/frameworks/base/core/java/android/security/net/config/ |
RootTrustManagerFactorySpi.java | 25 import java.security.Provider;
|
/frameworks/support/samples/SupportLeanbackDemos/src/com/example/android/leanback/ |
CustomTitleView.java | 24 public class CustomTitleView extends LinearLayout implements TitleViewAdapter.Provider {
|
/frameworks/support/v17/leanback/tests/java/android/support/v17/leanback/widget/ |
StaggeredGridDefaultTest.java | 37 mProvider = new Provider(new int[]{100, 100, 100, 100, 40, 100, 100, 30, 100});
|
TitleViewAdapterTest.java | 37 public static class CustomTitle extends LinearLayout implements TitleViewAdapter.Provider {
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
MacTest.java | 31 import java.security.Provider; 63 private static Provider defaultProvider = null; 67 private static final String NotSupportedMsg = "There is no suitable provider for Mac"; 107 for (Provider p : Security.getProviders("Mac." + defaultAlgorithm)) { 158 * Test for <code>getInstance(String algorithm, String provider)</code> method 160 * throws IllegalArgumentException when provider is null or empty 161 * throws NoSuchProviderException when provider is not available 168 String provider = null; local 171 Mac.getInstance(validValues[i], provider); 172 fail("IllegalArgumentException must be thrown when provider is null") 247 Provider provider = null; local [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
AlgorithmParameterGenerator1Test.java | 31 import java.security.Provider; 57 private static Provider validProvider = null; 131 * Test for <code>getInstance(String algorithm, String provider)</code> 134 * throws IllegalArgumentException if provider is null or empty 142 String provider = null; local 145 AlgorithmParameterGenerator.getInstance(algs[i], provider); 146 fail("IllegalArgumentException must be thrown when provider is null"); 151 fail("IllegalArgumentException must be thrown when provider is empty"); 158 * Test for <code>getInstance(String algorithm, String provider)</code> 160 * Assertion: throws NoSuchProviderException if provider is no 244 Provider provider = null; local [all...] |
KeyStore3Test.java | 35 import java.security.Provider; 124 Provider p = new MyProvider(); 173 public MyKeyStore(KeyStoreSpi keyStoreSpi, Provider provider, 175 super(keyStoreSpi, provider, type); 259 private class MyProvider extends Provider { 261 super("MyProvider", 1.0, "Provider for testing");
|
KeyFactoryTest.java | 14 import java.security.Provider; 24 Provider provider; field in class:KeyFactoryTest 27 Provider existingProvider; 34 Provider[] providers = Security.getProviders(); 41 provider = new TestKeyFactoryProvider(); 42 Security.addProvider(provider); 48 Security.removeProvider(provider.getName()); 131 KeyFactory factory = KeyFactory.getInstance(TEST_KEYFACTORY_NAME, provider); 144 Provider[] providers = 160 Provider provider = providers[i]; local [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
CertPathBuilder2Test.java | 32 import java.security.Provider; 59 Provider mProv; 64 "Provider for testing", CertPathBuilder1Test.srvCertPathBuilder 119 assertEquals("Incorrect provider", cerPB.getProvider(), mProv); 125 * Test for <code>getInstance(String algorithm, String provider)</code> method 129 * throws IllegalArgumentException when provider is null or empty; 130 * throws NoSuchProviderException when provider is available; 153 CertPathBuilder.getInstance(validValues[i], (Provider) null); 154 fail("IllegalArgumentException must be thrown when provider is null (type: " 160 fail("IllegalArgumentException must be thrown when provider is empty (type: [all...] |
CertificateTest.java | 32 import java.security.Provider; 225 * <code>verify(PublicKey,Provider)</code> with null args 238 c1.verify((PublicKey) null, (Provider) null); 352 final Provider provider = sig.getProvider(); local 354 cert.verify(cert.getPublicKey(), provider.getName()); 366 // a new provider, test if it works, then remove it and test if the 370 // Provider wrongProvider = cf.getProvider(); 404 final Provider provider = sig.getProvider() local 405 cert.verify(cert.getPublicKey(), provider); local [all...] |
