--- old/test/jdk/sun/security/pkcs11/Signature/TestRSAKeyLength.java 2020-05-20 18:07:44.242987587 -0700 +++ new/test/jdk/sun/security/pkcs11/Signature/TestRSAKeyLength.java 2020-05-20 18:07:43.866980367 -0700 @@ -1,5 +1,5 @@ /* - * Copyright (c) 2010, 2018, Oracle and/or its affiliates. All rights reserved. + * Copyright (c) 2010, 2020, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it @@ -50,21 +50,6 @@ @Override public void main(Provider p) throws Exception { - /* - * Use Solaris SPARC 11.2 or later to avoid an intermittent failure - * when running SunPKCS11-Solaris (8044554) - */ - if (p.getName().equals("SunPKCS11-Solaris") && - props.getProperty("os.name").equals("SunOS") && - props.getProperty("os.arch").equals("sparcv9") && - props.getProperty("os.version").compareTo("5.11") <= 0 && - getDistro().compareTo("11.2") < 0) { - - System.out.println("SunPKCS11-Solaris provider requires " + - "Solaris SPARC 11.2 or later, skipping"); - return; - } - boolean isValidKeyLength[] = { true, true, true, false, false }; String algos[] = { "SHA1withRSA", "SHA224withRSA", "SHA256withRSA", "SHA384withRSA", "SHA512withRSA" };