/external/guice/extensions/servlet/test/com/google/inject/servlet/ |
ContinuingRequestIntegrationTest.java | 31 import com.google.inject.Provider; 220 @Inject Provider<HttpServletRequest> request; 221 @Inject Provider<HttpServletResponse> response; 222 @Inject Provider<SomeObject> someObject;
|
ServletTest.java | 38 import com.google.inject.Provider; 168 @Inject Provider<ServletRequest> servletReqProvider; 169 @Inject Provider<HttpServletRequest> reqProvider; 170 @Inject Provider<ServletResponse> servletRespProvider; 171 @Inject Provider<HttpServletResponse> respProvider; 229 final Provider<ServletRequest> servletReqProvider = getProvider(ServletRequest.class); 230 final Provider<HttpServletRequest> reqProvider = getProvider(HttpServletRequest.class); 231 final Provider<ServletResponse> servletRespProvider = getProvider(ServletResponse.class); 232 final Provider<HttpServletResponse> respProvider = getProvider(HttpServletResponse.class);
|
/frameworks/base/core/java/android/security/net/config/ |
RootTrustManagerFactorySpi.java | 25 import java.security.Provider;
|
/frameworks/support/v17/leanback/tests/java/android/support/v17/leanback/widget/ |
StaggeredGridDefaultTest.java | 41 mProvider = new Provider(new int[]{100, 100, 100, 100, 40, 100, 100, 30, 100});
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
MacTest.java | 31 import java.security.Provider; 63 private static Provider defaultProvider = null; 67 private static final String NotSupportedMsg = "There is no suitable provider for Mac"; 107 for (Provider p : Security.getProviders("Mac." + defaultAlgorithm)) { 158 * Test for <code>getInstance(String algorithm, String provider)</code> method 160 * throws IllegalArgumentException when provider is null or empty 161 * throws NoSuchProviderException when provider is not available 168 String provider = null; local 171 Mac.getInstance(validValues[i], provider); 172 fail("IllegalArgumentException must be thrown when provider is null") 247 Provider provider = null; local [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
AlgorithmParameterGenerator1Test.java | 31 import java.security.Provider; 57 private static Provider validProvider = null; 131 * Test for <code>getInstance(String algorithm, String provider)</code> 134 * throws IllegalArgumentException if provider is null or empty 142 String provider = null; local 145 AlgorithmParameterGenerator.getInstance(algs[i], provider); 146 fail("IllegalArgumentException must be thrown when provider is null"); 151 fail("IllegalArgumentException must be thrown when provider is empty"); 158 * Test for <code>getInstance(String algorithm, String provider)</code> 160 * Assertion: throws NoSuchProviderException if provider is no 244 Provider provider = null; local [all...] |
KeyStore3Test.java | 35 import java.security.Provider; 150 Provider p = new MyProvider(); 176 public MyKeyStore(KeyStoreSpi keyStoreSpi, Provider provider, 178 super(keyStoreSpi, provider, type); 262 private class MyProvider extends Provider { 264 super("MyProvider", 1.0, "Provider for testing");
|
KeyFactoryTest.java | 14 import java.security.Provider; 24 Provider provider; field in class:KeyFactoryTest 27 Provider existingProvider; 34 Provider[] providers = Security.getProviders(); 41 provider = new TestKeyFactoryProvider(); 42 Security.addProvider(provider); 48 Security.removeProvider(provider.getName()); 131 KeyFactory factory = KeyFactory.getInstance(TEST_KEYFACTORY_NAME, provider); 144 Provider[] providers = 160 Provider provider = providers[i]; local [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
CertPathBuilder2Test.java | 32 import java.security.Provider; 59 Provider mProv; 64 "Provider for testing", CertPathBuilder1Test.srvCertPathBuilder 119 assertEquals("Incorrect provider", cerPB.getProvider(), mProv); 125 * Test for <code>getInstance(String algorithm, String provider)</code> method 129 * throws IllegalArgumentException when provider is null or empty; 130 * throws NoSuchProviderException when provider is available; 153 CertPathBuilder.getInstance(validValues[i], (Provider) null); 154 fail("IllegalArgumentException must be thrown when provider is null (type: " 160 fail("IllegalArgumentException must be thrown when provider is empty (type: [all...] |
CertStore1Test.java | 34 import java.security.Provider; 64 private static Provider defaultProvider; 66 private static Provider defaultProviderCol; 90 private Provider dProv = null; 162 assertEquals("Incorrect provider", certS.getProvider(), dProv); 172 assertNull("Incorrect provider", certS.getProvider()); 224 * <code>getInstance(String type, CertStoreParameters params, String provider)</code> 225 * Assertion: throws IllegalArgumentException when provider is null or empty 234 String provider = null; local 237 CertStore.getInstance(dValid[i], dParams, provider); 323 Provider provider = null; local [all...] |
