Uploaded image for project: 'JDK'
  1. JDK
  2. JDK-4873772

REGRESSION: 14 JCK1.4a-runtime tests fail

    XMLWordPrintable

    Details

    • Subcomponent:
    • CPU:
      x86, sparc
    • OS:
      linux, solaris_8

      Description

      () correctly generates SignatureException on uninitialized Signature object.
      Provider SunRsaSign, algorithm SHA384withRSA: Failed. Cannot initialize Signature object for signing. Test not run.
      Provider SunRsaSign, algorithm MD5withRSA: Passed. verify() correctly generates SignatureException on uninitialized Signature object.
      Provider SunRsaSign, algorithm SHA1withRSA: Passed. verify() correctly generates SignatureException on uninitialized Signature object.
      Provider SunRsaSign, algorithm SHA256withRSA: Passed. verify() correctly generates SignatureException on uninitialized Signature object.
      Provider SunRsaSign, algorithm SHA512withRSA: Failed. Cannot initialize Signature object for signing. Test not run.
      verify004: Failed. test cases: 10; passed: 8; failed: 2; first test case failure: Provider SunRsaSign, algorithm SHA384withRSA
      STATUS:Failed.test cases: 4; all failed; first test case failure: verify001
      result: Failed. test cases: 4; all failed; first test case failure: verify001


      test result: Failed. test cases: 4; all failed; first test case failure: verify001



      Specific machine info:
      ======================
      Hostname: linux-10
      OS: Solaris 8 (x86)
      Hostname: linux-19
      OS: Linux RedHat 7.3


      ======================================================================


      Name: mmR10223 Date: 06/03/2003


      Filed By : J2SE-SQA [###@###.###
      JDK : JDK1.5.0-b07 (passes on JDK1.5.0-b06, JDK1.4.2-b24, JDK1.4.1-b21)
      JCK : JCK1.4a-runtime
      Platform[s] : all
      switch/Mode : default
      JCK test owner : http://javaweb.eng/jck/usr/owners.jto
      Falling test[s]:
              api/java_security/Signature/SignatureTests.html#verify [verify001, verify002, verify003, verify004]
              api/java_security/Signature/SignatureTests.html#initSign [initSign001, initSign003, initSign004, initSign006]
              api/java_security/Signature/SignatureTests.html#initVerify [initVerify001, initVerify002 ]
              api/java_security/Signature/SignatureTests.html#signTests [sign003, sign005, sign006]
              api/java_security/Signature/SignatureTests.html#update [update001, update002, update003]
              api/java_security/Signature/SignatureTests.html#update2 [update005, update006]
              api/java_security/Signature/SignatureTests.html#update3 [update007, update008, update009]
              api/java_security/Signature/SignatureTests.html#update4 [update011, update012, update013]
              api/java_security/Signature/SignatureTests.html#SIGclone [clone001]
              api/java_security/SignedObject/SignedObjectTests.html#CtorGetTests [SignedObject001]
              api/java_security/SignedObject/SignedObjectTests.html#getSignatureTests [getSignature001, getSignature002]
              api/java_security/SignedObject/SignedObjectTests.html#verifyTests [verify001, verify002, verify003, verify004]
              api/java_security/SignedObject/SignedObjectTests.html#miscTests [misc001, misc002, misc003, misc004, misc005]
              api/java_security/SignedObject/serial/index.html#ConstructorTests [ConstructorTest0001]

                      
      Test source location:
      =====================
      /java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/verifyTests.java
      /java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/initSignTests.java
      /java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/initVerifyTests.java
      /java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/signTestsTests.java
      /java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/updateTests.java
      /java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/update2Tests.java
      /java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/update3Tests.java
      /java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/update4Tests.java
      /java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/SIGcloneTests.java
      /java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/SignedObject/CtorGetTests.java
      /java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/SignedObject/getSignatureTests.java
      /java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/SignedObject/verifyTests.java
      /java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/SignedObject/miscTests.java
      /java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/SignedObject/serial/ConstructorTests.java


      jtr file location:
      ==================
      /net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_verify.jtr
      /net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_initSign.jtr
      /net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_initVerify.jtr
      /net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_signTests.jtr
      /net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_update.jtr
      /net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_update2.jtr
      /net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_update3.jtr
      /net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_update4.jtr
      /net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_SIGclone.jtr
      /net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/SignedObject/SignedObjectTests_CtorGetTests.jtr
      /net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/SignedObject/SignedObjectTests_getSignatureTests.jtr
      /net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/SignedObject/SignedObjectTests_verifyTests.jtr
      /net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/SignedObject/SignedObjectTests_miscTests.jtr
      /net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/SignedObject/serial/index_ConstructorTests.jtr

      How to reproduce:
      =================
      Run the following script (you may need to change its variables)

       
      --- script start (verifyTests ) ---
      #!/bin/bash

      JCK="/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a"
      JDK="/java/re/jdk/1.5.0/promoted/latest/binaries/linux-i586"
      CLASSPATH="$JCK/classes:$JCK/lib/javatest.jar"
       
