1 /*
   2  * Copyright (c) 2009, 2016, Oracle and/or its affiliates. All rights reserved.
   3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
   4  *
   5  * This code is free software; you can redistribute it and/or modify it
   6  * under the terms of the GNU General Public License version 2 only, as
   7  * published by the Free Software Foundation.
   8  *
   9  * This code is distributed in the hope that it will be useful, but WITHOUT
  10  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  11  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
  12  * version 2 for more details (a copy is included in the LICENSE file that
  13  * accompanied this code).
  14  *
  15  * You should have received a copy of the GNU General Public License version
  16  * 2 along with this work; if not, write to the Free Software Foundation,
  17  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
  18  *
  19  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
  20  * or visit www.oracle.com if you need additional information or have any
  21  * questions.
  22  */
  23 
  24 //
  25 // SunJSSE does not support dynamic system properties, no way to re-use
  26 // system properties in samevm/agentvm mode.
  27 //
  28 
  29 /**
  30  * @test
  31  * @bug 6840752
  32  * @summary  Provide out-of-the-box support for ECC algorithms
  33  * @library ../pkcs11
  34  * @library ../pkcs11/ec
  35  * @library ../pkcs11/sslecc
  36  * @library ../../../java/security/testlibrary
  37  * @modules jdk.crypto.pkcs11/sun.security.pkcs11.wrapper
  38  * @compile -XDignore.symbol.file TestEC.java
  39  * @run main/othervm -Djdk.tls.namedGroups="secp256r1,sect193r1" TestEC

  40  */
  41 
  42 import java.security.NoSuchProviderException;
  43 import java.security.Provider;
  44 import java.security.Security;
  45 
  46 /*
  47  * Leverage the collection of EC tests used by PKCS11
  48  *
  49  * NOTE: the following 6 files were copied here from the PKCS11 EC Test area
  50  *       and must be kept in sync with the originals:
  51  *
  52  *           ../pkcs11/ec/p12passwords.txt
  53  *           ../pkcs11/ec/certs/sunlabscerts.pem
  54  *           ../pkcs11/ec/pkcs12/secp256r1server-secp384r1ca.p12
  55  *           ../pkcs11/ec/pkcs12/sect193r1server-rsa1024ca.p12
  56  *           ../pkcs11/sslecc/keystore
  57  *           ../pkcs11/sslecc/truststore
  58  */
  59 
  60 public class TestEC {
  61 
  62     /*
  63      * Turn on SSL debugging
  64      */
  65     private static final boolean debug = true;
  66 
  67     public static void main(String[] args) throws Exception {
  68         // reset security properties to make sure that the algorithms
  69         // and keys used in this test are not disabled.
  70         Security.setProperty("jdk.tls.disabledAlgorithms", "");
  71         Security.setProperty("jdk.certpath.disabledAlgorithms", "");
  72 
  73         if (debug) {
  74             System.setProperty("javax.net.debug", "all");
  75         }
  76 
  77         ProvidersSnapshot snapshot = ProvidersSnapshot.create();
  78         try {
  79             main0(args);
  80         } finally {
  81             snapshot.restore();
  82         }
  83     }
  84 
  85     public static void main0(String[] args) throws Exception {
  86         Provider p = Security.getProvider("SunEC");
  87 
  88         if (p == null) {
  89             throw new NoSuchProviderException("Can't get SunEC provider");
  90         }
  91 
  92         System.out.println("Running tests with " + p.getName() +
  93             " provider...\n");
  94         long start = System.currentTimeMillis();
  95 
  96         /*
  97          * The entry point used for each test is its instance method
  98          * called main (not its static method called main).
  99          */
 100         new TestECDH().main(p);
 101         new TestECDSA().main(p);
 102         new TestCurves().main(p);
 103         new TestKeyFactory().main(p);
 104         new TestECGenSpec().main(p);
 105         new ReadPKCS12().main(p);
 106         new ReadCertificates().main(p);
 107 
 108         // ClientJSSEServerJSSE fails on Solaris 11 when both SunEC and
 109         // SunPKCS11-Solaris providers are enabled.
 110         // Workaround:
 111         // Security.removeProvider("SunPKCS11-Solaris");
 112         new ClientJSSEServerJSSE().main(p);
 113 
 114         long stop = System.currentTimeMillis();
 115         System.out.println("\nCompleted tests with " + p.getName() +
 116             " provider (" + ((stop - start) / 1000.0) + " seconds).");
 117     }
 118 }
--- EOF ---