/libcore/ojluni/src/main/java/java/security/ |
KeyPairGenerator.java | 32 import java.security.Provider.Service; 62 * implementation of the highest-priority installed provider as the source 69 * provider what to do about the algorithm-specific parameters (if any) to be 73 * size) is 512, 768, or 1024, then the <i>Sun</i> provider uses a set of 76 * values, the <i>Sun</i> provider creates a new set of parameters. Other 89 * implementation of the highest-priority installed provider as the source 96 * (via a call to an <code>initialize</code> method), each provider must 98 * For example, the <i>Sun</i> provider uses a default modulus size (keysize) 150 // The provider 151 Provider provider field in class:KeyPairGenerator [all...] |
/libcore/ojluni/src/main/java/java/security/cert/ |
X509Certificate.java | 654 * supplied by the specified provider. Note that the specified 655 * Provider object does not have to be registered in the provider list. 663 * @param sigProvider the signature provider. 673 public void verify(PublicKey key, Provider sigProvider)
|
/libcore/ojluni/src/main/java/javax/crypto/ |
JceSecurity.java | 34 import java.security.Provider.Service; 57 // Map<Provider,?> of the providers we already have verified 62 // Map<Provider,?> of the providers currently being verified 97 String provider) throws NoSuchAlgorithmException, 99 Service s = GetInstance.getService(type, algorithm, provider); 102 String msg = "JCE cannot authenticate the provider " + provider; 110 Provider provider) throws NoSuchAlgorithmException { 111 Service s = GetInstance.getService(type, algorithm, provider); [all...] |
/packages/apps/Email/emailcommon/src/com/android/emailcommon/ |
VendorPolicyLoader.java | 211 public static class Provider implements Serializable { 233 * Expands templates in all of the provider fields that support them. Currently, 275 * Returns provider setup information for a given email address 291 * @return suitable Provider definition, or null if no match found 293 public Provider findProviderForDomain(String domain) { 298 Provider p = new Provider();
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
TestCertUtils.java | 37 import java.security.Provider; 112 private static Provider provider = null; field in class:TestCertUtils 129 if (provider == null) { 130 provider = new TestProvider(providerName, 0.01, 131 "Test provider for serialization testing"); 132 Security.insertProviderAt(provider, 1); 137 if (provider != null) { 139 provider = null; 584 public static class TestProvider extends Provider { [all...] |
/cts/tests/tests/keystore/src/android/keystore/cts/ |
MacTest.java | 25 import java.security.Provider; 26 import java.security.Provider.Service; 186 // Assert that Android Keystore Provider exposes exactly the expected MAC algorithms. We 189 // If the Provider exposes extraneous algorithms, it'll be caught because it'll have to 193 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 194 Set<Service> services = provider.getServices(); 210 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 211 assertNotNull(provider); 227 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 248 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 269 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local [all...] |
SignatureTest.java | 24 import java.security.Provider; 25 import java.security.Provider.Service; 79 // services. Thus, our provider has to expose the "ECDSA" service whose actual proper 332 // Assert that Android Keystore Provider exposes exactly the expected signature algorithms. 335 // If the Provider exposes extraneous algorithms, it'll be caught because it'll have to 339 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 340 Set<Service> services = provider.getServices(); 366 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME) local 382 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 397 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 426 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 449 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 570 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 623 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 721 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local [all...] |
