Remove support for 192-bit ECDSA keys.
Change-Id: I5ddb952b9cd79f08f13dbb2a4fbf0c75b3a4fabd
diff --git a/google_keymaster_test.cpp b/google_keymaster_test.cpp
index 55e9b0e..9bcdf9a 100644
--- a/google_keymaster_test.cpp
+++ b/google_keymaster_test.cpp
@@ -344,14 +344,14 @@
TEST_F(NewKeyGeneration, Ecdsa) {
req_.key_description.push_back(Authorization(TAG_ALGORITHM, KM_ALGORITHM_ECDSA));
- req_.key_description.push_back(Authorization(TAG_KEY_SIZE, 192));
+ req_.key_description.push_back(Authorization(TAG_KEY_SIZE, 224));
device.GenerateKey(req_, &rsp_);
CheckBaseParams(rsp_);
// Check specified tags are all present in unenforced characteristics
EXPECT_TRUE(contains(rsp_.unenforced, TAG_ALGORITHM, KM_ALGORITHM_ECDSA));
- EXPECT_TRUE(contains(rsp_.unenforced, TAG_KEY_SIZE, 192));
+ EXPECT_TRUE(contains(rsp_.unenforced, TAG_KEY_SIZE, 224));
}
TEST_F(NewKeyGeneration, EcdsaDefaultSize) {
@@ -375,7 +375,7 @@
}
TEST_F(NewKeyGeneration, EcdsaAllValidSizes) {
- size_t valid_sizes[] = {192, 224, 256, 384, 521};
+ size_t valid_sizes[] = {224, 256, 384, 521};
for (size_t size : valid_sizes) {
req_.key_description.Reinitialize(key_generation_base_params,
array_length(key_generation_base_params));
@@ -563,7 +563,7 @@
}
TEST_F(SigningOperationsTest, EcdsaSuccess) {
- GenerateKey(KM_ALGORITHM_ECDSA, KM_DIGEST_NONE, KM_PAD_NONE, 192 /* key size */);
+ GenerateKey(KM_ALGORITHM_ECDSA, KM_DIGEST_NONE, KM_PAD_NONE, 224 /* key size */);
BeginOperationRequest begin_request;
BeginOperationResponse begin_response;
@@ -780,7 +780,7 @@
}
TEST_F(VerificationOperationsTest, EcdsaSuccess) {
- GenerateKey(KM_ALGORITHM_ECDSA, KM_DIGEST_NONE, KM_PAD_NONE, 192 /* key size */);
+ GenerateKey(KM_ALGORITHM_ECDSA, KM_DIGEST_NONE, KM_PAD_NONE, 224 /* key size */);
const char message[] = "123456789012345678901234567890123456789012345678";
SignMessage(message, array_size(message) - 1);
ASSERT_TRUE(signature() != NULL);
@@ -849,7 +849,7 @@
}
TEST_F(ExportKeyTest, EcdsaSuccess) {
- GenerateKey(KM_ALGORITHM_ECDSA, KM_DIGEST_NONE, KM_PAD_NONE, 192 /* key size */);
+ GenerateKey(KM_ALGORITHM_ECDSA, KM_DIGEST_NONE, KM_PAD_NONE, 224 /* key size */);
ExportKeyRequest request;
ExportKeyResponse response;
@@ -1374,7 +1374,7 @@
Authorization(TAG_USER_AUTH_ID, 8),
Authorization(TAG_APPLICATION_ID, "app_id", 6),
Authorization(TAG_AUTH_TIMEOUT, 300),
- Authorization(TAG_KEY_SIZE, 192),
+ Authorization(TAG_KEY_SIZE, 224),
};
string pk8_key = read_file("ec_privkey_pk8.der");