Closed
Bug 298687
Opened 20 years ago
Closed 16 years ago
I got an error while wrapping DES key with RSA Public Key
Categories
(JSS Graveyard :: Library, defect)
Tracking
(Not tracked)
RESOLVED
WORKSFORME
People
(Reporter: srinarang, Assigned: wtc)
Details
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; NetCaptor 7.5.0 Gold; .NET CLR 1.1.4322)
Build Identifier: JSS 3.4.0.0
Dear all,
I try to use JSS to produce PKI Enable suite.
I user JSS 3.4.1.0,NSS 3.10.0.0 and NSPR 4.4.1.0 .
In program ,
After Crypto Manager initiated ,I do the following step:
- Generate DES Key
- Build Cipher by this command Cipher cipher = Cipher.getInstance
("RSA",jssProvider);
- Initial the Cipher by command cipher.init(Cipher.WRAP_MODE,
pk11RsaPublicKey);
- and then wrap Des Key by command cipher.wrap(desKey).
In the wrapping step I got the following error message:
An unexpected exception has been detected in native code outside the VM.
Unexpected Signal : EXCEPTION_ACCESS_VIOLATION (0xc0000005) occurred at
PC=0x77C2A4FB
Function=get_sbh_threshold+0xEF
Library=C:\WINDOWS\system32\MSVCRT.dll
For more detail see in attachment
How do I fix this problem ?
Jeap.
Reproducible: Always
Steps to Reproduce:
In program ,
After Crypto Manager initiated ,I do the following step:
1.Generate DES Key
2.Build Cipher by this command Cipher cipher = Cipher.getInstance
("RSA",jssProvider);
3.Initial the Cipher by command cipher.init(Cipher.WRAP_MODE,
pk11RsaPublicKey);
4.Wrap Des Key by command cipher.wrap(desKey).
Actual Results:
I got the following error message:
An unexpected exception has been detected in native code outside the VM.
Unexpected Signal : EXCEPTION_ACCESS_VIOLATION (0xc0000005) occurred at
PC=0x77C2A4FB
Function=get_sbh_threshold+0xEF
Library=C:\WINDOWS\system32\MSVCRT.dll
Current Java thread:
at org.mozilla.jss.pkcs11.PK11KeyWrapper.nativeWrapSymWithPub(Native
Method)
at org.mozilla.jss.pkcs11.PK11KeyWrapper.wrap(PK11KeyWrapper.java:299)
at org.mozilla.jss.provider.javax.crypto.JSSCipherSpi.engineWrap
(JSSCipherSpi.java:397)
at javax.crypto.Cipher.wrap(DashoA6275)
at th.co.oga.security.pki.Operator.MozillaJSS.JSSRecipientInfo.build
(JSSRecipientInfo.java:125)
at th.co.oga.security.pki.Operator.MozillaJSS.JSSRecipientInfo.getBytes
(JSSRecipientInfo.java:284)
at
th.co.oga.security.pki.Operator.MozillaJSS.JSSRecipientInfoTestCase.testEncrypt
edContentInfoProfile(JSSRecipientInfoTestCase.java:126)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke
(NativeMethodAccessorImpl.java:39)
at sun.reflect.DelegatingMethodAccessorImpl.invoke
(DelegatingMethodAccessorImpl.java:25)
at java.lang.reflect.Method.invoke(Method.java:324)
at junit.framework.TestCase.runTest(TestCase.java:154)
at junit.framework.TestCase.runBare(TestCase.java:127)
at junit.framework.TestResult$1.protect(TestResult.java:106)
at junit.framework.TestResult.runProtected(TestResult.java:124)
at junit.framework.TestResult.run(TestResult.java:109)
at junit.framework.TestCase.run(TestCase.java:118)
at junit.framework.TestSuite.runTest(TestSuite.java:208)
at junit.framework.TestSuite.run(TestSuite.java:203)
at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.runTests
(RemoteTestRunner.java:474)
at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.run
(RemoteTestRunner.java:342)
at org.eclipse.jdt.internal.junit.runner.RemoteTestRunner.main
(RemoteTestRunner.java:194)
Dynamic libraries:
0x00400000 - 0x0040B000 C:\java\jdk14208\bin\javaw.exe
0x7C900000 - 0x7C9B0000 C:\WINDOWS\system32\ntdll.dll
0x7C800000 - 0x7C8F4000 C:\WINDOWS\system32\kernel32.dll
