test/jdk/sun/security/lib/cacerts/VerifyCACerts.java
changeset 54657 bcea46e28de0
parent 54462 2020eaa9ca9f
child 54658 a86c5059749b
equal deleted inserted replaced
54656:3f72db799fbd 54657:bcea46e28de0
    23  */
    23  */
    24 
    24 
    25 /**
    25 /**
    26  * @test
    26  * @test
    27  * @bug 8189131 8198240 8191844 8189949 8191031 8196141 8204923 8195774 8199779
    27  * @bug 8189131 8198240 8191844 8189949 8191031 8196141 8204923 8195774 8199779
    28  *      8209452 8209506 8210432 8195793 8222089 8222133
    28  *      8209452 8209506 8210432 8195793 8216577 8222089 8222133
    29  * @summary Check root CA entries in cacerts file
    29  * @summary Check root CA entries in cacerts file
    30  */
    30  */
    31 import java.io.File;
    31 import java.io.File;
    32 import java.io.FileInputStream;
    32 import java.io.FileInputStream;
    33 import java.security.KeyStore;
    33 import java.security.KeyStore;
    40     private static final String CACERTS
    40     private static final String CACERTS
    41             = System.getProperty("java.home") + File.separator + "lib"
    41             = System.getProperty("java.home") + File.separator + "lib"
    42             + File.separator + "security" + File.separator + "cacerts";
    42             + File.separator + "security" + File.separator + "cacerts";
    43 
    43 
    44     // The numbers of certs now.
    44     // The numbers of certs now.
    45     private static final int COUNT = 92;
    45     private static final int COUNT = 93;
    46 
    46 
    47     // map of cert alias to SHA-256 fingerprint
    47     // map of cert alias to SHA-256 fingerprint
    48     private static final Map<String, String> FINGERPRINT_MAP
    48     private static final Map<String, String> FINGERPRINT_MAP
    49             = new HashMap<String, String>() {
    49             = new HashMap<String, String>() {
    50         {
    50         {
   230                     "BE:C9:49:11:C2:95:56:76:DB:6C:0A:55:09:86:D7:6E:3B:A0:05:66:7C:44:2C:97:62:B4:FB:B7:73:DE:22:8C");
   230                     "BE:C9:49:11:C2:95:56:76:DB:6C:0A:55:09:86:D7:6E:3B:A0:05:66:7C:44:2C:97:62:B4:FB:B7:73:DE:22:8C");
   231             put("globalsignr2ca [jdk]",
   231             put("globalsignr2ca [jdk]",
   232                     "CA:42:DD:41:74:5F:D0:B8:1E:B9:02:36:2C:F9:D8:BF:71:9D:A1:BD:1B:1E:FC:94:6F:5B:4C:99:F4:2C:1B:9E");
   232                     "CA:42:DD:41:74:5F:D0:B8:1E:B9:02:36:2C:F9:D8:BF:71:9D:A1:BD:1B:1E:FC:94:6F:5B:4C:99:F4:2C:1B:9E");
   233             put("teliasonerarootcav1 [jdk]",
   233             put("teliasonerarootcav1 [jdk]",
   234                     "DD:69:36:FE:21:F8:F0:77:C1:23:A1:A5:21:C1:22:24:F7:22:55:B7:3E:03:A7:26:06:93:E8:A2:4B:0F:A3:89");
   234                     "DD:69:36:FE:21:F8:F0:77:C1:23:A1:A5:21:C1:22:24:F7:22:55:B7:3E:03:A7:26:06:93:E8:A2:4B:0F:A3:89");
       
   235             put("globalsignrootcar6 [jdk]",
       
   236                     "2C:AB:EA:FE:37:D0:6C:A2:2A:BA:73:91:C0:03:3D:25:98:29:52:C4:53:64:73:49:76:3A:3A:B5:AD:6C:CF:69");
   235         }
   237         }
   236     };
   238     };
   237 
   239 
   238     // Exception list to 90 days expiry policy
   240     // Exception list to 90 days expiry policy
   239     // No error will be reported if certificate in this list expires
   241     // No error will be reported if certificate in this list expires