summaryrefslogtreecommitdiffstats
path: root/security/src
diff options
context:
space:
mode:
authorThe Android Open Source Project <initial-contribution@android.com>2009-02-10 15:43:57 -0800
committerThe Android Open Source Project <initial-contribution@android.com>2009-02-10 15:43:57 -0800
commitb7926325a1c1a370c84c81db80372f59af240a53 (patch)
treeb1d0214be443ea674d0ded8c502a8e074e50bdd2 /security/src
parent687f18b91f4a0a728a027579110953ee729adcb8 (diff)
downloadlibcore-b7926325a1c1a370c84c81db80372f59af240a53.zip
libcore-b7926325a1c1a370c84c81db80372f59af240a53.tar.gz
libcore-b7926325a1c1a370c84c81db80372f59af240a53.tar.bz2
auto import from //branches/cupcake/...@130745
Diffstat (limited to 'security/src')
-rw-r--r--security/src/main/java/org/apache/harmony/security/fortress/Services.java6
-rw-r--r--security/src/main/java/org/bouncycastle/jce/provider/BouncyCastleProvider.java52
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator1Test.java8
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator2Test.java9
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/AlgorithmParametersSpiTest.java8
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/CodeSignerTest.java2
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/CodeSourceTest.java75
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/DigestExceptionTest.java12
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/DigestInputStreamTest.java8
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/DigestOutputStreamTest.java8
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/GeneralSecurityExceptionTest.java12
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/Identity2Test.java11
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/IdentityScope2Test.java10
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/IdentityScopeTest.java8
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/InvalidAlgorithmParameterExceptionTest.java12
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/InvalidKeyExceptionTest.java12
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/InvalidParameterExceptionTest.java12
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/KSCallbackHandlerProtectionTest.java8
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/KSPasswordProtectionTest.java8
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/KSPrivateKeyEntryTest.java7
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/KSSecretKeyEntryTest.java7
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/KeyExceptionTest.java12
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/KeyFactorySpiTest.java9
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/KeyManagementExceptionTest.java12
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator1Test.java9
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator2Test.java9
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator3Test.java9
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairGeneratorSpiTest.java9
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairTest.java7
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/KeyStore4Test.java2
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/KeyStoreExceptionTest.java12
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/KeyStoreSpiTest.java9
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/KeyStoreTest.java2
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/KeyTest.java9
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/NoSuchAlgorithmExceptionTest.java12
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/NoSuchProviderExceptionTest.java12
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/PermissionCollectionTest.java60
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/PermissionTest.java9
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/PrivateKeyTest.java9
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/ProviderExceptionTest.java12
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/ProviderTest.java1
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/PublicKeyTest.java18
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/SecureRandomSpiTest.java9
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/SecurityPermissionTest.java8
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/SignatureExceptionTest.java12
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/SignatureTest.java17
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/SignerTest.java19
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/UnrecoverableEntryExceptionTest.java9
-rw-r--r--security/src/test/java/org/apache/harmony/security/tests/java/security/UnrecoverableKeyExceptionTest.java12
-rw-r--r--security/src/test/java/tests/api/java/security/AccessControlContextTest.java2
-rw-r--r--security/src/test/java/tests/api/javax/security/auth/PrivateCredentialPermissionTest.java2
-rw-r--r--security/src/test/java/tests/api/javax/security/cert/CertificateEncodingExceptionTest.java12
-rw-r--r--security/src/test/java/tests/api/javax/security/cert/CertificateExceptionTest.java12
-rw-r--r--security/src/test/java/tests/api/javax/security/cert/CertificateExpiredExceptionTest.java12
-rw-r--r--security/src/test/java/tests/api/javax/security/cert/CertificateNotYetValidExceptionTest.java12
-rw-r--r--security/src/test/java/tests/api/javax/security/cert/CertificateParsingExceptionTest.java11
-rw-r--r--security/src/test/java/tests/api/javax/security/cert/X509CertificateTest.java12
-rw-r--r--security/src/test/java/tests/java/security/AlgorithmParameterGeneratorSpiTest.java9
-rw-r--r--security/src/test/java/tests/java/security/AllPermissionTest.java8
-rw-r--r--security/src/test/java/tests/java/security/BasicPermissionTest.java8
-rw-r--r--security/src/test/java/tests/java/security/IdentityTest.java8
-rw-r--r--security/src/test/java/tests/security/AllTests.java2
-rw-r--r--security/src/test/java/tests/security/acl/IAclEntryTest.java10
-rw-r--r--security/src/test/java/tests/security/acl/IAclTest.java9
-rw-r--r--security/src/test/java/tests/security/acl/IGroupTest.java9
-rw-r--r--security/src/test/java/tests/security/acl/IOwnerTest.java9
-rw-r--r--security/src/test/java/tests/security/acl/IPermissionTest.java9
-rw-r--r--security/src/test/java/tests/security/cert/CRLExceptionTest.java12
-rw-r--r--security/src/test/java/tests/security/cert/CRLTest.java8
-rw-r--r--security/src/test/java/tests/security/cert/CertPathBuilder1Test.java8
-rw-r--r--security/src/test/java/tests/security/cert/CertPathBuilder2Test.java9
-rw-r--r--security/src/test/java/tests/security/cert/CertPathBuilderExceptionTest.java12
-rw-r--r--security/src/test/java/tests/security/cert/CertPathBuilderSpiTest.java9
-rw-r--r--security/src/test/java/tests/security/cert/CertPathCertPathRepTest.java8
-rw-r--r--security/src/test/java/tests/security/cert/CertPathTest.java2
-rw-r--r--security/src/test/java/tests/security/cert/CertPathValidator1Test.java7
-rw-r--r--security/src/test/java/tests/security/cert/CertPathValidator2Test.java166
-rw-r--r--security/src/test/java/tests/security/cert/CertPathValidator3Test.java7
-rw-r--r--security/src/test/java/tests/security/cert/CertPathValidatorExceptionTest.java12
-rw-r--r--security/src/test/java/tests/security/cert/CertPathValidatorSpiTest.java9
-rw-r--r--security/src/test/java/tests/security/cert/CertStore1Test.java7
-rw-r--r--security/src/test/java/tests/security/cert/CertStoreExceptionTest.java12
-rw-r--r--security/src/test/java/tests/security/cert/CertStoreSpiTest.java8
-rw-r--r--security/src/test/java/tests/security/cert/CertificateEncodingExceptionTest.java12
-rw-r--r--security/src/test/java/tests/security/cert/CertificateExceptionTest.java12
-rw-r--r--security/src/test/java/tests/security/cert/CertificateExpiredExceptionTest.java12
-rw-r--r--security/src/test/java/tests/security/cert/CertificateFactory1Test.java11
-rw-r--r--security/src/test/java/tests/security/cert/CertificateFactory2Test.java9
-rw-r--r--security/src/test/java/tests/security/cert/CertificateFactorySpiTest.java10
-rw-r--r--security/src/test/java/tests/security/cert/CertificateNotYetValidExceptionTest.java12
-rw-r--r--security/src/test/java/tests/security/cert/CertificateParsingExceptionTest.java12
-rw-r--r--security/src/test/java/tests/security/cert/CertificateTest.java57
-rw-r--r--security/src/test/java/tests/security/cert/CollectionCertStoreParametersTest.java8
-rw-r--r--security/src/test/java/tests/security/cert/LDAPCertStoreParametersTest.java8
-rw-r--r--security/src/test/java/tests/security/cert/PKIXBuilderParametersTest.java8
-rw-r--r--security/src/test/java/tests/security/cert/PKIXCertPathBuilderResultTest.java8
-rw-r--r--security/src/test/java/tests/security/cert/PKIXCertPathCheckerTest.java8
-rw-r--r--security/src/test/java/tests/security/cert/PKIXCertPathValidatorResultTest.java8
-rw-r--r--security/src/test/java/tests/security/cert/PKIXParametersTest.java36
-rw-r--r--security/src/test/java/tests/security/cert/PolicyNodeTest.java8
-rw-r--r--security/src/test/java/tests/security/cert/PolicyQualifierInfoTest.java7
-rw-r--r--security/src/test/java/tests/security/cert/TrustAnchorTest.java3
-rw-r--r--security/src/test/java/tests/security/cert/X509CRLSelector2Test.java8
-rw-r--r--security/src/test/java/tests/security/cert/X509CRLTest.java7
-rw-r--r--security/src/test/java/tests/security/cert/X509CertSelectorTest.java27
-rw-r--r--security/src/test/java/tests/security/cert/X509Certificate2Test.java16
-rw-r--r--security/src/test/java/tests/security/permissions/JavaIoFileInputStreamTest.java5
-rw-r--r--security/src/test/java/tests/security/permissions/JavaIoFileOutputStreamTest.java5
-rw-r--r--security/src/test/java/tests/security/permissions/JavaIoObjectInputStreamTest.java2
-rw-r--r--security/src/test/java/tests/security/permissions/JavaIoObjectOutputStreamTest.java2
-rw-r--r--security/src/test/java/tests/security/permissions/JavaIoRandomAccessFileTest.java9
-rw-r--r--security/src/test/java/tests/security/permissions/JavaLangClassLoaderTest.java12
-rw-r--r--security/src/test/java/tests/security/permissions/JavaLangClassTest.java38
-rw-r--r--security/src/test/java/tests/security/permissions/JavaLangReflectAccessibleObjectTest.java3
-rw-r--r--security/src/test/java/tests/security/permissions/JavaLangRuntimeTest.java28
-rw-r--r--security/src/test/java/tests/security/permissions/JavaLangSystemTest.java48
-rw-r--r--security/src/test/java/tests/security/permissions/JavaLangThreadTest.java20
-rw-r--r--security/src/test/java/tests/security/permissions/JavaNetDatagramSocketTest.java24
-rw-r--r--security/src/test/java/tests/security/permissions/JavaNetMulticastSocketTest.java5
-rw-r--r--security/src/test/java/tests/security/permissions/JavaNetServerSocketTest.java7
-rw-r--r--security/src/test/java/tests/security/permissions/JavaNetSocketTest.java40
-rw-r--r--security/src/test/java/tests/security/permissions/JavaSecurityPolicyTest.java2
-rw-r--r--security/src/test/java/tests/security/permissions/JavaSecuritySecurityTest.java45
-rw-r--r--security/src/test/java/tests/security/permissions/JavaUtilZipZipFile.java4
-rw-r--r--security/src/test/java/tests/security/permissions/JavaxSecurityAuthSubject.java38
-rw-r--r--security/src/test/java/tests/security/permissions/JavaxSecurityAuthSubjectDomainCombiner.java1
-rw-r--r--security/src/test/java/tests/security/spec/DSAParameterSpecTest.java8
-rw-r--r--security/src/test/java/tests/security/spec/DSAPrivateKeySpecTest.java8
-rw-r--r--security/src/test/java/tests/security/spec/DSAPublicKeySpecTest.java8
-rw-r--r--security/src/test/java/tests/security/spec/ECFieldF2mTest.java8
-rw-r--r--security/src/test/java/tests/security/spec/ECFieldFpTest.java8
-rw-r--r--security/src/test/java/tests/security/spec/ECGenParameterSpecTest.java8
-rw-r--r--security/src/test/java/tests/security/spec/ECParameterSpecTest.java9
-rw-r--r--security/src/test/java/tests/security/spec/ECPointTest.java8
-rw-r--r--security/src/test/java/tests/security/spec/ECPrivateKeySpecTest.java9
-rw-r--r--security/src/test/java/tests/security/spec/ECPublicKeySpecTest.java9
-rw-r--r--security/src/test/java/tests/security/spec/EncodedKeySpecTest.java9
-rw-r--r--security/src/test/java/tests/security/spec/InvalidKeySpecExceptionTest.java12
-rw-r--r--security/src/test/java/tests/security/spec/InvalidParameterSpecExceptionTest.java12
-rw-r--r--security/src/test/java/tests/security/spec/MGF1ParameterSpecTest.java8
-rw-r--r--security/src/test/java/tests/security/spec/PKCS8EncodedKeySpecTest.java8
-rw-r--r--security/src/test/java/tests/security/spec/PSSParameterSpecTest.java9
-rw-r--r--security/src/test/java/tests/security/spec/RSAKeyGenParameterSpecTest.java8
-rw-r--r--security/src/test/java/tests/security/spec/RSAMultiPrimePrivateCrtKeySpecTest.java8
-rw-r--r--security/src/test/java/tests/security/spec/RSAOtherPrimeInfoTest.java8
-rw-r--r--security/src/test/java/tests/security/spec/RSAPrivateCrtKeySpecTest.java8
-rw-r--r--security/src/test/java/tests/security/spec/RSAPrivateKeySpecTest.java8
-rw-r--r--security/src/test/java/tests/security/spec/RSAPublicKeySpecTest.java9
-rw-r--r--security/src/test/java/tests/security/spec/X509EncodedKeySpecTest.java8
-rw-r--r--security/src/test/java/tests/targets/security/KeyStoreTestPKCS12.java3
-rw-r--r--security/src/test/java/tests/targets/security/MessageDigestTest.java109
-rw-r--r--security/src/test/java/tests/targets/security/MessageDigestTestMD5.java10
-rw-r--r--security/src/test/java/tests/targets/security/MessageDigestTestSHA1.java11
-rw-r--r--security/src/test/java/tests/targets/security/MessageDigestTestSHA224.java20
-rw-r--r--security/src/test/java/tests/targets/security/MessageDigestTestSHA256.java11
-rw-r--r--security/src/test/java/tests/targets/security/MessageDigestTestSHA384.java11
-rw-r--r--security/src/test/java/tests/targets/security/MessageDigestTestSHA512.java11
-rw-r--r--security/src/test/resources/tests/targets/security/SHA-224.check1
-rw-r--r--security/src/test/resources/tests/targets/security/SHA-224.data1
159 files changed, 676 insertions, 1431 deletions
diff --git a/security/src/main/java/org/apache/harmony/security/fortress/Services.java b/security/src/main/java/org/apache/harmony/security/fortress/Services.java
index 2e92d82..300854a 100644
--- a/security/src/main/java/org/apache/harmony/security/fortress/Services.java
+++ b/security/src/main/java/org/apache/harmony/security/fortress/Services.java
@@ -44,7 +44,11 @@ public class Services {
// The HashMap that contains information about preferred implementations for
// all serviceName.algName in the registered providers
- private static final Map<String, Provider.Service> services = new HashMap<String, Provider.Service>(512);
+ // BEGIN android-changed
+ // set the initial size to 600 so we don't grow to 1024 by default because
+ // initialization adds a few entries more than the growth threshold.
+ private static final Map<String, Provider.Service> services = new HashMap<String, Provider.Service>(600);
+ // END android-changed
// Need refresh flag
private static boolean needRefresh; // = false;
diff --git a/security/src/main/java/org/bouncycastle/jce/provider/BouncyCastleProvider.java b/security/src/main/java/org/bouncycastle/jce/provider/BouncyCastleProvider.java
index d802228..d9f4727 100644
--- a/security/src/main/java/org/bouncycastle/jce/provider/BouncyCastleProvider.java
+++ b/security/src/main/java/org/bouncycastle/jce/provider/BouncyCastleProvider.java
@@ -112,7 +112,10 @@ public final class BouncyCastleProvider extends Provider
// END android-removed
put("AlgorithmParameters.IES", "org.bouncycastle.jce.provider.JDKAlgorithmParameters$IES");
put("AlgorithmParameters.PKCS12PBE", "org.bouncycastle.jce.provider.JDKAlgorithmParameters$PKCS12PBE");
- put("AlgorithmParameters.1.2.840.113549.3.7", "org.bouncycastle.jce.provider.JDKAlgorithmParameters$IVAlgorithmParameters");
+ // BEGIN android-removed
+ // double entry
+ // put("AlgorithmParameters.1.2.840.113549.3.7", "org.bouncycastle.jce.provider.JDKAlgorithmParameters$IVAlgorithmParameters");
+ // END android-removed
// BEGIN android-removed
// put("AlgorithmParameters.IDEA", "org.bouncycastle.jce.provider.JDKAlgorithmParameters$IDEAAlgorithmParameters");
// put("AlgorithmParameters.1.3.6.1.4.1.188.7.1.1.2", "org.bouncycastle.jce.provider.JDKAlgorithmParameters$IDEAAlgorithmParameters");
@@ -171,12 +174,14 @@ public final class BouncyCastleProvider extends Provider
put("Alg.Alias.AlgorithmParameters.PBEWITHSHA-256AND192BITAES-CBC-BC","PKCS12PBE");
put("Alg.Alias.AlgorithmParameters.PBEWITHSHA-256AND256BITAES-CBC-BC","PKCS12PBE");
- put("AlgorithmParameters.SHA1WITHECDSA", "org.bouncycastle.jce.provider.JDKECDSAAlgParameters$SigAlgParameters");
- put("AlgorithmParameters.SHA224WITHECDSA", "org.bouncycastle.jce.provider.JDKECDSAAlgParameters$SigAlgParameters");
- put("AlgorithmParameters.SHA256WITHECDSA", "org.bouncycastle.jce.provider.JDKECDSAAlgParameters$SigAlgParameters");
- put("AlgorithmParameters.SHA384WITHECDSA", "org.bouncycastle.jce.provider.JDKECDSAAlgParameters$SigAlgParameters");
- put("AlgorithmParameters.SHA512WITHECDSA", "org.bouncycastle.jce.provider.JDKECDSAAlgParameters$SigAlgParameters");
-
+ // BEGIN android-removed
+ // put("AlgorithmParameters.SHA1WITHECDSA", "org.bouncycastle.jce.provider.JDKECDSAAlgParameters$SigAlgParameters");
+ // put("AlgorithmParameters.SHA224WITHECDSA", "org.bouncycastle.jce.provider.JDKECDSAAlgParameters$SigAlgParameters");
+ // put("AlgorithmParameters.SHA256WITHECDSA", "org.bouncycastle.jce.provider.JDKECDSAAlgParameters$SigAlgParameters");
+ // put("AlgorithmParameters.SHA384WITHECDSA", "org.bouncycastle.jce.provider.JDKECDSAAlgParameters$SigAlgParameters");
+ // put("AlgorithmParameters.SHA512WITHECDSA", "org.bouncycastle.jce.provider.JDKECDSAAlgParameters$SigAlgParameters");
+ // END android-removed
+
//
// key agreement
//
@@ -491,9 +496,10 @@ public final class BouncyCastleProvider extends Provider
put("Alg.Alias.KeyFactory.1.2.840.113549.1.1.1", "RSA");
put("Alg.Alias.KeyFactory.1.2.840.10040.4.1", "DSA");
- put("Alg.Alias.KeyFactory." + X9ObjectIdentifiers.id_ecPublicKey, "EC");
+ // BEGIN android-removed
+ // put("Alg.Alias.KeyFactory." + X9ObjectIdentifiers.id_ecPublicKey, "EC");
- // END android-removed
+
// put("KeyFactory.GOST3410", "org.bouncycastle.jce.provider.JDKKeyFactory$GOST3410");
// put("Alg.Alias.KeyFactory.GOST-3410", "GOST3410");
// put("Alg.Alias.KeyFactory.GOST-3410-94", "GOST3410");
@@ -732,16 +738,18 @@ public final class BouncyCastleProvider extends Provider
//
private void addMessageDigestAlgorithms()
{
- put("MessageDigest.SHA-1", "org.bouncycastle.jce.provider.JDKMessageDigest$SHA1");
- put("Alg.Alias.MessageDigest.SHA1", "SHA-1");
- put("Alg.Alias.MessageDigest.SHA", "SHA-1");
- put("Alg.Alias.MessageDigest." + OIWObjectIdentifiers.idSHA1, "SHA-1");
- put("MessageDigest.SHA-224", "org.bouncycastle.jce.provider.JDKMessageDigest$SHA224");
- put("Alg.Alias.MessageDigest.SHA224", "SHA-224");
- put("Alg.Alias.MessageDigest." + NISTObjectIdentifiers.id_sha224, "SHA-224");
- put("MessageDigest.SHA-256", "org.bouncycastle.jce.provider.JDKMessageDigest$SHA256");
- put("Alg.Alias.MessageDigest.SHA256", "SHA-256");
- put("Alg.Alias.MessageDigest." + NISTObjectIdentifiers.id_sha256, "SHA-256");
+ // BEGIN android-removed
+ // put("MessageDigest.SHA-1", "org.bouncycastle.jce.provider.JDKMessageDigest$SHA1");
+ // put("Alg.Alias.MessageDigest.SHA1", "SHA-1");
+ // put("Alg.Alias.MessageDigest.SHA", "SHA-1");
+ // put("Alg.Alias.MessageDigest." + OIWObjectIdentifiers.idSHA1, "SHA-1");
+ // put("MessageDigest.SHA-224", "org.bouncycastle.jce.provider.JDKMessageDigest$SHA224");
+ // put("Alg.Alias.MessageDigest.SHA224", "SHA-224");
+ // put("Alg.Alias.MessageDigest." + NISTObjectIdentifiers.id_sha224, "SHA-224");
+ // put("MessageDigest.SHA-256", "org.bouncycastle.jce.provider.JDKMessageDigest$SHA256");
+ // put("Alg.Alias.MessageDigest.SHA256", "SHA-256");
+ // put("Alg.Alias.MessageDigest." + NISTObjectIdentifiers.id_sha256, "SHA-256");
+ // END android-removed
put("MessageDigest.SHA-384", "org.bouncycastle.jce.provider.JDKMessageDigest$SHA384");
put("Alg.Alias.MessageDigest.SHA384", "SHA-384");
put("Alg.Alias.MessageDigest." + NISTObjectIdentifiers.id_sha384, "SHA-384");
@@ -754,10 +762,8 @@ public final class BouncyCastleProvider extends Provider
// put("Alg.Alias.MessageDigest." + PKCSObjectIdentifiers.md2, "MD2");
// put("MessageDigest.MD4", "org.bouncycastle.jce.provider.JDKMessageDigest$MD4");
// put("Alg.Alias.MessageDigest." + PKCSObjectIdentifiers.md4, "MD4");
- // END android-removed
- put("MessageDigest.MD5", "org.bouncycastle.jce.provider.JDKMessageDigest$MD5");
- put("Alg.Alias.MessageDigest." + PKCSObjectIdentifiers.md5, "MD5");
- // BEGIN android-removed
+ // put("MessageDigest.MD5", "org.bouncycastle.jce.provider.JDKMessageDigest$MD5");
+ // put("Alg.Alias.MessageDigest." + PKCSObjectIdentifiers.md5, "MD5");
// put("MessageDigest.RIPEMD128", "org.bouncycastle.jce.provider.JDKMessageDigest$RIPEMD128");
// put("Alg.Alias.MessageDigest." + TeleTrusTObjectIdentifiers.ripemd128, "RIPEMD128");
// put("MessageDigest.RIPEMD160", "org.bouncycastle.jce.provider.JDKMessageDigest$RIPEMD160");
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator1Test.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator1Test.java
index 85d6c71..1ff236a 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator1Test.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator1Test.java
@@ -49,14 +49,6 @@ import junit.framework.TestCase;
*/
public class AlgorithmParameterGenerator1Test extends TestCase {
- /**
- * Constructor for AlgorithmParameterGeneratorTests.
- *
- * @param arg0
- */
- public AlgorithmParameterGenerator1Test(String arg0) {
- super(arg0);
- }
private static String[] invalidValues = SpiEngUtils.invalidValues;
private static String validAlgName = "DSA";
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator2Test.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator2Test.java
index efa8e04..c67822a 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator2Test.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator2Test.java
@@ -82,15 +82,6 @@ public class AlgorithmParameterGenerator2Test extends TestCase {
Security.removeProvider(mProv.getName());
}
- /**
- * Constructor for SecurityManagerFactoryTest2.
- *
- * @param arg0
- */
- public AlgorithmParameterGenerator2Test(String arg0) {
- super(arg0);
- }
-
private void checkResult(AlgorithmParameterGenerator algParGen)
throws InvalidAlgorithmParameterException {
AlgorithmParameters param = algParGen.generateParameters();
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/AlgorithmParametersSpiTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/AlgorithmParametersSpiTest.java
index 100c077..5ec3d96 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/AlgorithmParametersSpiTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/AlgorithmParametersSpiTest.java
@@ -35,14 +35,6 @@ import junit.framework.TestCase;
@TestTargetClass(AlgorithmParametersSpi.class)
public class AlgorithmParametersSpiTest extends TestCase {
- /**
- * Constructor for AlgorithmParametersSpiTest.
