Skip to content

Commit 136331b

Browse files
author
Sibabrata Sahoo
committed
8205653: test/jdk/sun/management/jmxremote/bootstrap/RmiRegistrySslTest.java and RmiSslBootstrapTest.sh fail with handshake_failure
Test failure due to unsupported DSA keys Reviewed-by: dfuchs, xuelei
1 parent da22bf8 commit 136331b

File tree

6 files changed

+11
-9
lines changed

6 files changed

+11
-9
lines changed

Diff for: test/jdk/ProblemList.txt

-3
Original file line numberDiff line numberDiff line change
@@ -540,9 +540,6 @@ java/io/pathNames/GeneralWin32.java 8180264 windows-
540540
com/sun/management/OperatingSystemMXBean/GetProcessCpuLoad.java 8030957 aix-all
541541
com/sun/management/OperatingSystemMXBean/GetSystemCpuLoad.java 8030957 aix-all
542542

543-
sun/management/jmxremote/bootstrap/RmiSslBootstrapTest.sh 8205653 generic-all
544-
sun/management/jmxremote/bootstrap/RmiRegistrySslTest.java 8205653 generic-all
545-
546543
############################################################################
547544

548545
# jdk_jmx
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
1-
com.sun.management.jmxremote.ssl.enabled.cipher.suites=SSL_RSA_WITH_RC4_128_SHA,SSL_RSA_WITH_RC4_128_MD5
2-
com.sun.management.jmxremote.ssl.enabled.protocols=SSLv2Hello,SSLv3,TLSv1
1+
com.sun.management.jmxremote.ssl.enabled.cipher.suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384
2+
com.sun.management.jmxremote.ssl.enabled.protocols=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2,TLSv1.3
33
com.sun.management.jmxremote.ssl.need.client.auth=true
44
com.sun.management.jmxremote.ssl.config.file=@TEST-SRC@/jmxremote_ssltest11_ok.ssl
55
com.sun.management.jmxremote.authenticate=false
6-
javax.rmi.ssl.client.enabledCipherSuites=SSL_RSA_WITH_RC4_128_SHA,SSL_RSA_WITH_RC4_128_MD5
6+
javax.rmi.ssl.client.enabledCipherSuites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
com.sun.management.jmxremote.ssl.enabled.cipher.suites=TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA
2+
com.sun.management.jmxremote.ssl.enabled.protocols=SSLv2Hello,SSLv3,TLSv1
3+
com.sun.management.jmxremote.ssl.need.client.auth=true
4+
com.sun.management.jmxremote.ssl.config.file=@TEST-SRC@/jmxremote_ssltest11_ok.ssl
5+
com.sun.management.jmxremote.authenticate=false
6+
javax.rmi.ssl.client.enabledCipherSuites=TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA
+2-3
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,10 @@
11
The trustore and keystore are to be generated as follows:
22

3-
1. keytool -genkey -alias duke -keystore keystore -validity 36500
3+
1. keytool -genkey -alias duke -keyalg RSA -keysize 2048 -validity 36500 -keystore keystore -storepass password
44
- use password 'password' for the keystore and key passwords
55
- leave all values at default
66
- the certificate validity will be 100 years (should be enough for now)
77
2. keytool -export -keystore keystore -alias duke -file duke.crt
8-
3. keytool -import -keystore truststore -alias duke -file duke.crt
8+
3. keytool -import -alias duke -file duke.crt -keystore truststore -storepass trustword
99
- use password 'trustword' for the keystore and key passwords
1010
- leave all values at default
11-
1.25 KB
Binary file not shown.
298 Bytes
Binary file not shown.

0 commit comments

Comments
 (0)