From 703c242322f75fa23e7b349186cfb02103a2ac05 Mon Sep 17 00:00:00 2001 From: Shawn Willden Date: Thu, 3 Aug 2017 14:10:50 -0600 Subject: [PATCH] Reduce max keymaster message size to 2K Bug: 63745895 Test: VtsHalKeymasterV3_0TargetTest Change-Id: I9b8c2e551f04bd2124462095f232bd08ff1f63c6 --- keymaster/3.0/vts/functional/keymaster_hidl_hal_test.cpp | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/keymaster/3.0/vts/functional/keymaster_hidl_hal_test.cpp b/keymaster/3.0/vts/functional/keymaster_hidl_hal_test.cpp index b950765118..d064bd727c 100644 --- a/keymaster/3.0/vts/functional/keymaster_hidl_hal_test.cpp +++ b/keymaster/3.0/vts/functional/keymaster_hidl_hal_test.cpp @@ -1730,7 +1730,7 @@ TEST_F(SigningOperationsTest, EcdsaNoDigestHugeData) { .Authorization(TAG_NO_AUTH_REQUIRED) .EcdsaSigningKey(224) .Digest(Digest::NONE))); - string message(64 * 1024, 'a'); + string message(2 * 1024, 'a'); SignMessage(message, AuthorizationSetBuilder().Digest(Digest::NONE)); } @@ -2564,7 +2564,7 @@ TEST_F(EncryptionOperationsTest, RsaNoPaddingTooLong) { } /* - * EncryptionOperationsTest.RsaNoPaddingTooLong + * EncryptionOperationsTest.RsaNoPaddingTooLarge * * Verifies that raw RSA encryption of too-large (numerically) messages fails in the expected way. */