-
Notifications
You must be signed in to change notification settings - Fork 290
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Updates for release of BouncyCastle 1.56 #8
Conversation
peterdettman
commented
Dec 23, 2016
- add maven entry for BC 1.56 and update the versions range
- DHIES weak crypto tests now pass if algs not even supported
- some ECIES entries moved to the invalid list
- ECIES decryption init calls fixed to pass the correct parameters
- EciesTest.testModifyPoint now expects GeneralSecurityException
Thanks for your pull request. It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please visit https://cla.developers.google.com/ to sign. Once you've signed, please reply here (e.g.
|
- add maven entry for BC 1.56 and update the versions range - DHIES weak crypto tests now pass if algs not even supported - some ECIES entries moved to the invalid list - ECIES decryption init calls fixed to pass the correct parameters - EciesTest.testModifyPoint now expects GeneralSecurityException
010bff6
to
3e1e905
Compare
CLAs look good, thanks! |
Cool, thanks for working on this! I'll merge this PR after setting up two-way sync between GitHub and our internal repository, stay tuned. |
@@ -296,7 +299,7 @@ public void testIsAlias(String algorithmA, String algorithmB) throws Exception { | |||
byte[] message = "Hello".getBytes("UTF-8"); | |||
eciesA.init(Cipher.ENCRYPT_MODE, keyPair.getPublic()); | |||
byte[] ciphertext = eciesA.doFinal(message); | |||
eciesB.init(Cipher.DECRYPT_MODE, keyPair.getPrivate()); | |||
eciesB.init(Cipher.DECRYPT_MODE, keyPair.getPrivate(), eciesA.getParameters()); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should this be eciesB.getParameters()?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@thaidn Sorry for the delayed reply. Actually eciesA.getParameters() was correct, since we are trying to decrypt with the parameters that were used (possibly auto-generated) during encryption. Looking at current code it appears this was actually changed to eciesB, which ought to be reverted (there's currently a test failure with latest BC caused by using eciesB here).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm asking bleichen to take another look, as these are his tests.