Searched refs:challenge (Results 1 – 6 of 6) sorted by relevance
/cts/tests/tests/keystore/src/android/keystore/cts/ |
D | AttestationPerformanceTest.java | 38 for (byte[] challenge : ATTESTATION_CHALLENGES) { in testRsaKeyAttestation() 41 new AndroidKeystoreRsaKeyGenerator("SHA1withRSA", keySize, challenge), in testRsaKeyAttestation() 42 keySize, challenge.length)); in testRsaKeyAttestation() 48 for (byte[] challenge : ATTESTATION_CHALLENGES) { in testEcKeyAttestation() 51 new AndroidKeystoreEcKeyGenerator("SHA1withECDSA", curve, challenge), in testEcKeyAttestation() 53 challenge.length)); in testEcKeyAttestation() 60 AndroidKeystoreRsaKeyGenerator(String algorithm, int keySize, byte[] challenge) in AndroidKeystoreRsaKeyGenerator() argument 72 .setAttestationChallenge(challenge) in AndroidKeystoreRsaKeyGenerator() 79 AndroidKeystoreEcKeyGenerator(String algorithm, int keySize, byte[] challenge) in AndroidKeystoreEcKeyGenerator() argument 89 .setAttestationChallenge(challenge) in AndroidKeystoreEcKeyGenerator()
|
D | KeyAttestationTest.java | 472 for (byte[] challenge : challenges) { in testRsaAttestation() 475 testRsaAttestations(keySize, challenge, purpose, encryptionPaddingModes, in testRsaAttestation() 478 testRsaAttestations(keySize, challenge, purpose, signaturePaddingModes, in testRsaAttestation() 620 private void testRsaAttestations(int keySize, byte[] challenge, int purpose, in testRsaAttestations() argument 624 testRsaAttestation(challenge, true /* includeValidityDates */, keySize, purpose, in testRsaAttestations() 626 testRsaAttestation(challenge, false /* includeValidityDates */, keySize, purpose, in testRsaAttestations() 636 new String(challenge) + "], purposes " + in testRsaAttestations() 652 private void testRsaAttestation(byte[] challenge, boolean includeValidityDates, int keySize, in testRsaAttestation() argument 655 Log.i(TAG, "RSA key attestation with: challenge " + Arrays.toString(challenge) + in testRsaAttestation() 668 .setAttestationChallenge(challenge) in testRsaAttestation() [all …]
|
/cts/tests/tests/identity/src/android/security/identity/cts/ |
D | AttestationTest.java | 62 byte[] challenge = new byte[challengeLength]; in attestationTest() 63 random.nextBytes(challenge); in attestationTest() 69 store, credentialName, challenge); in attestationTest() 106 assertArrayEquals(challenge, record.getAttestationChallenge()); in attestationTest()
|
D | ProvisioningTest.java | 123 byte[] challenge) throws IdentityCredentialException { in createCredentialWithChallenge() argument 124 return createCredentialWithChallengeAndAcpId(store, credentialName, challenge, 0); in createCredentialWithChallenge() 129 byte[] challenge, in createCredentialWithChallengeAndAcpId() argument 135 wc.getCredentialKeyCertificateChain(challenge); in createCredentialWithChallengeAndAcpId() 472 byte[] challenge = new byte[]{0x20, 0x21}; in deleteCredential() 473 byte[] proofOfDeletionSignature = credential.delete(challenge); in deleteCredential() 513 byte[] challenge = new byte[]{0x12, 0x22}; in proofOfOwnership() 514 byte[] proofOfOwnershipSignature = credential.proveOwnership(challenge); in proofOfOwnership() 1119 byte[] challenge = {0x01, 0x02}; in testUpdateCredential() 1123 Collection<X509Certificate> certChain = wc.getCredentialKeyCertificateChain(challenge); in testUpdateCredential()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2115/ |
D | poc.cpp | 97 uint64_t challenge = 0; in main() local 100 object->MintAuthToken(sb, timestamp, user_id, authenticator_id, challenge); in main()
|
/cts/tests/tests/carrierapi/src/android/carrierapi/cts/ |
D | CarrierApiTest.java | 1330 String challenge = "10" + EAP_SIM_AKA_RAND; in testEapSimAuthentication() local 1331 String base64Challenge = Base64.encodeToString(hexStringToBytes(challenge), Base64.NO_WRAP); in testEapSimAuthentication() 1351 String challenge = "10" + EAP_SIM_AKA_RAND + "10" + EAP_AKA_AUTN; in testEapAkaAuthentication() local 1352 String base64Challenge = Base64.encodeToString(hexStringToBytes(challenge), Base64.NO_WRAP); in testEapAkaAuthentication()
|