Uploaded image for project: 'JDK'
  1. JDK
  2. JDK-6252101

JCK 1.5.0_04b02 api.javax.net.ssl failures

    Details

    • Type: Bug
    • Status: Closed
    • Priority: P2
    • Resolution: Duplicate
    • Affects Version/s: 5.0u4
    • Fix Version/s: 5.0u4
    • Component/s: security-libs
    • Labels:

      Description

      OS
      ======
      SunOS sb2500-1 5.10 Generic_119205-02 sun4u sparc SUNW,Sun-Blade-2500

      JDK
      ================
      java version "1.5.0_03"
      Java(TM) 2 Runtime Environment, Standard Edition (build 1.5.0_03-b06)
      Java HotSpot(TM) Server VM (build 1.5.0_03-b06, mixed mode)


      The folowing tests failed
      api/javax_net/ssl/SSLEngine/SSLEngineTests.html#SSLEngineClientAuthMode Failed. test cases: 6; passed: 2; failed: 4; first test case failure: SSLEngineNeedClientAuth001
      api/javax_net/ssl/SSLEngine/SSLEngineTests.html#SSLEngineHandshake Failed. test cases: 7; passed: 1; failed: 6; first test case failure: SSLEngineHandshake002
      api/javax_net/ssl/SSLEngine/SSLEngineTests.html#SSLEngineInOutBound Failed. test cases: 3; passed: 1; failed: 2; first test case failure: SSLEngineBound002
      api/javax_net/ssl/SSLEngine/SSLEngineTests.html#SSLEngineWrap Failed. test cases: 7; passed: 1; failed: 6; first test case failure: SSLEngineWrap002
      api/javax_net/ssl/SSLPUEx.html#SSLPUEx Failed. test cases: 1; all failed; first test case failure: SSLPUEx
      api/javax_net/ssl/SSLS.html#SSLS1 Failed. test cases: 1; all failed; first test case failure: SSLS1
      api/javax_net/ssl/SSLSock.html#SSLSock1 Failed. test cases: 1; all failed; first test case failure: SSLSock1
      api/javax_net/ssl/SSLSock.html#SSLSock2 Failed.

      NB These tests pass with Solaris FCS

      ================================================
      TO REPRODUCE
      ================================================
      1.
      export LD_LIBRARY_PATH=/net/latte.ireland/export/home4/jck/JCK-runtime-15/lib/SunOS.sparc:/net/latte.ireland/export/home4/jck/JCK-runtime-15/lib/SunOS.sparc/jmx:/net/latte.ireland/export/home4/jck/JCK-runtime-15/lib/SunOS.sparc
      2.
      set your display variable xhost you machine

      3.
      java -client -Xint -Djavatest.security.allowPropertiesAccess=true -Xfuture -classpath /net/latte.ireland/export/home4/jck/JCK-runtime-15/classes -Djava.security.policy=/net/latte.ireland/export/home4/jck/JCK-runtime-15/lib/jck.policy javasoft.sqe.tests.api.javax.net.ssl.SSLSock1 -TestCaseID ALL -KeyStoreURL file:///net/latte.ireland/export/home4/jck/JCK-runtime-15/tests/api/javax_net/ssl/SSLSock.html#SSLSock1

      The output from all of the failures is basically the same here is teh out put from api/javax_net/ssl/SSLSock.html#SSLSock2