- *
- * @param name
- */
- public AlgorithmParametersSpiTest(String name) {
- super(name);
- }
/**
* Test for <code>AlgorithmParametersSpi</code> constructor
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/CodeSignerTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/CodeSignerTest.java
index d02f2c7..e29d9ac 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/CodeSignerTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/CodeSignerTest.java
@@ -180,7 +180,7 @@ public class CodeSignerTest extends TestCase {
assertTrue(new CodeSigner(cpath, null).toString().contains(""));
assertTrue(new CodeSigner(cpath, ts).toString().contains(""));
- assertTrue(new CodeSigner(cpath, null).toString().contains("CodeSigner"));
+ assertTrue(new CodeSigner(cpath, null).toString().contains("Signer"));
assertTrue(new CodeSigner(cpath, ts).toString().contains(ts.toString()));
}
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/CodeSourceTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/CodeSourceTest.java
index ad59b99..276dfd7 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/CodeSourceTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/CodeSourceTest.java
@@ -83,45 +83,52 @@ public class CodeSourceTest extends TestCase {
private static URL urlFileDirStar;
private static URL urlRef1, urlRef2;
-
- static {
- try {
- String siteName = "www.intel.com";
- InetAddress addr = InetAddress.getByName(siteName);
- String siteIP = addr.getHostAddress();
-
- urlSite = new URL("http://"+siteName+"");
- urlDir = new URL("http://"+siteName+"/drl_test");
- urlDirOtherSite = new URL("http://www.any-other-site-which-is-not-siteName.com/drl_test");
-
- urlDir_port80 = new URL("http://"+siteName+":80/drl_test");
- urlDir_port81 = new URL("http://"+siteName+":81/drl_test");
- urlDirWithSlash = new URL(urlDir + "/");
-
- //urlDirFtp = new URL("ftp://www.intel.com/drl_test");
- urlDir_FileProtocol = new URL("file://"+siteName+"/drl_test");
-
- urlDirIP = new URL("http://"+siteIP+"/drl_test");
-
- urlFile = new URL("http://"+siteName+"/drl_test/empty.jar");
- urlFileWithAdditionalDirs = new URL(
- "http://"+siteName+"/drl_test/what/ever/here/empty.jar");
-
- urlFileDirMinus = new URL("http://"+siteName+"/drl_test/-");
- urlFileDirStar = new URL("http://"+siteName+"/drl_test/*");
- urlFileDirOtherDir = new URL("http://"+siteName+"/_test_drl_/*");
-
- urlRef1 = new URL("http://"+siteName+"/drl_test/index.html#ref1");
- urlRef2 = new URL("http://"+siteName+"/drl_test/index.html#ref2");
- } catch (MalformedURLException ex) {
- throw new Error(ex);
- } catch (UnknownHostException ex) {
- throw new Error(ex);
+
+ private boolean init = false;
+
+ private void init() {
+ if (!init) {
+ try {
+ String siteName = "www.intel.com";
+ InetAddress addr = InetAddress.getByName(siteName);
+ String siteIP = addr.getHostAddress();
+
+ urlSite = new URL("http://"+siteName+"");
+ urlDir = new URL("http://"+siteName+"/drl_test");
+ urlDirOtherSite = new URL("http://www.any-other-site-which-is-not-siteName.com/drl_test");
+
+ urlDir_port80 = new URL("http://"+siteName+":80/drl_test");
+ urlDir_port81 = new URL("http://"+siteName+":81/drl_test");
+ urlDirWithSlash = new URL(urlDir + "/");
+
+ //urlDirFtp = new URL("ftp://www.intel.com/drl_test");
+ urlDir_FileProtocol = new URL("file://"+siteName+"/drl_test");
+
+ urlDirIP = new URL("http://"+siteIP+"/drl_test");
+
+ urlFile = new URL("http://"+siteName+"/drl_test/empty.jar");
+ urlFileWithAdditionalDirs = new URL(
+ "http://"+siteName+"/drl_test/what/ever/here/empty.jar");
+
+ urlFileDirMinus = new URL("http://"+siteName+"/drl_test/-");
+ urlFileDirStar = new URL("http://"+siteName+"/drl_test/*");
+ urlFileDirOtherDir = new URL("http://"+siteName+"/_test_drl_/*");
+
+ urlRef1 = new URL("http://"+siteName+"/drl_test/index.html#ref1");
+ urlRef2 = new URL("http://"+siteName+"/drl_test/index.html#ref2");
+ } catch (MalformedURLException ex) {
+ throw new Error(ex);
+ } catch (UnknownHostException ex) {
+ throw new Error(ex);
+ } finally {
+ init = true;
+ }
}
}
protected void setUp() throws Exception {
super.setUp();
+ init();
chain = TestCertUtils.getCertChain();
}
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/DigestExceptionTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/DigestExceptionTest.java
index f13cc92..b6f0fe2 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/DigestExceptionTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/DigestExceptionTest.java
@@ -37,18 +37,6 @@ import junit.framework.TestCase;
*/
public class DigestExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for DigestExceptionTests.
- *
- * @param arg0
- */
- public DigestExceptionTest(String arg0) {
- super(arg0);
- }
-
private static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/DigestInputStreamTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/DigestInputStreamTest.java
index 44f697b..0eed898 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/DigestInputStreamTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/DigestInputStreamTest.java
@@ -70,14 +70,6 @@ public class DigestInputStreamTest extends TestCase {
*/
private static final int MY_MESSAGE_LEN = myMessage.length;
- /**
- * Constructor for DigestInputStreamTest.
- * @param name
- */
- public DigestInputStreamTest(String name) {
- super(name);
- }
-
//
// Tests
//
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/DigestOutputStreamTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/DigestOutputStreamTest.java
index 794a10b..8309c87 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/DigestOutputStreamTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/DigestOutputStreamTest.java
@@ -75,14 +75,6 @@ public class DigestOutputStreamTest extends TestCase {
*/
private static final int MY_MESSAGE_LEN = myMessage.length;
- /**
- * Constructor for DigestInputStreamTest.
- * @param name
- */
- public DigestOutputStreamTest(String name) {
- super(name);
- }
-
//
// Tests
//
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/GeneralSecurityExceptionTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/GeneralSecurityExceptionTest.java
index 7cc9d37..5bdd450 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/GeneralSecurityExceptionTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/GeneralSecurityExceptionTest.java
@@ -38,18 +38,6 @@ import junit.framework.TestCase;
*/
public class GeneralSecurityExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for GeneralSecurityExceptionTests.
- *
- * @param arg0
- */
- public GeneralSecurityExceptionTest(String arg0) {
- super(arg0);
- }
-
private static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/Identity2Test.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/Identity2Test.java
index 962a775..1c3e5d6 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/Identity2Test.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/Identity2Test.java
@@ -244,7 +244,8 @@ public class Identity2Test extends junit.framework.TestCase {
args = {java.lang.String.class, java.security.IdentityScope.class}
)
public void test_ConstructorLjava_lang_StringLjava_security_IdentityScope() {
- String[] str = {"test", "", "!@#$%^&*()", "identity name", null};
+ String nameNull = null;
+ String[] str = {"test", "", "!@#$%^&*()", "identity name"};
IdentityScopeSubclass iss = new IdentityScopeSubclass("name");
IdentitySubclass is;
@@ -254,11 +255,19 @@ public class Identity2Test extends junit.framework.TestCase {
assertNotNull(is);
assertTrue(is instanceof Identity);
} catch (Exception e) {
+ System.out.println(e);
fail("Unexpected exception for parameter " + str[i]);
}
}
try {
+ is = new IdentitySubclass(nameNull, new IdentityScopeSubclass());
+ } catch (NullPointerException npe) {
+ } catch (Exception e) {
+ fail("Incorrect exception " + e + " was thrown");
+ }
+
+ try {
is = new IdentitySubclass("test", iss);
is = new IdentitySubclass("test", iss);
fail("KeyManagementException was not thrown");
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/IdentityScope2Test.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/IdentityScope2Test.java
index c97a7f3..3fca2fa 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/IdentityScope2Test.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/IdentityScope2Test.java
@@ -166,7 +166,8 @@ public class IdentityScope2Test extends junit.framework.TestCase {
args = {java.lang.String.class, java.security.IdentityScope.class}
)
public void test_ConstructorLjava_lang_StringLjava_security_IdentityScope() {
- String[] str = {"test", "", "!@#$%^&*()", "identity name", null};
+ String nameNull = null;
+ String[] str = {"test", "", "!@#$%^&*()", "identity name"};
IdentityScope is;
IdentityScope iss = new IdentityScopeSubclass("test scope");
@@ -181,6 +182,13 @@ public class IdentityScope2Test extends junit.framework.TestCase {
}
try {
+ is = new IdentityScopeSubclass(nameNull, new IdentityScopeSubclass());
+ } catch (NullPointerException npe) {
+ } catch (Exception e) {
+ fail("Incorrect exception " + e + " was thrown");
+ }
+
+ try {
is = new IdentityScopeSubclass("test", iss);
is = new IdentityScopeSubclass("test", iss);
fail("KeyManagementException was not thrown");
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/IdentityScopeTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/IdentityScopeTest.java
index 109c776..5b1ea7f 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/IdentityScopeTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/IdentityScopeTest.java
@@ -58,14 +58,6 @@ public class IdentityScopeTest extends TestCase {
IdentityScope is;
/**
- * Constructor for IdentityScopeTest.
- * @param arg0
- */
- public IdentityScopeTest(String arg0) {
- super(arg0);
- }
-
- /**
* Class under test for String toString()
*/
@TestTargetNew(
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/InvalidAlgorithmParameterExceptionTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/InvalidAlgorithmParameterExceptionTest.java
index a4848fd..849f29c 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/InvalidAlgorithmParameterExceptionTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/InvalidAlgorithmParameterExceptionTest.java
@@ -38,18 +38,6 @@ import junit.framework.TestCase;
*/
public class InvalidAlgorithmParameterExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for InvalidAlgorithmParameterExceptionTests.
- *
- * @param arg0
- */
- public InvalidAlgorithmParameterExceptionTest(String arg0) {
- super(arg0);
- }
-
private static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/InvalidKeyExceptionTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/InvalidKeyExceptionTest.java
index fb08d32..5f5f7da 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/InvalidKeyExceptionTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/InvalidKeyExceptionTest.java
@@ -37,18 +37,6 @@ import junit.framework.TestCase;
*/
public class InvalidKeyExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for InvalidKeyExceptionTests.
- *
- * @param arg0
- */
- public InvalidKeyExceptionTest(String arg0) {
- super(arg0);
- }
-
private static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/InvalidParameterExceptionTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/InvalidParameterExceptionTest.java
index c6442d8..c22b903 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/InvalidParameterExceptionTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/InvalidParameterExceptionTest.java
@@ -38,18 +38,6 @@ import junit.framework.TestCase;
*/
public class InvalidParameterExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for InvalidParameterExceptionTests.
- *
- * @param arg0
- */
- public InvalidParameterExceptionTest(String arg0) {
- super(arg0);
- }
-
static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/KSCallbackHandlerProtectionTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/KSCallbackHandlerProtectionTest.java
index 8c64110..056d7eb 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/KSCallbackHandlerProtectionTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/KSCallbackHandlerProtectionTest.java
@@ -46,14 +46,6 @@ import junit.framework.TestCase;
public class KSCallbackHandlerProtectionTest extends TestCase {
/**
- * Constructor for KSCallbackHandlerProtectionTest.
- * @param arg0
- */
- public KSCallbackHandlerProtectionTest(String arg0) {
- super(arg0);
- }
-
- /**
* Test for <code>KeyStore.CallbackHandlerProtection(CallbackHandler handler)</code>
* constructor
* Assertion: throws NullPointerException when handler is null
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/KSPasswordProtectionTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/KSPasswordProtectionTest.java
index 5bbe687..0c8ec0a 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/KSPasswordProtectionTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/KSPasswordProtectionTest.java
@@ -41,14 +41,6 @@ import junit.framework.TestCase;
public class KSPasswordProtectionTest extends TestCase {
/**
- * Constructor for KSPasswordProtectionTest.
- * @param arg0
- */
- public KSPasswordProtectionTest(String arg0) {
- super(arg0);
- }
-
- /**
* Test for <code>KeyStore.PasswordProtection(char[] password)</code> constructor
* and the following methods
* <code>getPassword()<code>
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/KSPrivateKeyEntryTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/KSPrivateKeyEntryTest.java
index 4be5d18..dc7880f 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/KSPrivateKeyEntryTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/KSPrivateKeyEntryTest.java
@@ -46,13 +46,6 @@ import junit.framework.TestSuite;
public class KSPrivateKeyEntryTest extends TestCase {
- /**
- * Constructor for KSPrivateKeyEntryTest.
- * @param arg0
- */
- public KSPrivateKeyEntryTest(String arg0) {
- super(arg0);
- }
private PrivateKey testPrivateKey;
private Certificate [] testChain;
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/KSSecretKeyEntryTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/KSSecretKeyEntryTest.java
index 58d7d0a..f4c995d 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/KSSecretKeyEntryTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/KSSecretKeyEntryTest.java
@@ -41,13 +41,6 @@ import junit.framework.TestCase;
public class KSSecretKeyEntryTest extends TestCase {
/**
- * Constructor for KSSecretKeyTest.
- * @param arg0
- */
- public KSSecretKeyEntryTest(String arg0) {
- super(arg0);
- }
- /**
* Test for <code>SecretKeyEntry(SecretKey secretKey)</code> constructor
* Assertion: throws NullPointerException when secretKey is null
*/
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyExceptionTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyExceptionTest.java
index b75ee68..af46c54 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyExceptionTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyExceptionTest.java
@@ -37,18 +37,6 @@ import junit.framework.TestCase;
*/
public class KeyExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for KeyExceptionTests.
- *
- * @param arg0
- */
- public KeyExceptionTest(String arg0) {
- super(arg0);
- }
-
private static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyFactorySpiTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyFactorySpiTest.java
index b8e0c85..c0f548c 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyFactorySpiTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyFactorySpiTest.java
@@ -39,15 +39,6 @@ import junit.framework.TestCase;
public class KeyFactorySpiTest extends TestCase {
/**
- * Constructor for KeyFactorySpiTest.
- *
- * @param name
- */
- public KeyFactorySpiTest(String name) {
- super(name);
- }
-
- /**
* Test for <code>KeyFactorySpi</code> constructor
* Assertion: constructs KeyFactorySpi
*/
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyManagementExceptionTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyManagementExceptionTest.java
index b0548e4..67c2284 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyManagementExceptionTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyManagementExceptionTest.java
@@ -38,18 +38,6 @@ import junit.framework.TestCase;
*/
public class KeyManagementExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for KeyManagementExceptionTests.
- *
- * @param arg0
- */
- public KeyManagementExceptionTest(String arg0) {
- super(arg0);
- }
-
private static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator1Test.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator1Test.java
index 4a61cb7..742cc13 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator1Test.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator1Test.java
@@ -51,15 +51,6 @@ import junit.framework.TestCase;
public class KeyPairGenerator1Test extends TestCase {
- /**
- * Constructor for KayPairGeneratorTest.
- *
- * @param arg0
- */
- public KeyPairGenerator1Test(String arg0) {
- super(arg0);
- }
-
private static String[] invalidValues = SpiEngUtils.invalidValues;
public static final String srvKeyPairGenerator = "KeyPairGenerator";
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator2Test.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator2Test.java
index a3b1d54..9a8c5c5 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator2Test.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator2Test.java
@@ -91,15 +91,6 @@ public class KeyPairGenerator2Test extends TestCase {
Security.insertProviderAt(mProv, 1);
}
- /**
- * Constructor for SecurityManagerFactoryTest2.
- *
- * @param arg0
- */
- public KeyPairGenerator2Test(String arg0) {
- super(arg0);
- }
-
private void checkResult(KeyPairGenerator keyPairGen, int mode)
throws InvalidAlgorithmParameterException {
AlgorithmParameterSpec pp = null;
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator3Test.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator3Test.java
index a3aa4ee..69ec7a7 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator3Test.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator3Test.java
@@ -49,15 +49,6 @@ import junit.framework.TestCase;
public class KeyPairGenerator3Test extends TestCase {
- /**
- * Constructor for KeyPairGenerator3Test.
- *
- * @param arg0
- */
- public KeyPairGenerator3Test(String arg0) {
- super(arg0);
- }
-
private static String validProviderName = null;
public static Provider validProvider = null;
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairGeneratorSpiTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairGeneratorSpiTest.java
index fb67c6f..8d75921 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairGeneratorSpiTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairGeneratorSpiTest.java
@@ -46,15 +46,6 @@ import junit.framework.TestCase;
public class KeyPairGeneratorSpiTest extends TestCase {
/**
- * Constructor for KeyPairGeneratorSpiTest.
- *
- * @param arg0
- */
- public KeyPairGeneratorSpiTest(String arg0) {
- super(arg0);
- }
-
- /**
* Test for <code>KeyPairGeneratorSpi</code> constructor
* Assertion: constructs KeyPairGeneratorSpi
*/
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairTest.java
index 1f54198..a428334 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyPairTest.java
@@ -69,13 +69,6 @@ public class KeyPairTest extends TestCase {
}
}
- /**
- * Constructor for KeyPairTest.
- * @param name
- */
- public KeyPairTest(String name) {
- super(name);
- }
/**
* Test #1 for <code>KeyPair(PublicKey, PrivateKey)</code> constructor<br>
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyStore4Test.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyStore4Test.java
index 2889a7b..bf5b136 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyStore4Test.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyStore4Test.java
@@ -695,7 +695,7 @@ public class KeyStore4Test extends TestCase {
)
public void testGetProvider() {
assertNotNull(keyStore.getProvider());
- assertSame(provider, keyStore.getProvider());
+ assertEquals("not equal", provider, keyStore.getProvider());
}
}
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyStoreExceptionTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyStoreExceptionTest.java
index 27f6b60..ac62d58 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyStoreExceptionTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyStoreExceptionTest.java
@@ -37,18 +37,6 @@ import junit.framework.TestCase;
*/
public class KeyStoreExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for KeyStoreExceptionTests.
- *
- * @param arg0
- */
- public KeyStoreExceptionTest(String arg0) {
- super(arg0);
- }
-
private static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyStoreSpiTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyStoreSpiTest.java
index f0b2f3e..2ccca0e 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyStoreSpiTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyStoreSpiTest.java
@@ -161,15 +161,6 @@ import java.util.Date;
public class KeyStoreSpiTest extends TestCase {
- /**
- * Constructor for KeyStoreSpi.
- *
- * @param arg0
- */
- public KeyStoreSpiTest(String arg0) {
- super(arg0);
- }
-
@SuppressWarnings("cast")
@TestTargetNew(
level = TestLevel.COMPLETE,
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyStoreTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyStoreTest.java
index e49611c..d7ae43f 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyStoreTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyStoreTest.java
@@ -22,7 +22,6 @@
package org.apache.harmony.security.tests.java.security;
-import dalvik.annotation.KnownFailure;
import dalvik.annotation.TestTargetClass;
import dalvik.annotation.TestTargets;
import dalvik.annotation.TestLevel;
@@ -267,7 +266,6 @@ public class KeyStoreTest extends TestCase {
method = "getPassword",
args = {}
)
- @KnownFailure("the password char[] is not cloned in the constructor of PasswordProtection")
public void testKeyStorePPGetPassword() {
// Regression for HARMONY-1539
// no exception expected
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyTest.java
index 2fa48ab..ddbddc4 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/KeyTest.java
@@ -39,15 +39,6 @@ import junit.framework.TestCase;
public class KeyTest extends TestCase {
/**
- * Constructor for KeyTest.
- *
- * @param arg0
- */
- public KeyTest(String arg0) {
- super(arg0);
- }
-
- /**
* Test for <code>serialVersionUID</code> field
*/
@TestTargetNew(
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/NoSuchAlgorithmExceptionTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/NoSuchAlgorithmExceptionTest.java
index 8074591..9a6b457 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/NoSuchAlgorithmExceptionTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/NoSuchAlgorithmExceptionTest.java
@@ -38,18 +38,6 @@ import junit.framework.TestCase;
*/
public class NoSuchAlgorithmExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for NoSuchAlgorithmExceptionTests.
- *
- * @param arg0
- */
- public NoSuchAlgorithmExceptionTest(String arg0) {
- super(arg0);
- }
-
private static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/NoSuchProviderExceptionTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/NoSuchProviderExceptionTest.java
index a67fdc0..7cb1558 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/NoSuchProviderExceptionTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/NoSuchProviderExceptionTest.java
@@ -38,18 +38,6 @@ import junit.framework.TestCase;
*/
public class NoSuchProviderExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for NoSuchProviderExceptionTests.
- *
- * @param arg0
- */
- public NoSuchProviderExceptionTest(String arg0) {
- super(arg0);
- }
-
static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/PermissionCollectionTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/PermissionCollectionTest.java
index f1369b4..82815eb 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/PermissionCollectionTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/PermissionCollectionTest.java
@@ -27,7 +27,6 @@ import dalvik.annotation.TestTargets;
import dalvik.annotation.TestLevel;
import dalvik.annotation.TestTargetNew;
-import java.security.AllPermission;
import java.security.Permission;
import java.security.PermissionCollection;
import java.util.*;
@@ -41,32 +40,26 @@ import junit.framework.TestCase;
public class PermissionCollectionTest extends TestCase {
- public static void main(String[] args) {
- junit.textui.TestRunner.run(PermissionCollectionTest.class);
- }
-
- /**
- * Constructor for PermissionCollectionTest.
- * @param arg0
- */
- public PermissionCollectionTest(String arg0) {
- super(arg0);
- }
-
// Bare extension to instantiate abstract PermissionCollection class
private static final class RealPermissionCollection extends PermissionCollection
{
- final private Collection col;
- public RealPermissionCollection(Collection col)
+ final private Set <Permission> setCol = new HashSet<Permission>();
+ public RealPermissionCollection(Set <Permission> col)
{
- this.col = col;
+ if (col != null) {
+ setCol.addAll(col);
+ }
+ }
+
+ public void add(Permission permission) {
+ if (!setCol.add(permission)) {
+ throw new IllegalArgumentException("permission is not added");
+ }
}
-
- public void add(Permission permission) {}
public Enumeration elements()
{
- return col == null ? null : Collections.enumeration(col);
+ return setCol == null ? null : Collections.enumeration(setCol);
}
public boolean implies(Permission permission)
@@ -107,12 +100,37 @@ public class PermissionCollectionTest extends TestCase {
args = {}
)
public void testToString() {
- PermissionCollection pc = new RealPermissionCollection(null);
+ Set<Permission> perm = new HashSet<Permission>();
+ Permission p = new RealPermission("TestPermission");
+ perm.add(p);
+ PermissionCollection pc = new RealPermissionCollection(perm);
try {
String str = pc.toString();
assertNotNull("toString return null", str);
} catch (Exception e) {
- fail("Unexpected exception");
+ fail("Unexpected exception " + e);
}
}
}
+
+class RealPermission extends Permission {
+
+ public RealPermission(String name) {
+ super(name);
+ }
+
+ public boolean equals(Object obj) {
+ return false;
+ }
+
+ public String getActions() {
+ return null;
+ }
+ public int hashCode() {
+ return 0;
+ }
+
+ public boolean implies(Permission permission) {
+ return false;
+ }
+}
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/PermissionTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/PermissionTest.java
index 5707ef2..85d4851 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/PermissionTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/PermissionTest.java
@@ -44,15 +44,6 @@ public class PermissionTest extends TestCase {
junit.textui.TestRunner.run(PermissionTest.class);
}
- /**
- * Constructor for PermissionTest.
- *
- * @param arg0
- */
- public PermissionTest(String arg0) {
- super(arg0);
- }
-
// Bare extension to instantiate abstract Permission class
static final class RealPermission extends Permission {
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/PrivateKeyTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/PrivateKeyTest.java
index fbb4fea..b968a03 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/PrivateKeyTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/PrivateKeyTest.java
@@ -38,15 +38,6 @@ import junit.framework.TestCase;
public class PrivateKeyTest extends TestCase {
/**
- * Constructor for PrivateKeyTest.
- *
- * @param arg0
- */
- public PrivateKeyTest(String arg0) {
- super(arg0);
- }
-
- /**
* Test for <code>serialVersionUID</code> field
*/
@TestTargetNew(
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/ProviderExceptionTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/ProviderExceptionTest.java
index 0aba8e4..2350679 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/ProviderExceptionTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/ProviderExceptionTest.java
@@ -37,18 +37,6 @@ import junit.framework.TestCase;
*/
public class ProviderExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for ProviderExceptionTests.
- *
- * @param arg0
- */
- public ProviderExceptionTest(String arg0) {
- super(arg0);
- }
-
private static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/ProviderTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/ProviderTest.java
index 9e87833..fafd6e3 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/ProviderTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/ProviderTest.java
@@ -408,7 +408,6 @@ public class ProviderTest extends TestCase {
method = "remove",
args = {java.lang.Object.class}
)
- @KnownFailure("AccessController/AccessControlContext grants Permissions by default")
public final void testRemoveObject() {
Object o = p.remove("MessageDigest.SHA-1");
if (!"SomeClassName".equals(o)) {
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/PublicKeyTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/PublicKeyTest.java
index 8697880..f9efe56 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/PublicKeyTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/PublicKeyTest.java
@@ -22,14 +22,12 @@
package org.apache.harmony.security.tests.java.security;
-import dalvik.annotation.TestTargetClass;
-import dalvik.annotation.TestTargets;
-import dalvik.annotation.TestLevel;
-import dalvik.annotation.TestTargetNew;
-
import java.security.PublicKey;
import junit.framework.TestCase;
+import dalvik.annotation.TestLevel;
+import dalvik.annotation.TestTargetClass;
+import dalvik.annotation.TestTargetNew;
@TestTargetClass(PublicKey.class)
/**
* Tests for <code>PublicKey</code> class field
@@ -38,16 +36,6 @@ import junit.framework.TestCase;
public class PublicKeyTest extends TestCase {
-
- /**
- * Constructor for PublicKeyTest.
- *
- * @param arg0
- */
- public PublicKeyTest(String arg0) {
- super(arg0);
- }
-
/**
* Test for <code>serialVersionUID</code> field
*/
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/SecureRandomSpiTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/SecureRandomSpiTest.java
index f569684..8ca84b9 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/SecureRandomSpiTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/SecureRandomSpiTest.java
@@ -35,15 +35,6 @@ import junit.framework.TestCase;
public class SecureRandomSpiTest extends TestCase {
/**
- * Constructor for SecureRandomSpiTest.
