Merge "Prevent test crashes if device sets invalid curve" am: ceedbb0d1a
am: cd2af34d63
Original change: https://android-review.googlesource.com/c/platform/hardware/interfaces/+/2020155 Change-Id: I96e5bdd31b81b0284ccea45a7c6adbe67c5e6c0c
This commit is contained in:
commit
590665c1b9
2 changed files with 9 additions and 5 deletions
|
@ -363,7 +363,7 @@ class CertificateRequestTest : public VtsRemotelyProvisionedComponentTests {
|
|||
|
||||
void generateTestEekChain(size_t eekLength) {
|
||||
auto chain = generateEekChain(rpcHardwareInfo.supportedEekCurve, eekLength, eekId_);
|
||||
EXPECT_TRUE(chain) << chain.message();
|
||||
ASSERT_TRUE(chain) << chain.message();
|
||||
if (chain) testEekChain_ = chain.moveValue();
|
||||
testEekLength_ = eekLength;
|
||||
}
|
||||
|
@ -669,7 +669,9 @@ TEST_P(CertificateRequestTest, DISABLED_NonEmptyRequest_prodMode) {
|
|||
TEST_P(CertificateRequestTest, NonEmptyRequestCorruptMac_testMode) {
|
||||
bool testMode = true;
|
||||
generateKeys(testMode, 1 /* numKeys */);
|
||||
MacedPublicKey keyWithCorruptMac = corrupt_maced_key(keysToSign_[0]).moveValue();
|
||||
auto result = corrupt_maced_key(keysToSign_[0]);
|
||||
ASSERT_TRUE(result) << result.moveMessage();
|
||||
MacedPublicKey keyWithCorruptMac = result.moveValue();
|
||||
|
||||
bytevec keysToSignMac;
|
||||
DeviceInfo deviceInfo;
|
||||
|
@ -688,7 +690,9 @@ TEST_P(CertificateRequestTest, NonEmptyRequestCorruptMac_testMode) {
|
|||
TEST_P(CertificateRequestTest, NonEmptyRequestCorruptMac_prodMode) {
|
||||
bool testMode = false;
|
||||
generateKeys(testMode, 1 /* numKeys */);
|
||||
MacedPublicKey keyWithCorruptMac = corrupt_maced_key(keysToSign_[0]).moveValue();
|
||||
auto result = corrupt_maced_key(keysToSign_[0]);
|
||||
ASSERT_TRUE(result) << result.moveMessage();
|
||||
MacedPublicKey keyWithCorruptMac = result.moveValue();
|
||||
|
||||
bytevec keysToSignMac;
|
||||
DeviceInfo deviceInfo;
|
||||
|
|
|
@ -225,7 +225,7 @@ ErrMsgOr<EekChain> generateEekChain(int32_t supportedEekCurve, size_t length,
|
|||
bytevec prev_priv_key;
|
||||
for (size_t i = 0; i < length - 1; ++i) {
|
||||
auto keyPair = generateKeyPair(supportedEekCurve, false);
|
||||
if (!keyPair) keyPair.moveMessage();
|
||||
if (!keyPair) return keyPair.moveMessage();
|
||||
auto [pub_key, priv_key] = keyPair.moveValue();
|
||||
|
||||
// The first signing key is self-signed.
|
||||
|
@ -242,7 +242,7 @@ ErrMsgOr<EekChain> generateEekChain(int32_t supportedEekCurve, size_t length,
|
|||
prev_priv_key = priv_key;
|
||||
}
|
||||
auto keyPair = generateKeyPair(supportedEekCurve, true);
|
||||
if (!keyPair) keyPair.moveMessage();
|
||||
if (!keyPair) return keyPair.moveMessage();
|
||||
auto [pub_key, priv_key] = keyPair.moveValue();
|
||||
|
||||
auto coseKey = constructCoseKey(supportedEekCurve, eekId, pub_key);
|
||||
|
|
Loading…
Reference in a new issue