/cts/tests/tests/keystore/src/android/keystore/cts/ |
KeyStoreTest.java | 17 package android.keystore.cts; 28 import java.security.KeyStore; 29 import java.security.KeyStore.Builder; 30 import java.security.KeyStore.Entry; 31 import java.security.KeyStore.LoadStoreParameter; 32 import java.security.KeyStore.PasswordProtection; 33 import java.security.KeyStore.PrivateKeyEntry; 34 import java.security.KeyStore.ProtectionParameter; 35 import java.security.KeyStore.SecretKeyEntry; 36 import java.security.KeyStore.TrustedCertificateEntry [all...] |
/external/conscrypt/platform/src/main/java/org/conscrypt/ |
TrustManagerFactoryImpl.java | 39 import java.security.KeyStore; 57 private KeyStore keyStore; 60 * @see javax.net.ssl.TrustManagerFactorySpi#engineInit(KeyStore) 63 public void engineInit(KeyStore ks) throws KeyStoreException { 65 keyStore = ks; 67 keyStore = KeyStore.getInstance("AndroidCAStore"); 69 keyStore.load(null, null); 95 if (keyStore == null) [all...] |
/external/conscrypt/common/src/main/java/org/conscrypt/ |
KeyManagerFactoryImpl.java | 24 import java.security.KeyStore; 42 private KeyStore keyStore; 48 * @see KeyManagerFactorySpi#engineInit(KeyStore ks, char[] password) 51 protected void engineInit(KeyStore ks, char[] password) 55 keyStore = ks; 62 keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 63 String keyStoreName = System.getProperty("javax.net.ssl.keyStore"); [all...] |
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/ |
KeyStoreProxyImpl.java | 22 import java.security.KeyStore; 29 * Implementation of {@link KeyStoreProxy} that delegates all method calls to the {@link KeyStore}. 34 private final KeyStore mKeyStore; 37 * A new instance, delegating to {@code keyStore}. 39 public KeyStoreProxyImpl(KeyStore keyStore) { 40 mKeyStore = keyStore; 55 public void setEntry(String alias, KeyStore.Entry entry, KeyStore.ProtectionParameter protParam) 66 * Returns AndroidKeyStore-provided {@link KeyStore}, having already invoke [all...] |
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
MyTrustManagerFactorySpi.java | 21 import java.security.KeyStore; 35 protected void engineInit(KeyStore ks) throws KeyStoreException { 37 throw new KeyStoreException("Not supported operation for null KeyStore"); 63 private KeyStore keyStore; 64 public Parameters (KeyStore ks) { 65 this.keyStore = ks; 67 public KeyStore getKeyStore() { 68 return keyStore;
|
/libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/ |
MyTrustManagerFactorySpi.java | 21 import java.security.KeyStore; 35 protected void engineInit(KeyStore ks) throws KeyStoreException { 37 throw new KeyStoreException("Not supported operation for null KeyStore"); 63 private KeyStore keyStore; 64 public Parameters (KeyStore ks) { 65 this.keyStore = ks; 67 public KeyStore getKeyStore() { 68 return keyStore;
|
MyKeyManagerFactorySpi.java | 21 import java.security.KeyStore; 38 protected void engineInit(KeyStore ks, char[] password) 45 throw new UnrecoverableKeyException("Incorrect keystore"); 70 private KeyStore keyStore; 72 public Parameters (KeyStore ks, char[] pass) { 73 this.keyStore = ks; 76 public KeyStore getKeyStore() { 77 return keyStore;
|
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/internal/ |
SslContextBuilder.java | 24 import java.security.KeyStore; 93 KeyStore keyStore = newEmptyKeyStore(password); 100 keyStore.setKeyEntry("private", chain[0].keyPair.getPrivate(), password, certificates); 104 keyStore.setCertificateEntry("cert_" + i, trustedCertificates.get(i)); 110 keyManagerFactory.init(keyStore, password); 113 trustManagerFactory.init(keyStore); 120 private KeyStore newEmptyKeyStore(char[] password) throws GeneralSecurityException { 122 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()) [all...] |
/libcore/luni/src/test/java/tests/targets/security/ |
KeyStoreTest.java | 24 import java.security.KeyStore; 25 import java.security.KeyStore.Entry; 26 import java.security.KeyStore.PasswordProtection; 27 import java.security.KeyStore.PrivateKeyEntry; 28 import java.security.KeyStore.ProtectionParameter; 52 KeyStore keyStore = null; 54 keyStore = KeyStore.getInstance(algorithmName); 60 keyStore.load(new ByteArrayInputStream(keyStoreData) [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
KeyStoreCryptoOperationUtils.java | 17 package android.security.keystore; 19 import android.security.KeyStore; 30 * Assorted utility methods for implementing crypto operations on top of KeyStore. 42 * the crypto operation in response to {@code KeyStore.begin} operation or {@code null} if 46 KeyStore keyStore, AndroidKeyStoreKey key, int beginOpResultCode) { 47 if (beginOpResultCode == KeyStore.NO_ERROR) { 54 keyStore.getInvalidKeyException(key.getAlias(), key.getUid(), beginOpResultCode); 56 case KeyStore.OP_AUTH_NEEDED: 71 * in response to {@code KeyStore.begin} operation or {@code null} if the {@code init} metho [all...] |
AndroidKeyStoreProvider.java | 17 package android.security.keystore; 20 import android.security.KeyStore; 50 * A provider focused on providing JCA interfaces for the Android KeyStore. 65 private static final String PACKAGE_NAME = "android.security.keystore"; 71 super(PROVIDER_NAME, 1.0, "Android KeyStore security provider"); 75 // java.security.KeyStore 76 put("KeyStore.AndroidKeyStore", PACKAGE_NAME + ".AndroidKeyStoreSpi"); 147 * Gets the {@link KeyStore} operation handle corresponding to the provided JCA crypto 152 * @return KeyStore operation handle or {@code 0} if the provided primitive's KeyStore operatio [all...] |
/external/conscrypt/testing/src/main/java/org/conscrypt/java/security/ |
TestKeyStore.java | 27 import java.security.KeyStore; 28 import java.security.KeyStore.PasswordProtection; 29 import java.security.KeyStore.PrivateKeyEntry; 30 import java.security.KeyStore.TrustedCertificateEntry; 88 * want a canned KeyStore with a variety of key pairs. 148 // Needed to create BKS keystore but add at end so most 164 public final KeyStore keyStore; 171 private TestKeyStore(KeyStore keyStore, char[] storePassword, char[] keyPassword) [all...] |
/libcore/support/src/test/java/libcore/java/security/ |
TestKeyStore.java | 54 import java.security.KeyStore; 55 import java.security.KeyStore.PasswordProtection; 56 import java.security.KeyStore.PrivateKeyEntry; 57 import java.security.KeyStore.TrustedCertificateEntry; 87 * want a canned KeyStore with a variety of key pairs. 146 // Needed to create BKS keystore but add at end so most 161 public final KeyStore keyStore; 168 private TestKeyStore(KeyStore keyStore, char[] storePassword, char[] keyPassword) [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStore4Test.java | 15 import java.security.KeyStore; 23 import java.security.KeyStore.Entry; 24 import java.security.KeyStore.ProtectionParameter; 31 KeyStore keyStore; 32 KeyStore uninitialized; 33 KeyStore failing; 43 keyStore = KeyStore.getInstance(KEY_STORE_TYPE); 44 keyStore.load(null, "PASSWORD".toCharArray()) [all...] |
/packages/apps/KeyChain/robotests/src/com/android/keychain/ |
AliasLoaderTest.java | 23 import android.security.KeyStore; 57 KeyStore keyStore = mock(KeyStore.class); 58 when(keyStore.list(Credentials.USER_PRIVATE_KEY)).thenReturn(new String[] {"b", "c", "a"}); 62 keyStore, RuntimeEnvironment.application, mDummyInfoProvider); 78 KeyStore keyStore = mock(KeyStore.class); 79 when(keyStore.list(Credentials.USER_PRIVATE_KEY)).thenReturn(null) [all...] |
/frameworks/base/services/core/java/com/android/server/locksettings/ |
SyntheticPasswordCrypto.java | 19 import android.security.keystore.KeyProperties; 20 import android.security.keystore.KeyProtection; 26 import java.security.KeyStore; 117 KeyStore keyStore = KeyStore.getInstance("AndroidKeyStore"); 118 keyStore.load(null); 120 SecretKey decryptionKey = (SecretKey) keyStore.getKey(keyAlias, null); 131 KeyStore keyStore = KeyStore.getInstance("AndroidKeyStore") [all...] |
/cts/hostsidetests/devicepolicy/app/ProfileOwner/src/com/android/cts/profileowner/ |
AdminActionBookkeepingTest.java | 26 import java.security.KeyStore; 97 KeyStore keyStore = KeyStore.getInstance("AndroidCAStore"); 98 keyStore.load(null, null); 99 assertNull(keyStore.getCertificateAlias(cert)); 101 final String alias = keyStore.getCertificateAlias(cert);
|
/development/samples/Vault/src/com/example/android/vault/ |
SecretKeyWrapper.java | 27 import java.security.KeyStore; 37 * the platform {@link KeyStore}. This allows us to protect symmetric keys with 57 final KeyStore keyStore = KeyStore.getInstance("AndroidKeyStore"); 58 keyStore.load(null); 60 if (!keyStore.containsAlias(alias)) { 66 final KeyStore.PrivateKeyEntry entry = (KeyStore.PrivateKeyEntry) keyStore.getEntry [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/ |
PasspointObjectFactory.java | 28 import java.security.KeyStore; 53 * @param keyStore Instance of {@link WifiKeyStore} 59 WifiKeyStore keyStore, SIMAccessor simAccessor, long providerId, int creatorUid) { 60 return new PasspointProvider(config, keyStore, simAccessor, providerId, creatorUid); 66 * @param keyStore Instance of {@link WifiKeyStore} 71 public PasspointConfigStoreData makePasspointConfigStoreData(WifiKeyStore keyStore, 73 return new PasspointConfigStoreData(keyStore, simAccessor, dataSource); 164 * @param ks KeyStore used to get root certs 167 public TrustManagerImpl getTrustManagerImpl(KeyStore ks) {
|
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/hotspot2/ |
PasspointProvisioningTestUtil.java | 28 import java.security.KeyStore; 82 * Create the fake keyStore for the test. 84 * @return KeyStore that has the TEST_CERTs, null if not processed 86 public static KeyStore createFakeKeyStore() { 87 KeyStore keyStore = null; 90 keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 91 keyStore.load(null, null) [all...] |
/libcore/luni/src/test/java/tests/targets/security/cert/ |
CertPathValidatorTestPKIX.java | 19 import java.security.KeyStore; 56 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 57 keyStore.load(null, null); 65 keyStore.setCertificateEntry("selfSignedCert", selfSignedcertificate); 77 PKIXBuilderParameters parameters = new PKIXBuilderParameters(keyStore, 88 params = new PKIXParameters(keyStore);
|
CertPathBuilderTestPKIX.java | 18 import java.security.KeyStore; 19 import java.security.KeyStore.PrivateKeyEntry; 47 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 48 keyStore.load(null, null); 49 keyStore.setCertificateEntry("rootCA", clientAndCa.getRootCertificate("RSA")); 62 PKIXBuilderParameters parameters = new PKIXBuilderParameters(keyStore, targetConstraints);
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
CustomTrust.java | 26 import java.security.KeyStore; 169 KeyStore keyStore = newEmptyKeyStore(password); 173 keyStore.setCertificateEntry(certificateAlias, certificate); 179 keyManagerFactory.init(keyStore, password); 182 trustManagerFactory.init(keyStore); 192 private KeyStore newEmptyKeyStore(char[] password) throws GeneralSecurityException { 194 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()) [all...] |
/cts/tests/tests/security/src/android/security/cts/ |
CertificateTest.java | 25 import java.security.KeyStore; 120 private KeyStore createWfaKeyStore(String dirPath) throws CertificateException, IOException, 122 KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); 123 keyStore.load(null, null); 127 keyStore.setCertificateEntry(String.format("%d", index++), cert); 129 return keyStore; 154 KeyStore wfaKeyStore = createWfaKeyStore(DIR_OF_CACERTS_FOR_WFA) [all...] |
/tools/tradefederation/core/src/com/android/tradefed/util/keystore/ |
JSONFileKeyStoreClient.java | 17 package com.android.tradefed.util.keystore; 87 CLog.w("null keystore"); 102 * @param keyStore {@link JSONObject} to use as key store. 104 public void setKeyStore(JSONObject keyStore) { 105 mJsonKeyStore = keyStore;
|