8190333: sun/security/ssl/X509KeyManager/PreferredKey.java failed with "Failed to get the preferable key aliases"
Reviewed-by: mullan
Keystores used for the JSSE regression test suite.keystoretruststore==========These are the primary two keystores and contain entries for testing mostof the JSSE regression test files. There are three entries, one RSA-based,one DSA-based and one EC-based. If they expire, simply recreate themusing keytool and most of the test cases should work.The password on both files is: passphraseThere are no individual key entry passwords at this time.keystore entries================Alias name: dummy-----------------Creation date: May 16, 2016Entry type: PrivateKeyEntryCertificate chain length: 1Certificate[1]:Owner: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=USIssuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=USSerial number: 57399b87Valid from: Mon May 16 10:06:38 UTC 2016 until: Sat May 16 10:06:38 UTC 2026Signature algorithm name: SHA256withRSAVersion: 1This can be generated using hacked (update the keytool source code so thatit can be used for version 1 X.509 certificate) keytool command:% keytool -genkeypair -alias dummy -keyalg RSA -keysize 2048 \ -sigalg SHA256withRSA \ -dname "CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US" \ -validity 3652 -keypass passphrase -keystore keystore -storepass passphraseAlias name: dummyecdsa----------------------Creation date: May 16, 2016Entry type: PrivateKeyEntryCertificate chain length: 1Certificate[1]:Owner: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=USIssuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=USSerial number: 57399c1dValid from: Mon May 16 10:09:01 UTC 2016 until: Sat May 16 10:09:01 UTC 2026Signature algorithm name: SHA256withECDSAVersion: 1This can be generated using hacked (update the keytool source code so thatit can be used for version 1 X.509 certificate) keytool command:% keytool -genkeypair -alias dummy -keyalg EC -keysize 256 \ -sigalg SHA256withECDSA \ -dname "CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US" \ -validity 3652 -keypass passphrase -keystore keystore -storepass passphraseAlias name: dummydsa--------------------Creation date: Mar 29, 2018Entry type: PrivateKeyEntryCertificate chain length: 1Certificate[1]:Owner: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=USIssuer: CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=USSerial number: 324d85f0Valid from: Thu Mar 29 16:06:34 PDT 2018 until: Tue Mar 28 16:06:34 PDT 2028Signature algorithm name: SHA256withDSAVersion: 3This can be generated using hacked (update the keytool source code so thatit can be used for version 1 X.509 certificate) keytool command:% keytool -genkeypair -alias dummydsa -keyalg DSA -keysize 1024 \ -sigalg SHA256withDSA \ -dname "CN=dummy.example.com, OU=Dummy, O=Dummy, L=Cupertino, ST=CA, C=US" \ -validity 3652 -keypass passphrase -keystore keystore -storepass passphrasetruststore entries==================This key store contains only trusted certificate entries. The samecertificates are used in both keystore and truststore.unknown_keystore================A keystore you can use when you don't want things to be verified.Use this with keystore/truststore, and you'll never get a match.