HomeSort by relevance Sort by last modified time
    Searched refs:KeyStore (Results 126 - 150 of 204) sorted by null

1 2 3 4 56 7 8 9

  /frameworks/base/services/core/java/com/android/server/
LockSettingsService.java 44 import android.security.KeyStore;
105 final KeyStore ks = KeyStore.getInstance();
107 // Clear up keystore in case anything was left behind by previous users
110 // If this user has a parent, sync with its keystore password
270 final KeyStore ks = KeyStore.getInstance();
275 // For historical reasons, don't wipe a non-empty keystore if we have a single user with a
399 final KeyStore ks = KeyStore.getInstance()
    [all...]
  /external/apache-harmony/x-net/src/test/api/java/org/apache/harmony/xnet/tests/javax/net/ssl/
KeyManagerFactory1Test.java 21 import java.security.KeyStore;
371 * Test for <code>init(KeyStore keyStore, char[] password)</code> and
382 KeyStore ksNull = null;
391 KeyStore ks;
392 ks = KeyStore.getInstance(KeyStore.getDefaultType());
TrustManagerFactory1Test.java 21 import java.security.KeyStore;
372 * Test for <code>init(KeyStore keyStore)</code> and
381 KeyStore ks;
382 KeyStore ksNull = null;
383 ks = KeyStore.getInstance(KeyStore.getDefaultType());
  /packages/apps/CertInstaller/src/com/android/certinstaller/
CertInstaller.java 32 import android.security.KeyStore;
49 * Installs certificates to the system keystore.
67 // key to KeyStore
74 private final KeyStore mKeyStore = KeyStore.getInstance();
277 if (!mKeyStore.put(PKEY_MAP_KEY, bytes, KeyStore.UID_SELF, KeyStore.FLAG_ENCRYPTED)) {
380 mCredentials.setInstallAsUid(KeyStore.UID_SELF);
411 // install everything to system keystore
460 // Note: one key takes about 1300 bytes in the keystore, so b
    [all...]
CredentialHelper.java 36 import java.security.KeyStore.PasswordProtection;
37 import java.security.KeyStore.PrivateKeyEntry;
38 import java.security.KeyStore;
326 java.security.KeyStore keystore = java.security.KeyStore.getInstance("PKCS12"); local
328 keystore.load(new ByteArrayInputStream(getData(KeyChain.EXTRA_PKCS12)),
331 Enumeration<String> aliases = keystore.aliases();
338 KeyStore.Entry entry = keystore.getEntry(alias, passwordProtection)
    [all...]
  /external/conscrypt/src/test/java/org/conscrypt/
CertPinManagerTest.java 22 import java.security.KeyStore;
59 KeyStore.PrivateKeyEntry pke = TestKeyStore.getServer().getPrivateKey("RSA", "RSA");
  /external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/
TestUtils.java 30 import java.security.KeyStore;
59 // The file name prefix to load keystore from
63 // The file name suffixes to load keystore from
64 // *.ks1 - keystore containing untrusted certificates only
65 // *.ks2 - keystore containing trusted certificates only
66 // *.ks3 - keystore containing both trusted and untrusted certificates
134 * Creates test <code>KeyStore</code> instance
136 * @param initialize Do not initialize returned <code>KeyStore</code> if false
139 * 1 - <code>KeyStore</code> with untrusted certificates only<br>
140 * 2 - <code>KeyStore</code> with trusted certificates only<br
    [all...]
  /frameworks/base/keystore/java/android/security/
KeyStore.java 32 public class KeyStore {
33 private static final String TAG = "KeyStore";
61 private KeyStore(IKeystoreService binder) {
65 public static KeyStore getInstance() {
66 IKeystoreService keystore = IKeystoreService.Stub.asInterface(ServiceManager local
67 .getService("android.security.keystore"));
68 return new KeyStore(keystore);
88 Log.w(TAG, "Cannot connect to keystore", e);
108 Log.w(TAG, "Cannot connect to keystore", e)
    [all...]
Credentials.java 216 static boolean deleteAllTypesForAlias(KeyStore keystore, String alias) {
221 return keystore.delKey(Credentials.USER_PRIVATE_KEY + alias)
222 | deleteCertificateTypesForAlias(keystore, alias);
230 static boolean deleteCertificateTypesForAlias(KeyStore keystore, String alias) {
235 return keystore.delete(Credentials.USER_CERTIFICATE + alias)
236 | keystore.delete(Credentials.CA_CERTIFICATE + alias);
  /external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/
MyKeyStore.java 29 import java.security.KeyStore;
41 * Additional class for KeyStoreSpi and KeyStore verification
223 public void engineStore(KeyStore.LoadStoreParameter param)
230 public void engineLoad(KeyStore.LoadStoreParameter param)
  /frameworks/base/core/java/android/net/http/
CertificateChainValidator.java 28 import java.security.KeyStore;
82 tmf.init((KeyStore) null);
177 tmf.init((KeyStore) null);
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/
MyKeyStore.java 30 import java.security.KeyStore;
42 * Additional class for KeyStoreSpi and KeyStore verification
225 public void engineStore(KeyStore.LoadStoreParameter param)
232 public void engineLoad(KeyStore.LoadStoreParameter param)
TestKeyStoreSpi.java 14 import java.security.KeyStore.LoadStoreParameter;
15 import java.security.KeyStore.PasswordProtection;
16 import java.security.KeyStore.ProtectionParameter;
  /packages/apps/KeyChain/src/com/android/keychain/
KeyChainService.java 37 import android.security.KeyStore;
92 private final KeyStore mKeyStore = KeyStore.getInstance();
126 throw new IllegalStateException("keystore is "
156 KeyStore.FLAG_ENCRYPTED)) {
161 KeyStore.FLAG_ENCRYPTED)) {
  /frameworks/base/tests/CoreTests/android/core/
SSLSocketTest.java 35 import java.security.KeyStore;
322 KeyStore ks = KeyStore.getInstance("BKS");
