Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Updates for release of BouncyCastle 1.56 #8

Merged
merged 1 commit into from
Feb 3, 2017

Conversation

peterdettman
Copy link
Contributor

  • add maven entry for BC 1.56 and update the versions range
  • DHIES weak crypto tests now pass if algs not even supported
  • some ECIES entries moved to the invalid list
  • ECIES decryption init calls fixed to pass the correct parameters
  • EciesTest.testModifyPoint now expects GeneralSecurityException

@googlebot
Copy link

Thanks for your pull request. It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA).

📝 Please visit https://cla.developers.google.com/ to sign.

Once you've signed, please reply here (e.g. I signed it!) and we'll verify. Thanks.


  • If you've already signed a CLA, it's possible we don't have your GitHub username or you're using a different email address. Check your existing CLA data and verify that your email is set on your git commits.
  • If you signed the CLA as a corporation, please let us know the company's name.

- add maven entry for BC 1.56 and update the versions range
- DHIES weak crypto tests now pass if algs not even supported
- some ECIES entries moved to the invalid list
- ECIES decryption init calls fixed to pass the correct parameters
- EciesTest.testModifyPoint now expects GeneralSecurityException
@googlebot
Copy link

CLAs look good, thanks!

@thaidn
Copy link
Contributor

thaidn commented Dec 24, 2016

Cool, thanks for working on this!

I'll merge this PR after setting up two-way sync between GitHub and our internal repository, stay tuned.

@@ -296,7 +299,7 @@ public void testIsAlias(String algorithmA, String algorithmB) throws Exception {
byte[] message = "Hello".getBytes("UTF-8");
eciesA.init(Cipher.ENCRYPT_MODE, keyPair.getPublic());
byte[] ciphertext = eciesA.doFinal(message);
eciesB.init(Cipher.DECRYPT_MODE, keyPair.getPrivate());
eciesB.init(Cipher.DECRYPT_MODE, keyPair.getPrivate(), eciesA.getParameters());
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should this be eciesB.getParameters()?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@thaidn Sorry for the delayed reply. Actually eciesA.getParameters() was correct, since we are trying to decrypt with the parameters that were used (possibly auto-generated) during encryption. Looking at current code it appears this was actually changed to eciesB, which ought to be reverted (there's currently a test failure with latest BC caused by using eciesB here).

Copy link
Contributor

@thaidn thaidn left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm asking bleichen to take another look, as these are his tests.

@thaidn thaidn merged commit fa01b5a into C2SP:master Feb 3, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants