TestEC.java revision 11289:6c16bc68f187
1/*
2 * Copyright (c) 2009, 2014, Oracle and/or its affiliates. All rights reserved.
3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4 *
5 * This code is free software; you can redistribute it and/or modify it
6 * under the terms of the GNU General Public License version 2 only, as
7 * published by the Free Software Foundation.
8 *
9 * This code is distributed in the hope that it will be useful, but WITHOUT
10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
12 * version 2 for more details (a copy is included in the LICENSE file that
13 * accompanied this code).
14 *
15 * You should have received a copy of the GNU General Public License version
16 * 2 along with this work; if not, write to the Free Software Foundation,
17 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
18 *
19 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
20 * or visit www.oracle.com if you need additional information or have any
21 * questions.
22 */
23
24//
25// SunJSSE does not support dynamic system properties, no way to re-use
26// system properties in samevm/agentvm mode.
27//
28
29/**
30 * @test
31 * @bug 6840752
32 * @summary  Provide out-of-the-box support for ECC algorithms
33 * @library ../pkcs11
34 * @library ../pkcs11/ec
35 * @library ../pkcs11/sslecc
36 * @library ../../../java/security/testlibrary
37 * @compile -XDignore.symbol.file TestEC.java
38 * @run main/othervm TestEC
39 */
40
41import java.security.NoSuchProviderException;
42import java.security.Provider;
43import java.security.Security;
44
45/*
46 * Leverage the collection of EC tests used by PKCS11
47 *
48 * NOTE: the following 6 files were copied here from the PKCS11 EC Test area
49 *       and must be kept in sync with the originals:
50 *
51 *           ../pkcs11/ec/p12passwords.txt
52 *           ../pkcs11/ec/certs/sunlabscerts.pem
53 *           ../pkcs11/ec/pkcs12/secp256r1server-secp384r1ca.p12
54 *           ../pkcs11/ec/pkcs12/sect193r1server-rsa1024ca.p12
55 *           ../pkcs11/sslecc/keystore
56 *           ../pkcs11/sslecc/truststore
57 */
58
59public class TestEC {
60
61    public static void main(String[] args) throws Exception {
62        // reset the security property to make sure that the algorithms
63        // and keys used in this test are not disabled.
64        Security.setProperty("jdk.tls.disabledAlgorithms", "");
65
66        // MD5 is used in this test case, don't disable MD5 algorithm.
67        Security.setProperty(
68                "jdk.certpath.disabledAlgorithms", "MD2, RSA keySize < 1024");
69
70        ProvidersSnapshot snapshot = ProvidersSnapshot.create();
71        try {
72            main0(args);
73        } finally {
74            snapshot.restore();
75        }
76    }
77
78    public static void main0(String[] args) throws Exception {
79        Provider p = Security.getProvider("SunEC");
80
81        if (p == null) {
82            throw new NoSuchProviderException("Can't get SunEC provider");
83        }
84
85        System.out.println("Running tests with " + p.getName() +
86            " provider...\n");
87        long start = System.currentTimeMillis();
88
89        /*
90         * The entry point used for each test is its instance method
91         * called main (not its static method called main).
92         */
93        new TestECDH().main(p);
94        new TestECDSA().main(p);
95        new TestCurves().main(p);
96        new TestKeyFactory().main(p);
97        new TestECGenSpec().main(p);
98        new ReadPKCS12().main(p);
99        new ReadCertificates().main(p);
100
101        // ClientJSSEServerJSSE fails on Solaris 11 when both SunEC and
102        // SunPKCS11-Solaris providers are enabled.
103        // Workaround:
104        // Security.removeProvider("SunPKCS11-Solaris");
105        new ClientJSSEServerJSSE().main(p);
106
107        long stop = System.currentTimeMillis();
108        System.out.println("\nCompleted tests with " + p.getName() +
109            " provider (" + ((stop - start) / 1000.0) + " seconds).");
110    }
111}
112