Remove support for 192-bit ECDSA keys.
Change-Id: I5ddb952b9cd79f08f13dbb2a4fbf0c75b3a4fabd
diff --git a/ecdsa_key.cpp b/ecdsa_key.cpp
index 74713ab..ddf080b 100644
--- a/ecdsa_key.cpp
+++ b/ecdsa_key.cpp
@@ -113,9 +113,6 @@
/* static */
EC_GROUP* EcdsaKey::choose_group(size_t key_size_bits) {
switch (key_size_bits) {
- case 192:
- return EC_GROUP_new_by_curve_name(NID_X9_62_prime192v1);
- break;
case 224:
return EC_GROUP_new_by_curve_name(NID_secp224r1);
break;
@@ -137,9 +134,6 @@
/* static */
keymaster_error_t EcdsaKey::get_group_size(const EC_GROUP& group, size_t* key_size_bits) {
switch (EC_GROUP_get_curve_name(&group)) {
- case NID_X9_62_prime192v1:
- *key_size_bits = 192;
- break;
case NID_secp224r1:
*key_size_bits = 224;
break;
diff --git a/google_keymaster_test.cpp b/google_keymaster_test.cpp
index 55e9b0e..9bcdf9a 100644
--- a/google_keymaster_test.cpp
+++ b/google_keymaster_test.cpp
@@ -344,14 +344,14 @@
TEST_F(NewKeyGeneration, Ecdsa) {
req_.key_description.push_back(Authorization(TAG_ALGORITHM, KM_ALGORITHM_ECDSA));
- req_.key_description.push_back(Authorization(TAG_KEY_SIZE, 192));
+ req_.key_description.push_back(Authorization(TAG_KEY_SIZE, 224));
device.GenerateKey(req_, &rsp_);
CheckBaseParams(rsp_);
// Check specified tags are all present in unenforced characteristics
EXPECT_TRUE(contains(rsp_.unenforced, TAG_ALGORITHM, KM_ALGORITHM_ECDSA));
- EXPECT_TRUE(contains(rsp_.unenforced, TAG_KEY_SIZE, 192));
+ EXPECT_TRUE(contains(rsp_.unenforced, TAG_KEY_SIZE, 224));
}
TEST_F(NewKeyGeneration, EcdsaDefaultSize) {
@@ -375,7 +375,7 @@
}
TEST_F(NewKeyGeneration, EcdsaAllValidSizes) {
- size_t valid_sizes[] = {192, 224, 256, 384, 521};
+ size_t valid_sizes[] = {224, 256, 384, 521};
for (size_t size : valid_sizes) {
req_.key_description.Reinitialize(key_generation_base_params,
array_length(key_generation_base_params));
@@ -563,7 +563,7 @@
}
TEST_F(SigningOperationsTest, EcdsaSuccess) {
- GenerateKey(KM_ALGORITHM_ECDSA, KM_DIGEST_NONE, KM_PAD_NONE, 192 /* key size */);
+ GenerateKey(KM_ALGORITHM_ECDSA, KM_DIGEST_NONE, KM_PAD_NONE, 224 /* key size */);
BeginOperationRequest begin_request;
BeginOperationResponse begin_response;
@@ -780,7 +780,7 @@
}
TEST_F(VerificationOperationsTest, EcdsaSuccess) {
- GenerateKey(KM_ALGORITHM_ECDSA, KM_DIGEST_NONE, KM_PAD_NONE, 192 /* key size */);
+ GenerateKey(KM_ALGORITHM_ECDSA, KM_DIGEST_NONE, KM_PAD_NONE, 224 /* key size */);
const char message[] = "123456789012345678901234567890123456789012345678";
SignMessage(message, array_size(message) - 1);
ASSERT_TRUE(signature() != NULL);
@@ -849,7 +849,7 @@
}
TEST_F(ExportKeyTest, EcdsaSuccess) {
- GenerateKey(KM_ALGORITHM_ECDSA, KM_DIGEST_NONE, KM_PAD_NONE, 192 /* key size */);
+ GenerateKey(KM_ALGORITHM_ECDSA, KM_DIGEST_NONE, KM_PAD_NONE, 224 /* key size */);
ExportKeyRequest request;
ExportKeyResponse response;
@@ -1374,7 +1374,7 @@
Authorization(TAG_USER_AUTH_ID, 8),
Authorization(TAG_APPLICATION_ID, "app_id", 6),
Authorization(TAG_AUTH_TIMEOUT, 300),
- Authorization(TAG_KEY_SIZE, 192),
+ Authorization(TAG_KEY_SIZE, 224),
};
string pk8_key = read_file("ec_privkey_pk8.der");