提交 ff2c8bce 编写于 作者: W weijun

8190690: Impact on krb5 test cases in the 8u-CPU nightly

Reviewed-by: coffeys
上级 d475e36e
...@@ -26,8 +26,8 @@ ...@@ -26,8 +26,8 @@
* @bug 9999999 * @bug 9999999
* @summary default principal can act as anyone * @summary default principal can act as anyone
* @compile -XDignore.symbol.file AcceptPermissions.java * @compile -XDignore.symbol.file AcceptPermissions.java
* @run main/othervm AcceptPermissions two * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock AcceptPermissions two
* @run main/othervm AcceptPermissions unbound * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock AcceptPermissions unbound
*/ */
import java.nio.file.Files; import java.nio.file.Files;
......
...@@ -26,8 +26,8 @@ ...@@ -26,8 +26,8 @@
* @bug 7077646 * @bug 7077646
* @summary gssapi wrap for CFX per-message tokens always set FLAG_ACCEPTOR_SUBKEY * @summary gssapi wrap for CFX per-message tokens always set FLAG_ACCEPTOR_SUBKEY
* @compile -XDignore.symbol.file AcceptorSubKey.java * @compile -XDignore.symbol.file AcceptorSubKey.java
* @run main/othervm AcceptorSubKey 0 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock AcceptorSubKey 0
* @run main/othervm AcceptorSubKey 4 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock AcceptorSubKey 4
*/ */
import sun.security.jgss.GSSUtil; import sun.security.jgss.GSSUtil;
......
...@@ -24,9 +24,9 @@ ...@@ -24,9 +24,9 @@
/* /*
* @test * @test
* @bug 4501327 4868379 8039132 * @bug 4501327 4868379 8039132
* @run main/othervm AddressesAndNameType 1 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock AddressesAndNameType 1
* @run main/othervm AddressesAndNameType 2 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock AddressesAndNameType 2
* @run main/othervm AddressesAndNameType 3 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock AddressesAndNameType 3
* @summary noaddresses settings and server name type * @summary noaddresses settings and server name type
*/ */
......
...@@ -24,7 +24,7 @@ ...@@ -24,7 +24,7 @@
/* /*
* @test * @test
* @bug 6843127 * @bug 6843127
* @run main/othervm/timeout=300 BadKdc1 * @run main/othervm/timeout=300 -Dsun.net.spi.nameservice.provider.1=ns,mock BadKdc1
* @summary krb5 should not try to access unavailable kdc too often * @summary krb5 should not try to access unavailable kdc too often
*/ */
......
...@@ -24,7 +24,7 @@ ...@@ -24,7 +24,7 @@
/* /*
* @test * @test
* @bug 6843127 * @bug 6843127
* @run main/othervm/timeout=300 BadKdc2 * @run main/othervm/timeout=300 -Dsun.net.spi.nameservice.provider.1=ns,mock BadKdc2
* @summary krb5 should not try to access unavailable kdc too often * @summary krb5 should not try to access unavailable kdc too often
*/ */
......
...@@ -24,7 +24,7 @@ ...@@ -24,7 +24,7 @@
/* /*
* @test * @test
* @bug 6843127 * @bug 6843127
* @run main/othervm/timeout=300 BadKdc3 * @run main/othervm/timeout=300 -Dsun.net.spi.nameservice.provider.1=ns,mock BadKdc3
* @summary krb5 should not try to access unavailable kdc too often * @summary krb5 should not try to access unavailable kdc too often
*/ */
......
...@@ -24,7 +24,7 @@ ...@@ -24,7 +24,7 @@
/* /*
* @test * @test
* @bug 6843127 * @bug 6843127
* @run main/othervm/timeout=300 BadKdc4 * @run main/othervm/timeout=300 -Dsun.net.spi.nameservice.provider.1=ns,mock BadKdc4
* @summary krb5 should not try to access unavailable kdc too often * @summary krb5 should not try to access unavailable kdc too often
*/ */
......
...@@ -26,7 +26,7 @@ ...@@ -26,7 +26,7 @@
* @bug 7152176 * @bug 7152176
* @summary More krb5 tests * @summary More krb5 tests
* @compile -XDignore.symbol.file Basic.java * @compile -XDignore.symbol.file Basic.java
* @run main/othervm Basic * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock Basic
*/ */
import sun.security.jgss.GSSUtil; import sun.security.jgss.GSSUtil;
......
...@@ -26,34 +26,34 @@ ...@@ -26,34 +26,34 @@
* @bug 6706974 * @bug 6706974
* @summary Add krb5 test infrastructure * @summary Add krb5 test infrastructure
* @compile -XDignore.symbol.file BasicKrb5Test.java * @compile -XDignore.symbol.file BasicKrb5Test.java
* @run main/othervm BasicKrb5Test * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test
* @run main/othervm BasicKrb5Test des-cbc-crc * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test des-cbc-crc
* @run main/othervm BasicKrb5Test des-cbc-md5 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test des-cbc-md5
* @run main/othervm BasicKrb5Test des3-cbc-sha1 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test des3-cbc-sha1
* @run main/othervm BasicKrb5Test aes128-cts * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test aes128-cts
* @run main/othervm BasicKrb5Test aes256-cts * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test aes256-cts
* @run main/othervm BasicKrb5Test rc4-hmac * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test rc4-hmac
* @run main/othervm BasicKrb5Test -s * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test -s
* @run main/othervm BasicKrb5Test des-cbc-crc -s * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test des-cbc-crc -s
* @run main/othervm BasicKrb5Test des-cbc-md5 -s * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test des-cbc-md5 -s
* @run main/othervm BasicKrb5Test des3-cbc-sha1 -s * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test des3-cbc-sha1 -s
* @run main/othervm BasicKrb5Test aes128-cts -s * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test aes128-cts -s
* @run main/othervm BasicKrb5Test aes256-cts -s * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test aes256-cts -s
* @run main/othervm BasicKrb5Test rc4-hmac -s * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test rc4-hmac -s
* @run main/othervm BasicKrb5Test -C * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test -C
* @run main/othervm BasicKrb5Test des-cbc-crc -C * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test des-cbc-crc -C
* @run main/othervm BasicKrb5Test des-cbc-md5 -C * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test des-cbc-md5 -C
* @run main/othervm BasicKrb5Test des3-cbc-sha1 -C * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test des3-cbc-sha1 -C
* @run main/othervm BasicKrb5Test aes128-cts -C * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test aes128-cts -C
* @run main/othervm BasicKrb5Test aes256-cts -C * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test aes256-cts -C
* @run main/othervm BasicKrb5Test rc4-hmac -C * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test rc4-hmac -C
* @run main/othervm BasicKrb5Test -s -C * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test -s -C
* @run main/othervm BasicKrb5Test des-cbc-crc -s -C * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test des-cbc-crc -s -C
* @run main/othervm BasicKrb5Test des-cbc-md5 -s -C * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test des-cbc-md5 -s -C
* @run main/othervm BasicKrb5Test des3-cbc-sha1 -s -C * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test des3-cbc-sha1 -s -C
* @run main/othervm BasicKrb5Test aes128-cts -s -C * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test aes128-cts -s -C
* @run main/othervm BasicKrb5Test aes256-cts -s -C * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test aes256-cts -s -C
* @run main/othervm BasicKrb5Test rc4-hmac -s -C * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicKrb5Test rc4-hmac -s -C
*/ */
import org.ietf.jgss.GSSName; import org.ietf.jgss.GSSName;
......