      ============================
      out1
      ===========================
      JRE is installed with the following security providers.
      0. SunPKCS11-Solaris
      1. SUN
      2. SunRsaSign
      3. SunJSSE
      4. SunJCE
      5. SunJGSS
      6. SunSASL
      This test sucessfully open the keystore file: "/net/latte.ireland/export/home4/jck/JCK-runtime-15/tests/api/javax_net/ssl//testkeys"
      with the keystore's password "DukesSecretPassword"
      ------------------------------------------------------------
      Establishing an "SSLContext" with protocol "SSL"
      Client's Default Cipher Suites = SSL_RSA_WITH_RC4_128_MD5
      Client's Default Cipher Suites = SSL_RSA_WITH_RC4_128_SHA
      Client's Default Cipher Suites = TLS_RSA_WITH_AES_128_CBC_SHA
      Client's Default Cipher Suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA
      Client's Default Cipher Suites = TLS_DHE_DSS_WITH_AES_128_CBC_SHA
      Client's Default Cipher Suites = SSL_RSA_WITH_3DES_EDE_CBC_SHA
      Client's Default Cipher Suites = SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
      Client's Default Cipher Suites = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
      Client's Default Cipher Suites = SSL_RSA_WITH_DES_CBC_SHA
      Client's Default Cipher Suites = SSL_DHE_RSA_WITH_DES_CBC_SHA
      Client's Default Cipher Suites = SSL_DHE_DSS_WITH_DES_CBC_SHA
      Client's Default Cipher Suites = SSL_RSA_EXPORT_WITH_RC4_40_MD5
      Client's Default Cipher Suites = SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
      Client's Default Cipher Suites = SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
      Client's Default Cipher Suites = SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
      Client's Supported Cipher Suites = SSL_RSA_WITH_RC4_128_MD5
      Client's Supported Cipher Suites = SSL_RSA_WITH_RC4_128_SHA
      Client's Supported Cipher Suites = TLS_RSA_WITH_AES_128_CBC_SHA
      Client's Supported Cipher Suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA
      Client's Supported Cipher Suites = TLS_DHE_DSS_WITH_AES_128_CBC_SHA
      Client's Supported Cipher Suites = SSL_RSA_WITH_3DES_EDE_CBC_SHA
      Client's Supported Cipher Suites = SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
      Client's Supported Cipher Suites = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
      Client's Supported Cipher Suites = SSL_RSA_WITH_DES_CBC_SHA
      Client's Supported Cipher Suites = SSL_DHE_RSA_WITH_DES_CBC_SHA
      Client's Supported Cipher Suites = SSL_DHE_DSS_WITH_DES_CBC_SHA
      Client's Supported Cipher Suites = SSL_RSA_EXPORT_WITH_RC4_40_MD5
      Client's Supported Cipher Suites = SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
      Client's Supported Cipher Suites = SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
      Client's Supported Cipher Suites = SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
      Client's Supported Cipher Suites = SSL_RSA_WITH_NULL_MD5
      Client's Supported Cipher Suites = SSL_RSA_WITH_NULL_SHA
      Client's Supported Cipher Suites = SSL_DH_anon_WITH_RC4_128_MD5
      Client's Supported Cipher Suites = TLS_DH_anon_WITH_AES_128_CBC_SHA
      Client's Supported Cipher Suites = SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
      Client's Supported Cipher Suites = SSL_DH_anon_WITH_DES_CBC_SHA
      Client's Supported Cipher Suites = SSL_DH_anon_EXPORT_WITH_RC4_40_MD5
      Client's Supported Cipher Suites = SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
      Client's Supported Cipher Suites = TLS_KRB5_WITH_RC4_128_SHA
      Client's Supported Cipher Suites = TLS_KRB5_WITH_RC4_128_MD5
      Client's Supported Cipher Suites = TLS_KRB5_WITH_3DES_EDE_CBC_SHA
      Client's Supported Cipher Suites = TLS_KRB5_WITH_3DES_EDE_CBC_MD5
      Client's Supported Cipher Suites = TLS_KRB5_WITH_DES_CBC_SHA
      Client's Supported Cipher Suites = TLS_KRB5_WITH_DES_CBC_MD5
      Client's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_RC4_40_SHA
      Client's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_RC4_40_MD5
      Client's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
