Merge "Disable expiration for legacy DRM certificates" into sc-dev
This commit is contained in:
@@ -1568,8 +1568,10 @@ const CertificateErrorData kRetrieveLegacyCertificateErrorData[] = {
|
||||
kTestLegacyCertificateFileDataInvalidClientExpiration},
|
||||
};
|
||||
|
||||
/* TODO(b/192430982): Renable expiration of legacy DRM certificates
|
||||
constexpr size_t kNumberOfLegacyCertificates =
|
||||
ArraySize(kRetrieveLegacyCertificateErrorData);
|
||||
*/
|
||||
|
||||
const CertificateErrorData kRetrieveDefaultCertificateErrorData[] = {
|
||||
// Certificate expired
|
||||
@@ -4020,6 +4022,7 @@ TEST_F(DeviceFilesTest, RetrieveAtscCertificateNotFound) {
|
||||
&serial_number, &system_id));
|
||||
}
|
||||
|
||||
/* TODO(b/192430982): Renable expiration of legacy DRM certificates
|
||||
TEST_F(DeviceFilesTest, RetrieveLegacyCertificateWithoutExpirationTime) {
|
||||
MockFileSystem file_system;
|
||||
std::string certificate_file_name;
|
||||
@@ -4221,6 +4224,7 @@ TEST_F(DeviceFilesTest, RetrieveDefaultCertificate) {
|
||||
EXPECT_EQ(kTestWrappedKey, private_key);
|
||||
EXPECT_EQ("7CB49F987A635E1E0A52184694582D6E", b2a_hex(serial_number));
|
||||
}
|
||||
*/
|
||||
|
||||
TEST_F(DeviceFilesTest, RetrieveDefaultCertificateNeverExpires) {
|
||||
MockFileSystem file_system;
|
||||
@@ -4331,7 +4335,9 @@ TEST_F(DeviceFilesTest, RetrieveCertificateWithoutKeyType) {
|
||||
// Call to Open will return a unique_ptr, freeing this object.
|
||||
// The file will be re-written with a new client expiration time
|
||||
MockFile* read_file = new MockFile();
|
||||
/* TODO(b/192430982): Renable expiration of legacy DRM certificates
|
||||
MockFile* write_file = new MockFile();
|
||||
*/
|
||||
EXPECT_CALL(file_system, Exists(StrEq(device_legacy_certificate_path)))
|
||||
.Times(AtLeast(1))
|
||||
.WillRepeatedly(Return(true));
|
||||
@@ -4341,17 +4347,21 @@ TEST_F(DeviceFilesTest, RetrieveCertificateWithoutKeyType) {
|
||||
EXPECT_CALL(file_system, FileSize(StrEq(device_legacy_certificate_path)))
|
||||
.WillOnce(Return(data.size()));
|
||||
EXPECT_CALL(file_system, DoOpen(StrEq(device_legacy_certificate_path), _))
|
||||
.WillOnce(Return(read_file))
|
||||
.WillOnce(Return(write_file));
|
||||
.WillOnce(Return(read_file));
|
||||
/* TODO(b/192430982): Renable expiration of legacy DRM certificates
|
||||
.WillOnce(Return(write_file));
|
||||
*/
|
||||
EXPECT_CALL(*read_file, Read(NotNull(), Eq(data.size())))
|
||||
.WillOnce(DoAll(SetArrayArgument<0>(data.begin(), data.end()),
|
||||
Return(data.size())));
|
||||
EXPECT_CALL(*read_file, Write(_, _)).Times(0);
|
||||
/* TODO(b/192430982): Renable expiration of legacy DRM certificates
|
||||
EXPECT_CALL(*write_file, Read(_, _)).Times(0);
|
||||
EXPECT_CALL(*write_file, Write(_, _))
|
||||
.With(AllArgs(StrAndLenContains(std::vector<std::string>{
|
||||
kTestCertificateWithoutExpiration, kTestWrappedKey.key()})))
|
||||
.WillOnce(ReturnArg<1>());
|
||||
*/
|
||||
|
||||
DeviceFiles device_files(&file_system);
|
||||
EXPECT_TRUE(device_files.Init(kSecurityLevelL1));
|
||||
|
||||
Reference in New Issue
Block a user