...@@ -27,7 +27,7 @@ ...@@ -27,7 +27,7 @@
* @summary A test library to launch multiple Java processes * @summary A test library to launch multiple Java processes
* @library ../../../../java/security/testlibrary/ * @library ../../../../java/security/testlibrary/
* @compile -XDignore.symbol.file BasicProc.java * @compile -XDignore.symbol.file BasicProc.java
* @run main/othervm BasicProc * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BasicProc
*/ */
import java.io.File; import java.io.File;
...@@ -65,6 +65,9 @@ public class BasicProc { ...@@ -65,6 +65,9 @@ public class BasicProc {
.args("client") .args("client")
.prop("java.security.krb5.conf", CONF) .prop("java.security.krb5.conf", CONF)
.prop("java.security.manager", "") .prop("java.security.manager", "")
.prop("sun.net.spi.nameservice.provider.1", "ns,mock")
.perm(new java.lang.RuntimePermission(
"accessClassInPackage.sun.net.spi.nameservice"))
.perm(new java.util.PropertyPermission( .perm(new java.util.PropertyPermission(
"sun.security.krb5.principal", "read")) "sun.security.krb5.principal", "read"))
.perm(new javax.security.auth.AuthPermission( .perm(new javax.security.auth.AuthPermission(
...@@ -85,6 +88,9 @@ public class BasicProc { ...@@ -85,6 +88,9 @@ public class BasicProc {
.args("server") .args("server")
.prop("java.security.krb5.conf", CONF) .prop("java.security.krb5.conf", CONF)
.prop("java.security.manager", "") .prop("java.security.manager", "")
.prop("sun.net.spi.nameservice.provider.1", "ns,mock")
.perm(new java.lang.RuntimePermission(
"accessClassInPackage.sun.net.spi.nameservice"))
.perm(new java.util.PropertyPermission( .perm(new java.util.PropertyPermission(
"sun.security.krb5.principal", "read")) "sun.security.krb5.principal", "read"))
.perm(new javax.security.auth.AuthPermission( .perm(new javax.security.auth.AuthPermission(
...@@ -107,6 +113,9 @@ public class BasicProc { ...@@ -107,6 +113,9 @@ public class BasicProc {
.args("backend") .args("backend")
.prop("java.security.krb5.conf", CONF) .prop("java.security.krb5.conf", CONF)
.prop("java.security.manager", "") .prop("java.security.manager", "")
.prop("sun.net.spi.nameservice.provider.1", "ns,mock")
.perm(new java.lang.RuntimePermission(
"accessClassInPackage.sun.net.spi.nameservice"))
.perm(new java.util.PropertyPermission( .perm(new java.util.PropertyPermission(
"sun.security.krb5.principal", "read")) "sun.security.krb5.principal", "read"))
.perm(new javax.security.auth.AuthPermission( .perm(new javax.security.auth.AuthPermission(
...@@ -185,6 +194,7 @@ public class BasicProc { ...@@ -185,6 +194,7 @@ public class BasicProc {
return p return p
.env("KRB5_CONFIG", CONF) .env("KRB5_CONFIG", CONF)
.env("KRB5_KTNAME", KTAB) .env("KRB5_KTNAME", KTAB)
.prop("sun.net.spi.nameservice.provider.1", "ns,mock")
.prop("sun.security.jgss.native", "true") .prop("sun.security.jgss.native", "true")
.prop("javax.security.auth.useSubjectCredsOnly", "false") .prop("javax.security.auth.useSubjectCredsOnly", "false")
.prop("sun.security.nativegss.debug", "true"); .prop("sun.security.nativegss.debug", "true");
......
...@@ -36,7 +36,7 @@ import javax.security.auth.login.LoginException; ...@@ -36,7 +36,7 @@ import javax.security.auth.login.LoginException;
* @bug 4515853 8075297 * @bug 4515853 8075297
* @summary Checks that Kerberos client tries slave KDC * @summary Checks that Kerberos client tries slave KDC
* if master KDC is not responding * if master KDC is not responding
* @run main/othervm BogusKDC * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock BogusKDC
*/ */
public class BogusKDC { public class BogusKDC {
......
...@@ -25,7 +25,7 @@ ...@@ -25,7 +25,7 @@
* @test * @test
* @bug 6716534 * @bug 6716534
* @compile -XDignore.symbol.file CleanState.java * @compile -XDignore.symbol.file CleanState.java
* @run main/othervm CleanState * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock CleanState
* @summary Krb5LoginModule has not cleaned temp info between authentication attempts * @summary Krb5LoginModule has not cleaned temp info between authentication attempts
*/ */
import com.sun.security.auth.module.Krb5LoginModule; import com.sun.security.auth.module.Krb5LoginModule;
......
...@@ -25,7 +25,7 @@ ...@@ -25,7 +25,7 @@
* @test * @test
* @bug 6706974 * @bug 6706974
* @compile -XDignore.symbol.file CrossRealm.java * @compile -XDignore.symbol.file CrossRealm.java
* @run main/othervm CrossRealm * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock CrossRealm
* @summary Add krb5 test infrastructure * @summary Add krb5 test infrastructure
*/ */
import java.io.File; import java.io.File;
......
...@@ -26,8 +26,8 @@ ...@@ -26,8 +26,8 @@
* @bug 8005447 * @bug 8005447
* @summary default principal can act as anyone * @summary default principal can act as anyone
* @compile -XDignore.symbol.file DiffNameSameKey.java * @compile -XDignore.symbol.file DiffNameSameKey.java
* @run main/othervm/fail DiffNameSameKey a * @run main/othervm/fail -Dsun.net.spi.nameservice.provider.1=ns,mock DiffNameSameKey a
* @run main/othervm DiffNameSameKey b * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock DiffNameSameKey b
*/ */
import sun.security.jgss.GSSUtil; import sun.security.jgss.GSSUtil;
......
...@@ -26,11 +26,11 @@ ...@@ -26,11 +26,11 @@
* @bug 7067974 * @bug 7067974
* @summary multiple ETYPE-INFO-ENTRY with same etype and different salt * @summary multiple ETYPE-INFO-ENTRY with same etype and different salt
* @compile -XDignore.symbol.file DupEtypes.java * @compile -XDignore.symbol.file DupEtypes.java
* @run main/othervm DupEtypes 1 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock DupEtypes 1
* @run main/othervm DupEtypes 2 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock DupEtypes 2
* @run main/othervm/fail DupEtypes 3 * @run main/othervm/fail -Dsun.net.spi.nameservice.provider.1=ns,mock DupEtypes 3
* @run main/othervm DupEtypes 4 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock DupEtypes 4
* @run main/othervm DupEtypes 5 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock DupEtypes 5
*/ */
import sun.security.jgss.GSSUtil; import sun.security.jgss.GSSUtil;
......
...@@ -25,7 +25,7 @@ ...@@ -25,7 +25,7 @@
* @test * @test
* @bug 6894072 * @bug 6894072
* @compile -XDignore.symbol.file DynamicKeytab.java * @compile -XDignore.symbol.file DynamicKeytab.java
* @run main/othervm DynamicKeytab * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock DynamicKeytab
* @summary always refresh keytab * @summary always refresh keytab
*/ */
......
...@@ -26,7 +26,7 @@ ...@@ -26,7 +26,7 @@
* @bug 6879540 * @bug 6879540
* @summary enable empty password for kerberos 5 * @summary enable empty password for kerberos 5
* @compile -XDignore.symbol.file EmptyPassword.java * @compile -XDignore.symbol.file EmptyPassword.java
* @run main/othervm EmptyPassword * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock EmptyPassword
*/ */
public class EmptyPassword { public class EmptyPassword {
......
...@@ -26,7 +26,7 @@ ...@@ -26,7 +26,7 @@
* @bug 7152121 * @bug 7152121
* @summary Krb5LoginModule no longer handles keyTabNames with "file:" prefix * @summary Krb5LoginModule no longer handles keyTabNames with "file:" prefix
* @compile -XDignore.symbol.file FileKeyTab.java * @compile -XDignore.symbol.file FileKeyTab.java
* @run main/othervm FileKeyTab * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock FileKeyTab
*/ */
import java.io.File; import java.io.File;
......
...@@ -26,7 +26,7 @@ ...@@ -26,7 +26,7 @@
* @bug 8022582 * @bug 8022582
* @summary Relax response flags checking in sun.security.krb5.KrbKdcRep.check. * @summary Relax response flags checking in sun.security.krb5.KrbKdcRep.check.
* @compile -XDignore.symbol.file ForwardableCheck.java * @compile -XDignore.symbol.file ForwardableCheck.java
* @run main/othervm ForwardableCheck * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock ForwardableCheck
*/ */
import org.ietf.jgss.GSSException; import org.ietf.jgss.GSSException;
......
...@@ -26,7 +26,7 @@ ...@@ -26,7 +26,7 @@
* @bug 7152176 * @bug 7152176
* @summary More krb5 tests * @summary More krb5 tests
* @compile -XDignore.symbol.file GSS.java * @compile -XDignore.symbol.file GSS.java
* @run main/othervm GSS * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock GSS
*/ */
import sun.security.jgss.GSSUtil; import sun.security.jgss.GSSUtil;
......
...@@ -26,7 +26,7 @@ ...@@ -26,7 +26,7 @@
* @bug 8001104 * @bug 8001104
* @summary Unbound SASL service: the GSSAPI/krb5 mech * @summary Unbound SASL service: the GSSAPI/krb5 mech
* @compile -XDignore.symbol.file GSSUnbound.java * @compile -XDignore.symbol.file GSSUnbound.java
* @run main/othervm GSSUnbound * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock GSSUnbound
*/ */
import java.security.Security; import java.security.Security;
......
...@@ -24,7 +24,7 @@ ...@@ -24,7 +24,7 @@
/* /*
* @test * @test
* @bug 6578647 6829283 * @bug 6578647 6829283
* @run main/othervm HttpNegotiateServer * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock HttpNegotiateServer
* @summary Undefined requesting URL in java.net.Authenticator.getPasswordAuthentication() * @summary Undefined requesting URL in java.net.Authenticator.getPasswordAuthentication()
* @summary HTTP/Negotiate: Authenticator triggered again when user cancels the first one * @summary HTTP/Negotiate: Authenticator triggered again when user cancels the first one
*/ */
......
...@@ -24,7 +24,7 @@ ...@@ -24,7 +24,7 @@
/* /*
* @test * @test
* @bug 6851973 * @bug 6851973
* @run main/othervm IgnoreChannelBinding * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock IgnoreChannelBinding
* @summary ignore incoming channel binding if acceptor does not set one * @summary ignore incoming channel binding if acceptor does not set one
*/ */
......
...@@ -206,9 +206,9 @@ public class KDC { ...@@ -206,9 +206,9 @@ public class KDC {
SENSITIVE_ACCOUNTS, SENSITIVE_ACCOUNTS,
}; };
static { //static {
System.setProperty("sun.net.spi.nameservice.provider.1", "ns,mock"); // System.setProperty("sun.net.spi.nameservice.provider.1", "ns,mock");
} //}
/** /**
* A standalone KDC server. * A standalone KDC server.
......
...@@ -26,7 +26,7 @@ ...@@ -26,7 +26,7 @@
* @bug 8015669 * @bug 8015669
* @summary KerberosPrincipal::equals should ignore name-type * @summary KerberosPrincipal::equals should ignore name-type
* @compile -XDignore.symbol.file KPEquals.java * @compile -XDignore.symbol.file KPEquals.java
* @run main/othervm KPEquals * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock KPEquals
*/ */
import sun.security.jgss.GSSUtil; import sun.security.jgss.GSSUtil;
......
...@@ -24,7 +24,7 @@ ...@@ -24,7 +24,7 @@
/* /*
* @test * @test
* @bug 4641821 * @bug 4641821
* @run main/othervm KerberosHashEqualsTest * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock KerberosHashEqualsTest
* @summary hashCode() and equals() for KerberosKey and KerberosTicket * @summary hashCode() and equals() for KerberosKey and KerberosTicket
*/ */
......
...@@ -26,7 +26,7 @@ ...@@ -26,7 +26,7 @@
* @bug 8004488 * @bug 8004488
* @summary wrong permissions checked in krb5 * @summary wrong permissions checked in krb5
* @compile -XDignore.symbol.file KeyPermissions.java * @compile -XDignore.symbol.file KeyPermissions.java
* @run main/othervm KeyPermissions * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock KeyPermissions
*/ */
import java.security.AccessControlException; import java.security.AccessControlException;
......
...@@ -26,7 +26,7 @@ ...@@ -26,7 +26,7 @@
* @bug 6894072 * @bug 6894072
* @bug 8004488 * @bug 8004488
* @compile -XDignore.symbol.file KeyTabCompat.java * @compile -XDignore.symbol.file KeyTabCompat.java
* @run main/othervm KeyTabCompat * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock KeyTabCompat
* @summary always refresh keytab * @summary always refresh keytab
*/ */
......
...@@ -37,7 +37,7 @@ import javax.security.auth.login.LoginContext; ...@@ -37,7 +37,7 @@ import javax.security.auth.login.LoginContext;
* @test * @test
* @bug 6857795 8075299 * @bug 6857795 8075299
* @summary Checks Kerberos ticket properties * @summary Checks Kerberos ticket properties
* @run main/othervm KrbTicket * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock KrbTicket
*/ */
public class KrbTicket { public class KrbTicket {
......
...@@ -25,7 +25,7 @@ ...@@ -25,7 +25,7 @@
* @test * @test
* @bug 7197159 * @bug 7197159
* @compile -XDignore.symbol.file KvnoNA.java * @compile -XDignore.symbol.file KvnoNA.java
* @run main/othervm KvnoNA * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock KvnoNA
* @summary accept different kvno if there no match * @summary accept different kvno if there no match
*/ */
......
...@@ -24,7 +24,7 @@ ...@@ -24,7 +24,7 @@
/* /*
* @test * @test
* @bug 6857802 * @bug 6857802
* @run main/othervm LifeTimeInSeconds * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock LifeTimeInSeconds
* @summary GSS getRemainingInitLifetime method returns milliseconds not seconds * @summary GSS getRemainingInitLifetime method returns milliseconds not seconds
*/ */
import org.ietf.jgss.GSSCredential; import org.ietf.jgss.GSSCredential;
......
...@@ -24,7 +24,7 @@ ...@@ -24,7 +24,7 @@
/* /*
* @test * @test
* @bug 6765491 * @bug 6765491
* @run main/othervm LoginModuleOptions * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock LoginModuleOptions
* @summary Krb5LoginModule a little too restrictive, and the doc is not clear. * @summary Krb5LoginModule a little too restrictive, and the doc is not clear.
*/ */
import com.sun.security.auth.module.Krb5LoginModule; import com.sun.security.auth.module.Krb5LoginModule;
......
...@@ -26,7 +26,7 @@ ...@@ -26,7 +26,7 @@
* @bug 8028351 * @bug 8028351
* @summary JWS doesn't get authenticated when using kerberos auth proxy * @summary JWS doesn't get authenticated when using kerberos auth proxy
* @compile -XDignore.symbol.file LoginNoPass.java * @compile -XDignore.symbol.file LoginNoPass.java
* @run main/othervm LoginNoPass * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock LoginNoPass
*/ */
import sun.security.jgss.GSSUtil; import sun.security.jgss.GSSUtil;
......
...@@ -26,7 +26,7 @@ ...@@ -26,7 +26,7 @@
* @bug 8078439 * @bug 8078439
* @summary SPNEGO auth fails if client proposes MS krb5 OID * @summary SPNEGO auth fails if client proposes MS krb5 OID
* @compile -XDignore.symbol.file MSOID2.java * @compile -XDignore.symbol.file MSOID2.java
* @run main/othervm MSOID2 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock MSOID2
*/ */
import sun.security.jgss.GSSUtil; import sun.security.jgss.GSSUtil;
......
...@@ -25,7 +25,7 @@ ...@@ -25,7 +25,7 @@
* @test * @test
* @bug 6844193 * @bug 6844193
* @compile -XDignore.symbol.file MaxRetries.java * @compile -XDignore.symbol.file MaxRetries.java
* @run main/othervm/timeout=300 MaxRetries * @run main/othervm/timeout=300 -Dsun.net.spi.nameservice.provider.1=ns,mock MaxRetries
* @summary support max_retries in krb5.conf * @summary support max_retries in krb5.conf
*/ */
......
...@@ -24,7 +24,7 @@ ...@@ -24,7 +24,7 @@
/* /*
* @test * @test
* @bug 6893158 6907425 7197159 * @bug 6893158 6907425 7197159
* @run main/othervm MoreKvno * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock MoreKvno
* @summary AP_REQ check should use key version number * @summary AP_REQ check should use key version number
*/ */
......
...@@ -25,9 +25,9 @@ ...@@ -25,9 +25,9 @@
* @test * @test
* @bug 6960894 * @bug 6960894
* @summary Better AS-REQ creation and processing * @summary Better AS-REQ creation and processing
* @run main/othervm NewSalt * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock NewSalt
* @run main/othervm -Dnopreauth NewSalt * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -Dnopreauth NewSalt
* @run main/othervm -Donlyonepreauth NewSalt * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -Donlyonepreauth NewSalt
*/ */
import sun.security.jgss.GSSUtil; import sun.security.jgss.GSSUtil;
......
...@@ -24,9 +24,9 @@ ...@@ -24,9 +24,9 @@
/* /*
* @test * @test
* @bug 7032354 * @bug 7032354
* @run main/othervm NoAddresses 1 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock NoAddresses 1
* @run main/othervm NoAddresses 2 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock NoAddresses 2
* @run main/othervm/fail NoAddresses 3 * @run main/othervm/fail -Dsun.net.spi.nameservice.provider.1=ns,mock NoAddresses 3
* @summary no-addresses should not be used on acceptor side * @summary no-addresses should not be used on acceptor side
*/ */
......
...@@ -26,7 +26,7 @@ ...@@ -26,7 +26,7 @@
* @bug 7089889 * @bug 7089889
* @summary Krb5LoginModule.login() throws an exception if used without a keytab * @summary Krb5LoginModule.login() throws an exception if used without a keytab
* @compile -XDignore.symbol.file NoInitNoKeytab.java * @compile -XDignore.symbol.file NoInitNoKeytab.java
* @run main/othervm NoInitNoKeytab * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock NoInitNoKeytab
*/ */
import java.io.FileOutputStream; import java.io.FileOutputStream;
......
...@@ -24,7 +24,7 @@ ...@@ -24,7 +24,7 @@
/* /*
* @test * @test
* @bug 6733095 * @bug 6733095
* @run main/othervm NonMutualSpnego * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock NonMutualSpnego
* @summary Failure when SPNEGO request non-Mutual * @summary Failure when SPNEGO request non-Mutual
*/ */
......
...@@ -24,7 +24,7 @@ ...@@ -24,7 +24,7 @@
/* /*
* @test * @test
* @bug 8001326 * @bug 8001326
* @run main/othervm NoneReplayCacheTest * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock NoneReplayCacheTest
* @summary the replaycache type none cannot stop an authenticator replay, * @summary the replaycache type none cannot stop an authenticator replay,
* but it can stop a message replay when s.s.k.acceptor.subkey is true. * but it can stop a message replay when s.s.k.acceptor.subkey is true.
* You should not really use none in production environment. This test merely * You should not really use none in production environment. This test merely
......
...@@ -24,27 +24,27 @@ ...@@ -24,27 +24,27 @@
/* /*
* @test * @test
* @bug 6853328 7172701 * @bug 6853328 7172701
* @run main/othervm OkAsDelegate false true true false false false * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock OkAsDelegate false true true false false false
* FORWARDABLE ticket not allowed, always fail * FORWARDABLE ticket not allowed, always fail
* @run main/othervm OkAsDelegate true false false false false false * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock OkAsDelegate true false false false false false
* Service ticket no OK-AS-DELEGATE. Request nothing, gain nothing * Service ticket no OK-AS-DELEGATE. Request nothing, gain nothing
* @run main/othervm OkAsDelegate true false true false false false * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock OkAsDelegate true false true false false false
* Service ticket no OK-AS-DELEGATE. Request deleg policy, gain nothing * Service ticket no OK-AS-DELEGATE. Request deleg policy, gain nothing
* @run main/othervm OkAsDelegate true true false true false true * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock OkAsDelegate true true false true false true
* Service ticket no OK-AS-DELEGATE. Request deleg, granted * Service ticket no OK-AS-DELEGATE. Request deleg, granted
* @run main/othervm OkAsDelegate true true true true false true * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock OkAsDelegate true true true true false true
* Service ticket no OK-AS-DELEGATE. Request deleg and deleg policy, granted, with info not by policy * Service ticket no OK-AS-DELEGATE. Request deleg and deleg policy, granted, with info not by policy
* @run main/othervm -Dtest.kdc.policy.ok-as-delegate OkAsDelegate true false true true true true * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -Dtest.kdc.policy.ok-as-delegate OkAsDelegate true false true true true true
* Service ticket has OK-AS-DELEGATE. Request deleg policy, granted * Service ticket has OK-AS-DELEGATE. Request deleg policy, granted
* @run main/othervm -Dtest.kdc.policy.ok-as-delegate OkAsDelegate true true true true true true * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -Dtest.kdc.policy.ok-as-delegate OkAsDelegate true true true true true true
* Service ticket has OK-AS-DELEGATE. granted, with info by policy * Service ticket has OK-AS-DELEGATE. granted, with info by policy
* @run main/othervm -Dtest.spnego OkAsDelegate false true true false false false * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -Dtest.spnego OkAsDelegate false true true false false false
* @run main/othervm -Dtest.spnego OkAsDelegate true false false false false false * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -Dtest.spnego OkAsDelegate true false false false false false
* @run main/othervm -Dtest.spnego OkAsDelegate true false true false false false * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -Dtest.spnego OkAsDelegate true false true false false false
* @run main/othervm -Dtest.spnego OkAsDelegate true true false true false true * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -Dtest.spnego OkAsDelegate true true false true false true
* @run main/othervm -Dtest.spnego OkAsDelegate true true true true false true * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -Dtest.spnego OkAsDelegate true true true true false true
* @run main/othervm -Dtest.spnego -Dtest.kdc.policy.ok-as-delegate OkAsDelegate true false true true true true * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -Dtest.spnego -Dtest.kdc.policy.ok-as-delegate OkAsDelegate true false true true true true
* @run main/othervm -Dtest.spnego -Dtest.kdc.policy.ok-as-delegate OkAsDelegate true true true true true true * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -Dtest.spnego -Dtest.kdc.policy.ok-as-delegate OkAsDelegate true true true true true true
* @summary Support OK-AS-DELEGATE flag * @summary Support OK-AS-DELEGATE flag
*/ */
import com.sun.security.jgss.ExtendedGSSContext; import com.sun.security.jgss.ExtendedGSSContext;
......
