jdk/test/sun/security/pkcs11/PKCS11Test.java
author darcy
Wed, 29 Apr 2015 10:25:53 -0700
changeset 30046 cf2c86e1819e
parent 28403 02b91a87c4dd
child 31270 e6470b24700d
permissions -rw-r--r--
8078334: Mark regression tests using randomness Reviewed-by: xuelei, alanb
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     1
/*
24629
97bddac495b7 8044038: Security tests fail on 32 bit linux platform
vinnie
parents: 21977
diff changeset
     2
 * Copyright (c) 2003, 2014, Oracle and/or its affiliates. All rights reserved.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     3
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
90ce3da70b43 Initial load
duke
parents:
diff changeset
     4
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
     5
 * This code is free software; you can redistribute it and/or modify it
90ce3da70b43 Initial load
duke
parents:
diff changeset
     6
 * under the terms of the GNU General Public License version 2 only, as
90ce3da70b43 Initial load
duke
parents:
diff changeset
     7
 * published by the Free Software Foundation.
90ce3da70b43 Initial load
duke
parents:
diff changeset
     8
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
     9
 * This code is distributed in the hope that it will be useful, but WITHOUT
90ce3da70b43 Initial load
duke
parents:
diff changeset
    10
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
90ce3da70b43 Initial load
duke
parents:
diff changeset
    11
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
90ce3da70b43 Initial load
duke
parents:
diff changeset
    12
 * version 2 for more details (a copy is included in the LICENSE file that
90ce3da70b43 Initial load
duke
parents:
diff changeset
    13
 * accompanied this code).
90ce3da70b43 Initial load
duke
parents:
diff changeset
    14
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    15
 * You should have received a copy of the GNU General Public License version
90ce3da70b43 Initial load
duke
parents:
diff changeset
    16
 * 2 along with this work; if not, write to the Free Software Foundation,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    17
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    18
 *
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 2
diff changeset
    19
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 2
diff changeset
    20
 * or visit www.oracle.com if you need additional information or have any
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 2
diff changeset
    21
 * questions.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    22
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    23
90ce3da70b43 Initial load
duke
parents:
diff changeset
    24
90ce3da70b43 Initial load
duke
parents:
diff changeset
    25
// common infrastructure for SunPKCS11 tests
90ce3da70b43 Initial load
duke
parents:
diff changeset
    26
90ce3da70b43 Initial load
duke
parents:
diff changeset
    27
import java.io.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    28
import java.util.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    29
import java.lang.reflect.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    30
90ce3da70b43 Initial load
duke
parents:
diff changeset
    31
import java.security.*;
21977
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
    32
import java.security.spec.ECGenParameterSpec;
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
    33
import java.security.spec.ECParameterSpec;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    34
90ce3da70b43 Initial load
duke
parents:
diff changeset
    35
public abstract class PKCS11Test {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    36
90ce3da70b43 Initial load
duke
parents:
diff changeset
    37
    // directory of the test source
90ce3da70b43 Initial load
duke
parents:
diff changeset
    38
    static final String BASE = System.getProperty("test.src", ".");
90ce3da70b43 Initial load
duke
parents:
diff changeset
    39
90ce3da70b43 Initial load
duke
parents:
diff changeset
    40
    static final char SEP = File.separatorChar;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    41
90ce3da70b43 Initial load
duke
parents:
diff changeset
    42
    private final static String REL_CLOSED = "../../../../closed/sun/security/pkcs11".replace('/', SEP);
90ce3da70b43 Initial load
duke
parents:
diff changeset
    43
90ce3da70b43 Initial load
duke
parents:
diff changeset
    44
    // directory corresponding to BASE in the /closed hierarchy
90ce3da70b43 Initial load
duke
parents:
diff changeset
    45
    static final String CLOSED_BASE;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    46
90ce3da70b43 Initial load
duke
parents:
diff changeset
    47
    static {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    48
        // hack
90ce3da70b43 Initial load
duke
parents:
diff changeset
    49
        String absBase = new File(BASE).getAbsolutePath();
90ce3da70b43 Initial load
duke
parents:
diff changeset
    50
        int k = absBase.indexOf(SEP + "test" + SEP + "sun" + SEP);
90ce3da70b43 Initial load
duke
parents:
diff changeset
    51
        if (k < 0) k = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    52
        String p1 = absBase.substring(0, k + 6);
90ce3da70b43 Initial load
duke
parents:
diff changeset
    53
        String p2 = absBase.substring(k + 5);
90ce3da70b43 Initial load
duke
parents:
diff changeset
    54
        CLOSED_BASE = p1 + "closed" + p2;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    55
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
    56
90ce3da70b43 Initial load
duke
parents:
diff changeset
    57
    static String NSPR_PREFIX = "";
90ce3da70b43 Initial load
duke
parents:
diff changeset
    58
19067
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
    59
    // NSS version info
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
    60
    public static enum ECCState { None, Basic, Extended };
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
    61
    static double nss_version = -1;
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
    62
    static ECCState nss_ecc_status = ECCState.Extended;
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
    63
19066
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
    64
    // The NSS library we need to search for in getNSSLibDir()
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
    65
    // Default is "libsoftokn3.so", listed as "softokn3"
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
    66
    // The other is "libnss3.so", listed as "nss3".
