JDK-8167547 : Test that unsupported EC curves should not be selected during TLS handshaking
  • Type: Bug
  • Component: security-libs
  • Sub-Component: javax.net.ssl
  • Affected Version: 9
  • Priority: P4
  • Status: Resolved
  • Resolution: Duplicate
  • Submitted: 2016-10-12
  • Updated: 2023-11-29
  • Resolved: 2017-06-30
The Version table provides details related to the release that this issue/RFE will be addressed.

Unresolved : Release in which this issue/RFE will be addressed.
Resolved: Release in which this issue/RFE has been resolved.
Fixed : Release in which this issue/RFE has been fixed. The release containing this fix may be available for download as an Early Access Release or a General Availability Release.

To download the current JDK release, click here.
JDK 10
10Resolved
Related Reports
Duplicate :  
Relates :  
Description
Need a test and make sure unsupported EC curves should not be selected during TLS handshaking.

This is a regression test for JDK-8167472, which was originally marked as noreg-trivial.  
Comments
The test should have two testcases: 1. Create one socket client try to connect the server with : TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 and TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA , to check whether they could connected. If get the unsported exception,the result should be excepted and test pass.If get the java.lang.NullPointerException or it could be connected, the test case should be failed. 2. Due to intended to test unsupported EC curves ,need to update the EC curves on clientHello and after the server unwarp it,the SSL handshake should be terminated
22-12-2016