...@@ -24,13 +24,13 @@ ...@@ -24,13 +24,13 @@
/* /*
* @test * @test
* @bug 6853328 7172701 * @bug 6853328 7172701
* @run main/othervm OkAsDelegateXRealm false * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock OkAsDelegateXRealm false
* KDC no OK-AS-DELEGATE, fail * KDC no OK-AS-DELEGATE, fail
* @run main/othervm -Dtest.kdc.policy.ok-as-delegate OkAsDelegateXRealm true * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -Dtest.kdc.policy.ok-as-delegate OkAsDelegateXRealm true
* KDC set OK-AS-DELEGATE for all, succeed * KDC set OK-AS-DELEGATE for all, succeed
* @run main/othervm -Dtest.kdc.policy.ok-as-delegate=host/host.r3.local OkAsDelegateXRealm false * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -Dtest.kdc.policy.ok-as-delegate=host/host.r3.local OkAsDelegateXRealm false
* KDC set OK-AS-DELEGATE for host/host.r3.local only, fail * KDC set OK-AS-DELEGATE for host/host.r3.local only, fail
* @run main/othervm -Dtest.kdc.policy.ok-as-delegate=host/host.r3.local,krbtgt/R2,krbtgt/R3 OkAsDelegateXRealm true * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -Dtest.kdc.policy.ok-as-delegate=host/host.r3.local,krbtgt/R2,krbtgt/R3 OkAsDelegateXRealm true
* KDC set OK-AS-DELEGATE for all three, succeed * KDC set OK-AS-DELEGATE for all three, succeed
* @summary Support OK-AS-DELEGATE flag * @summary Support OK-AS-DELEGATE flag
*/ */
......
...@@ -26,7 +26,7 @@ ...@@ -26,7 +26,7 @@
* @bug 8014310 * @bug 8014310
* @summary JAAS/Krb5LoginModule using des encytypes failure with NPE after JDK-8012679 * @summary JAAS/Krb5LoginModule using des encytypes failure with NPE after JDK-8012679
* @compile -XDignore.symbol.file OnlyDesLogin.java * @compile -XDignore.symbol.file OnlyDesLogin.java
* @run main/othervm OnlyDesLogin * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock OnlyDesLogin
*/ */
import sun.security.krb5.Config; import sun.security.krb5.Config;
......
...@@ -26,7 +26,7 @@ ...@@ -26,7 +26,7 @@
* @bug 7061379 * @bug 7061379
* @summary [Kerberos] Cross-realm authentication fails, due to nameType problem * @summary [Kerberos] Cross-realm authentication fails, due to nameType problem
* @compile -XDignore.symbol.file PrincipalNameEquals.java * @compile -XDignore.symbol.file PrincipalNameEquals.java
* @run main/othervm PrincipalNameEquals * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock PrincipalNameEquals
*/ */
import sun.security.jgss.GSSUtil; import sun.security.jgss.GSSUtil;
......
...@@ -26,7 +26,7 @@ ...@@ -26,7 +26,7 @@
* @bug 7077640 * @bug 7077640
* @summary gss wrap for cfx doesn't handle rrc != 0 * @summary gss wrap for cfx doesn't handle rrc != 0
* @compile -XDignore.symbol.file RRC.java * @compile -XDignore.symbol.file RRC.java
* @run main/othervm RRC * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock RRC
*/ */
import java.util.Arrays; import java.util.Arrays;
......
...@@ -34,7 +34,7 @@ import javax.security.auth.login.LoginException; ...@@ -34,7 +34,7 @@ import javax.security.auth.login.LoginException;
* @bug 4745056 8075297 * @bug 4745056 8075297
* @summary Checks if refreshKrb5Config is set to true for Krb5LoginModule, * @summary Checks if refreshKrb5Config is set to true for Krb5LoginModule,
* then configuration will be refreshed before login() method is called * then configuration will be refreshed before login() method is called
* @run main/othervm RefreshKrb5Config * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock RefreshKrb5Config
*/ */
public class RefreshKrb5Config { public class RefreshKrb5Config {
......
...@@ -24,8 +24,8 @@ ...@@ -24,8 +24,8 @@
/* /*
* @test * @test
* @bug 7118809 8001326 * @bug 7118809 8001326
* @run main/othervm ReplayCacheTest jvm * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock ReplayCacheTest jvm
* @run main/othervm ReplayCacheTest dfl * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock ReplayCacheTest dfl
* @summary rcache deadlock * @summary rcache deadlock
*/ */
......
...@@ -27,7 +27,7 @@ ...@@ -27,7 +27,7 @@
* @summary More krb5 tests * @summary More krb5 tests
* @library ../../../../java/security/testlibrary/ * @library ../../../../java/security/testlibrary/
* @compile -XDignore.symbol.file ReplayCacheTestProc.java * @compile -XDignore.symbol.file ReplayCacheTestProc.java
* @run main/othervm/timeout=100 ReplayCacheTestProc * @run main/othervm/timeout=100 -Dsun.net.spi.nameservice.provider.1=ns,mock ReplayCacheTestProc
*/ */
import java.io.*; import java.io.*;
...@@ -277,6 +277,7 @@ public class ReplayCacheTestProc { ...@@ -277,6 +277,7 @@ public class ReplayCacheTestProc {
.prop("sun.security.jgss.native", "true") .prop("sun.security.jgss.native", "true")
.prop("javax.security.auth.useSubjectCredsOnly", "false") .prop("javax.security.auth.useSubjectCredsOnly", "false")
.prop("sun.security.nativegss.debug", "true") .prop("sun.security.nativegss.debug", "true")
.prop("sun.net.spi.nameservice.provider.1", "ns,mock")
.debug("N"+i) .debug("N"+i)
.start(); .start();
} }
...@@ -287,6 +288,7 @@ public class ReplayCacheTestProc { ...@@ -287,6 +288,7 @@ public class ReplayCacheTestProc {
.args("S"+i) .args("S"+i)
.prop("sun.security.krb5.rcache", "dfl") .prop("sun.security.krb5.rcache", "dfl")
.prop("java.io.tmpdir", cwd) .prop("java.io.tmpdir", cwd)
.prop("sun.net.spi.nameservice.provider.1", "ns,mock")
.start(); .start();
} }
// generates hash of authenticator inside ap-req inside initsectoken // generates hash of authenticator inside ap-req inside initsectoken
......
...@@ -26,8 +26,8 @@ ...@@ -26,8 +26,8 @@
* @bug 6355584 8044215 * @bug 6355584 8044215
* @summary Introduce constrained Kerberos delegation * @summary Introduce constrained Kerberos delegation
* @compile -XDignore.symbol.file S4U2proxy.java * @compile -XDignore.symbol.file S4U2proxy.java
* @run main/othervm S4U2proxy krb5 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock S4U2proxy krb5
* @run main/othervm S4U2proxy spnego * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock S4U2proxy spnego
*/ */
import java.util.Arrays; import java.util.Arrays;
......
...@@ -26,8 +26,8 @@ ...@@ -26,8 +26,8 @@
* @bug 6355584 * @bug 6355584
* @summary Introduce constrained Kerberos delegation * @summary Introduce constrained Kerberos delegation
* @compile -XDignore.symbol.file S4U2proxyGSS.java * @compile -XDignore.symbol.file S4U2proxyGSS.java
* @run main/othervm -Djavax.security.auth.useSubjectCredsOnly=false S4U2proxyGSS krb5 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -Djavax.security.auth.useSubjectCredsOnly=false S4U2proxyGSS krb5
* @run main/othervm -Djavax.security.auth.useSubjectCredsOnly=false S4U2proxyGSS spnego * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -Djavax.security.auth.useSubjectCredsOnly=false S4U2proxyGSS spnego
*/ */
import java.io.File; import java.io.File;
......
...@@ -26,13 +26,13 @@ ...@@ -26,13 +26,13 @@
* @bug 6355584 * @bug 6355584
* @summary Introduce constrained Kerberos delegation * @summary Introduce constrained Kerberos delegation
* @compile -XDignore.symbol.file S4U2self.java * @compile -XDignore.symbol.file S4U2self.java
* @run main/othervm -Dsun.security.krb5.debug=false S4U2self krb5 0 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -Dsun.security.krb5.debug=false S4U2self krb5 0
* @run main/othervm/fail -Dsun.security.krb5.debug=false S4U2self krb5 1 * @run main/othervm/fail -Dsun.net.spi.nameservice.provider.1=ns,mock -Dsun.security.krb5.debug=false S4U2self krb5 1
* @run main/othervm/fail -Dsun.security.krb5.debug=false S4U2self krb5 2 * @run main/othervm/fail -Dsun.net.spi.nameservice.provider.1=ns,mock -Dsun.security.krb5.debug=false S4U2self krb5 2
* @run main/othervm/fail -Dsun.security.krb5.debug=false S4U2self krb5 3 * @run main/othervm/fail -Dsun.net.spi.nameservice.provider.1=ns,mock -Dsun.security.krb5.debug=false S4U2self krb5 3
* @run main/othervm/fail -Dsun.security.krb5.debug=false S4U2self krb5 4 * @run main/othervm/fail -Dsun.net.spi.nameservice.provider.1=ns,mock -Dsun.security.krb5.debug=false S4U2self krb5 4
* @run main/othervm/fail -Dsun.security.krb5.debug=false S4U2self krb5 5 * @run main/othervm/fail -Dsun.net.spi.nameservice.provider.1=ns,mock -Dsun.security.krb5.debug=false S4U2self krb5 5
* @run main/othervm -Dsun.security.krb5.debug=false S4U2self spnego * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -Dsun.security.krb5.debug=false S4U2self spnego
*/ */
import java.util.Arrays; import java.util.Arrays;
......
...@@ -26,8 +26,8 @@ ...@@ -26,8 +26,8 @@
* @bug 6355584 * @bug 6355584
* @summary Introduce constrained Kerberos delegation * @summary Introduce constrained Kerberos delegation
* @compile -XDignore.symbol.file S4U2selfAsServer.java * @compile -XDignore.symbol.file S4U2selfAsServer.java
* @run main/othervm S4U2selfAsServer krb5 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock S4U2selfAsServer krb5
* @run main/othervm S4U2selfAsServer spnego * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock S4U2selfAsServer spnego
*/ */
import java.util.Arrays; import java.util.Arrays;
......
...@@ -26,8 +26,8 @@ ...@@ -26,8 +26,8 @@
* @bug 6355584 * @bug 6355584
* @summary Introduce constrained Kerberos delegation * @summary Introduce constrained Kerberos delegation
* @compile -XDignore.symbol.file S4U2selfAsServerGSS.java * @compile -XDignore.symbol.file S4U2selfAsServerGSS.java
* @run main/othervm -Djavax.security.auth.useSubjectCredsOnly=false S4U2selfAsServerGSS krb5 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -Djavax.security.auth.useSubjectCredsOnly=false S4U2selfAsServerGSS krb5
* @run main/othervm -Djavax.security.auth.useSubjectCredsOnly=false S4U2selfAsServerGSS spnego * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -Djavax.security.auth.useSubjectCredsOnly=false S4U2selfAsServerGSS spnego
*/ */
import java.io.File; import java.io.File;
......
...@@ -26,8 +26,8 @@ ...@@ -26,8 +26,8 @@
* @bug 6355584 * @bug 6355584
* @summary Introduce constrained Kerberos delegation * @summary Introduce constrained Kerberos delegation
* @compile -XDignore.symbol.file S4U2selfGSS.java * @compile -XDignore.symbol.file S4U2selfGSS.java
* @run main/othervm -Dsun.security.krb5.debug=false S4U2selfGSS krb5 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -Dsun.security.krb5.debug=false S4U2selfGSS krb5
* @run main/othervm -Dsun.security.krb5.debug=false S4U2selfGSS spnego * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -Dsun.security.krb5.debug=false S4U2selfGSS spnego
*/ */
import java.util.Arrays; import java.util.Arrays;
......
...@@ -26,7 +26,7 @@ ...@@ -26,7 +26,7 @@
* @bug 7040151 * @bug 7040151
* @summary SPNEGO GSS code does not parse tokens in accordance to RFC 2478 * @summary SPNEGO GSS code does not parse tokens in accordance to RFC 2478
* @compile -XDignore.symbol.file SPNEGO.java * @compile -XDignore.symbol.file SPNEGO.java
* @run main/othervm SPNEGO * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock SPNEGO
*/ */
import sun.security.jgss.GSSUtil; import sun.security.jgss.GSSUtil;
......
...@@ -26,17 +26,17 @@ ...@@ -26,17 +26,17 @@
* @bug 6894643 6913636 8005523 8025123 * @bug 6894643 6913636 8005523 8025123
* @summary Test JSSE Kerberos ciphersuite * @summary Test JSSE Kerberos ciphersuite
* @run main/othervm SSL TLS_KRB5_WITH_RC4_128_SHA * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock SSL TLS_KRB5_WITH_RC4_128_SHA
* @run main/othervm SSL TLS_KRB5_WITH_RC4_128_SHA unbound * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock SSL TLS_KRB5_WITH_RC4_128_SHA unbound
* @run main/othervm SSL TLS_KRB5_WITH_RC4_128_SHA unbound sni * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock SSL TLS_KRB5_WITH_RC4_128_SHA unbound sni
* @run main/othervm SSL TLS_KRB5_WITH_3DES_EDE_CBC_SHA * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock SSL TLS_KRB5_WITH_3DES_EDE_CBC_SHA
* @run main/othervm SSL TLS_KRB5_WITH_3DES_EDE_CBC_MD5 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock SSL TLS_KRB5_WITH_3DES_EDE_CBC_MD5
* @run main/othervm SSL TLS_KRB5_WITH_DES_CBC_SHA * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock SSL TLS_KRB5_WITH_DES_CBC_SHA
* @run main/othervm SSL TLS_KRB5_WITH_DES_CBC_MD5 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock SSL TLS_KRB5_WITH_DES_CBC_MD5
* @run main/othervm SSL TLS_KRB5_EXPORT_WITH_RC4_40_SHA * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock SSL TLS_KRB5_EXPORT_WITH_RC4_40_SHA
* @run main/othervm SSL TLS_KRB5_EXPORT_WITH_RC4_40_MD5 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock SSL TLS_KRB5_EXPORT_WITH_RC4_40_MD5
* @run main/othervm SSL TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock SSL TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
* @run main/othervm SSL TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock SSL TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
*/ */
import java.io.*; import java.io.*;
import java.security.Permission; import java.security.Permission;
......
...@@ -26,8 +26,8 @@ ...@@ -26,8 +26,8 @@
* @bug 7110803 * @bug 7110803
* @summary SASL service for multiple hostnames * @summary SASL service for multiple hostnames
* @compile -XDignore.symbol.file SaslBasic.java * @compile -XDignore.symbol.file SaslBasic.java
* @run main/othervm SaslBasic bound * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock SaslBasic bound
* @run main/othervm SaslBasic unbound * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock SaslBasic unbound
*/ */
import java.io.IOException; import java.io.IOException;
import java.util.Arrays; import java.util.Arrays;
......
...@@ -27,7 +27,7 @@ ...@@ -27,7 +27,7 @@
* @summary SASL: auth-conf negotiated, but unencrypted data is accepted, * @summary SASL: auth-conf negotiated, but unencrypted data is accepted,
* reset to unencrypt * reset to unencrypt
* @compile -XDignore.symbol.file SaslGSS.java * @compile -XDignore.symbol.file SaslGSS.java
* @run main/othervm SaslGSS * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock SaslGSS
*/ */
import javax.security.auth.callback.Callback; import javax.security.auth.callback.Callback;
......
...@@ -26,11 +26,11 @@ ...@@ -26,11 +26,11 @@
* @bug 8001104 * @bug 8001104
* @summary Unbound SASL service: the GSSAPI/krb5 mech * @summary Unbound SASL service: the GSSAPI/krb5 mech
* @compile -XDignore.symbol.file SaslUnbound.java * @compile -XDignore.symbol.file SaslUnbound.java
* @run main/othervm SaslUnbound 0 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock SaslUnbound 0
* @run main/othervm/fail SaslUnbound 1 * @run main/othervm/fail -Dsun.net.spi.nameservice.provider.1=ns,mock SaslUnbound 1
* @run main/othervm/fail SaslUnbound 2 * @run main/othervm/fail -Dsun.net.spi.nameservice.provider.1=ns,mock SaslUnbound 2
* @run main/othervm/fail SaslUnbound 3 * @run main/othervm/fail -Dsun.net.spi.nameservice.provider.1=ns,mock SaslUnbound 3
* @run main/othervm/fail SaslUnbound 4 * @run main/othervm/fail -Dsun.net.spi.nameservice.provider.1=ns,mock SaslUnbound 4
*/ */
import java.io.IOException; import java.io.IOException;
import java.util.Arrays; import java.util.Arrays;
......
...@@ -26,7 +26,7 @@ ...@@ -26,7 +26,7 @@
* @bug 8000653 * @bug 8000653
* @summary SPNEGO tests fail at context.getDelegCred().getRemainingInitLifetime(mechOid) * @summary SPNEGO tests fail at context.getDelegCred().getRemainingInitLifetime(mechOid)
* @compile -XDignore.symbol.file SpnegoLifeTime.java * @compile -XDignore.symbol.file SpnegoLifeTime.java
* @run main/othervm SpnegoLifeTime * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock SpnegoLifeTime
*/ */
import org.ietf.jgss.Oid; import org.ietf.jgss.Oid;
......
...@@ -24,7 +24,7 @@ ...@@ -24,7 +24,7 @@
/* /*
* @test * @test
* @bug 6815182 * @bug 6815182
* @run main/othervm SpnegoReqFlags * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock SpnegoReqFlags
* @summary GSSAPI/SPNEGO does not work with server using MIT Kerberos library * @summary GSSAPI/SPNEGO does not work with server using MIT Kerberos library
*/ */
......
...@@ -25,7 +25,7 @@ ...@@ -25,7 +25,7 @@
* @test * @test
* @bug 6952519 * @bug 6952519
* @compile -XDignore.symbol.file TcpTimeout.java * @compile -XDignore.symbol.file TcpTimeout.java
* @run main/othervm TcpTimeout * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock TcpTimeout
* @summary kdc_timeout is not being honoured when using TCP * @summary kdc_timeout is not being honoured when using TCP
*/ */
......
...@@ -24,7 +24,7 @@ ...@@ -24,7 +24,7 @@
/* /*
* @test * @test
* @bug 6895424 * @bug 6895424
* @run main/othervm Test5653 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock Test5653
* @summary RFC 5653 * @summary RFC 5653
*/ */
......
...@@ -26,7 +26,7 @@ ...@@ -26,7 +26,7 @@
* @bug 8178794 * @bug 8178794
* @summary krb5 client should ignore sname in incoming tickets * @summary krb5 client should ignore sname in incoming tickets
* @compile -XDignore.symbol.file TicketSName.java * @compile -XDignore.symbol.file TicketSName.java
* @run main/othervm -Dtest.kdc.diff.sname TicketSName * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -Dtest.kdc.diff.sname TicketSName
*/ */
import sun.security.jgss.GSSUtil; import sun.security.jgss.GSSUtil;
......
...@@ -26,11 +26,11 @@ ...@@ -26,11 +26,11 @@
* @bug 8005447 * @bug 8005447
* @summary default principal can act as anyone * @summary default principal can act as anyone
* @compile -XDignore.symbol.file TwoOrThree.java * @compile -XDignore.symbol.file TwoOrThree.java
* @run main/othervm TwoOrThree first first * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock TwoOrThree first first
* @run main/othervm/fail TwoOrThree first second * @run main/othervm/fail -Dsun.net.spi.nameservice.provider.1=ns,mock TwoOrThree first second
* @run main/othervm TwoOrThree - first * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock TwoOrThree - first
* @run main/othervm TwoOrThree - second * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock TwoOrThree - second
* @run main/othervm/fail TwoOrThree - third * @run main/othervm/fail -Dsun.net.spi.nameservice.provider.1=ns,mock TwoOrThree - third
*/ */
import java.nio.file.Files; import java.nio.file.Files;
......