- *
- * @param name
- */
- public SecureRandomSpiTest(String name) {
- super(name);
- }
-
- /**
* Test for <code>SecureRandomSpi</code> constructor
* Assertion: constructs SecureRandomSpi
*/
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/SecurityPermissionTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/SecurityPermissionTest.java
index 211f666..2531c81 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/SecurityPermissionTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/SecurityPermissionTest.java
@@ -42,14 +42,6 @@ public class SecurityPermissionTest extends TestCase {
}
/**
- * Constructor for SecurityPermissionTest.
- * @param arg0
- */
- public SecurityPermissionTest(String arg0) {
- super(arg0);
- }
-
- /**
* Check all constructors: an object is created with the specified valid name.
* If name equal null then NPE should be thrown.
* If name is empty then IAE should be thrown.
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/SignatureExceptionTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/SignatureExceptionTest.java
index 959b452..5e2bfe3 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/SignatureExceptionTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/SignatureExceptionTest.java
@@ -37,18 +37,6 @@ import junit.framework.TestCase;
*/
public class SignatureExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for SignatureExceptionTests.
- *
- * @param arg0
- */
- public SignatureExceptionTest(String arg0) {
- super(arg0);
- }
-
private static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/SignatureTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/SignatureTest.java
index 0a08069..3bfc664 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/SignatureTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/SignatureTest.java
@@ -512,20 +512,27 @@ public class SignatureTest extends TestCase {
assertTrue("update() failed", s.runEngineUpdate2);
try {
- s.update(b, 3, 0);
- } catch (SignatureException e) {
- fail("unexpected: " + e);
+ s.update(null, 0, 3);
+ fail("NullPointerException wasn't thrown");
+ } catch (NullPointerException npe) {
}
try {
- s.update(b, 2, 4);
+ s.update(b, 3, 0);
fail("expected IllegalArgumentException");
} catch (IllegalArgumentException e) {
// ok
}
try {
- s.update(null, 0, 5);
+ s.update(b, 0, b.length + 1);
+ fail("expected IllegalArgumentException");
+ } catch (IllegalArgumentException e) {
+ // ok
+ }
+
+ try {
+ s.update(b, -1, b.length);
fail("expected IllegalArgumentException");
} catch (IllegalArgumentException e) {
// ok
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/SignerTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/SignerTest.java
index 7eda819..898ab17 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/SignerTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/SignerTest.java
@@ -63,14 +63,6 @@ public class SignerTest extends TestCase {
}
/**
- * Constructor for SignerTest.
- * @param arg0
- */
- public SignerTest(String arg0) {
- super(arg0);
- }
-
- /**
* @tests java.security.Signer#toString()
*/
@TestTargetNew(
@@ -86,7 +78,8 @@ public class SignerTest extends TestCase {
Signer s2 = new SignerStub("testToString2", IdentityScope.getSystemScope());
s2.toString();
- KeyPair kp = new KeyPair(new PublicKeyStub("public", "SignerTest.testToString", null), new PrivateKeyStub("private", "SignerTest.testToString", null));
+ KeyPair kp = new KeyPair(new PublicKeyStub("public", "SignerTest.testToString", null),
+ new PrivateKeyStub("private", "SignerTest.testToString", null));
s1.setKeyPair(kp);
s1.toString();
@@ -198,15 +191,17 @@ public class SignerTest extends TestCase {
System.setSecurityManager(sm);
try {
Signer s = new SignerStub("sss6");
- s.setKeyPair(new KeyPair(new PublicKeyStub("public", "fff", null), new PrivateKeyStub("private", "fff", null)));
+ s.setKeyPair(new KeyPair(new PublicKeyStub("public", "fff", null), new PrivateKeyStub(
+ "private", "fff", null)));
try {
s.getPrivateKey();
fail("SecurityException should be thrown");
- } catch (SecurityException ok) {}
+ } catch (SecurityException ok) {
+ }
} finally {
System.setSecurityManager(null);
}
-
+
}
/**
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/UnrecoverableEntryExceptionTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/UnrecoverableEntryExceptionTest.java
index c985ef8..96b0847 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/UnrecoverableEntryExceptionTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/UnrecoverableEntryExceptionTest.java
@@ -38,15 +38,6 @@ import junit.framework.TestCase;
public class UnrecoverableEntryExceptionTest extends TestCase {
- /**
- * Constructor for UnrecoverableEntryExceptionTest.
- *
- * @param arg0
- */
- public UnrecoverableEntryExceptionTest(String arg0) {
- super(arg0);
- }
-
static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/org/apache/harmony/security/tests/java/security/UnrecoverableKeyExceptionTest.java b/security/src/test/java/org/apache/harmony/security/tests/java/security/UnrecoverableKeyExceptionTest.java
index d1dd78b..dda3231 100644
--- a/security/src/test/java/org/apache/harmony/security/tests/java/security/UnrecoverableKeyExceptionTest.java
+++ b/security/src/test/java/org/apache/harmony/security/tests/java/security/UnrecoverableKeyExceptionTest.java
@@ -38,18 +38,6 @@ import junit.framework.TestCase;
*/
public class UnrecoverableKeyExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for UnrecoverableKeyExceptionTests.
- *
- * @param arg0
- */
- public UnrecoverableKeyExceptionTest(String arg0) {
- super(arg0);
- }
-
static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/tests/api/java/security/AccessControlContextTest.java b/security/src/test/java/tests/api/java/security/AccessControlContextTest.java
index c77647c..9831472 100644
--- a/security/src/test/java/tests/api/java/security/AccessControlContextTest.java
+++ b/security/src/test/java/tests/api/java/security/AccessControlContextTest.java
@@ -17,7 +17,6 @@
package tests.api.java.security;
-import dalvik.annotation.KnownFailure;
import dalvik.annotation.TestLevel;
import dalvik.annotation.TestTargetClass;
import dalvik.annotation.TestTargetNew;
@@ -251,7 +250,6 @@ public class AccessControlContextTest extends junit.framework.TestCase {
method = "equals",
args = {java.lang.Object.class}
)
- @KnownFailure("AccessControlContext.equals() doesn't compare the DomainCombiner")
public void test_equals() {
final Permission perm1 = new PropertyPermission("java.class.path",
"read");
diff --git a/security/src/test/java/tests/api/javax/security/auth/PrivateCredentialPermissionTest.java b/security/src/test/java/tests/api/javax/security/auth/PrivateCredentialPermissionTest.java
index 27402f2..8e45657 100644
--- a/security/src/test/java/tests/api/javax/security/auth/PrivateCredentialPermissionTest.java
+++ b/security/src/test/java/tests/api/javax/security/auth/PrivateCredentialPermissionTest.java
@@ -239,7 +239,7 @@ public class PrivateCredentialPermissionTest extends TestCase {
}
- PrivateCredentialPermission p3 = new PrivateCredentialPermission(name2, "read");
+ PrivateCredentialPermission p3 = new PrivateCredentialPermission(name4, "read");
assertFalse("hashCode() must not be the same for non-equal PrivateCredentialPermission objects", p1.hashCode() == p3.hashCode());
}
diff --git a/security/src/test/java/tests/api/javax/security/cert/CertificateEncodingExceptionTest.java b/security/src/test/java/tests/api/javax/security/cert/CertificateEncodingExceptionTest.java
index a14a46c..1bec4ce 100644
--- a/security/src/test/java/tests/api/javax/security/cert/CertificateEncodingExceptionTest.java
+++ b/security/src/test/java/tests/api/javax/security/cert/CertificateEncodingExceptionTest.java
@@ -38,18 +38,6 @@ import javax.security.cert.CertificateEncodingException;
@TestTargetClass(CertificateEncodingException.class)
public class CertificateEncodingExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for CertificateEncodingExceptionTests.
- *
- * @param arg0
- */
- public CertificateEncodingExceptionTest(String arg0) {
- super(arg0);
- }
-
static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/tests/api/javax/security/cert/CertificateExceptionTest.java b/security/src/test/java/tests/api/javax/security/cert/CertificateExceptionTest.java
index 896b6bd..6641097 100644
--- a/security/src/test/java/tests/api/javax/security/cert/CertificateExceptionTest.java
+++ b/security/src/test/java/tests/api/javax/security/cert/CertificateExceptionTest.java
@@ -39,18 +39,6 @@ import javax.security.cert.CertificateException;
@TestTargetClass(CertificateException.class)
public class CertificateExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for CertificateExceptionTests.
- *
- * @param arg0
- */
- public CertificateExceptionTest(String arg0) {
- super(arg0);
- }
-
static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/tests/api/javax/security/cert/CertificateExpiredExceptionTest.java b/security/src/test/java/tests/api/javax/security/cert/CertificateExpiredExceptionTest.java
index 7578dee..83af35c 100644
--- a/security/src/test/java/tests/api/javax/security/cert/CertificateExpiredExceptionTest.java
+++ b/security/src/test/java/tests/api/javax/security/cert/CertificateExpiredExceptionTest.java
@@ -39,18 +39,6 @@ import javax.security.cert.CertificateExpiredException;
@TestTargetClass(CertificateExpiredException.class)
public class CertificateExpiredExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for CertificateExpiredExceptionTests.
- *
- * @param arg0
- */
- public CertificateExpiredExceptionTest(String arg0) {
- super(arg0);
- }
-
static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/tests/api/javax/security/cert/CertificateNotYetValidExceptionTest.java b/security/src/test/java/tests/api/javax/security/cert/CertificateNotYetValidExceptionTest.java
index 8a212e6..09fb186 100644
--- a/security/src/test/java/tests/api/javax/security/cert/CertificateNotYetValidExceptionTest.java
+++ b/security/src/test/java/tests/api/javax/security/cert/CertificateNotYetValidExceptionTest.java
@@ -39,18 +39,6 @@ import javax.security.cert.CertificateNotYetValidException;
@TestTargetClass(CertificateNotYetValidException.class)
public class CertificateNotYetValidExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for CertificateNotYetValidExceptionTests.
- *
- * @param arg0
- */
- public CertificateNotYetValidExceptionTest(String arg0) {
- super(arg0);
- }
-
static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/tests/api/javax/security/cert/CertificateParsingExceptionTest.java b/security/src/test/java/tests/api/javax/security/cert/CertificateParsingExceptionTest.java
index d8bef51..c00d0dd 100644
--- a/security/src/test/java/tests/api/javax/security/cert/CertificateParsingExceptionTest.java
+++ b/security/src/test/java/tests/api/javax/security/cert/CertificateParsingExceptionTest.java
@@ -39,17 +39,6 @@ import javax.security.cert.CertificateParsingException;
@TestTargetClass(CertificateParsingException.class)
public class CertificateParsingExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for CertificateParsingExceptionTests.
- *
- * @param arg0
- */
- public CertificateParsingExceptionTest(String arg0) {
- super(arg0);
- }
static String[] msgs = {
"",
diff --git a/security/src/test/java/tests/api/javax/security/cert/X509CertificateTest.java b/security/src/test/java/tests/api/javax/security/cert/X509CertificateTest.java
index 8f521f9..dac0633 100644
--- a/security/src/test/java/tests/api/javax/security/cert/X509CertificateTest.java
+++ b/security/src/test/java/tests/api/javax/security/cert/X509CertificateTest.java
@@ -764,9 +764,9 @@ public class X509CertificateTest extends TestCase {
@TestTargetNew(
level = TestLevel.SUFFICIENT,
notes = " CertificateException not supported."+
- "NoSuchAlgorithmException, NoSuchProviderException can be "+
- "implemented only with working Cert. Verification fails (see failing) "+
- "precondition assertions",
+ "NoSuchAlgorithmException, NoSuchProviderException can be "+
+ "implemented only with working Cert. Verification fails (see failing) "+
+ "precondition assertions",
method = "verify",
args = {java.security.PublicKey.class}
)
@@ -779,9 +779,9 @@ public class X509CertificateTest extends TestCase {
assertNotNull(javaxCert.getPublicKey());
assertNotNull(javaxSSCert.getPublicKey());
//precondition for self signed certificates
- assertEquals(((X509Certificate) javaxSSCert).getIssuerDN().getName(),
- ((X509Certificate) javaxSSCert).getSubjectDN());
-
+ /*assertEquals(((X509Certificate) javaxSSCert).getIssuerDN().getName(),
+ ((X509Certificate) javaxSSCert).getSubjectDN());*/
+
// must always evaluate true for self signed
// here not self signed:
try {
diff --git a/security/src/test/java/tests/java/security/AlgorithmParameterGeneratorSpiTest.java b/security/src/test/java/tests/java/security/AlgorithmParameterGeneratorSpiTest.java
index 590e0b5..976a9cb 100644
--- a/security/src/test/java/tests/java/security/AlgorithmParameterGeneratorSpiTest.java
+++ b/security/src/test/java/tests/java/security/AlgorithmParameterGeneratorSpiTest.java
@@ -45,15 +45,6 @@ import junit.framework.TestCase;
public class AlgorithmParameterGeneratorSpiTest extends TestCase {
/**
- * Constructor for CertPathBuilderTests.
- *
- * @param name
- */
- public AlgorithmParameterGeneratorSpiTest(String name) {
- super(name);
- }
-
- /**
* Test for <code>AlgorithmParameterGeneratorSpi</code> constructor
* Assertion: constructs AlgorithmParameterGeneratorSpi
*/
diff --git a/security/src/test/java/tests/java/security/AllPermissionTest.java b/security/src/test/java/tests/java/security/AllPermissionTest.java
index fa1d24d..e9668ad 100644
--- a/security/src/test/java/tests/java/security/AllPermissionTest.java
+++ b/security/src/test/java/tests/java/security/AllPermissionTest.java
@@ -45,14 +45,6 @@ public class AllPermissionTest extends TestCase {
}
/**
- * Constructor for AllPermissionsTest.
- * @param arg0
- */
- public AllPermissionTest(String arg0) {
- super(arg0);
- }
-
- /**
* Test all constructors: an object is created, name and actions are ignored
*/
@TestTargets({
diff --git a/security/src/test/java/tests/java/security/BasicPermissionTest.java b/security/src/test/java/tests/java/security/BasicPermissionTest.java
index 735871b..4987ab4 100644
--- a/security/src/test/java/tests/java/security/BasicPermissionTest.java
+++ b/security/src/test/java/tests/java/security/BasicPermissionTest.java
@@ -44,14 +44,6 @@ public class BasicPermissionTest extends TestCase {
}
/**
- * Constructor for BasicPermissionTest.
- * @param arg0
- */
- public BasicPermissionTest(String arg0) {
- super(arg0);
- }
-
- /**
* Check all constructors: an object is created with the specified valid name.
* If name equal null then NPE should be thrown.
* If name is empty then IAE should be thrown.
diff --git a/security/src/test/java/tests/java/security/IdentityTest.java b/security/src/test/java/tests/java/security/IdentityTest.java
index 24ad095..3566ecf 100644
--- a/security/src/test/java/tests/java/security/IdentityTest.java
+++ b/security/src/test/java/tests/java/security/IdentityTest.java
@@ -60,14 +60,6 @@ public class IdentityTest extends TestCase {
junit.textui.TestRunner.run(IdentityTest.class);
}
- /**
- * Constructor for IdentityTest.
- * @param name
- */
- public IdentityTest(String name) {
- super(name);
- }
-
@TestTargetNew(
level = TestLevel.PARTIAL,
notes = "Method's returned variable is not checked",
diff --git a/security/src/test/java/tests/security/AllTests.java b/security/src/test/java/tests/security/AllTests.java
index 19d87a1..2ce2db0 100644
--- a/security/src/test/java/tests/security/AllTests.java
+++ b/security/src/test/java/tests/security/AllTests.java
@@ -40,7 +40,7 @@ public class AllTests {
suite.addTest(tests.security.interfaces.AllTests.suite());
suite.addTest(tests.security.spec.AllTests.suite());
- suite.addTestSuite(tests.security.SecurityPermissionsTest.class);
+ suite.addTest(tests.security.SecurityPermissionsTest.suite());
suite.addTest(tests.api.javax.security.cert.AllTests.suite());
diff --git a/security/src/test/java/tests/security/acl/IAclEntryTest.java b/security/src/test/java/tests/security/acl/IAclEntryTest.java
index 98c0a87..94ddf14 100644
--- a/security/src/test/java/tests/security/acl/IAclEntryTest.java
+++ b/security/src/test/java/tests/security/acl/IAclEntryTest.java
@@ -35,16 +35,6 @@ import org.apache.harmony.security.tests.support.acl.*;
@TestTargetClass(AclEntry.class)
public class IAclEntryTest extends TestCase {
- /**
- * Constructor for IAclEntryTest.
- *
- * @param arg0
- */
- public IAclEntryTest(String arg0) {
- super(arg0);
- }
-
-
class MyAclEntry extends AclEntryImpl {
public MyAclEntry() {
super();
diff --git a/security/src/test/java/tests/security/acl/IAclTest.java b/security/src/test/java/tests/security/acl/IAclTest.java
index 3cebcfa..65cb971 100644
--- a/security/src/test/java/tests/security/acl/IAclTest.java
+++ b/security/src/test/java/tests/security/acl/IAclTest.java
@@ -37,15 +37,6 @@ import org.apache.harmony.security.tests.support.acl.*;
@TestTargetClass(Acl.class)
public class IAclTest extends TestCase {
- /**
- * Constructor for IAclEntryTest.
- *
- * @param arg0
- */
- public IAclTest(String arg0) {
- super(arg0);
- }
-
class MyAcl extends AclImpl {
public MyAcl(Principal principal, String str) {
super(principal, str);
diff --git a/security/src/test/java/tests/security/acl/IGroupTest.java b/security/src/test/java/tests/security/acl/IGroupTest.java
index 7efec28..47eac93 100644
--- a/security/src/test/java/tests/security/acl/IGroupTest.java
+++ b/security/src/test/java/tests/security/acl/IGroupTest.java
@@ -33,15 +33,6 @@ import org.apache.harmony.security.tests.support.acl.*;
@TestTargetClass(Group.class)
public class IGroupTest extends TestCase {
- /**
- * Constructor for IOwnerTest.
- *
- * @param arg0
- */
- public IGroupTest(String arg0) {
- super(arg0);
- }
-
class MyGroup extends GroupImpl {
public MyGroup(String str) {
super(str);
diff --git a/security/src/test/java/tests/security/acl/IOwnerTest.java b/security/src/test/java/tests/security/acl/IOwnerTest.java
index 5324d4d..3cb222d 100644
--- a/security/src/test/java/tests/security/acl/IOwnerTest.java
+++ b/security/src/test/java/tests/security/acl/IOwnerTest.java
@@ -34,15 +34,6 @@ import org.apache.harmony.security.tests.support.acl.*;
@TestTargetClass(Owner.class)
public class IOwnerTest extends TestCase {
- /**
- * Constructor for IOwnerTest.
- *
- * @param arg0
- */
- public IOwnerTest(String arg0) {
- super(arg0);
- }
-
class MyOwner extends OwnerImpl {
public MyOwner(Principal pr) {
super(pr);
diff --git a/security/src/test/java/tests/security/acl/IPermissionTest.java b/security/src/test/java/tests/security/acl/IPermissionTest.java
index 19f18ea..17cd7a9 100644
--- a/security/src/test/java/tests/security/acl/IPermissionTest.java
+++ b/security/src/test/java/tests/security/acl/IPermissionTest.java
@@ -31,15 +31,6 @@ import org.apache.harmony.security.tests.support.acl.*;
@TestTargetClass(Permission.class)
public class IPermissionTest extends TestCase {
- /**
- * Constructor for IPermissionTest.
- *
- * @param arg0
- */
- public IPermissionTest(String arg0) {
- super(arg0);
- }
-
class MyPermission extends PermissionImpl {
public MyPermission(String str) {
super(str);
diff --git a/security/src/test/java/tests/security/cert/CRLExceptionTest.java b/security/src/test/java/tests/security/cert/CRLExceptionTest.java
index c43ef36..3fc37c0 100644
--- a/security/src/test/java/tests/security/cert/CRLExceptionTest.java
+++ b/security/src/test/java/tests/security/cert/CRLExceptionTest.java
@@ -38,18 +38,6 @@ import java.security.cert.CRLException;
@TestTargetClass(CRLException.class)
public class CRLExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for CRLExceptionTests.
- *
- * @param arg0
- */
- public CRLExceptionTest(String arg0) {
- super(arg0);
- }
-
private static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/tests/security/cert/CRLTest.java b/security/src/test/java/tests/security/cert/CRLTest.java
index e46a033..8e5693e 100644
--- a/security/src/test/java/tests/security/cert/CRLTest.java
+++ b/security/src/test/java/tests/security/cert/CRLTest.java
@@ -45,14 +45,6 @@ public class CRLTest extends TestCase {
private final static String[] invalidValues = SpiEngUtils.invalidValues;
- /**
- * Constructor for CRLTest.
- * @param name
- */
- public CRLTest(String name) {
- super(name);
- }
-
//
// Tests
//
diff --git a/security/src/test/java/tests/security/cert/CertPathBuilder1Test.java b/security/src/test/java/tests/security/cert/CertPathBuilder1Test.java
index 7f5674d..5af75c2 100644
--- a/security/src/test/java/tests/security/cert/CertPathBuilder1Test.java
+++ b/security/src/test/java/tests/security/cert/CertPathBuilder1Test.java
@@ -53,13 +53,6 @@ import java.security.cert.CertificateException;
@TestTargetClass(CertPathBuilder.class)
public class CertPathBuilder1Test extends TestCase {
- /**
- * Constructor for CertPathBuilderTests.
- * @param name
- */
- public CertPathBuilder1Test(String name) {
- super(name);
- }
public static final String srvCertPathBuilder = "CertPathBuilder";
public static final String defaultType = "PKIX";
@@ -398,6 +391,7 @@ public class CertPathBuilder1Test extends TestCase {
method="build",
args={CertPathParameters.class}
)
+ // Test passed on RI
public void testBuild() throws Exception {
TestUtils.initCertPathSSCertChain();
CertPathParameters params = TestUtils.getCertPathParameters();
diff --git a/security/src/test/java/tests/security/cert/CertPathBuilder2Test.java b/security/src/test/java/tests/security/cert/CertPathBuilder2Test.java
index 3d4f4cf..fcf235e 100644
--- a/security/src/test/java/tests/security/cert/CertPathBuilder2Test.java
+++ b/security/src/test/java/tests/security/cert/CertPathBuilder2Test.java
@@ -82,15 +82,6 @@ public class CertPathBuilder2Test extends TestCase {
Security.removeProvider(mProv.getName());
}
- /**
- * Constructor for CertPathBuilder2Test.
- *
- * @param arg0
- */
- public CertPathBuilder2Test(String arg0) {
- super(arg0);
- }
-
private void checkResult(CertPathBuilder certBuild)
throws InvalidAlgorithmParameterException,
CertPathBuilderException {
diff --git a/security/src/test/java/tests/security/cert/CertPathBuilderExceptionTest.java b/security/src/test/java/tests/security/cert/CertPathBuilderExceptionTest.java
index f8aeb08..efd575a 100644
--- a/security/src/test/java/tests/security/cert/CertPathBuilderExceptionTest.java
+++ b/security/src/test/java/tests/security/cert/CertPathBuilderExceptionTest.java
@@ -40,18 +40,6 @@ import java.security.cert.CertPathBuilderException;
@TestTargetClass(CertPathBuilderException.class)
public class CertPathBuilderExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for CertPathBuilderExceptionTests.
- *
- * @param arg0
- */
- public CertPathBuilderExceptionTest(String arg0) {
- super(arg0);
- }
-
private static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/tests/security/cert/CertPathBuilderSpiTest.java b/security/src/test/java/tests/security/cert/CertPathBuilderSpiTest.java
index 338060d..751f0c6 100644
--- a/security/src/test/java/tests/security/cert/CertPathBuilderSpiTest.java
+++ b/security/src/test/java/tests/security/cert/CertPathBuilderSpiTest.java
@@ -45,15 +45,6 @@ import org.apache.harmony.security.tests.support.cert.MyCertPathBuilderSpi;
public class CertPathBuilderSpiTest extends TestCase {
/**
- * Constructor for CertPathBuilderSpiTest.
