Update the TimeoutAuthenticationMultiSid test
Update TimeoutAuthenticationMultiSid test to support generateKey for Strongbox implementations without factory attestation. Bug: 293211157 Test: run vts -m VtsAidlKeyMintTarget Change-Id: I27bf08d2fd2d9e0217a90ee8ccb789adfd9d5f7f
This commit is contained in:
parent
b93626c412
commit
07c7d28a84
1 changed files with 12 additions and 2 deletions
|
@ -453,8 +453,18 @@ TEST_P(AuthTest, TimeoutAuthenticationMultiSid) {
|
|||
vector<uint8_t> keyblob;
|
||||
vector<KeyCharacteristics> key_characteristics;
|
||||
vector<Certificate> cert_chain;
|
||||
ASSERT_EQ(ErrorCode::OK,
|
||||
GenerateKey(builder, std::nullopt, &keyblob, &key_characteristics, &cert_chain));
|
||||
auto result = GenerateKey(builder, std::nullopt, &keyblob, &key_characteristics, &cert_chain);
|
||||
if (SecLevel() == SecurityLevel::STRONGBOX) {
|
||||
if (result == ErrorCode::ATTESTATION_KEYS_NOT_PROVISIONED) {
|
||||
result = GenerateKeyWithSelfSignedAttestKey(AuthorizationSetBuilder()
|
||||
.EcdsaKey(EcCurve::P_256)
|
||||
.AttestKey()
|
||||
.SetDefaultValidity(),
|
||||
builder, &keyblob, &key_characteristics,
|
||||
&cert_chain);
|
||||
}
|
||||
}
|
||||
ASSERT_EQ(ErrorCode::OK, result);
|
||||
|
||||
// Verify first user to get a HAT that should work.
|
||||
const uint64_t challenge = 42;
|
||||
|
|
Loading…
Reference in a new issue