HomeSort by relevance Sort by last modified time
    Searched refs:KeyStore (Results 126 - 150 of 303) sorted by null

1 2 3 4 56 7 8 91011>>

  /libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/
X509KeyManagerImpl.java 4 import java.security.KeyStore;
21 private KeyStore keyTest;
92 keyTest = KeyStore.getInstance(KeyStore.getDefaultType());
98 //keyTest = KeyStore.getInstance(KeyStore.getDefaultType());
107 //keyTest = KeyStore.getInstance(KeyStore.getDefaultType());
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/
TrustManagerFactory1Test.java 23 import java.security.KeyStore;
376 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType());
389 * Test for <code>init(KeyStore keyStore)</code>
393 KeyStore ksNull = null;
405 * Test for <code>init(KeyStore keyStore)</code>
409 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType())
    [all...]
SSLContext1Test.java 22 import java.security.KeyStore;
457 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType());
494 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType());
532 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType())
    [all...]
SSLSessionTest.java 24 import java.security.KeyStore;
80 KeyStore store = server.getStore();
159 KeyStore store = client.getStore();
170 KeyStore store = client.getStore();
354 * Defines the keystore contents for the server, BKS version. Holds just a
384 * Defines the keystore contents for the client, BKS version. Holds just a
414 * Defines the keystore contents for the server, JKS version. Holds just a
444 * Defines the keystore contents for the client, JKS version. Holds just a
507 private KeyStore store;
568 public KeyStore getStore()
    [all...]
KeyManagerFactory1Test.java 22 import java.security.KeyStore;
435 * Test for <code>init(KeyStore keyStore, char[] password)</code> and
448 KeyStore ksNull = null;
457 KeyStore ks;
459 ks = KeyStore.getInstance(KeyStore.getDefaultType());
462 fail(e.toString() + "default KeyStore type is not supported");
504 KeyStore.ProtectionParameter pp = new ProtectionParameterImpl();
505 KeyStore.Builder bld = KeyStore.Builder.newInstance("testType", null, pp)
    [all...]
  /libcore/luni/src/test/java/libcore/javax/net/ssl/
KeyStoreBuilderParametersTest.java 19 import java.security.KeyStore.Builder;
20 import java.security.KeyStore.PasswordProtection;
38 Builder builder = Builder.newInstance(testKeyStore.keyStore,
57 Builder builder1 = Builder.newInstance(testKeyStore1.keyStore,
59 Builder builder2 = Builder.newInstance(testKeyStore2.keyStore,
TrustManagerFactoryTest.java 21 import java.security.KeyStore.PrivateKeyEntry;
22 import java.security.KeyStore;
99 PKIXParameters pp = new PKIXParameters(getTestKeyStore().keyStore);
108 PKIXBuilderParameters pbp = new PKIXBuilderParameters(getTestKeyStore().keyStore, xcs);
121 // init with null for default KeyStore
122 tmf.init((KeyStore) null);
126 tmf.init(getTestKeyStore().keyStore);
217 // keyStore should contain only the intermediate CA so we can
220 KeyStore keyStore = TestKeyStore.createKeyStore()
    [all...]
  /cts/tests/tests/security/src/android/security/cts/
X509CertChainBuildingTest.java 27 import java.security.KeyStore;
174 private static X509TrustManager getTrustManager(KeyStore ks, Provider p) throws Exception {
192 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType());
196 ks.setEntry(String.valueOf(i++), new KeyStore.TrustedCertificateEntry(root), null);
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyStore3Test.java 31 import java.security.KeyStore;
45 private KeyStore mockKeyStore;
154 assertTrue(ks instanceof KeyStore);
162 assertTrue(ks instanceof KeyStore);
174 private static class MyKeyStore extends KeyStore {
250 public void engineStore(KeyStore.LoadStoreParameter param){
  /frameworks/base/keystore/java/android/security/keystore/
AndroidKeyStoreAuthenticatedAESCipherSpi.java 17 package android.security.keystore;
22 import android.security.KeyStore;
27 import android.security.keystore.KeyStoreCryptoOperationChunkedStreamer.Stream;
47 * Base class for Android Keystore authenticated AES {@link CipherSpi} implementations.