- *
- * @param arg0
- */
- public CertPathBuilderSpiTest(String arg0) {
- super(arg0);
- }
-
- /**
* Test for <code>CertPathBuilderSpi</code> constructor Assertion:
* constructs CertPathBuilderSpi
*/
diff --git a/security/src/test/java/tests/security/cert/CertPathCertPathRepTest.java b/security/src/test/java/tests/security/cert/CertPathCertPathRepTest.java
index 0e607c5..6ca848e 100644
--- a/security/src/test/java/tests/security/cert/CertPathCertPathRepTest.java
+++ b/security/src/test/java/tests/security/cert/CertPathCertPathRepTest.java
@@ -51,8 +51,8 @@ public class CertPathCertPathRepTest extends TestCase {
}
@TestTargetNew(
- level = TestLevel.PARTIAL,
- notes = "ObjectStreamException checking missed",
+ level = TestLevel.PARTIAL_COMPLETE,
+ notes = "Checks ObjectStreamException",
method = "CertPath.CertPathRep.readResolve",
args = {}
)
@@ -62,9 +62,9 @@ public class CertPathCertPathRepTest extends TestCase {
try {
Object obj = rep.readResolve();
- assertTrue(obj instanceof CertPath);
+ fail("ObjectStreamException was not thrown.");
} catch (ObjectStreamException e) {
- fail("unexpected exception: " + e);
+ //expected
}
rep = cp.new MyCertPathRep("MyEncoding", new byte[] {(byte) 1, (byte) 2, (byte) 3 });
diff --git a/security/src/test/java/tests/security/cert/CertPathTest.java b/security/src/test/java/tests/security/cert/CertPathTest.java
index 10095ec..5edb3f5 100644
--- a/security/src/test/java/tests/security/cert/CertPathTest.java
+++ b/security/src/test/java/tests/security/cert/CertPathTest.java
@@ -341,6 +341,7 @@ public class CertPathTest extends TestCase {
args = {}
)
})
+ // Test passed on RI
public void testSerializationSelf() throws Exception {
TestUtils.initCertPathSSCertChain();
CertPath certPath = TestUtils.buildCertPathSSCertChain();
@@ -371,6 +372,7 @@ public class CertPathTest extends TestCase {
args = {}
)
})
+ // Test passed on RI
public void testSerializationCompatibility() throws Exception {
TestUtils.initCertPathSSCertChain();
CertPath certPath = TestUtils.buildCertPathSSCertChain();
diff --git a/security/src/test/java/tests/security/cert/CertPathValidator1Test.java b/security/src/test/java/tests/security/cert/CertPathValidator1Test.java
index 54e210a..a76af78 100644
--- a/security/src/test/java/tests/security/cert/CertPathValidator1Test.java
+++ b/security/src/test/java/tests/security/cert/CertPathValidator1Test.java
@@ -52,13 +52,6 @@ import org.apache.harmony.security.tests.support.SpiEngUtils;
@TestTargetClass(CertPathValidator.class)
public class CertPathValidator1Test extends TestCase {
- /**
- * Constructor for CertPathValidatorTests.
- * @param name
- */
- public CertPathValidator1Test(String name) {
- super(name);
- }
public static final String srvCertPathValidator = "CertPathValidator";
private static final String defaultType = "PKIX";
diff --git a/security/src/test/java/tests/security/cert/CertPathValidator2Test.java b/security/src/test/java/tests/security/cert/CertPathValidator2Test.java
index a7e922d..3f513cc 100644
--- a/security/src/test/java/tests/security/cert/CertPathValidator2Test.java
+++ b/security/src/test/java/tests/security/cert/CertPathValidator2Test.java
@@ -16,9 +16,9 @@
*/
/**
-* @author Vera Y. Petrashkova
-* @version $Revision$
-*/
+ * @author Vera Y. Petrashkova
+ * @version $Revision$
+ */
package tests.security.cert;
@@ -42,14 +42,14 @@ import java.security.cert.CertPathParameters;
import java.security.cert.CertPathValidator;
import java.security.cert.CertPathValidatorException;
import java.security.cert.PKIXParameters;
+
/**
* Tests for CertPathValidator class constructors and methods
- *
*/
@TestTargetClass(CertPathValidator.class)
public class CertPathValidator2Test extends TestCase {
private static final String defaultAlg = "CertPB";
-
+
public static final String CertPathValidatorProviderClass = "org.apache.harmony.security.tests.support.cert.MyCertPathValidatorSpi";
private static final String[] invalidValues = SpiEngUtils.invalidValues;
@@ -69,9 +69,8 @@ public class CertPathValidator2Test extends TestCase {
protected void setUp() throws Exception {
super.setUp();
mProv = (new SpiEngUtils()).new MyProvider("MyCertPathValidatorProvider",
- "Provider for testing", CertPathValidator1Test.srvCertPathValidator
- .concat(".").concat(defaultAlg),
- CertPathValidatorProviderClass);
+ "Provider for testing", CertPathValidator1Test.srvCertPathValidator.concat(".")
+ .concat(defaultAlg), CertPathValidatorProviderClass);
Security.insertProviderAt(mProv, 1);
}
@@ -83,51 +82,37 @@ public class CertPathValidator2Test extends TestCase {
Security.removeProvider(mProv.getName());
}
- /**
- * Constructor for CertPathValidator2Test.
- *
- * @param arg0
- */
- public CertPathValidator2Test(String arg0) {
- super(arg0);
- }
-
- private void checkResult(CertPathValidator certV)
- throws CertPathValidatorException,
+ private void checkResult(CertPathValidator certV) throws CertPathValidatorException,
InvalidAlgorithmParameterException {
String dt = CertPathValidator.getDefaultType();
String propName = "certpathvalidator.type";
- for (int i = 0; i <invalidValues.length; i++) {
+ for (int i = 0; i < invalidValues.length; i++) {
Security.setProperty(propName, invalidValues[i]);
assertEquals("Incorrect default type", CertPathValidator.getDefaultType(),
invalidValues[i]);
}
Security.setProperty(propName, dt);
- assertEquals("Incorrect default type", CertPathValidator.getDefaultType(),
- dt); certV.validate(null, null);
- try {
- certV.validate(null, null);
- } catch (CertPathValidatorException e) {
- }
- try {
- certV.validate(null, null);
- } catch (InvalidAlgorithmParameterException e) {
- }
+ assertEquals("Incorrect default type", CertPathValidator.getDefaultType(), dt);
+ certV.validate(null, null);
+ try {
+ certV.validate(null, null);
+ } catch (CertPathValidatorException e) {
+ }
+ try {
+ certV.validate(null, null);
+ } catch (InvalidAlgorithmParameterException e) {
+ }
}
/**
- * Test for <code>getInstance(String algorithm)</code> method
- * Assertions:
- * throws NullPointerException when algorithm is null
- * throws NoSuchAlgorithmException when algorithm is not available
- * returns CertPathValidator object
+ * Test for <code>getInstance(String algorithm)</code> method Assertions:
+ * throws NullPointerException when algorithm is null throws
+ * NoSuchAlgorithmException when algorithm is not available returns
+ * CertPathValidator object
*/
- @TestTargetNew(
- level = TestLevel.COMPLETE,
- notes = "",
- method = "getInstance",
- args = {java.lang.String.class}
- )
+ @TestTargetNew(level = TestLevel.COMPLETE, notes = "", method = "getInstance", args = {
+ java.lang.String.class
+ })
public void testGetInstance01() throws NoSuchAlgorithmException,
InvalidAlgorithmParameterException, CertPathValidatorException {
try {
@@ -139,8 +124,8 @@ public class CertPathValidator2Test extends TestCase {
for (int i = 0; i < invalidValues.length; i++) {
try {
CertPathValidator.getInstance(invalidValues[i]);
- fail("NoSuchAlgorithmException must be thrown (type: ".concat(
- invalidValues[i]).concat(")"));
+ fail("NoSuchAlgorithmException must be thrown (type: ".concat(invalidValues[i])
+ .concat(")"));
} catch (NoSuchAlgorithmException e) {
}
}
@@ -154,23 +139,19 @@ public class CertPathValidator2Test extends TestCase {
}
/**
- * Test for <code>getInstance(String algorithm, String provider)</code> method
- * Assertions:
- * throws NullPointerException when algorithm is null
- * throws NoSuchAlgorithmException when algorithm is not available
- * throws IllegalArgumentException when provider is null or empty;
- * throws NoSuchProviderException when provider is available;
- * returns CertPathValidator object
+ * Test for <code>getInstance(String algorithm, String provider)</code>
+ * method Assertions: throws NullPointerException when algorithm is null
+ * throws NoSuchAlgorithmException when algorithm is not available throws
+ * IllegalArgumentException when provider is null or empty; throws
+ * NoSuchProviderException when provider is available; returns
+ * CertPathValidator object
*/
- @TestTargetNew(
- level = TestLevel.COMPLETE,
- notes = "",
- method = "getInstance",
- args = {java.lang.String.class, java.lang.String.class}
- )
- public void testGetInstance02() throws NoSuchAlgorithmException,
- NoSuchProviderException, IllegalArgumentException,
- InvalidAlgorithmParameterException, CertPathValidatorException {
+ @TestTargetNew(level = TestLevel.COMPLETE, notes = "", method = "getInstance", args = {
+ java.lang.String.class, java.lang.String.class
+ })
+ public void testGetInstance02() throws NoSuchAlgorithmException, NoSuchProviderException,
+ IllegalArgumentException, InvalidAlgorithmParameterException,
+ CertPathValidatorException {
try {
CertPathValidator.getInstance(null, mProv.getName());
fail("NullPointerException or NoSuchAlgorithmException must be thrown when algorithm is null");
@@ -179,10 +160,9 @@ public class CertPathValidator2Test extends TestCase {
}
for (int i = 0; i < invalidValues.length; i++) {
try {
- CertPathValidator.getInstance(invalidValues[i], mProv
- .getName());
- fail("NoSuchAlgorithmException must be thrown (type: ".concat(
- invalidValues[i]).concat(")"));
+ CertPathValidator.getInstance(invalidValues[i], mProv.getName());
+ fail("NoSuchAlgorithmException must be thrown (type: ".concat(invalidValues[i])
+ .concat(")"));
} catch (NoSuchAlgorithmException e) {
}
}
@@ -204,43 +184,33 @@ public class CertPathValidator2Test extends TestCase {
for (int i = 0; i < validValues.length; i++) {
for (int j = 1; j < invalidValues.length; j++) {
try {
- CertPathValidator.getInstance(validValues[i],
- invalidValues[j]);
- fail("NoSuchProviderException must be thrown (type: "
- .concat(validValues[i]).concat(" provider: ")
- .concat(invalidValues[j]).concat(")"));
+ CertPathValidator.getInstance(validValues[i], invalidValues[j]);
+ fail("NoSuchProviderException must be thrown (type: ".concat(validValues[i])
+ .concat(" provider: ").concat(invalidValues[j]).concat(")"));
} catch (NoSuchProviderException e) {
}
}
}
CertPathValidator cerPV;
for (int i = 0; i < validValues.length; i++) {
- cerPV = CertPathValidator.getInstance(validValues[i], mProv
- .getName());
+ cerPV = CertPathValidator.getInstance(validValues[i], mProv.getName());
assertEquals("Incorrect type", cerPV.getAlgorithm(), validValues[i]);
- assertEquals("Incorrect provider", cerPV.getProvider().getName(),
- mProv.getName());
+ assertEquals("Incorrect provider", cerPV.getProvider().getName(), mProv.getName());
checkResult(cerPV);
}
}
/**
* Test for <code>getInstance(String algorithm, Provider provider)</code>
- * method
- * Assertions:
- * throws NullPointerException when algorithm is null
- * throws NoSuchAlgorithmException when algorithm is not available
- * throws IllegalArgumentException when provider is null;
- * returns CertPathValidator object
+ * method Assertions: throws NullPointerException when algorithm is null
+ * throws NoSuchAlgorithmException when algorithm is not available throws
+ * IllegalArgumentException when provider is null; returns CertPathValidator
+ * object
*/
- @TestTargetNew(
- level = TestLevel.COMPLETE,
- notes = "",
- method = "getInstance",
- args = {java.lang.String.class, java.security.Provider.class}
- )
- public void testGetInstance03() throws NoSuchAlgorithmException,
- IllegalArgumentException,
+ @TestTargetNew(level = TestLevel.COMPLETE, notes = "", method = "getInstance", args = {
+ java.lang.String.class, java.security.Provider.class
+ })
+ public void testGetInstance03() throws NoSuchAlgorithmException, IllegalArgumentException,
InvalidAlgorithmParameterException, CertPathValidatorException {
try {
CertPathValidator.getInstance(null, mProv);
@@ -251,8 +221,8 @@ public class CertPathValidator2Test extends TestCase {
for (int i = 0; i < invalidValues.length; i++) {
try {
CertPathValidator.getInstance(invalidValues[i], mProv);
- fail("NoSuchAlgorithmException must be thrown (type: ".concat(
- invalidValues[i]).concat(")"));
+ fail("NoSuchAlgorithmException must be thrown (type: ".concat(invalidValues[i])
+ .concat(")"));
} catch (NoSuchAlgorithmException e) {
}
}
@@ -273,35 +243,33 @@ public class CertPathValidator2Test extends TestCase {
checkResult(cerPV);
}
}
-
- @TestTargetNew(
- level=TestLevel.PARTIAL_COMPLETE,
- method="validate",
- args={CertPath.class,CertPathParameters.class}
- )
+
+ @TestTargetNew(level = TestLevel.PARTIAL_COMPLETE, method = "validate", args = {
+ CertPath.class, CertPathParameters.class
+ })
public void testValidate() throws InvalidAlgorithmParameterException, NoSuchAlgorithmException {
MyCertPath mCP = new MyCertPath(new byte[0]);
- CertPathParameters params = new PKIXParameters(TestUtils.getTrustAnchorSet());
+ CertPathParameters params = new PKIXParameters(TestUtils.getTrustAnchorSet());
CertPathValidator certPV = CertPathValidator.getInstance(defaultAlg);
try {
certPV.validate(mCP, params);
} catch (InvalidAlgorithmParameterException e) {
- fail("unexpected exception: " + e);
+ fail("unexpected exception: " + e);
} catch (CertPathValidatorException e) {
fail("unexpected exception: " + e);
}
try {
certPV.validate(null, params);
fail("NullPointerException must be thrown");
- } catch(InvalidAlgorithmParameterException e) {
+ } catch (InvalidAlgorithmParameterException e) {
fail("unexpected exception: " + e);
} catch (CertPathValidatorException e) {
// ok
- }
+ }
try {
certPV.validate(mCP, null);
fail("InvalidAlgorithmParameterException must be thrown");
- } catch(InvalidAlgorithmParameterException e) {
+ } catch (InvalidAlgorithmParameterException e) {
// ok
} catch (CertPathValidatorException e) {
fail("unexpected exception");
diff --git a/security/src/test/java/tests/security/cert/CertPathValidator3Test.java b/security/src/test/java/tests/security/cert/CertPathValidator3Test.java
index a590635..b624b25 100644
--- a/security/src/test/java/tests/security/cert/CertPathValidator3Test.java
+++ b/security/src/test/java/tests/security/cert/CertPathValidator3Test.java
@@ -50,13 +50,6 @@ import java.security.cert.PKIXParameters;
@TestTargetClass(CertPathValidator.class)
public class CertPathValidator3Test extends TestCase {
- /**
- * Constructor for CertPathValidatorTests.
- * @param name
- */
- public CertPathValidator3Test(String name) {
- super(name);
- }
private static final String defaultType = CertPathBuilder1Test.defaultType;
private static boolean PKIXSupport = false;
diff --git a/security/src/test/java/tests/security/cert/CertPathValidatorExceptionTest.java b/security/src/test/java/tests/security/cert/CertPathValidatorExceptionTest.java
index 57f5e71..c28a761 100644
--- a/security/src/test/java/tests/security/cert/CertPathValidatorExceptionTest.java
+++ b/security/src/test/java/tests/security/cert/CertPathValidatorExceptionTest.java
@@ -46,18 +46,6 @@ import java.util.Vector;
@TestTargetClass(CertPathValidatorException.class)
public class CertPathValidatorExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for CertPathValidatorExceptionTests.
- *
- * @param arg0
- */
- public CertPathValidatorExceptionTest(String arg0) {
- super(arg0);
- }
-
private static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/tests/security/cert/CertPathValidatorSpiTest.java b/security/src/test/java/tests/security/cert/CertPathValidatorSpiTest.java
index dbb1466..080a112 100644
--- a/security/src/test/java/tests/security/cert/CertPathValidatorSpiTest.java
+++ b/security/src/test/java/tests/security/cert/CertPathValidatorSpiTest.java
@@ -45,15 +45,6 @@ import org.apache.harmony.security.tests.support.cert.MyCertPathValidatorSpi;
public class CertPathValidatorSpiTest extends TestCase {
/**
- * Constructor for CertPathValidatorSpiTest.
- *
- * @param arg0
- */
- public CertPathValidatorSpiTest(String arg0) {
- super(arg0);
- }
-
- /**
* Test for <code>CertPathValidatorSpi</code> constructor Assertion:
* constructs CertPathValidatorSpi
*/
diff --git a/security/src/test/java/tests/security/cert/CertStore1Test.java b/security/src/test/java/tests/security/cert/CertStore1Test.java
index 6f67aeb..48c40c9 100644
--- a/security/src/test/java/tests/security/cert/CertStore1Test.java
+++ b/security/src/test/java/tests/security/cert/CertStore1Test.java
@@ -54,13 +54,6 @@ import java.util.Collection;
@TestTargetClass(CertStore.class)
public class CertStore1Test extends TestCase {
- /**
- * Constructor for CertStoreTests.
- * @param arg0
- */
- public CertStore1Test(String arg0) {
- super(arg0);
- }
public static final String srvCertStore = "CertStore";
private static final String defaultType = "LDAP";
diff --git a/security/src/test/java/tests/security/cert/CertStoreExceptionTest.java b/security/src/test/java/tests/security/cert/CertStoreExceptionTest.java
index d18fb78..9eddf86 100644
--- a/security/src/test/java/tests/security/cert/CertStoreExceptionTest.java
+++ b/security/src/test/java/tests/security/cert/CertStoreExceptionTest.java
@@ -38,18 +38,6 @@ import java.security.cert.CertStoreException;
@TestTargetClass(CertStoreException.class)
public class CertStoreExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for CertStoreExceptionTests.
- *
- * @param arg0
- */
- public CertStoreExceptionTest(String arg0) {
- super(arg0);
- }
-
private static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/tests/security/cert/CertStoreSpiTest.java b/security/src/test/java/tests/security/cert/CertStoreSpiTest.java
index 8223f4c..3cac01f 100644
--- a/security/src/test/java/tests/security/cert/CertStoreSpiTest.java
+++ b/security/src/test/java/tests/security/cert/CertStoreSpiTest.java
@@ -50,14 +50,6 @@ import org.apache.harmony.security.tests.support.cert.MyCertStoreSpi;
@TestTargetClass(CertStoreSpi.class)
public class CertStoreSpiTest extends TestCase {
- /**
- * Constructor for CertStoreSpiTest.
- *
- * @param arg0
- */
- public CertStoreSpiTest(String arg0) {
- super(arg0);
- }
/**
* Test for <code>CertStoreSpi</code> constructor Assertion: constructs
diff --git a/security/src/test/java/tests/security/cert/CertificateEncodingExceptionTest.java b/security/src/test/java/tests/security/cert/CertificateEncodingExceptionTest.java
index 38a857f..1792abe 100644
--- a/security/src/test/java/tests/security/cert/CertificateEncodingExceptionTest.java
+++ b/security/src/test/java/tests/security/cert/CertificateEncodingExceptionTest.java
@@ -40,18 +40,6 @@ import java.security.cert.CertificateEncodingException;
@TestTargetClass(CertificateEncodingException.class)
public class CertificateEncodingExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for CertificateEncodingExceptionTests.
- *
- * @param arg0
- */
- public CertificateEncodingExceptionTest(String arg0) {
- super(arg0);
- }
-
private static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/tests/security/cert/CertificateExceptionTest.java b/security/src/test/java/tests/security/cert/CertificateExceptionTest.java
index e1d6645..fbd777c 100644
--- a/security/src/test/java/tests/security/cert/CertificateExceptionTest.java
+++ b/security/src/test/java/tests/security/cert/CertificateExceptionTest.java
@@ -39,18 +39,6 @@ import java.security.cert.CertificateException;
@TestTargetClass(CertificateException.class)
public class CertificateExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for CertificateExceptionTests.
- *
- * @param arg0
- */
- public CertificateExceptionTest(String arg0) {
- super(arg0);
- }
-
private static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/tests/security/cert/CertificateExpiredExceptionTest.java b/security/src/test/java/tests/security/cert/CertificateExpiredExceptionTest.java
index 647345f..9a7ce5a 100644
--- a/security/src/test/java/tests/security/cert/CertificateExpiredExceptionTest.java
+++ b/security/src/test/java/tests/security/cert/CertificateExpiredExceptionTest.java
@@ -39,18 +39,6 @@ import java.security.cert.CertificateExpiredException;
@TestTargetClass(CertificateExpiredException.class)
public class CertificateExpiredExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for CertificateExpiredExceptionTests.
- *
- * @param arg0
- */
- public CertificateExpiredExceptionTest(String arg0) {
- super(arg0);
- }
-
static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/tests/security/cert/CertificateFactory1Test.java b/security/src/test/java/tests/security/cert/CertificateFactory1Test.java
index 7237871..b64e501 100644
--- a/security/src/test/java/tests/security/cert/CertificateFactory1Test.java
+++ b/security/src/test/java/tests/security/cert/CertificateFactory1Test.java
@@ -59,15 +59,6 @@ import java.util.Vector;
@TestTargetClass(CertificateFactory.class)
public class CertificateFactory1Test extends TestCase {
- /**
- * Constructor for CertificateFactoryTests.
- *
- * @param arg0
- */
- public CertificateFactory1Test(String arg0) {
- super(arg0);
- }
-
public static final String srvCertificateFactory = "CertificateFactory";
private static String defaultProviderName = null;
@@ -539,6 +530,7 @@ public class CertificateFactory1Test extends TestCase {
args = {java.io.InputStream.class}
)
})
+ // Test passed on RI
public void testCertificateFactory11() throws IOException {
if (!X509Support) {
fail(NotSupportMsg);
@@ -675,6 +667,7 @@ public class CertificateFactory1Test extends TestCase {
args = {java.io.InputStream.class, java.lang.String.class}
)
})
+ // Test passed on RI
public void testCertificateFactory13() throws IOException {
if (!X509Support) {
fail(NotSupportMsg);
diff --git a/security/src/test/java/tests/security/cert/CertificateFactory2Test.java b/security/src/test/java/tests/security/cert/CertificateFactory2Test.java
index 12c7ec1..4350db0 100644
--- a/security/src/test/java/tests/security/cert/CertificateFactory2Test.java
+++ b/security/src/test/java/tests/security/cert/CertificateFactory2Test.java
@@ -86,15 +86,6 @@ public class CertificateFactory2Test extends TestCase {
Security.removeProvider(mProv.getName());
}
- /**
- * Constructor for CertificateFactory2Test.
- *
- * @param arg0
- */
- public CertificateFactory2Test(String arg0) {
- super(arg0);
- }
-
private void checkResult(CertificateFactory certFactory, boolean mode)
throws CertificateException, CRLException {
MyCertificateFactorySpi.putMode(mode);
diff --git a/security/src/test/java/tests/security/cert/CertificateFactorySpiTest.java b/security/src/test/java/tests/security/cert/CertificateFactorySpiTest.java
index 09090f6..fbb2372 100644
--- a/security/src/test/java/tests/security/cert/CertificateFactorySpiTest.java
+++ b/security/src/test/java/tests/security/cert/CertificateFactorySpiTest.java
@@ -51,16 +51,8 @@ import java.util.List;
*/
@TestTargetClass(CertificateFactorySpi.class)
public class CertificateFactorySpiTest extends TestCase {
- /**
- * Constructor for CertStoreSpiTest.
- *
- * @param arg0
- */
- public CertificateFactorySpiTest(String arg0) {
- super(arg0);
- }
- /**
+ /**
* Test for <code>CertificateFactorySpi</code> constructor
* Assertion: constructs CertificateFactorySpi
*/
diff --git a/security/src/test/java/tests/security/cert/CertificateNotYetValidExceptionTest.java b/security/src/test/java/tests/security/cert/CertificateNotYetValidExceptionTest.java
index 2ed6b05..b386387 100644
--- a/security/src/test/java/tests/security/cert/CertificateNotYetValidExceptionTest.java
+++ b/security/src/test/java/tests/security/cert/CertificateNotYetValidExceptionTest.java
@@ -39,18 +39,6 @@ import java.security.cert.CertificateNotYetValidException;
@TestTargetClass(CertificateNotYetValidException.class)
public class CertificateNotYetValidExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for CertificateNotYetValidExceptionTests.
- *
- * @param arg0
- */
- public CertificateNotYetValidExceptionTest(String arg0) {
- super(arg0);
- }
-
static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/tests/security/cert/CertificateParsingExceptionTest.java b/security/src/test/java/tests/security/cert/CertificateParsingExceptionTest.java
index c079f6c..c690b5b 100644
--- a/security/src/test/java/tests/security/cert/CertificateParsingExceptionTest.java
+++ b/security/src/test/java/tests/security/cert/CertificateParsingExceptionTest.java
@@ -40,18 +40,6 @@ import java.security.cert.CertificateParsingException;
@TestTargetClass(CertificateParsingException.class)
public class CertificateParsingExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for CertificateParsingExceptionTests.
- *
- * @param arg0
- */
- public CertificateParsingExceptionTest(String arg0) {
- super(arg0);
- }
-
private static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/tests/security/cert/CertificateTest.java b/security/src/test/java/tests/security/cert/CertificateTest.java
index 28fab31..c56c0c0 100644
--- a/security/src/test/java/tests/security/cert/CertificateTest.java
+++ b/security/src/test/java/tests/security/cert/CertificateTest.java
@@ -24,6 +24,7 @@ package tests.security.cert;
+import dalvik.annotation.AndroidOnly;
import dalvik.annotation.BrokenTest;
import dalvik.annotation.KnownFailure;
import dalvik.annotation.TestLevel;
@@ -55,7 +56,7 @@ import org.apache.harmony.security.tests.support.cert.MyFailingCertificate;
import org.apache.harmony.security.tests.support.cert.TestUtils;
import org.apache.harmony.testframework.serialization.SerializationTest;
-import tests.api.javax.security.cert.X509CertificateTest.MyModifiablePublicKey;
+//import tests.api.javax.security.cert.X509CertificateTest.MyModifiablePublicKey;
/**
@@ -70,14 +71,6 @@ public class CertificateTest extends TestCase {
private static final byte[] testEncoding = new byte[] { (byte) 1, (byte) 2,
(byte) 3, (byte) 4, (byte) 5 };
- /**
- * Constructor for CertificateTest.
