Home
last modified time | relevance | path

Searched refs:challenge (Results 1 – 6 of 6) sorted by relevance

/cts/tests/tests/keystore/src/android/keystore/cts/
DAttestationPerformanceTest.java38 for (byte[] challenge : ATTESTATION_CHALLENGES) { in testRsaKeyAttestation()
41 new AndroidKeystoreRsaKeyGenerator("SHA1withRSA", keySize, challenge), in testRsaKeyAttestation()
42 keySize, challenge.length)); in testRsaKeyAttestation()
48 for (byte[] challenge : ATTESTATION_CHALLENGES) { in testEcKeyAttestation()
51 new AndroidKeystoreEcKeyGenerator("SHA1withECDSA", curve, challenge), in testEcKeyAttestation()
53 challenge.length)); in testEcKeyAttestation()
60 AndroidKeystoreRsaKeyGenerator(String algorithm, int keySize, byte[] challenge) in AndroidKeystoreRsaKeyGenerator() argument
72 .setAttestationChallenge(challenge) in AndroidKeystoreRsaKeyGenerator()
79 AndroidKeystoreEcKeyGenerator(String algorithm, int keySize, byte[] challenge) in AndroidKeystoreEcKeyGenerator() argument
89 .setAttestationChallenge(challenge) in AndroidKeystoreEcKeyGenerator()
DKeyAttestationTest.java472 for (byte[] challenge : challenges) { in testRsaAttestation()
475 testRsaAttestations(keySize, challenge, purpose, encryptionPaddingModes, in testRsaAttestation()
478 testRsaAttestations(keySize, challenge, purpose, signaturePaddingModes, in testRsaAttestation()
620 private void testRsaAttestations(int keySize, byte[] challenge, int purpose, in testRsaAttestations() argument
624 testRsaAttestation(challenge, true /* includeValidityDates */, keySize, purpose, in testRsaAttestations()
626 testRsaAttestation(challenge, false /* includeValidityDates */, keySize, purpose, in testRsaAttestations()
636 new String(challenge) + "], purposes " + in testRsaAttestations()
652 private void testRsaAttestation(byte[] challenge, boolean includeValidityDates, int keySize, in testRsaAttestation() argument
655 Log.i(TAG, "RSA key attestation with: challenge " + Arrays.toString(challenge) + in testRsaAttestation()
668 .setAttestationChallenge(challenge) in testRsaAttestation()
[all …]
/cts/tests/tests/identity/src/android/security/identity/cts/
DAttestationTest.java62 byte[] challenge = new byte[challengeLength]; in attestationTest()
63 random.nextBytes(challenge); in attestationTest()
69 store, credentialName, challenge); in attestationTest()
106 assertArrayEquals(challenge, record.getAttestationChallenge()); in attestationTest()
DProvisioningTest.java123 byte[] challenge) throws IdentityCredentialException { in createCredentialWithChallenge() argument
124 return createCredentialWithChallengeAndAcpId(store, credentialName, challenge, 0); in createCredentialWithChallenge()
129 byte[] challenge, in createCredentialWithChallengeAndAcpId() argument
135 wc.getCredentialKeyCertificateChain(challenge); in createCredentialWithChallengeAndAcpId()
472 byte[] challenge = new byte[]{0x20, 0x21}; in deleteCredential()
473 byte[] proofOfDeletionSignature = credential.delete(challenge); in deleteCredential()
513 byte[] challenge = new byte[]{0x12, 0x22}; in proofOfOwnership()
514 byte[] proofOfOwnershipSignature = credential.proveOwnership(challenge); in proofOfOwnership()
1119 byte[] challenge = {0x01, 0x02}; in testUpdateCredential()
1123 Collection<X509Certificate> certChain = wc.getCredentialKeyCertificateChain(challenge); in testUpdateCredential()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2115/
Dpoc.cpp97 uint64_t challenge = 0; in main() local
100 object->MintAuthToken(sb, timestamp, user_id, authenticator_id, challenge); in main()
/cts/tests/tests/carrierapi/src/android/carrierapi/cts/
DCarrierApiTest.java1330 String challenge = "10" + EAP_SIM_AKA_RAND; in testEapSimAuthentication() local
1331 String base64Challenge = Base64.encodeToString(hexStringToBytes(challenge), Base64.NO_WRAP); in testEapSimAuthentication()
1351 String challenge = "10" + EAP_SIM_AKA_RAND + "10" + EAP_AKA_AUTN; in testEapAkaAuthentication() local
1352 String base64Challenge = Base64.encodeToString(hexStringToBytes(challenge), Base64.NO_WRAP); in testEapAkaAuthentication()