< prev index next >
test/jdk/sun/security/pkcs11/sslecc/JSSEClient.java
Print this page
@@ -1,7 +1,7 @@
/*
- * Copyright (c) 2002, 2017, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 2002, 2018, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation.
@@ -65,24 +65,24 @@
"Ignore in client side.");
return;
}
socket.setSoTimeout(CipherTest.TIMEOUT);
- socket.setEnabledCipherSuites(new String[] {params.cipherSuite});
- socket.setEnabledProtocols(new String[] {params.protocol});
+ socket.setEnabledCipherSuites(new String[] {params.cipherSuite.name()});
+ socket.setEnabledProtocols(new String[] {params.protocol.name});
InputStream in = socket.getInputStream();
OutputStream out = socket.getOutputStream();
sendRequest(in, out);
socket.close();
SSLSession session = socket.getSession();
session.invalidate();
String cipherSuite = session.getCipherSuite();
- if (params.cipherSuite.equals(cipherSuite) == false) {
+ if (!params.cipherSuite.name().equals(cipherSuite)) {
throw new Exception("Negotiated ciphersuite mismatch: " + cipherSuite + " != " + params.cipherSuite);
}
String protocol = session.getProtocol();
- if (params.protocol.equals(protocol) == false) {
+ if (!params.protocol.name.equals(protocol)) {
throw new Exception("Negotiated protocol mismatch: " + protocol + " != " + params.protocol);
}
if (cipherSuite.indexOf("DH_anon") == -1) {
session.getPeerCertificates();
}
< prev index next >