@@ -196,7 +196,7 @@ public void testLoadPEMTrustStore() throws Exception {
196196 X509Util .createTrustManager (
197197 x509TestContext .getTrustStoreFile (KeyStoreFileType .PEM ).getAbsolutePath (),
198198 x509TestContext .getTrustStorePassword (), KeyStoreFileType .PEM .getPropertyValue (), false ,
199- false );
199+ false , true , true );
200200 }
201201
202202 @ Test
@@ -205,7 +205,7 @@ public void testLoadPEMTrustStoreNullPassword() throws Exception {
205205 // Make sure that empty password and null password are treated the same
206206 X509Util .createTrustManager (
207207 x509TestContext .getTrustStoreFile (KeyStoreFileType .PEM ).getAbsolutePath (), null ,
208- KeyStoreFileType .PEM .getPropertyValue (), false , false );
208+ KeyStoreFileType .PEM .getPropertyValue (), false , false , true , true );
209209 }
210210
211211 @ Test
@@ -215,7 +215,7 @@ public void testLoadPEMTrustStoreAutodetectStoreFileType() throws Exception {
215215 x509TestContext .getTrustStoreFile (KeyStoreFileType .PEM ).getAbsolutePath (),
216216 x509TestContext .getTrustStorePassword (), null , // null StoreFileType means 'autodetect from
217217 // file extension'
218- false , false );
218+ false , false , true , true );
219219 }
220220
221221 @ Test
@@ -288,7 +288,8 @@ public void testLoadJKSTrustStoreWithWrongPassword() {
288288 // Attempting to load with the wrong key password should fail
289289 X509Util .createTrustManager (
290290 x509TestContext .getTrustStoreFile (KeyStoreFileType .JKS ).getAbsolutePath (),
291- "wrong password" .toCharArray (), KeyStoreFileType .JKS .getPropertyValue (), true , true , true , true );
291+ "wrong password" .toCharArray (), KeyStoreFileType .JKS .getPropertyValue (), true , true , true ,
292+ true );
292293 });
293294 }
294295
@@ -353,7 +354,7 @@ public void testLoadPKCS12TrustStoreAutodetectStoreFileType() throws Exception {
353354 x509TestContext .getTrustStoreFile (KeyStoreFileType .PKCS12 ).getAbsolutePath (),
354355 x509TestContext .getTrustStorePassword (), null , // null StoreFileType means 'autodetect from
355356 // file extension'
356- true , true );
357+ true , true , true , true );
357358 }
358359
359360 @ Test
@@ -362,7 +363,8 @@ public void testLoadPKCS12TrustStoreWithWrongPassword() {
362363 // Attempting to load with the wrong key password should fail
363364 X509Util .createTrustManager (
364365 x509TestContext .getTrustStoreFile (KeyStoreFileType .PKCS12 ).getAbsolutePath (),
365- "wrong password" .toCharArray (), KeyStoreFileType .PKCS12 .getPropertyValue (), true , true , true , true );
366+ "wrong password" .toCharArray (), KeyStoreFileType .PKCS12 .getPropertyValue (), true , true ,
367+ true , true );
366368 });
367369 }
368370
0 commit comments