| /frameworks/base/services/core/java/com/android/server/ |
| LockSettingsService.java | 44 import android.security.KeyStore; 105 final KeyStore ks = KeyStore.getInstance(); 107 // Clear up keystore in case anything was left behind by previous users 110 // If this user has a parent, sync with its keystore password 270 final KeyStore ks = KeyStore.getInstance(); 275 // For historical reasons, don't wipe a non-empty keystore if we have a single user with a 399 final KeyStore ks = KeyStore.getInstance() [all...] |
| /external/apache-harmony/x-net/src/test/api/java/org/apache/harmony/xnet/tests/javax/net/ssl/ |
| KeyManagerFactory1Test.java | 21 import java.security.KeyStore; 371 * Test for <code>init(KeyStore keyStore, char[] password)</code> and 382 KeyStore ksNull = null; 391 KeyStore ks; 392 ks = KeyStore.getInstance(KeyStore.getDefaultType());
|
| TrustManagerFactory1Test.java | 21 import java.security.KeyStore; 372 * Test for <code>init(KeyStore keyStore)</code> and 381 KeyStore ks; 382 KeyStore ksNull = null; 383 ks = KeyStore.getInstance(KeyStore.getDefaultType());
|
| /packages/apps/CertInstaller/src/com/android/certinstaller/ |
| CertInstaller.java | 32 import android.security.KeyStore; 49 * Installs certificates to the system keystore. 67 // key to KeyStore 74 private final KeyStore mKeyStore = KeyStore.getInstance(); 277 if (!mKeyStore.put(PKEY_MAP_KEY, bytes, KeyStore.UID_SELF, KeyStore.FLAG_ENCRYPTED)) { 380 mCredentials.setInstallAsUid(KeyStore.UID_SELF); 411 // install everything to system keystore 460 // Note: one key takes about 1300 bytes in the keystore, so b [all...] |
| CredentialHelper.java | 36 import java.security.KeyStore.PasswordProtection; 37 import java.security.KeyStore.PrivateKeyEntry; 38 import java.security.KeyStore; 326 java.security.KeyStore keystore = java.security.KeyStore.getInstance("PKCS12"); local 328 keystore.load(new ByteArrayInputStream(getData(KeyChain.EXTRA_PKCS12)), 331 Enumeration<String> aliases = keystore.aliases(); 338 KeyStore.Entry entry = keystore.getEntry(alias, passwordProtection) [all...] |
| /external/conscrypt/src/test/java/org/conscrypt/ |
| CertPinManagerTest.java | 22 import java.security.KeyStore; 59 KeyStore.PrivateKeyEntry pke = TestKeyStore.getServer().getPrivateKey("RSA", "RSA");
|
| /external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/cert/ |
| TestUtils.java | 30 import java.security.KeyStore; 59 // The file name prefix to load keystore from 63 // The file name suffixes to load keystore from 64 // *.ks1 - keystore containing untrusted certificates only 65 // *.ks2 - keystore containing trusted certificates only 66 // *.ks3 - keystore containing both trusted and untrusted certificates 134 * Creates test <code>KeyStore</code> instance 136 * @param initialize Do not initialize returned <code>KeyStore</code> if false 139 * 1 - <code>KeyStore</code> with untrusted certificates only<br> 140 * 2 - <code>KeyStore</code> with trusted certificates only<br [all...] |
| /frameworks/base/keystore/java/android/security/ |
| KeyStore.java | 32 public class KeyStore { 33 private static final String TAG = "KeyStore"; 61 private KeyStore(IKeystoreService binder) { 65 public static KeyStore getInstance() { 66 IKeystoreService keystore = IKeystoreService.Stub.asInterface(ServiceManager local 67 .getService("android.security.keystore")); 68 return new KeyStore(keystore); 88 Log.w(TAG, "Cannot connect to keystore", e); 108 Log.w(TAG, "Cannot connect to keystore", e) [all...] |
| Credentials.java | 216 static boolean deleteAllTypesForAlias(KeyStore keystore, String alias) { 221 return keystore.delKey(Credentials.USER_PRIVATE_KEY + alias) 222 | deleteCertificateTypesForAlias(keystore, alias); 230 static boolean deleteCertificateTypesForAlias(KeyStore keystore, String alias) { 235 return keystore.delete(Credentials.USER_CERTIFICATE + alias) 236 | keystore.delete(Credentials.CA_CERTIFICATE + alias);
|
| /external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
| MyKeyStore.java | 29 import java.security.KeyStore; 41 * Additional class for KeyStoreSpi and KeyStore verification 223 public void engineStore(KeyStore.LoadStoreParameter param) 230 public void engineLoad(KeyStore.LoadStoreParameter param)
|
| /frameworks/base/core/java/android/net/http/ |
| CertificateChainValidator.java | 28 import java.security.KeyStore; 82 tmf.init((KeyStore) null); 177 tmf.init((KeyStore) null);
|
| /libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
| MyKeyStore.java | 30 import java.security.KeyStore; 42 * Additional class for KeyStoreSpi and KeyStore verification 225 public void engineStore(KeyStore.LoadStoreParameter param) 232 public void engineLoad(KeyStore.LoadStoreParameter param)
|
| TestKeyStoreSpi.java | 14 import java.security.KeyStore.LoadStoreParameter; 15 import java.security.KeyStore.PasswordProtection; 16 import java.security.KeyStore.ProtectionParameter;
|
| /packages/apps/KeyChain/src/com/android/keychain/ |
| KeyChainService.java | 37 import android.security.KeyStore; 92 private final KeyStore mKeyStore = KeyStore.getInstance(); 126 throw new IllegalStateException("keystore is " 156 KeyStore.FLAG_ENCRYPTED)) { 161 KeyStore.FLAG_ENCRYPTED)) {
|
| /frameworks/base/tests/CoreTests/android/core/ |
| SSLSocketTest.java | 35 import java.security.KeyStore; 322 KeyStore ks = KeyStore.getInstance("BKS"); 328 assertEquals("BKS", KeyStore.getDefaultType()); 458 * Defines the keystore contents for the server, JKS version. Holds just a 488 * Defines the keystore contents for the server, BKS version. Holds just a 518 * Defines the keystore contents for the client, JKS version. Holds just a 548 * Defines the keystore contents for the client, BKS version. Holds just a 577 * Defines the password for the keystore. [all...] |
| /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/ |
| ExportWizard.java | 57 import java.security.KeyStore; 58 import java.security.KeyStore.PrivateKeyEntry; 77 static final String PROPERTY_KEYSTORE = "keystore"; //$NON-NLS-1$ 92 /** bit mask constant for keystore data change event */ 240 // if needed, create the keystore and/or key. 263 // keystore creation error! 268 // keystore is created, now load the private key and certificate. 269 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()) [all...] |
| /frameworks/base/services/core/java/com/android/server/net/ |
| LockdownVpnTracker.java | 37 import android.security.KeyStore; 88 return KeyStore.getInstance().contains(Credentials.LOCKDOWN_VPN); 168 mVpn.startLegacyVpnPrivileged(mProfile, KeyStore.getInstance(), egressProp);
|
| /libcore/luni/src/test/java/libcore/javax/net/ssl/ |
| KeyManagerFactoryTest.java | 20 import java.security.KeyStore.Builder; 21 import java.security.KeyStore.PasswordProtection; 22 import java.security.KeyStore.PrivateKeyEntry; 105 Builder builder = Builder.newInstance(getTestKeyStore().keyStore, pp); 123 kmf.init(getTestKeyStore().keyStore, getTestKeyStore().storePassword);
|
| /frameworks/base/keystore/tests/src/android/security/ |
| KeyPairGeneratorSpecTest.java | 87 assertEquals("encryption flag should be on", KeyStore.FLAG_ENCRYPTED, spec.getFlags());
|
| /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
