diff options
author | Shawn Willden <swillden@google.com> | 2018-01-02 06:30:58 -0700 |
---|---|---|
committer | Shawn Willden <swillden@google.com> | 2018-01-04 21:06:36 -0700 |
commit | 92a05fd05f0b8185dfb71923d107958148647b4e (patch) | |
tree | c3fba524696ebae09ab159a132f0cd02702f7d8b /tests | |
parent | bdef0e6086b742d7a520741c4431a3e958206e51 (diff) | |
download | android_system_keymaster-92a05fd05f0b8185dfb71923d107958148647b4e.tar.gz android_system_keymaster-92a05fd05f0b8185dfb71923d107958148647b4e.tar.bz2 android_system_keymaster-92a05fd05f0b8185dfb71923d107958148647b4e.zip |
Partially fix keymaster unit tests.
There's still one failure in
VerificationOperationsTest.EcdsaAllDigestsAndKeySizes, but leaving
that for now.
Test: Run "make" in system/keymaster.
Change-Id: Id751126d095e57d34804d8c5d605ae60f7e0ef54
Diffstat (limited to 'tests')
-rw-r--r-- | tests/android_keymaster_test.cpp | 8 |
1 files changed, 5 insertions, 3 deletions
diff --git a/tests/android_keymaster_test.cpp b/tests/android_keymaster_test.cpp index 2afc4f4..e5e8e4f 100644 --- a/tests/android_keymaster_test.cpp +++ b/tests/android_keymaster_test.cpp @@ -1434,6 +1434,7 @@ TEST_P(VerificationOperationsTest, EcdsaAllDigestsAndKeySizes) { string signature; for (auto key_size : key_sizes) { + SCOPED_TRACE(testing::Message() << "Key size: " << key_size); AuthorizationSetBuilder builder; builder.EcdsaSigningKey(key_size); for (auto digest : digests) @@ -1441,6 +1442,7 @@ TEST_P(VerificationOperationsTest, EcdsaAllDigestsAndKeySizes) { ASSERT_EQ(KM_ERROR_OK, GenerateKey(builder)); for (auto digest : digests) { + SCOPED_TRACE(testing::Message() << "Digest: " << digest); SignMessage(message, &signature, digest); VerifyMessage(message, signature, digest); } @@ -3254,7 +3256,7 @@ static bool verify_attestation_record(const string& challenge, &att_keymaster_security_level, &att_challenge, &att_sw_enforced, &att_tee_enforced, &att_unique_id)); - EXPECT_EQ(1U, att_attestation_version); + EXPECT_EQ(2U, att_attestation_version); EXPECT_EQ(KM_SECURITY_LEVEL_SOFTWARE, att_attestation_security_level); EXPECT_EQ(expected_keymaster_version, att_keymaster_version); EXPECT_EQ(expected_keymaster_security_level, att_keymaster_security_level); @@ -3310,7 +3312,7 @@ TEST_P(AttestationTest, RsaAttestation) { expected_keymaster_version = 0; expected_keymaster_security_level = KM_SECURITY_LEVEL_TRUSTED_ENVIRONMENT; } else { - expected_keymaster_version = 2; + expected_keymaster_version = 3; expected_keymaster_security_level = KM_SECURITY_LEVEL_SOFTWARE; } @@ -3332,7 +3334,7 @@ TEST_P(AttestationTest, EcAttestation) { expected_keymaster_version = 0; expected_keymaster_security_level = KM_SECURITY_LEVEL_TRUSTED_ENVIRONMENT; } else { - expected_keymaster_version = 2; + expected_keymaster_version = 3; expected_keymaster_security_level = KM_SECURITY_LEVEL_SOFTWARE; } |