59102f388f
This is needed because the Secure Areas backing the Identity Credential HAL may exist in a different environment from where the auth token is minted. In this case, the Secure Area needs a verification token to make sense of the timestamp in the auth token. Getting a verification token is an asynchronous operation so change the binder method used by credstore to be asynchronous as well. Bug: 156076333 Test: atest VtsHalIdentityTargetTest Test: atest android.security.identity.cts Change-Id: Id6cb6812a31d968069b7d72bd2b39b512d38d241
72 lines
1.5 KiB
Text
72 lines
1.5 KiB
Text
// Unit test for AuthTokenTable
|
|
|
|
cc_test {
|
|
cflags: [
|
|
"-Wall",
|
|
"-Werror",
|
|
"-Wextra",
|
|
"-O0",
|
|
],
|
|
srcs: [
|
|
"aaid_truncation_test.cpp",
|
|
"auth_token_table_test.cpp",
|
|
"auth_token_formatting_test.cpp",
|
|
"blob_test.cpp",
|
|
"confirmationui_rate_limiting_test.cpp",
|
|
"verification_token_seralization_test.cpp",
|
|
"gtest_main.cpp",
|
|
],
|
|
name: "keystore_unit_tests",
|
|
static_libs: [
|
|
"android.hardware.confirmationui@1.0",
|
|
"libbase",
|
|
"libcrypto_static",
|
|
"libcutils",
|
|
"libgtest_main",
|
|
"libhidlbase",
|
|
"libkeymaster4support",
|
|
"libkeymaster4_1support",
|
|
"libkeystore_test",
|
|
"liblog",
|
|
"libutils",
|
|
],
|
|
shared_libs: [
|
|
"libbinder",
|
|
"libkeymaster_messages",
|
|
"libkeystore-attestation-application-id",
|
|
"libvndksupport",
|
|
],
|
|
sanitize: {
|
|
cfi: false,
|
|
}
|
|
}
|
|
|
|
cc_test {
|
|
cflags: [
|
|
"-Wall",
|
|
"-Werror",
|
|
"-Wextra",
|
|
"-O0",
|
|
],
|
|
srcs: [
|
|
"confirmationui_invocation_test.cpp",
|
|
"gtest_main.cpp",
|
|
],
|
|
name: "confirmationui_invocation_test",
|
|
static_libs: [
|
|
"android.hardware.confirmationui@1.0",
|
|
"libbase",
|
|
"libgtest_main",
|
|
"libutils",
|
|
"liblog",
|
|
],
|
|
shared_libs: [
|
|
"libbinder",
|
|
"libkeystore_aidl", // for IKeyStoreService.asInterface()
|
|
"libkeystore_binder",
|
|
"libkeystore_parcelables",
|
|
],
|
|
sanitize: {
|
|
cfi: false,
|
|
}
|
|
}
|