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
    67
    static String nss_library = "softokn3";
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
    68
24863
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
    69
    // NSS versions of each library.  It is simplier to keep nss_version
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
    70
    // for quick checking for generic testing than many if-else statements.
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
    71
    static double softoken3_version = -1;
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
    72
    static double nss3_version = -1;
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
    73
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    74
    static Provider getSunPKCS11(String config) throws Exception {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    75
        Class clazz = Class.forName("sun.security.pkcs11.SunPKCS11");
90ce3da70b43 Initial load
duke
parents:
diff changeset
    76
        Constructor cons = clazz.getConstructor(new Class[] {String.class});
90ce3da70b43 Initial load
duke
parents:
diff changeset
    77
        Object obj = cons.newInstance(new Object[] {config});
90ce3da70b43 Initial load
duke
parents:
diff changeset
    78
        return (Provider)obj;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    79
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
    80
90ce3da70b43 Initial load
duke
parents:
diff changeset
    81
    public abstract void main(Provider p) throws Exception;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    82
90ce3da70b43 Initial load
duke
parents:
diff changeset
    83
    private void premain(Provider p) throws Exception {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    84
        long start = System.currentTimeMillis();
90ce3da70b43 Initial load
duke
parents:
diff changeset
    85
        System.out.println("Running test with provider " + p.getName() + "...");
90ce3da70b43 Initial load
duke
parents:
diff changeset
    86
        main(p);
90ce3da70b43 Initial load
duke
parents:
diff changeset
    87
        long stop = System.currentTimeMillis();
90ce3da70b43 Initial load
duke
parents:
diff changeset
    88
        System.out.println("Completed test with provider " + p.getName() + " (" + (stop - start) + " ms).");
90ce3da70b43 Initial load
duke
parents:
diff changeset
    89
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
    90
90ce3da70b43 Initial load
duke
parents:
diff changeset
    91
    public static void main(PKCS11Test test) throws Exception {
10328
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
    92
        Provider[] oldProviders = Security.getProviders();
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
    93
        try {
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
    94
            System.out.println("Beginning test run " + test.getClass().getName() + "...");
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
    95
            testDefault(test);
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
    96
            testNSS(test);
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
    97
            testDeimos(test);
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
    98
        } finally {
19066
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
    99
            // NOTE: Do not place a 'return' in any finally block
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
   100
            // as it will suppress exceptions and hide test failures.
10328
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   101
            Provider[] newProviders = Security.getProviders();
19066
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
   102
            boolean found = true;
10328
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   103
            // Do not restore providers if nothing changed. This is especailly
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   104
            // useful for ./Provider/Login.sh, where a SecurityManager exists.
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   105
            if (oldProviders.length == newProviders.length) {
19066
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
   106
                found = false;
10328
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   107
                for (int i = 0; i<oldProviders.length; i++) {
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   108
                    if (oldProviders[i] != newProviders[i]) {
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   109
                        found = true;
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   110
                        break;
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   111
                    }
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   112
                }
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   113
            }
19066
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
   114
            if (found) {
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
   115
                for (Provider p: newProviders) {
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
   116
                    Security.removeProvider(p.getName());
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
   117
                }
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
   118
                for (Provider p: oldProviders) {
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
   119
                    Security.addProvider(p);
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
   120
                }
10328
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   121
            }
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   122
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   123
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   124
90ce3da70b43 Initial load
duke
parents:
diff changeset
   125
    public static void testDeimos(PKCS11Test test) throws Exception {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   126
        if (new File("/opt/SUNWconn/lib/libpkcs11.so").isFile() == false ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   127
            "true".equals(System.getProperty("NO_DEIMOS"))) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   128
            return;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   129
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   130
        String base = getBase();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   131
        String p11config = base + SEP + "nss" + SEP + "p11-deimos.txt";
90ce3da70b43 Initial load
duke
parents:
diff changeset
   132
        Provider p = getSunPKCS11(p11config);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   133
        test.premain(p);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   134
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   135
90ce3da70b43 Initial load
duke
parents:
diff changeset
   136
    public static void testDefault(PKCS11Test test) throws Exception {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   137
        // run test for default configured PKCS11 providers (if any)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   138
90ce3da70b43 Initial load
duke
parents:
diff changeset
   139
        if ("true".equals(System.getProperty("NO_DEFAULT"))) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   140
            return;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   141
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   142
90ce3da70b43 Initial load
duke
parents:
diff changeset
   143
