aboutsummaryrefslogtreecommitdiff
path: root/java/com/google/security/wycheproof/testcases/EcKeyTest.java
diff options
context:
space:
mode:
authorJack He <siyuanh@google.com>2020-05-05 00:57:55 +0000
committerAutomerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>2020-05-05 00:57:55 +0000
commit4f802d80c825390dfb30e2ee3e700b331adedbf4 (patch)
treec11bd2eaef548732be4c7b00794d8b9561bc3f7b /java/com/google/security/wycheproof/testcases/EcKeyTest.java
parentad1c077d2f9a4d049aa5b90cac76d189649ab5b3 (diff)
parentd0087c5dab04aab8a9d84ad3d60ea74ff7b825c4 (diff)
downloadwycheproof-4f802d80c825390dfb30e2ee3e700b331adedbf4.tar.gz
Merge "Revert "Remove deprecated BouncyCastle algorithms"" am: 4e6be05f46 am: 3fc418dda8 am: d0087c5dab
Change-Id: Ic98e4e695afe361fb1b57e380dc97f9780e41274
Diffstat (limited to 'java/com/google/security/wycheproof/testcases/EcKeyTest.java')
-rw-r--r--java/com/google/security/wycheproof/testcases/EcKeyTest.java14
1 files changed, 0 insertions, 14 deletions
diff --git a/java/com/google/security/wycheproof/testcases/EcKeyTest.java b/java/com/google/security/wycheproof/testcases/EcKeyTest.java
index a18a8ff..8d3563c 100644
--- a/java/com/google/security/wycheproof/testcases/EcKeyTest.java
+++ b/java/com/google/security/wycheproof/testcases/EcKeyTest.java
@@ -21,8 +21,6 @@
package com.google.security.wycheproof;
-import com.google.security.wycheproof.WycheproofRunner.ExcludedTest;
-import com.google.security.wycheproof.WycheproofRunner.ProviderType;
import java.math.BigInteger;
import java.security.InvalidAlgorithmParameterException;
import java.security.KeyFactory;
@@ -129,9 +127,6 @@ public class EcKeyTest extends TestCase {
+ "8c0b49bbb85c3303ddb1553c3b761c2caacca71606ba9ebac8",
};
- @ExcludedTest(
- providers = {ProviderType.BOUNCY_CASTLE},
- comment = "KeyFactory.EC is removed")
public void testEncodedPublicKey() throws Exception {
KeyFactory kf = KeyFactory.getInstance("EC");
for (String encodedHex : EC_INVALID_PUBLIC_KEYS) {
@@ -147,9 +142,6 @@ public class EcKeyTest extends TestCase {
}
}
- @ExcludedTest(
- providers = {ProviderType.BOUNCY_CASTLE},
- comment = "KeyPairGenerator.EC is removed")
public void testEncodedPrivateKey() throws Exception {
KeyPairGenerator keyGen = KeyPairGenerator.getInstance("EC");
keyGen.initialize(EcUtil.getNistP256Params());
@@ -193,9 +185,6 @@ public class EcKeyTest extends TestCase {
// TODO(bleichen): use RandomUtil
}
- @ExcludedTest(
- providers = {ProviderType.BOUNCY_CASTLE},
- comment = "KeyPairGenerator.EC is removed")
public void testKeyGenerationAll() throws Exception {
testKeyGeneration(EcUtil.getNistP224Params(), true);
testKeyGeneration(EcUtil.getNistP256Params(), true);
@@ -213,9 +202,6 @@ public class EcKeyTest extends TestCase {
* Nist recommends a minimal security strength of 112 bits for the time until 2030.
* To achieve this security strength EC keys of at least 224 bits are required.
*/
- @ExcludedTest(
- providers = {ProviderType.BOUNCY_CASTLE},
- comment = "KeyPairGenerator.EC is removed")
public void testDefaultKeyGeneration() throws Exception {
KeyPairGenerator keyGen = KeyPairGenerator.getInstance("EC");
KeyPair keyPair = keyGen.generateKeyPair();