/cts/tests/tests/security/src/android/security/cts/ |
D | CertBlacklistTest.java | 60 X509Certificate[] chain = loadCertificates(BLACKLISTED_CHAIN); in testBlacklistedRootOfTrust() local 62 assertUntrusted(chain, getTrustManager(blacklistedCa)); in testBlacklistedRootOfTrust() 76 X509Certificate[] chain = loadCertificates(BLACKLISTED_VALID_CHAIN); in testBlacklistedIntermediateFallback() local 79 assertTrusted(chain, getTrustManager(blacklistedCa, validCa)); in testBlacklistedIntermediateFallback() 82 assertUntrusted(chain, getTrustManager(blacklistedCa)); in testBlacklistedIntermediateFallback()
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/security/ |
D | KeyChainTest.java | 212 final Certificate[] chain = new Certificate[2]; in doInBackground() local 236 chain[0] = f.generateCertificate(res.openRawResource(R.raw.usercert)); in doInBackground() 237 chain[1] = f.generateCertificate(res.openRawResource(R.raw.cacert)); in doInBackground() 247 ks.setKeyEntry(ALIAS, privKey, EMPTY_PASSWORD, chain); in doInBackground() 297 public void checkClientTrusted(X509Certificate[] chain, String authType) in checkClientTrusted() argument 299 mOther.checkClientTrusted(chain, authType); in checkClientTrusted() 302 public void checkServerTrusted(X509Certificate[] chain, String authType) in checkServerTrusted() argument 304 mOther.checkServerTrusted(chain, authType); in checkServerTrusted()
|
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/scripts/ |
D | generate-client-cert-chain.sh | 87 > "$TARGETDIR"/user-cert-chain.crt 95 -out "$TARGETDIR"/user-cert-chain.key
|
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/ |
D | KeyManagementTest.java | 408 private void validateSignatureChain(List<Certificate> chain, PublicKey leafKey) in validateSignatureChain() argument 410 X509Certificate leaf = (X509Certificate) chain.get(0); in validateSignatureChain() 414 for (int i = 1; i < chain.size(); i++) { in validateSignatureChain() 415 X509Certificate intermediate = (X509Certificate) chain.get(i); in validateSignatureChain() 703 List<Certificate> chain = loadCertificateChain("user-cert-chain.crt"); in testCanSetKeyPairCertChain() local 704 mDevicePolicyManager.setKeyPairCertificate(getWho(), alias, chain, true); in testCanSetKeyPairCertChain() local 709 assertThat(fetchedCerts.length).isEqualTo(chain.size()); in testCanSetKeyPairCertChain() 710 for (int i = 0; i < chain.size(); i++) { in testCanSetKeyPairCertChain() 711 assertThat(fetchedCerts[i].getEncoded()).isEqualTo(chain.get(i).getEncoded()); in testCanSetKeyPairCertChain()
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
D | AndroidKeyStoreTest.java | 1608 final Certificate[] chain = new Certificate[2]; in testKeyStore_SetKeyEntry_ProtectedKey_Unencrypted_Failure() local 1609 chain[0] = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_USER_1)); in testKeyStore_SetKeyEntry_ProtectedKey_Unencrypted_Failure() 1610 chain[1] = caCert; in testKeyStore_SetKeyEntry_ProtectedKey_Unencrypted_Failure() 1613 mKeyStore.setKeyEntry(TEST_ALIAS_1, privKey, "foo".toCharArray(), chain); in testKeyStore_SetKeyEntry_ProtectedKey_Unencrypted_Failure() 1628 final Certificate[] chain = new Certificate[2]; in testKeyStore_SetKeyEntry_Unencrypted_Success() local 1629 chain[0] = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_USER_1)); in testKeyStore_SetKeyEntry_Unencrypted_Success() 1630 chain[1] = caCert; in testKeyStore_SetKeyEntry_Unencrypted_Success() 1632 mKeyStore.setKeyEntry(TEST_ALIAS_1, privKey, null, chain); in testKeyStore_SetKeyEntry_Unencrypted_Success() 1656 final Certificate[] chain = new Certificate[2]; in testKeyStore_SetKeyEntry_Replaced_Unencrypted_Success() local 1657 chain[0] = f.generateCertificate(new ByteArrayInputStream(FAKE_RSA_USER_1)); in testKeyStore_SetKeyEntry_Replaced_Unencrypted_Success() [all …]
|
D | TestUtils.java | 187 Certificate[] chain = privEntry.getCertificateChain(); in assertKeyStoreKeyPair() local 188 if (chain.length == 0) { in assertKeyStoreKeyPair() 192 assertEquals(cert, chain[0]); in assertKeyStoreKeyPair()
|
D | KeyPairGeneratorTest.java | 1743 private final X509Certificate[] chain; field in KeyPairGeneratorTest.MyKeyManager 1747 this.chain = certChain; in MyKeyManager() 1762 return chain; in getCertificateChain()
|
/cts/tests/tests/networksecurityconfig/networksecurityconfig-downloadmanager/src/android/security/net/config/cts/ |
D | DownloadManagerTest.java | 139 X509Certificate[] chain = new X509Certificate[certs.size()]; in bindTLSServer() local 142 chain[i++] = (X509Certificate) cert; in bindTLSServer() 163 ks.setKeyEntry("name", key, null, chain); in bindTLSServer()
|
/cts/libs/testserver/src/android/webkit/cts/ |
D | TestWebServer.java | 351 public void checkClientTrusted(X509Certificate[] chain, String authType) { in checkClientTrusted() argument 356 public void checkServerTrusted(X509Certificate[] chain, String authType) { in checkServerTrusted() argument
|
D | CtsTestServer.java | 240 public void checkClientTrusted(X509Certificate[] chain, String authType) { in checkClientTrusted() argument 244 public void checkServerTrusted(X509Certificate[] chain, String authType) { in checkServerTrusted() argument
|
/cts/tests/tests/webkit/src/android/webkit/cts/ |
D | WebViewSslTest.java | 867 public void checkClientTrusted(X509Certificate[] chain, String authType) { in checkClientTrusted() argument 871 public void checkServerTrusted(X509Certificate[] chain, String authType) { in checkServerTrusted() argument
|
/cts/tests/tests/media/src/android/media/cts/ |
D | AdaptivePlaybackTest.java | 141 …return chain(H264(ALL), HEVC(ALL), VP8(ALL), VP9(ALL), AV1(ALL), Mpeg2(ALL), Mpeg4(ALL), H263(ALL)… in AllCodecs() 145 return chain(H264(SW), HEVC(SW), VP8(SW), VP9(SW), AV1(SW), Mpeg2(SW), Mpeg4(SW), H263(SW)); in SWCodecs() 149 return chain(H264(HW), HEVC(HW), VP8(HW), VP9(HW), AV1(HW), Mpeg2(HW), Mpeg4(HW), H263(HW)); in HWCodecs() 867 static <E> Iterable<E> chain(Iterable<E> ... iterables) {
|