- * @param name
- */
- public CertificateTest(String name) {
- super(name);
- }
-
//
// Tests
//
@@ -91,6 +84,8 @@ public class CertificateTest extends TestCase {
method = "Certificate",
args = {java.lang.String.class}
)
+ @AndroidOnly("Gets security providers with specific signature algorithm: " +
+ "Security.getProviders(\"Signature.sha1WithRSAEncryption\")")
public final void testCertificate() {
try {
Certificate c1 = new MyCertificate("TEST_TYPE", testEncoding);
@@ -117,6 +112,8 @@ public class CertificateTest extends TestCase {
method = "hashCode",
args = {}
)
+ @AndroidOnly("Gets security providers with specific signature algorithm: " +
+ "Security.getProviders(\"Signature.sha1WithRSAEncryption\")")
public final void testHashCode() throws CertificateEncodingException {
Certificate c1 = new MyCertificate("TEST_TYPE", testEncoding);
Certificate c2 = new MyCertificate("TEST_TYPE", testEncoding);
@@ -138,6 +135,8 @@ public class CertificateTest extends TestCase {
method = "hashCode",
args = {}
)
+ @AndroidOnly("Gets security providers with specific signature algorithm: " +
+ "Security.getProviders(\"Signature.sha1WithRSAEncryption\")")
public final void testHashCodeEqualsObject() {
Certificate c1 = new MyCertificate("TEST_TYPE", testEncoding);
Certificate c2 = new MyCertificate("TEST_TYPE", testEncoding);
@@ -157,6 +156,8 @@ public class CertificateTest extends TestCase {
method = "getType",
args = {}
)
+ @AndroidOnly("Gets security providers with specific signature algorithm: " +
+ "Security.getProviders(\"Signature.sha1WithRSAEncryption\")")
public final void testGetType() {
Certificate c1 = new MyCertificate("TEST_TYPE", testEncoding);
assertEquals("TEST_TYPE", c1.getType());
@@ -172,6 +173,8 @@ public class CertificateTest extends TestCase {
method = "equals",
args = {java.lang.Object.class}
)
+ @AndroidOnly("Gets security providers with specific signature algorithm: " +
+ "Security.getProviders(\"Signature.sha1WithRSAEncryption\")")
public final void testEqualsObject01() {
Certificate c1 = new MyCertificate("TEST_TYPE", testEncoding);
assertTrue(c1.equals(c1));
@@ -188,6 +191,8 @@ public class CertificateTest extends TestCase {
method = "equals",
args = {java.lang.Object.class}
)
+ @AndroidOnly("Gets security providers with specific signature algorithm: " +
+ "Security.getProviders(\"Signature.sha1WithRSAEncryption\")")
public final void testEqualsObject02() {
Certificate c1 = new MyCertificate("TEST_TYPE", testEncoding);
Certificate c2 = new MyCertificate("TEST_TYPE", testEncoding);
@@ -204,6 +209,8 @@ public class CertificateTest extends TestCase {
method = "equals",
args = {java.lang.Object.class}
)
+ @AndroidOnly("Gets security providers with specific signature algorithm: " +
+ "Security.getProviders(\"Signature.sha1WithRSAEncryption\")")
public final void testEqualsObject03() {
Certificate c1 = new MyCertificate("TEST_TYPE", testEncoding);
assertFalse(c1.equals(null));
@@ -220,6 +227,8 @@ public class CertificateTest extends TestCase {
method = "equals",
args = {java.lang.Object.class}
)
+ @AndroidOnly("Gets security providers with specific signature algorithm: " +
+ "Security.getProviders(\"Signature.sha1WithRSAEncryption\")")
public final void testEqualsObject04() {
Certificate c1 = new MyCertificate("TEST_TYPE", testEncoding);
assertFalse(c1.equals("TEST_TYPE"));
@@ -241,6 +250,8 @@ public class CertificateTest extends TestCase {
method = "getEncoded",
args = {}
)
+ @AndroidOnly("Gets security providers with specific signature algorithm: " +
+ "Security.getProviders(\"Signature.sha1WithRSAEncryption\")")
@KnownFailure("Assertion does not evaluate to true... Works in javax.Certificate")
public final void testGetEncoded() throws CertificateException {
Certificate c1 = new MyCertificate("TEST_TYPE", testEncoding);
@@ -276,6 +287,8 @@ public class CertificateTest extends TestCase {
method = "verify",
args = {java.security.PublicKey.class}
)
+ @AndroidOnly("Gets security providers with specific signature algorithm: " +
+ "Security.getProviders(\"Signature.sha1WithRSAEncryption\")")
public final void testVerifyPublicKey()
throws InvalidKeyException,
CertificateException,
@@ -301,6 +314,8 @@ public class CertificateTest extends TestCase {
method = "verify",
args = {java.security.PublicKey.class, java.lang.String.class}
)
+ @AndroidOnly("Gets security providers with specific signature algorithm: " +
+ "Security.getProviders(\"Signature.sha1WithRSAEncryption\")")
public final void testVerifyPublicKeyString()
throws InvalidKeyException,
CertificateException,
@@ -320,6 +335,8 @@ public class CertificateTest extends TestCase {
method = "toString",
args = {}
)
+ @AndroidOnly("Gets security providers with specific signature algorithm: " +
+ "Security.getProviders(\"Signature.sha1WithRSAEncryption\")")
public final void testToString() {
Certificate c1 = new MyCertificate("TEST_TYPE", testEncoding);
c1.toString();
@@ -334,6 +351,8 @@ public class CertificateTest extends TestCase {
method = "getPublicKey",
args = {}
)
+ @AndroidOnly("Gets security providers with specific signature algorithm: " +
+ "Security.getProviders(\"Signature.sha1WithRSAEncryption\")")
public final void testGetPublicKey() {
Certificate c1 = new MyCertificate("TEST_TYPE", testEncoding);
c1.getPublicKey();
@@ -348,6 +367,8 @@ public class CertificateTest extends TestCase {
method = "writeReplace",
args = {}
)
+ @AndroidOnly("Gets security providers with specific signature algorithm: " +
+ "Security.getProviders(\"Signature.sha1WithRSAEncryption\")")
public final void testWriteReplace() {
MyCertificate c1 = new MyCertificate("TEST_TYPE", testEncoding);
@@ -517,7 +538,11 @@ public class MyModifiablePublicKey implements PublicKey {
method = "verify",
args = {java.security.PublicKey.class, java.lang.String.class}
)
- @BrokenTest("Test fails: ClassCastException when SignatureException is expected")
+ @AndroidOnly("Gets security providers with specific signature algorithm: " +
+ "Security.getProviders(\"Signature.sha1WithRSAEncryption\")")
+ @KnownFailure("ClassCastException is thrown by " +
+ "Certificate.verify(PublicKey pk) method instead of " +
+ "InvalidKeyException.")
public final void testVerifyPublicKeyString2() throws InvalidKeyException,
CertificateException, NoSuchAlgorithmException,
NoSuchProviderException, SignatureException {
@@ -577,7 +602,11 @@ public class MyModifiablePublicKey implements PublicKey {
method = "verify",
args = {java.security.PublicKey.class}
)
- @BrokenTest("ClassCastException")
+ @AndroidOnly("Gets security providers with specific signature algorithm: " +
+ "Security.getProviders(\"Signature.sha1WithRSAEncryption\")")
+ @KnownFailure("ClassCastException is thrown by " +
+ "Certificate.verify(PublicKey pk) method instead of " +
+ "InvalidKeyException. ")
public final void testVerifyPublicKey2() throws InvalidKeyException,
CertificateException, NoSuchAlgorithmException,
NoSuchProviderException, SignatureException {
@@ -628,6 +657,8 @@ public class MyModifiablePublicKey implements PublicKey {
method = "writeReplace",
args = {}
)
+ @AndroidOnly("Gets security providers with specific signature algorithm: " +
+ "Security.getProviders(\"Signature.sha1WithRSAEncryption\")")
public final void testWriteReplace2() {
MyCertificate c1 = new MyFailingCertificate("TEST_TYPE", testEncoding);
@@ -661,6 +692,8 @@ public class MyModifiablePublicKey implements PublicKey {
args = {}
)
})
+ @AndroidOnly("Gets security providers with specific signature algorithm: " +
+ "Security.getProviders(\"Signature.sha1WithRSAEncryption\")")
public void testSerializationSelf() throws Exception {
TestUtils.initCertPathSSCertChain();
@@ -690,6 +723,8 @@ public class MyModifiablePublicKey implements PublicKey {
args = {}
)
})
+ @AndroidOnly("Gets security providers with specific signature algorithm: " +
+ "Security.getProviders(\"Signature.sha1WithRSAEncryption\")")
public void testSerializationCompatibility() throws Exception {
//create test file (once)
// SerializationTest.createGoldenFile("device/dalvik/libcore/security/src/test/resources/serialization", this, TestUtils.rootCertificateSS);
diff --git a/security/src/test/java/tests/security/cert/CollectionCertStoreParametersTest.java b/security/src/test/java/tests/security/cert/CollectionCertStoreParametersTest.java
index f4fb0ec..551fda6 100644
--- a/security/src/test/java/tests/security/cert/CollectionCertStoreParametersTest.java
+++ b/security/src/test/java/tests/security/cert/CollectionCertStoreParametersTest.java
@@ -43,14 +43,6 @@ import org.apache.harmony.security.tests.support.cert.MyCertificate;
@TestTargetClass(CollectionCertStoreParameters.class)
public class CollectionCertStoreParametersTest extends TestCase {
- /**
- * Constructor for CollectionCertStoreParametersTest.
- * @param name
- */
- public CollectionCertStoreParametersTest(String name) {
- super(name);
- }
-
//
// Tests
//
diff --git a/security/src/test/java/tests/security/cert/LDAPCertStoreParametersTest.java b/security/src/test/java/tests/security/cert/LDAPCertStoreParametersTest.java
index e699f91..66d5ad4 100644
--- a/security/src/test/java/tests/security/cert/LDAPCertStoreParametersTest.java
+++ b/security/src/test/java/tests/security/cert/LDAPCertStoreParametersTest.java
@@ -40,14 +40,6 @@ import java.security.cert.LDAPCertStoreParameters;
@TestTargetClass(LDAPCertStoreParameters.class)
public class LDAPCertStoreParametersTest extends TestCase {
- /**
- * Constructor for LDAPCertStoreParametersTest.
- * @param name
- */
- public LDAPCertStoreParametersTest(String name) {
- super(name);
- }
-
//
// Tests
//
diff --git a/security/src/test/java/tests/security/cert/PKIXBuilderParametersTest.java b/security/src/test/java/tests/security/cert/PKIXBuilderParametersTest.java
index 789fb6b..b3ebcb6 100644
--- a/security/src/test/java/tests/security/cert/PKIXBuilderParametersTest.java
+++ b/security/src/test/java/tests/security/cert/PKIXBuilderParametersTest.java
@@ -84,14 +84,6 @@ public class PKIXBuilderParametersTest extends TestCase {
+ "-----END CERTIFICATE-----\n";
/**
- * Constructor for PKIXBuilderParametersTest.
- * @param name
- */
- public PKIXBuilderParametersTest(String name) {
- super(name);
- }
-
- /**
* Test #1 for <code>PKIXBuilderParameters(Set, CertSelector)</code>
* constructor<br>
* Assertion: creates an instance of <code>PKIXBuilderParameters</code>
diff --git a/security/src/test/java/tests/security/cert/PKIXCertPathBuilderResultTest.java b/security/src/test/java/tests/security/cert/PKIXCertPathBuilderResultTest.java
index a7a5e74..57f7882 100644
--- a/security/src/test/java/tests/security/cert/PKIXCertPathBuilderResultTest.java
+++ b/security/src/test/java/tests/security/cert/PKIXCertPathBuilderResultTest.java
@@ -70,14 +70,6 @@ public class PKIXCertPathBuilderResultTest extends TestCase {
};
- /**
- * Constructor for PKIXCertPathBuilderResultTest.
- * @param name
- */
- public PKIXCertPathBuilderResultTest(String name) {
- super(name);
- }
-
//
// Tests
//
diff --git a/security/src/test/java/tests/security/cert/PKIXCertPathCheckerTest.java b/security/src/test/java/tests/security/cert/PKIXCertPathCheckerTest.java
index 01db618..6153d5c 100644
--- a/security/src/test/java/tests/security/cert/PKIXCertPathCheckerTest.java
+++ b/security/src/test/java/tests/security/cert/PKIXCertPathCheckerTest.java
@@ -46,14 +46,6 @@ import org.apache.harmony.security.tests.support.cert.TestUtils;
@TestTargetClass(PKIXCertPathChecker.class)
public class PKIXCertPathCheckerTest extends TestCase {
- /**
- * Constructor for PKIXCertPathCheckerTest.
- * @param name
- */
- public PKIXCertPathCheckerTest(String name) {
- super(name);
- }
-
//
// Tests
//
diff --git a/security/src/test/java/tests/security/cert/PKIXCertPathValidatorResultTest.java b/security/src/test/java/tests/security/cert/PKIXCertPathValidatorResultTest.java
index 610bdc4..e3970ac 100644
--- a/security/src/test/java/tests/security/cert/PKIXCertPathValidatorResultTest.java
+++ b/security/src/test/java/tests/security/cert/PKIXCertPathValidatorResultTest.java
@@ -60,14 +60,6 @@ public class PKIXCertPathValidatorResultTest extends TestCase {
}
};
- /**
- * Constructor for PKIXCertPathValidatorResultTest.
- * @param name
- */
- public PKIXCertPathValidatorResultTest(String name) {
- super(name);
- }
-
//
// Tests
//
diff --git a/security/src/test/java/tests/security/cert/PKIXParametersTest.java b/security/src/test/java/tests/security/cert/PKIXParametersTest.java
index 79f489e..efe46ed 100644
--- a/security/src/test/java/tests/security/cert/PKIXParametersTest.java
+++ b/security/src/test/java/tests/security/cert/PKIXParametersTest.java
@@ -22,7 +22,6 @@
package tests.security.cert;
-import dalvik.annotation.BrokenTest;
import dalvik.annotation.KnownFailure;
import dalvik.annotation.TestTargets;
import dalvik.annotation.TestLevel;
@@ -69,15 +68,6 @@ public class PKIXParametersTest extends TestCase {
private final static String testIssuer =
"CN=VM,OU=DRL Security,O=Intel,L=Novosibirsk,ST=NSO,C=RU";
- /**
- * Constructor for PKIXParametersTest.
- *
- * @param name
- */
- public PKIXParametersTest(String name) {
- super(name);
- }
-
//
// Tests
//
@@ -1454,7 +1444,7 @@ public class PKIXParametersTest extends TestCase {
p.setDate(new Date(555L));
p.setDate(null); // reset 'date' back to current time
assertNotNull(p.getDate());
- assertEquals(Calendar.getInstance().getTime(), p.getDate());
+ //assertEquals(Calendar.getInstance().getTime(), p.getDate());
}
/**
@@ -1567,7 +1557,12 @@ public class PKIXParametersTest extends TestCase {
* Test #3 for <code>setInitialPolicies(Set)</code> method<br>
* Assertion: <code>Set</code> may be empty
*/
- @TestTargetNew(level = TestLevel.PARTIAL_COMPLETE, notes = "Doesn't verify ClassCastException.", method = "setInitialPolicies", args = {java.util.Set.class})
+ @TestTargetNew(
+ level = TestLevel.PARTIAL_COMPLETE,
+ notes = "Doesn't verify ClassCastException.",
+ method = "setInitialPolicies",
+ args = {java.util.Set.class}
+ )
public final void testSetInitialPolicies03() throws Exception {
Set<TrustAnchor> taSet = TestUtils.getTrustAnchorSet();
if (taSet == null) {
@@ -1585,7 +1580,12 @@ public class PKIXParametersTest extends TestCase {
* Assertion: <code>Set</code> is copied to protect against subsequent
* modifications
*/
- @TestTargetNew(level = TestLevel.PARTIAL_COMPLETE, notes = "Verifies that Set is copied to protect against subsequent modifications.", method = "setInitialPolicies", args = {java.util.Set.class})
+ @TestTargetNew(
+ level = TestLevel.PARTIAL_COMPLETE,
+ notes = "Verifies that Set is copied to protect against subsequent modifications.",
+ method = "setInitialPolicies",
+ args = {java.util.Set.class}
+ )
public final void testSetInitialPolicies04() throws Exception {
Set<TrustAnchor> taSet = TestUtils.getTrustAnchorSet();
if (taSet == null) {
@@ -1612,7 +1612,12 @@ public class PKIXParametersTest extends TestCase {
*
* @throws InvalidAlgorithmParameterException
*/
- @TestTargetNew(level = TestLevel.PARTIAL_COMPLETE, notes = "Verifies ClassCastException.", method = "setInitialPolicies", args = {java.util.Set.class})
+ @TestTargetNew(
+ level = TestLevel.PARTIAL_COMPLETE,
+ notes = "Verifies ClassCastException.",
+ method = "setInitialPolicies",
+ args = {java.util.Set.class}
+ )
@SuppressWarnings("unchecked")
public final void testSetInitialPolicies05() throws Exception {
Set<TrustAnchor> taSet = TestUtils.getTrustAnchorSet();
@@ -1870,8 +1875,5 @@ public class PKIXParametersTest extends TestCase {
PKIXParameters p = new PKIXParameters(keystore);
-
-
-
}
}
diff --git a/security/src/test/java/tests/security/cert/PolicyNodeTest.java b/security/src/test/java/tests/security/cert/PolicyNodeTest.java
index 95d9629..6c075f9 100644
--- a/security/src/test/java/tests/security/cert/PolicyNodeTest.java
+++ b/security/src/test/java/tests/security/cert/PolicyNodeTest.java
@@ -98,14 +98,6 @@ public class PolicyNodeTest extends TestCase {
}
- /**
- * Constructor for CRLTest.
- * @param name
- */
- public PolicyNodeTest(String name) {
- super(name);
- }
-
class MyPolicyNode extends PolicyNodeImpl {
MyPolicyNode(PolicyNodeImpl policynode, String s, Set set,
boolean flag, Set set1, boolean flag1) {
diff --git a/security/src/test/java/tests/security/cert/PolicyQualifierInfoTest.java b/security/src/test/java/tests/security/cert/PolicyQualifierInfoTest.java
index d794f06..be86083 100644
--- a/security/src/test/java/tests/security/cert/PolicyQualifierInfoTest.java
+++ b/security/src/test/java/tests/security/cert/PolicyQualifierInfoTest.java
@@ -39,13 +39,6 @@ import java.util.Arrays;
@TestTargetClass(PolicyQualifierInfo.class)
public class PolicyQualifierInfoTest extends TestCase {
- /**
- * Constructor for PolicyQualifierInfoTest.
- * @param name
- */
- public PolicyQualifierInfoTest(String name) {
- super(name);
- }
/**
* Test #1 for <code>PolicyQualifierInfo</code> constructor<br>
diff --git a/security/src/test/java/tests/security/cert/TrustAnchorTest.java b/security/src/test/java/tests/security/cert/TrustAnchorTest.java
index 93d596f..308a9f0 100644
--- a/security/src/test/java/tests/security/cert/TrustAnchorTest.java
+++ b/security/src/test/java/tests/security/cert/TrustAnchorTest.java
@@ -22,6 +22,7 @@
package tests.security.cert;
+import dalvik.annotation.KnownFailure;
import dalvik.annotation.TestLevel;
import dalvik.annotation.TestTargetClass;
import dalvik.annotation.TestTargetNew;
@@ -644,6 +645,8 @@ public class TrustAnchorTest extends TestCase {
method = "toString",
args = {}
)
+ @KnownFailure("java.lang.RuntimeException is thrown during " +
+ "TrustAnchor.toString() method.")
public final void testToString() throws Exception {
PublicKey pk = new TestKeyPair(keyAlg).getPublic();
TrustAnchor ta1 = new TrustAnchor(validCaNameRfc2253, pk,
diff --git a/security/src/test/java/tests/security/cert/X509CRLSelector2Test.java b/security/src/test/java/tests/security/cert/X509CRLSelector2Test.java
index e3bf819..4dafb52 100644
--- a/security/src/test/java/tests/security/cert/X509CRLSelector2Test.java
+++ b/security/src/test/java/tests/security/cert/X509CRLSelector2Test.java
@@ -1,5 +1,6 @@
package tests.security.cert;
+import dalvik.annotation.AndroidOnly;
import dalvik.annotation.TestLevel;
import dalvik.annotation.TestTargetClass;
import dalvik.annotation.TestTargetNew;
@@ -289,6 +290,8 @@ public class X509CRLSelector2Test extends TestCase {
method = "setMinCRLNumber",
args = {java.math.BigInteger.class}
)
+ @AndroidOnly("Uses specific class: " +
+ "org.apache.harmony.security.asn1.ASN1OctetString.")
public void testSetMinCRLNumberLjava_math_BigInteger() {
X509CRLSelector selector = new X509CRLSelector();
BigInteger minCRL = new BigInteger("10000");
@@ -317,6 +320,8 @@ public class X509CRLSelector2Test extends TestCase {
method = "setMaxCRLNumber",
args = {java.math.BigInteger.class}
)
+ @AndroidOnly("Uses specific class: " +
+ "org.apache.harmony.security.asn1.ASN1OctetString.")
public void testSetMaxCRLNumberLjava_math_BigInteger() {
X509CRLSelector selector = new X509CRLSelector();
BigInteger maxCRL = new BigInteger("10000");
@@ -573,6 +578,9 @@ public class X509CRLSelector2Test extends TestCase {
method = "clone",
args = {}
)
+ @AndroidOnly("Uses specific classes: " +
+ "org.apache.harmony.security.asn1.ASN1OctetString, " +
+ "org.apache.harmony.security.asn1.ASN1Integer.")
public void testClone() {
X509CRLSelector selector = new X509CRLSelector();
X500Principal iss1 = new X500Principal("O=First Org.");
diff --git a/security/src/test/java/tests/security/cert/X509CRLTest.java b/security/src/test/java/tests/security/cert/X509CRLTest.java
index bd80dac..c10494e 100644
--- a/security/src/test/java/tests/security/cert/X509CRLTest.java
+++ b/security/src/test/java/tests/security/cert/X509CRLTest.java
@@ -22,6 +22,7 @@
package tests.security.cert;
+import dalvik.annotation.AndroidOnly;
import dalvik.annotation.TestTargets;
import dalvik.annotation.TestLevel;
import dalvik.annotation.TestTargetNew;
@@ -172,6 +173,10 @@ public class X509CRLTest extends TestCase {
public X509CRLTest() {
+
+ }
+
+ public void setUp() {
tbt_crl = new TBTCRL() {
public byte[] getEncoded() {
return new byte[] {1, 2, 3};
@@ -300,6 +305,8 @@ public class X509CRLTest extends TestCase {
method = "getRevokedCertificate",
args = {java.security.cert.X509Certificate.class}
)
+ @AndroidOnly("Test filed on RI: getRevokedCertificate throws " +
+ "RuntimeException.")
public void testGetRevokedCertificate() {
try {
tbt_crl.getRevokedCertificate((X509Certificate) null);
diff --git a/security/src/test/java/tests/security/cert/X509CertSelectorTest.java b/security/src/test/java/tests/security/cert/X509CertSelectorTest.java
index a3c1d24..1bbc35f 100644
--- a/security/src/test/java/tests/security/cert/X509CertSelectorTest.java
+++ b/security/src/test/java/tests/security/cert/X509CertSelectorTest.java
@@ -19,6 +19,7 @@ package tests.security.cert;
import dalvik.annotation.BrokenTest;
+import dalvik.annotation.KnownFailure;
import dalvik.annotation.TestLevel;
import dalvik.annotation.TestTargetNew;
import dalvik.annotation.TestTargetClass;
@@ -2542,10 +2543,10 @@ public class X509CertSelectorTest extends TestCase {
// list);
// CertStore store = CertStore.getInstance("Collection", params);
//
-// theCertSelector = new X509CertSelector();
-// theCertSelector.setCertificate(endCertificate);
-// theCertSelector.setIssuer(endCertificate.getIssuerX500Principal()
-// .getEncoded());
+ theCertSelector = new X509CertSelector();
+ theCertSelector.setCertificate(endCertificate);
+ theCertSelector.setIssuer(endCertificate.getIssuerX500Principal()
+ .getEncoded());
// build the path
builder = CertPathBuilder.getInstance("PKIX");
@@ -2575,11 +2576,9 @@ public class X509CertSelectorTest extends TestCase {
method = "addPathToName",
args = {int.class, byte[].class}
)
- @BrokenTest("cannot find a valid name for whitch a match is found (assertNotNull(p);): check "+
- "test_addSubjectAlternativeNameLintLjava_lang_array2() for a possbile approach.")
public void test_addPathToNameLintLbyte_array2() throws Exception {
TestUtils.initCertPathSSCertChain();
-
+ setupEnvironment();
GeneralName name = new GeneralName(1, "822.Name");
assertNotNull(name.getEncoded());
byte[] b = new byte[name.getEncoded().length];
@@ -2587,7 +2586,7 @@ public class X509CertSelectorTest extends TestCase {
b[name.getEncoded().length-3] = (byte) 200;
try {
- theCertSelector.addPathToName(1, b);
+ theCertSelector.addPathToName(1, b);
} catch (IOException e) {
// ok
}
@@ -2618,8 +2617,6 @@ public class X509CertSelectorTest extends TestCase {
method = "addPathToName",
args = {int.class, java.lang.String.class}
)
- @BrokenTest("cannot find a valid name for whitch a match is found: check "+
- " for a possbile approach.")
public void test_addPathToNameLintLjava_lang_String2() throws Exception {
setupEnvironment();
@@ -2639,15 +2636,15 @@ public class X509CertSelectorTest extends TestCase {
theCertSelector.addPathToName(1, new String(name.getEncodedName()));
assertNotNull(theCertSelector.getPathToNames());
+
CertPath p = buildCertPath();
assertNull(p);
theCertSelector.setPathToNames(null);
-
- theCertSelector.addPathToName(0, rootCertificate.getIssuerX500Principal().getName());
+ theCertSelector.addPathToName(1, rootCertificate.getIssuerX500Principal().getName());
assertNotNull(theCertSelector.getPathToNames());
- p = buildCertPath();
- assertNotNull(p);
+ //p = buildCertPath();
+ //assertNotNull(p);
}
/**
@@ -2661,6 +2658,8 @@ public class X509CertSelectorTest extends TestCase {
)
public void test_addSubjectAlternativeNameLintLbyte_array2()
throws Exception {
+
+
GeneralName san0 = new GeneralName(new OtherName("1.2.3.4.5",
new byte[] {1, 2, 0, 1}));
GeneralName san1 = new GeneralName(1, "rfc@822.Name");
diff --git a/security/src/test/java/tests/security/cert/X509Certificate2Test.java b/security/src/test/java/tests/security/cert/X509Certificate2Test.java
index 54f2836..48230d9 100644
--- a/security/src/test/java/tests/security/cert/X509Certificate2Test.java
+++ b/security/src/test/java/tests/security/cert/X509Certificate2Test.java
@@ -17,6 +17,8 @@
package tests.security.cert;
+import dalvik.annotation.AndroidOnly;
+import dalvik.annotation.KnownFailure;
import dalvik.annotation.TestLevel;
import dalvik.annotation.TestTargetClass;
import dalvik.annotation.TestTargetNew;
@@ -53,6 +55,8 @@ public class X509Certificate2Test extends junit.framework.TestCase {
method = "toString",
args = {}
)
+ @KnownFailure("java.lang.RuntimeException is thrown during " +
+ "X509Certificate.toString() method.")
public void test_toString() throws Exception {
// Regression for HARMONY-3384
@@ -498,14 +502,16 @@ public class X509Certificate2Test extends junit.framework.TestCase {
method = "getSubjectAlternativeNames",
args = {}
)
+ @AndroidOnly("getSubjectAlternativeNames method is not supported, " +
+ "it returns null for X509Certificate.")
public void testGetSubjectAlternativeNames()
throws CertificateParsingException {
assertNull(new MyX509Certificate().getSubjectAlternativeNames());
Collection<List<?>> coll = cert.getSubjectAlternativeNames();
-
- assertNotNull(coll);
+ //getSubjectAlternativeNames method is not supported
+ assertNull(coll);
try {
coll.clear();
@@ -534,14 +540,16 @@ public class X509Certificate2Test extends junit.framework.TestCase {
method = "getIssuerAlternativeNames",
args = {}
)
+ @AndroidOnly("getIssuerAlternativeNames method is not supported, " +
+ "it returns null for X509Certificate.")
public void testGetIssuerAlternativeNames()
throws CertificateParsingException {
assertNull(new MyX509Certificate().getIssuerAlternativeNames());
Collection<List<?>> coll = cert.getIssuerAlternativeNames();
-
- assertNotNull(coll);
+ // getIssuerAlternativeNames returns null.
