/libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/ |
X509KeyManagerImpl.java | 4 import java.security.KeyStore; 21 private KeyStore keyTest; 92 keyTest = KeyStore.getInstance(KeyStore.getDefaultType()); 98 //keyTest = KeyStore.getInstance(KeyStore.getDefaultType()); 107 //keyTest = KeyStore.getInstance(KeyStore.getDefaultType());
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
TrustManagerFactory1Test.java | 23 import java.security.KeyStore; 376 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); 389 * Test for <code>init(KeyStore keyStore)</code> 393 KeyStore ksNull = null; 405 * Test for <code>init(KeyStore keyStore)</code> 409 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()) [all...] |
SSLContext1Test.java | 22 import java.security.KeyStore; 457 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); 494 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); 532 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()) [all...] |
SSLSessionTest.java | 24 import java.security.KeyStore; 80 KeyStore store = server.getStore(); 159 KeyStore store = client.getStore(); 170 KeyStore store = client.getStore(); 354 * Defines the keystore contents for the server, BKS version. Holds just a 384 * Defines the keystore contents for the client, BKS version. Holds just a 414 * Defines the keystore contents for the server, JKS version. Holds just a 444 * Defines the keystore contents for the client, JKS version. Holds just a 507 private KeyStore store; 568 public KeyStore getStore() [all...] |
KeyManagerFactory1Test.java | 22 import java.security.KeyStore; 435 * Test for <code>init(KeyStore keyStore, char[] password)</code> and 448 KeyStore ksNull = null; 457 KeyStore ks; 459 ks = KeyStore.getInstance(KeyStore.getDefaultType()); 462 fail(e.toString() + "default KeyStore type is not supported"); 504 KeyStore.ProtectionParameter pp = new ProtectionParameterImpl(); 505 KeyStore.Builder bld = KeyStore.Builder.newInstance("testType", null, pp) [all...] |
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
KeyStoreBuilderParametersTest.java | 19 import java.security.KeyStore.Builder; 20 import java.security.KeyStore.PasswordProtection; 38 Builder builder = Builder.newInstance(testKeyStore.keyStore, 57 Builder builder1 = Builder.newInstance(testKeyStore1.keyStore, 59 Builder builder2 = Builder.newInstance(testKeyStore2.keyStore,
|
TrustManagerFactoryTest.java | 21 import java.security.KeyStore.PrivateKeyEntry; 22 import java.security.KeyStore; 99 PKIXParameters pp = new PKIXParameters(getTestKeyStore().keyStore); 108 PKIXBuilderParameters pbp = new PKIXBuilderParameters(getTestKeyStore().keyStore, xcs); 121 // init with null for default KeyStore 122 tmf.init((KeyStore) null); 126 tmf.init(getTestKeyStore().keyStore); 217 // keyStore should contain only the intermediate CA so we can 220 KeyStore keyStore = TestKeyStore.createKeyStore() [all...] |
/cts/tests/tests/security/src/android/security/cts/ |
X509CertChainBuildingTest.java | 27 import java.security.KeyStore; 174 private static X509TrustManager getTrustManager(KeyStore ks, Provider p) throws Exception { 192 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); 196 ks.setEntry(String.valueOf(i++), new KeyStore.TrustedCertificateEntry(root), null);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStore3Test.java | 31 import java.security.KeyStore; 45 private KeyStore mockKeyStore; 154 assertTrue(ks instanceof KeyStore); 162 assertTrue(ks instanceof KeyStore); 174 private static class MyKeyStore extends KeyStore { 250 public void engineStore(KeyStore.LoadStoreParameter param){
|