...@@ -25,7 +25,7 @@ ...@@ -25,7 +25,7 @@
* @test * @test
* @bug 6894072 * @bug 6894072
* @compile -XDignore.symbol.file TwoPrinces.java * @compile -XDignore.symbol.file TwoPrinces.java
* @run main/othervm TwoPrinces * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock TwoPrinces
* @summary always refresh keytab * @summary always refresh keytab
*/ */
......
...@@ -26,7 +26,7 @@ ...@@ -26,7 +26,7 @@
* @bug 7152176 * @bug 7152176
* @summary More krb5 tests * @summary More krb5 tests
* @compile -XDignore.symbol.file TwoTab.java * @compile -XDignore.symbol.file TwoTab.java
* @run main/othervm TwoTab * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock TwoTab
*/ */
import java.io.File; import java.io.File;
......
...@@ -24,8 +24,8 @@ ...@@ -24,8 +24,8 @@
/* /*
* @test * @test
* @bug 4966382 8039132 * @bug 4966382 8039132
* @run main/othervm UdpTcp UDP * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock UdpTcp UDP
* @run main/othervm UdpTcp TCP * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock UdpTcp TCP
* @summary udp or tcp * @summary udp or tcp
*/ */
......
...@@ -34,9 +34,9 @@ import javax.security.auth.login.LoginException; ...@@ -34,9 +34,9 @@ import javax.security.auth.login.LoginException;
* @bug 8025123 * @bug 8025123
* @summary Checks if an unbound server can handle connections * @summary Checks if an unbound server can handle connections
* only for allowed service principals * only for allowed service principals
* @run main/othervm/java.security.policy=unbound.ssl.policy UnboundSSL * @run main/othervm/java.security.policy=unbound.ssl.policy -Dsun.net.spi.nameservice.provider.1=ns,mock UnboundSSL
* unbound.ssl.jaas.conf server_star * unbound.ssl.jaas.conf server_star
* @run main/othervm/java.security.policy=unbound.ssl.policy UnboundSSL * @run main/othervm/java.security.policy=unbound.ssl.policy -Dsun.net.spi.nameservice.provider.1=ns,mock UnboundSSL
* unbound.ssl.jaas.conf server_multiple_principals * unbound.ssl.jaas.conf server_multiple_principals
*/ */
public class UnboundSSL { public class UnboundSSL {
......
...@@ -33,9 +33,9 @@ import javax.security.auth.login.LoginException; ...@@ -33,9 +33,9 @@ import javax.security.auth.login.LoginException;
* @test * @test
* @bug 8025123 * @bug 8025123
* @summary Checks if an unbound server pick up a correct key from keytab * @summary Checks if an unbound server pick up a correct key from keytab
* @run main/othervm UnboundSSLMultipleKeys * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock UnboundSSLMultipleKeys
* unbound.ssl.jaas.conf server_star * unbound.ssl.jaas.conf server_star
* @run main/othervm UnboundSSLMultipleKeys * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock UnboundSSLMultipleKeys
* unbound.ssl.jaas.conf server_multiple_principals * unbound.ssl.jaas.conf server_multiple_principals
*/ */
public class UnboundSSLMultipleKeys { public class UnboundSSLMultipleKeys {
......
...@@ -33,9 +33,9 @@ import javax.security.auth.login.LoginException; ...@@ -33,9 +33,9 @@ import javax.security.auth.login.LoginException;
* @bug 8025123 * @bug 8025123
* @summary Checks if an unbound server uses a service principal * @summary Checks if an unbound server uses a service principal
* from sun.security.krb5.principal system property if specified * from sun.security.krb5.principal system property if specified
* @run main/othervm UnboundSSLPrincipalProperty * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock UnboundSSLPrincipalProperty
* unbound.ssl.jaas.conf server_star * unbound.ssl.jaas.conf server_star
* @run main/othervm UnboundSSLPrincipalProperty * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock UnboundSSLPrincipalProperty
* unbound.ssl.jaas.conf server_multiple_principals * unbound.ssl.jaas.conf server_multiple_principals
*/ */
public class UnboundSSLPrincipalProperty { public class UnboundSSLPrincipalProperty {
......
...@@ -26,14 +26,14 @@ ...@@ -26,14 +26,14 @@
* @bug 8001104 * @bug 8001104
* @summary Unbound SASL service: the GSSAPI/krb5 mech * @summary Unbound SASL service: the GSSAPI/krb5 mech
* @compile -XDignore.symbol.file UnboundService.java * @compile -XDignore.symbol.file UnboundService.java
* @run main/othervm UnboundService null null * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock UnboundService null null
* @run main/othervm UnboundService server/host.rabbit.hole null * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock UnboundService server/host.rabbit.hole null
* @run main/othervm UnboundService server/host.rabbit.hole@RABBIT.HOLE null * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock UnboundService server/host.rabbit.hole@RABBIT.HOLE null
* @run main/othervm/fail UnboundService backend/host.rabbit.hole null * @run main/othervm/fail -Dsun.net.spi.nameservice.provider.1=ns,mock UnboundService backend/host.rabbit.hole null
* @run main/othervm UnboundService null server@host.rabbit.hole * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock UnboundService null server@host.rabbit.hole
* @run main/othervm UnboundService server/host.rabbit.hole server@host.rabbit.hole * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock UnboundService server/host.rabbit.hole server@host.rabbit.hole
* @run main/othervm UnboundService server/host.rabbit.hole@RABBIT.HOLE server@host.rabbit.hole * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock UnboundService server/host.rabbit.hole@RABBIT.HOLE server@host.rabbit.hole
* @run main/othervm/fail UnboundService backend/host.rabbit.hole server@host.rabbit.hole * @run main/othervm/fail -Dsun.net.spi.nameservice.provider.1=ns,mock UnboundService backend/host.rabbit.hole server@host.rabbit.hole
*/ */
import java.io.File; import java.io.File;
......
...@@ -27,7 +27,7 @@ ...@@ -27,7 +27,7 @@
* @summary Krb5LoginModule shows NPE when both useTicketCache and storeKey * @summary Krb5LoginModule shows NPE when both useTicketCache and storeKey
* are set to true * are set to true
* @compile -XDignore.symbol.file UseCacheAndStoreKey.java * @compile -XDignore.symbol.file UseCacheAndStoreKey.java
* @run main/othervm UseCacheAndStoreKey * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock UseCacheAndStoreKey
*/ */
import java.io.FileOutputStream; import java.io.FileOutputStream;
......
...@@ -26,8 +26,8 @@ ...@@ -26,8 +26,8 @@
* @bug 6932525 6951366 6959292 * @bug 6932525 6951366 6959292
* @summary kerberos login failure on win2008 with AD set to win2000 compat mode * @summary kerberos login failure on win2008 with AD set to win2000 compat mode
* and cannot login if session key and preauth does not use the same etype * and cannot login if session key and preauth does not use the same etype
* @run main/othervm -D6932525 W83 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -D6932525 W83
* @run main/othervm -D6959292 W83 * @run main/othervm -Dsun.net.spi.nameservice.provider.1=ns,mock -D6959292 W83
*/ */
import com.sun.security.auth.module.Krb5LoginModule; import com.sun.security.auth.module.Krb5LoginModule;
import java.io.File; import java.io.File;
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册