Remove test not useful now
This commit is contained in:
@@ -856,17 +856,6 @@ public class PgpKeyOperationTest {
|
|||||||
|
|
||||||
UncachedKeyRing modified;
|
UncachedKeyRing modified;
|
||||||
|
|
||||||
/*
|
|
||||||
{ // moveKeyToSecurityToken should fail with BAD_NFC_SIZE when presented with the RSA-3072 key
|
|
||||||
long keyId = KeyringTestingHelper.getSubkeyId(ringSecurityToken, 2);
|
|
||||||
parcelSecurityToken.reset();
|
|
||||||
parcelSecurityToken.mChangeSubKeys.add(new SubkeyChange(keyId, false, true));
|
|
||||||
|
|
||||||
assertModifyFailure("moveKeyToSecurityToken operation should fail on invalid key size", ringSecurityToken,
|
|
||||||
parcelSecurityToken, cryptoInput, LogType.MSG_MF_ERROR_BAD_SECURITY_TOKEN_SIZE);
|
|
||||||
}
|
|
||||||
*/
|
|
||||||
|
|
||||||
{ // moveKeyToSecurityToken should fail with BAD_NFC_ALGO when presented with the DSA-1024 key
|
{ // moveKeyToSecurityToken should fail with BAD_NFC_ALGO when presented with the DSA-1024 key
|
||||||
long keyId = KeyringTestingHelper.getSubkeyId(ringSecurityToken, 0);
|
long keyId = KeyringTestingHelper.getSubkeyId(ringSecurityToken, 0);
|
||||||
parcelSecurityToken.reset();
|
parcelSecurityToken.reset();
|
||||||
|
|||||||
Reference in New Issue
Block a user