        Provider[] providers = Security.getProviders();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   144
        for (int i = 0; i < providers.length; i++) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   145
            Provider p = providers[i];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   146
            if (p.getName().startsWith("SunPKCS11-")) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   147
                test.premain(p);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   148
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   149
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   150
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   151
90ce3da70b43 Initial load
duke
parents:
diff changeset
   152
    private static String PKCS11_BASE;
12294
f313586fc3cc 7152582: PKCS11 tests should use the NSS libraries available in the OS
vinnie
parents: 12042
diff changeset
   153
    static {
f313586fc3cc 7152582: PKCS11 tests should use the NSS libraries available in the OS
vinnie
parents: 12042
diff changeset
   154
        try {
f313586fc3cc 7152582: PKCS11 tests should use the NSS libraries available in the OS
vinnie
parents: 12042
diff changeset
   155
            PKCS11_BASE = getBase();
f313586fc3cc 7152582: PKCS11 tests should use the NSS libraries available in the OS
vinnie
parents: 12042
diff changeset
   156
        } catch (Exception e) {
f313586fc3cc 7152582: PKCS11 tests should use the NSS libraries available in the OS
vinnie
parents: 12042
diff changeset
   157
            // ignore
f313586fc3cc 7152582: PKCS11 tests should use the NSS libraries available in the OS
vinnie
parents: 12042
diff changeset
   158
        }
f313586fc3cc 7152582: PKCS11 tests should use the NSS libraries available in the OS
vinnie
parents: 12042
diff changeset
   159
    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   160
90ce3da70b43 Initial load
duke
parents:
diff changeset
   161
    private final static String PKCS11_REL_PATH = "sun/security/pkcs11";
90ce3da70b43 Initial load
duke
parents:
diff changeset
   162
90ce3da70b43 Initial load
duke
parents:
diff changeset
   163
    public static String getBase() throws Exception {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   164
        if (PKCS11_BASE != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   165
            return PKCS11_BASE;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   166
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   167
        File cwd = new File(System.getProperty("test.src", ".")).getCanonicalFile();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   168
        while (true) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   169
            File file = new File(cwd, "TEST.ROOT");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   170
            if (file.isFile()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   171
                break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   172
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   173
            cwd = cwd.getParentFile();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   174
            if (cwd == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   175
                throw new Exception("Test root directory not found");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   176
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   177
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   178
        PKCS11_BASE = new File(cwd, PKCS11_REL_PATH.replace('/', SEP)).getAbsolutePath();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   179
        return PKCS11_BASE;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   180
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   181
90ce3da70b43 Initial load
duke
parents:
diff changeset
   182
    public static String getNSSLibDir() throws Exception {
24863
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   183
        return getNSSLibDir(nss_library);
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   184
    }
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   185
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   186
    static String getNSSLibDir(String library) throws Exception {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   187
        Properties props = System.getProperties();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   188
        String osName = props.getProperty("os.name");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   189
        if (osName.startsWith("Win")) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   190
            osName = "Windows";
90ce3da70b43 Initial load
duke
parents:
diff changeset
   191
            NSPR_PREFIX = "lib";
26958
cb5cbde6e7a4 8059627: Enable PKCS11 tests on Mac
vinnie
parents: 24863
diff changeset
   192
        } else if (osName.equals("Mac OS X")) {
cb5cbde6e7a4 8059627: Enable PKCS11 tests on Mac
vinnie
parents: 24863
diff changeset
   193
            osName = "MacOSX";
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   194
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   195
        String osid = osName + "-"
90ce3da70b43 Initial load
duke
parents:
diff changeset
   196
                + props.getProperty("os.arch") + "-" + props.getProperty("sun.arch.data.model");
13565
6298d600104f 7190945: pkcs11 problem loading NSS libs on Ubuntu
vinnie
parents: 13250
diff changeset
   197
        String[] nssLibDirs = osMap.get(osid);
6298d600104f 7190945: pkcs11 problem loading NSS libs on Ubuntu
vinnie
parents: 13250
diff changeset
   198
        if (nssLibDirs == null) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   199
            System.out.println("Unsupported OS, skipping: " + osid);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   200
            return null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   201
        }
13565
6298d600104f 7190945: pkcs11 problem loading NSS libs on Ubuntu
vinnie
parents: 13250
diff changeset
   202
        if (nssLibDirs.length == 0) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   203
            System.out.println("NSS not supported on this platform, skipping test");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   204
            return null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   205
        }
13565
6298d600104f 7190945: pkcs11 problem loading NSS libs on Ubuntu
vinnie
parents: 13250
diff changeset
   206
        String nssLibDir = null;
6298d600104f 7190945: pkcs11 problem loading NSS libs on Ubuntu
vinnie
parents: 13250
diff changeset
   207
        for (String dir : nssLibDirs) {
19066
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
   208
            if (new File(dir).exists() &&
24863
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   209
                new File(dir + System.mapLibraryName(library)).exists()) {
13565
6298d600104f 7190945: pkcs11 problem loading NSS libs on Ubuntu
vinnie
parents: 13250
diff changeset
   210
                nssLibDir = dir;
6298d600104f 7190945: pkcs11 problem loading NSS libs on Ubuntu
vinnie
parents: 13250
diff changeset
   211
                System.setProperty("pkcs11test.nss.libdir", nssLibDir);
6298d600104f 7190945: pkcs11 problem loading NSS libs on Ubuntu
vinnie
parents: 13250
diff changeset
   212
                break;
6298d600104f 7190945: pkcs11 problem loading NSS libs on Ubuntu
vinnie
parents: 13250
diff changeset
   213
            }
6298d600104f 7190945: pkcs11 problem loading NSS libs on Ubuntu
vinnie
parents: 13250
diff changeset
   214
        }
12294
