11912eaf78
- Generate RSA signing keys with combinations of digest modes [NONE, MD5, SHA1, SHA_2_224, SHA_2_256, SHA_2_384, SHA_2_512] and padding modes [NONE, RSA_PKCS1_1_5_SIGN, RSA_PSS]. Should be able to create operations using these keys except in below cases. - when padding mode is RSA_PSS and digest mode is NONE - when padding mode is NONE and digest is other than NONE. - Generate RSA encrypt/decrypt keys with OAEP padding mode, combinations of digests [MD5, SHA1, SHA_2_224, SHA_2_256, SHA_2_384, SHA_2_512] and mgf-digests [MD5, SHA1, SHA_2_224, SHA_2_256, SHA_2_384, SHA_2_512]. Should be able to create operations with these generated keys successfully. - Generate RSA encrypt/decrypt keys with combinations of padding modes [NONE, RSA_PKCS1_1_5_ENCRYPT, RSA_OAEP], digests [NONE, MD5, SHA1, SHA_2_224, SHA_2_256, SHA_2_384, SHA_2_512]. Should be able to create operations with these generated keys successfully except in below case - with padding mode RSA_OAEP and digest mode NONE an error is expected. - Generate RSA encrypt/decrypt keys with padding modes [NONE, RSA_PKCS1_1_5_ENCRYPT, RSA_OAEP] and without digests. Should be able to create operations with these generated keys successfully. - Generate RSA keys without padding modes and digest modes. Creation of an operation should fail with unsupported padding mode error. - Tests to validate failure of generating RSA keys with incompatible purpose, unsupported purpose, unsupported padding mode, unsupported digest and unsupported key sizes. Bug: 194359114 Test: atest keystore2_client_test Change-Id: I16843932cc170d0e820208f558587aacf13b9272 |
||
---|---|---|
.. | ||
authorizations.rs | ||
key_generations.rs | ||
lib.rs | ||
run_as.rs |