Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit 802a4564 authored by Seth Moore's avatar Seth Moore Committed by Automerger Merge Worker
Browse files

Merge "Add VSR annotations for RKP DICE" am: 5fc01681 am: 68af3d71

parents ff405982 68af3d71
Loading
Loading
Loading
Loading
+5 −0
Original line number Original line Diff line number Diff line
@@ -702,6 +702,7 @@ class CertificateRequestV2Test : public CertificateRequestTestBase {
 * Generate an empty certificate request with all possible length of challenge, and decrypt and
 * Generate an empty certificate request with all possible length of challenge, and decrypt and
 * verify the structure and content.
 * verify the structure and content.
 */
 */
// @VsrTest = 3.10-015
TEST_P(CertificateRequestV2Test, EmptyRequest) {
TEST_P(CertificateRequestV2Test, EmptyRequest) {
    bytevec csr;
    bytevec csr;


@@ -721,6 +722,7 @@ TEST_P(CertificateRequestV2Test, EmptyRequest) {
 * Generate a non-empty certificate request with all possible length of challenge.  Decrypt, parse
 * Generate a non-empty certificate request with all possible length of challenge.  Decrypt, parse
 * and validate the contents.
 * and validate the contents.
 */
 */
// @VsrTest = 3.10-015
TEST_P(CertificateRequestV2Test, NonEmptyRequest) {
TEST_P(CertificateRequestV2Test, NonEmptyRequest) {
    generateKeys(false /* testMode */, 1 /* numKeys */);
    generateKeys(false /* testMode */, 1 /* numKeys */);


@@ -753,6 +755,7 @@ TEST_P(CertificateRequestV2Test, EmptyRequestWithInvalidChallengeFail) {
 * Generate a non-empty certificate request.  Make sure contents are reproducible but allow for the
 * Generate a non-empty certificate request.  Make sure contents are reproducible but allow for the
 * signature to be different since algorithms including ECDSA P-256 can include a random value.
 * signature to be different since algorithms including ECDSA P-256 can include a random value.
 */
 */
// @VsrTest = 3.10-015
TEST_P(CertificateRequestV2Test, NonEmptyRequestReproducible) {
TEST_P(CertificateRequestV2Test, NonEmptyRequestReproducible) {
    generateKeys(false /* testMode */, 1 /* numKeys */);
    generateKeys(false /* testMode */, 1 /* numKeys */);


@@ -776,6 +779,7 @@ TEST_P(CertificateRequestV2Test, NonEmptyRequestReproducible) {
/**
/**
 * Generate a non-empty certificate request with multiple keys.
 * Generate a non-empty certificate request with multiple keys.
 */
 */
// @VsrTest = 3.10-015
TEST_P(CertificateRequestV2Test, NonEmptyRequestMultipleKeys) {
TEST_P(CertificateRequestV2Test, NonEmptyRequestMultipleKeys) {
    generateKeys(false /* testMode */, rpcHardwareInfo.supportedNumKeysInCsr /* numKeys */);
    generateKeys(false /* testMode */, rpcHardwareInfo.supportedNumKeysInCsr /* numKeys */);


@@ -849,6 +853,7 @@ void parse_root_of_trust(const vector<uint8_t>& attestation_cert,
/**
/**
 * Generate a CSR and verify DeviceInfo against IDs attested by KeyMint.
 * Generate a CSR and verify DeviceInfo against IDs attested by KeyMint.
 */
 */
// @VsrTest = 3.10-015
TEST_P(CertificateRequestV2Test, DeviceInfo) {
TEST_P(CertificateRequestV2Test, DeviceInfo) {
    // See if there is a matching IKeyMintDevice for this IRemotelyProvisionedComponent.
    // See if there is a matching IKeyMintDevice for this IRemotelyProvisionedComponent.
    std::shared_ptr<IKeyMintDevice> keyMint;
    std::shared_ptr<IKeyMintDevice> keyMint;