Source release 19.2.0
This commit is contained in:
@@ -8,6 +8,7 @@
|
||||
#include "bcc_validator.h"
|
||||
#include "device_info_validator.h"
|
||||
#include "log.h"
|
||||
#include "oec_device_features.h"
|
||||
#include "platform.h"
|
||||
#include "signed_csr_payload_validator.h"
|
||||
#include "test_sleep.h"
|
||||
@@ -786,6 +787,12 @@ TEST_F(OEMCryptoLoadsCertificate, CertificateProvisionBadRange1_API16) {
|
||||
if (global_features.provisioning_method == OEMCrypto_BootCertificateChain) {
|
||||
GTEST_SKIP() << "Test for non Prov 4.0 devices only.";
|
||||
}
|
||||
// DRM Reprovisioning CDMs have embedded certificates and do not support
|
||||
// key rewrapping.
|
||||
if (global_features.provisioning_method == OEMCrypto_DrmReprovisioning) {
|
||||
GTEST_SKIP() << "Test for non DRM Reprovisioning devices.";
|
||||
}
|
||||
|
||||
Session s;
|
||||
ProvisioningRoundTrip provisioning_messages(&s, encoded_rsa_key_);
|
||||
provisioning_messages.PrepareSession(keybox_);
|
||||
@@ -808,6 +815,11 @@ TEST_F(OEMCryptoLoadsCertificate, CertificateProvisionBadRange2_API16) {
|
||||
if (global_features.provisioning_method == OEMCrypto_BootCertificateChain) {
|
||||
GTEST_SKIP() << "Test for non Prov 4.0 devices only.";
|
||||
}
|
||||
// DRM Reprovisioning CDMs have embedded certificates and do not support
|
||||
// key rewrapping.
|
||||
if (global_features.provisioning_method == OEMCrypto_DrmReprovisioning) {
|
||||
GTEST_SKIP() << "Test for non DRM Reprovisioning devices.";
|
||||
}
|
||||
Session s;
|
||||
ProvisioningRoundTrip provisioning_messages(&s, encoded_rsa_key_);
|
||||
provisioning_messages.PrepareSession(keybox_);
|
||||
@@ -830,6 +842,11 @@ TEST_F(OEMCryptoLoadsCertificate, CertificateProvisionBadRange3_API16) {
|
||||
if (global_features.provisioning_method == OEMCrypto_BootCertificateChain) {
|
||||
GTEST_SKIP() << "Test for non Prov 4.0 devices only.";
|
||||
}
|
||||
// DRM Reprovisioning CDMs have embedded certificates and do not support
|
||||
// key rewrapping.
|
||||
if (global_features.provisioning_method == OEMCrypto_DrmReprovisioning) {
|
||||
GTEST_SKIP() << "Test for non DRM Reprovisioning devices.";
|
||||
}
|
||||
Session s;
|
||||
ProvisioningRoundTrip provisioning_messages(&s, encoded_rsa_key_);
|
||||
provisioning_messages.PrepareSession(keybox_);
|
||||
@@ -854,6 +871,11 @@ TEST_F(OEMCryptoLoadsCertificate, CertificateProvisionBadRange4_API16) {
|
||||
if (global_features.provisioning_method == OEMCrypto_BootCertificateChain) {
|
||||
GTEST_SKIP() << "Test for non Prov 4.0 devices only.";
|
||||
}
|
||||
// DRM Reprovisioning CDMs have embedded certificates and do not support
|
||||
// key rewrapping.
|
||||
if (global_features.provisioning_method == OEMCrypto_DrmReprovisioning) {
|
||||
GTEST_SKIP() << "Test for non DRM Reprovisioning devices.";
|
||||
}
|
||||
Session s;
|
||||
ProvisioningRoundTrip provisioning_messages(&s, encoded_rsa_key_);
|
||||
provisioning_messages.PrepareSession(keybox_);
|
||||
@@ -881,6 +903,11 @@ TEST_F(OEMCryptoLoadsCertificate, CertificateProvisionBadRange5Prov30_API16) {
|
||||
if (global_features.provisioning_method != OEMCrypto_OEMCertificate) {
|
||||
GTEST_SKIP() << "Test for Prov 3.0 devices only.";
|
||||
}
|
||||
// DRM Reprovisioning CDMs have embedded certificates and do not support
|
||||
// key rewrapping.
