You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@directory.apache.org by "Kai Zheng (JIRA)" <ji...@apache.org> on 2015/03/08 11:57:38 UTC

[jira] [Commented] (DIRKRB-165) Bypass AES256 test cases on platform doesn't have AES256 enabled

    [ https://issues.apache.org/jira/browse/DIRKRB-165?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14351998#comment-14351998 ] 

Kai Zheng commented on DIRKRB-165:
----------------------------------

Thanks [~yiliqi] for contributing this ! I looked at the patch, it looks great. A mistake was noted for Camillia256, not AES256. Please correct, thanks !
{code}
     @Test
     public void testCamellia256() throws IOException, KrbException {
+        if(!EncryptionHandler.isAES256Enabled()) {
+            return;
+        }
+
         testEncWith("camellia256-cts-cmac.cc");
     }
{code}

> Bypass AES256 test cases on platform doesn't have AES256 enabled
> ----------------------------------------------------------------
>
>                 Key: DIRKRB-165
>                 URL: https://issues.apache.org/jira/browse/DIRKRB-165
>             Project: Directory Kerberos
>          Issue Type: Test
>         Environment: centos 6.6, oracle jdk 1.7 u60
>            Reporter: Liqi Yi
>         Attachments: DIRKRB-165.001.patch
>
>   Original Estimate: 24h
>  Remaining Estimate: 24h
>
> On platforms that do not have AES256 enabled, the AES256 test cases would fail with illegal key size exception.  It would be nice to bypass these tests when AES256 is not supported.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)