diff --git a/test/jdk/sun/security/pkcs11/KeyStore/ClientAuthData/cert9.db b/test/jdk/sun/security/pkcs11/KeyStore/ClientAuthData/cert9.db new file mode 100644 index 00000000000..f701c4fc2d4 Binary files /dev/null and b/test/jdk/sun/security/pkcs11/KeyStore/ClientAuthData/cert9.db differ diff --git a/test/jdk/sun/security/pkcs11/KeyStore/ClientAuthData/key4.db b/test/jdk/sun/security/pkcs11/KeyStore/ClientAuthData/key4.db new file mode 100644 index 00000000000..3c489989b0a Binary files /dev/null and b/test/jdk/sun/security/pkcs11/KeyStore/ClientAuthData/key4.db differ diff --git a/test/jdk/sun/security/pkcs11/PKCS11Test.java b/test/jdk/sun/security/pkcs11/PKCS11Test.java index 1c0c8d6dcad..1aa87f3887d 100644 --- a/test/jdk/sun/security/pkcs11/PKCS11Test.java +++ b/test/jdk/sun/security/pkcs11/PKCS11Test.java @@ -949,14 +949,22 @@ protected void copyNssCertKeyToClassesDir() throws IOException { protected void copyNssCertKeyToClassesDir(Path dbPath) throws IOException { Path destinationPath = Path.of(TEST_CLASSES); - String keyDbFile = "key3.db"; - String certDbFile = "cert8.db"; + String keyDbFile3 = "key3.db"; + String keyDbFile4 = "key4.db"; + String certDbFile8 = "cert8.db"; + String certDbFile9 = "cert9.db"; - Files.copy(dbPath.resolve(certDbFile), - destinationPath.resolve(certDbFile), + Files.copy(dbPath.resolve(certDbFile8), + destinationPath.resolve(certDbFile8), StandardCopyOption.REPLACE_EXISTING); - Files.copy(dbPath.resolve(keyDbFile), - destinationPath.resolve(keyDbFile), + Files.copy(dbPath.resolve(certDbFile9), + destinationPath.resolve(certDbFile9), + StandardCopyOption.REPLACE_EXISTING); + Files.copy(dbPath.resolve(keyDbFile3), + destinationPath.resolve(keyDbFile3), + StandardCopyOption.REPLACE_EXISTING); + Files.copy(dbPath.resolve(keyDbFile4), + destinationPath.resolve(keyDbFile4), StandardCopyOption.REPLACE_EXISTING); } diff --git a/test/jdk/sun/security/pkcs11/Provider/MultipleLogins.sh b/test/jdk/sun/security/pkcs11/Provider/MultipleLogins.sh index c768834da7f..4a50e6782b9 100644 --- a/test/jdk/sun/security/pkcs11/Provider/MultipleLogins.sh +++ b/test/jdk/sun/security/pkcs11/Provider/MultipleLogins.sh @@ -99,6 +99,12 @@ esac # first make cert/key DBs writable +${CP} ${TESTSRC}${FS}..${FS}nss${FS}db${FS}cert9.db ${TESTCLASSES} +${CHMOD} +w ${TESTCLASSES}${FS}cert9.db + +${CP} ${TESTSRC}${FS}..${FS}nss${FS}db${FS}key4.db ${TESTCLASSES} +${CHMOD} +w ${TESTCLASSES}${FS}key4.db + ${CP} ${TESTSRC}${FS}..${FS}nss${FS}db${FS}cert8.db ${TESTCLASSES} ${CHMOD} +w ${TESTCLASSES}${FS}cert8.db diff --git a/test/jdk/sun/security/pkcs11/Secmod/cert9.db b/test/jdk/sun/security/pkcs11/Secmod/cert9.db index a202bea21e9..b823a79864f 100644 Binary files a/test/jdk/sun/security/pkcs11/Secmod/cert9.db and b/test/jdk/sun/security/pkcs11/Secmod/cert9.db differ diff --git a/test/jdk/sun/security/pkcs11/Secmod/key4.db b/test/jdk/sun/security/pkcs11/Secmod/key4.db index 222adb32286..8ddfc4c0fa6 100644 Binary files a/test/jdk/sun/security/pkcs11/Secmod/key4.db and b/test/jdk/sun/security/pkcs11/Secmod/key4.db differ diff --git a/test/jdk/sun/security/pkcs11/Secmod/pkcs11.txt b/test/jdk/sun/security/pkcs11/Secmod/pkcs11.txt index 60cc1c56553..d697da07670 100644 --- a/test/jdk/sun/security/pkcs11/Secmod/pkcs11.txt +++ b/test/jdk/sun/security/pkcs11/Secmod/pkcs11.txt @@ -1,4 +1,8 @@ library= name=NSS Internal PKCS #11 Module -parameters=configdir='sql:./tmpdb' certPrefix='' keyPrefix='' secmod='' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' -NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) +parameters=configdir='sql:./tmpdb' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' +NSS=trustOrder=75 cipherOrder=100 slotParams={0x00000001=[slotFlags=RSA,RC4,RC2,DES,DH,SHA1,MD5,MD2,SSL,TLS,AES,RANDOM askpw=any timeout=30 ] } Flags=internal,critical + +library=libnssckbi.so +name=Builtin Roots Module +NSS=trustOrder=100 diff --git a/test/jdk/sun/security/pkcs11/SecmodTest.java b/test/jdk/sun/security/pkcs11/SecmodTest.java index c5a01b0a739..c1b5e4471ba 100644 --- a/test/jdk/sun/security/pkcs11/SecmodTest.java +++ b/test/jdk/sun/security/pkcs11/SecmodTest.java @@ -36,7 +36,7 @@ public class SecmodTest extends PKCS11Test { static String DBDIR; static char[] password = "test12".toCharArray(); static String keyAlias = "mykey"; - static boolean useSqlite = false; + static boolean useSqlite = true; static void useSqlite(boolean b) { useSqlite = b; diff --git a/test/jdk/sun/security/pkcs11/fips/cert9.db b/test/jdk/sun/security/pkcs11/fips/cert9.db new file mode 100644 index 00000000000..247bdad0abc Binary files /dev/null and b/test/jdk/sun/security/pkcs11/fips/cert9.db differ diff --git a/test/jdk/sun/security/pkcs11/fips/key4.db b/test/jdk/sun/security/pkcs11/fips/key4.db new file mode 100644 index 00000000000..580dd2ebd6b Binary files /dev/null and b/test/jdk/sun/security/pkcs11/fips/key4.db differ diff --git a/test/jdk/sun/security/pkcs11/fips/pkcs11.txt b/test/jdk/sun/security/pkcs11/fips/pkcs11.txt new file mode 100644 index 00000000000..ba339b25c76 --- /dev/null +++ b/test/jdk/sun/security/pkcs11/fips/pkcs11.txt @@ -0,0 +1,9 @@ +library= +name=NSS Internal PKCS #11 Module +parameters=configdir='sql:./tmpdb' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' +NSS=trustOrder=75 cipherOrder=100 slotParams={0x00000001=[slotFlags=RSA,RC4,RC2,DES,DH,SHA1,MD5,MD2,SSL,TLS,AES,RANDOM askpw=any timeout=30 ] } Flags=internal,critical + +library=libnssckbi.so +name=Builtin Roots Module +NSS=trustOrder=100 +