328 assertEquals("BKS", KeyStore.getDefaultType());
458 * Defines the keystore contents for the server, JKS version. Holds just a
488 * Defines the keystore contents for the server, BKS version. Holds just a
518 * Defines the keystore contents for the client, JKS version. Holds just a
548 * Defines the keystore contents for the client, BKS version. Holds just a
577 * Defines the password for the keystore.
    [all...]
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/
ExportWizard.java 57 import java.security.KeyStore;
58 import java.security.KeyStore.PrivateKeyEntry;
77 static final String PROPERTY_KEYSTORE = "keystore"; //$NON-NLS-1$
92 /** bit mask constant for keystore data change event */
240 // if needed, create the keystore and/or key.
263 // keystore creation error!
268 // keystore is created, now load the private key and certificate.
269 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType())
    [all...]
  /frameworks/base/services/core/java/com/android/server/net/
LockdownVpnTracker.java 37 import android.security.KeyStore;
88 return KeyStore.getInstance().contains(Credentials.LOCKDOWN_VPN);
168 mVpn.startLegacyVpnPrivileged(mProfile, KeyStore.getInstance(), egressProp);
  /libcore/luni/src/test/java/libcore/javax/net/ssl/
KeyManagerFactoryTest.java 20 import java.security.KeyStore.Builder;
21 import java.security.KeyStore.PasswordProtection;
22 import java.security.KeyStore.PrivateKeyEntry;
105 Builder builder = Builder.newInstance(getTestKeyStore().keyStore, pp);
123 kmf.init(getTestKeyStore().keyStore, getTestKeyStore().storePassword);
  /frameworks/base/keystore/tests/src/android/security/
KeyPairGeneratorSpecTest.java 87 assertEquals("encryption flag should be on", KeyStore.FLAG_ENCRYPTED, spec.getFlags());
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/
HandshakeCompletedEventTest.java 26 import java.security.KeyStore;
210 * Defines the keystore contents for the server, BKS version. Holds just a
240 * Defines the keystore contents for the server, JKS version. Holds just a
270 * Defines the keystore contents for the client, JKS version. Holds just a
300 * Defines the keystore contents for the client, BKS version. Holds just a
536 * Loads a keystore from a base64-encoded String. Returns the KeyManager[]
543 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType())
    [all...]
SSLSocketTest.java 25 import java.security.KeyStore;
425 * Defines the keystore contents for the server, BKS version. Holds just a
455 * Defines the keystore contents for the server, JKS version. Holds just a
586 * Loads a keystore from a base64-encoded String. Returns the KeyManager[]
593 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType());
594 keyStore.load(inputStream, PASSWORD.toCharArray());
599 keyManagerFactory.init(keyStore, PASSWORD.toCharArray())
    [all...]
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/
TestUtils.java 32 import java.security.KeyStore;
70 // The file name prefix to load keystore from
74 // The file name suffixes to load keystore from
75 // *.ks1 - keystore containing untrusted certificates only
76 // *.ks2 - keystore containing trusted certificates only
77 // *.ks3 - keystore containing both trusted and untrusted certificates
141 * Creates test <code>KeyStore</code> instance
144 * Do not initialize returned <code>KeyStore</code> if false
149 * 1 - <code>KeyStore</code> with untrusted certificates only<br>
150 * 2 - <code>KeyStore</code> with trusted certificates only<br
    [all...]
  /libcore/luni/src/main/java/java/security/cert/
PKIXParameters.java 21 import java.security.KeyStore;
90 * X509Certificate} entries from the specified {@code KeyStore}.
92 * @param keyStore
95 * if the {@code keyStore} is not initialized.
97 * if {@code keyStore} does not contained any trusted
100 public PKIXParameters(KeyStore keyStore)
103 if (keyStore == null) {
104 throw new NullPointerException("keyStore == null");
107 // keyStore has not been initialized (loaded
    [all...]
  /external/smack/src/org/jivesoftware/smack/
XMPPConnection.java 51 import java.security.KeyStore;
124 * to prompt for a password to unlock the keystore containing the SSL certificate.
127 * @param callbackHandler the CallbackHandler used to prompt for the password to the keystore.
140 * with no callback handler for password prompting of the keystore. This will work
156 * with no callback handler for password prompting of the keystore. This will work
180 * to prompt for a password to unlock the keystore containing the SSL certificate.
183 * @param callbackHandler the CallbackHandler used to prompt for the password to the keystore.
807 KeyStore ks = null;
814 //System.out.println("Keystore type: "+configuration.getKeystoreType());
826 ks = KeyStore.getInstance("PKCS11",p)
    [all...]
  /cts/tests/tests/keystore/src/android/keystore/cts/
AndroidKeyPairGeneratorTest.java 17 package android.keystore.cts;
27 import java.security.KeyStore;
63 private KeyStore mKeyStore;
87 mKeyStore = KeyStore.getInstance("AndroidKeyStore");
442 KeyStore.Entry entry = mKeyStore.getEntry(alias, null);
445 assertTrue("Entry should be a PrivateKeyEntry", entry instanceof KeyStore.PrivateKeyEntry);
446 KeyStore.PrivateKeyEntry privEntry = (KeyStore.PrivateKeyEntry) entry;
488 TestKeyStore.getIntermediateCa().keyStore);
494 serverKeyStore.keyStore.setCertificateEntry("client-selfSigned", x509userCert)
    [all...]

Completed in 833 milliseconds

1 2 3 4 56 7 8 9