+ assertNull(coll);
try {
coll.clear();
diff --git a/security/src/test/java/tests/security/permissions/JavaIoFileInputStreamTest.java b/security/src/test/java/tests/security/permissions/JavaIoFileInputStreamTest.java
index 2aa63e2..36ad29e 100644
--- a/security/src/test/java/tests/security/permissions/JavaIoFileInputStreamTest.java
+++ b/security/src/test/java/tests/security/permissions/JavaIoFileInputStreamTest.java
@@ -27,6 +27,7 @@ import java.io.File;
import java.io.FileDescriptor;
import java.io.FileInputStream;
import java.io.IOException;
+import java.security.Permission;
/*
* This class tests the security permissions which are documented in
@@ -91,6 +92,10 @@ public class JavaIoFileInputStreamTest extends TestCase {
this.file = file;
super.checkRead(file);
}
+ @Override
+ public void checkPermission(Permission p) {
+
+ }
}
long id = new java.util.Date().getTime();
diff --git a/security/src/test/java/tests/security/permissions/JavaIoFileOutputStreamTest.java b/security/src/test/java/tests/security/permissions/JavaIoFileOutputStreamTest.java
index 0974ef5..78f248d 100644
--- a/security/src/test/java/tests/security/permissions/JavaIoFileOutputStreamTest.java
+++ b/security/src/test/java/tests/security/permissions/JavaIoFileOutputStreamTest.java
@@ -27,6 +27,7 @@ import java.io.File;
import java.io.FileDescriptor;
import java.io.FileOutputStream;
import java.io.IOException;
+import java.security.Permission;
/*
* This class tests the security permissions which are documented in
@@ -103,6 +104,10 @@ public class JavaIoFileOutputStreamTest extends TestCase {
this.file = file;
super.checkWrite(file);
}
+ @Override
+ public void checkPermission(Permission p) {
+
+ }
}
long id = new java.util.Date().getTime();
diff --git a/security/src/test/java/tests/security/permissions/JavaIoObjectInputStreamTest.java b/security/src/test/java/tests/security/permissions/JavaIoObjectInputStreamTest.java
index 27ef0c1..1fb873f 100644
--- a/security/src/test/java/tests/security/permissions/JavaIoObjectInputStreamTest.java
+++ b/security/src/test/java/tests/security/permissions/JavaIoObjectInputStreamTest.java
@@ -85,7 +85,6 @@ public class JavaIoObjectInputStreamTest extends TestCase {
called = true;
this.permission = permission;
}
- super.checkPermission(permission);
}
}
@@ -145,7 +144,6 @@ public class JavaIoObjectInputStreamTest extends TestCase {
called = true;
this.permission = permission;
}
- super.checkPermission(permission);
}
}
diff --git a/security/src/test/java/tests/security/permissions/JavaIoObjectOutputStreamTest.java b/security/src/test/java/tests/security/permissions/JavaIoObjectOutputStreamTest.java
index 5e98b59..0de39df 100644
--- a/security/src/test/java/tests/security/permissions/JavaIoObjectOutputStreamTest.java
+++ b/security/src/test/java/tests/security/permissions/JavaIoObjectOutputStreamTest.java
@@ -72,7 +72,6 @@ public class JavaIoObjectOutputStreamTest extends TestCase {
called = true;
this.permission = permission;
}
- super.checkPermission(permission);
}
}
@@ -124,7 +123,6 @@ public class JavaIoObjectOutputStreamTest extends TestCase {
called = true;
this.permission = permission;
}
- super.checkPermission(permission);
}
}
diff --git a/security/src/test/java/tests/security/permissions/JavaIoRandomAccessFileTest.java b/security/src/test/java/tests/security/permissions/JavaIoRandomAccessFileTest.java
index 7cb875f..8201e32 100644
--- a/security/src/test/java/tests/security/permissions/JavaIoRandomAccessFileTest.java
+++ b/security/src/test/java/tests/security/permissions/JavaIoRandomAccessFileTest.java
@@ -26,6 +26,7 @@ import junit.framework.TestCase;
import java.io.File;
import java.io.IOException;
import java.io.RandomAccessFile;
+import java.security.Permission;
/*
* This class tests the security permissions which are documented in
* http://java.sun.com/j2se/1.5.0/docs/guide/security/permissions.html#PermsAndMethods
@@ -76,6 +77,10 @@ public class JavaIoRandomAccessFileTest extends TestCase {
this.file = file;
super.checkRead(file);
}
+ @Override
+ public void checkPermission(Permission p) {
+
+ }
}
long id = new java.util.Date().getTime();
@@ -130,6 +135,10 @@ public class JavaIoRandomAccessFileTest extends TestCase {
this.checkWriteFile = file;
super.checkWrite(file);
}
+ @Override
+ public void checkPermission(Permission p) {
+
+ }
}
long id = new java.util.Date().getTime();
diff --git a/security/src/test/java/tests/security/permissions/JavaLangClassLoaderTest.java b/security/src/test/java/tests/security/permissions/JavaLangClassLoaderTest.java
index 12016e8..cd8640b 100644
--- a/security/src/test/java/tests/security/permissions/JavaLangClassLoaderTest.java
+++ b/security/src/test/java/tests/security/permissions/JavaLangClassLoaderTest.java
@@ -16,7 +16,7 @@
package tests.security.permissions;
-import dalvik.annotation.AndroidOnly;
+import dalvik.annotation.BrokenTest;
import dalvik.annotation.TestTargets;
import dalvik.annotation.TestLevel;
import dalvik.annotation.TestTargetNew;
@@ -71,7 +71,10 @@ public class JavaLangClassLoaderTest extends TestCase {
@Override
public void checkCreateClassLoader(){
called = true;
- super.checkCreateClassLoader();
+ }
+ @Override
+ public void checkPermission(Permission p) {
+
}
}
@@ -102,12 +105,12 @@ public class JavaLangClassLoaderTest extends TestCase {
),
@TestTargetNew(
level = TestLevel.PARTIAL,
- notes = "Verifies that ClassLoader.getSystemClassLoader() calls checkPermission on security manager.",
+ notes = "Verifies that ClassLoader.getParent() calls checkPermission on security manager.",
method = "getParent",
args = {}
)
})
- @AndroidOnly("test must be executed with a new PathClassLoader")
+ @BrokenTest("RI and Android don't pass this test. Also this test must be executed with a new PathClassLoader")
public void test_getSystemClassLoader () {
class TestSecurityManager extends SecurityManager {
boolean called;
@@ -119,7 +122,6 @@ public class JavaLangClassLoaderTest extends TestCase {
if(permission instanceof RuntimePermission && "getClassLoader".equals(permission.getName())){
called = true;
}
- super.checkPermission(permission);
}
}
diff --git a/security/src/test/java/tests/security/permissions/JavaLangClassTest.java b/security/src/test/java/tests/security/permissions/JavaLangClassTest.java
index 18277a0..f666d44 100644
--- a/security/src/test/java/tests/security/permissions/JavaLangClassTest.java
+++ b/security/src/test/java/tests/security/permissions/JavaLangClassTest.java
@@ -19,8 +19,6 @@ package tests.security.permissions;
import java.security.Permission;
import junit.framework.TestCase;
-import dalvik.annotation.AndroidOnly;
-import dalvik.annotation.KnownFailure;
import dalvik.annotation.TestLevel;
import dalvik.annotation.TestTargetClass;
import dalvik.annotation.TestTargetNew;
@@ -54,8 +52,6 @@ public class JavaLangClassTest extends TestCase {
method = "getProtectionDomain",
args = {}
)
- @KnownFailure("Fails because the default security manager allows " +
- "everything. Remove this when it is more restrictive.")
public void test_getProtectionDomain () {
class TestSecurityManager extends SecurityManager {
boolean called;
@@ -66,7 +62,6 @@ public class JavaLangClassTest extends TestCase {
public void checkPermission(Permission permission){
if(permission instanceof RuntimePermission && "getProtectionDomain".equals(permission.getName())){
called = true;
- super.checkPermission(permission);
}
}
}
@@ -78,12 +73,7 @@ public class JavaLangClassTest extends TestCase {
System.setSecurityManager(s);
s.reset();
- try {
- c.getProtectionDomain();
- fail("Test 1: SecurityException expected.");
- } catch (SecurityException e) {
- // Expected.
- }
+ c.getProtectionDomain();
assertTrue("Test 2: Class.getProtectionDomain() must check " +
"RuntimePermission(\"getProtectionDomain\") on " +
"security manager", s.called);
@@ -95,11 +85,6 @@ public class JavaLangClassTest extends TestCase {
method = "forName",
args = {String.class, boolean.class, ClassLoader.class}
)
- @AndroidOnly("")
- // TODO it is not clear under which conditions the security manager is inspected
- // Should only be checked if the calling class loader is not null.
- @KnownFailure("Fails because the default security manager allows " +
- "everything. Remove this when it is more restrictive.")
public void test_forName() throws ClassNotFoundException {
class TestSecurityManager extends SecurityManager {
boolean called;
@@ -110,7 +95,6 @@ public class JavaLangClassTest extends TestCase {
public void checkPermission(Permission permission){
if (permission instanceof RuntimePermission && "getClassLoader".equals(permission.getName())){
called = true;
- super.checkPermission(permission);
}
}
}
@@ -119,27 +103,9 @@ public class JavaLangClassTest extends TestCase {
System.setSecurityManager(s);
s.reset();
- try {
- Class.forName("java.lang.String", true, null);
- fail("Test 1: Security exception expected.");
- } catch (SecurityException e) {
- // Expected.
- }
+ Class.forName("java.lang.String", true, null);
assertTrue("Test 2: Class.forName(String,boolean,Classloader) must " +
"check RuntimePermission(getClassLoader) on security manager",
s.called);
}
-
- /*
- @TestTargetNew(
- level = TestLevel.TODO,
- notes = "this test is only here as otherwise all tests in this class " +
- "would be underscored which would give an error upon" +
- "invokation of the tests.",
- method = "forName",
- args = {String.class, boolean.class, ClassLoader.class}
- )
- public void test_dummy() throws ClassNotFoundException {}
- */
-
}
diff --git a/security/src/test/java/tests/security/permissions/JavaLangReflectAccessibleObjectTest.java b/security/src/test/java/tests/security/permissions/JavaLangReflectAccessibleObjectTest.java
index 6831467..a618546 100644
--- a/security/src/test/java/tests/security/permissions/JavaLangReflectAccessibleObjectTest.java
+++ b/security/src/test/java/tests/security/permissions/JavaLangReflectAccessibleObjectTest.java
@@ -55,7 +55,6 @@ public class JavaLangReflectAccessibleObjectTest extends TestCase {
&& "suppressAccessChecks".equals(permission.getName())) {
called = true;
}
- super.checkPermission(permission);
}
}
@@ -87,9 +86,7 @@ public class JavaLangReflectAccessibleObjectTest extends TestCase {
&& "suppressAccessChecks".equals(permission.getName())) {
called = true;
}
- super.checkPermission(permission);
}
-
}
TestSecurityManager s = new TestSecurityManager();
System.setSecurityManager(s);
diff --git a/security/src/test/java/tests/security/permissions/JavaLangRuntimeTest.java b/security/src/test/java/tests/security/permissions/JavaLangRuntimeTest.java
index 519660a..c78f6cc 100644
--- a/security/src/test/java/tests/security/permissions/JavaLangRuntimeTest.java
+++ b/security/src/test/java/tests/security/permissions/JavaLangRuntimeTest.java
@@ -16,7 +16,6 @@
package tests.security.permissions;
-import dalvik.annotation.KnownFailure;
import dalvik.annotation.TestTargets;
import dalvik.annotation.TestLevel;
import dalvik.annotation.TestTargetNew;
@@ -78,17 +77,18 @@ public class JavaLangRuntimeTest extends TestCase {
class TestSecurityManager extends SecurityManager {
boolean called;
String cmd;
-
void reset(){
called = false;
cmd = null;
}
-
@Override
public void checkExec(String cmd) {
called = true;
this.cmd = cmd;
- super.checkExec(cmd);
+ }
+ @Override
+ public void checkPermission(Permission p) {
+
}
}
@@ -133,7 +133,6 @@ public class JavaLangRuntimeTest extends TestCase {
args = {java.lang.Thread.class}
)
})
- @KnownFailure("ToT fixed.")
public void test_shutdownHook() {
class TestSecurityManager extends SecurityManager {
boolean called;
@@ -148,7 +147,6 @@ public class JavaLangRuntimeTest extends TestCase {
called = true;
this.permission = permission;
}
- super.checkPermission(permission);
}
}
@@ -189,6 +187,10 @@ public class JavaLangRuntimeTest extends TestCase {
this.status = status;
throw new ExitNotAllowedException(); // prevent that the system is shut down
}
+ @Override
+ public void checkPermission(Permission p) {
+
+ }
}
TestSecurityManager s = new TestSecurityManager();
@@ -212,7 +214,6 @@ public class JavaLangRuntimeTest extends TestCase {
method = "runFinalizersOnExit",
args = {boolean.class}
)
- @KnownFailure("ToT fixed.")
public void test_runFinalizersOnExit() {
class TestSecurityManager extends SecurityManager {
boolean called;
@@ -225,7 +226,10 @@ public class JavaLangRuntimeTest extends TestCase {
public void checkExit(int status){
this.called = true;
this.status = status;
- super.checkExit(status);
+ }
+ @Override
+ public void checkPermission(Permission p) {
+
}
}
@@ -268,7 +272,10 @@ public class JavaLangRuntimeTest extends TestCase {
if(library.equals(lib)){
throw new CheckLinkCalledException();
}
- super.checkLink(lib);
+ }
+ @Override
+ public void checkPermission(Permission p) {
+
}
}
@@ -299,6 +306,3 @@ public class JavaLangRuntimeTest extends TestCase {
}
}
-
-
-
diff --git a/security/src/test/java/tests/security/permissions/JavaLangSystemTest.java b/security/src/test/java/tests/security/permissions/JavaLangSystemTest.java
index 02f1031..d1bf7c2 100644
--- a/security/src/test/java/tests/security/permissions/JavaLangSystemTest.java
+++ b/security/src/test/java/tests/security/permissions/JavaLangSystemTest.java
@@ -16,7 +16,6 @@
package tests.security.permissions;
-import dalvik.annotation.KnownFailure;
import dalvik.annotation.TestTargets;
import dalvik.annotation.TestLevel;
import dalvik.annotation.TestTargetNew;
@@ -76,7 +75,11 @@ public class JavaLangSystemTest extends TestCase {
@Override
public void checkPropertiesAccess() {
called = true;
- super.checkPropertiesAccess();
+ }
+
+ @Override
+ public void checkPermission(Permission p) {
+ // nothing to do
}
}
@@ -120,7 +123,11 @@ public class JavaLangSystemTest extends TestCase {
public void checkPropertyAccess(String key) {
called = true;
this.key = key;
- super.checkPropertyAccess(key);
+ }
+
+ @Override
+ public void checkPermission(Permission p) {
+ // nothing to do
}
}
@@ -158,7 +165,6 @@ public class JavaLangSystemTest extends TestCase {
public void checkPermission(Permission p) {
called = true;
this.p = p;
- super.checkPermission(p);
}
}
@@ -185,7 +191,6 @@ public class JavaLangSystemTest extends TestCase {
if(permission instanceof RuntimePermission && "setSecurityManager".equals(permission.getName())){
called = true;
}
- super.checkPermission(permission);
}
}
@@ -220,7 +225,6 @@ public class JavaLangSystemTest extends TestCase {
args = {java.io.PrintStream.class}
)
})
- @KnownFailure("ToT fixed.")
public void test_setInOutErr() {
class TestSecurityManager extends SecurityManager {
boolean called;
@@ -235,7 +239,6 @@ public class JavaLangSystemTest extends TestCase {
public void checkPermission(Permission p) {
called = true;
this.p = p;
- super.checkPermission(p);
}
}
@@ -282,6 +285,11 @@ public class JavaLangSystemTest extends TestCase {
this.status = status;
throw new ExitNotAllowedException(); // prevent that the system is shut down
}
+
+ @Override
+ public void checkPermission(Permission p) {
+ // nothing to do
+ }
}
TestSecurityManager s = new TestSecurityManager();
@@ -305,7 +313,6 @@ public class JavaLangSystemTest extends TestCase {
method = "runFinalizersOnExit",
args = {boolean.class}
)
- @KnownFailure("ToT fixed.")
public void test_runFinalizersOnExit() {
class TestSecurityManager extends SecurityManager {
boolean called;
@@ -318,7 +325,11 @@ public class JavaLangSystemTest extends TestCase {
public void checkExit(int status){
this.called = true;
this.status = status;
- super.checkExit(status);
+ }
+
+ @Override
+ public void checkPermission(Permission p) {
+ // nothing to do
}
}
@@ -339,18 +350,17 @@ public class JavaLangSystemTest extends TestCase {
@TestTargets({
@TestTargetNew(
level = TestLevel.PARTIAL,
- notes = "Verifies that methods load and loadLibrary call checkLink on security manager., loadlibrary needs to be fixed, see ticket #58",
+ notes = "Verifies that methods load and loadLibrary call checkLink on security manager.",
method = "load",
args = {java.lang.String.class}
),
@TestTargetNew(
level = TestLevel.PARTIAL,
- notes = "Verifies that methods load and loadLibrary call checkLink on security manager., loadlibrary needs to be fixed, see ticket #58",
+ notes = "Verifies that methods load and loadLibrary call checkLink on security manager.",
method = "loadLibrary",
args = {java.lang.String.class}
)
})
- @KnownFailure("ToT fixed.")
public void test_load() {
final String library = "library";
@@ -364,6 +374,11 @@ public class JavaLangSystemTest extends TestCase {
}
super.checkLink(lib);
}
+
+ @Override
+ public void checkPermission(Permission p) {
+ // nothing to do
+ }
}
TestSecurityManager s = new TestSecurityManager();
@@ -371,26 +386,25 @@ public class JavaLangSystemTest extends TestCase {
try {
System.load(library);
- fail("System.load must call checkLink on security manager with argument "+library);
+ fail("System.load must call checkLink on security manager with argument \"" + library + "\"");
}
catch(CheckLinkCalledException e){
// ok
}
catch(Throwable t){
- fail("System.load must call checkLink on security manager with argument "+library);
+ fail("System.load must call checkLink on security manager with argument \"" + library + "\"");
}
try {
System.loadLibrary(library);
- fail("System.load must call checkLink on security manager with argument "+library);
+ fail("System.loadLibrary must call checkLink on security manager with argument \"" + library + "\"");
}
catch(CheckLinkCalledException e){
// ok
}
catch(Throwable t){
- fail("System.load must call checkLink on security manager with argument "+library);
+ fail("System.loadLibrary must call checkLink on security manager with argument \"" + library + "\"");
}
}
}
-
diff --git a/security/src/test/java/tests/security/permissions/JavaLangThreadTest.java b/security/src/test/java/tests/security/permissions/JavaLangThreadTest.java
index 1dd2e13..2c9af67 100644
--- a/security/src/test/java/tests/security/permissions/JavaLangThreadTest.java
+++ b/security/src/test/java/tests/security/permissions/JavaLangThreadTest.java
@@ -16,7 +16,7 @@
package tests.security.permissions;
-import dalvik.annotation.KnownFailure;
+import dalvik.annotation.AndroidOnly;
import dalvik.annotation.TestTargets;
import dalvik.annotation.TestLevel;
import dalvik.annotation.TestTargetNew;
@@ -67,7 +67,6 @@ public class JavaLangThreadTest extends TestCase {
public void checkPermission(Permission p) {
called = true;
this.p = p;
- super.checkPermission(p);
}
}
@@ -94,6 +93,7 @@ public class JavaLangThreadTest extends TestCase {
method = "enumerate",
args = {java.lang.Thread[].class}
)
+ @AndroidOnly("RI impl differs from RI spec, Android impl does not.")
public void test_enumerate() {
class TestSecurityManager extends SecurityManager {
boolean called;
@@ -108,7 +108,11 @@ public class JavaLangThreadTest extends TestCase {
public void checkAccess(Thread t) {
called = true;
this.t = t;
- super.checkAccess(t);
+ }
+
+ @Override
+ public void checkPermission(Permission p) {
+
}
}
@@ -132,14 +136,12 @@ public class JavaLangThreadTest extends TestCase {
@TestTargetNew(
level = TestLevel.PARTIAL,
notes = "Verifies that getContextClassLoader calls checkPermission " +
- "on security manager.Needs fixes in methods " +
- "Thread.getContextClassLoader and ClassLoader.isAncestorOf, " +
- "see ticket #101",
+ "on security manager.",
method = "getContextClassLoader",
args = {}
)
- @KnownFailure("ToT fixed.")
- public void testGetContextClassLoader() {
+ @AndroidOnly("RI impl differs from RI spec, Android impl does not.")
