/cts/tests/tests/identity/src/android/security/identity/cts/ |
D | X509CertificateSigningTest.java | 61 KeyStore ks = null; in testSigning() local 63 ks = KeyStore.getInstance("AndroidKeyStore"); in testSigning() 64 ks.load(null); in testSigning() 65 ks.deleteEntry(keyToSignAlias); in testSigning() 66 ks.deleteEntry(keyToSignWithAlias); in testSigning() 67 assertFalse(ks.containsAlias(keyToSignAlias)); in testSigning() 68 assertFalse(ks.containsAlias(keyToSignWithAlias)); in testSigning() 85 assertTrue(ks.containsAlias(keyToSignAlias)); in testSigning() 86 assertTrue(ks.containsAlias(keyToSignWithAlias)); in testSigning()
|
D | ReaderAuthTest.java | 137 KeyStore ks = KeyStore.getInstance("AndroidKeyStore"); in readerAuth() local 138 ks.load(null); in readerAuth() 139 X509Certificate certA = (X509Certificate) ks.getCertificate("readerKeyA"); in readerAuth() 140 X509Certificate certB = (X509Certificate) ks.getCertificate("readerKeyB"); in readerAuth() 145 X509Certificate certC = (X509Certificate) ks.getCertificate("readerKeyC"); in readerAuth()
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
D | KeyStoreTest.java | 208 KeyStore ks = KeyStore.getInstance(algorithm, provider); in keyStores() local 209 assertEquals(provider, ks.getProvider()); in keyStores() 210 assertEquals(algorithm, ks.getType()); in keyStores() 211 if (!isUnsupported(ks)) { in keyStores() 212 keyStores.add(ks); in keyStores() 219 private static boolean isSecretKeyEnabled(KeyStore ks) { in isSecretKeyEnabled() argument 221 return (!(ks.getType().equals("JKS") in isSecretKeyEnabled() 222 || ks.getType().equals("CaseExactJKS") in isSecretKeyEnabled() 223 || (ks.getType().equals("PKCS12")) in isSecretKeyEnabled() 224 || (ks.getType().equals("AndroidKeyStore")))); in isSecretKeyEnabled() [all …]
|
D | KeyInfoTest.java | 189 KeyStore ks = KeyStore.getInstance("AndroidKeyStore"); in tearDown() local 190 ks.load(null); in tearDown() 191 ks.deleteEntry(KEY_ALIAS); in tearDown()
|
D | AndroidKeyStoreTest.java | 2015 KeyStore ks = KeyStore.getInstance("AndroidKeyStore"); in testKeyStore_Encrypting_RSA_NONE_NOPADDING() local 2016 assertNotNull(ks); in testKeyStore_Encrypting_RSA_NONE_NOPADDING() 2017 ks.load(null); in testKeyStore_Encrypting_RSA_NONE_NOPADDING() 2039 PrivateKey privateKey = (PrivateKey) ks.getKey(alias, null); in testKeyStore_Encrypting_RSA_NONE_NOPADDING() 2041 PublicKey publicKey = ks.getCertificate(alias).getPublicKey(); in testKeyStore_Encrypting_RSA_NONE_NOPADDING()
|
/cts/tests/tests/security/src/android/security/cts/ |
D | X509CertChainBuildingTest.java | 175 private static X509TrustManager getTrustManager(KeyStore ks, Provider p) throws Exception { in getTrustManager() argument 177 tmf.init(ks); in getTrustManager() 193 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); in assertExactPath() local 194 ks.load(null); in assertExactPath() 197 ks.setEntry(String.valueOf(i++), new KeyStore.TrustedCertificateEntry(root), null); in assertExactPath() 204 X509TrustManager tm = getTrustManager(ks, p); in assertExactPath()
|
D | CertBlocklistTest.java | 114 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); in getTrustManager() local 115 ks.load(null); in getTrustManager() 118 ks.setCertificateEntry(String.valueOf(i++), ca); in getTrustManager() 121 tmf.init(ks); in getTrustManager()
|
/cts/tests/tests/networksecurityconfig/networksecurityconfig-downloadmanager/src/android/security/net/config/cts/ |
D | DownloadManagerTest.java | 165 KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); in bindTLSServer() local 166 ks.load(null); in bindTLSServer() 167 ks.setKeyEntry("name", key, null, chain); in bindTLSServer() 171 tmf.init(ks); in bindTLSServer() 174 kmf.init(ks, null); in bindTLSServer()
|
/cts/hostsidetests/devicepolicy/app/DelegateApp/src/com/android/cts/delegate/ |
D | SecurityLoggingDelegateTest.java | 97 final KeyStore ks = KeyStore.getInstance("AndroidKeyStore"); in testGenerateLogs() local 98 ks.load(null); in testGenerateLogs() 100 ks.deleteEntry(GENERATED_KEY_ALIAS); in testGenerateLogs()
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/security/ |
D | KeyChainTest.java | 245 KeyStore ks = KeyStore.getInstance("PKCS12"); in doInBackground() local 246 ks.load(null, null); in doInBackground() 247 ks.setKeyEntry(ALIAS, privKey, EMPTY_PASSWORD, chain); in doInBackground() 248 mKeyStore = ks; in doInBackground()
|
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/ |
D | SecurityLoggingTest.java | 664 final KeyStore ks = KeyStore.getInstance("AndroidKeyStore"); in importKey() local 665 ks.load(null); in importKey() 666 ks.setEntry(alias, new KeyStore.SecretKeyEntry(new SecretKeySpec(new byte[32], "AES")), in importKey() 679 final KeyStore ks = KeyStore.getInstance("AndroidKeyStore"); in deleteKey() local 680 ks.load(null); in deleteKey() 681 ks.deleteEntry(keyAlias); in deleteKey()
|
/cts/tests/tests/security/res/raw/ |
D | cve_2019_2245.ts | 3150 ….�YG1���*���Tt:j%��mJ%�&,�|�[ˢhA2�*j����&6�y��EEV�A�_����M]�Q1<*X�� ks�Lk��,l��V���6��bF�… 3369 …�}Q��6S�V�F��?�'b���˭DF�YF5m�Ƙm=����5����+r�����-e-�s���O���7���`�W�ks�n���we��������7.V��… 7142 �S<`�Ġ�$�TPbd,�5tU�EA�+�c�m}>E���U�<���h3�6��1������[��ks���̕��ޣ�[
|
D | cve_2018_13925.ts | 3151 ….�YG1���*���Tt:j%��mJ%�&,�|�[ˢhA2�*j����&6�y��EEV�A�_����M]�Q1<*X�� ks�Lk��,l��V���6��bF�…
|
D | cve_2019_2244.ts | 3152 ….�YG1���*���Tt:j%��mJ%�&,�|�[ˢhA2�*j����&6�y��EEV�A�_����M]�Q1<*X�� ks�Lk��,l��V���6��bF�…
|