f313586fc3cc 7152582: PKCS11 tests should use the NSS libraries available in the OS
vinnie
parents: 12042
diff changeset
   215
        return nssLibDir;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   216
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   217
10328
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   218
    protected static void safeReload(String lib) throws Exception {
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   219
        try {
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   220
            System.load(lib);
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   221
        } catch (UnsatisfiedLinkError e) {
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   222
            if (e.getMessage().contains("already loaded")) {
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   223
                return;
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   224
            }
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   225
        }
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   226
    }
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   227
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   228
    static boolean loadNSPR(String libdir) throws Exception {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   229
        // load NSS softoken dependencies in advance to avoid resolver issues
10328
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   230
        safeReload(libdir + System.mapLibraryName(NSPR_PREFIX + "nspr4"));
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   231
        safeReload(libdir + System.mapLibraryName(NSPR_PREFIX + "plc4"));
06c93c42bca0 7055363: jdk_security3 test target cleanup
weijun
parents: 5506
diff changeset
   232
        safeReload(libdir + System.mapLibraryName(NSPR_PREFIX + "plds4"));
12294
f313586fc3cc 7152582: PKCS11 tests should use the NSS libraries available in the OS
vinnie
parents: 12042
diff changeset
   233
        safeReload(libdir + System.mapLibraryName("sqlite3"));
f313586fc3cc 7152582: PKCS11 tests should use the NSS libraries available in the OS
vinnie
parents: 12042
diff changeset
   234
        safeReload(libdir + System.mapLibraryName("nssutil3"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   235
        return true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   236
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   237
19067
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   238
    // Check the provider being used is NSS
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   239
    public static boolean isNSS(Provider p) {
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   240
        return p.getName().toUpperCase().equals("SUNPKCS11-NSS");
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   241
    }
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   242
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   243
    static double getNSSVersion() {
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   244
        if (nss_version == -1)
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   245
            getNSSInfo();
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   246
        return nss_version;
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   247
    }
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   248
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   249
    static ECCState getNSSECC() {
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   250
        if (nss_version == -1)
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   251
            getNSSInfo();
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   252
        return nss_ecc_status;
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   253
    }
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   254
24863
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   255
    public static double getLibsoftokn3Version() {
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   256
        if (softoken3_version == -1)
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   257
            return getNSSInfo("softokn3");
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   258
        return softoken3_version;
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   259
    }
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   260
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   261
    public static double getLibnss3Version() {
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   262
        if (nss3_version == -1)
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   263
            return getNSSInfo("nss3");
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   264
        return nss3_version;
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   265
    }
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   266
19067
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   267
    /* Read the library to find out the verison */
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   268
    static void getNSSInfo() {
24863
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   269
        getNSSInfo(nss_library);
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   270
    }
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   271
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   272
    static double getNSSInfo(String library) {
19067
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   273
        String nssHeader = "$Header: NSS";
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   274
        boolean found = false;
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   275
        String s = null;
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   276
        int i = 0;
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   277
        String libfile = "";
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   278
24863
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   279
        if (library.compareTo("softokn3") == 0 && softoken3_version > -1)
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   280
            return softoken3_version;
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   281
        if (library.compareTo("nss3") == 0 && nss3_version > -1)
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   282
            return nss3_version;
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   283
19067
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   284
        try {
24863
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   285
            libfile = getNSSLibDir() + System.mapLibraryName(library);
19067
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   286
            FileInputStream is = new FileInputStream(libfile);
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   287
            byte[] data = new byte[1000];
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   288
            int read = 0;
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   289
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   290
            while (is.available() > 0) {
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   291
                if (read == 0) {
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   292
                    read = is.read(data, 0, 1000);
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   293
                } else {
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   294
                    // Prepend last 100 bytes in case the header was split
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   295
                    // between the reads.