176 KeyStore keyStore, IBinder operationToken) {
179 keyStore, operationToken));
184 // plaintext before ciphertext is authenticated by KeyStore.finish.
192 KeyStore keyStore, IBinder operationToken)
    [all...]
AndroidKeyStoreKeyGeneratorSpi.java 17 package android.security.keystore;
20 import android.security.KeyStore;
24 import android.security.keystore.KeyGenParameterSpec;
25 import android.security.keystore.KeyProperties;
39 * {@link KeyGeneratorSpi} backed by Android KeyStore.
100 private final KeyStore mKeyStore = KeyStore.getInstance();
162 throw new InvalidAlgorithmParameterException("KeyStore entry alias not provided");
312 if (errorCode != KeyStore.NO_ERROR) {
314 "Keystore operation failed", KeyStore.getKeyStoreException(errorCode))
    [all...]
AndroidKeyStoreSecretKeyFactorySpi.java 17 package android.security.keystore;
21 import android.security.KeyStore;
39 * {@link SecretKeyFactorySpi} backed by Android Keystore.
45 private final KeyStore mKeyStore = KeyStore.getInstance();
54 throw new InvalidKeySpecException("Only Android KeyStore secret keys supported: " +
59 "Key material export of Android KeyStore keys is not supported");
76 static KeyInfo getKeyInfo(KeyStore keyStore, String entryAlias, String keyAliasInKeystore,
79 int errorCode = keyStore.getKeyCharacteristics
    [all...]
AndroidKeyStoreSignatureSpiBase.java 17 package android.security.keystore;
22 import android.security.KeyStore;
41 * Base class for {@link SignatureSpi} implementations of Android KeyStore backed ciphers.
47 private final KeyStore mKeyStore;
49 // Fields below are populated by SignatureSpi.engineInitSign/engineInitVerify and KeyStore.begin
55 * Token referencing this operation inside keystore service. It is initialized by
72 mKeyStore = KeyStore.getInstance();
205 true, // permit aborting this operation if keystore runs out of resources
213 // Store operation token and handle regardless of the error code returned by KeyStore to
218 // If necessary, throw an exception due to KeyStore operation having failed
    [all...]
AndroidKeyStoreECDSASignatureSpi.java 17 package android.security.keystore;
21 import android.security.KeyStore;
34 * Base class for {@link SignatureSpi} providing Android KeyStore backed ECDSA signatures.
46 protected KeyStoreCryptoOperationStreamer createMainDataStreamer(KeyStore keyStore,
49 super.createMainDataStreamer(keyStore, operationToken),
55 * KeyStore via the provided delegate streamer.
159 if (errorCode != KeyStore.NO_ERROR) {
AndroidKeyStoreHmacSpi.java 17 package android.security.keystore;
20 import android.security.KeyStore;
35 * {@link MacSpi} which provides HMAC implementations backed by Android KeyStore.
71 private final KeyStore mKeyStore = KeyStore.getInstance();
116 "Only Android KeyStore secret keys supported. Key: " + key);
178 // Store operation token and handle regardless of the error code returned by KeyStore to
183 // If necessary, throw an exception due to KeyStore operation having failed.
191 throw new ProviderException("Keystore returned null operation token");
194 throw new ProviderException("Keystore returned invalid operation handle")
    [all...]
AndroidKeyStoreKeyFactorySpi.java 17 package android.security.keystore;
20 import android.security.KeyStore;
35 * {@link KeyFactorySpi} backed by Android KeyStore.
41 private final KeyStore mKeyStore = KeyStore.getInstance();
52 + ". This KeyFactory supports only Android Keystore asymmetric keys");
55 // key is an Android Keystore private or public key
63 + ". KeyInfo can be obtained only for Android Keystore private keys");
81 + ". X509EncodedKeySpec can be obtained only for Android Keystore public"
90 "Key material export of Android Keystore private keys is not supported")
    [all...]
