summaryrefslogtreecommitdiff
path: root/identity/aidl/vts/ProveOwnershipTests.cpp
diff options
context:
space:
mode:
authorDavid Zeuthen <zeuthen@google.com>2021-05-27 18:24:36 -0400
committerDavid Zeuthen <zeuthen@google.com>2021-06-01 16:44:06 -0400
commit1b8be7166f8033425bf618f5ad7b42e25eb44ea5 (patch)
treea06c7d982b777bdfb898eb343ceefa2e32a1bd8e /identity/aidl/vts/ProveOwnershipTests.cpp
parente8d43f7e59728744500bb875e1493c1193151bda (diff)
identity: Don't pass invalid profileIds in VTS test.
Also add a check in the default implementation to help catch bugs like this in the future. Bug: 189865806 Test: atest VtsHalIdentityTargetTest Test: atest CtsIdentityTestCases Change-Id: Ief55528af8e14707b5c4d9431a851f9c8ccfae0c
Diffstat (limited to 'identity/aidl/vts/ProveOwnershipTests.cpp')
-rw-r--r--identity/aidl/vts/ProveOwnershipTests.cpp2
1 files changed, 1 insertions, 1 deletions
diff --git a/identity/aidl/vts/ProveOwnershipTests.cpp b/identity/aidl/vts/ProveOwnershipTests.cpp
index fa0e293388..c622193ef5 100644
--- a/identity/aidl/vts/ProveOwnershipTests.cpp
+++ b/identity/aidl/vts/ProveOwnershipTests.cpp
@@ -102,7 +102,7 @@ void ProveOwnershipTests::provisionData() {
ASSERT_TRUE(wc->addAccessControlProfile(1, {}, false, 0, 0, &sacp).isOk());
// Single entry - don't care about the returned encrypted data
- ASSERT_TRUE(wc->beginAddEntry({0}, "ns", "Some Data", 1).isOk());
+ ASSERT_TRUE(wc->beginAddEntry({1}, "ns", "Some Data", 1).isOk());
vector<uint8_t> encryptedData;
ASSERT_TRUE(wc->addEntryValue({9}, &encryptedData).isOk());