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   296
                    System.arraycopy(data, 900, data, 0, 100);
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   297
                    read = 100 + is.read(data, 100, 900);
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   298
                }
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   299
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   300
                s = new String(data, 0, read);
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   301
                if ((i = s.indexOf(nssHeader)) > 0) {
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   302
                    found = true;
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   303
                    // If the nssHeader is before 920 we can break, otherwise
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   304
                    // we may not have the whole header so do another read.  If
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   305
                    // no bytes are in the stream, that is ok, found is true.
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   306
                    if (i < 920) {
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   307
                        break;
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   308
                    }
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   309
                }
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   310
            }
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   311
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   312
            is.close();
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   313
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   314
        } catch (Exception e) {
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   315
            e.printStackTrace();
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   316
        }
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   317
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   318
        if (!found) {
24863
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   319
            System.out.println("lib" + library +
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   320
                    " version not found, set to 0.0: " + libfile);
19067
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   321
            nss_version = 0.0;
24863
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   322
            return nss_version;
19067
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   323
        }
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   324
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   325
        // the index after whitespace after nssHeader
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   326
        int afterheader = s.indexOf("NSS", i) + 4;
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   327
        String version = s.substring(afterheader, s.indexOf(' ', afterheader));
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   328
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   329
        // If a "dot dot" release, strip the extra dots for double parsing
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   330
        String[] dot = version.split("\\.");
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   331
        if (dot.length > 2) {
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   332
            version = dot[0]+"."+dot[1];
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   333
            for (int j = 2; dot.length > j; j++) {
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   334
                version += dot[j];
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   335
            }
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   336
        }
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   337
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   338
        // Convert to double for easier version value checking
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   339
        try {
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   340
            nss_version = Double.parseDouble(version);
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   341
        } catch (NumberFormatException e) {
24863
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   342
            System.out.println("Failed to parse lib" + library +
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   343
                    " version. Set to 0.0");
19067
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   344
            e.printStackTrace();
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   345
        }
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   346
24863
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   347
        System.out.print("lib" + library + " version = "+version+".  ");
19067
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   348
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   349
        // Check for ECC
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   350
        if (s.indexOf("Basic") > 0) {
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   351
            nss_ecc_status = ECCState.Basic;
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   352
            System.out.println("ECC Basic.");
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   353
        } else if (s.indexOf("Extended") > 0) {
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   354
            nss_ecc_status = ECCState.Extended;
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   355
            System.out.println("ECC Extended.");
24863
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   356
        } else {
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   357
            System.out.println("ECC None.");
19067
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   358
        }
24863
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   359
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   360
        if (library.compareTo("softokn3") == 0) {
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   361
            softoken3_version = nss_version;
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   362
        } else if (library.compareTo("nss3") == 0) {
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   363
            nss3_version = nss_version;
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   364
        }
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   365
bf6df3caafe4 8039212: SecretKeyBasic.sh needs to avoid NSS libnss3 and libsoftokn3 version mismatches
ascarpino
parents: 24629
diff changeset
   366
        return nss_version;
19067
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   367
    }
5271291b7121 8020424: The NSS version should be detected before running crypto tests
ascarpino
parents: 19066
diff changeset
   368
19066
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
   369
    // Used to set the nss_library file to search for libsoftokn3.so
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
   370
    public static void useNSS() {
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
   371
        nss_library = "nss3";
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
   372
    }
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
   373
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   374
    public static void testNSS(PKCS11Test test) throws Exception {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   375
        String libdir = getNSSLibDir();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   376
        if (libdir == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   377
            return;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   378
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   379
        String base = getBase();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   380
90ce3da70b43 Initial load
duke
parents:
diff changeset
   381
        if (loadNSPR(libdir) == false) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   382
            return;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   383
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   384
19066
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
   385
        String libfile = libdir + System.mapLibraryName(nss_library);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   386
90ce3da70b43 Initial load
duke
parents:
diff changeset
   387
        String customDBdir = System.getProperty("CUSTOM_DB_DIR");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   388
        String dbdir = (customDBdir != null) ?
