From e6fe29a0ffc73c771a9d0818a6e611509b8aa3ac Mon Sep 17 00:00:00 2001 From: Arnaud Fontaine Date: Wed, 4 Jan 2017 15:38:29 +0100 Subject: [PATCH] Remove test not useful now --- .../keychain/pgp/PgpKeyOperationTest.java | 11 ----------- 1 file changed, 11 deletions(-) diff --git a/OpenKeychain/src/test/java/org/sufficientlysecure/keychain/pgp/PgpKeyOperationTest.java b/OpenKeychain/src/test/java/org/sufficientlysecure/keychain/pgp/PgpKeyOperationTest.java index 87e780323..9266d8a40 100644 --- a/OpenKeychain/src/test/java/org/sufficientlysecure/keychain/pgp/PgpKeyOperationTest.java +++ b/OpenKeychain/src/test/java/org/sufficientlysecure/keychain/pgp/PgpKeyOperationTest.java @@ -856,17 +856,6 @@ public class PgpKeyOperationTest { UncachedKeyRing modified; - /* - { // moveKeyToSecurityToken should fail with BAD_NFC_SIZE when presented with the RSA-3072 key - long keyId = KeyringTestingHelper.getSubkeyId(ringSecurityToken, 2); - parcelSecurityToken.reset(); - parcelSecurityToken.mChangeSubKeys.add(new SubkeyChange(keyId, false, true)); - - assertModifyFailure("moveKeyToSecurityToken operation should fail on invalid key size", ringSecurityToken, - parcelSecurityToken, cryptoInput, LogType.MSG_MF_ERROR_BAD_SECURITY_TOKEN_SIZE); - } - */ - { // moveKeyToSecurityToken should fail with BAD_NFC_ALGO when presented with the DSA-1024 key long keyId = KeyringTestingHelper.getSubkeyId(ringSecurityToken, 0); parcelSecurityToken.reset();