Filter CAS tests
Merge from Widevine repo of http://go/wvgerrit/169080 We want to transition to using GTEST_SKIP to skip unit tests instead of modifying the GTEST_FILTER variable. This does so for tests that require CAS support. Bug: 251240681 Merged from https://widevine-internal-review.googlesource.com/167739 Change-Id: Ifb971bf01e2c21fe672bbe4bfa15c797456256ef
This commit is contained in:
committed by
Fred Gylys-Colwell
parent
f83698a164
commit
0972c59fc0
@@ -160,7 +160,6 @@ std::string DeviceFeatures::RestrictFilter(const std::string& initial_filter) {
|
|||||||
provisioning_method == OEMCrypto_BootCertificateChain)
|
provisioning_method == OEMCrypto_BootCertificateChain)
|
||||||
FilterOut(&filter, "OEMCryptoLoadsCert*");
|
FilterOut(&filter, "OEMCryptoLoadsCert*");
|
||||||
if (!generic_crypto) FilterOut(&filter, "*GenericCrypto*");
|
if (!generic_crypto) FilterOut(&filter, "*GenericCrypto*");
|
||||||
if (!supports_cas) FilterOut(&filter, "*CasOnly*");
|
|
||||||
if (derive_key_method == NO_METHOD) FilterOut(&filter, "*SessionTest*");
|
if (derive_key_method == NO_METHOD) FilterOut(&filter, "*SessionTest*");
|
||||||
if (!supports_rsa_3072) FilterOut(&filter, "*RSAKey3072*");
|
if (!supports_rsa_3072) FilterOut(&filter, "*RSAKey3072*");
|
||||||
if (api_version < 17) FilterOut(&filter, "*API17*");
|
if (api_version < 17) FilterOut(&filter, "*API17*");
|
||||||
|
|||||||
@@ -294,6 +294,9 @@ TEST_P(OEMCryptoEntitlementLicenseTest, LoadEntitlementKeysAPI17) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
TEST_P(OEMCryptoEntitlementLicenseTest, CasOnlyLoadCasKeysAPI17) {
|
TEST_P(OEMCryptoEntitlementLicenseTest, CasOnlyLoadCasKeysAPI17) {
|
||||||
|
if (!global_features.supports_cas) {
|
||||||
|
GTEST_SKIP() << "OEMCrypto does not support CAS";
|
||||||
|
}
|
||||||
LoadEntitlementLicense();
|
LoadEntitlementLicense();
|
||||||
uint32_t key_session_id = 0;
|
uint32_t key_session_id = 0;
|
||||||
ASSERT_EQ(OEMCrypto_SUCCESS, OEMCrypto_CreateEntitledKeySession(
|
ASSERT_EQ(OEMCrypto_SUCCESS, OEMCrypto_CreateEntitledKeySession(
|
||||||
@@ -344,6 +347,9 @@ TEST_P(OEMCryptoEntitlementLicenseTest,
|
|||||||
*/
|
*/
|
||||||
TEST_P(OEMCryptoEntitlementLicenseTest,
|
TEST_P(OEMCryptoEntitlementLicenseTest,
|
||||||
CasOnlyLoadCasKeysNoEntitlementKeysAPI17) {
|
CasOnlyLoadCasKeysNoEntitlementKeysAPI17) {
|
||||||
|
if (!global_features.supports_cas) {
|
||||||
|
GTEST_SKIP() << "OEMCrypto does not support CAS";
|
||||||
|
}
|
||||||
license_messages_.set_license_type(OEMCrypto_EntitlementLicense);
|
license_messages_.set_license_type(OEMCrypto_EntitlementLicense);
|
||||||
ASSERT_NO_FATAL_FAILURE(license_messages_.SignAndVerifyRequest());
|
ASSERT_NO_FATAL_FAILURE(license_messages_.SignAndVerifyRequest());
|
||||||
ASSERT_NO_FATAL_FAILURE(license_messages_.CreateDefaultResponse());
