diff options
author | Jack He <siyuanh@google.com> | 2020-05-05 00:57:55 +0000 |
---|---|---|
committer | Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com> | 2020-05-05 00:57:55 +0000 |
commit | 4f802d80c825390dfb30e2ee3e700b331adedbf4 (patch) | |
tree | c11bd2eaef548732be4c7b00794d8b9561bc3f7b /java/com/google/security/wycheproof/testcases/EcKeyTest.java | |
parent | ad1c077d2f9a4d049aa5b90cac76d189649ab5b3 (diff) | |
parent | d0087c5dab04aab8a9d84ad3d60ea74ff7b825c4 (diff) | |
download | wycheproof-4f802d80c825390dfb30e2ee3e700b331adedbf4.tar.gz |
Merge "Revert "Remove deprecated BouncyCastle algorithms"" am: 4e6be05f46 am: 3fc418dda8 am: d0087c5dab
Change-Id: Ic98e4e695afe361fb1b57e380dc97f9780e41274
Diffstat (limited to 'java/com/google/security/wycheproof/testcases/EcKeyTest.java')
-rw-r--r-- | java/com/google/security/wycheproof/testcases/EcKeyTest.java | 14 |
1 files changed, 0 insertions, 14 deletions
diff --git a/java/com/google/security/wycheproof/testcases/EcKeyTest.java b/java/com/google/security/wycheproof/testcases/EcKeyTest.java index a18a8ff..8d3563c 100644 --- a/java/com/google/security/wycheproof/testcases/EcKeyTest.java +++ b/java/com/google/security/wycheproof/testcases/EcKeyTest.java @@ -21,8 +21,6 @@ package com.google.security.wycheproof; -import com.google.security.wycheproof.WycheproofRunner.ExcludedTest; -import com.google.security.wycheproof.WycheproofRunner.ProviderType; import java.math.BigInteger; import java.security.InvalidAlgorithmParameterException; import java.security.KeyFactory; @@ -129,9 +127,6 @@ public class EcKeyTest extends TestCase { + "8c0b49bbb85c3303ddb1553c3b761c2caacca71606ba9ebac8", }; - @ExcludedTest( - providers = {ProviderType.BOUNCY_CASTLE}, - comment = "KeyFactory.EC is removed") public void testEncodedPublicKey() throws Exception { KeyFactory kf = KeyFactory.getInstance("EC"); for (String encodedHex : EC_INVALID_PUBLIC_KEYS) { @@ -147,9 +142,6 @@ public class EcKeyTest extends TestCase { } } - @ExcludedTest( - providers = {ProviderType.BOUNCY_CASTLE}, - comment = "KeyPairGenerator.EC is removed") public void testEncodedPrivateKey() throws Exception { KeyPairGenerator keyGen = KeyPairGenerator.getInstance("EC"); keyGen.initialize(EcUtil.getNistP256Params()); @@ -193,9 +185,6 @@ public class EcKeyTest extends TestCase { // TODO(bleichen): use RandomUtil } - @ExcludedTest( - providers = {ProviderType.BOUNCY_CASTLE}, - comment = "KeyPairGenerator.EC is removed") public void testKeyGenerationAll() throws Exception { testKeyGeneration(EcUtil.getNistP224Params(), true); testKeyGeneration(EcUtil.getNistP256Params(), true); @@ -213,9 +202,6 @@ public class EcKeyTest extends TestCase { * Nist recommends a minimal security strength of 112 bits for the time until 2030. * To achieve this security strength EC keys of at least 224 bits are required. */ - @ExcludedTest( - providers = {ProviderType.BOUNCY_CASTLE}, - comment = "KeyPairGenerator.EC is removed") public void testDefaultKeyGeneration() throws Exception { KeyPairGenerator keyGen = KeyPairGenerator.getInstance("EC"); KeyPair keyPair = keyGen.generateKeyPair(); |