Test MAC signature after license reload

am: 407d39699b

Change-Id: I1ba07fb729841ccb009757022bc02228a93d75b8
This commit is contained in:
Fred Gylys-Colwell
2019-05-08 00:09:35 -07:00
committed by android-build-merger
2 changed files with 6 additions and 3 deletions

View File

@@ -1359,6 +1359,9 @@ void Session::GenerateVerifyReport(const std::string& pst,
Test_PST_Report expected(pst, status);
ASSERT_NO_FATAL_FAILURE(VerifyReport(expected, time_license_received,
time_first_decrypt, time_last_decrypt));
// The PST report was signed above. Below we verify that the entire message
// that is sent to the server will be signed by the right mac keys.
ASSERT_NO_FATAL_FAILURE(VerifyClientSignature());
}
void Session::CreateOldEntry(const Test_PST_Report& report) {

View File

@@ -5432,9 +5432,9 @@ TEST_P(UsageTableTestWithMAC, ReloadOfflineLicenseWithRefresh) {
ASSERT_NO_FATAL_FAILURE(s.close());
}
// Verify that a license that has been we can still reload an offline license
// after OEMCrypto_Terminate and Initialize are called. This is as close to a
// reboot as we can do in a unit test.
// Verify that we can still reload an offline license after OEMCrypto_Terminate
// and Initialize are called. This is as close to a reboot as we can do in a
// unit test.
TEST_P(UsageTableTestWithMAC, ReloadOfflineLicenseWithTerminate) {
std::string pst = "my_pst";
Session s;