Source release 19.1.0
This commit is contained in:
@@ -329,7 +329,7 @@ class LicenseWithUsageEntry {
|
||||
ASSERT_NO_FATAL_FAILURE(session_.GenerateReport(pst()));
|
||||
Test_PST_Report expected(pst(), status);
|
||||
ASSERT_NO_FATAL_FAILURE(
|
||||
session_.VerifyReport(expected, time_license_received_,
|
||||
session_.VerifyReport(std::move(expected), time_license_received_,
|
||||
time_first_decrypt_, time_last_decrypt_));
|
||||
// The PST report was signed above. Below we verify that the entire message
|
||||
// that is sent to the server will be signed by the right mac keys.
|
||||
@@ -400,6 +400,17 @@ class OEMCryptoRefreshTest : public OEMCryptoLicenseTest {
|
||||
ASSERT_EQ(expected_result, renewal_messages->LoadResponse());
|
||||
}
|
||||
|
||||
void MakeReleaseRequest(ReleaseRoundTrip* release_messages) {
|
||||
ASSERT_NO_FATAL_FAILURE(release_messages->SignAndVerifyRequest());
|
||||
ASSERT_NO_FATAL_FAILURE(release_messages->CreateDefaultResponse());
|
||||
}
|
||||
|
||||
void LoadRelease(ReleaseRoundTrip* release_messages,
|
||||
OEMCryptoResult expected_result) {
|
||||
ASSERT_NO_FATAL_FAILURE(release_messages->EncryptAndSignResponse());
|
||||
ASSERT_EQ(expected_result, release_messages->LoadResponse());
|
||||
}
|
||||
|
||||
ODK_TimerLimits timer_limits_;
|
||||
};
|
||||
|
||||
|
||||
Reference in New Issue
Block a user