/cts/tests/tests/security/src/android/security/cts/ |
D | CertBlacklistTest.java | 60 X509Certificate[] chain = loadCertificates(BLACKLISTED_CHAIN); in testBlacklistedRootOfTrust() local 62 assertUntrusted(chain, getTrustManager(blacklistedCa)); in testBlacklistedRootOfTrust() 76 X509Certificate[] chain = loadCertificates(BLACKLISTED_VALID_CHAIN); in testBlacklistedIntermediateFallback() local 79 assertTrusted(chain, getTrustManager(blacklistedCa, validCa)); in testBlacklistedIntermediateFallback() 82 assertUntrusted(chain, getTrustManager(blacklistedCa)); in testBlacklistedIntermediateFallback()
|
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/scripts/ |
D | generate-client-cert-chain.sh | 87 > "$TARGETDIR"/user-cert-chain.crt 95 -out "$TARGETDIR"/user-cert-chain.key
|
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/ |
D | KeyManagementTest.java | 315 private void validateSignatureChain(List<Certificate> chain, PublicKey leafKey) in validateSignatureChain() argument 317 X509Certificate leaf = (X509Certificate) chain.get(0); in validateSignatureChain() 321 for (int i = 1; i < chain.size(); i++) { in validateSignatureChain() 322 X509Certificate intermediate = (X509Certificate) chain.get(i); in validateSignatureChain() 712 List<Certificate> chain = loadCertificateChain("user-cert-chain.crt"); in testCanSetKeyPairCertChain() local 713 mDevicePolicyManager.setKeyPairCertificate(getWho(), alias, chain, true); in testCanSetKeyPairCertChain() local 718 assertThat(fetchedCerts.length).isEqualTo(chain.size()); in testCanSetKeyPairCertChain() 719 for (int i = 0; i < chain.size(); i++) { in testCanSetKeyPairCertChain() 720 assertThat(fetchedCerts[i].getEncoded()).isEqualTo(chain.get(i).getEncoded()); in testCanSetKeyPairCertChain()
|
/cts/hostsidetests/appsecurity/test-apps/IsolatedSplitApp/feature_a/ |
D | Android.bp | 43 // isolated splits, it must only be unique across a dependency chain. 70 // isolated splits, it must only be unique across a dependency chain.
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
D | AndroidKeyStoreTest.java | 1612 final Certificate[] chain = new Certificate[2]; in testKeyStore_SetKeyEntry_ProtectedKey_Unencrypted_Failure() local 1613 chain[0] = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_USER_1)); in testKeyStore_SetKeyEntry_ProtectedKey_Unencrypted_Failure() 1614 chain[1] = caCert; in testKeyStore_SetKeyEntry_ProtectedKey_Unencrypted_Failure() 1617 mKeyStore.setKeyEntry(TEST_ALIAS_1, privKey, "foo".toCharArray(), chain); in testKeyStore_SetKeyEntry_ProtectedKey_Unencrypted_Failure() 1632 final Certificate[] chain = new Certificate[2]; in testKeyStore_SetKeyEntry_Unencrypted_Success() local 1633 chain[0] = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_USER_1)); in testKeyStore_SetKeyEntry_Unencrypted_Success() 1634 chain[1] = caCert; in testKeyStore_SetKeyEntry_Unencrypted_Success() 1636 mKeyStore.setKeyEntry(TEST_ALIAS_1, privKey, null, chain); in testKeyStore_SetKeyEntry_Unencrypted_Success() 1660 final Certificate[] chain = new Certificate[2]; in testKeyStore_SetKeyEntry_Replaced_Unencrypted_Success() local 1661 chain[0] = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_USER_1)); in testKeyStore_SetKeyEntry_Replaced_Unencrypted_Success() [all …]
|
D | TestUtils.java | 246 Certificate[] chain = privEntry.getCertificateChain(); in assertKeyStoreKeyPair() local 247 if (chain.length == 0) { in assertKeyStoreKeyPair() 251 assertEquals(cert, chain[0]); in assertKeyStoreKeyPair()
|
D | KeyPairGeneratorTest.java | 1804 private final X509Certificate[] chain; field in KeyPairGeneratorTest.MyKeyManager 1808 this.chain = certChain; in MyKeyManager() 1835 return chain; in getCertificateChain()
|
/cts/hostsidetests/appsecurity/test-apps/IsolatedSplitApp/feature_b/ |
D | Android.bp | 41 // isolated splits, it must only be unique across a dependency chain.
|
/cts/libs/testserver/src/android/webkit/cts/ |
D | CtsTestServer.java | 279 public void checkClientTrusted(X509Certificate[] chain, String authType) { in checkClientTrusted() argument 283 public void checkServerTrusted(X509Certificate[] chain, String authType) { in checkServerTrusted() argument 995 Certificate[] chain = new Certificate[1]; in getKeyManagersFromStreams() local 996 chain[0] = cf.generateCertificate(cert); in getKeyManagersFromStreams() 1000 keyStore.setKeyEntry("server", privKey, EMPTY_PASSWORD, chain); in getKeyManagersFromStreams()
|
D | TestWebServer.java | 351 public void checkClientTrusted(X509Certificate[] chain, String authType) { in checkClientTrusted() argument 356 public void checkServerTrusted(X509Certificate[] chain, String authType) { in checkServerTrusted() argument
|
/cts/tests/tests/webkit/src/android/webkit/cts/ |
D | WebViewSslTest.java | 905 public void checkClientTrusted(X509Certificate[] chain, String authType) { in checkClientTrusted() argument 909 public void checkServerTrusted(X509Certificate[] chain, String authType) { in checkServerTrusted() argument
|
/cts/tests/tests/media/src/android/media/cts/ |
D | AdaptivePlaybackTest.java | 134 …return chain(H264(ALL), HEVC(ALL), VP8(ALL), VP9(ALL), AV1(ALL), Mpeg2(ALL), Mpeg4(ALL), H263(ALL)… in AllCodecs() 138 return chain(H264(SW), HEVC(SW), VP8(SW), VP9(SW), AV1(SW), Mpeg2(SW), Mpeg4(SW), H263(SW)); in SWCodecs() 142 return chain(H264(HW), HEVC(HW), VP8(HW), VP9(HW), AV1(HW), Mpeg2(HW), Mpeg4(HW), H263(HW)); in HWCodecs() 871 static <E> Iterable<E> chain(Iterable<E> ... iterables) {
|