@@ -151,14 +151,14 @@ TEST_CASE("Check Test endorsement for UVM 0.2.10")
151151 REQUIRE (!endorsement.empty ());
152152
153153 ccf::pal::SnpAttestationMeasurement measurement (
154- " 6d6c354511d6f7c6d7504668903dc5bdc066a048b651840d8d03fb85299ebfa142fccf1d1b "
155- " 0baca496841bdf243619d4 " );
154+ " 4904167aa9102a7557b97ac102469f50289d5be76036fcbb8107897ee146a6184772c4ea6e "
155+ " 3f050a1bac6951c285bc89 " );
156156 ccf::pal::PlatformAttestationMeasurement uvm_measurement (measurement);
157157
158158 std::vector<ccf::pal::UVMEndorsements> custom_roots_of_trust = {
159159 ccf::pal::UVMEndorsements{
160160 " did:x509:0:sha256:I__iuL25oXEVFdTP_aBLx_eT1RPHbCQ_ECBQfYZpt9s::eku:1.3."
161- " 6.1.4.1.311.76.59.1.1 " ,
161+ " 6.1.4.1.311.76.59.1.2 " ,
162162 " Malicious-ContainerPlat-AMD-UVM" ,
163163 " 104" }};
164164
@@ -167,20 +167,16 @@ TEST_CASE("Check Test endorsement for UVM 0.2.10")
167167 endorsement, uvm_measurement, custom_roots_of_trust),
168168 " UVM endorsements did "
169169 " did:x509:0:sha256:I__iuL25oXEVFdTP_aBLx_eT1RPHbCQ_ECBQfYZpt9s::eku:1.3.6."
170- " 1.4.1.311.76.59.1.1 , feed ContainerPlat-AMD-UVM, svn 104 do not match any "
170+ " 1.4.1.311.76.59.1.2 , feed ContainerPlat-AMD-UVM, svn 104 do not match any "
171171 " of the known UVM roots of trust" ,
172172 std::logic_error);
173173
174- /* Commented out awaiting on UVM endorsements with fixed EKUs (ending .2
175- instead of .1).
176-
177174 auto endorsements = ccf::verify_uvm_endorsements_against_roots_of_trust (
178175 endorsement, uvm_measurement, ccf::default_uvm_roots_of_trust);
179176
180177 REQUIRE (endorsements.did == ccf::default_uvm_roots_of_trust[0 ].did );
181178 REQUIRE (endorsements.feed == ccf::default_uvm_roots_of_trust[0 ].feed );
182179 REQUIRE (endorsements.svn == " 104" );
183- */
184180}
185181
186182TEST_CASE (" Check UVM roots of trust matching" )
0 commit comments