+ public void test_getContextClassLoader() {
class TestSecurityManager extends SecurityManager {
boolean called;
@@ -153,7 +155,6 @@ public class JavaLangThreadTest extends TestCase {
&& "getClassLoader".equals(p.getName())) {
called = true;
}
- super.checkPermission(p);
}
}
TestSecurityManager sm = new TestSecurityManager();
@@ -210,5 +211,4 @@ public class JavaLangThreadTest extends TestCase {
"caller's class loader is parent of requested class loader",
sm.called);
}
-
}
diff --git a/security/src/test/java/tests/security/permissions/JavaNetDatagramSocketTest.java b/security/src/test/java/tests/security/permissions/JavaNetDatagramSocketTest.java
index 29726c9..714c523 100644
--- a/security/src/test/java/tests/security/permissions/JavaNetDatagramSocketTest.java
+++ b/security/src/test/java/tests/security/permissions/JavaNetDatagramSocketTest.java
@@ -30,8 +30,7 @@ import java.net.DatagramPacket;
import java.net.DatagramSocket;
import java.net.InetAddress;
import java.net.InetSocketAddress;
-import java.net.SocketAddress;
-import java.net.SocketTimeoutException;
+import java.security.Permission;
/*
* This class tests the security permissions which are documented in
@@ -78,18 +77,19 @@ public class JavaNetDatagramSocketTest extends TestCase {
public void test_ctor() throws IOException {
class TestSecurityManager extends SecurityManager {
boolean called = false;
- String host = null;
int port = 0;
void reset(){
called = false;
- host = null;
port = 0;
}
@Override
public void checkListen(int port) {
called = true;
this.port = port;
- super.checkListen(port);
+ }
+ @Override
+ public void checkPermission(Permission p) {
+
}
}
@@ -131,20 +131,18 @@ public class JavaNetDatagramSocketTest extends TestCase {
public void test_receive() throws IOException {
class TestSecurityManager extends SecurityManager {
boolean called = false;
- String host = null;
- int port = 0;
void reset(){
called = false;
- host = null;
- port = 0;
}
@Override
public void checkAccept(String host, int port) {
- this.host = host;
- this.port = port;
this.called = true;
super.checkAccept(host, port);
}
+ @Override
+ public void checkPermission(Permission p) {
+
+ }
}
final int port = Support_PortManager.getNextPortForUDP();
@@ -177,12 +175,10 @@ public class JavaNetDatagramSocketTest extends TestCase {
System.setSecurityManager(s);
s.reset();
- assert(s1.getInetAddress()==null);
assertTrue(s1.getInetAddress()==null);
try {
s1.receive(p);
- }
- catch(Exception e){
+ } catch(Exception e) {
fail("unexpected exception " + e);
}
sender.interrupt();
diff --git a/security/src/test/java/tests/security/permissions/JavaNetMulticastSocketTest.java b/security/src/test/java/tests/security/permissions/JavaNetMulticastSocketTest.java
index f970345..f48e5d3 100644
--- a/security/src/test/java/tests/security/permissions/JavaNetMulticastSocketTest.java
+++ b/security/src/test/java/tests/security/permissions/JavaNetMulticastSocketTest.java
@@ -29,6 +29,7 @@ import java.io.IOException;
import java.net.InetSocketAddress;
import java.net.MulticastSocket;
import java.net.SocketAddress;
+import java.security.Permission;
/*
* This class tests the secrity permissions which are documented in
@@ -86,6 +87,10 @@ public class JavaNetMulticastSocketTest extends TestCase {
this.port = port;
super.checkListen(port);
}
+ @Override
+ public void checkPermission(Permission permission) {
+
+ }
}
TestSecurityManager s = new TestSecurityManager();
diff --git a/security/src/test/java/tests/security/permissions/JavaNetServerSocketTest.java b/security/src/test/java/tests/security/permissions/JavaNetServerSocketTest.java
index ff439bd..f26becc 100644
--- a/security/src/test/java/tests/security/permissions/JavaNetServerSocketTest.java
+++ b/security/src/test/java/tests/security/permissions/JavaNetServerSocketTest.java
@@ -27,7 +27,7 @@ import java.io.IOException;
import java.net.InetAddress;
import java.net.InetSocketAddress;
import java.net.ServerSocket;
-import java.net.SocketAddress;
+import java.security.Permission;
/*
* This class tests the security permissions which are documented in
* http://java.sun.com/j2se/1.5.0/docs/guide/security/permissions.html#PermsAndMethods
@@ -88,7 +88,10 @@ public class JavaNetServerSocketTest extends TestCase {
public void checkListen(int port) {
called = true;
this.port = port;
- super.checkListen(port);
+ }
+ @Override
+ public void checkPermission(Permission permission) {
+
}
}
diff --git a/security/src/test/java/tests/security/permissions/JavaNetSocketTest.java b/security/src/test/java/tests/security/permissions/JavaNetSocketTest.java
index fac1206..314feb8 100644
--- a/security/src/test/java/tests/security/permissions/JavaNetSocketTest.java
+++ b/security/src/test/java/tests/security/permissions/JavaNetSocketTest.java
@@ -16,6 +16,7 @@
package tests.security.permissions;
+import dalvik.annotation.KnownFailure;
import dalvik.annotation.TestTargets;
import dalvik.annotation.TestLevel;
import dalvik.annotation.TestTargetNew;
@@ -26,6 +27,7 @@ import junit.framework.TestCase;
import java.io.IOException;
import java.net.InetAddress;
import java.net.Socket;
+import java.security.Permission;
/*
* This class tests the security permissions which are documented in
* http://java.sun.com/j2se/1.5.0/docs/guide/security/permissions.html#PermsAndMethods
@@ -86,6 +88,7 @@ public class JavaNetSocketTest extends TestCase {
args = {java.net.InetAddress.class, int.class, java.net.InetAddress.class, int.class}
)
})
+ @KnownFailure("ToT fixed")
public void test_ctor() throws IOException {
class TestSecurityManager extends SecurityManager {
boolean called = false;
@@ -101,12 +104,16 @@ public class JavaNetSocketTest extends TestCase {
this.called = true;
this.port = port;
this.host = host;
- super.checkConnect(host, port);
+ }
+ @Override
+ public void checkPermission(Permission permission) {
+
}
}
String host = "www.google.ch";
int port = 80;
+ String hostAddress = InetAddress.getByName(host).getHostAddress();
TestSecurityManager s = new TestSecurityManager();
System.setSecurityManager(s);
@@ -114,40 +121,37 @@ public class JavaNetSocketTest extends TestCase {
s.reset();
new Socket(host, port);
assertTrue("java.net.ServerSocket ctor must call checkConnect on security permissions", s.called);
- assertEquals("Argument of checkConnect is not correct", host, s.host);
+ assertEquals("Argument of checkConnect is not correct", hostAddress, s.host);
assertEquals("Argument of checkConnect is not correct", port, s.port);
s.reset();
new Socket(host, port, true);
assertTrue("java.net.ServerSocket ctor must call checkConnect on security permissions", s.called);
- assertEquals("Argument of checkConnect is not correct", host, s.host);
+ assertEquals("Argument of checkConnect is not correct", hostAddress, s.host);
assertEquals("Argument of checkConnect is not correct", port, s.port);
-// TODO returns error message "the socket level is invalid", see ticket 66
-// s.reset();
-// new Socket(host, port, InetAddress.getLocalHost(), 0);
-// assertTrue("java.net.ServerSocket ctor must call checkConnect on security permissions", s.called);
-// assertEquals("Argument of checkConnect is not correct", host, s.host);
-// assertEquals("Argument of checkConnect is not correct", port, s.port);
+ s.reset();
+ new Socket(host, port, InetAddress.getByAddress(new byte[] {0,0,0,0}), 0);
+ assertTrue("java.net.ServerSocket ctor must call checkConnect on security permissions", s.called);
+ assertEquals("Argument of checkConnect is not correct", hostAddress, s.host);
+ assertEquals("Argument of checkConnect is not correct", port, s.port);
s.reset();
new Socket(InetAddress.getByName(host), port);
assertTrue("java.net.ServerSocket ctor must call checkConnect on security permissions", s.called);
- assertEquals("Argument of checkConnect is not correct", host, s.host);
+ assertEquals("Argument of checkConnect is not correct", hostAddress, s.host);
assertEquals("Argument of checkConnect is not correct", port, s.port);
s.reset();
new Socket(InetAddress.getByName(host), port, true);
assertTrue("java.net.ServerSocket ctor must call checkConnect on security permissions", s.called);
- assertEquals("Argument of checkConnect is not correct", host, s.host);
+ assertEquals("Argument of checkConnect is not correct", hostAddress, s.host);
assertEquals("Argument of checkConnect is not correct", port, s.port);
-// TODO returns error message "the socket level is invalid", see ticket 66
-// s.reset();
-// new Socket(InetAddress.getByName(host), port, InetAddress.getLocalHost(), 0);
-// assertTrue("java.net.ServerSocket ctor must call checkConnect on security permissions", s.called);
-// assertEquals("Argument of checkConnect is not correct", host, s.host);
-// assertEquals("Argument of checkConnect is not correct", port, s.port);
+ s.reset();
+ new Socket(InetAddress.getByName(host), port, InetAddress.getByAddress(new byte[] {0,0,0,0}), 0);
+ assertTrue("java.net.ServerSocket ctor must call checkConnect on security permissions", s.called);
+ assertEquals("Argument of checkConnect is not correct", hostAddress, s.host);
+ assertEquals("Argument of checkConnect is not correct", port, s.port);
}
-
}
diff --git a/security/src/test/java/tests/security/permissions/JavaSecurityPolicyTest.java b/security/src/test/java/tests/security/permissions/JavaSecurityPolicyTest.java
index c779b2e..c07940e 100644
--- a/security/src/test/java/tests/security/permissions/JavaSecurityPolicyTest.java
+++ b/security/src/test/java/tests/security/permissions/JavaSecurityPolicyTest.java
@@ -65,7 +65,6 @@ public class JavaSecurityPolicyTest extends TestCase {
if(permission instanceof SecurityPermission && "getPolicy".equals(permission.getName())){
called = true;
}
- super.checkPermission(permission);
}
}
TestSecurityManager s = new TestSecurityManager();
@@ -93,7 +92,6 @@ public class JavaSecurityPolicyTest extends TestCase {
if(permission instanceof SecurityPermission && "setPolicy".equals(permission.getName())){
called = true;
}
- super.checkPermission(permission);
}
}
diff --git a/security/src/test/java/tests/security/permissions/JavaSecuritySecurityTest.java b/security/src/test/java/tests/security/permissions/JavaSecuritySecurityTest.java
index 8b2d713..e84c976 100644
--- a/security/src/test/java/tests/security/permissions/JavaSecuritySecurityTest.java
+++ b/security/src/test/java/tests/security/permissions/JavaSecuritySecurityTest.java
@@ -16,7 +16,6 @@
package tests.security.permissions;
-import dalvik.annotation.KnownFailure;
import dalvik.annotation.TestTargets;
import dalvik.annotation.TestLevel;
import dalvik.annotation.TestTargetNew;
@@ -73,9 +72,7 @@ public class JavaSecuritySecurityTest extends TestCase {
target = permission.getName();
if (target.equals("getProperty.key")) {
called = true;
- return;
}
- super.checkPermission(permission);
}
}
@@ -89,46 +86,6 @@ public class JavaSecuritySecurityTest extends TestCase {
assertEquals("Argument of checkSecurityAccess is not correct", "getProperty.key", s.target);
}
- @TestTargets({
- @TestTargetNew(
- level = TestLevel.PARTIAL_COMPLETE,
- notes = "",
- method = "getProperty",
- args = {String.class}
- ),
- @TestTargetNew(
- level = TestLevel.PARTIAL_COMPLETE,
- notes = "",
- method = "setProperty",
- args = {String.class, String.class}
- )
- })
- @KnownFailure("As long as ProtectionDomains are not implemeneted the default implementation of SecurityManager will allow everything.")
- public void test_getProperty_setProperty_SecurityException() {
- System.setSecurityManager(new SecurityManager() {
- @Override
- public void checkPermission(Permission permission) {
- if (permission instanceof SecurityPermission) {
- super.checkPermission(permission);
- }
- }
- });
-
- try {
- Security.getProperty("anotherKey");
- fail("expected SecurityException");
- } catch (SecurityException e) {
- // ok
- }
-
- try {
- Security.setProperty("anotherKey", "anotherValue");
- fail("expected SecurityException");
- } catch (SecurityException e) {
- // ok
- }
- }
-
@TestTargetNew(
level = TestLevel.PARTIAL_COMPLETE,
notes = "Verifies that setProperty() method calls checkSecurityAccess on security manager.",
@@ -150,9 +107,7 @@ public class JavaSecuritySecurityTest extends TestCase {
target = permission.getName();
if (target.equals("setProperty.key")) {
called = true;
- return;
}
- super.checkPermission(permission);
}
}
}
diff --git a/security/src/test/java/tests/security/permissions/JavaUtilZipZipFile.java b/security/src/test/java/tests/security/permissions/JavaUtilZipZipFile.java
index 36b30ff..f8cb026 100644
--- a/security/src/test/java/tests/security/permissions/JavaUtilZipZipFile.java
+++ b/security/src/test/java/tests/security/permissions/JavaUtilZipZipFile.java
@@ -24,6 +24,7 @@ import dalvik.annotation.TestTargetClass;
import junit.framework.TestCase;
import java.io.IOException;
+import java.io.File;
import java.util.zip.ZipFile;
/*
* This class tests the security permissions which are documented in
@@ -70,7 +71,8 @@ public class JavaUtilZipZipFile extends TestCase {
}
}
- String filename = "foo.zip";
+ File file = File.createTempFile("foo", "zip");
+ String filename = file.getAbsolutePath();
TestSecurityManager s = new TestSecurityManager();
System.setSecurityManager(s);
diff --git a/security/src/test/java/tests/security/permissions/JavaxSecurityAuthSubject.java b/security/src/test/java/tests/security/permissions/JavaxSecurityAuthSubject.java
index 289df0f..46f52c6 100644
--- a/security/src/test/java/tests/security/permissions/JavaxSecurityAuthSubject.java
+++ b/security/src/test/java/tests/security/permissions/JavaxSecurityAuthSubject.java
@@ -23,7 +23,7 @@ import dalvik.annotation.TestTargets;
import junit.framework.TestCase;
-import org.apache.harmony.security.tests.support.acl.PrincipalImpl;
+//import org.apache.harmony.security.tests.support.acl.PrincipalImpl;
import java.security.AccessControlContext;
import java.security.KeyFactory;
@@ -95,7 +95,6 @@ public class JavaxSecurityAuthSubject extends TestCase {
&& "getSubject".equals(permission.getName())) {
called = true;
}
- super.checkPermission(permission);
}
}
@@ -140,7 +139,6 @@ public class JavaxSecurityAuthSubject extends TestCase {
&& "setReadOnly".equals(permission.getName())) {
called = true;
}
- super.checkPermission(permission);
}
}
@@ -186,7 +184,6 @@ public class JavaxSecurityAuthSubject extends TestCase {
&& "doAs".equals(permission.getName())) {
called = true;
}
- super.checkPermission(permission);
}
}
@@ -223,13 +220,13 @@ public class JavaxSecurityAuthSubject extends TestCase {
@TestTargets({
@TestTargetNew(
- level = TestLevel.PARTIAL,
+ level = TestLevel.TODO,
notes = "Exception checking missing",
method = "doAs",
args = {javax.security.auth.Subject.class, java.security.PrivilegedAction.class}
),
@TestTargetNew(
- level = TestLevel.PARTIAL,
+ level = TestLevel.TODO,
notes = "Exception checking missing",
method = "doAs",
args = {javax.security.auth.Subject.class, java.security.PrivilegedExceptionAction.class}
@@ -267,7 +264,6 @@ public class JavaxSecurityAuthSubject extends TestCase {
&& "doAsPrivileged".equals(permission.getName())) {
called = true;
}
- super.checkPermission(permission);
}
}
@@ -304,13 +300,13 @@ public class JavaxSecurityAuthSubject extends TestCase {
@TestTargets({
@TestTargetNew(
- level = TestLevel.PARTIAL,
+ level = TestLevel.TODO,
notes = "",
method = "doAsPrivileged",
args = {javax.security.auth.Subject.class, java.security.PrivilegedAction.class, java.security.AccessControlContext.class}
),
@TestTargetNew(
- level = TestLevel.PARTIAL,
+ level = TestLevel.TODO,
notes = "",
method = "doAsPrivileged",
args = {javax.security.auth.Subject.class, java.security.PrivilegedExceptionAction.class, java.security.AccessControlContext.class}
@@ -322,13 +318,13 @@ public class JavaxSecurityAuthSubject extends TestCase {
@TestTargets({
@TestTargetNew(
- level = TestLevel.PARTIAL,
+ level = TestLevel.TODO,
notes = "",
method = "isReadOnly",
args = {}
),
@TestTargetNew(
- level = TestLevel.PARTIAL,
+ level = TestLevel.TODO,
notes = "",
method = "setReadOnly",
args = {}
@@ -339,7 +335,7 @@ public class JavaxSecurityAuthSubject extends TestCase {
}
@TestTargetNew(
- level = TestLevel.PARTIAL,
+ level = TestLevel.TODO,
notes = "",
method = "getPrincipals",
args = {}
@@ -349,7 +345,7 @@ public class JavaxSecurityAuthSubject extends TestCase {
}
@TestTargetNew(
- level = TestLevel.PARTIAL,
+ level = TestLevel.TODO,
notes = "",
method = "getPrincipals",
args = {java.lang.Class.class}
@@ -359,7 +355,7 @@ public class JavaxSecurityAuthSubject extends TestCase {
}
@TestTargetNew(
- level = TestLevel.PARTIAL,
+ level = TestLevel.TODO,
notes = "",
method = "getPrivateCredentials",
args = {}
@@ -369,7 +365,7 @@ public class JavaxSecurityAuthSubject extends TestCase {
}
@TestTargetNew(
- level = TestLevel.PARTIAL,
+ level = TestLevel.TODO,
notes = "",
method = "getPrivateCredentials",
args = {java.lang.Class.class}
@@ -379,7 +375,7 @@ public class JavaxSecurityAuthSubject extends TestCase {
}
@TestTargetNew(
- level = TestLevel.PARTIAL,
+ level = TestLevel.TODO,
notes = "",
method = "getPublicCredentials",
args = {}
@@ -389,7 +385,7 @@ public class JavaxSecurityAuthSubject extends TestCase {
}
@TestTargetNew(
- level = TestLevel.PARTIAL,
+ level = TestLevel.TODO,
notes = "",
method = "getPublicCredentials",
args = {java.lang.Class.class}
@@ -399,7 +395,7 @@ public class JavaxSecurityAuthSubject extends TestCase {
}
@TestTargetNew(
- level = TestLevel.PARTIAL,
+ level = TestLevel.TODO,
notes = "",
method = "getSubject",
args = {java.security.AccessControlContext.class}
@@ -409,7 +405,7 @@ public class JavaxSecurityAuthSubject extends TestCase {
}
@TestTargetNew(
- level = TestLevel.PARTIAL,
+ level = TestLevel.TODO,
notes = "",
method = "hashCode",
args = {}
@@ -419,7 +415,7 @@ public class JavaxSecurityAuthSubject extends TestCase {
}
@TestTargetNew(
- level = TestLevel.PARTIAL,
+ level = TestLevel.TODO,
notes = "",
method = "equals",
args = {java.lang.Object.class}
@@ -442,7 +438,7 @@ public class JavaxSecurityAuthSubject extends TestCase {
}
@TestTargetNew(
- level = TestLevel.PARTIAL,
+ level = TestLevel.TODO,
notes = "test only started please continue. Throws exception InvalidKeySpecException line 455",
method = "Subject",
args = {boolean.class, java.util.Set.class, java.util.Set.class, java.util.Set.class}
diff --git a/security/src/test/java/tests/security/permissions/JavaxSecurityAuthSubjectDomainCombiner.java b/security/src/test/java/tests/security/permissions/JavaxSecurityAuthSubjectDomainCombiner.java
index f1f5bb0..8204aa2 100644
--- a/security/src/test/java/tests/security/permissions/JavaxSecurityAuthSubjectDomainCombiner.java
+++ b/security/src/test/java/tests/security/permissions/JavaxSecurityAuthSubjectDomainCombiner.java
@@ -72,7 +72,6 @@ public class JavaxSecurityAuthSubjectDomainCombiner extends TestCase {
&& "getSubjectFromDomainCombiner".equals(permission.getName())) {
called = true;
}
- super.checkPermission(permission);
}
}
diff --git a/security/src/test/java/tests/security/spec/DSAParameterSpecTest.java b/security/src/test/java/tests/security/spec/DSAParameterSpecTest.java
index 6a5e43e..42fce7b 100644
--- a/security/src/test/java/tests/security/spec/DSAParameterSpecTest.java
+++ b/security/src/test/java/tests/security/spec/DSAParameterSpecTest.java
@@ -41,14 +41,6 @@ import java.security.spec.DSAParameterSpec;
public class DSAParameterSpecTest extends TestCase {
/**
- * Constructor for DSAParameterSpecTest.
- * @param name
- */
- public DSAParameterSpecTest(String name) {
- super(name);
- }
-
- /**
* Ctor test
*/
@TestTargetNew(
diff --git a/security/src/test/java/tests/security/spec/DSAPrivateKeySpecTest.java b/security/src/test/java/tests/security/spec/DSAPrivateKeySpecTest.java
index b372b9d..f01e957 100644
--- a/security/src/test/java/tests/security/spec/DSAPrivateKeySpecTest.java
+++ b/security/src/test/java/tests/security/spec/DSAPrivateKeySpecTest.java
@@ -41,14 +41,6 @@ import java.security.spec.KeySpec;
public class DSAPrivateKeySpecTest extends TestCase {
/**
- * Constructor for DSAPrivateKeySpecTest.
- * @param name
- */
- public DSAPrivateKeySpecTest(String name) {
- super(name);
- }
-
- /**
* Test for constructor
*/
@TestTargetNew(
diff --git a/security/src/test/java/tests/security/spec/DSAPublicKeySpecTest.java b/security/src/test/java/tests/security/spec/DSAPublicKeySpecTest.java
index 872568b..6133836 100644
--- a/security/src/test/java/tests/security/spec/DSAPublicKeySpecTest.java
+++ b/security/src/test/java/tests/security/spec/DSAPublicKeySpecTest.java
@@ -41,14 +41,6 @@ import java.security.spec.KeySpec;
public class DSAPublicKeySpecTest extends TestCase {
/**
- * Constructor for DSAPublicKeySpecTest.
- * @param name
- */
- public DSAPublicKeySpecTest(String name) {
- super(name);
- }
-
- /**
* Test for <code>DSAPublicKeySpec</code> ctor
*/
@TestTargetNew(
diff --git a/security/src/test/java/tests/security/spec/ECFieldF2mTest.java b/security/src/test/java/tests/security/spec/ECFieldF2mTest.java
index 5681286..f731eaa 100644
--- a/security/src/test/java/tests/security/spec/ECFieldF2mTest.java
+++ b/security/src/test/java/tests/security/spec/ECFieldF2mTest.java
@@ -104,14 +104,6 @@ public class ECFieldF2mTest extends TestCase {
}
}
- /**
- * Constructor for ECFieldF2mTest.
- * @param name
- */
- public ECFieldF2mTest(String name) {
- super(name);
- }
-
//
// Tests
//
diff --git a/security/src/test/java/tests/security/spec/ECFieldFpTest.java b/security/src/test/java/tests/security/spec/ECFieldFpTest.java
index 8d2c083..82db1c1 100644
--- a/security/src/test/java/tests/security/spec/ECFieldFpTest.java
+++ b/security/src/test/java/tests/security/spec/ECFieldFpTest.java
@@ -39,14 +39,6 @@ import java.security.spec.ECFieldFp;
@TestTargetClass(ECFieldFp.class)
public class ECFieldFpTest extends TestCase {
- /**
- * Constructor for ECFieldFpTest.
- * @param name
- */
- public ECFieldFpTest(String name) {
- super(name);
- }
-
//
// Tests
//
diff --git a/security/src/test/java/tests/security/spec/ECGenParameterSpecTest.java b/security/src/test/java/tests/security/spec/ECGenParameterSpecTest.java
index a3c2e6f..77747c3 100644
--- a/security/src/test/java/tests/security/spec/ECGenParameterSpecTest.java
+++ b/security/src/test/java/tests/security/spec/ECGenParameterSpecTest.java
@@ -38,14 +38,6 @@ import java.security.spec.ECGenParameterSpec;
@TestTargetClass(ECGenParameterSpec.class)
public class ECGenParameterSpecTest extends TestCase {
- /**
- * Constructor for ECGenParameterSpecTest.
- * @param name
- */
- public ECGenParameterSpecTest(String name) {
- super(name);
- }
-
//
// Tests
//
diff --git a/security/src/test/java/tests/security/spec/ECParameterSpecTest.java b/security/src/test/java/tests/security/spec/ECParameterSpecTest.java
index 55ac4d0..d970f67 100644
--- a/security/src/test/java/tests/security/spec/ECParameterSpecTest.java
+++ b/security/src/test/java/tests/security/spec/ECParameterSpecTest.java
@@ -38,15 +38,6 @@ public class ECParameterSpecTest extends TestCase {
ECParameterSpec ecps;
- /**
- * Constructor for ECParameterSpecTest.
- *
- * @param name
- */
- public ECParameterSpecTest(String name) {
- super(name);
- }
-
protected void setUp() throws Exception {
super.setUp();
curve = new EllipticCurve(new ECFieldF2m(2), BigInteger.valueOf(1),
diff --git a/security/src/test/java/tests/security/spec/ECPointTest.java b/security/src/test/java/tests/security/spec/ECPointTest.java
index 383592b..17856ae 100644
--- a/security/src/test/java/tests/security/spec/ECPointTest.java
+++ b/security/src/test/java/tests/security/spec/ECPointTest.java
@@ -39,14 +39,6 @@ import java.security.spec.ECPoint;
@TestTargetClass(ECPoint.class)
public class ECPointTest extends TestCase {
- /**
- * Constructor for ECPointTest.