CertStore1Test.java | 34 import java.security.Provider; 64 private static Provider defaultProvider; 66 private static Provider defaultProviderCol; 90 private Provider dProv = null; 162 assertEquals("Incorrect provider", certS.getProvider(), dProv); 172 assertNull("Incorrect provider", certS.getProvider()); 224 * <code>getInstance(String type, CertStoreParameters params, String provider)</code> 225 * Assertion: throws IllegalArgumentException when provider is null or empty 234 String provider = null; local 237 CertStore.getInstance(dValid[i], dParams, provider); 323 Provider provider = null; local [all...] |
/libcore/ojluni/src/main/java/java/security/ |
KeyPairGenerator.java | 32 import java.security.Provider.Service; 67 * implementation of the highest-priority installed provider as the source 74 * provider what to do about the algorithm-specific parameters (if any) to be 78 * size) is 512, 768, or 1024, then the <i>Sun</i> provider uses a set of 81 * values, the <i>Sun</i> provider creates a new set of parameters. Other 93 * implementation of the highest-priority installed provider as the source 100 * (via a call to an {@code initialize} method), each provider must 102 * For example, the <i>Sun</i> provider uses a default modulus size (keysize) 155 Debug.getInstance("provider", "Provider"); 163 Provider provider; field in class:KeyPairGenerator [all...] |
/libcore/ojluni/src/main/java/java/security/cert/ |
X509Certificate.java | 654 * supplied by the specified provider. Note that the specified 655 * Provider object does not have to be registered in the provider list. 663 * @param sigProvider the signature provider. 673 public void verify(PublicKey key, Provider sigProvider)
|
/packages/apps/Email/emailcommon/src/com/android/emailcommon/ |
VendorPolicyLoader.java | 211 public static class Provider implements Serializable { 233 * Expands templates in all of the provider fields that support them. Currently, 275 * Returns provider setup information for a given email address 291 * @return suitable Provider definition, or null if no match found 293 public Provider findProviderForDomain(String domain) { 298 Provider p = new Provider();
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
TestCertUtils.java | 37 import java.security.Provider; 112 private static Provider provider = null; field in class:TestCertUtils 129 if (provider == null) { 130 provider = new TestProvider(providerName, 0.01, 131 "Test provider for serialization testing"); 132 Security.insertProviderAt(provider, 1); 137 if (provider != null) { 139 provider = null; 584 public static class TestProvider extends Provider { [all...] |
/cts/tests/tests/keystore/src/android/keystore/cts/ |
MacTest.java | 25 import java.security.Provider; 26 import java.security.Provider.Service; 186 // Assert that Android Keystore Provider exposes exactly the expected MAC algorithms. We 189 // If the Provider exposes extraneous algorithms, it'll be caught because it'll have to 193 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 194 Set<Service> services = provider.getServices(); 210 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 211 assertNotNull(provider); 227 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 248 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 269 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local [all...] |
SignatureTest.java | 24 import java.security.Provider; 25 import java.security.Provider.Service; 79 // services. Thus, our provider has to expose the "ECDSA" service whose actual proper 332 // Assert that Android Keystore Provider exposes exactly the expected signature algorithms. 335 // If the Provider exposes extraneous algorithms, it'll be caught because it'll have to 339 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 340 Set<Service> services = provider.getServices(); 366 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME) local 382 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 397 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 426 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 449 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 570 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 623 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local 721 Provider provider = Security.getProvider(EXPECTED_PROVIDER_NAME); local [all...] |
/external/caliper/caliper/src/main/java/com/google/caliper/runner/ |