90ce3da70b43 Initial load
duke
parents:
diff changeset
   389
                                customDBdir :
90ce3da70b43 Initial load
duke
parents:
diff changeset
   390
                                base + SEP + "nss" + SEP + "db";
90ce3da70b43 Initial load
duke
parents:
diff changeset
   391
        // NSS always wants forward slashes for the config path
90ce3da70b43 Initial load
duke
parents:
diff changeset
   392
        dbdir = dbdir.replace('\\', '/');
90ce3da70b43 Initial load
duke
parents:
diff changeset
   393
90ce3da70b43 Initial load
duke
parents:
diff changeset
   394
        String customConfig = System.getProperty("CUSTOM_P11_CONFIG");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   395
        String customConfigName = System.getProperty("CUSTOM_P11_CONFIG_NAME", "p11-nss.txt");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   396
        String p11config = (customConfig != null) ?
90ce3da70b43 Initial load
duke
parents:
diff changeset
   397
                                customConfig :
90ce3da70b43 Initial load
duke
parents:
diff changeset
   398
                                base + SEP + "nss" + SEP + customConfigName;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   399
90ce3da70b43 Initial load
duke
parents:
diff changeset
   400
        System.setProperty("pkcs11test.nss.lib", libfile);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   401
        System.setProperty("pkcs11test.nss.db", dbdir);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   402
        Provider p = getSunPKCS11(p11config);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   403
        test.premain(p);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   404
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   405
21977
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   406
    // Generate a vector of supported elliptic curves of a given provider
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   407
    static Vector<ECParameterSpec> getKnownCurves(Provider p) throws Exception {
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   408
        int index;
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   409
        int begin;
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   410
        int end;
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   411
        String curve;
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   412
        KeyPair kp = null;
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   413
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   414
        Vector<ECParameterSpec> results = new Vector<ECParameterSpec>();
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   415
        // Get Curves to test from SunEC.
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   416
        String kcProp = Security.getProvider("SunEC").
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   417
                getProperty("AlgorithmParameters.EC SupportedCurves");
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   418
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   419
        if (kcProp == null) {
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   420
            throw new RuntimeException(
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   421
            "\"AlgorithmParameters.EC SupportedCurves property\" not found");
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   422
        }
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   423
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   424
        System.out.println("Finding supported curves using list from SunEC\n");
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   425
        index = 0;
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   426
        for (;;) {
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   427
            // Each set of curve names is enclosed with brackets.
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   428
            begin = kcProp.indexOf('[', index);
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   429
            end = kcProp.indexOf(']', index);
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   430
            if (begin == -1 || end == -1) {
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   431
                break;
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   432
            }
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   433
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   434
            /*
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   435
             * Each name is separated by a comma.
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   436
             * Just get the first name in the set.
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   437
             */
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   438
            index = end + 1;
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   439
            begin++;
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   440
            end = kcProp.indexOf(',', begin);
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   441
            if (end == -1) {
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   442
                // Only one name in the set.
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   443
                end = index -1;
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   444
            }
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   445
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   446
            curve = kcProp.substring(begin, end);
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   447
            ECParameterSpec e = getECParameterSpec(p, curve);
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   448
            System.out.print("\t "+ curve + ": ");
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   449
            try {
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   450
                KeyPairGenerator kpg = KeyPairGenerator.getInstance("EC", p);
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   451
                kpg.initialize(e);
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   452
                kp = kpg.generateKeyPair();
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   453
                results.add(e);
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   454
                System.out.println("Supported");
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   455
            } catch (ProviderException ex) {
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   456
                System.out.println("Unsupported: PKCS11: " +
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   457
                        ex.getCause().getMessage());
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   458
            } catch (InvalidAlgorithmParameterException ex) {
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   459
                System.out.println("Unsupported: Key Length: " +
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   460
                        ex.getMessage());
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   461
            }