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreAuthenticatedAESCipherSpi.java | 17 package android.security.keystore; 22 import android.security.KeyStore; 27 import android.security.keystore.KeyStoreCryptoOperationChunkedStreamer.Stream; 47 * Base class for Android Keystore authenticated AES {@link CipherSpi} implementations. 176 KeyStore keyStore, IBinder operationToken) { 179 keyStore, operationToken)); 184 // plaintext before ciphertext is authenticated by KeyStore.finish. 192 KeyStore keyStore, IBinder operationToken) [all...] |
AndroidKeyStoreKeyGeneratorSpi.java | 17 package android.security.keystore; 20 import android.security.KeyStore; 24 import android.security.keystore.KeyGenParameterSpec; 25 import android.security.keystore.KeyProperties; 39 * {@link KeyGeneratorSpi} backed by Android KeyStore. 100 private final KeyStore mKeyStore = KeyStore.getInstance(); 162 throw new InvalidAlgorithmParameterException("KeyStore entry alias not provided"); 312 if (errorCode != KeyStore.NO_ERROR) { 314 "Keystore operation failed", KeyStore.getKeyStoreException(errorCode)) [all...] |
AndroidKeyStoreSecretKeyFactorySpi.java | 17 package android.security.keystore; 21 import android.security.KeyStore; 39 * {@link SecretKeyFactorySpi} backed by Android Keystore. 45 private final KeyStore mKeyStore = KeyStore.getInstance(); 54 throw new InvalidKeySpecException("Only Android KeyStore secret keys supported: " + 59 "Key material export of Android KeyStore keys is not supported"); 76 static KeyInfo getKeyInfo(KeyStore keyStore, String entryAlias, String keyAliasInKeystore, 79 int errorCode = keyStore.getKeyCharacteristics [all...] |
AndroidKeyStoreSignatureSpiBase.java | 17 package android.security.keystore; 22 import android.security.KeyStore; 41 * Base class for {@link SignatureSpi} implementations of Android KeyStore backed ciphers. 47 private final KeyStore mKeyStore; 49 // Fields below are populated by SignatureSpi.engineInitSign/engineInitVerify and KeyStore.begin 55 * Token referencing this operation inside keystore service. It is initialized by 72 mKeyStore = KeyStore.getInstance(); 205 true, // permit aborting this operation if keystore runs out of resources 213 // Store operation token and handle regardless of the error code returned by KeyStore to 218 // If necessary, throw an exception due to KeyStore operation having failed [all...] |
AndroidKeyStoreECDSASignatureSpi.java | 17 package android.security.keystore; 21 import android.security.KeyStore; 34 * Base class for {@link SignatureSpi} providing Android KeyStore backed ECDSA signatures. 46 protected KeyStoreCryptoOperationStreamer createMainDataStreamer(KeyStore keyStore, 49 super.createMainDataStreamer(keyStore, operationToken), 55 * KeyStore via the provided delegate streamer. 159 if (errorCode != KeyStore.NO_ERROR) {
|
AndroidKeyStoreHmacSpi.java | 17 package android.security.keystore; 20 import android.security.KeyStore; 35 * {@link MacSpi} which provides HMAC implementations backed by Android KeyStore. 71 private final KeyStore mKeyStore = KeyStore.getInstance(); 116 "Only Android KeyStore secret keys supported. Key: " + key); 178 // Store operation token and handle regardless of the error code returned by KeyStore to 183 // If necessary, throw an exception due to KeyStore operation having failed. 191 throw new ProviderException("Keystore returned null operation token"); 194 throw new ProviderException("Keystore returned invalid operation handle") [all...] |
AndroidKeyStoreKeyFactorySpi.java | 17 package android.security.keystore; 20 import android.security.KeyStore; 35 * {@link KeyFactorySpi} backed by Android KeyStore. 41 private final KeyStore mKeyStore = KeyStore.getInstance(); 52 + ". This KeyFactory supports only Android Keystore asymmetric keys"); 55 // key is an Android Keystore private or public key 63 + ". KeyInfo can be obtained only for Android Keystore private keys"); 81 + ". X509EncodedKeySpec can be obtained only for Android Keystore public" 90 "Key material export of Android Keystore private keys is not supported") [all...] |
