/*
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
/**
* @test
* @bug 6405536 6414980
* @summary Make sure that we can parse certificates using various named curves
* and verify their signatures
* @author Andreas Sterbenz
* @library ..
* @library ../../../../java/security/testlibrary
*/
return certs;
}
main(new ReadCertificates());
}
return;
}
random = new SecureRandom();
try {
// clear certificate cache in from a previous run with a different
// provider (undocumented hack for the Sun provider)
} catch (CertificateException e) {
// ignore
}
continue;
}
}
}
}
// First try the provider under test (if it does not support the
// necessary algorithm then try any registered provider).
try {
} catch (NoSuchAlgorithmException e) {
". Trying another provider...");
}
}
// try some random invalid signatures to make sure we get the correct
// error
for (int i = 0; i < 20; i++) {
do {
try {
throw new Exception("Verified invalid signature");
} catch (SignatureException e) {
} catch (InvalidKeyException e) {
}
}
}
}
}