/aosp12/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | PackageKeySetData.java | 46 protected void setProperSigningKeySet(long ks) { in setProperSigningKeySet() 61 Long ks = mKeySetAliases.get(alias); in addUpgradeKeySet() local 75 protected void addUpgradeKeySetById(long ks) { in addUpgradeKeySetById() 104 protected void addDefinedKeySet(long ks, String alias) { in addDefinedKeySet()
|
H A D | KeySetManagerService.java | 136 public boolean packageIsSignedByLPr(String packageName, KeySetHandle ks) { in packageIsSignedByLPr() 162 public boolean packageIsSignedByExactlyLPr(String packageName, KeySetHandle ks) { in packageIsSignedByExactlyLPr() 261 KeySetHandle ks = addKeySetLPw(signingKeys); in addSigningKeySetToPackageLPw() local 271 private long getIdByKeySetLPr(KeySetHandle ks) { in getIdByKeySetLPr() 295 KeySetHandle ks = addKeySetLPw(pubKeys); in addDefinedKeySetsToPackageLPw() local 453 KeySetHandle ks = mKeySets.get(existingKeySetId); in addKeySetLPw() local 462 KeySetHandle ks = new KeySetHandle(id); in addKeySetLPw() local 474 KeySetHandle ks = mKeySets.get(id); in decrementKeySetLPw() local 817 KeySetHandle ks = mKeySets.get(keySetRefCounts.keyAt(i)); in addRefCountsFromSavedPackagesLPw() local
|
/aosp12/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
H A D | RebootEscrowProviderServerBasedImplTests.java | 100 RebootEscrowKey ks = mRebootEscrowProvider.getAndClearRebootEscrowKey( in getAndClearRebootEscrowKey_loopback_success() local 124 RebootEscrowKey ks = mRebootEscrowProvider.getAndClearRebootEscrowKey( in getAndClearRebootEscrowKey_WrongDecryptionMethod_failure() local 140 RebootEscrowKey ks = mRebootEscrowProvider.getAndClearRebootEscrowKey( in getAndClearRebootEscrowKey_ServiceConnectionException_failure() local
|
H A D | LockSettingsServiceTestable.java | 159 java.security.KeyStore ks) { in getManagedProfilePasswordCache()
|
/aosp12/frameworks/base/services/core/java/com/android/server/locksettings/ |
H A D | RebootEscrowData.java | 73 private static byte[] decryptBlobCurrentVersion(SecretKey kk, RebootEscrowKey ks, in decryptBlobCurrentVersion() 86 static RebootEscrowData fromEncryptedData(RebootEscrowKey ks, byte[] blob, SecretKey kk) in fromEncryptedData() 109 static RebootEscrowData fromSyntheticPassword(RebootEscrowKey ks, byte spVersion, in fromSyntheticPassword()
|
/aosp12/packages/apps/Car/Dialer/src/com/android/car/dialer/storage/ |
H A D | CipherConverter.java | 75 KeyStore ks = getKeyStore(); in decrypt() local 113 KeyStore ks = getKeyStore(); in encrypt() local
|
/aosp12/frameworks/base/core/java/android/security/net/config/ |
H A D | KeyStoreConfigSource.java | 31 public KeyStoreConfigSource(KeyStore ks) { in KeyStoreConfigSource()
|
H A D | RootTrustManagerFactorySpi.java | 52 public void engineInit(KeyStore ks) throws KeyStoreException { in engineInit()
|
H A D | KeyStoreCertificateSource.java | 40 public KeyStoreCertificateSource(KeyStore ks) { in KeyStoreCertificateSource()
|
/aosp12/frameworks/base/core/java/android/content/pm/ |
