CTS tests for major:minor of /dev/random and /dev/urandom.
These tests assert that /dev/random and /dev/urandom are backed by
the correct parts of the Linux RNG kernel driver.
Bug: 10394220
Conflicts:
tests/tests/security/jni/Android.mk
(cherry picked from commit c277854a19579864ab959d2302f16386db2332a7)
Change-Id: I415309c6b14f2e38062d00c365ab9e2d2a881ae9
diff --git a/tests/tests/security/jni/CtsSecurityJniOnLoad.cpp b/tests/tests/security/jni/CtsSecurityJniOnLoad.cpp
index 7244fc2..7577eef 100644
--- a/tests/tests/security/jni/CtsSecurityJniOnLoad.cpp
+++ b/tests/tests/security/jni/CtsSecurityJniOnLoad.cpp
@@ -18,6 +18,7 @@
#include <stdio.h>
extern int register_android_security_cts_CharDeviceTest(JNIEnv*);
+extern int register_android_security_cts_LinuxRngTest(JNIEnv*);
extern int register_android_security_cts_NativeCodeTest(JNIEnv*);
jint JNI_OnLoad(JavaVM *vm, void *reserved) {
@@ -31,6 +32,10 @@
return JNI_ERR;
}
+ if (register_android_security_cts_LinuxRngTest(env)) {
+ return JNI_ERR;
+ }
+
if (register_android_security_cts_NativeCodeTest(env)) {
return JNI_ERR;
}