Fixing bug in security vulnerability patch

The incorrect logical operator being used was causing unconditional
permission to be granted, which is the exact opposite of intended
behavior.

Bug: 70280642
Test: testEcAttestation_KeyStoreExceptionWhenRequestingUniqueId passes
Change-Id: I2f1ed9768f136003126fb59a7a4517a159ff978c
diff --git a/keystore/key_store_service.cpp b/keystore/key_store_service.cpp
index ac10921..b309ad6 100644
--- a/keystore/key_store_service.cpp
+++ b/keystore/key_store_service.cpp
@@ -814,7 +814,7 @@
 
     if (containsTag(params.getParameters(), Tag::INCLUDE_UNIQUE_ID)) {
         //TODO(jbires): remove uid checking upon implementation of b/25646100
-        if (!checkBinderPermission(P_GEN_UNIQUE_ID) &&
+        if (!checkBinderPermission(P_GEN_UNIQUE_ID) ||
             originalUid != IPCThreadState::self()->getCallingUid()) {
             *aidl_return = static_cast<int32_t>(ResponseCode::PERMISSION_DENIED);
             return Status::ok();