/aosp12/frameworks/base/keystore/java/android/security/keystore2/ |
H A D | AndroidKeyStoreProvider.java | 38 import java.security.Security; 119 Provider[] providers = Security.getProviders(); in install() 129 Security.addProvider(new AndroidKeyStoreProvider()); in install() 134 Security.insertProviderAt(workaroundProvider, bcProviderIndex + 1); in install() 138 Security.addProvider(workaroundProvider); in install()
|
/aosp12/frameworks/proto_logging/stats/enums/app/ |
H A D | settings_enums.proto | 1080 // OPEN: Settings > Security > Choose screen lock 1105 // OPEN: Settings > Security > Encrypt phone 1160 // OPEN: Settings > Security > Nexus Imprint 1295 // OPEN: Settings > Security > Screen pinning 1300 // OPEN: Settings > Security 1318 // OPEN: Settings > Security > Trust agents 1448 // OPEN: Settings > Security > Usage access 1538 // OPEN: Settings > Security > User credentials 1733 // OPEN: Settings > Security > User Credential 1939 // OPEN: Settings > Security [all …]
|
H A D | tvsettings_enums.proto | 526 // TvSettings > Apps > Security & restrictions 529 // TvSettings > Apps > Security & restrictions > Unknown sources 532 // TvSettings > Apps > Security & restrictions > Verify apps (toggle) 535 // TvSettings > Apps > Security & restrictions > Create restricted profile 538 // TvSettings > Apps > Security & restrictions > Enter restricted profile 541 // TvSettings > Apps > Security & restrictions > 545 // TvSettings > Apps > Security & restrictions > 549 // TvSettings > Apps > Security & restrictions > 553 // TvSettings > Apps > Security & restrictions >
|
/aosp12/frameworks/base/core/java/android/security/net/config/ |
H A D | NetworkSecurityConfigProvider.java | 23 import java.security.Security; 41 int pos = Security.insertProviderAt(new NetworkSecurityConfigProvider(), 1); in install()
|
H A D | RootTrustManagerFactorySpi.java | 26 import java.security.Security;
|
/aosp12/system/extras/verity/ |
H A D | VeritySigner.java | 21 import java.security.Security; 40 Security.addProvider(new BouncyCastleProvider()); in main()
|
H A D | BootSignature.java | 25 import java.security.Security; 328 Security.addProvider(new BouncyCastleProvider()); in main()
|
H A D | Utils.java | 33 import java.security.Security; 129 Security.insertProviderAt((Provider) o, 1); in loadProviderIfNecessary()
|
/aosp12/build/make/tools/signtos/ |
H A D | SignTos.java | 43 import java.security.Security; 200 Security.insertProviderAt((Provider) o, 1); in loadProviderIfNecessary() 293 Security.addProvider(sBouncyCastleProvider); in main()
|
/aosp12/frameworks/av/tools/ |
H A D | mainline_hook_project.sh | 43 Security bulletin timing or unreleased functionality may determine when that can be landed.
|
H A D | mainline_hook_partial.sh | 164 Security bulletin timing or unreleased functionality may drive when this can be landed.
|
/aosp12/system/ca-certificates/files/ |
H A D | a3896b44.0 | 26 Issuer: C=JP, O=SECOM Trust.net, OU=Security Communication RootCA1 30 Subject: C=JP, O=SECOM Trust.net, OU=Security Communication RootCA1
|
H A D | d59297b8.0 | 27 Issuer: C=JP, O=SECOM Trust Systems CO.,LTD., OU=Security Communication RootCA2 31 Subject: C=JP, O=SECOM Trust Systems CO.,LTD., OU=Security Communication RootCA2
|
H A D | 76579174.0 | 32 …Issuer: C=US, OU=www.xrampsecurity.com, O=XRamp Security Services Inc, CN=XRamp Global Certificati… 36 …Subject: C=US, OU=www.xrampsecurity.com, O=XRamp Security Services Inc, CN=XRamp Global Certificat…
|
H A D | 6187b673.0 | 38 Issuer: C=US, O=Internet Security Research Group, CN=ISRG Root X1 42 Subject: C=US, O=Internet Security Research Group, CN=ISRG Root X1
|
/aosp12/system/logging/logd/ |
H A D | README.auditd | 6 includes Linux Security Modules (LSM) messages as well.
|
/aosp12/frameworks/base/ |
H A D | ApiDocs.bp | 298 " -samplegroup Security " + 332 " -samplegroup Security " + 362 " -samplegroup Security " + 473 " -samplegroup Security " +
|
/aosp12/packages/modules/IPsec/src/java/com/android/internal/net/eap/crypto/ |
H A D | TlsSession.java | 40 import java.security.Security; 93 private static final Provider TRUST_MANAGER_PROVIDER = Security.getProvider("HarmonyJSSE");
|
/aosp12/build/make/core/ |
H A D | envsetup.rbc | 91 …ld includes all security patches issued up through the designated Android Public Security Bulletin. 93 … # It must match one of the Android Security Patch Level strings of the Public Security Bulletins.
|
/aosp12/system/sepolicy/prebuilts/api/27.0/public/ |
H A D | hal_neverallows.te | 27 # 1) Security sensitive components should only be accessed by specific HALs.
|
/aosp12/system/sepolicy/prebuilts/api/26.0/public/ |
H A D | hal_neverallows.te | 28 # 1) Security sensitive components should only be accessed by specific HALs.
|
/aosp12/frameworks/av/drm/libmediadrm/fuzzer/ |
H A D | README.md | 12 1. Security Level (parameter name: `securityLevel`)
|
/aosp12/system/sepolicy/prebuilts/api/28.0/public/ |
H A D | hal_neverallows.te | 34 # 1) Security sensitive components should only be accessed by specific HALs.
|
/aosp12/system/sepolicy/prebuilts/api/29.0/public/ |
H A D | hal_neverallows.te | 34 # 1) Security sensitive components should only be accessed by specific HALs.
|
/aosp12/system/sepolicy/prebuilts/api/30.0/public/ |
H A D | hal_neverallows.te | 36 # 1) Security sensitive components should only be accessed by specific HALs.
|