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   462
        }
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   463
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   464
        if (results.size() == 0) {
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   465
            throw new RuntimeException("No supported EC curves found");
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   466
        }
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   467
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   468
        return results;
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   469
    }
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   470
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   471
    private static ECParameterSpec getECParameterSpec(Provider p, String name)
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   472
            throws Exception {
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   473
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   474
        AlgorithmParameters parameters =
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   475
            AlgorithmParameters.getInstance("EC", p);
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   476
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   477
        parameters.init(new ECGenParameterSpec(name));
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   478
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   479
        return parameters.getParameterSpec(ECParameterSpec.class);
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   480
    }
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   481
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   482
    // Check support for a curve with a provided Vector of EC support
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   483
    boolean checkSupport(Vector<ECParameterSpec> supportedEC,
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   484
            ECParameterSpec curve) {
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   485
        boolean found = false;
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   486
        for (ECParameterSpec ec: supportedEC) {
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   487
            if (ec.equals(curve)) {
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   488
                return true;
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   489
            }
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   490
        }
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   491
        return false;
17f538f05b73 8027218: TEST_BUG: sun/security/pkcs11/ec tests fail because of ever-changing key size restrictions
ascarpino
parents: 19067
diff changeset
   492
    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   493
13565
6298d600104f 7190945: pkcs11 problem loading NSS libs on Ubuntu
vinnie
parents: 13250
diff changeset
   494
    private static final Map<String,String[]> osMap;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   495
12294
f313586fc3cc 7152582: PKCS11 tests should use the NSS libraries available in the OS
vinnie
parents: 12042
diff changeset
   496
    // Location of the NSS libraries on each supported platform
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   497
    static {
13565
6298d600104f 7190945: pkcs11 problem loading NSS libs on Ubuntu
vinnie
parents: 13250
diff changeset
   498
        osMap = new HashMap<String,String[]>();
6298d600104f 7190945: pkcs11 problem loading NSS libs on Ubuntu
vinnie
parents: 13250
diff changeset
   499
        osMap.put("SunOS-sparc-32", new String[]{"/usr/lib/mps/"});
6298d600104f 7190945: pkcs11 problem loading NSS libs on Ubuntu
vinnie
parents: 13250
diff changeset
   500
        osMap.put("SunOS-sparcv9-64", new String[]{"/usr/lib/mps/64/"});
6298d600104f 7190945: pkcs11 problem loading NSS libs on Ubuntu
vinnie
parents: 13250
diff changeset
   501
        osMap.put("SunOS-x86-32", new String[]{"/usr/lib/mps/"});
6298d600104f 7190945: pkcs11 problem loading NSS libs on Ubuntu
vinnie
parents: 13250
diff changeset
   502
        osMap.put("SunOS-amd64-64", new String[]{"/usr/lib/mps/64/"});
6298d600104f 7190945: pkcs11 problem loading NSS libs on Ubuntu
vinnie
parents: 13250
diff changeset
   503
        osMap.put("Linux-i386-32", new String[]{
24629
97bddac495b7 8044038: Security tests fail on 32 bit linux platform
vinnie
parents: 21977
diff changeset
   504
            "/usr/lib/i386-linux-gnu/", "/usr/lib32/", "/usr/lib/"});
13565
6298d600104f 7190945: pkcs11 problem loading NSS libs on Ubuntu
vinnie
parents: 13250
diff changeset
   505
        osMap.put("Linux-amd64-64", new String[]{
19066
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
   506
            "/usr/lib/x86_64-linux-gnu/", "/usr/lib/x86_64-linux-gnu/nss/",
daf668acb10e 8012971: PKCS11Test hiding exception failures
ascarpino
parents: 13565
diff changeset
   507
            "/usr/lib64/"});
13565
6298d600104f 7190945: pkcs11 problem loading NSS libs on Ubuntu
vinnie
parents: 13250
diff changeset
   508
        osMap.put("Windows-x86-32", new String[]{
6298d600104f 7190945: pkcs11 problem loading NSS libs on Ubuntu
vinnie
parents: 13250
diff changeset
   509
            PKCS11_BASE + "/nss/lib/windows-i586/".replace('/', SEP)});
6298d600104f 7190945: pkcs11 problem loading NSS libs on Ubuntu
vinnie
parents: 13250
diff changeset
   510
        osMap.put("Windows-amd64-64", new String[]{
6298d600104f 7190945: pkcs11 problem loading NSS libs on Ubuntu
vinnie
parents: 13250
diff changeset
   511
            PKCS11_BASE + "/nss/lib/windows-amd64/".replace('/', SEP)});
26958
cb5cbde6e7a4 8059627: Enable PKCS11 tests on Mac
vinnie
parents: 24863
diff changeset
   512
        osMap.put("MacOSX-x86_64-64", new String[]{
cb5cbde6e7a4 8059627: Enable PKCS11 tests on Mac
vinnie
parents: 24863
diff changeset
   513
            PKCS11_BASE + "/nss/lib/macosx-x86_64/"});
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   514
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   515
90ce3da70b43 Initial load
duke
parents:
diff changeset
   516
    private final static char[] hexDigits = "0123456789abcdef".toCharArray();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   517
90ce3da70b43 Initial load
duke
parents:
diff changeset
   518
    public static String toString(byte[] b) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   519
        if (b == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   520
            return "(null)";
90ce3da70b43 Initial load
duke
parents:
diff changeset
   521
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   522
        StringBuffer sb = new StringBuffer(b.length * 3);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   523
        for (int i = 0; i < b.length; i++) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   524
            int k = b[i] & 0xff;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   525
            if (i != 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   526
                sb.append(':');
90ce3da70b43 Initial load
duke
parents:
diff changeset
   527
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   528