0x77DD0000 - 0x77E6B000 C:\WINDOWS\system32\ADVAPI32.dll
0x77E70000 - 0x77F01000 C:\WINDOWS\system32\RPCRT4.dll
0x77D40000 - 0x77DD0000 C:\WINDOWS\system32\USER32.dll
0x77F10000 - 0x77F56000 C:\WINDOWS\system32\GDI32.dll
0x77C10000 - 0x77C68000 C:\WINDOWS\system32\MSVCRT.dll
0x629C0000 - 0x629C9000 C:\WINDOWS\system32\LPK.DLL
0x74D90000 - 0x74DFB000 C:\WINDOWS\system32\USP10.dll
0x08000000 - 0x08138000 C:\java\jdk14208\jre\bin\client\jvm.dll
0x76B40000 - 0x76B6D000 C:\WINDOWS\system32\WINMM.dll
0x10000000 - 0x10007000 C:\java\jdk14208\jre\bin\hpi.dll
0x00940000 - 0x0094E000 C:\java\jdk14208\jre\bin\verify.dll
0x00950000 - 0x00969000 C:\java\jdk14208\jre\bin\java.dll
0x00970000 - 0x0097E000 C:\java\jdk14208\jre\bin\zip.dll
0x00A50000 - 0x00A5F000 C:\java\jdk14208\jre\bin\net.dll
0x71AB0000 - 0x71AC7000 C:\WINDOWS\system32\WS2_32.dll
0x71AA0000 - 0x71AA8000 C:\WINDOWS\system32\WS2HELP.dll
0x02F70000 - 0x02F82000 C:\WINDOWS\system32\VetRedir.dll
0x71A50000 - 0x71A8F000 C:\WINDOWS\system32\mswsock.dll
0x662B0000 - 0x66308000 C:\WINDOWS\system32\hnetcfg.dll
0x02FC0000 - 0x02FD8000 C:\WINDOWS\system32\ISafeIf.dll
0x71A90000 - 0x71A98000 C:\WINDOWS\System32\wshtcpip.dll
0x03030000 - 0x0306B000 C:\CryptOGA\libs\jss3.dll
0x03070000 - 0x030C0000 c:\CryptOGA\libs\nss3.dll
0x030C0000 - 0x03113000 c:\CryptOGA\libs\softokn3.dll
0x30000000 - 0x30007000 c:\CryptOGA\libs\libplc4.dll
0x03120000 - 0x03151000 c:\CryptOGA\libs\libnspr4.dll
0x71AD0000 - 0x71AD9000 C:\WINDOWS\system32\WSOCK32.dll
0x03160000 - 0x03166000 c:\CryptOGA\libs\libplds4.dll
0x03170000 - 0x03189000 c:\CryptOGA\libs\smime3.dll
0x03190000 - 0x031AB000 c:\CryptOGA\libs\ssl3.dll
0x76F20000 - 0x76F47000 C:\WINDOWS\system32\DNSAPI.dll
0x76FB0000 - 0x76FB8000 C:\WINDOWS\System32\winrnr.dll
0x76F60000 - 0x76F8C000 C:\WINDOWS\system32\WLDAP32.dll
0x76FC0000 - 0x76FC6000 C:\WINDOWS\system32\rasadhlp.dll
0x76C90000 - 0x76CB8000 C:\WINDOWS\system32\imagehlp.dll
0x59A60000 - 0x59B01000 C:\WINDOWS\system32\DBGHELP.dll
0x77C00000 - 0x77C08000 C:\WINDOWS\system32\VERSION.dll
0x76BF0000 - 0x76BFB000 C:\WINDOWS\system32\PSAPI.DLL
Heap at VM Abort:
Heap
def new generation total 576K, used 308K [0x10010000, 0x100b0000,
0x104f0000)
eden space 512K, 47% used [0x10010000, 0x1004d2a0, 0x10090000)
from space 64K, 100% used [0x10090000, 0x100a0000, 0x100a0000)
to space 64K, 0% used [0x100a0000, 0x100a0000, 0x100b0000)
tenured generation total 2208K, used 1860K [0x104f0000, 0x10718000,
0x14010000)
the space 2208K, 84% used [0x104f0000, 0x106c1030, 0x106c1200, 0x10718000)
compacting perm gen total 4352K, used 4309K [0x14010000, 0x14450000,
0x18010000)
the space 4352K, 99% used [0x14010000, 0x144454d0, 0x14445600, 0x14450000)
Local Time = Fri Jun 24 18:22:18 2005
Elapsed Time = 5
#
# The exception above was detected in native code outside the VM
#
# Java VM: Java HotSpot(TM) Client VM (1.4.2_08-b03 mixed mode)
#
Expected Results:
Cipher should return the Wrapped Key in Byte array
MSVCRT.dll
Updated•18 years ago
|
QA Contact: libraries
Updated•17 years ago
|
QA Contact: libraries → jss-qa
Comment 1•16 years ago
|
||
I am closing this bug as resolved. I am not sure what fixed the issue, but there is now a test program that gets run in our JSS QA that tests wrapping a DESede key with RSA using the Mozilla-JSS provider http://mxr.mozilla.org/security/source/security/jss/org/mozilla/jss/tests/JCAKeyWrap.java one can modify the program to test with DES.
Status: UNCONFIRMED → RESOLVED
Closed: 16 years ago
Resolution: --- → WORKSFORME
You need to log in
before you can comment on or make changes to this bug.
Description
•