/external/conscrypt/platform/src/main/java/org/conscrypt/ |
TrustManagerFactoryImpl.java | 39 import java.security.KeyStore; 57 private KeyStore keyStore; 60 * @see javax.net.ssl.TrustManagerFactorySpi#engineInit(KeyStore) 63 public void engineInit(KeyStore ks) throws KeyStoreException { 65 keyStore = ks; 67 keyStore = KeyStore.getInstance("AndroidCAStore"); 69 keyStore.load(null, null); 95 if (keyStore == null) [all...] |
/external/conscrypt/common/src/main/java/org/conscrypt/ |
KeyManagerFactoryImpl.java | 24 import java.security.KeyStore; 42 private KeyStore keyStore; 48 * @see KeyManagerFactorySpi#engineInit(KeyStore ks, char[] password) 51 protected void engineInit(KeyStore ks, char[] password) 55 keyStore = ks; 62 keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 63 String keyStoreName = System.getProperty("javax.net.ssl.keyStore"); [all...] |
/libcore/luni/src/test/java/tests/targets/security/ |
KeyStoreTest.java | 24 import java.security.KeyStore; 25 import java.security.KeyStore.Entry; 26 import java.security.KeyStore.PasswordProtection; 27 import java.security.KeyStore.PrivateKeyEntry; 28 import java.security.KeyStore.ProtectionParameter; 52 KeyStore keyStore = null; 54 keyStore = KeyStore.getInstance(algorithmName); 60 keyStore.load(new ByteArrayInputStream(keyStoreData) [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStore4Test.java | 15 import java.security.KeyStore; 23 import java.security.KeyStore.Entry; 24 import java.security.KeyStore.ProtectionParameter; 31 KeyStore keyStore; 32 KeyStore uninitialized; 33 KeyStore failing; 43 keyStore = KeyStore.getInstance(KEY_STORE_TYPE); 44 keyStore.load(null, "PASSWORD".toCharArray()) [all...] |
KeyStoreTest.java | 26 import java.security.KeyStore; 55 * Tests for <code>KeyStore</code> constructor and methods 62 private static final String defaultType = "KeyStore"; 70 private static String NotSupportMsg = "Default KeyStore type is not supported"; 74 public KeyStore[] createKS() throws Exception { 76 KeyStore[] kpg = new KeyStore[3]; 78 kpg[0] = KeyStore.getInstance(defaultType); 79 kpg[1] = KeyStore.getInstance(defaultType, defaultProvider); 80 kpg[2] = KeyStore.getInstance(defaultType, defaultProviderName) [all...] |
/cts/tests/tests/keystore/src/android/keystore/cts/ |
KeyStoreTest.java | 17 package android.keystore.cts; 28 import java.security.KeyStore; 29 import java.security.KeyStore.Builder; 30 import java.security.KeyStore.Entry; 31 import java.security.KeyStore.LoadStoreParameter; 32 import java.security.KeyStore.PasswordProtection; 33 import java.security.KeyStore.PrivateKeyEntry; 34 import java.security.KeyStore.ProtectionParameter; 35 import java.security.KeyStore.SecretKeyEntry; 36 import java.security.KeyStore.TrustedCertificateEntry [all...] |
ImportWrappedKeyTest.java | 17 package android.keystore.cts; 28 import static android.security.keystore.KeyProperties.PURPOSE_WRAP_KEY; 32 import android.security.keystore.KeyGenParameterSpec; 33 import android.security.keystore.KeyProperties; 34 import android.security.keystore.SecureKeyImportUnavailableException; 35 import android.security.keystore.StrongBoxUnavailableException; 36 import android.security.keystore.WrappedKeyEntry; 51 import java.security.KeyStore; 52 import java.security.KeyStore.Entry; 102 KeyStore keyStore = KeyStore.getInstance("AndroidKeyStore") [all...] |
AESCipherNistCavpKatTest.java | 17 package android.keystore.cts; 19 import android.security.keystore.KeyProperties; 20 import android.security.keystore.KeyProtection; 29 import java.security.KeyStore; 271 KeyStore keyStore = KeyStore.getInstance("AndroidKeyStore"); 272 keyStore.load(null); 273 keyStore.setEntry(keyAlias, 274 new KeyStore.SecretKeyEntry(new SecretKeySpec(testVector.key, "AES")) [all...] |
/cts/hostsidetests/devicepolicy/app/ProfileOwner/src/com/android/cts/profileowner/ |
AdminActionBookkeepingTest.java | 26 import java.security.KeyStore; 97 KeyStore keyStore = KeyStore.getInstance("AndroidCAStore"); 98 keyStore.load(null, null); 99 assertNull(keyStore.getCertificateAlias(cert)); 101 final String alias = keyStore.getCertificateAlias(cert);
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
CustomTrust.java | 26 import java.security.KeyStore; 169 KeyStore keyStore = newEmptyKeyStore(password); 173 keyStore.setCertificateEntry(certificateAlias, certificate); 179 keyManagerFactory.init(keyStore, password); 182 trustManagerFactory.init(keyStore); 192 private KeyStore newEmptyKeyStore(char[] password) throws GeneralSecurityException { 194 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()) [all...] |
/libcore/luni/src/test/java/tests/targets/security/cert/ |
CertPathBuilderTestPKIX.java | 18 import java.security.KeyStore; 19 import java.security.KeyStore.PrivateKeyEntry; 47 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 48 keyStore.load(null, null); 49 keyStore.setCertificateEntry("rootCA", clientAndCa.getRootCertificate("RSA")); 62 PKIXBuilderParameters parameters = new PKIXBuilderParameters(keyStore, targetConstraints);
|
CertPathValidatorTestPKIX.java | 19 import java.security.KeyStore; 56 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 57 keyStore.load(null, null); 65 keyStore.setCertificateEntry("selfSignedCert", selfSignedcertificate); 77 PKIXBuilderParameters parameters = new PKIXBuilderParameters(keyStore, 88 params = new PKIXParameters(keyStore);
|
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/ |
KeyStoreProxyImpl.java | 22 import java.security.KeyStore; 29 * Implementation of {@link KeyStoreProxy} that delegates all method calls to the {@link KeyStore}. 34 private final KeyStore mKeyStore; 37 * A new instance, delegating to {@code keyStore}. 39 public KeyStoreProxyImpl(KeyStore keyStore) { 40 mKeyStore = keyStore; 55 public void setEntry(String alias, KeyStore.Entry entry, KeyStore.ProtectionParameter protParam) 66 * Returns AndroidKeyStore-provided {@link KeyStore}, having already invoke [all...] |
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
MyTrustManagerFactorySpi.java | 21 import java.security.KeyStore; 35 protected void engineInit(KeyStore ks) throws KeyStoreException { 37 throw new KeyStoreException("Not supported operation for null KeyStore"); 63 private KeyStore keyStore; 64 public Parameters (KeyStore ks) { 65 this.keyStore = ks; 67 public KeyStore getKeyStore() { 68 return keyStore;
|
/libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/ |
MyTrustManagerFactorySpi.java | 21 import java.security.KeyStore; 35 protected void engineInit(KeyStore ks) throws KeyStoreException { 37 throw new KeyStoreException("Not supported operation for null KeyStore"); 63 private KeyStore keyStore; 64 public Parameters (KeyStore ks) { 65 this.keyStore = ks; 67 public KeyStore getKeyStore() { 68 return keyStore;
|
MyKeyManagerFactorySpi.java | 21 import java.security.KeyStore; 38 protected void engineInit(KeyStore ks, char[] password) 45 throw new UnrecoverableKeyException("Incorrect keystore"); 70 private KeyStore keyStore; 72 public Parameters (KeyStore ks, char[] pass) { 73 this.keyStore = ks; 76 public KeyStore getKeyStore() { 77 return keyStore;
|
/external/nist-sip/java/gov/nist/core/net/ |
SslNetworkLayer.java | 38 import java.security.KeyStore;
77 KeyStore keyStore = KeyStore.getInstance(keyStoreType);
78 KeyStore trustStore = KeyStore.getInstance(keyStoreType);
