Update the TimeoutAuthenticationMultiSid test

Update TimeoutAuthenticationMultiSid test to support
generateKey for Strongbox implementations without
factory attestation.

Bug: 293211157
Test: run vts -m VtsAidlKeyMintTarget
Change-Id: I27bf08d2fd2d9e0217a90ee8ccb789adfd9d5f7f
This commit is contained in:
Subrahmanya Manikanta Venkateswarlu Bhamidipati Kameswara Sri 2023-07-26 01:10:22 +00:00
parent b93626c412
commit 07c7d28a84

View file

@ -453,8 +453,18 @@ TEST_P(AuthTest, TimeoutAuthenticationMultiSid) {
vector<uint8_t> keyblob;
vector<KeyCharacteristics> key_characteristics;
vector<Certificate> cert_chain;
ASSERT_EQ(ErrorCode::OK,
GenerateKey(builder, std::nullopt, &keyblob, &key_characteristics, &cert_chain));
auto result = GenerateKey(builder, std::nullopt, &keyblob, &key_characteristics, &cert_chain);
if (SecLevel() == SecurityLevel::STRONGBOX) {
if (result == ErrorCode::ATTESTATION_KEYS_NOT_PROVISIONED) {
result = GenerateKeyWithSelfSignedAttestKey(AuthorizationSetBuilder()
.EcdsaKey(EcCurve::P_256)
.AttestKey()
.SetDefaultValidity(),
builder, &keyblob, &key_characteristics,
&cert_chain);
}
}
ASSERT_EQ(ErrorCode::OK, result);
// Verify first user to get a HAT that should work.
const uint64_t challenge = 42;