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/ |
KeyCheckPage.java | 45 import java.security.KeyStore; 46 import java.security.KeyStore.PrivateKeyEntry; 191 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 193 keyStore.load(fis, mWizard.getKeystorePassword().toCharArray()); 195 PrivateKeyEntry entry = (KeyStore.PrivateKeyEntry)keyStore.getEntry( 197 new KeyStore.PasswordProtection [all...] |
/libcore/support/src/test/java/libcore/javax/net/ssl/ |
TestSSLContext.java | 30 import java.security.KeyStore; 88 public final KeyStore clientKeyStore; 90 public final KeyStore serverKeyStore; 203 private TestSSLContext(KeyStore clientKeyStore, 205 KeyStore serverKeyStore, 270 return create(client.keyStore, client.storePassword, 271 server.keyStore, server.storePassword, 283 public static TestSSLContext create(KeyStore clientKeyStore, char[] clientStorePassword, 284 KeyStore serverKeyStore, char[] serverStorePassword, 314 * certificate chain from the given KeyStore and a TrustManage [all...] |
/packages/apps/CertInstaller/src/com/android/certinstaller/ |
CredentialHelper.java | 41 import java.security.KeyStore.PasswordProtection; 42 import java.security.KeyStore.PrivateKeyEntry; 43 import java.security.KeyStore; 364 java.security.KeyStore keystore = loadPkcs12Internal(password); local 366 Enumeration<String> aliases = keystore.aliases(); 373 if (keystore.isKeyEntry(alias)) { 374 KeyStore.Entry entry = keystore.getEntry(alias, password); 384 // KeyStore.getEntry with non-null ProtectionParameter can only be invoked o 395 java.security.KeyStore keystore = java.security.KeyStore.getInstance("PKCS12"); local [all...] |
/cts/apps/CtsVerifier/src/com/android/cts/verifier/security/ |
FingerprintBoundKeysTest.java | 35 import android.security.keystore.KeyGenParameterSpec; 36 import android.security.keystore.KeyPermanentlyInvalidatedException; 37 import android.security.keystore.KeyProperties; 38 import android.security.keystore.UserNotAuthenticatedException; 47 import java.security.KeyStore; 131 KeyStore keyStore = KeyStore.getInstance("AndroidKeyStore"); 132 keyStore.load(null); 136 // Set the alias of the entry in Android KeyStore where the key will appea [all...] |
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/ |
MockKeyStore.java | 8 import android.security.KeyStore; 35 public KeyStore createMock() { 36 KeyStore mock = mock(KeyStore.class); 37 when(mock.state()).thenReturn(KeyStore.State.UNLOCKED); 155 sb.append("KeyStore {");
|
/packages/apps/KeyChain/tests/src/com/android/keychain/tests/ |
KeyChainServiceTest.java | 27 import android.security.KeyStore; 30 import java.security.KeyStore.PrivateKeyEntry; 145 Log.d(TAG, "test_KeyChainService setup keystore"); 146 KeyStore keyStore = KeyStore.getInstance(); 192 assertEquals(KeyStore.State.UNLOCKED, keyStore.state());
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
ClientKeyManager.java | 10 import java.security.KeyStore; 24 private final KeyStore mKeyStore; 30 public ClientKeyManager(HomeSP homeSP, KeyStore keyStore) throws IOException { 31 mKeyStore = keyStore;
|
/system/security/keystore/ |
keystore.h | 33 class KeyStore { 35 KeyStore(Entropy* entropy, keymaster2_device_t* device, keymaster2_device_t* fallback); 36 ~KeyStore();
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
PKIXBuilderParametersTest.java | 25 import java.security.KeyStore; 175 * Test #4 for <code>PKIXBuilderParameters(KeyStore, CertSelector)</code> 178 * if the <code>keystore</code> is <code>null</code> 183 new PKIXBuilderParameters((KeyStore) null, null);
|