79 keyStore.load(new FileInputStream(keyStoreFile), keyStorePassword);
82 kmFactory.init(keyStore, keyStorePassword);
|
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/ |
SslContextBuilder.java | 24 import java.security.KeyStore; 93 KeyStore keyStore = newEmptyKeyStore(password); 100 keyStore.setKeyEntry("private", chain[0].keyPair.getPrivate(), password, certificates); 104 keyStore.setCertificateEntry("cert_" + i, trustedCertificates.get(i)); 110 keyManagerFactory.init(keyStore, password); 113 trustManagerFactory.init(keyStore); 120 private KeyStore newEmptyKeyStore(char[] password) throws GeneralSecurityException { 122 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()) [all...] |
/frameworks/base/services/core/java/com/android/server/locksettings/ |
SyntheticPasswordCrypto.java | 19 import android.security.keystore.KeyProperties; 20 import android.security.keystore.KeyProtection; 26 import java.security.KeyStore; 117 KeyStore keyStore = KeyStore.getInstance("AndroidKeyStore"); 118 keyStore.load(null); 120 SecretKey decryptionKey = (SecretKey) keyStore.getKey(keyAlias, null); 131 KeyStore keyStore = KeyStore.getInstance("AndroidKeyStore") [all...] |
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/hotspot2/ |
PasspointProvisioningTestUtil.java | 28 import java.security.KeyStore; 82 * Create the fake keyStore for the test. 84 * @return KeyStore that has the TEST_CERTs, null if not processed 86 public static KeyStore createFakeKeyStore() { 87 KeyStore keyStore = null; 90 keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 91 keyStore.load(null, null) [all...] |
/packages/apps/KeyChain/robotests/src/com/android/keychain/ |
AliasLoaderTest.java | 23 import android.security.KeyStore; 57 KeyStore keyStore = mock(KeyStore.class); 58 when(keyStore.list(Credentials.USER_PRIVATE_KEY)).thenReturn(new String[] {"b", "c", "a"}); 62 keyStore, RuntimeEnvironment.application, mDummyInfoProvider); 78 KeyStore keyStore = mock(KeyStore.class); 79 when(keyStore.list(Credentials.USER_PRIVATE_KEY)).thenReturn(null) [all...] |
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/ |
DelegatedCertInstallerTest.java | 35 import java.security.KeyStore; 196 KeyStore keyStore = KeyStore.getInstance("AndroidCAStore"); 197 keyStore.load(null, null); 198 assertNull(keyStore.getCertificateAlias(caCert)); 209 final String alias = keyStore.getCertificateAlias(caCert);
|
/cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/ |
AdminActionBookkeepingTest.java | 25 import java.security.KeyStore; 194 KeyStore keyStore = KeyStore.getInstance("AndroidCAStore"); 195 keyStore.load(null, null); 196 assertNull(keyStore.getCertificateAlias(cert)); 198 final String alias = keyStore.getCertificateAlias(cert);
|
/cts/tests/tests/security/src/android/security/cts/ |
CertificateTest.java | 25 import java.security.KeyStore; 120 private KeyStore createWfaKeyStore(String dirPath) throws CertificateException, IOException, 122 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 123 keyStore.load(null, null); 127 keyStore.setCertificateEntry(String.format("%d", index++), cert); 129 return keyStore; 154 KeyStore wfaKeyStore = createWfaKeyStore(DIR_OF_CACERTS_FOR_WFA) [all...] |
/development/samples/Vault/src/com/example/android/vault/ |
SecretKeyWrapper.java | 27 import java.security.KeyStore; 37 * the platform {@link KeyStore}. This allows us to protect symmetric keys with 57 final KeyStore keyStore = KeyStore.getInstance("AndroidKeyStore"); 58 keyStore.load(null); 60 if (!keyStore.containsAlias(alias)) { 66 final KeyStore.PrivateKeyEntry entry = (KeyStore.PrivateKeyEntry) keyStore.getEntry [all...] |