Loading keymaster/4.0/vts/functional/keymaster_hidl_hal_test.cpp +0 −22 Original line number Diff line number Diff line Loading @@ -4218,28 +4218,6 @@ TEST_F(AttestationTest, RsaAttestationRequiresAppId) { &cert_chain)); } /* * AttestationTest.RsaAttestationRequiresCorrectAppId * * Verifies that attesting to RSA requires the correct app ID. */ TEST_F(AttestationTest, RsaAttestationRequiresCorrectAppId) { ASSERT_EQ(ErrorCode::OK, GenerateKey(AuthorizationSetBuilder() .Authorization(TAG_NO_AUTH_REQUIRED) .RsaSigningKey(2048, 65537) .Digest(Digest::NONE) .Padding(PaddingMode::NONE) .Authorization(TAG_APPLICATION_ID, HidlBuf("lol")))); hidl_vec<hidl_vec<uint8_t>> cert_chain; EXPECT_EQ(ErrorCode::ATTESTATION_APPLICATION_ID_MISSING, AttestKey(AuthorizationSetBuilder() .Authorization(TAG_ATTESTATION_CHALLENGE, HidlBuf("challenge")) .Authorization(TAG_APPLICATION_ID, HidlBuf("heh")), &cert_chain)); } /* * AttestationTest.EcAttestation * Loading Loading
keymaster/4.0/vts/functional/keymaster_hidl_hal_test.cpp +0 −22 Original line number Diff line number Diff line Loading @@ -4218,28 +4218,6 @@ TEST_F(AttestationTest, RsaAttestationRequiresAppId) { &cert_chain)); } /* * AttestationTest.RsaAttestationRequiresCorrectAppId * * Verifies that attesting to RSA requires the correct app ID. */ TEST_F(AttestationTest, RsaAttestationRequiresCorrectAppId) { ASSERT_EQ(ErrorCode::OK, GenerateKey(AuthorizationSetBuilder() .Authorization(TAG_NO_AUTH_REQUIRED) .RsaSigningKey(2048, 65537) .Digest(Digest::NONE) .Padding(PaddingMode::NONE) .Authorization(TAG_APPLICATION_ID, HidlBuf("lol")))); hidl_vec<hidl_vec<uint8_t>> cert_chain; EXPECT_EQ(ErrorCode::ATTESTATION_APPLICATION_ID_MISSING, AttestKey(AuthorizationSetBuilder() .Authorization(TAG_ATTESTATION_CHALLENGE, HidlBuf("challenge")) .Authorization(TAG_APPLICATION_ID, HidlBuf("heh")), &cert_chain)); } /* * AttestationTest.EcAttestation * Loading