On Tue, 6 Jun 2023 00:24:21 GMT, Valerie Peng <valer...@openjdk.org> wrote:

>> Martin Balao has updated the pull request incrementally with one additional 
>> commit since the last revision:
>> 
>>   8301553: Support Password-Based Cryptography in SunPKCS11 (iteration #4)
>>   
>>   Co-authored-by: Francisco Ferrari <fferr...@redhat.com>
>>   Co-authored-by: Martin Balao <mba...@redhat.com>
>
> test/jdk/sun/security/pkcs11/KeyStore/ImportKeyToP12.java line 83:
> 
>> 81:             // Make sure that SunPKCS11 implements the Cipher algorithm
>> 82:             Cipher.getInstance(pbeCipherAlg, sunPKCS11);
>> 83:             testWith(sunPKCS11, pbeCipherAlg, pbeMacAlgs[0]);
> 
> Looks like an error handling is missing, i.e. catch and ignore/skip the 
> corresponding testing if the algorithm is not supported by the sunPKCS11 
> provider under test. Same goes for the Mac loop below also.

I'm not sure of this change because the test is NSS-based —in fact, we 
initialize the NSS software token with a specific configuration— and the PBE 
algorithms used in the test should be available. Have you found a platform/NSS 
version in which this is not true? I'm concerned about making the test 
(silently) pass when there is something that we should notice, such as the 
removal of something in a newer version that would affect our testing coverage 
or the change in one of the native mechanisms for a given algorithm.

-------------

PR Review Comment: https://git.openjdk.org/jdk/pull/12396#discussion_r1218841067

Reply via email to