      Client's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
      Server's Default Cipher Suites = SSL_RSA_WITH_RC4_128_MD5
      Server's Default Cipher Suites = SSL_RSA_WITH_RC4_128_SHA
      Server's Default Cipher Suites = TLS_RSA_WITH_AES_128_CBC_SHA
      Server's Default Cipher Suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA
      Server's Default Cipher Suites = TLS_DHE_DSS_WITH_AES_128_CBC_SHA
      Server's Default Cipher Suites = SSL_RSA_WITH_3DES_EDE_CBC_SHA
      Server's Default Cipher Suites = SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
      Server's Default Cipher Suites = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
      Server's Default Cipher Suites = SSL_RSA_WITH_DES_CBC_SHA
      Server's Default Cipher Suites = SSL_DHE_RSA_WITH_DES_CBC_SHA
      Server's Default Cipher Suites = SSL_DHE_DSS_WITH_DES_CBC_SHA
      Server's Default Cipher Suites = SSL_RSA_EXPORT_WITH_RC4_40_MD5
      Server's Default Cipher Suites = SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
      Server's Default Cipher Suites = SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
      Server's Default Cipher Suites = SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
      Server's Supported Cipher Suites = SSL_RSA_WITH_RC4_128_MD5
      Server's Supported Cipher Suites = SSL_RSA_WITH_RC4_128_SHA
      Server's Supported Cipher Suites = TLS_RSA_WITH_AES_128_CBC_SHA
      Server's Supported Cipher Suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA
      Server's Supported Cipher Suites = TLS_DHE_DSS_WITH_AES_128_CBC_SHA
      Server's Supported Cipher Suites = SSL_RSA_WITH_3DES_EDE_CBC_SHA
      Server's Supported Cipher Suites = SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
      Server's Supported Cipher Suites = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
      Server's Supported Cipher Suites = SSL_RSA_WITH_DES_CBC_SHA
      Server's Supported Cipher Suites = SSL_DHE_RSA_WITH_DES_CBC_SHA
      Server's Supported Cipher Suites = SSL_DHE_DSS_WITH_DES_CBC_SHA
      Server's Supported Cipher Suites = SSL_RSA_EXPORT_WITH_RC4_40_MD5
      Server's Supported Cipher Suites = SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
      Server's Supported Cipher Suites = SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
      Server's Supported Cipher Suites = SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
      Server's Supported Cipher Suites = SSL_RSA_WITH_NULL_MD5
      Server's Supported Cipher Suites = SSL_RSA_WITH_NULL_SHA
      Server's Supported Cipher Suites = SSL_DH_anon_WITH_RC4_128_MD5
      Server's Supported Cipher Suites = TLS_DH_anon_WITH_AES_128_CBC_SHA
      Server's Supported Cipher Suites = SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
      Server's Supported Cipher Suites = SSL_DH_anon_WITH_DES_CBC_SHA
      Server's Supported Cipher Suites = SSL_DH_anon_EXPORT_WITH_RC4_40_MD5
      Server's Supported Cipher Suites = SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
      Server's Supported Cipher Suites = TLS_KRB5_WITH_RC4_128_SHA
      Server's Supported Cipher Suites = TLS_KRB5_WITH_RC4_128_MD5
      Server's Supported Cipher Suites = TLS_KRB5_WITH_3DES_EDE_CBC_SHA
      Server's Supported Cipher Suites = TLS_KRB5_WITH_3DES_EDE_CBC_MD5
      Server's Supported Cipher Suites = TLS_KRB5_WITH_DES_CBC_SHA
      Server's Supported Cipher Suites = TLS_KRB5_WITH_DES_CBC_MD5
      Server's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_RC4_40_SHA
      Server's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_RC4_40_MD5
      Server's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
      Server's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
      Port 35598 was allocated as a free port.
      This test use Secure Socket Layer port 35598
      Creating SSLServerSocket...Done
      Before shut down port 35598 wait for client to go away first ...
      Client thread went away. Proceed to shut down port 35598
      ------------------------------------------------------------
      Establishing an "SSLContext" with protocol "SSLv3"