| HandshakeCompletedEventTest.java | 26 import java.security.KeyStore; 210 * Defines the keystore contents for the server, BKS version. Holds just a 240 * Defines the keystore contents for the server, JKS version. Holds just a 270 * Defines the keystore contents for the client, JKS version. Holds just a 300 * Defines the keystore contents for the client, BKS version. Holds just a 536 * Loads a keystore from a base64-encoded String. Returns the KeyManager[] 543 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()) [all...] |
| SSLSocketTest.java | 25 import java.security.KeyStore; 425 * Defines the keystore contents for the server, BKS version. Holds just a 455 * Defines the keystore contents for the server, JKS version. Holds just a 586 * Loads a keystore from a base64-encoded String. Returns the KeyManager[] 593 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 594 keyStore.load(inputStream, PASSWORD.toCharArray()); 599 keyManagerFactory.init(keyStore, PASSWORD.toCharArray()) [all...] |
| /libcore/support/src/test/java/org/apache/harmony/security/tests/support/cert/ |
| TestUtils.java | 32 import java.security.KeyStore; 70 // The file name prefix to load keystore from 74 // The file name suffixes to load keystore from 75 // *.ks1 - keystore containing untrusted certificates only 76 // *.ks2 - keystore containing trusted certificates only 77 // *.ks3 - keystore containing both trusted and untrusted certificates 141 * Creates test <code>KeyStore</code> instance 144 * Do not initialize returned <code>KeyStore</code> if false 149 * 1 - <code>KeyStore</code> with untrusted certificates only<br> 150 * 2 - <code>KeyStore</code> with trusted certificates only<br [all...] |
| /libcore/luni/src/main/java/java/security/cert/ |
| PKIXParameters.java | 21 import java.security.KeyStore; 90 * X509Certificate} entries from the specified {@code KeyStore}. 92 * @param keyStore 95 * if the {@code keyStore} is not initialized. 97 * if {@code keyStore} does not contained any trusted 100 public PKIXParameters(KeyStore keyStore) 103 if (keyStore == null) { 104 throw new NullPointerException("keyStore == null"); 107 // keyStore has not been initialized (loaded [all...] |
| /external/smack/src/org/jivesoftware/smack/ |
| XMPPConnection.java | 51 import java.security.KeyStore; 124 * to prompt for a password to unlock the keystore containing the SSL certificate. 127 * @param callbackHandler the CallbackHandler used to prompt for the password to the keystore. 140 * with no callback handler for password prompting of the keystore. This will work 156 * with no callback handler for password prompting of the keystore. This will work 180 * to prompt for a password to unlock the keystore containing the SSL certificate. 183 * @param callbackHandler the CallbackHandler used to prompt for the password to the keystore. 807 KeyStore ks = null; 814 //System.out.println("Keystore type: "+configuration.getKeystoreType()); 826 ks = KeyStore.getInstance("PKCS11",p) [all...] |
| /cts/tests/tests/keystore/src/android/keystore/cts/ |
| AndroidKeyPairGeneratorTest.java | 17 package android.keystore.cts; 27 import java.security.KeyStore; 63 private KeyStore mKeyStore; 87 mKeyStore = KeyStore.getInstance("AndroidKeyStore"); 442 KeyStore.Entry entry = mKeyStore.getEntry(alias, null); 445 assertTrue("Entry should be a PrivateKeyEntry", entry instanceof KeyStore.PrivateKeyEntry); 446 KeyStore.PrivateKeyEntry privEntry = (KeyStore.PrivateKeyEntry) entry; 488 TestKeyStore.getIntermediateCa().keyStore); 494 serverKeyStore.keyStore.setCertificateEntry("client-selfSigned", x509userCert) [all...] |