# HG changeset patch # User weijun # Date 1531837320 -28800 # Node ID 9502e3b9d4154f53be17392f909009280c9816df # Parent d379f06962cf57426f355591cad137f11350109c 8207318: KeyStore#getInstance(File, LoadStoreParameter) does not load the keystore Reviewed-by: mullan diff -r d379f06962cf -r 9502e3b9d415 src/java.base/share/classes/java/security/KeyStore.java --- a/src/java.base/share/classes/java/security/KeyStore.java Tue Jul 17 09:37:24 2018 -0400 +++ b/src/java.base/share/classes/java/security/KeyStore.java Tue Jul 17 22:22:00 2018 +0800 @@ -1807,6 +1807,7 @@ keystore.load(dataStream, password); } else { keystore.keyStoreSpi.engineLoad(dataStream, param); + keystore.initialized = true; } return keystore; } diff -r d379f06962cf -r 9502e3b9d415 test/jdk/java/security/KeyStore/ProbeKeystores.java --- a/test/jdk/java/security/KeyStore/ProbeKeystores.java Tue Jul 17 09:37:24 2018 -0400 +++ b/test/jdk/java/security/KeyStore/ProbeKeystores.java Tue Jul 17 22:22:00 2018 +0800 @@ -23,7 +23,7 @@ /* * @test - * @bug 8044445 8194307 + * @bug 8044445 8194307 8207318 * @summary test new methods from JEP-229: Create PKCS12 Keystores by Default */ @@ -180,7 +180,8 @@ throw new Exception("ERROR: expected a " + type + " keystore, " + "got a " + ks.getType() + " keystore instead"); } else { - System.out.println("Probed a " + type + " keystore named '" + file + "'"); + System.out.println("Probed a " + type + " keystore named '" + file + + "' with " + ks.size() + " entries"); } // Next try with an incorrect password @@ -197,7 +198,8 @@ throw new Exception("ERROR: expected a " + type + " keystore, " + "got a " + ks.getType() + " keystore instead"); } else { - System.out.println("Probed a " + type + " keystore named '" + file + "'"); + System.out.println("Probed a " + type + " keystore named '" + file + + "' with " + ks.size() + " entries"); } // Next try with an incorrect password within a LoadStoreParameter