ffang commented on code in PR #1836: URL: https://github.com/apache/cxf/pull/1836#discussion_r1583250344
########## services/xkms/xkms-x509-handlers/src/test/java/org/apache/cxf/xkms/x509/validator/TrustedAuthorityValidatorCRLTest.java: ########## @@ -91,8 +91,12 @@ public void testIsCertChainValid() throws CertificateException { validator.isCertificateChainValid(Arrays.asList(certificateRoot))); Assert.assertTrue("wss40rev should not be valid", !validator.isCertificateChainValid(Arrays.asList(certificateWss40Rev))); - Assert.assertTrue("wss40 should be valid", - validator.isCertificateChainValid(Arrays.asList(certificateWss40))); + //Red Hat OpenJDK must have RSA keySize 2048 or greater. + //see jdk.certpath.disabledAlgorithms=MD2, SHA1, MD5, DSA, RSA keySize < 2048 Review Comment: Hi @jgoodyear , Thanks for reporting and the investigation! Could you please try out the new cer files I put on https://issues.apache.org/jira/browse/CXF-9006 which are RSA2048 instead previous DSA 1024. Please let me know if they are helpful. Best Regards Freeman -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: dev-unsubscr...@cxf.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org