afu8u/jdk/test/sun/security/pkcs11
Martin Balao 6f136c53bc 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
TLS v1.2 algorithms for key and MAC derivation added to SunPKCS11 crypto provider. 8210912 fix is included as part of this changeset.

Reviewed-by: valeriep
2018-10-31 17:04:47 -03:00
..
Cipher
Config 8187023: Cannot read pkcs11 config file in UTF-16 environment 2017-10-06 21:25:40 -07:00
KeyAgreement 8185292: Stricter key generation 2017-11-04 17:23:38 -07:00
KeyGenerator
KeyPairGenerator 8190449: sun/security/pkcs11/KeyPairGenerator/TestDH2048.java fails on Solaris x64 5.10 2017-11-07 17:30:51 +00:00
KeyStore
Mac
MessageDigest
Provider
Secmod 8048622: Enhance tests for PKCS11 keystores with NSS 2016-05-26 01:30:40 -07:00
SecureRandom
Serialize
Signature
ec 8051972: sun/security/pkcs11/ec/ReadCertificates.java fails intermittently 2018-02-07 17:11:24 -08:00
fips 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider 2018-10-31 17:04:47 -03:00
nss
rsa 8129560: TestKeyPairGenerator.java fails on Solaris because private exponent needs to comply with FIPS 186-4 2018-10-22 15:20:49 +00:00
sslecc 8148516: Improve the default strength of EC in JDK 2016-09-19 11:44:50 +01:00
tls
PKCS11Test.java 8186098: sun/security/pkcs11/KeyStore/SecretKeysBasic.sh failed due to libnss3 version cannot be parsed 2018-10-23 11:29:55 -07:00
README
SampleTest.java
SecmodTest.java

README

This README is to keep a list facts and known workaround for the pkcs11 java tests
perform as a result of bugs or features in NSS or other pkcs11 libraries.

- NSS ECC None/Basic/Extended
The tests detect the NSS library support for Elliptic Curves as to not
report incorrect failures.  PKCS11 reports back CKR_DOMAIN_PARAMS_INVALID
when the curve is not supported.

- Default libsoftokn3.so
By default PKCS11Test.java will look for libsoftokn3.so.  There are a number of
tests, particularly in Secmod, that need libnss3.so.  The method useNSS() in
PKCS11test.java is to change the search and version checking to libnss3.

ECC Basic supports is secp256r1, secp384r1, and secp521r1.

- A bug in NSS 3.12 (Mozilla bug 471665) causes AES key lengths to be
read incorrectly. KeyStore/SecretKeysBasic.java tiggers this bug and
knows to avoid it.

- A number of EC tests fail because of a DER bug in NSS 3.11.  The best guess
is Mozilla bug 480280.  Those tests that abort execution with a PASS result
are:  TestECDH2, TestECDSA, TestECDSA2 and TestECGenSpec.