Skip to content

Commit fd62363

Browse files
SendaoYanPaul Hohensee
authored andcommitted
8205653: test/jdk/sun/management/jmxremote/bootstrap/RmiRegistrySslTest.java and RmiSslBootstrapTest.sh fail with handshake_failure
Test failure due to unsupported DSA keys Reviewed-by: phh Backport-of: 136331b7f064d6d61abf3c09ba7106dc9a22a531
1 parent 5a6e681 commit fd62363

File tree

5 files changed

+11
-6
lines changed

5 files changed

+11
-6
lines changed
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
1-
com.sun.management.jmxremote.ssl.enabled.cipher.suites=SSL_RSA_WITH_RC4_128_SHA,SSL_RSA_WITH_RC4_128_MD5
2-
com.sun.management.jmxremote.ssl.enabled.protocols=SSLv2Hello,SSLv3,TLSv1
1+
com.sun.management.jmxremote.ssl.enabled.cipher.suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384
2+
com.sun.management.jmxremote.ssl.enabled.protocols=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2,TLSv1.3
33
com.sun.management.jmxremote.ssl.need.client.auth=true
44
com.sun.management.jmxremote.ssl.config.file=@TEST-SRC@/jmxremote_ssltest11_ok.ssl
55
com.sun.management.jmxremote.authenticate=false
6-
javax.rmi.ssl.client.enabledCipherSuites=SSL_RSA_WITH_RC4_128_SHA,SSL_RSA_WITH_RC4_128_MD5
6+
javax.rmi.ssl.client.enabledCipherSuites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
com.sun.management.jmxremote.ssl.enabled.cipher.suites=TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA
2+
com.sun.management.jmxremote.ssl.enabled.protocols=SSLv2Hello,SSLv3,TLSv1
3+
com.sun.management.jmxremote.ssl.need.client.auth=true
4+
com.sun.management.jmxremote.ssl.config.file=@TEST-SRC@/jmxremote_ssltest11_ok.ssl
5+
com.sun.management.jmxremote.authenticate=false
6+
javax.rmi.ssl.client.enabledCipherSuites=TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA
Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,10 @@
11
The trustore and keystore are to be generated as follows:
22

3-
1. keytool -genkey -alias duke -keystore keystore -validity 36500
3+
1. keytool -genkey -alias duke -keyalg RSA -keysize 2048 -validity 36500 -keystore keystore -storepass password
44
- use password 'password' for the keystore and key passwords
55
- leave all values at default
66
- the certificate validity will be 100 years (should be enough for now)
77
2. keytool -export -keystore keystore -alias duke -file duke.crt
8-
3. keytool -import -keystore truststore -alias duke -file duke.crt
8+
3. keytool -import -alias duke -file duke.crt -keystore truststore -storepass trustword
99
- use password 'trustword' for the keystore and key passwords
1010
- leave all values at default
11-
1.25 KB
Binary file not shown.
298 Bytes
Binary file not shown.

0 commit comments

Comments
 (0)