      Client's Default Cipher Suites = SSL_RSA_WITH_RC4_128_MD5
      Client's Default Cipher Suites = SSL_RSA_WITH_RC4_128_SHA
      Client's Default Cipher Suites = TLS_RSA_WITH_AES_128_CBC_SHA
      Client's Default Cipher Suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA
      Client's Default Cipher Suites = TLS_DHE_DSS_WITH_AES_128_CBC_SHA
      Client's Default Cipher Suites = SSL_RSA_WITH_3DES_EDE_CBC_SHA
      Client's Default Cipher Suites = SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
      Client's Default Cipher Suites = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
      Client's Default Cipher Suites = SSL_RSA_WITH_DES_CBC_SHA
      Client's Default Cipher Suites = SSL_DHE_RSA_WITH_DES_CBC_SHA
      Client's Default Cipher Suites = SSL_DHE_DSS_WITH_DES_CBC_SHA
      Client's Default Cipher Suites = SSL_RSA_EXPORT_WITH_RC4_40_MD5
      Client's Default Cipher Suites = SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
      Client's Default Cipher Suites = SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
      Client's Default Cipher Suites = SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
      Client's Supported Cipher Suites = SSL_RSA_WITH_RC4_128_MD5
      Client's Supported Cipher Suites = SSL_RSA_WITH_RC4_128_SHA
      Client's Supported Cipher Suites = TLS_RSA_WITH_AES_128_CBC_SHA
      Client's Supported Cipher Suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA
      Client's Supported Cipher Suites = TLS_DHE_DSS_WITH_AES_128_CBC_SHA
      Client's Supported Cipher Suites = SSL_RSA_WITH_3DES_EDE_CBC_SHA
      Client's Supported Cipher Suites = SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
      Client's Supported Cipher Suites = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
      Client's Supported Cipher Suites = SSL_RSA_WITH_DES_CBC_SHA
      Client's Supported Cipher Suites = SSL_DHE_RSA_WITH_DES_CBC_SHA
      Client's Supported Cipher Suites = SSL_DHE_DSS_WITH_DES_CBC_SHA
      Client's Supported Cipher Suites = SSL_RSA_EXPORT_WITH_RC4_40_MD5
      Client's Supported Cipher Suites = SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
      Client's Supported Cipher Suites = SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
      Client's Supported Cipher Suites = SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
      Client's Supported Cipher Suites = SSL_RSA_WITH_NULL_MD5
      Client's Supported Cipher Suites = SSL_RSA_WITH_NULL_SHA
      Client's Supported Cipher Suites = SSL_DH_anon_WITH_RC4_128_MD5
      Client's Supported Cipher Suites = TLS_DH_anon_WITH_AES_128_CBC_SHA
      Client's Supported Cipher Suites = SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
      Client's Supported Cipher Suites = SSL_DH_anon_WITH_DES_CBC_SHA
      Client's Supported Cipher Suites = SSL_DH_anon_EXPORT_WITH_RC4_40_MD5
      Client's Supported Cipher Suites = SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
      Client's Supported Cipher Suites = TLS_KRB5_WITH_RC4_128_SHA
      Client's Supported Cipher Suites = TLS_KRB5_WITH_RC4_128_MD5
      Client's Supported Cipher Suites = TLS_KRB5_WITH_3DES_EDE_CBC_SHA
      Client's Supported Cipher Suites = TLS_KRB5_WITH_3DES_EDE_CBC_MD5
      Client's Supported Cipher Suites = TLS_KRB5_WITH_DES_CBC_SHA
      Client's Supported Cipher Suites = TLS_KRB5_WITH_DES_CBC_MD5
      Client's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_RC4_40_SHA
      Client's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_RC4_40_MD5
      Client's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
      Client's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
      Server's Default Cipher Suites = SSL_RSA_WITH_RC4_128_MD5
      Server's Default Cipher Suites = SSL_RSA_WITH_RC4_128_SHA
      Server's Default Cipher Suites = TLS_RSA_WITH_AES_128_CBC_SHA
      Server's Default Cipher Suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA
      Server's Default Cipher Suites = TLS_DHE_DSS_WITH_AES_128_CBC_SHA
      Server's Default Cipher Suites = SSL_RSA_WITH_3DES_EDE_CBC_SHA
      Server's Default Cipher Suites = SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
