Merge "Update OEMCrypto buffer offset tests" into sc-dev am: 41d7b74558
Original change: https://googleplex-android-review.googlesource.com/c/platform/vendor/widevine/+/15055162 Change-Id: I7f3f64bec9748f6045cc33b67b9f8c7dbe0ded15
This commit is contained in:
@@ -4555,6 +4555,8 @@ TEST_F(OEMCryptoLoadsCertificate, CertificateProvisionBadRange1_API16) {
|
|||||||
provisioning_messages.PrepareSession(keybox_);
|
provisioning_messages.PrepareSession(keybox_);
|
||||||
ASSERT_NO_FATAL_FAILURE(provisioning_messages.SignAndVerifyRequest());
|
ASSERT_NO_FATAL_FAILURE(provisioning_messages.SignAndVerifyRequest());
|
||||||
ASSERT_NO_FATAL_FAILURE(provisioning_messages.CreateDefaultResponse());
|
ASSERT_NO_FATAL_FAILURE(provisioning_messages.CreateDefaultResponse());
|
||||||
|
// Encrypt and sign once, so that we can use the size of the response.
|
||||||
|
ASSERT_NO_FATAL_FAILURE(provisioning_messages.EncryptAndSignResponse());
|
||||||
provisioning_messages.core_response().enc_private_key.offset =
|
provisioning_messages.core_response().enc_private_key.offset =
|
||||||
provisioning_messages.encrypted_response_buffer().size() + 1;
|
provisioning_messages.encrypted_response_buffer().size() + 1;
|
||||||
ASSERT_NO_FATAL_FAILURE(provisioning_messages.EncryptAndSignResponse());
|
ASSERT_NO_FATAL_FAILURE(provisioning_messages.EncryptAndSignResponse());
|
||||||
@@ -4570,6 +4572,8 @@ TEST_F(OEMCryptoLoadsCertificate, CertificateProvisionBadRange2_API16) {
|
|||||||
provisioning_messages.PrepareSession(keybox_);
|
provisioning_messages.PrepareSession(keybox_);
|
||||||
ASSERT_NO_FATAL_FAILURE(provisioning_messages.SignAndVerifyRequest());
|
ASSERT_NO_FATAL_FAILURE(provisioning_messages.SignAndVerifyRequest());
|
||||||
ASSERT_NO_FATAL_FAILURE(provisioning_messages.CreateDefaultResponse());
|
ASSERT_NO_FATAL_FAILURE(provisioning_messages.CreateDefaultResponse());
|
||||||
|
// Encrypt and sign once, so that we can use the size of the response.
|
||||||
|
ASSERT_NO_FATAL_FAILURE(provisioning_messages.EncryptAndSignResponse());
|
||||||
provisioning_messages.core_response().enc_private_key_iv.offset =
|
provisioning_messages.core_response().enc_private_key_iv.offset =
|
||||||
provisioning_messages.encrypted_response_buffer().size() + 1;
|
provisioning_messages.encrypted_response_buffer().size() + 1;
|
||||||
ASSERT_NO_FATAL_FAILURE(provisioning_messages.EncryptAndSignResponse());
|
ASSERT_NO_FATAL_FAILURE(provisioning_messages.EncryptAndSignResponse());
|
||||||
@@ -4585,6 +4589,8 @@ TEST_F(OEMCryptoLoadsCertificate, CertificateProvisionBadRange3_API16) {
|
|||||||
provisioning_messages.PrepareSession(keybox_);
|
provisioning_messages.PrepareSession(keybox_);
|
||||||
ASSERT_NO_FATAL_FAILURE(provisioning_messages.SignAndVerifyRequest());
|
ASSERT_NO_FATAL_FAILURE(provisioning_messages.SignAndVerifyRequest());
|
||||||
ASSERT_NO_FATAL_FAILURE(provisioning_messages.CreateDefaultResponse());
|
ASSERT_NO_FATAL_FAILURE(provisioning_messages.CreateDefaultResponse());
|
||||||
|
// Encrypt and sign once, so that we can use the size of the response.
|
||||||
|
ASSERT_NO_FATAL_FAILURE(provisioning_messages.EncryptAndSignResponse());
|
||||||
// If the offset is before the end, but the offset+length is bigger, then
|
// If the offset is before the end, but the offset+length is bigger, then
|
||||||
// the message should be rejected.
|
// the message should be rejected.
|
||||||
provisioning_messages.core_response().enc_private_key.offset =
|
provisioning_messages.core_response().enc_private_key.offset =
|
||||||
@@ -4602,6 +4608,8 @@ TEST_F(OEMCryptoLoadsCertificate, CertificateProvisionBadRange4_API16) {
|
|||||||
provisioning_messages.PrepareSession(keybox_);
|
provisioning_messages.PrepareSession(keybox_);
|
||||||
ASSERT_NO_FATAL_FAILURE(provisioning_messages.SignAndVerifyRequest());
|
ASSERT_NO_FATAL_FAILURE(provisioning_messages.SignAndVerifyRequest());
|
||||||
ASSERT_NO_FATAL_FAILURE(provisioning_messages.CreateDefaultResponse());
|
ASSERT_NO_FATAL_FAILURE(provisioning_messages.CreateDefaultResponse());
|
||||||
|
// Encrypt and sign once, so that we can use the size of the response.
|
||||||
|
ASSERT_NO_FATAL_FAILURE(provisioning_messages.EncryptAndSignResponse());
|
||||||
// If the offset is before the end, but the offset+length is bigger, then
|
// If the offset is before the end, but the offset+length is bigger, then
|
||||||
// the message should be rejected.
|
// the message should be rejected.
|
||||||
provisioning_messages.core_response().enc_private_key_iv.offset =
|
provisioning_messages.core_response().enc_private_key_iv.offset =
|
||||||
@@ -4619,6 +4627,8 @@ TEST_F(OEMCryptoLoadsCertificate, CertificateProvisionBadRange5Prov30_API16) {
|
|||||||
provisioning_messages.PrepareSession(keybox_);
|
provisioning_messages.PrepareSession(keybox_);
|
||||||
ASSERT_NO_FATAL_FAILURE(provisioning_messages.SignAndVerifyRequest());
|
ASSERT_NO_FATAL_FAILURE(provisioning_messages.SignAndVerifyRequest());
|
||||||
ASSERT_NO_FATAL_FAILURE(provisioning_messages.CreateDefaultResponse());
|
ASSERT_NO_FATAL_FAILURE(provisioning_messages.CreateDefaultResponse());
|
||||||
|
// Encrypt and sign once, so that we can use the size of the response.
|
||||||
|
ASSERT_NO_FATAL_FAILURE(provisioning_messages.EncryptAndSignResponse());
|
||||||
// If the offset is before the end, but the offset+length is bigger, then
|
// If the offset is before the end, but the offset+length is bigger, then
|
||||||
// the message should be rejected.
|
// the message should be rejected.
|
||||||
provisioning_messages.core_response().encrypted_message_key.offset =
|
provisioning_messages.core_response().encrypted_message_key.offset =
|
||||||
|
|||||||
Reference in New Issue
Block a user