openjdk team mailing list archive
-
openjdk team
-
Mailing list archive
-
Message #03533
[Bug 556549] Re: PCKS11 security provider not working
This bug was fixed in the package openjdk-6 - 6b18-1.8-0ubuntu1
---------------
openjdk-6 (6b18-1.8-0ubuntu1) lucid; urgency=low
* Update IcedTea6 to the icedtea6-1.8 release.
* Fix builds on Ubuntu/dapper and Debian/lenny.
* On hppa, configure --without-rhino --disable-plugin.
* Fix Hitachi SH configury. Closes: #575346.
* Start a window manager when running the tests. Prefer metacity,
as more tests pass with it.
* Let XToolkit.isTraySupported() return true, if Compiz is running.
Works around sun#6438179. LP: #300948.
* Make <java_home>/jre/lib/security/nss.cfg a config file.
* Fail in the configuration of the packages, if /proc is not mounted.
java currently uses tricks to find its own shared libraries depending
on the path of the binary. Will be changed in OpenJDK7. Closes: #576453.
* Fix PR icedtea/469, testsuite failures with the NSS based security
provider. LP: #556549.
* Do not pass LD_LIBRARY_PATH from the plugin to the java process.
While libnss3.so gets loaded from /usr/lib, the dependent libraries
are loaded from MOZILLA_FIVE_HOME (See #561216 for the wrong firefox
config). LP: #561124.
Closes as well: LP: #551328, #554909, #560829, #549010, #553452.
* Always build shark with hs14.
-- Matthias Klose <doko@xxxxxxxxxx> Wed, 14 Apr 2010 01:53:33 +0200
** Changed in: openjdk-6 (Ubuntu)
Status: Confirmed => Fix Released
--
PCKS11 security provider not working
https://bugs.launchpad.net/bugs/556549
You received this bug notification because you are a member of OpenJDK,
which is subscribed to openjdk-6 in ubuntu.
Status in OpenJDK: In Progress
Status in “openjdk-6” package in Ubuntu: Fix Released
Bug description:
should work when configured with --enable-nss, however the tests never did succeed:
FAILED: com/sun/crypto/provider/KeyFactory/TestProviderLeak.java
FAILED: java/security/KeyPairGenerator/Failover.java
FAILED: sun/security/pkcs11/ec/ReadCertificates.java
FAILED: sun/security/pkcs11/ec/ReadPKCS12.java
FAILED: sun/security/pkcs11/ec/TestCurves.java
FAILED: sun/security/pkcs11/ec/TestECDH.java
FAILED: sun/security/pkcs11/ec/TestECDSA.java
FAILED: sun/security/pkcs11/ec/TestECGenSpec.java
FAILED: sun/security/pkcs11/ec/TestKeyFactory.java
FAILED: sun/security/pkcs11/sslecc/ClientJSSEServerJSSE.java
FAILED: sun/security/pkcs11/tls/TestPRF.java
FAILED: sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/TestAllSuites.java
FAILED: sun/security/ssl/sanity/ciphersuites/CheckCipherSuites.java
FAILED: sun/security/ssl/sanity/interop/ClientJSSEServerJSSE.java
just turning off security.provider.9 in java.security lets the sun/security/ssl/ succeed.
however there might be pkcs11 certificates in the cacerts file, which could cause upgrade errors when the pkcs11 support is removed/disabled.
References