Loading security/keymint/aidl/vts/functional/AuthTest.cpp +12 −2 Original line number Diff line number Diff line Loading @@ -453,8 +453,18 @@ TEST_P(AuthTest, TimeoutAuthenticationMultiSid) { vector<uint8_t> keyblob; vector<KeyCharacteristics> key_characteristics; vector<Certificate> cert_chain; ASSERT_EQ(ErrorCode::OK, GenerateKey(builder, std::nullopt, &keyblob, &key_characteristics, &cert_chain)); auto result = GenerateKey(builder, std::nullopt, &keyblob, &key_characteristics, &cert_chain); if (SecLevel() == SecurityLevel::STRONGBOX) { if (result == ErrorCode::ATTESTATION_KEYS_NOT_PROVISIONED) { result = GenerateKeyWithSelfSignedAttestKey(AuthorizationSetBuilder() .EcdsaKey(EcCurve::P_256) .AttestKey() .SetDefaultValidity(), builder, &keyblob, &key_characteristics, &cert_chain); } } ASSERT_EQ(ErrorCode::OK, result); // Verify first user to get a HAT that should work. const uint64_t challenge = 42; Loading Loading
security/keymint/aidl/vts/functional/AuthTest.cpp +12 −2 Original line number Diff line number Diff line Loading @@ -453,8 +453,18 @@ TEST_P(AuthTest, TimeoutAuthenticationMultiSid) { vector<uint8_t> keyblob; vector<KeyCharacteristics> key_characteristics; vector<Certificate> cert_chain; ASSERT_EQ(ErrorCode::OK, GenerateKey(builder, std::nullopt, &keyblob, &key_characteristics, &cert_chain)); auto result = GenerateKey(builder, std::nullopt, &keyblob, &key_characteristics, &cert_chain); if (SecLevel() == SecurityLevel::STRONGBOX) { if (result == ErrorCode::ATTESTATION_KEYS_NOT_PROVISIONED) { result = GenerateKeyWithSelfSignedAttestKey(AuthorizationSetBuilder() .EcdsaKey(EcCurve::P_256) .AttestKey() .SetDefaultValidity(), builder, &keyblob, &key_characteristics, &cert_chain); } } ASSERT_EQ(ErrorCode::OK, result); // Verify first user to get a HAT that should work. const uint64_t challenge = 42; Loading