ExperimentingRunnerModule.java | 53 import javax.inject.Provider; 119 Map<Class<? extends ResultProcessor>, Provider<ResultProcessor>> availableProcessors) { 122 Provider<ResultProcessor> resultProcessorProvider = availableProcessors.get(processorClass); 183 Map<Class<? extends Instrument>, Provider<Instrument>> availableInstruments, 201 Provider<Instrument> instrumentProvider = availableInstruments.get(clazz);
|
/external/pdfium/core/fpdfdoc/ |
cpdf_variabletext.h | 64 class Provider { 66 explicit Provider(IPVT_FontMap* pFontMap); 67 virtual ~Provider(); 85 void SetProvider(CPDF_VariableText::Provider* pProvider); 237 CPDF_VariableText::Provider* m_pVTProvider;
|
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreProvider.java | 31 import java.security.Provider; 50 * A provider focused on providing JCA interfaces for the Android KeyStore. 54 public class AndroidKeyStoreProvider extends Provider { 57 // IMPLEMENTATION NOTE: Class names are hard-coded in this provider to avoid loading these 58 // classes when this provider is instantiated and installed early on during each app's 61 // Crypto operations operating on the AndroidKeyStore keys must not be offered by this provider. 68 super(PROVIDER_NAME, 1.0, "Android KeyStore security provider"); 99 * Installs a new instance of this provider (and the 103 Provider[] providers = Security.getProviders(); 106 Provider provider = providers[i] local [all...] |
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
KeyManagerFactoryTest.java | 24 import java.security.Provider; 263 Provider[] providers = Security.getProviders(); 264 for (Provider provider : providers) { 265 Set<Provider.Service> services = provider.getServices(); 266 for (Provider.Service service : services) { 281 provider); 283 assertEquals(provider, kmf.getProvider()); 289 provider.getName()) [all...] |
/external/guice/extensions/servlet/test/com/google/inject/servlet/ |
ServletTest.java | 38 import com.google.inject.Provider; 168 @Inject Provider<ServletRequest> servletReqProvider; 169 @Inject Provider<HttpServletRequest> reqProvider; 170 @Inject Provider<ServletResponse> servletRespProvider; 171 @Inject Provider<HttpServletResponse> respProvider; 229 final Provider<ServletRequest> servletReqProvider = getProvider(ServletRequest.class); 230 final Provider<HttpServletRequest> reqProvider = getProvider(HttpServletRequest.class); 231 final Provider<ServletResponse> servletRespProvider = getProvider(ServletResponse.class); 232 final Provider<HttpServletResponse> respProvider = getProvider(HttpServletResponse.class);
|
/external/guice/core/test/com/google/inject/ |
KeyTest.java | 52 public void bar(Provider<List<String>> a) {} 72 Key<?> expected = Key.get(getClass().getMethod("bar", Provider.class) 284 final AtomicReference<Provider<List<String>>> stringProvider = 285 new AtomicReference<Provider<List<String>>>(); 286 final AtomicReference<Provider<List<Integer>>> intProvider = 287 new AtomicReference<Provider<List<Integer>>>();
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/security/cert/ |
X509CertificateTest.java | 39 import java.security.Provider; 44 import java.security.Provider.Service; 122 private Provider myProvider; 128 private Provider mySSProvider; 662 // Side Effect: Destroys MD5 provider, hurts succeeding tests 754 // Keep track of the original position so the provider can be 756 Provider[] providers = Security.getProviders(); 775 // Find the Provider which offers MD5withRSA for the certificate's 779 Provider provider = signature.getProvider() local [all...] |
/packages/apps/Email/provider_src/com/android/email/activity/setup/ |
AccountSettingsUtils.java | 27 import com.android.email.provider.AccountBackupRestore; 31 import com.android.emailcommon.VendorPolicyLoader.Provider; 32 import com.android.emailcommon.provider.Account; 33 import com.android.emailcommon.provider.EmailContent.AccountColumns; 34 import com.android.emailcommon.provider.QuickResponse; 52 * Commits the UI-related settings of an account to the provider. This is static so that it 121 * @param provider The OAuth provider to register with 126 final OAuthProvider provider, final String emailAddress) { 127 final Uri.Builder b = Uri.parse(provider.authEndpoint).buildUpon() 153 OAuthProvider provider = null; local 202 OAuthProvider provider = null; local 270 Provider provider = null; local [all...] |