RFR 8221271: sun/security/pkcs11/tls/tls12/TestTLS12.java test failed

Xuelei Fan xuelei.fan at oracle.com
Fri Apr 19 19:33:57 UTC 2019


On 4/19/2019 9:42 AM, Martin Balao wrote:
> Hi Xuelei,
> 
> Thanks for your review.
> 
> Can we remove this test from the "test/jdk/ProblemList.txt" blacklist?
> 
Sure.

Xuelei

> Webrev.01 does so:
> 
>   * http://cr.openjdk.java.net/~mbalao/webrevs/8221271/8221271.webrev.01/
> 
> I've tested this on jdk-submit and all tests pass.
> 
> Thanks,
> Martin.-
> 
> 
> 
> On 4/18/19 7:42 PM, Xuelei Fan wrote:
>> Hi Martin,
>>
>> Good catch of the bug!  Looks fine to me.
>>
>> Thanks,
>> Xuelei
>>
>> On 4/18/2019 10:13 AM, Martin Balao wrote:
>>> Hi Xuelei,
>>>
>>> Can I have a review for 8221271 [1]?
>>>
>>> Webrev.00:
>>>
>>>    * http://cr.openjdk.java.net/~mbalao/webrevs/8221271/8221271.webrev.00/
>>>
>>> I'm proposing the following changes:
>>>
>>>    * RSACipher.java
>>>     * Minor bug that is triggered only when "key" is not a RSAPublicKey or
>>> a RSAPrivateKey (i.e.: it can be a PKCS8Key). The whole point of having
>>> "rsaKey" variable is converting the key.
>>>      * TestTLS12 triggered this bug in my Windows setup
>>>
>>>    * TestTLS12.java
>>>     * jdk.tls.useExtendedMasterSecret is read by SSLConfiguration only in
>>> initialization time and has to be false because the mechanism is
>>> currently not supported by SunPKCS11 crypto provider. Setting it in run
>>> time may have no effect (depending on when SSLConfiguration is
>>> initialized). That's why the test was failing on some environments.
>>>     * Keys must be of PrivateKey and PublicKey types. Depending on the JKS
>>> keystore implementation, their subtype might be RSAPrivateKey,
>>> RSAPublicKey, PKCS8Key or a different one.
>>>
>>> Thanks,
>>> Martin.-
>>>
>>> -- 
>>> [1] - https://bugs.openjdk.java.net/browse/JDK-8221271
>>>
> 



More information about the security-dev mailing list