|
ASSERT_NO_FATAL_FAILURE(license_messages_.CreateDefaultResponse());
|
||||||
@@ -380,6 +386,9 @@ TEST_P(OEMCryptoEntitlementLicenseTest,
|
|||||||
|
|
||||||
TEST_P(OEMCryptoEntitlementLicenseTest,
|
TEST_P(OEMCryptoEntitlementLicenseTest,
|
||||||
CasOnlyLoadCasKeysWrongEntitlementKeysAPI17) {
|
CasOnlyLoadCasKeysWrongEntitlementKeysAPI17) {
|
||||||
|
if (!global_features.supports_cas) {
|
||||||
|
GTEST_SKIP() << "OEMCrypto does not support CAS";
|
||||||
|
}
|
||||||
LoadEntitlementLicense();
|
LoadEntitlementLicense();
|
||||||
uint32_t key_session_id = 0;
|
uint32_t key_session_id = 0;
|
||||||
ASSERT_EQ(OEMCrypto_SUCCESS, OEMCrypto_CreateEntitledKeySession(
|
ASSERT_EQ(OEMCrypto_SUCCESS, OEMCrypto_CreateEntitledKeySession(
|
||||||
@@ -414,6 +423,9 @@ TEST_P(OEMCryptoEntitlementLicenseTest,
|
|||||||
|
|
||||||
TEST_P(OEMCryptoEntitlementLicenseTest,
|
TEST_P(OEMCryptoEntitlementLicenseTest,
|
||||||
CasOnlyLoadCasKeysWrongEntitledKeySessionAPI17) {
|
CasOnlyLoadCasKeysWrongEntitledKeySessionAPI17) {
|
||||||
|
if (!global_features.supports_cas) {
|
||||||
|
GTEST_SKIP() << "OEMCrypto does not support CAS";
|
||||||
|
}
|
||||||
LoadEntitlementLicense();
|
LoadEntitlementLicense();
|
||||||
uint32_t key_session_id = 0;
|
uint32_t key_session_id = 0;
|
||||||
ASSERT_EQ(OEMCrypto_SUCCESS, OEMCrypto_CreateEntitledKeySession(
|
ASSERT_EQ(OEMCrypto_SUCCESS, OEMCrypto_CreateEntitledKeySession(
|
||||||
@@ -452,6 +464,9 @@ TEST_P(OEMCryptoEntitlementLicenseTest,
|
|||||||
|
|
||||||
TEST_P(OEMCryptoEntitlementLicenseTest,
|
TEST_P(OEMCryptoEntitlementLicenseTest,
|
||||||
CasOnlyLoadCasKeysOemcryptoSessionAPI17) {
|
CasOnlyLoadCasKeysOemcryptoSessionAPI17) {
|
||||||
|
if (!global_features.supports_cas) {
|
||||||
|
GTEST_SKIP() << "OEMCrypto does not support CAS";
|
||||||
|
}
|
||||||
LoadEntitlementLicense();
|
LoadEntitlementLicense();
|
||||||
uint32_t key_session_id = 0;
|
uint32_t key_session_id = 0;
|
||||||
ASSERT_EQ(OEMCrypto_SUCCESS, OEMCrypto_CreateEntitledKeySession(
|
ASSERT_EQ(OEMCrypto_SUCCESS, OEMCrypto_CreateEntitledKeySession(
|
||||||
@@ -1425,6 +1440,9 @@ class OEMCryptoSessionTestLoadCasKeysWithHDCP : public OEMCryptoSessionTests,
|
|||||||
};
|
};
|
||||||
|
|
||||||
TEST_P(OEMCryptoSessionTestLoadCasKeysWithHDCP, CasOnlyLoadCasKeysAPI17) {
|
TEST_P(OEMCryptoSessionTestLoadCasKeysWithHDCP, CasOnlyLoadCasKeysAPI17) {
|
||||||
|
if (!global_features.supports_cas) {
|
||||||
|
GTEST_SKIP() << "OEMCrypto does not support CAS";
|
||||||
|
}
|
||||||
// Test parameterized by HDCP version.
|
// Test parameterized by HDCP version.
|
||||||
LoadCasKeysWithHDCP(static_cast<OEMCrypto_HDCP_Capability>(GetParam()));
|
LoadCasKeysWithHDCP(static_cast<OEMCrypto_HDCP_Capability>(GetParam()));
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user