- * @param name
- */
- public ECPointTest(String name) {
- super(name);
- }
-
//
// Tests
//
diff --git a/security/src/test/java/tests/security/spec/ECPrivateKeySpecTest.java b/security/src/test/java/tests/security/spec/ECPrivateKeySpecTest.java
index 6311f83..e13f7ee 100644
--- a/security/src/test/java/tests/security/spec/ECPrivateKeySpecTest.java
+++ b/security/src/test/java/tests/security/spec/ECPrivateKeySpecTest.java
@@ -39,15 +39,6 @@ public class ECPrivateKeySpecTest extends TestCase {
ECPrivateKeySpec ecpks;
- /**
- * Constructor for ECPrivateKeySpecTest
- *
- * @param name
- */
- public ECPrivateKeySpecTest(String name) {
- super(name);
- }
-
protected void setUp() throws Exception {
super.setUp();
diff --git a/security/src/test/java/tests/security/spec/ECPublicKeySpecTest.java b/security/src/test/java/tests/security/spec/ECPublicKeySpecTest.java
index b763cd9..c74939e 100644
--- a/security/src/test/java/tests/security/spec/ECPublicKeySpecTest.java
+++ b/security/src/test/java/tests/security/spec/ECPublicKeySpecTest.java
@@ -38,15 +38,6 @@ public class ECPublicKeySpecTest extends TestCase {
ECPublicKeySpec ecpks;
- /**
- * Constructor for ECPublicKeySpec
- *
- * @param name
- */
- public ECPublicKeySpecTest(String name) {
- super(name);
- }
-
protected void setUp() throws Exception {
super.setUp();
ECPoint ecpoint = new ECPoint(BigInteger.valueOf(1), BigInteger
diff --git a/security/src/test/java/tests/security/spec/EncodedKeySpecTest.java b/security/src/test/java/tests/security/spec/EncodedKeySpecTest.java
index 76605df..16208e4 100644
--- a/security/src/test/java/tests/security/spec/EncodedKeySpecTest.java
+++ b/security/src/test/java/tests/security/spec/EncodedKeySpecTest.java
@@ -41,15 +41,6 @@ import java.util.Arrays;
public class EncodedKeySpecTest extends TestCase {
/**
- * Constructor for EncodedKeySpecTest.
- *
- * @param name
- */
- public EncodedKeySpecTest(String name) {
- super(name);
- }
-
- /**
* Tests for constructor <code>EncodedKeySpec(byte[])</code><br>
*/
@TestTargetNew(
diff --git a/security/src/test/java/tests/security/spec/InvalidKeySpecExceptionTest.java b/security/src/test/java/tests/security/spec/InvalidKeySpecExceptionTest.java
index 4b500c6..ba3bb49 100644
--- a/security/src/test/java/tests/security/spec/InvalidKeySpecExceptionTest.java
+++ b/security/src/test/java/tests/security/spec/InvalidKeySpecExceptionTest.java
@@ -39,18 +39,6 @@ import java.security.spec.InvalidKeySpecException;
@TestTargetClass(InvalidKeySpecException.class)
public class InvalidKeySpecExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for InvalidKeySpecExceptionTests.
- *
- * @param arg0
- */
- public InvalidKeySpecExceptionTest(String arg0) {
- super(arg0);
- }
-
private static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/tests/security/spec/InvalidParameterSpecExceptionTest.java b/security/src/test/java/tests/security/spec/InvalidParameterSpecExceptionTest.java
index 104c8f5..b797525 100644
--- a/security/src/test/java/tests/security/spec/InvalidParameterSpecExceptionTest.java
+++ b/security/src/test/java/tests/security/spec/InvalidParameterSpecExceptionTest.java
@@ -39,18 +39,6 @@ import java.security.spec.InvalidParameterSpecException;
@TestTargetClass(InvalidParameterSpecException.class)
public class InvalidParameterSpecExceptionTest extends TestCase {
- public static void main(String[] args) {
- }
-
- /**
- * Constructor for InvalidParameterSpecExceptionTests.
- *
- * @param arg0
- */
- public InvalidParameterSpecExceptionTest(String arg0) {
- super(arg0);
- }
-
static String[] msgs = {
"",
"Check new message",
diff --git a/security/src/test/java/tests/security/spec/MGF1ParameterSpecTest.java b/security/src/test/java/tests/security/spec/MGF1ParameterSpecTest.java
index 2480b6f..2af3be4 100644
--- a/security/src/test/java/tests/security/spec/MGF1ParameterSpecTest.java
+++ b/security/src/test/java/tests/security/spec/MGF1ParameterSpecTest.java
@@ -43,14 +43,6 @@ public class MGF1ParameterSpecTest extends TestCase {
*/
private static final String testAlgName = "TEST";
- /**
- * Constructor for MGF1ParameterSpecTest.
- * @param arg0
- */
- public MGF1ParameterSpecTest(String arg0) {
- super(arg0);
- }
-
//
// Tests
//
diff --git a/security/src/test/java/tests/security/spec/PKCS8EncodedKeySpecTest.java b/security/src/test/java/tests/security/spec/PKCS8EncodedKeySpecTest.java
index 4b50e6e..1820d4e 100644
--- a/security/src/test/java/tests/security/spec/PKCS8EncodedKeySpecTest.java
+++ b/security/src/test/java/tests/security/spec/PKCS8EncodedKeySpecTest.java
@@ -40,14 +40,6 @@ import java.util.Arrays;
@TestTargetClass(PKCS8EncodedKeySpec.class)
public class PKCS8EncodedKeySpecTest extends TestCase {
- /**
- * Constructor for PKCS8EncodedKeySpecTest.
- * @param name
- */
- public PKCS8EncodedKeySpecTest(String name) {
- super(name);
- }
-
//
// Tests
//
diff --git a/security/src/test/java/tests/security/spec/PSSParameterSpecTest.java b/security/src/test/java/tests/security/spec/PSSParameterSpecTest.java
index 9082558..4525816 100644
--- a/security/src/test/java/tests/security/spec/PSSParameterSpecTest.java
+++ b/security/src/test/java/tests/security/spec/PSSParameterSpecTest.java
@@ -41,15 +41,6 @@ import java.security.spec.PSSParameterSpec;
public class PSSParameterSpecTest extends TestCase {
/**
- * Constructor for PSSParameterSpecTest.
- *
- * @param name
- */
- public PSSParameterSpecTest(String name) {
- super(name);
- }
-
- /**
* Test #1 for <code>PSSParameterSpec(int)</code> ctor<br>
* Assertion: constructs using valid parameter
* <code>PSSParameterSpec<code> object
diff --git a/security/src/test/java/tests/security/spec/RSAKeyGenParameterSpecTest.java b/security/src/test/java/tests/security/spec/RSAKeyGenParameterSpecTest.java
index 3d4f1d2..4752d39 100644
--- a/security/src/test/java/tests/security/spec/RSAKeyGenParameterSpecTest.java
+++ b/security/src/test/java/tests/security/spec/RSAKeyGenParameterSpecTest.java
@@ -41,14 +41,6 @@ import java.security.spec.RSAKeyGenParameterSpec;
public class RSAKeyGenParameterSpecTest extends TestCase {
/**
- * Constructor for RSAKeyGenParameterSpecTest.
- * @param name
- */
- public RSAKeyGenParameterSpecTest(String name) {
- super(name);
- }
-
- /**
* Test for <code>RSAKeyGenParameterSpec(int,BigInteger)</code> ctor
* Assertion: constructs <code>RSAKeyGenParameterSpec</code>
* object using valid parameters
diff --git a/security/src/test/java/tests/security/spec/RSAMultiPrimePrivateCrtKeySpecTest.java b/security/src/test/java/tests/security/spec/RSAMultiPrimePrivateCrtKeySpecTest.java
index ae79695..2963458 100644
--- a/security/src/test/java/tests/security/spec/RSAMultiPrimePrivateCrtKeySpecTest.java
+++ b/security/src/test/java/tests/security/spec/RSAMultiPrimePrivateCrtKeySpecTest.java
@@ -50,14 +50,6 @@ public class RSAMultiPrimePrivateCrtKeySpecTest extends TestCase {
new RSAOtherPrimeInfo(BigInteger.ONE, BigInteger.ONE, BigInteger.ONE)
};
- /**
- * Constructor for RSAMultiPrimePrivateCrtKeySpecTest.
- * @param name
- */
- public RSAMultiPrimePrivateCrtKeySpecTest(String name) {
- super(name);
- }
-
// Test-cases:
/**
diff --git a/security/src/test/java/tests/security/spec/RSAOtherPrimeInfoTest.java b/security/src/test/java/tests/security/spec/RSAOtherPrimeInfoTest.java
index 9344c97..8179e75 100644
--- a/security/src/test/java/tests/security/spec/RSAOtherPrimeInfoTest.java
+++ b/security/src/test/java/tests/security/spec/RSAOtherPrimeInfoTest.java
@@ -40,14 +40,6 @@ import java.security.spec.RSAOtherPrimeInfo;
public class RSAOtherPrimeInfoTest extends TestCase {
/**
- * Constructor for RSAOtherPrimeInfoTest.
- * @param name
- */
- public RSAOtherPrimeInfoTest(String name) {
- super(name);
- }
-
- /**
* Test #1 for <code>RSAOtherPrimeInfo(BigInteger,BigInteger,BigInteger)</code> ctor
* Assertion: constructs <code>RSAOtherPrimeInfo</code>
* object using valid parameter
diff --git a/security/src/test/java/tests/security/spec/RSAPrivateCrtKeySpecTest.java b/security/src/test/java/tests/security/spec/RSAPrivateCrtKeySpecTest.java
index 13c4f22..5f4b6c4 100644
--- a/security/src/test/java/tests/security/spec/RSAPrivateCrtKeySpecTest.java
+++ b/security/src/test/java/tests/security/spec/RSAPrivateCrtKeySpecTest.java
@@ -42,14 +42,6 @@ import java.security.spec.RSAPrivateKeySpec;
public class RSAPrivateCrtKeySpecTest extends TestCase {
/**
- * Constructor for RSAPrivateCrtKeySpecTest.
- * @param name
- */
- public RSAPrivateCrtKeySpecTest(String name) {
- super(name);
- }
-
- /**
* Test #1 for <code>RSAPrivateCrtKeySpec</code> constructor
* Assertion: Constructs <code>RSAPrivateCrtKeySpec</code>
* object using valid parameters
diff --git a/security/src/test/java/tests/security/spec/RSAPrivateKeySpecTest.java b/security/src/test/java/tests/security/spec/RSAPrivateKeySpecTest.java
index 8940003..207c173 100644
--- a/security/src/test/java/tests/security/spec/RSAPrivateKeySpecTest.java
+++ b/security/src/test/java/tests/security/spec/RSAPrivateKeySpecTest.java
@@ -41,14 +41,6 @@ import java.security.spec.RSAPrivateKeySpec;
public class RSAPrivateKeySpecTest extends TestCase {
/**
- * Constructor for RSAPrivateKeySpecTest.
- * @param name
- */
- public RSAPrivateKeySpecTest(String name) {
- super(name);
- }
-
- /**
* Test for <code>RSAPrivateKeySpec(BigInteger,BigInteger)</code> ctor
* Assertion: constructs <code>RSAPrivateKeySpec</code>
* object using valid parameters
diff --git a/security/src/test/java/tests/security/spec/RSAPublicKeySpecTest.java b/security/src/test/java/tests/security/spec/RSAPublicKeySpecTest.java
index 47b9ca6..08f852c 100644
--- a/security/src/test/java/tests/security/spec/RSAPublicKeySpecTest.java
+++ b/security/src/test/java/tests/security/spec/RSAPublicKeySpecTest.java
@@ -41,15 +41,6 @@ import java.security.spec.RSAPublicKeySpec;
public class RSAPublicKeySpecTest extends TestCase {
/**
- * Constructor for RSAPublicKeySpecTest.
- * @param name
- */
- public RSAPublicKeySpecTest(String name) {
- super(name);
- }
-
-
- /**
* Test #1 for <code>RSAPublicKeySpec</code> constructor
* Assertion: Constructs <code>RSAPublicKeySpec</code>
* object using valid parameters
diff --git a/security/src/test/java/tests/security/spec/X509EncodedKeySpecTest.java b/security/src/test/java/tests/security/spec/X509EncodedKeySpecTest.java
index 26c0b5e..8942b89 100644
--- a/security/src/test/java/tests/security/spec/X509EncodedKeySpecTest.java
+++ b/security/src/test/java/tests/security/spec/X509EncodedKeySpecTest.java
@@ -41,14 +41,6 @@ import java.util.Arrays;
@TestTargetClass(X509EncodedKeySpec.class)
public class X509EncodedKeySpecTest extends TestCase {
- /**
- * Constructor for X509EncodedKeySpecTest.
- * @param name
- */
- public X509EncodedKeySpecTest(String name) {
- super(name);
- }
-
//
// Test cases
//
diff --git a/security/src/test/java/tests/targets/security/KeyStoreTestPKCS12.java b/security/src/test/java/tests/targets/security/KeyStoreTestPKCS12.java
index 81f57d9..6f0562a 100644
--- a/security/src/test/java/tests/targets/security/KeyStoreTestPKCS12.java
+++ b/security/src/test/java/tests/targets/security/KeyStoreTestPKCS12.java
@@ -1,6 +1,5 @@
package tests.targets.security;
-import dalvik.annotation.KnownFailure;
import dalvik.annotation.TestLevel;
import dalvik.annotation.TestTargetClass;
import dalvik.annotation.TestTargetNew;
@@ -17,7 +16,6 @@ public class KeyStoreTestPKCS12 extends KeyStoreTest {
level = TestLevel.ADDITIONAL,
method = "!"
)
- @KnownFailure("Missing SecretKeyFactory 1.2.840.113549.1.12.1.3")
public void testKeyStoreCreate() {
super.testKeyStoreCreate();
}
@@ -27,7 +25,6 @@ public class KeyStoreTestPKCS12 extends KeyStoreTest {
level = TestLevel.ADDITIONAL,
method = "!"
)
- @KnownFailure("Missing SecretKeyFactory 1.2.840.113549.1.12.1.3")
public void testKeyStoreLoad() {
super.testKeyStoreLoad();
}
diff --git a/security/src/test/java/tests/targets/security/MessageDigestTest.java b/security/src/test/java/tests/targets/security/MessageDigestTest.java
index d2d3b5d..f1d3d55 100644
--- a/security/src/test/java/tests/targets/security/MessageDigestTest.java
+++ b/security/src/test/java/tests/targets/security/MessageDigestTest.java
@@ -80,7 +80,7 @@ public abstract class MessageDigestTest extends TestCase {
args = {}
)
})
- public void testMessageDigest()
+ public void testMessageDigest1()
{
byte[] buf = new byte[128];
int read = 0;
@@ -104,4 +104,111 @@ public abstract class MessageDigestTest extends TestCase {
}
}
+
+ @TestTargets({
+ @TestTargetNew(
+ level = TestLevel.ADDITIONAL,
+ method = "update",
+ args = {byte.class}
+ ),
+ @TestTargetNew(
+ level = TestLevel.ADDITIONAL,
+ method = "digest",
+ args = {}
+ )
+ })
+ public void testMessageDigest2()
+ {
+ int val;
+ try {
+ while ((val = sourceData.read()) != -1)
+ {
+ digest.update((byte)val);
+ }
+ } catch (IOException e) {
+ fail("failed to read digest data");
+ }
+
+ byte[] computedDigest = digest.digest();
+
+ assertNotNull("computed digest is is null", computedDigest);
+ assertEquals("digest length mismatch", checkDigest.length, computedDigest.length);
+ StringBuilder sb1, sb2;
+ sb1 = new StringBuilder();
+ sb2 = new StringBuilder();
+ for (int i = 0; i < checkDigest.length; i++)
+ {
+ assertEquals("byte " + i + " of computed and check digest differ", checkDigest[i], computedDigest[i]);
+ }
+
+ }
+
+
+ /**
+ * Official FIPS180-2 testcases
+ */
+
+ protected String source1, source2, source3;
+ protected String expected1, expected2, expected3;
+
+ String getLongMessage(int length) {
+ StringBuilder sourceBuilder = new StringBuilder(length);
+ for (int i = 0; i < length / 10; i++) {
+ sourceBuilder.append("aaaaaaaaaa");
+ }
+ return sourceBuilder.toString();
+ }
+ public void testfips180_2_singleblock() {
+
+ digest.update(source1.getBytes(), 0, source1.length());
+
+ byte[] computedDigest = digest.digest();
+
+ assertNotNull("computed digest is null", computedDigest);
+
+ StringBuilder sb = new StringBuilder();
+ String res;
+ for (int i = 0; i < computedDigest.length; i++)
+ {
+ res = Integer.toHexString(computedDigest[i] & 0xFF);
+ sb.append((res.length() == 1 ? "0" : "") + res);
+ }
+ assertEquals("computed and check digest differ", expected1, sb.toString());
+ }
+
+ public void testfips180_2_multiblock() {
+
+ digest.update(source2.getBytes(), 0, source2.length());
+
+ byte[] computedDigest = digest.digest();
+
+ assertNotNull("computed digest is null", computedDigest);
+
+ StringBuilder sb = new StringBuilder();
+ String res;
+ for (int i = 0; i < computedDigest.length; i++)
+ {
+ res = Integer.toHexString(computedDigest[i] & 0xFF);
+ sb.append((res.length() == 1 ? "0" : "") + res);
+ }
+ assertEquals("computed and check digest differ", expected2, sb.toString());
+ }
+
+ public void testfips180_2_longMessage() {
+
+ digest.update(source3.getBytes(), 0, source3.length());
+
+ byte[] computedDigest = digest.digest();
+
+ assertNotNull("computed digest is null", computedDigest);
+
+ StringBuilder sb = new StringBuilder();
+ String res;
+ for (int i = 0; i < computedDigest.length; i++)
+ {
+ res = Integer.toHexString(computedDigest[i] & 0xFF);
+ sb.append((res.length() == 1 ? "0" : "") + res);
+ }
+ assertEquals("computed and check digest differ", expected3, sb.toString());
+ }
}
diff --git a/security/src/test/java/tests/targets/security/MessageDigestTestMD5.java b/security/src/test/java/tests/targets/security/MessageDigestTestMD5.java
index a6663d8..c651695 100644
--- a/security/src/test/java/tests/targets/security/MessageDigestTestMD5.java
+++ b/security/src/test/java/tests/targets/security/MessageDigestTestMD5.java
@@ -8,8 +8,16 @@ public class MessageDigestTestMD5 extends MessageDigestTest {
public MessageDigestTestMD5() {
super("MD5");
+ super.source1 = "abc";
+ super.source2 = "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu";
+ super.source3 = getLongMessage(1000000);
+ super.expected1 = singleblock;
+ super.expected2 = multiblock;
+ super.expected3 = longmessage;
}
-
+ String singleblock = "900150983cd24fb0d6963f7d28e17f72";
+ String multiblock = "03dd8807a93175fb062dfb55dc7d359c";
+ String longmessage = "7707d6ae4e027c70eea2a935c2296f21";
}
diff --git a/security/src/test/java/tests/targets/security/MessageDigestTestSHA1.java b/security/src/test/java/tests/targets/security/MessageDigestTestSHA1.java
index 79ba6a0..0d9fe5c 100644
--- a/security/src/test/java/tests/targets/security/MessageDigestTestSHA1.java
+++ b/security/src/test/java/tests/targets/security/MessageDigestTestSHA1.java
@@ -8,8 +8,17 @@ public class MessageDigestTestSHA1 extends MessageDigestTest {
public MessageDigestTestSHA1() {
super("SHA-1");
+ super.source1 = "abc";
+ super.source2 = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq";
+ super.source3 = getLongMessage(1000000);
+ super.expected1 = singleblock;
+ super.expected2 = multiblock;
+ super.expected3 = longmessage;
}
-
+ // results from fips180-2
+ String singleblock = "a9993e364706816aba3e25717850c26c9cd0d89d";
+ String multiblock = "84983e441c3bd26ebaae4aa1f95129e5e54670f1";
+ String longmessage = "34aa973cd4c4daa4f61eeb2bdbad27316534016f";
}
diff --git a/security/src/test/java/tests/targets/security/MessageDigestTestSHA224.java b/security/src/test/java/tests/targets/security/MessageDigestTestSHA224.java
new file mode 100644
index 0000000..71b8a5a
--- /dev/null
+++ b/security/src/test/java/tests/targets/security/MessageDigestTestSHA224.java
@@ -0,0 +1,20 @@
+package tests.targets.security;
+
+public class MessageDigestTestSHA224 extends MessageDigestTest {
+
+ public MessageDigestTestSHA224() {
+ super("SHA-224");
+ super.source1 = "abc";
+ super.source2 = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq";
+ super.source3 = getLongMessage(1000000);
+ super.expected1 = singleblock;
+ super.expected2 = multiblock;
+ super.expected3 = longmessage;
+ }
+
+ // results from fips180-2
+ String singleblock = "23097d223405d8228642a477bda255b32aadbce4bda0b3f7e36c9da7";
+ String multiblock = "75388b16512776cc5dba5da1fd890150b0c6455cb4f58b1952522525";
+ String longmessage = "20794655980c91d8bbb4c1ea97618a4bf03f42581948b2ee4ee7ad67";
+
+}
diff --git a/security/src/test/java/tests/targets/security/MessageDigestTestSHA256.java b/security/src/test/java/tests/targets/security/MessageDigestTestSHA256.java
index aac55bf..b238a47 100644
--- a/security/src/test/java/tests/targets/security/MessageDigestTestSHA256.java
+++ b/security/src/test/java/tests/targets/security/MessageDigestTestSHA256.java
@@ -8,8 +8,17 @@ public class MessageDigestTestSHA256 extends MessageDigestTest {
public MessageDigestTestSHA256() {
super("SHA-256");
+ super.source1 = "abc";
+ super.source2 = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq";
+ super.source3 = getLongMessage(1000000);
+ super.expected1 = singleblock;
+ super.expected2 = multiblock;
+ super.expected3 = longmessage;
}
-
+ // results from fips180-2
+ String singleblock = "ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad";
+ String multiblock = "248d6a61d20638b8e5c026930c3e6039a33ce45964ff2167f6ecedd419db06c1";
+ String longmessage = "cdc76e5c9914fb9281a1c7e284d73e67f1809a48a497200e046d39ccc7112cd0";
}
diff --git a/security/src/test/java/tests/targets/security/MessageDigestTestSHA384.java b/security/src/test/java/tests/targets/security/MessageDigestTestSHA384.java
index eacc675..acfebd0 100644
--- a/security/src/test/java/tests/targets/security/MessageDigestTestSHA384.java
+++ b/security/src/test/java/tests/targets/security/MessageDigestTestSHA384.java
@@ -8,8 +8,17 @@ public class MessageDigestTestSHA384 extends MessageDigestTest {
public MessageDigestTestSHA384() {
super("SHA-384");
+ super.source1 = "abc";
+ super.source2 = "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu";
+ super.source3 = getLongMessage(1000000);
+ super.expected1 = singleblock;
+ super.expected2 = multiblock;
+ super.expected3 = longmessage;
}
-
+ // results from fips180-2
+ String singleblock = "cb00753f45a35e8bb5a03d699ac65007272c32ab0eded1631a8b605a43ff5bed8086072ba1e7cc2358baeca134c825a7";
+ String multiblock = "09330c33f71147e83d192fc782cd1b4753111b173b3b05d22fa08086e3b0f712fcc7c71a557e2db966c3e9fa91746039";
+ String longmessage = "9d0e1809716474cb086e834e310a4a1ced149e9c00f248527972cec5704c2a5b07b8b3dc38ecc4ebae97ddd87f3d8985";
}
diff --git a/security/src/test/java/tests/targets/security/MessageDigestTestSHA512.java b/security/src/test/java/tests/targets/security/MessageDigestTestSHA512.java
index eb254cf..826fd56 100644
--- a/security/src/test/java/tests/targets/security/MessageDigestTestSHA512.java
+++ b/security/src/test/java/tests/targets/security/MessageDigestTestSHA512.java
@@ -8,8 +8,17 @@ public class MessageDigestTestSHA512 extends MessageDigestTest {
public MessageDigestTestSHA512() {
super("SHA-512");
+ super.source1 = "abc";
+ super.source2 = "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu";
+ super.source3 = getLongMessage(1000000);
+ super.expected1 = singleblock;
+ super.expected2 = multiblock;
+ super.expected3 = longmessage;
}
-
+ // results from fips180-2
+ String singleblock = "ddaf35a193617abacc417349ae20413112e6fa4e89a97ea20a9eeee64b55d39a2192992a274fc1a836ba3c23a3feebbd454d4423643ce80e2a9ac94fa54ca49f";
+ String multiblock = "8e959b75dae313da8cf4f72814fc143f8f7779c6eb9f7fa17299aeadb6889018501d289e4900f7e4331b99dec4b5433ac7d329eeb6dd26545e96e55b874be909";
+ String longmessage = "e718483d0ce769644e2e42c7bc15b4638e1f98b13b2044285632a803afa973ebde0ff244877ea60a4cb0432ce577c31beb009c5c2c49aa2e4eadb217ad8cc09b";
}
diff --git a/security/src/test/resources/tests/targets/security/SHA-224.check b/security/src/test/resources/tests/targets/security/SHA-224.check
new file mode 100644
index 0000000..a7aaf15
--- /dev/null
+++ b/security/src/test/resources/tests/targets/security/SHA-224.check
@@ -0,0 +1 @@
+äì¸:ž˽>à|=¦Úûż¾¼0]•âGQ¢í \ No newline at end of file
diff --git a/security/src/test/resources/tests/targets/security/SHA-224.data b/security/src/test/resources/tests/targets/security/SHA-224.data
new file mode 100644
index 0000000..39be11d
--- /dev/null
+++ b/security/src/test/resources/tests/targets/security/SHA-224.data
@@ -0,0 +1 @@
+hallo welt! \ No newline at end of file