summaryrefslogtreecommitdiff
path: root/trusty/coverage/coverage_test.cpp
diff options
context:
space:
mode:
authorJocelyn Bohr <bohr@google.com>2017-07-06 16:24:01 -0700
committerJocelyn Bohr <bohr@google.com>2017-08-10 16:53:27 -0700
commitb3ed3772b9133ddd4e992e2f9c2fe959c4602dae (patch)
tree42fe35f05a6840087dacf5ad470ddaa447d7275a /trusty/coverage/coverage_test.cpp
parent6fa0884188dbc27b59b2fa3f86fb317bb1381252 (diff)
Enable non-secure side to receive messages > 4K
AttestKeyResponse may be larger than 4K (always less than 8K) when attesting an RSA key. This change allows the non-secure side to read a response that may be larger than 4K by adding an additional bit indicating the end of a response. If a message command has the KEYMASTER_STOP_BIT set, then the non-secure side knows that the response has been fully read. Test: android.keystore.cts.KeyAttestationTest#testRsaAttestation passes with production attestation key and chain, when AttestKeyResponse is larger than 4K. Tested with other CTS tests when keymaster messages are smaller than 4K, still passes. Manual test to verify that a tipc error due to large message size is handled correctly. Bug: 63335726 Change-Id: I8776ba7ca70da893648e15cfa770784ab31a2cb0
Diffstat (limited to 'trusty/coverage/coverage_test.cpp')
0 files changed, 0 insertions, 0 deletions