< prev index next >
test/jdk/sun/security/jca/PreferredProviderTest.java
Print this page
rev 59383 : [mq]: final
@@ -1,7 +1,7 @@
/*
- * Copyright (c) 2015, 2016, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 2015, 2020, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation.
@@ -44,91 +44,22 @@
public void RunTest(String type, String os)
throws NoSuchAlgorithmException, NoSuchPaddingException {
String actualProvider = null;
- boolean solaris = os.contains("sun");
String preferredProp
= "AES/GCM/NoPadding:SunJCE, MessageDigest.SHA-256:SUN";
System.out.printf("%nExecuting test for the platform '%s'%n", os);
- if (!solaris) {
- //For other platform it will try to set the preferred algorithm and
- //Provider and verify the usage of it.
- Security.setProperty(
- "jdk.security.provider.preferred", preferredProp);
- verifyPreferredProviderProperty(os, type, preferredProp);
- verifyDigestProvider(os, type, Arrays.asList(
- new DataTuple("SHA-256", "SUN")));
- } else {
- //Solaris has different providers that support the same algorithm
- //which makes for better testing.
- switch (type) {
- case "sparcv9":
- preferredProp = "AES:SunJCE, SHA1:SUN, Group.SHA2:SUN, " +
- "HmacSHA1:SunJCE, Group.HmacSHA2:SunJCE";
+ // Try to set the preferred algorithm and Provider and verify
+ // the usage of it.
Security.setProperty(
"jdk.security.provider.preferred", preferredProp);
verifyPreferredProviderProperty(os, type, preferredProp);
verifyDigestProvider(os, type, Arrays.asList(
- new DataTuple("SHA1", "SUN"),
- new DataTuple("SHA-1", "SUN"),
- new DataTuple("SHA-224", "SUN"),
- new DataTuple("SHA-256", "SUN"),
- new DataTuple("SHA-384", "SUN"),
- new DataTuple("SHA-512", "SUN"),
- new DataTuple("SHA-512/224", "SUN"),
- new DataTuple("SHA-512/256", "SUN")));
-
- verifyMacProvider(os, type, Arrays.asList(
- new DataTuple("HmacSHA1", "SunJCE"),
- new DataTuple("HmacSHA224", "SunJCE"),
- new DataTuple("HmacSHA256", "SunJCE"),
- new DataTuple("HmacSHA384", "SunJCE"),
- new DataTuple("HmacSHA512", "SunJCE")));
- break;
- case "amd64":
- preferredProp = "AES:SunJCE, SHA1:SUN, Group.SHA2:SUN, " +
- "HmacSHA1:SunJCE, Group.HmacSHA2:SunJCE, " +
- "RSA:SunRsaSign, SHA1withRSA:SunRsaSign, " +
- "Group.SHA2RSA:SunRsaSign";
- Security.setProperty(
- "jdk.security.provider.preferred", preferredProp);
- verifyPreferredProviderProperty(os, type, preferredProp);
-
- verifyKeyFactoryProvider(os, type, Arrays.asList(
- new DataTuple("RSA", "SunRsaSign")));
-
- verifyDigestProvider(os, type, Arrays.asList(
- new DataTuple("SHA1", "SUN"),
- new DataTuple("SHA-1", "SUN"),
- new DataTuple("SHA-224", "SUN"),
- new DataTuple("SHA-256", "SUN"),
- new DataTuple("SHA-384", "SUN"),
- new DataTuple("SHA-512", "SUN"),
- new DataTuple("SHA-512/224", "SUN"),
- new DataTuple("SHA-512/256", "SUN")));
-
- verifyMacProvider(os, type, Arrays.asList(
- new DataTuple("HmacSHA1", "SunJCE"),
- new DataTuple("HmacSHA224", "SunJCE"),
- new DataTuple("HmacSHA256", "SunJCE"),
- new DataTuple("HmacSHA384", "SunJCE"),
- new DataTuple("HmacSHA512", "SunJCE")));
-
- verifySignatureProvider(os, type, Arrays.asList(
- new DataTuple("SHA1withRSA", "SunRsaSign"),
- new DataTuple("SHA224withRSA", "SunRsaSign"),
- new DataTuple("SHA256withRSA", "SunRsaSign"),
- new DataTuple("SHA384withRSA", "SunRsaSign"),
- new DataTuple("SHA512withRSA", "SunRsaSign")));
- break;
- }
- verifyDigestProvider(os, type, Arrays.asList(
- new DataTuple("MD5", "OracleUcrypto")));
- }
+ new DataTuple("SHA-256", "SUN")));
Cipher cipher = Cipher.getInstance("AES/GCM/NoPadding");
actualProvider = cipher.getProvider().getName();
if (!actualProvider.equals("SunJCE")) {
throw new RuntimeException(String.format("Test Failed:Got wrong "
< prev index next >