H A D | KeySet.java | 51 KeySet ks = (KeySet) o; in equals() local
|
/aosp12/frameworks/base/services/backup/java/com/android/server/backup/utils/ |
H A D | PasswordUtils.java | 124 KeySpec ks = new PBEKeySpec(pwArray, salt, rounds, PBKDF2_KEY_SIZE); in buildCharArrayKey() local
|
/aosp12/frameworks/opt/telephony/src/java/com/android/internal/telephony/dataconnection/ |
H A D | DcNetworkAgent.java | 506 void handleKeepaliveStarted(final int slot, KeepaliveStatus ks) { in handleKeepaliveStarted() 529 void handleKeepaliveStatus(KeepaliveStatus ks) { in handleKeepaliveStatus()
|
/aosp12/packages/modules/Wifi/service/java/com/android/server/wifi/hotspot2/ |
H A D | PasspointObjectFactory.java | 184 public TrustManagerFactory getTrustManagerFactory(KeyStore ks) { in getTrustManagerFactory()
|
/aosp12/packages/apps/ManagedProvisioning/res/raw/ |
H A D | not_private_animation.json | 1 …mp_0","layers":[{"ddd":0,"ind":1,"ty":4,"nm":".white","cl":"white","sr":1,"ks":{"o":{"a":0,"k":100… object
|
H A D | it_admin_control_device_block_apps_animation.json | 1 …ayers":[{"ddd":0,"ind":1,"ty":4,"nm":".purple600","cl":"purple600","sr":1,"ks":{"o":{"a":0,"k":100… object
|
H A D | consent_animation_do.json | 1 …","layers":[{"ddd":0,"ind":1,"ty":4,"nm":".blue300","cl":"blue300","sr":1,"ks":{"o":{"a":0,"k":100… object
|
H A D | consent_animation_po.json | 1 …","layers":[{"ddd":0,"ind":1,"ty":4,"nm":".blue300","cl":"blue300","sr":1,"ks":{"o":{"a":0,"k":100… object
|
H A D | pause_work_apps_animation.json | 1 …","layers":[{"ddd":0,"ind":1,"ty":4,"nm":".grey300","cl":"grey300","sr":1,"ks":{"o":{"a":0,"k":100… object
|
/aosp12/packages/modules/Wifi/framework/java/android/net/wifi/hotspot2/ |
H A D | ConfigParser.java | 456 KeyStore ks = KeyStore.getInstance("PKCS12"); in parsePkcs12() local
|
/aosp12/packages/apps/Settings/res/raw/ |
H A D | auto_awesome_battery_lottie.json | 1 …_0","layers":[{"ddd":0,"ind":1,"ty":4,"nm":".blue50","cl":"blue50","sr":1,"ks":{"o":{"a":0,"k":100… object
|
H A D | accessibility_color_inversion_banner.json | 21 "ks": { object 493 "ks": { object 752 "ks": { object 1010 "ks": { object 1229 "ks": { object 1419 "ks": { object 1933 "ks": { object 2447 "ks": { object 2501 "ks": { object 2584 "ks": { object [all …]
|
H A D | extra_dim_banner.json | 21 "ks": { object 280 "ks": { object 752 "ks": { object 1010 "ks": { object 1093 "ks": { object 1283 "ks": { object 1473 "ks": { object 1987 "ks": { object 2501 "ks": { object 2555 "ks": { object [all …]
|
H A D | lottie_system_nav_3_button.json | 1 …"layers":[{"ddd":0,"ind":1,"ty":4,"nm":".blue400\n","cl":"blue400","sr":1,"ks":{"o":{"a":0,"k":100… object
|
H A D | lottie_system_nav_2_button.json | 1 …","layers":[{"ddd":0,"ind":1,"ty":4,"nm":".blue400","cl":"blue400","sr":1,"ks":{"o":{"a":0,"k":100… object
|
/aosp12/frameworks/base/identity/java/android/security/identity/ |
H A D | CredstoreIdentityCredential.java | 94 KeyStore ks = KeyStore.getInstance("PKCS12"); in ensureEphemeralKeyPair() local
|