            sb.append(hexDigits[k >>> 4]);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   529
            sb.append(hexDigits[k & 0xf]);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   530
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   531
        return sb.toString();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   532
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   533
90ce3da70b43 Initial load
duke
parents:
diff changeset
   534
    public static byte[] parse(String s) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   535
        if (s.equals("(null)")) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   536
            return null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   537
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   538
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   539
            int n = s.length();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   540
            ByteArrayOutputStream out = new ByteArrayOutputStream(n / 3);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   541
            StringReader r = new StringReader(s);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   542
            while (true) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   543
                int b1 = nextNibble(r);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   544
                if (b1 < 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   545
                    break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   546
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   547
                int b2 = nextNibble(r);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   548
                if (b2 < 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   549
                    throw new RuntimeException("Invalid string " + s);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   550
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   551
                int b = (b1 << 4) | b2;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   552
                out.write(b);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   553
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   554
            return out.toByteArray();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   555
        } catch (IOException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   556
            throw new RuntimeException(e);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   557
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   558
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   559
90ce3da70b43 Initial load
duke
parents:
diff changeset
   560
    private static int nextNibble(StringReader r) throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   561
        while (true) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   562
            int ch = r.read();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   563
            if (ch == -1) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   564
                return -1;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   565
            } else if ((ch >= '0') && (ch <= '9')) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   566
                return ch - '0';
90ce3da70b43 Initial load
duke
parents:
diff changeset
   567
            } else if ((ch >= 'a') && (ch <= 'f')) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   568
                return ch - 'a' + 10;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   569
            } else if ((ch >= 'A') && (ch <= 'F')) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   570
                return ch - 'A' + 10;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   571
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   572
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   573
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   574
90ce3da70b43 Initial load
duke
parents:
diff changeset
   575
    <T> T[] concat(T[] a, T[] b) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   576
        if ((b == null) || (b.length == 0)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   577
            return a;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   578
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   579
        T[] r = (T[])java.lang.reflect.Array.newInstance(a.getClass().getComponentType(), a.length + b.length);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   580
        System.arraycopy(a, 0, r, 0, a.length);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   581
        System.arraycopy(b, 0, r, a.length, b.length);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   582
        return r;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   583
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   584
28403
02b91a87c4dd 8048603: Additional tests for MAC algorithms
asmotrak
parents: 26958
diff changeset
   585
    /**
02b91a87c4dd 8048603: Additional tests for MAC algorithms
asmotrak
parents: 26958
diff changeset
   586
     * Returns supported algorithms of specified type.
02b91a87c4dd 8048603: Additional tests for MAC algorithms
asmotrak
parents: 26958
diff changeset
   587
     */
02b91a87c4dd 8048603: Additional tests for MAC algorithms
asmotrak
parents: 26958
diff changeset
   588
    static List<String> getSupportedAlgorithms(String type, String alg,
02b91a87c4dd 8048603: Additional tests for MAC algorithms
asmotrak
parents: 26958
diff changeset
   589
            Provider p) {
02b91a87c4dd 8048603: Additional tests for MAC algorithms
asmotrak
parents: 26958
diff changeset
   590
        // prepare a list of supported algorithms
02b91a87c4dd 8048603: Additional tests for MAC algorithms
asmotrak
parents: 26958
diff changeset
   591
        List<String> algorithms = new ArrayList<>();
02b91a87c4dd 8048603: Additional tests for MAC algorithms
asmotrak
parents: 26958
diff changeset
   592
        Set<Provider.Service> services = p.getServices();
02b91a87c4dd 8048603: Additional tests for MAC algorithms
asmotrak
parents: 26958
diff changeset
   593
        for (Provider.Service service : services) {
02b91a87c4dd 8048603: Additional tests for MAC algorithms
asmotrak
parents: 26958
diff changeset
   594
            if (service.getType().equals(type)
02b91a87c4dd 8048603: Additional tests for MAC algorithms
asmotrak
parents: 26958
diff changeset
   595
                    && service.getAlgorithm().startsWith(alg)) {
02b91a87c4dd 8048603: Additional tests for MAC algorithms
asmotrak
parents: 26958
diff changeset
   596
                algorithms.add(service.getAlgorithm());
02b91a87c4dd 8048603: Additional tests for MAC algorithms
asmotrak
parents: 26958
diff changeset
   597
            }
02b91a87c4dd 8048603: Additional tests for MAC algorithms
asmotrak
parents: 26958
diff changeset
   598
        }
02b91a87c4dd 8048603: Additional tests for MAC algorithms
asmotrak
parents: 26958
diff changeset
   599
        return algorithms;
02b91a87c4dd 8048603: Additional tests for MAC algorithms
asmotrak
parents: 26958
diff changeset
   600
    }
02b91a87c4dd 8048603: Additional tests for MAC algorithms
asmotrak
parents: 26958
diff changeset
   601
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   602
}