diff options
author | David Zeuthen <zeuthen@google.com> | 2021-05-27 18:24:36 -0400 |
---|---|---|
committer | David Zeuthen <zeuthen@google.com> | 2021-06-01 16:44:06 -0400 |
commit | 1b8be7166f8033425bf618f5ad7b42e25eb44ea5 (patch) | |
tree | a06c7d982b777bdfb898eb343ceefa2e32a1bd8e /identity/aidl/vts/ProveOwnershipTests.cpp | |
parent | e8d43f7e59728744500bb875e1493c1193151bda (diff) |
identity: Don't pass invalid profileIds in VTS test.
Also add a check in the default implementation to help catch bugs like
this in the future.
Bug: 189865806
Test: atest VtsHalIdentityTargetTest
Test: atest CtsIdentityTestCases
Change-Id: Ief55528af8e14707b5c4d9431a851f9c8ccfae0c
Diffstat (limited to 'identity/aidl/vts/ProveOwnershipTests.cpp')
-rw-r--r-- | identity/aidl/vts/ProveOwnershipTests.cpp | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/identity/aidl/vts/ProveOwnershipTests.cpp b/identity/aidl/vts/ProveOwnershipTests.cpp index fa0e293388..c622193ef5 100644 --- a/identity/aidl/vts/ProveOwnershipTests.cpp +++ b/identity/aidl/vts/ProveOwnershipTests.cpp @@ -102,7 +102,7 @@ void ProveOwnershipTests::provisionData() { ASSERT_TRUE(wc->addAccessControlProfile(1, {}, false, 0, 0, &sacp).isOk()); // Single entry - don't care about the returned encrypted data - ASSERT_TRUE(wc->beginAddEntry({0}, "ns", "Some Data", 1).isOk()); + ASSERT_TRUE(wc->beginAddEntry({1}, "ns", "Some Data", 1).isOk()); vector<uint8_t> encryptedData; ASSERT_TRUE(wc->addEntryValue({9}, &encryptedData).isOk()); |