Loading keymaster/4.0/vts/functional/keymaster_hidl_hal_test.cpp +27 −0 Original line number Diff line number Diff line Loading @@ -3972,6 +3972,33 @@ TEST_F(AttestationTest, EcAttestation) { SecLevel(), cert_chain[0])); } /* * AttestationTest.EcAttestationByKeySize * * Verifies that attesting to EC keys works and generates the expected output. */ TEST_F(AttestationTest, EcAttestationByKeySize) { ASSERT_EQ(ErrorCode::OK, GenerateKey(AuthorizationSetBuilder() .Authorization(TAG_NO_AUTH_REQUIRED) .EcdsaSigningKey(256) .Digest(Digest::SHA_2_256) .Authorization(TAG_INCLUDE_UNIQUE_ID))); hidl_vec<hidl_vec<uint8_t>> cert_chain; ASSERT_EQ(ErrorCode::OK, AttestKey(AuthorizationSetBuilder() .Authorization(TAG_ATTESTATION_CHALLENGE, HidlBuf("challenge")) .Authorization(TAG_ATTESTATION_APPLICATION_ID, HidlBuf("foo")), &cert_chain)); EXPECT_GE(cert_chain.size(), 2U); EXPECT_TRUE(verify_chain(cert_chain)); EXPECT_TRUE(verify_attestation_record("challenge", "foo", // key_characteristics_.softwareEnforced, // key_characteristics_.hardwareEnforced, // SecLevel(), cert_chain[0])); } /* * AttestationTest.EcAttestationRequiresAttestationAppId * Loading Loading
keymaster/4.0/vts/functional/keymaster_hidl_hal_test.cpp +27 −0 Original line number Diff line number Diff line Loading @@ -3972,6 +3972,33 @@ TEST_F(AttestationTest, EcAttestation) { SecLevel(), cert_chain[0])); } /* * AttestationTest.EcAttestationByKeySize * * Verifies that attesting to EC keys works and generates the expected output. */ TEST_F(AttestationTest, EcAttestationByKeySize) { ASSERT_EQ(ErrorCode::OK, GenerateKey(AuthorizationSetBuilder() .Authorization(TAG_NO_AUTH_REQUIRED) .EcdsaSigningKey(256) .Digest(Digest::SHA_2_256) .Authorization(TAG_INCLUDE_UNIQUE_ID))); hidl_vec<hidl_vec<uint8_t>> cert_chain; ASSERT_EQ(ErrorCode::OK, AttestKey(AuthorizationSetBuilder() .Authorization(TAG_ATTESTATION_CHALLENGE, HidlBuf("challenge")) .Authorization(TAG_ATTESTATION_APPLICATION_ID, HidlBuf("foo")), &cert_chain)); EXPECT_GE(cert_chain.size(), 2U); EXPECT_TRUE(verify_chain(cert_chain)); EXPECT_TRUE(verify_attestation_record("challenge", "foo", // key_characteristics_.softwareEnforced, // key_characteristics_.hardwareEnforced, // SecLevel(), cert_chain[0])); } /* * AttestationTest.EcAttestationRequiresAttestationAppId * Loading