| /external/conscrypt/src/main/java/org/conscrypt/ |
| DefaultSSLContextImpl.java | 26 import java.security.KeyStore; 67 // find KeyStore, KeyManagers 68 String keystore = System.getProperty("javax.net.ssl.keyStore"); local 69 if (keystore == null) { 75 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); 78 is = new BufferedInputStream(new FileInputStream(keystore)); 100 String keystore = System.getProperty("javax.net.ssl.trustStore") local [all...] |
| KeyManagerFactoryImpl.java | 24 import java.security.KeyStore; 41 private KeyStore keyStore; 47 * @see KeyManagerFactorySpi#engineInit(KeyStore ks, char[] password) 50 protected void engineInit(KeyStore ks, char[] password) 54 keyStore = ks; 61 keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 62 String keyStoreName = System.getProperty("javax.net.ssl.keyStore"); [all...] |
| /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
| KeyManagerFactorySpiTest.java | 19 import java.security.KeyStore; 46 * javax.net.ssl.KeyManagerFactorySpi#KengineInit(KeyStore ks, char[] password) 50 KeyStore ks; 72 ks = KeyStore.getInstance(KeyStore.getDefaultType()); 82 KeyStore kst = KeyStore.getInstance(KeyStore.getDefaultType());
|
| /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
| PKIXBuilderParameters_ImplTest.java | 26 import java.security.KeyStore; 43 * Test #1 for <code>PKIXBuilderParameters(KeyStore, CertSelector)</code> 54 KeyStore ks = TestUtils.getKeyStore(true, TestUtils.TRUSTED); 56 fail(getName() + ": not performed (could not create test KeyStore)"); 66 * Test #2 for <code>PKIXBuilderParameters(KeyStore, CertSelector)</code> 77 KeyStore ks = TestUtils.getKeyStore(true, TestUtils.TRUSTED); 79 fail(getName() + ": not performed (could not create test KeyStore)"); 89 * Test #3 for <code>PKIXBuilderParameters(KeyStore, CertSelector)</code> 91 * Assertion: Only keystore entries that contain trusted 102 KeyStore ks = TestUtils.getKeyStore(true, TestUtils.TRUSTED_AND_UNTRUSTED) [all...] |
| /development/samples/Vault/src/com/example/android/vault/ |
| SecretKeyWrapper.java | 27 import java.security.KeyStore; 37 * the platform {@link KeyStore}. This allows us to protect symmetric keys with 57 final KeyStore keyStore = KeyStore.getInstance("AndroidKeyStore"); 58 keyStore.load(null); 60 if (!keyStore.containsAlias(alias)) { 66 final KeyStore.PrivateKeyEntry entry = (KeyStore.PrivateKeyEntry) keyStore.getEntry [all...] |
| /external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
| DigitalSignatureTest.java | 20 import java.security.KeyStore; 39 KeyStore ks = JSSETestData.getKeyStore(); 40 KeyStore.PrivateKeyEntry entry = (KeyStore.PrivateKeyEntry) ks 42 new KeyStore.PasswordProtection(pwd));
|
| KeyManagerImplTest.java | 23 import java.security.KeyStore; 33 KeyStore ks = null; 34 ks = KeyStore.getInstance("BKS"); 61 KeyStore ks = JSSETestData.getKeyStore();
|
| TrustManagerImplTest.java | 23 import java.security.KeyStore; 74 KeyStore ks = KeyStore.getInstance("BKS"); 83 KeyStore ks = JSSETestData.getKeyStore();
|
| /libcore/luni/src/test/java/libcore/java/security/ |
| KeyStoreTest.java | 28 import java.security.KeyStore; 29 import java.security.KeyStore.Builder; 30 import java.security.KeyStore.Entry; 31 import java.security.KeyStore.LoadStoreParameter; 32 import java.security.KeyStore.PasswordProtection; 33 import java.security.KeyStore.PrivateKeyEntry; 34 import java.security.KeyStore.ProtectionParameter; 35 import java.security.KeyStore.SecretKeyEntry; 36 import java.security.KeyStore.TrustedCertificateEntry; 158 public static List<KeyStore> keyStores() throws Exception [all...] |
| /libcore/luni/src/test/java/tests/targets/security/ |
| KeyStoreTest.java | 24 import java.security.KeyStore; 25 import java.security.KeyStore.Entry; 26 import java.security.KeyStore.PasswordProtection; 27 import java.security.KeyStore.PrivateKeyEntry; 28 import java.security.KeyStore.ProtectionParameter; 52 KeyStore keyStore = null; 54 keyStore = KeyStore.getInstance(algorithmName); 60 keyStore.load(new ByteArrayInputStream(keyStoreData) [all...] |
| /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
| KSPasswordProtectionTest.java | 30 * Tests for <code>KeyStore.PasswordProtection</code> class constructor and methods 45 * Test for <code>KeyStore.PasswordProtection(char[] password)</code> constructor 56 KeyStore.PasswordProtection ksPWP = new KeyStore.PasswordProtection(pass);
|
| KeyStorePrivateKeyEntryTest.java | 24 import java.security.KeyStore; 72 // KeyStore.PrivateKeyEntry will return a X509Certificate array. 73 KeyStore.PrivateKeyEntry privateKeyEntry = new KeyStore.PrivateKeyEntry(
|
| KeyStore3Test.java | 29 import java.security.KeyStore; 35 import java.security.KeyStore.Builder; 36 import java.security.KeyStore.PasswordProtection; 37 import java.security.KeyStore.ProtectionParameter; 48 private KeyStore mockKeyStore; 169 KeyStore ks = KeyStore.getInstance(alias); 172 KeyStore firstKeyStore = b.getKeyStore(); 179 new KeyStore.PasswordProtection(pwd)); 191 private static class MyKeyStore extends KeyStore { [all...] |
| /libcore/luni/src/main/java/java/security/cert/ |
| PKIXBuilderParameters.java | 22 import java.security.KeyStore; 64 * {@code X509Certificate} entries from the specified {@code KeyStore}. 66 * @param keyStore 71 * if the {@code keyStore} is not initialized. 73 * if {@code keyStore} does not contained any trusted 76 public PKIXBuilderParameters(KeyStore keyStore, 80 super(keyStore);
|
| /libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/ |
| KeyManagerFactorySpiImpl.java | 4 import java.security.KeyStore; 16 public void engineInit(KeyStore ks, char[] password)
|
| /libcore/luni/src/test/java/tests/targets/security/cert/ |
| CertPathBuilderTestPKIX.java | 19 import java.security.KeyStore; 43 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 45 keyStore.load(null, null); 53 keyStore.setCertificateEntry("selfSignedCert", selfSignedcertificate); 68 keyStore, targetConstraints);
|
| /external/apache-harmony/x-net/src/test/impl/java/org/apache/harmony/xnet/tests/provider/jsse/ |
| KeyManagerFactoryImplTest.java | 21 import java.security.KeyStore; 37 * Class under test for void engineInit(KeyStore, char[]) 43 String def_keystore = System.getProperty("javax.net.ssl.keyStore"); 45 System.setProperty("javax.net.ssl.keyStore", "abc"); 51 System.clearProperty("javax.net.ssl.keyStore"); 53 System.setProperty("javax.net.ssl.keyStore", def_keystore); 80 KeyStore ks; 81 ks = KeyStore.getInstance("BKS");
|
| /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
| KeyStorePrivateKeyEntryTest.java | 24 import java.security.KeyStore; 72 // KeyStore.PrivateKeyEntry will return a X509Certificate array. 73 KeyStore.PrivateKeyEntry privateKeyEntry = new KeyStore.PrivateKeyEntry(
|
| KeyStoreSpiTest.java | 24 import java.security.KeyStore.LoadStoreParameter; 25 import java.security.KeyStore.Entry; 26 import java.security.KeyStore.ProtectionParameter; 27 import java.security.KeyStore; 60 * java.security.KeyStore.engineEntryInstanceOf(String, Class<? 69 KeyStore.PrivateKeyEntry.class)); 73 KeyStore.SecretKeyEntry.class)); 77 KeyStore.TrustedCertificateEntry.class)); 81 KeyStore.TrustedCertificateEntry.class)); 106 KeyStore.SecretKeyEntry dummyEntry = new KeyStore.SecretKeyEntry(new SecretKey() [all...] |
| /developers/build/prebuilts/gradle/BasicAndroidKeyStore/Application/src/main/java/com/example/android/basicandroidkeystore/ |
| BasicAndroidKeyStoreFragment.java | 34 import java.security.KeyStore; 100 Log.w(TAG, "KeyStore not Initialized", e); 124 Log.w(TAG, "KeyStore not Initialized", e); 184 // and the KeyStore. This example uses the AndroidKeyStore. 205 KeyStore ks = KeyStore.getInstance(SecurityConstants.KEYSTORE_PROVIDER_ANDROID_KEYSTORE); 212 KeyStore.Entry entry = ks.getEntry(mAlias, null); 216 * -Check the list of aliases by iterating over Keystore.aliases(), be sure the alias 218 * -If that's empty, verify they were both stored and pulled from the same keystore 227 /* If entry is not a KeyStore.PrivateKeyEntry, it might have gotten stored in a previou [all...] |
| /developers/samples/android/security/keystore/BasicAndroidKeyStore/Application/src/main/java/com/example/android/basicandroidkeystore/ |
| BasicAndroidKeyStoreFragment.java | 34 import java.security.KeyStore; 100 Log.w(TAG, "KeyStore not Initialized", e); 124 Log.w(TAG, "KeyStore not Initialized", e); 184 // and the KeyStore. This example uses the AndroidKeyStore. 205 KeyStore ks = KeyStore.getInstance(SecurityConstants.KEYSTORE_PROVIDER_ANDROID_KEYSTORE); 212 KeyStore.Entry entry = ks.getEntry(mAlias, null); 216 * -Check the list of aliases by iterating over Keystore.aliases(), be sure the alias 218 * -If that's empty, verify they were both stored and pulled from the same keystore 227 /* If entry is not a KeyStore.PrivateKeyEntry, it might have gotten stored in a previou [all...] |
| /development/samples/browseable/BasicAndroidKeyStore/src/com.example.android.basicandroidkeystore/ |
| BasicAndroidKeyStoreFragment.java | 34 import java.security.KeyStore; 100 Log.w(TAG, "KeyStore not Initialized", e); 124 Log.w(TAG, "KeyStore not Initialized", e); 184 // and the KeyStore. This example uses the AndroidKeyStore. 205 KeyStore ks = KeyStore.getInstance(SecurityConstants.KEYSTORE_PROVIDER_ANDROID_KEYSTORE); 212 KeyStore.Entry entry = ks.getEntry(mAlias, null); 216 * -Check the list of aliases by iterating over Keystore.aliases(), be sure the alias 218 * -If that's empty, verify they were both stored and pulled from the same keystore 227 /* If entry is not a KeyStore.PrivateKeyEntry, it might have gotten stored in a previou [all...] |
| /frameworks/base/keystore/java/android/security/ |
| AndroidKeyPairGenerator.java | 44 * Android keystore service usable only by the application that called it. This 46 * {@link java.security.KeyStore#getInstance(String)} using the 56 private android.security.KeyStore mKeyStore; 61 * Generate a KeyPair which is backed by the Android keystore service. You 67 * This will create an entry in the Android keystore service with a 82 if (((mSpec.getFlags() & KeyStore.FLAG_ENCRYPTED) != 0) 83 && (mKeyStore.state() != KeyStore.State.UNLOCKED)) { 85 "Android keystore must be in initialized and unlocked state " 93 final int keyType = KeyStore.getKeyTypeForAlgorithm(mSpec.getKeyType()); 97 if (!mKeyStore.generate(privateKeyAlias, KeyStore.UID_SELF, keyType [all...] |
| /packages/apps/Settings/tests/src/com/android/settings/vpn2/ |
| CertInstallerHelper.java | 21 import android.security.KeyStore; 42 import java.security.KeyStore.PasswordProtection; 43 import java.security.KeyStore.PrivateKeyEntry; 57 * and install certificates to keystore. 61 /* Define a password to unlock keystore after it is reset */ 63 private final int mUid = KeyStore.UID_SELF; 67 private KeyStore mKeyStore = KeyStore.getInstance(); 70 * Unlock keystore and set password 80 java.security.KeyStore keystore = null local [all...] |
| /external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/ |
| SslContextBuilder.java | 27 import java.security.KeyStore; 89 KeyStore keyStore = newEmptyKeyStore(password); 91 keyStore.setKeyEntry("private", keyPair.getPrivate(), password, certificateChain); 92 keyStore.setCertificateEntry("cert", certificate); 97 keyManagerFactory.init(keyStore, password); 100 trustManagerFactory.init(keyStore); 132 private KeyStore newEmptyKeyStore(char[] password) throws GeneralSecurityException { 134 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()) [all...] |