diff --git a/identity/support/src/IdentityCredentialSupport.cpp b/identity/support/src/IdentityCredentialSupport.cpp index 57cdc9888e..77b795bba6 100644 --- a/identity/support/src/IdentityCredentialSupport.cpp +++ b/identity/support/src/IdentityCredentialSupport.cpp @@ -1023,11 +1023,12 @@ optional>> createAttestation( // relying party is ever going to trust our batch key and those keys above // it. // - ::keymaster::PureSoftKeymasterContext context(KM_SECURITY_LEVEL_TRUSTED_ENVIRONMENT); + ::keymaster::PureSoftKeymasterContext context(::keymaster::KmVersion::KEYMASTER_4_1, + KM_SECURITY_LEVEL_TRUSTED_ENVIRONMENT); error = generate_attestation_from_EVP(key, swEnforced, hwEnforced, auth_set, context, - ::keymaster::kCurrentKeymasterVersion, *attestation_chain, - *attestation_signing_key, &cert_chain_out); + *attestation_chain, *attestation_signing_key, + &cert_chain_out); if (KM_ERROR_OK != error || !cert_chain_out) { LOG(ERROR) << "Error generate attestation from EVP key" << error; @@ -2402,7 +2403,6 @@ vector> chunkVector(const vector& content, size_t maxCh return ret; } - vector testHardwareBoundKey = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; const vector& getTestHardwareBoundKey() {