2Test.java 21 import java.security.KeyStore;
81 KeyStore kStore = null;
105 kStore = KeyStore.getInstance(KeyStore.getDefaultType());
108 fail("default keystore is not supported");
TrustManagerFactory2Test.java 21 import java.security.KeyStore;
77 KeyStore kStore = null;
94 kStore = KeyStore.getInstance(KeyStore.getDefaultType());
97 fail("default keystore is not supported");
  /external/smack/src/org/jivesoftware/smack/
ServerTrustManager.java 54 private KeyStore trustStore;
56 private static Map<KeyStoreOptions, KeyStore> stores = new HashMap<KeyStoreOptions, KeyStore>();
70 trustStore = KeyStore.getInstance(options.getType());
  /frameworks/base/keystore/java/android/security/
KeyPairGeneratorSpec.java 38 * <a href="{@docRoot}training/articles/keystore.html">Android KeyStore
39 * facility</a>. The Android KeyStore facility is accessed through a
42 * the user to unlock or initialize the Android KeyStore facility.
45 * {@link java.security.KeyStore#getEntry(String, java.security.KeyStore.ProtectionParameter)}
59 * These must be kept in sync with system/security/keystore/defaults.h
101 * to unlock or initialize the Android keystore facility.
104 * {@link java.security.KeyStore#getEntry(String, java.security.KeyStore.ProtectionParameter)
    [all...]
  /libcore/luni/src/test/java/tests/targets/security/cert/
CertificateTest.java 20 import java.security.KeyStore;
    [all...]
  /external/chromium_org/net/android/java/src/org/chromium/net/
X509Util.java 23 import java.security.KeyStore;
129 * BroadcastReceiver that listens to change in the system keystore to invalidate certificate
139 private static KeyStore sTestKeyStore;
145 private static KeyStore sSystemKeyStore;
149 * trust anchor is a system trust anchor or user-installed. The KeyStore API alone is not
163 * True if the system key store has been loaded. If the "AndroidCAStore" KeyStore instance
194 sSystemKeyStore = KeyStore.getInstance("AndroidCAStore");
214 sTestKeyStore = KeyStore.getInstance(KeyStore.getDefaultType());
238 private static X509TrustManagerImplementation createTrustManager(KeyStore keyStore) throw
    [all...]
  /external/conscrypt/src/platform/java/org/conscrypt/
TrustManagerImpl.java 22 import java.security.KeyStore;
64 private final KeyStore rootKeyStore;
98 * Creates X509TrustManager based on a keystore
100 * @param keyStore
102 public TrustManagerImpl(KeyStore keyStore) {
103 this(keyStore, null);
109 public TrustManagerImpl(KeyStore keyStore, CertPinManager manager) {
110 this(keyStore, manager, null)
    [all...]

Completed in 789 milliseconds

1 2 3 45 6 7 8 9