      Server's Default Cipher Suites = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
      Server's Default Cipher Suites = SSL_RSA_WITH_DES_CBC_SHA
      Server's Default Cipher Suites = SSL_DHE_RSA_WITH_DES_CBC_SHA
      Server's Default Cipher Suites = SSL_DHE_DSS_WITH_DES_CBC_SHA
      Server's Default Cipher Suites = SSL_RSA_EXPORT_WITH_RC4_40_MD5
      Server's Default Cipher Suites = SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
      Server's Default Cipher Suites = SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
      Server's Default Cipher Suites = SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
      Server's Supported Cipher Suites = SSL_RSA_WITH_RC4_128_MD5
      Server's Supported Cipher Suites = SSL_RSA_WITH_RC4_128_SHA
      Server's Supported Cipher Suites = TLS_RSA_WITH_AES_128_CBC_SHA
      Server's Supported Cipher Suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA
      Server's Supported Cipher Suites = TLS_DHE_DSS_WITH_AES_128_CBC_SHA
      Server's Supported Cipher Suites = SSL_RSA_WITH_3DES_EDE_CBC_SHA
      Server's Supported Cipher Suites = SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
      Server's Supported Cipher Suites = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
      Server's Supported Cipher Suites = SSL_RSA_WITH_DES_CBC_SHA
      Server's Supported Cipher Suites = SSL_DHE_RSA_WITH_DES_CBC_SHA
      Server's Supported Cipher Suites = SSL_DHE_DSS_WITH_DES_CBC_SHA
      Server's Supported Cipher Suites = SSL_RSA_EXPORT_WITH_RC4_40_MD5
      Server's Supported Cipher Suites = SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
      Server's Supported Cipher Suites = SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
      Server's Supported Cipher Suites = SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
      Server's Supported Cipher Suites = SSL_RSA_WITH_NULL_MD5
      Server's Supported Cipher Suites = SSL_RSA_WITH_NULL_SHA
      Server's Supported Cipher Suites = SSL_DH_anon_WITH_RC4_128_MD5
      Server's Supported Cipher Suites = TLS_DH_anon_WITH_AES_128_CBC_SHA
      Server's Supported Cipher Suites = SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
      Server's Supported Cipher Suites = SSL_DH_anon_WITH_DES_CBC_SHA
      Server's Supported Cipher Suites = SSL_DH_anon_EXPORT_WITH_RC4_40_MD5
      Server's Supported Cipher Suites = SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
      Server's Supported Cipher Suites = TLS_KRB5_WITH_RC4_128_SHA
      Server's Supported Cipher Suites = TLS_KRB5_WITH_RC4_128_MD5
      Server's Supported Cipher Suites = TLS_KRB5_WITH_3DES_EDE_CBC_SHA
      Server's Supported Cipher Suites = TLS_KRB5_WITH_3DES_EDE_CBC_MD5
      Server's Supported Cipher Suites = TLS_KRB5_WITH_DES_CBC_SHA
      Server's Supported Cipher Suites = TLS_KRB5_WITH_DES_CBC_MD5
      Server's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_RC4_40_SHA
      Server's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_RC4_40_MD5
      Server's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
      Server's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
      Port 35601 was allocated as a free port.
      This test use Secure Socket Layer port 35601
      Creating SSLServerSocket...Done
      Before shut down port 35601 wait for client to go away first ...
      Client thread went away. Proceed to shut down port 35601
      ------------------------------------------------------------
      Establishing an "SSLContext" with protocol "TLSv1"
      java.security.ProviderException: Could not obtain session
      at sun.security.pkcs11.SessionManager.ge






      ###@###.### 2005-04-07 18:25:12 GMT

        Attachments

          Activity

            People

            • Assignee:
              andreas Andreas Sterbenz
              Reporter:
              duke J. Duke (Inactive)
            • Votes:
              0 Vote for this issue
              Watchers:
              0 Start watching this issue

              Dates

              • Created:
                Updated:
                Resolved:
                Imported:
                Indexed: