Skip to content

Commit 82d84f8

Browse files
committed
Bug fixes
1 parent 33d3e37 commit 82d84f8

File tree

2 files changed

+14
-14
lines changed

2 files changed

+14
-14
lines changed

src/crypto/tests/TestChipCryptoPAL.cpp

+2-2
Original file line numberDiff line numberDiff line change
@@ -1829,10 +1829,10 @@ TEST_F(TestChipCryptoPAL, TestSPAKE2P_spake2p_PointIsValid)
18291829

18301830
err = spake2p.PointLoad(vector->point, vector->point_len, spake2p.L);
18311831
// The underlying implementation may (i.e. should) check for validity when loading a point. Let's catch this case.
1832-
EXPECT_FALSE(err == CHIP_NO_ERROR || vector->valid);
1832+
EXPECT_TRUE(err == CHIP_NO_ERROR || vector->valid == 0);
18331833

18341834
err = spake2p.PointIsValid(spake2p.L);
1835-
EXPECT_FALSE(err == CHIP_NO_ERROR || vector->valid);
1835+
EXPECT_TRUE(err == CHIP_NO_ERROR || vector->valid == 0);
18361836

18371837
numOfTestsRan += 1;
18381838
}

src/crypto/tests/TestPersistentStorageOpKeyStore.cpp

+12-12
Original file line numberDiff line numberDiff line change
@@ -177,7 +177,7 @@ TEST_F(TestPersistentStorageOpKeyStore, TestBasicLifeCycle)
177177
err = opKeystore.NewOpKeypairForFabric(kFabricIndex, csrSpan);
178178
EXPECT_EQ(err, CHIP_NO_ERROR);
179179
EXPECT_TRUE(opKeystore.HasPendingOpKeypair());
180-
EXPECT_TRUE(opKeystore.HasOpKeypairForFabric(kFabricIndex));
180+
EXPECT_FALSE(opKeystore.HasOpKeypairForFabric(kFabricIndex));
181181

182182
P256PublicKey csrPublicKey1;
183183
err = VerifyCertificateSigningRequest(csrSpan.data(), csrSpan.size(), csrPublicKey1);
@@ -216,21 +216,21 @@ TEST_F(TestPersistentStorageOpKeyStore, TestBasicLifeCycle)
216216
EXPECT_FALSE(opKeystore.HasOpKeypairForFabric(kFabricIndex));
217217

218218
// Even after error, the previous valid pending keypair stays valid.
219-
EXPECT_FALSE(opKeystore.HasPendingOpKeypair());
219+
EXPECT_TRUE(opKeystore.HasPendingOpKeypair());
220220

221221
// Activating with mismatching fabricIndex and matching public key fails
222222
err = opKeystore.ActivateOpKeypairForFabric(kBadFabricIndex, csrPublicKey2);
223223
EXPECT_EQ(err, CHIP_ERROR_INVALID_FABRIC_INDEX);
224224
EXPECT_EQ(storageDelegate.GetNumKeys(), 0u);
225225
EXPECT_TRUE(opKeystore.HasPendingOpKeypair());
226-
EXPECT_TRUE(opKeystore.HasOpKeypairForFabric(kFabricIndex));
226+
EXPECT_FALSE(opKeystore.HasOpKeypairForFabric(kFabricIndex));
227227

228228
// Activating with matching fabricIndex and mismatching public key fails
229229
err = opKeystore.ActivateOpKeypairForFabric(kFabricIndex, csrPublicKey1);
230230
EXPECT_EQ(err, CHIP_ERROR_INVALID_PUBLIC_KEY);
231231
EXPECT_EQ(storageDelegate.GetNumKeys(), 0u);
232232
EXPECT_TRUE(opKeystore.HasPendingOpKeypair());
233-
EXPECT_TRUE(opKeystore.HasOpKeypairForFabric(kFabricIndex));
233+
EXPECT_FALSE(opKeystore.HasOpKeypairForFabric(kFabricIndex));
234234

235235
uint8_t message[] = { 1, 2, 3, 4 };
236236
P256ECDSASignature sig1;
@@ -276,7 +276,7 @@ TEST_F(TestPersistentStorageOpKeyStore, TestBasicLifeCycle)
276276
std::string opKeyStorageKey = DefaultStorageKeyAllocator::FabricOpKey(kFabricIndex).KeyName();
277277
err = opKeystore.CommitOpKeypairForFabric(kFabricIndex);
278278
EXPECT_EQ(err, CHIP_NO_ERROR);
279-
EXPECT_TRUE(opKeystore.HasPendingOpKeypair());
279+
EXPECT_FALSE(opKeystore.HasPendingOpKeypair());
280280
EXPECT_EQ(storageDelegate.GetNumKeys(), 1u);
281281
EXPECT_TRUE(storageDelegate.HasKey(opKeyStorageKey));
282282

@@ -300,10 +300,10 @@ TEST_F(TestPersistentStorageOpKeyStore, TestBasicLifeCycle)
300300
// Let's remove the opkey for a fabric, it disappears
301301
err = opKeystore.RemoveOpKeypairForFabric(kFabricIndex);
302302
EXPECT_EQ(err, CHIP_NO_ERROR);
303-
EXPECT_TRUE(opKeystore.HasPendingOpKeypair());
304-
EXPECT_TRUE(opKeystore.HasOpKeypairForFabric(kFabricIndex));
303+
EXPECT_FALSE(opKeystore.HasPendingOpKeypair());
304+
EXPECT_FALSE(opKeystore.HasOpKeypairForFabric(kFabricIndex));
305305
EXPECT_EQ(storageDelegate.GetNumKeys(), 0u);
306-
EXPECT_TRUE(storageDelegate.HasKey(opKeyStorageKey));
306+
EXPECT_FALSE(storageDelegate.HasKey(opKeyStorageKey));
307307

308308
opKeystore.Finish();
309309
}
@@ -348,8 +348,8 @@ TEST_F(TestPersistentStorageOpKeyStore, TestMigrationKeys)
348348
CHIP_ERROR_INVALID_FABRIC_INDEX);
349349

350350
// The key does not exists in the any of the Operational Keystores
351-
EXPECT_TRUE(storageDelegate.HasKey(opKeyStorageKey));
352-
EXPECT_TRUE(testOperationalKeystore.HasOpKeypairForFabric(kFabricIndex));
351+
EXPECT_FALSE(storageDelegate.HasKey(opKeyStorageKey));
352+
EXPECT_FALSE(testOperationalKeystore.HasOpKeypairForFabric(kFabricIndex));
353353
EXPECT_EQ(opKeyStore.MigrateOpKeypairForFabric(kFabricIndex, testOperationalKeystore),
354354
CHIP_ERROR_PERSISTED_STORAGE_VALUE_NOT_FOUND);
355355

@@ -362,7 +362,7 @@ TEST_F(TestPersistentStorageOpKeyStore, TestMigrationKeys)
362362
EXPECT_EQ(opKeyStore.MigrateOpKeypairForFabric(kFabricIndex, testOperationalKeystore), CHIP_NO_ERROR);
363363
EXPECT_EQ(storageDelegate.GetNumKeys(), 1u);
364364
EXPECT_TRUE(storageDelegate.HasKey(opKeyStorageKey));
365-
EXPECT_TRUE(testOperationalKeystore.HasOpKeypairForFabric(kFabricIndex));
365+
EXPECT_FALSE(testOperationalKeystore.HasOpKeypairForFabric(kFabricIndex));
366366

367367
// Verify the migration
368368
P256SerializedKeypair serializedKeypair;
@@ -379,7 +379,7 @@ TEST_F(TestPersistentStorageOpKeyStore, TestMigrationKeys)
379379
EXPECT_EQ(testOperationalKeystore.NewOpKeypairForFabric(kFabricIndex, csrSpan2), CHIP_NO_ERROR);
380380
EXPECT_TRUE(testOperationalKeystore.HasOpKeypairForFabric(kFabricIndex));
381381
EXPECT_EQ(opKeyStore.MigrateOpKeypairForFabric(kFabricIndex, testOperationalKeystore), CHIP_NO_ERROR);
382-
EXPECT_TRUE(testOperationalKeystore.HasOpKeypairForFabric(kFabricIndex));
382+
EXPECT_FALSE(testOperationalKeystore.HasOpKeypairForFabric(kFabricIndex));
383383

384384
opKeyStore.Finish();
385385
}

0 commit comments

Comments
 (0)