      $JDK/bin/java $switches -cp $CLASSPATH javasoft.sqe.tests.api.java.security.Signature.verifyTests -TestCaseID verify001, verify002, verify003, verify004

      --- script end ---

      Test output ( verifyTests ):
      ============

      Using DSA algorithm from SUN
      verify() returns true on bytes signed by Signature object with private key.
      verify() returns false after the object has been reset and not updated.
      Using RSA algorithm from SunJSSE
      verify() returns true on bytes signed by Signature object with private key.
      verify() returns false after the object has been reset and not updated.
      Using RSA algorithm from SunJSSE
      verify() returns true on bytes signed by Signature object with private key.
      verify() returns false after the object has been reset and not updated.
      Using RSA algorithm from SunJSSE
      verify() returns true on bytes signed by Signature object with private key.
      verify() returns false after the object has been reset and not updated.
      Using RSA algorithm from SunRsaSign
      verify() returns true on bytes signed by Signature object with private key.
      verify() returns false after the object has been reset and not updated.
      Using RSA algorithm from SunRsaSign
      initVerify() throw unexpected InvalidKeyException.
      Using RSA algorithm from SunRsaSign
      verify() returns true on bytes signed by Signature object with private key.
      verify() returns false after the object has been reset and not updated.
      Using RSA algorithm from SunRsaSign
      verify() returns true on bytes signed by Signature object with private key.
      verify() returns false after the object has been reset and not updated.
      Using RSA algorithm from SunRsaSign
      verify() returns true on bytes signed by Signature object with private key.
      verify() returns false after the object has been reset and not updated.
      Using RSA algorithm from SunRsaSign
      initVerify() throw unexpected InvalidKeyException.
      Using DSA algorithm from SUN
      verify() returns false on bytes signed by the different Signature object.
      Signature objects differ on public/private keys
      Using RSA algorithm from SunJSSE
      verify() returns false on bytes signed by the different Signature object.
      Signature objects differ on public/private keys
      Using RSA algorithm from SunJSSE
      verify() returns false on bytes signed by the different Signature object.
      Signature objects differ on public/private keys
      Using RSA algorithm from SunJSSE
      verify() returns false on bytes signed by the different Signature object.
      Signature objects differ on public/private keys
      Using RSA algorithm from SunRsaSign
      Unexpected SignatureException when verifying Signature object.
      Using RSA algorithm from SunRsaSign
      Unexpected exception during initSign/initVerify: java.security.InvalidKeyException: Key is too short for this signature algorithm
      Using RSA algorithm from SunRsaSign
      Unexpected SignatureException when verifying Signature object.
      Using RSA algorithm from SunRsaSign
      Unexpected SignatureException when verifying Signature object.
      Using RSA algorithm from SunRsaSign
      Unexpected SignatureException when verifying Signature object.
      Using RSA algorithm from SunRsaSign
      Unexpected exception during initSign/initVerify: java.security.InvalidKeyException: Key is too short for this signature algorithm
      Using DSA algorithm from SUN
      Expected SignatureException occured when verifying corrupted data.
      Using RSA algorithm from SunJSSE
      No exception thrown when verifying corrupted signature.
      Corrupted data did not verified.
      Using RSA algorithm from SunJSSE
      No exception thrown when verifying corrupted signature.
      Corrupted data did not verified.
      Using RSA algorithm from SunJSSE
      No exception thrown when verifying corrupted signature.
      Corrupted data did not verified.
      Using RSA algorithm from SunRsaSign
      Expected SignatureException occured when verifying corrupted data.
      Using RSA algorithm from SunRsaSign
      initSign()/initVerify() throw unexpected InvalidKeyException.
      Using RSA algorithm from SunRsaSign
      Expected SignatureException occured when verifying corrupted data.
      Using RSA algorithm from SunRsaSign
      Expected SignatureException occured when verifying corrupted data.
      Using RSA algorithm from SunRsaSign
      Expected SignatureException occured when verifying corrupted data.
      Using RSA algorithm from SunRsaSign
      initSign()/initVerify() throw unexpected InvalidKeyException.
      Using DSA algorithm from SUN
      Expected SignatureException generated by verify()
      Using RSA algorithm from SunJSSE
      Expected SignatureException generated by verify()
      Using RSA algorithm from SunJSSE
      Expected SignatureException generated by verify()
      Using RSA algorithm from SunJSSE
      Expected SignatureException generated by verify()
      Using RSA algorithm from SunRsaSign
