Searched refs:mKeyStore (Results 1 - 6 of 6) sorted by relevance
/frameworks/base/keystore/tests/src/android/security/ |
H A D | KeyStoreTest.java | 63 private KeyStore mKeyStore = null; field in class:KeyStoreTest 118 mKeyStore = KeyStore.getInstance(); 119 if (mKeyStore.state() != KeyStore.State.UNINITIALIZED) { 120 mKeyStore.reset(); 123 KeyStore.State.UNINITIALIZED, mKeyStore.state()); 129 mKeyStore.reset(); 134 assertEquals(KeyStore.State.UNINITIALIZED, mKeyStore.state()); 138 assertTrue(mKeyStore.password(TEST_PASSWD)); 139 assertEquals(KeyStore.State.UNLOCKED, mKeyStore.state()); 143 assertNull(mKeyStore [all...] |
H A D | AndroidKeyStoreTest.java | 68 private java.security.KeyStore mKeyStore; field in class:AndroidKeyStoreTest 1100 mKeyStore = java.security.KeyStore.getInstance("AndroidKeyStore"); 1111 final Enumeration<String> aliases = mKeyStore.aliases(); 1131 mKeyStore.load(null, null); 1151 mKeyStore.aliases(); 1160 mKeyStore.load(null, null); 1168 assertTrue("Should contain generated private key", mKeyStore.containsAlias(TEST_ALIAS_1)); 1173 assertTrue("Should contain added CA certificate", mKeyStore.containsAlias(TEST_ALIAS_2)); 1176 mKeyStore.containsAlias(TEST_ALIAS_3)); 1182 mKeyStore [all...] |
/frameworks/base/keystore/java/android/security/ |
H A D | AndroidKeyStore.java | 75 private android.security.KeyStore mKeyStore; field in class:AndroidKeyStore 107 final byte[] caBytes = mKeyStore.get(Credentials.CA_CERTIFICATE + alias); 133 byte[] certificate = mKeyStore.get(Credentials.USER_CERTIFICATE + alias); 138 certificate = mKeyStore.get(Credentials.CA_CERTIFICATE + alias); 170 final long epochMillis = mKeyStore.getmtime(alias); 319 Credentials.deleteAllTypesForAlias(mKeyStore, alias); 321 Credentials.deleteCertificateTypesForAlias(mKeyStore, alias); 327 && !mKeyStore.importKey(Credentials.USER_PRIVATE_KEY + alias, keyBytes, 329 Credentials.deleteAllTypesForAlias(mKeyStore, alias); 331 } else if (!mKeyStore [all...] |
H A D | AndroidKeyPairGenerator.java | 57 private android.security.KeyStore mKeyStore; field in class:AndroidKeyPairGenerator 78 if (mKeyStore == null || mSpec == null) { 84 && (mKeyStore.state() != KeyStore.State.UNLOCKED)) { 92 Credentials.deleteAllTypesForAlias(mKeyStore, alias); 98 if (!mKeyStore.generate(privateKeyAlias, KeyStore.UID_SELF, keyType, 111 final byte[] pubKeyBytes = mKeyStore.getPubkey(privateKeyAlias); 136 Credentials.deleteAllTypesForAlias(mKeyStore, alias); 144 Credentials.deleteAllTypesForAlias(mKeyStore, alias); 148 if (!mKeyStore.put(Credentials.USER_CERTIFICATE + alias, certBytes, KeyStore.UID_SELF, 150 Credentials.deleteAllTypesForAlias(mKeyStore, alia [all...] |
/frameworks/base/wifi/java/android/net/wifi/ |
H A D | WifiConfigStore.java | 162 private final KeyStore mKeyStore = KeyStore.getInstance(); field in class:WifiConfigStore 393 config.enterpriseConfig.removeKeys(mKeyStore); 1249 if (mKeyStore.state() != KeyStore.State.UNLOCKED) { 1262 if (!enterpriseConfig.installKeys(mKeyStore, keyId)) { 1279 enterpriseConfig.removeKeys(mKeyStore); 1605 config.enterpriseConfig.migrateCerts(mKeyStore); 1606 config.enterpriseConfig.initializeSoftwareKeystoreFlag(mKeyStore);
|
/frameworks/base/services/java/com/android/server/ |
H A D | ConnectivityService.java | 211 private KeyStore mKeyStore; field in class:ConnectivityService 485 mKeyStore = KeyStore.getInstance(); 3674 mVpns.get(user).startLegacyVpn(profile, mKeyStore, egress); 3854 if (!mKeyStore.isUnlocked()) { 3859 final String profileName = new String(mKeyStore.get(Credentials.LOCKDOWN_VPN)); 3861 profileName, mKeyStore.get(Credentials.VPN + profileName));
|
Completed in 138 milliseconds