Uploaded image for project: 'JDK'
  1. JDK
  2. JDK-7132249

sun/security/pkcs11/KeyStore/ClientAuth.sh failing on Solaris and Linux

    Details

    • Type: Bug
    • Status: Closed
    • Priority: P3
    • Resolution: Duplicate
    • Affects Version/s: 8
    • Fix Version/s: None
    • Component/s: security-libs

      Description

      This test is failing on Solaris and Linux with jdk8/tl jobs in JPRT. It's also been failing in the TL nightly testing for the last week or so.

      --------------------------------------------------
      TEST: sun/security/pkcs11/KeyStore/ClientAuth.sh
      JDK under test: (/tmp/jprt/P1/203840.albatem/testproduct/solaris_sparcv9_5.10-product)
      java version "1.8.0-internal"
      Java(TM) SE Runtime Environment (build 1.8.0-internal-201201212038.albatem.jdk-b00)
      Java HotSpot(TM) 64-Bit Server VM (build 23.0-b10, mixed mode)

      ACTION: shell -- Failed. Execution failed: exit code 1
      REASON: User specified action: run shell ClientAuth.sh
      TIME: 2.437 seconds
      messages:
      command: shell ClientAuth.sh []
      reason: User specified action: run shell ClientAuth.sh
      elapsed time (seconds): 2.437
      STDOUT:
      TESTSRC=/tmp/jprt/P1/203840.albatem/source/test/sun/security/pkcs11/KeyStore
      TESTCLASSES=/tmp/jprt/P1/203840.albatem/source/build/solaris-sparcv9/testoutput/jdk_security3/JTwork/classes/sun/security/pkcs11/KeyStore
      TESTJAVA=/tmp/jprt/P1/203840.albatem/testproduct/solaris_sparcv9_5.10-product

      Run ClientAuth ...
      Beginning test run ClientAuth...
      Running test with provider SunPKCS11-nss...
      serverPort = 34361
      Completed test with provider SunPKCS11-nss (411 ms).
      Run ClientAuth TLSv1.2 TLS_DHE_RSA_WITH_AES_128_CBC_SHA
      Beginning test run ClientAuth...
      Running test with provider SunPKCS11-nss...
      serverPort = 34363
      client also threw:

      STDERR:
      Note: /tmp/jprt/P1/203840.albatem/source/test/sun/security/pkcs11/KeyStore/../PKCS11Test.java uses unchecked or unsafe operations.
      Note: Recompile with -Xlint:unchecked for details.
      Client died...
      javax.net.ssl.SSLHandshakeException: Error signing certificate verify
      at sun.security.ssl.Alerts.getSSLException(Alerts.java:192)
      at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1868)
      at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:276)
      at sun.security.ssl.ClientHandshaker.serverHelloDone(ClientHandshaker.java:984)
      at sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:282)
      at sun.security.ssl.Handshaker.processLoop(Handshaker.java:868)
      at sun.security.ssl.Handshaker.process_record(Handshaker.java:804)
      at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:996)
      at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1292)
      at sun.security.ssl.SSLSocketImpl.writeRecord(SSLSocketImpl.java:683)
      at sun.security.ssl.AppOutputStream.write(AppOutputStream.java:111)
      at sun.security.ssl.AppOutputStream.write(AppOutputStream.java:125)
      at ClientAuth.doClientSide(ClientAuth.java:169)
      at ClientAuth$2.run(ClientAuth.java:339)
      Caused by: java.security.InvalidKeyException: Key is too short for this signature algorithm
      at sun.security.pkcs11.P11Signature.checkRSAKeyLength(P11Signature.java:345)
      at sun.security.pkcs11.P11Signature.engineInitSign(P11Signature.java:386)
      at java.security.SignatureSpi.engineInitSign(SignatureSpi.java:103)
      at java.security.Signature$Delegate.init(Signature.java:1109)
      at java.security.Signature$Delegate.chooseProvider(Signature.java:1066)
      at java.security.Signature$Delegate.engineInitSign(Signature.java:1139)
      at java.security.Signature.initSign(Signature.java:529)
      at sun.security.ssl.HandshakeMessage$CertificateVerify.<init>(HandshakeMessage.java:1548)
      at sun.security.ssl.ClientHandshaker.serverHelloDone(ClientHandshaker.java:981)
      ... 10 more
      Exception in thread "main" javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
      at sun.security.ssl.Alerts.getSSLException(Alerts.java:192)
      at sun.security.ssl.Alerts.getSSLException(Alerts.java:154)
      at sun.security.ssl.SSLSocketImpl.recvAlert(SSLSocketImpl.java:1942)
      at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1057)
      at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1292)
      at sun.security.ssl.SSLSocketImpl.readDataRecord(SSLSocketImpl.java:846)
      at sun.security.ssl.AppInputStream.read(AppInputStream.java:102)
      at sun.security.ssl.AppInputStream.read(AppInputStream.java:69)
      at ClientAuth.doServerSide(ClientAuth.java:119)
      at ClientAuth.startServer(ClientAuth.java:325)
      at ClientAuth.go(ClientAuth.java:251)
      at ClientAuth.main(ClientAuth.java:235)
      at PKCS11Test.premain(PKCS11Test.java:69)
      at PKCS11Test.testNSS(PKCS11Test.java:226)
      at PKCS11Test.main(PKCS11Test.java:79)
      at ClientAuth.main(ClientAuth.java:203)

      TEST RESULT: Failed. Execution failed: exit code 1
      --------------------------------------------------
      The cause of the issue is that we did not integration the signed pkcs11 jars synchronously. Close it as "not a defect".

        Attachments

          Issue Links

            Activity

              People

              • Assignee:
                xuelei Xue-Lei Fan
                Reporter:
                alanb Alan Bateman
              • Votes:
                0 Vote for this issue
                Watchers:
                0 Start watching this issue

                Dates

                • Created:
                  Updated:
                  Resolved:
                  Imported:
                  Indexed: