Closed Bug 298687 Opened 20 years ago Closed 16 years ago

I got an error while wrapping DES key with RSA Public Key

Categories

(JSS Graveyard :: Library, defect)

x86
Windows XP
defect
Not set
critical

Tracking

(Not tracked)

RESOLVED WORKSFORME

People

(Reporter: srinarang, Assigned: wtc)

Details

User-Agent:       Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; NetCaptor 7.5.0 Gold; .NET CLR 1.1.4322)
Build Identifier: JSS 3.4.0.0

Dear all,
I try to use JSS to produce PKI Enable suite.
I user JSS 3.4.1.0,NSS 3.10.0.0 and NSPR 4.4.1.0 .
In program ,
After Crypto Manager initiated ,I do the following step:
- Generate DES Key
- Build Cipher by this command Cipher cipher = Cipher.getInstance
("RSA",jssProvider);
- Initial the Cipher by command cipher.init(Cipher.WRAP_MODE, 
pk11RsaPublicKey);
- and then wrap Des Key by command cipher.wrap(desKey).
In the wrapping step I got the following error message:

An unexpected exception has been detected in native code outside the VM.
Unexpected Signal : EXCEPTION_ACCESS_VIOLATION (0xc0000005) occurred at 
PC=0x77C2A4FB
Function=get_sbh_threshold+0xEF
Library=C:\WINDOWS\system32\MSVCRT.dll

For more detail see in attachment 
How do I fix this problem ?

Jeap.



Reproducible: Always

Steps to Reproduce:
In program ,
After Crypto Manager initiated ,I do the following step:
1.Generate DES Key
2.Build Cipher by this command Cipher cipher = Cipher.getInstance
("RSA",jssProvider);
3.Initial the Cipher by command cipher.init(Cipher.WRAP_MODE, 
pk11RsaPublicKey);
4.Wrap Des Key by command cipher.wrap(desKey).
Actual Results:  
I got the following error message:

An unexpected exception has been detected in native code outside the VM.
Unexpected Signal : EXCEPTION_ACCESS_VIOLATION (0xc0000005) occurred at 
PC=0x77C2A4FB
Function=get_sbh_threshold+0xEF
Library=C:\WINDOWS\system32\MSVCRT.dll

Current Java thread:
	at org.mozilla.jss.pkcs11.PK11KeyWrapper.nativeWrapSymWithPub(Native 
Method)
	at org.mozilla.jss.pkcs11.PK11KeyWrapper.wrap(PK11KeyWrapper.java:299)
	at org.mozilla.jss.provider.javax.crypto.JSSCipherSpi.engineWrap
(JSSCipherSpi.java:397)
	at javax.crypto.Cipher.wrap(DashoA6275)
	at th.co.oga.security.pki.Operator.MozillaJSS.JSSRecipientInfo.build
(JSSRecipientInfo.java:125)
	at th.co.oga.security.pki.Operator.MozillaJSS.JSSRecipientInfo.getBytes
(JSSRecipientInfo.java:284)
	at 
th.co.oga.security.pki.Operator.MozillaJSS.JSSRecipientInfoTestCase.testEncrypt
edContentInfoProfile(JSSRecipientInfoTestCase.java:126)
	at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at sun.reflect.NativeMethodAccessorImpl.invoke
(NativeMethodAccessorImpl.java:39)
	at sun.reflect.DelegatingMethodAccessorImpl.invoke
(DelegatingMethodAccessorImpl.java:25)
	at java.lang.reflect.Method.invoke(Method.java:324)
	at junit.framework.TestCase.runTest(TestCase.java:154)
	at junit.framework.TestCase.runBare(TestCase.java:127)
	at junit.framework.TestResult$1.protect(TestResult.java:106)
	at junit.framework.TestResult.runProtected(TestResult.java:124)
	at junit.framework.TestResult.run(TestResult.java:109)
	at junit.framework.TestCase.run(TestCase.java:118)
	at junit.framework.TestSuite.runTest(TestSuite.java:208)
	at junit.framework.TestSuite.run(TestSuite.java:203)
	at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.runTests
(RemoteTestRunner.java:474)
	at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.run
(RemoteTestRunner.java:342)
	at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.main
(RemoteTestRunner.java:194)

Dynamic libraries:
0x00400000 - 0x0040B000 	C:\java\jdk14208\bin\javaw.exe
0x7C900000 - 0x7C9B0000 	C:\WINDOWS\system32\ntdll.dll
0x7C800000 - 0x7C8F4000 	C:\WINDOWS\system32\kernel32.dll
0x77DD0000 - 0x77E6B000 	C:\WINDOWS\system32\ADVAPI32.dll
0x77E70000 - 0x77F01000 	C:\WINDOWS\system32\RPCRT4.dll
0x77D40000 - 0x77DD0000 	C:\WINDOWS\system32\USER32.dll
0x77F10000 - 0x77F56000 	C:\WINDOWS\system32\GDI32.dll
0x77C10000 - 0x77C68000 	C:\WINDOWS\system32\MSVCRT.dll
0x629C0000 - 0x629C9000 	C:\WINDOWS\system32\LPK.DLL
0x74D90000 - 0x74DFB000 	C:\WINDOWS\system32\USP10.dll
0x08000000 - 0x08138000 	C:\java\jdk14208\jre\bin\client\jvm.dll
0x76B40000 - 0x76B6D000 	C:\WINDOWS\system32\WINMM.dll
0x10000000 - 0x10007000 	C:\java\jdk14208\jre\bin\hpi.dll
0x00940000 - 0x0094E000 	C:\java\jdk14208\jre\bin\verify.dll
0x00950000 - 0x00969000 	C:\java\jdk14208\jre\bin\java.dll
0x00970000 - 0x0097E000 	C:\java\jdk14208\jre\bin\zip.dll
0x00A50000 - 0x00A5F000 	C:\java\jdk14208\jre\bin\net.dll
0x71AB0000 - 0x71AC7000 	C:\WINDOWS\system32\WS2_32.dll
0x71AA0000 - 0x71AA8000 	C:\WINDOWS\system32\WS2HELP.dll
0x02F70000 - 0x02F82000 	C:\WINDOWS\system32\VetRedir.dll
0x71A50000 - 0x71A8F000 	C:\WINDOWS\system32\mswsock.dll
0x662B0000 - 0x66308000 	C:\WINDOWS\system32\hnetcfg.dll
0x02FC0000 - 0x02FD8000 	C:\WINDOWS\system32\ISafeIf.dll
0x71A90000 - 0x71A98000 	C:\WINDOWS\System32\wshtcpip.dll
0x03030000 - 0x0306B000 	C:\CryptOGA\libs\jss3.dll
0x03070000 - 0x030C0000 	c:\CryptOGA\libs\nss3.dll
0x030C0000 - 0x03113000 	c:\CryptOGA\libs\softokn3.dll
0x30000000 - 0x30007000 	c:\CryptOGA\libs\libplc4.dll
0x03120000 - 0x03151000 	c:\CryptOGA\libs\libnspr4.dll
0x71AD0000 - 0x71AD9000 	C:\WINDOWS\system32\WSOCK32.dll
0x03160000 - 0x03166000 	c:\CryptOGA\libs\libplds4.dll
0x03170000 - 0x03189000 	c:\CryptOGA\libs\smime3.dll
0x03190000 - 0x031AB000 	c:\CryptOGA\libs\ssl3.dll
0x76F20000 - 0x76F47000 	C:\WINDOWS\system32\DNSAPI.dll
0x76FB0000 - 0x76FB8000 	C:\WINDOWS\System32\winrnr.dll
0x76F60000 - 0x76F8C000 	C:\WINDOWS\system32\WLDAP32.dll
0x76FC0000 - 0x76FC6000 	C:\WINDOWS\system32\rasadhlp.dll
0x76C90000 - 0x76CB8000 	C:\WINDOWS\system32\imagehlp.dll
0x59A60000 - 0x59B01000 	C:\WINDOWS\system32\DBGHELP.dll
0x77C00000 - 0x77C08000 	C:\WINDOWS\system32\VERSION.dll
0x76BF0000 - 0x76BFB000 	C:\WINDOWS\system32\PSAPI.DLL

Heap at VM Abort:
Heap
 def new generation   total 576K, used 308K [0x10010000, 0x100b0000, 
0x104f0000)
  eden space 512K,  47% used [0x10010000, 0x1004d2a0, 0x10090000)
  from space 64K, 100% used [0x10090000, 0x100a0000, 0x100a0000)
  to   space 64K,   0% used [0x100a0000, 0x100a0000, 0x100b0000)
 tenured generation   total 2208K, used 1860K [0x104f0000, 0x10718000, 
0x14010000)
   the space 2208K,  84% used [0x104f0000, 0x106c1030, 0x106c1200, 0x10718000)
 compacting perm gen  total 4352K, used 4309K [0x14010000, 0x14450000, 
0x18010000)
   the space 4352K,  99% used [0x14010000, 0x144454d0, 0x14445600, 0x14450000)

Local Time = Fri Jun 24 18:22:18 2005
Elapsed Time = 5
#
# The exception above was detected in native code outside the VM
#
# Java VM: Java HotSpot(TM) Client VM (1.4.2_08-b03 mixed mode)
#


Expected Results:  
Cipher should return the Wrapped Key in Byte array

MSVCRT.dll
QA Contact: libraries
QA Contact: libraries → jss-qa
I am closing this bug as resolved. I am not sure what fixed the issue, but 
there is now a test program that gets run in our JSS QA that tests wrapping
a DESede key with RSA using the Mozilla-JSS provider

http://mxr.mozilla.org/security/source/security/jss/org/mozilla/jss/tests/JCAKeyWrap.java

one can modify the program to test with DES.
Status: UNCONFIRMED → RESOLVED
Closed: 16 years ago
Resolution: --- → WORKSFORME
You need to log in before you can comment on or make changes to this bug.