trunks: Fix authorization session tests.

BUG=None
TEST=unit
CQ-DEPEND=CL:255241

Change-Id: I0af0250fee0bbc10f71640b5e3c6b30648c9b433
Reviewed-on: https://chromium-review.googlesource.com/259551
Reviewed-by: Utkarsh Sanghi <usanghi@chromium.org>
Commit-Queue: Darren Krahn <dkrahn@chromium.org>
Tested-by: Darren Krahn <dkrahn@chromium.org>
diff --git a/authorization_session_test.cc b/authorization_session_test.cc
index 62ef994..3b8ee56 100644
--- a/authorization_session_test.cc
+++ b/authorization_session_test.cc
@@ -5,6 +5,7 @@
 #include "trunks/authorization_session_impl.h"
 
 #include <base/logging.h>
+#include <base/strings/string_number_conversions.h>
 #include <gmock/gmock.h>
 #include <gtest/gtest.h>
 
@@ -36,6 +37,25 @@
     return &(session->hmac_delegate_);
   }
 
+  TPM2B_PUBLIC_KEY_RSA GetValidRSAPublicKey() {
+    const char kValidModulus[] =
+        "A1D50D088994000492B5F3ED8A9C5FC8772706219F4C063B2F6A8C6B74D3AD6B"
+        "212A53D01DABB34A6261288540D420D3BA59ED279D859DE6227A7AB6BD88FADD"
+        "FC3078D465F4DF97E03A52A587BD0165AE3B180FE7B255B7BEDC1BE81CB1383F"
+        "E9E46F9312B1EF28F4025E7D332E33F4416525FEB8F0FC7B815E8FBB79CDABE6"
+        "327B5A155FEF13F559A7086CB8A543D72AD6ECAEE2E704FF28824149D7F4E393"
+        "D3C74E721ACA97F7ADBE2CCF7B4BCC165F7380F48065F2C8370F25F066091259"
+        "D14EA362BAF236E3CD8771A94BDEDA3900577143A238AB92B6C55F11DEFAFB31"
+        "7D1DC5B6AE210C52B008D87F2A7BFF6EB5C4FB32D6ECEC6505796173951A3167";
+    std::vector<uint8> bytes;
+    CHECK(base::HexStringToBytes(kValidModulus, &bytes));
+    CHECK_EQ(bytes.size(), 256u);
+    TPM2B_PUBLIC_KEY_RSA rsa;
+    rsa.size = bytes.size();
+    memcpy(rsa.buffer, bytes.data(), bytes.size());
+    return rsa;
+  }
+
  protected:
   TrunksFactoryForTest factory_;
   NiceMock<MockTpm> mock_tpm_;
@@ -44,8 +64,7 @@
 TEST_F(AuthorizationSessionTest, StartUnboundSuccess) {
   AuthorizationSessionImpl session(factory_);
   TPM2B_PUBLIC public_data;
-  public_data.public_area.unique.rsa.size = 256;
-  public_data.public_area.unique.rsa.buffer[0] = 1;
+  public_data.public_area.unique.rsa = GetValidRSAPublicKey();
   EXPECT_CALL(mock_tpm_, ReadPublicSync(kSaltingKey, _, _, _, _, NULL))
       .WillOnce(DoAll(SetArgPointee<2>(public_data),
                       Return(TPM_RC_SUCCESS)));
@@ -77,8 +96,7 @@
 TEST_F(AuthorizationSessionTest, StartUnboundFail) {
   AuthorizationSessionImpl session(factory_);
   TPM2B_PUBLIC public_data;
-  public_data.public_area.unique.rsa.size = 256;
-  public_data.public_area.unique.rsa.buffer[0] = 1;
+  public_data.public_area.unique.rsa = GetValidRSAPublicKey();
   EXPECT_CALL(mock_tpm_, ReadPublicSync(kSaltingKey, _, _, _, _, NULL))
       .WillOnce(DoAll(SetArgPointee<2>(public_data),
                       Return(TPM_RC_SUCCESS)));
@@ -92,8 +110,7 @@
 TEST_F(AuthorizationSessionTest, StartUnboundWithBadNonce) {
   AuthorizationSessionImpl session(factory_);
   TPM2B_PUBLIC public_data;
-  public_data.public_area.unique.rsa.size = 256;
-  public_data.public_area.unique.rsa.buffer[0] = 1;
+  public_data.public_area.unique.rsa = GetValidRSAPublicKey();
   EXPECT_CALL(mock_tpm_, ReadPublicSync(kSaltingKey, _, _, _, _, NULL))
       .WillOnce(DoAll(SetArgPointee<2>(public_data),
                       Return(TPM_RC_SUCCESS)));
@@ -110,8 +127,7 @@
 TEST_F(AuthorizationSessionTest, StartBoundSuccess) {
   AuthorizationSessionImpl session(factory_);
   TPM2B_PUBLIC public_data;
-  public_data.public_area.unique.rsa.size = 256;
-  public_data.public_area.unique.rsa.buffer[0] = 1;
+  public_data.public_area.unique.rsa = GetValidRSAPublicKey();
   EXPECT_CALL(mock_tpm_, ReadPublicSync(kSaltingKey, _, _, _, _, NULL))
       .WillOnce(DoAll(SetArgPointee<2>(public_data),
                       Return(TPM_RC_SUCCESS)));