Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
openanolis
dragonwell8_jdk
提交
1d489b23
D
dragonwell8_jdk
项目概览
openanolis
/
dragonwell8_jdk
通知
4
Star
2
Fork
0
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
D
dragonwell8_jdk
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
1d489b23
编写于
10月 28, 2011
作者:
X
xuelei
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
7105940: Test regression: KeyStore must be from provider SunPKCS11-NSSKeyStore
Reviewed-by: weijun
上级
7f838b8a
变更
2
隐藏空白更改
内联
并排
Showing
2 changed file
with
41 addition
and
46 deletion
+41
-46
test/sun/security/pkcs11/fips/CipherTest.java
test/sun/security/pkcs11/fips/CipherTest.java
+40
-45
test/sun/security/pkcs11/fips/ClientJSSEServerJSSE.java
test/sun/security/pkcs11/fips/ClientJSSEServerJSSE.java
+1
-1
未找到文件。
test/sun/security/pkcs11/fips/CipherTest.java
浏览文件 @
1d489b23
...
...
@@ -394,52 +394,47 @@ public class CipherTest {
public
static
void
main
(
PeerFactory
peerFactory
,
KeyStore
keyStore
,
String
[]
args
)
throws
Exception
{
SSLContext
reservedSSLContext
=
SSLContext
.
getDefault
();
try
{
long
time
=
System
.
currentTimeMillis
();
String
relPath
;
if
((
args
!=
null
)
&&
(
args
.
length
>
0
)
&&
args
[
0
].
equals
(
"sh"
))
{
relPath
=
pathToStoresSH
;
}
else
{
relPath
=
pathToStores
;
}
PATH
=
new
File
(
System
.
getProperty
(
"test.src"
,
"."
),
relPath
);
CipherTest
.
peerFactory
=
peerFactory
;
System
.
out
.
print
(
"Initializing test '"
+
peerFactory
.
getName
()
+
"'..."
);
// secureRandom = new SecureRandom();
// secureRandom.nextInt();
// trustStore = readKeyStore(trustStoreFile);
CipherTest
.
keyStore
=
keyStore
;
// keyStore = readKeyStore(keyStoreFile);
KeyManagerFactory
keyFactory
=
KeyManagerFactory
.
getInstance
(
KeyManagerFactory
.
getDefaultAlgorithm
());
keyFactory
.
init
(
keyStore
,
"test12"
.
toCharArray
());
keyManager
=
(
X509ExtendedKeyManager
)
keyFactory
.
getKeyManagers
()[
0
];
TrustManagerFactory
tmf
=
TrustManagerFactory
.
getInstance
(
TrustManagerFactory
.
getDefaultAlgorithm
());
tmf
.
init
(
keyStore
);
trustManager
=
(
X509TrustManager
)
tmf
.
getTrustManagers
()[
0
];
// trustManager = new AlwaysTrustManager();
SSLContext
context
=
SSLContext
.
getInstance
(
"TLS"
);
context
.
init
(
new
KeyManager
[]
{
keyManager
},
new
TrustManager
[]
{
trustManager
},
null
);
SSLContext
.
setDefault
(
context
);
CipherTest
cipherTest
=
new
CipherTest
(
peerFactory
);
Thread
serverThread
=
new
Thread
(
peerFactory
.
newServer
(
cipherTest
),
"Server"
);
serverThread
.
setDaemon
(
true
);
serverThread
.
start
();
System
.
out
.
println
(
"Done"
);
cipherTest
.
run
();
time
=
System
.
currentTimeMillis
()
-
time
;
System
.
out
.
println
(
"Done. ("
+
time
+
" ms)"
);
}
finally
{
SSLContext
.
setDefault
(
reservedSSLContext
);
long
time
=
System
.
currentTimeMillis
();
String
relPath
;
if
((
args
!=
null
)
&&
(
args
.
length
>
0
)
&&
args
[
0
].
equals
(
"sh"
))
{
relPath
=
pathToStoresSH
;
}
else
{
relPath
=
pathToStores
;
}
PATH
=
new
File
(
System
.
getProperty
(
"test.src"
,
"."
),
relPath
);
CipherTest
.
peerFactory
=
peerFactory
;
System
.
out
.
print
(
"Initializing test '"
+
peerFactory
.
getName
()
+
"'..."
);
// secureRandom = new SecureRandom();
// secureRandom.nextInt();
// trustStore = readKeyStore(trustStoreFile);
CipherTest
.
keyStore
=
keyStore
;
// keyStore = readKeyStore(keyStoreFile);
KeyManagerFactory
keyFactory
=
KeyManagerFactory
.
getInstance
(
KeyManagerFactory
.
getDefaultAlgorithm
());
keyFactory
.
init
(
keyStore
,
"test12"
.
toCharArray
());
keyManager
=
(
X509ExtendedKeyManager
)
keyFactory
.
getKeyManagers
()[
0
];
TrustManagerFactory
tmf
=
TrustManagerFactory
.
getInstance
(
TrustManagerFactory
.
getDefaultAlgorithm
());
tmf
.
init
(
keyStore
);
trustManager
=
(
X509TrustManager
)
tmf
.
getTrustManagers
()[
0
];
// trustManager = new AlwaysTrustManager();
SSLContext
context
=
SSLContext
.
getInstance
(
"TLS"
);
context
.
init
(
new
KeyManager
[]
{
keyManager
},
new
TrustManager
[]
{
trustManager
},
null
);
SSLContext
.
setDefault
(
context
);
CipherTest
cipherTest
=
new
CipherTest
(
peerFactory
);
Thread
serverThread
=
new
Thread
(
peerFactory
.
newServer
(
cipherTest
),
"Server"
);
serverThread
.
setDaemon
(
true
);
serverThread
.
start
();
System
.
out
.
println
(
"Done"
);
cipherTest
.
run
();
time
=
System
.
currentTimeMillis
()
-
time
;
System
.
out
.
println
(
"Done. ("
+
time
+
" ms)"
);
}
static
abstract
class
PeerFactory
{
...
...
test/sun/security/pkcs11/fips/ClientJSSEServerJSSE.java
浏览文件 @
1d489b23
...
...
@@ -26,9 +26,9 @@
* @bug 6313675 6323647
* @summary Verify that all ciphersuites work in FIPS mode
* @library ..
* @run main/othervm ClientJSSEServerJSSE
* @ignore JSSE supported cipher suites are changed with CR 6916074,
* need to update this test case in JDK 7 soon
* @run main/othervm ClientJSSEServerJSSE
* @author Andreas Sterbenz
*/
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录