diff options
author | David Drysdale <drysdale@google.com> | 2022-04-08 12:22:35 +0100 |
---|---|---|
committer | David Drysdale <drysdale@google.com> | 2022-04-11 08:35:11 +0100 |
commit | b809329dc7eafbee0a94059506fd189fc38ea73c (patch) | |
tree | de6324a7394b728384baedd0923472ba14c2d0d4 /identity/support/src/cppbor_parse.cpp | |
parent | dc1a419baf664fb2acfa6dd41a76e341cd17bfb6 (diff) |
Fix AES corrupt padding test
The AesEcbPkcs7PaddingCorrupted test has been incorrect since it was
originally introduced -- it was feeding the original message as input to
the decryption operation, rather than the corrupted ciphertext. As a
result, the expected error code was also wrong -- INVALID_INPUT_LENGTH
is appropriate for a too-short cipher text (length 1 in this case),
whereas a corrupt-but-correct-length cipher text should give
INVALID_ARGUMENT.
Fix the test, and add a separate test to cover what was inadvertently
being tested before. Add a sentence to the HAL spec to describe what
expected and tested by CTS/VTS.
Bug: 194126736
Test: VtsAidlKeyMintTargetTest, VtsHalKeymasterV4_0TargetTest
Change-Id: Iaa5e42768814197f373797831093cf344d342b77
Diffstat (limited to 'identity/support/src/cppbor_parse.cpp')
0 files changed, 0 insertions, 0 deletions