From 2ce542d3f9cfe06bdc34d8bba83350df9abd7592 Mon Sep 17 00:00:00 2001 From: Subrahmanya Manikanta Venkateswarlu Bhamidipati Kameswara Sri Date: Wed, 12 Jul 2023 02:06:33 +0000 Subject: [PATCH] Skip known VTS failures on vendor code till U Some of the SE Javacard OS implementations does not fulfill all of the expectations as to when cipher text is to be generated. However, the implementations are compliant with Javacard Specifications. This patch skips the known VTS failures till U. Bug: 290850651 Test: run vts -m VtsAidlKeyMintTarget Change-Id: Id3746adc7385b41f4b4b2ebc8e7583972769134d --- security/keymint/aidl/vts/functional/KeyMintAidlTestBase.cpp | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/security/keymint/aidl/vts/functional/KeyMintAidlTestBase.cpp b/security/keymint/aidl/vts/functional/KeyMintAidlTestBase.cpp index b79700ffcd..82f4c8440d 100644 --- a/security/keymint/aidl/vts/functional/KeyMintAidlTestBase.cpp +++ b/security/keymint/aidl/vts/functional/KeyMintAidlTestBase.cpp @@ -834,7 +834,7 @@ void KeyMintAidlTestBase::CheckEncryptOneByteAtATime(BlockMode block_mode, const int vendor_api_level = property_get_int32("ro.vendor.api_level", 0); if (SecLevel() == SecurityLevel::STRONGBOX) { // This is known to be broken on older vendor implementations. - if (vendor_api_level < __ANDROID_API_T__) { + if (vendor_api_level <= __ANDROID_API_U__) { compare_output = false; } else { additional_information = " (b/194134359) ";