|
||||
if (global_features.provisioning_method == OEMCrypto_DrmReprovisioning) {
|
||||
GTEST_SKIP() << "Test for non DRM Reprovisioning devices.";
|
||||
}
|
||||
Session s;
|
||||
ProvisioningRoundTrip provisioning_messages(&s, encoded_rsa_key_);
|
||||
provisioning_messages.PrepareSession(keybox_);
|
||||
@@ -931,6 +958,11 @@ TEST_F(OEMCryptoLoadsCertificate, CertificateProvisionBadNonce_API16) {
|
||||
if (global_features.provisioning_method == OEMCrypto_BootCertificateChain) {
|
||||
GTEST_SKIP() << "Test for non Prov 4.0 devices only.";
|
||||
}
|
||||
// DRM Reprovisioning CDMs have embedded certificates and do not support
|
||||
// key rewrapping.
|
||||
if (global_features.provisioning_method == OEMCrypto_DrmReprovisioning) {
|
||||
GTEST_SKIP() << "Test for non DRM Reprovisioning devices.";
|
||||
}
|
||||
Session s;
|
||||
ProvisioningRoundTrip provisioning_messages(&s, encoded_rsa_key_);
|
||||
provisioning_messages.PrepareSession(keybox_);
|
||||
@@ -950,6 +982,11 @@ TEST_F(OEMCryptoLoadsCertificate, CertificateProvisionBadRSAKey) {
|
||||
if (global_features.provisioning_method == OEMCrypto_BootCertificateChain) {
|
||||
GTEST_SKIP() << "Test for non Prov 4.0 devices only.";
|
||||
}
|
||||
// DRM Reprovisioning CDMs have embedded certificates and do not support
|
||||
// key rewrapping.
|
||||
if (global_features.provisioning_method == OEMCrypto_DrmReprovisioning) {
|
||||
GTEST_SKIP() << "Test for non DRM Reprovisioning devices.";
|
||||
}
|
||||
Session s;
|
||||
ProvisioningRoundTrip provisioning_messages(&s, encoded_rsa_key_);
|
||||
provisioning_messages.PrepareSession(keybox_);
|
||||
@@ -1119,6 +1156,10 @@ TEST_F(OEMCryptoLoadsCertificate, TestMultipleRSAKeys) {
|
||||
if (global_features.provisioning_method == OEMCrypto_BootCertificateChain) {
|
||||
GTEST_SKIP() << "Test for non Prov 4.0 devices only.";
|
||||
}
|
||||
// DRM Reprovisioning CDMs have embedded certificates.
|
||||
if (global_features.provisioning_method == OEMCrypto_DrmReprovisioning) {
|
||||
GTEST_SKIP() << "Test for non DRM Reprovisioning devices.";
|
||||
}
|
||||
ASSERT_NO_FATAL_FAILURE(CreateWrappedDRMKey());
|
||||
Session s1; // Session s1 loads the default rsa key, but doesn't use it
|
||||
// until after s2 uses its key.
|
||||
@@ -1160,6 +1201,10 @@ TEST_F(OEMCryptoLoadsCertificate, TestMaxDRMKeys) {
|
||||
if (global_features.provisioning_method == OEMCrypto_BootCertificateChain) {
|
||||
GTEST_SKIP() << "Test for non Prov 4.0 devices only.";
|
||||
}
|
||||
// DRM Reprovisioning CDMs have embedded certificates.
|
||||
if (global_features.provisioning_method == OEMCrypto_DrmReprovisioning) {
|
||||
GTEST_SKIP() << "Test for non DRM Reprovisioning devices.";
|
||||
}
|
||||
const size_t max_total_keys = GetResourceValue(kMaxTotalDRMPrivateKeys);
|
||||
std::vector<std::unique_ptr<Session>> sessions;
|
||||
std::vector<std::unique_ptr<LicenseRoundTrip>> licenses;
|
||||
|
||||
Reference in New Issue
Block a user