CipherTest.java | 30 import java.security.Provider; 36 import java.security.Provider.Service; 227 // Assert that Android Keystore Provider exposes exactly the expected Cipher 230 // If the Provider exposes extraneous algorithms, it'll be caught because it'll have to 234 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 235 Set<Service> services = provider.getServices(); 252 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 253 assertNotNull(provider); 289 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 314 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 359 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 763 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 1306 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local [all...] |
/external/caliper/caliper/src/main/java/com/google/caliper/runner/ |
ExperimentingRunnerModule.java | 53 import javax.inject.Provider; 119 Map<Class<? extends ResultProcessor>, Provider<ResultProcessor>> availableProcessors) { 122 Provider<ResultProcessor> resultProcessorProvider = availableProcessors.get(processorClass); 183 Map<Class<? extends Instrument>, Provider<Instrument>> availableInstruments, 201 Provider<Instrument> instrumentProvider = availableInstruments.get(clazz);
|
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreProvider.java | 31 import java.security.Provider; 50 * A provider focused on providing JCA interfaces for the Android KeyStore. 54 public class AndroidKeyStoreProvider extends Provider { 57 // IMPLEMENTATION NOTE: Class names are hard-coded in this provider to avoid loading these 58 // classes when this provider is instantiated and installed early on during each app's 61 // Crypto operations operating on the AndroidKeyStore keys must not be offered by this provider. 68 super(PROVIDER_NAME, 1.0, "Android KeyStore security provider"); 99 * Installs a new instance of this provider (and the 103 Provider[] providers = Security.getProviders(); 106 Provider provider = providers[i] local [all...] |
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
KeyManagerFactoryTest.java | 24 import java.security.Provider; 263 Provider[] providers = Security.getProviders(); 264 for (Provider provider : providers) { 265 Set<Provider.Service> services = provider.getServices(); 266 for (Provider.Service service : services) { 281 provider); 283 assertEquals(provider, kmf.getProvider()); 289 provider.getName()) [all...] |
/external/guice/core/test/com/google/inject/ |
KeyTest.java | 52 public void bar(Provider<List<String>> a) {} 72 Key<?> expected = Key.get(getClass().getMethod("bar", Provider.class) 284 final AtomicReference<Provider<List<String>>> stringProvider = 285 new AtomicReference<Provider<List<String>>>(); 286 final AtomicReference<Provider<List<Integer>>> intProvider = 287 new AtomicReference<Provider<List<Integer>>>();
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/security/cert/ |
X509CertificateTest.java | 39 import java.security.Provider; 44 import java.security.Provider.Service; 122 private Provider myProvider; 128 private Provider mySSProvider; 662 // Side Effect: Destroys MD5 provider, hurts succeeding tests 754 // Keep track of the original position so the provider can be 756 Provider[] providers = Security.getProviders(); 775 // Find the Provider which offers MD5withRSA for the certificate's 779 Provider provider = signature.getProvider() local [all...] |
/packages/apps/Email/provider_src/com/android/email/activity/setup/ |
AccountSettingsUtils.java | 27 import com.android.email.provider.AccountBackupRestore; 31 import com.android.emailcommon.VendorPolicyLoader.Provider; 32 import com.android.emailcommon.provider.Account; 33 import com.android.emailcommon.provider.EmailContent.AccountColumns; 34 import com.android.emailcommon.provider.QuickResponse; 52 * Commits the UI-related settings of an account to the provider. This is static so that it 121 * @param provider The OAuth provider to register with 126 final OAuthProvider provider, final String emailAddress) { 127 final Uri.Builder b = Uri.parse(provider.authEndpoint).buildUpon() 153 OAuthProvider provider = null; local 202 OAuthProvider provider = null; local 270 Provider provider = null; local [all...] |
/external/guice/extensions/assistedinject/test/com/google/inject/assistedinject/ |
FactoryProvider2Test.java | 29 import com.google.inject.Provider; 245 private final Provider<String> modifiersProvider; 249 public Firebird(Provider<String> modifiersProvider, @Assisted Color color) { 278 private final Provider<String> modifiersProvider; 279 private final Provider<Color> colorProvider; 282 public Flamingbird(Provider<String> modifiersProvider, @Assisted Provider<Color> colorProvider) { 337 private final Provider<Set<String>> manufacturersProvider; 341 public Z(Provider<Set<String>> manufacturersProvider, @Assisted Color color) { 527 @Inject @Assisted Provider<Color> colorProvider [all...] |