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/
KeyCheckPage.java 45 import java.security.KeyStore;
46 import java.security.KeyStore.PrivateKeyEntry;
191 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType());
193 keyStore.load(fis, mWizard.getKeystorePassword().toCharArray());
195 PrivateKeyEntry entry = (KeyStore.PrivateKeyEntry)keyStore.getEntry(
197 new KeyStore.PasswordProtection
    [all...]
  /libcore/support/src/test/java/libcore/javax/net/ssl/
TestSSLContext.java 30 import java.security.KeyStore;
88 public final KeyStore clientKeyStore;
90 public final KeyStore serverKeyStore;
203 private TestSSLContext(KeyStore clientKeyStore,
205 KeyStore serverKeyStore,
270 return create(client.keyStore, client.storePassword,
271 server.keyStore, server.storePassword,
283 public static TestSSLContext create(KeyStore clientKeyStore, char[] clientStorePassword,
284 KeyStore serverKeyStore, char[] serverStorePassword,
314 * certificate chain from the given KeyStore and a TrustManage
    [all...]
  /packages/apps/CertInstaller/src/com/android/certinstaller/
CredentialHelper.java 41 import java.security.KeyStore.PasswordProtection;
42 import java.security.KeyStore.PrivateKeyEntry;
43 import java.security.KeyStore;
364 java.security.KeyStore keystore = loadPkcs12Internal(password); local
366 Enumeration<String> aliases = keystore.aliases();
373 if (keystore.isKeyEntry(alias)) {
374 KeyStore.Entry entry = keystore.getEntry(alias, password);
384 // KeyStore.getEntry with non-null ProtectionParameter can only be invoked o
395 java.security.KeyStore keystore = java.security.KeyStore.getInstance("PKCS12"); local
    [all...]
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/security/
FingerprintBoundKeysTest.java 35 import android.security.keystore.KeyGenParameterSpec;
36 import android.security.keystore.KeyPermanentlyInvalidatedException;
37 import android.security.keystore.KeyProperties;
38 import android.security.keystore.UserNotAuthenticatedException;
47 import java.security.KeyStore;
131 KeyStore keyStore = KeyStore.getInstance("AndroidKeyStore");
132 keyStore.load(null);
136 // Set the alias of the entry in Android KeyStore where the key will appea
    [all...]
  /frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/
MockKeyStore.java 8 import android.security.KeyStore;
35 public KeyStore createMock() {
36 KeyStore mock = mock(KeyStore.class);
37 when(mock.state()).thenReturn(KeyStore.State.UNLOCKED);
155 sb.append("KeyStore {");
  /packages/apps/KeyChain/tests/src/com/android/keychain/tests/
KeyChainServiceTest.java 27 import android.security.KeyStore;
30 import java.security.KeyStore.PrivateKeyEntry;
145 Log.d(TAG, "test_KeyChainService setup keystore");
146 KeyStore keyStore = KeyStore.getInstance();
192 assertEquals(KeyStore.State.UNLOCKED, keyStore.state());
  /frameworks/base/packages/Osu/src/com/android/hotspot2/osu/
ClientKeyManager.java 10 import java.security.KeyStore;
24 private final KeyStore mKeyStore;
30 public ClientKeyManager(HomeSP homeSP, KeyStore keyStore) throws IOException {
31 mKeyStore = keyStore;
  /system/security/keystore/
keystore.h 33 class KeyStore {
35 KeyStore(Entropy* entropy, keymaster2_device_t* device, keymaster2_device_t* fallback);
36 ~KeyStore();
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/
PKIXBuilderParametersTest.java 25 import java.security.KeyStore;
175 * Test #4 for <code>PKIXBuilderParameters(KeyStore, CertSelector)</code>
178 * if the <code>keystore</code> is <code>null</code>
183 new PKIXBuilderParameters((KeyStore) null, null);

Completed in 2847 milliseconds

1 2 3 4 56 7 8 91011>>