      Expected SignatureException generated by verify()
      Using RSA algorithm from SunRsaSign
      initSign()/initVerify() throw unexpected InvalidKeyException.
      Using RSA algorithm from SunRsaSign
      Expected SignatureException generated by verify()
      Using RSA algorithm from SunRsaSign
      Expected SignatureException generated by verify()
      Using RSA algorithm from SunRsaSign
      Expected SignatureException generated by verify()
      Using RSA algorithm from SunRsaSign
      initSign()/initVerify() throw unexpected InvalidKeyException.
      ----------log:(45/4850)----------
      Provider SUN, algorithm SHA1withDSA: Passed. All verify() subtests passed in this test.
      Provider SunJSSE, algorithm MD2withRSA: Passed. All verify() subtests passed in this test.
      Provider SunJSSE, algorithm MD5withRSA: Passed. All verify() subtests passed in this test.
      Provider SunJSSE, algorithm SHA1withRSA: Passed. All verify() subtests passed in this test.
      Provider SunRsaSign, algorithm MD2withRSA: Passed. All verify() subtests passed in this test.
      Provider SunRsaSign, algorithm SHA384withRSA: Failed. Cannot initialize Signature object for verifying. Test not run.
      Provider SunRsaSign, algorithm MD5withRSA: Passed. All verify() subtests passed in this test.
      Provider SunRsaSign, algorithm SHA1withRSA: Passed. All verify() subtests passed in this test.
      Provider SunRsaSign, algorithm SHA256withRSA: Passed. All verify() subtests passed in this test.
      Provider SunRsaSign, algorithm SHA512withRSA: Failed. Cannot initialize Signature object for verifying. Test not run.
      verify001: Failed. test cases: 10; passed: 8; failed: 2; first test case failure: Provider SunRsaSign, algorithm SHA384withRSA
      Provider SUN, algorithm SHA1withDSA: Passed. verify() correctly returns false on improper Signature.
      Provider SunJSSE, algorithm MD2withRSA: Passed. verify() correctly returns false on improper Signature.
      Provider SunJSSE, algorithm MD5withRSA: Passed. verify() correctly returns false on improper Signature.
      Provider SunJSSE, algorithm SHA1withRSA: Passed. verify() correctly returns false on improper Signature.
      Provider SunRsaSign, algorithm MD2withRSA: Failed. Unable to verify Signature object with input data.
      Provider SunRsaSign, algorithm SHA384withRSA: Failed. Unable to initialize signature objects. Test not run.
      Provider SunRsaSign, algorithm MD5withRSA: Failed. Unable to verify Signature object with input data.
      Provider SunRsaSign, algorithm SHA1withRSA: Failed. Unable to verify Signature object with input data.
      Provider SunRsaSign, algorithm SHA256withRSA: Failed. Unable to verify Signature object with input data.
      Provider SunRsaSign, algorithm SHA512withRSA: Failed. Unable to initialize signature objects. Test not run.
      verify002: Failed. test cases: 10; passed: 4; failed: 6; first test case failure: Provider SunRsaSign, algorithm MD2withRSA
      Provider SUN, algorithm SHA1withDSA: Passed. SignatureException thrown when verifying corrupted signature.
      Provider SunJSSE, algorithm MD2withRSA: Passed. OKAY
      Provider SunJSSE, algorithm MD5withRSA: Passed. OKAY
      Provider SunJSSE, algorithm SHA1withRSA: Passed. OKAY
      Provider SunRsaSign, algorithm MD2withRSA: Passed. SignatureException thrown when verifying corrupted signature.
      Provider SunRsaSign, algorithm SHA384withRSA: Failed. Cannot initialize Signature object for signing. Test not run.
      Provider SunRsaSign, algorithm MD5withRSA: Passed. SignatureException thrown when verifying corrupted signature.
      Provider SunRsaSign, algorithm SHA1withRSA: Passed. SignatureException thrown when verifying corrupted signature.
      Provider SunRsaSign, algorithm SHA256withRSA: Passed. SignatureException thrown when verifying corrupted signature.
      Provider SunRsaSign, algorithm SHA512withRSA: Failed. Cannot initialize Signature object for signing. Test not run.
      verify003: Failed. test cases: 10; passed: 8; failed: 2; first test case failure: Provider SunRsaSign, algorithm SHA384withRSA
      Provider SUN, algorithm SHA1withDSA: Passed. verify() correctly generates SignatureException on uninitialized Signature object.
      Provider SunJSSE, algorithm MD2withRSA: Passed. verify() correctly generates SignatureException on uninitialized Signature object.
      Provider SunJSSE, algorithm MD5withRSA: Passed. verify() correctly generates SignatureException on uninitialized Signature object.
      Provider SunJSSE, algorithm SHA1withRSA: Passed. verify() correctly generates SignatureException on uninitialized Signature object.
      Provider SunRsaSign, algorithm MD2withRSA: Passed. verify

        Attachments

          Activity

            People

            Assignee:
            andreas Andreas Sterbenz
            Reporter:
            mmvsunw Mmv Mmv (Inactive)
            Votes:
            0 Vote for this issue
            Watchers:
            0 Start watching this issue

              Dates

              Created:
              Updated:
              Resolved:
              Imported:
              Indexed: