periodic token login failures

RESOLVED DUPLICATE of bug 315445

Status

RESOLVED DUPLICATE of bug 315445
13 years ago
12 years ago

People

(Reporter: jason.m.reid, Assigned: wtc)

Tracking

4.1.1
x86
Linux

Details

(Reporter)

Description

13 years ago
Periodically during the JSS test runs, the tests are unable to login to the token. 

From 20051027 securitytip biarritz-SunOS5.10_i86pc_OPT
============= test signing
Available tokens:
 token : Internal Crypto Services Token
 token : Internal Key Storage Token
 token : Builtin Object Token
org.mozilla.jss.crypto.TokenException: unable to login to token
        at org.mozilla.jss.pkcs11.PK11KeyPairGenerator.generateRSAKeyPair(Native Method)
        at org.mozilla.jss.pkcs11.PK11KeyPairGenerator.generateKeyPair(PK11KeyPairGenerator.java:183)
        at org.mozilla.jss.crypto.KeyPairGenerator.genKeyPair(KeyPairGenerator.java:82)
        at org.mozilla.jss.tests.SigTest.main(SigTest.java:107)
SigTest returned 1
JSSTEST_CASE 8 (Signing): FAIL
============= test Mozilla-JSS SigatureSPI JCASigTest
Provider 0: Mozilla-JSS
Provider 1: SunJSSE
Provider 2: SunRsaSign
Provider 3: SunJCE
Provider 4: SunJGSS
org.mozilla.jss.crypto.TokenRuntimeException: unable to login to token
        at org.mozilla.jss.provider.java.security.JSSKeyPairGeneratorSpi.generateKeyPair(JSSKeyPairGeneratorSpi.java:85)
        at java.security.KeyPairGenerator$Delegate.generateKeyPair(KeyPairGenerator.java:475)
        at org.mozilla.jss.tests.JCASigTest.main(JCASigTest.java:123)
TestJCASigTest returned 1
JSSTEST_CASE 9 (Mozilla-JSS SigatureSPI JCASigTest): FAIL
============= test Secret Decoder Ring
Exception in thread "main" org.mozilla.jss.crypto.TokenException: Failed to login to token: (-8192) An I/O error occurred during security authorization.
        at org.mozilla.jss.SecretDecoderRing.KeyManager.lookupKeyNative(Native Method)
        at org.mozilla.jss.SecretDecoderRing.KeyManager.lookupKey(KeyManager.java:220)
        at org.mozilla.jss.SecretDecoderRing.KeyManager.keyExists(KeyManager.java:201)
        at org.mozilla.jss.SecretDecoderRing.KeyManager.generateUnusedKeyID(KeyManager.java:191)
        at org.mozilla.jss.SecretDecoderRing.KeyManager.generateKey(KeyManager.java:107)
        at org.mozilla.jss.tests.TestSDR.main(TestSDR.java:69)
TestSDR returned 1
JSSTEST_CASE 10 (Secret Decoder Ring): FAIL
============= Generate known cert pair for testing
org.mozilla.jss.pkcs11.PK11Token$NotInitializedException
        at org.mozilla.jss.pkcs11.PK11Token.nativeLogin(Native Method)
        at org.mozilla.jss.pkcs11.PK11Token.login(PK11Token.java:178)
        at org.mozilla.jss.tests.GenerateTestCert.doIt(GenerateTestCert.java:88)
        at org.mozilla.jss.tests.GenerateTestCert.main(GenerateTestCert.java:66)
Generate known cert pair for testing returned 1
============= convert PKCS11 cert to PKCS12 format
pk12util: find user certs from nickname failed: security library: bad database.
Convert PKCS11 to PKCS12 returned 24
============= Start JSSE server tests
============= Start JSS client tests
java.io.FileNotFoundException: ./SunOS5.10_i86pc_OPT.OBJ/keystore.pfx (No such file or directory)
        at java.io.FileInputStream.open(Native Method)
        at java.io.FileInputStream.<init>(FileInputStream.java:106)
        at java.io.FileInputStream.<init>(FileInputStream.java:66)
        at org.mozilla.jss.tests.JSSE_SSLServer.getServerSocketFactory(JSSE_SSLServer.java:207)
        at org.mozilla.jss.tests.JSSE_SSLServer.main(JSSE_SSLServer.java:112)
***FilePasswordCallback returns netscape
Unable to connect: (-5981) Connection refused by peer.
org.mozilla.jss.ssl.SSLSocketException: Unable to connect: (-5981) Connection refused by peer.
        at org.mozilla.jss.ssl.SSLSocket.socketConnect(Native Method)
        at org.mozilla.jss.ssl.SSLSocket.<init>(SSLSocket.java:259)
        at org.mozilla.jss.ssl.SSLSocket.<init>(SSLSocket.java:230)
        at org.mozilla.jss.tests.JSS_SSLClient.doIt(JSS_SSLClient.java:212)
        at org.mozilla.jss.tests.JSS_SSLClient.main(JSS_SSLClient.java:419)
JSSTEST_CASE 11 (JSSE server / JSS client): PASS

Here the login is attempted twice:
From 20051027 securitytip mandela-SunOS5.10_i86pc_DBG
============= Setup DB
main: jss library loaded
org.mozilla.jss.crypto.AlreadyInitializedException
        at org.mozilla.jss.pkcs11.PK11Token.initPassword(PK11Token.java:258)
        at org.mozilla.jss.tests.SetupDBs.main(SetupDBs.java:58)
SetupDBs returned 1
JSSTEST_CASE 1 (Setup DB): FAIL

From 20051027 securitytip mandela-SunOS5.10_i86pc_OPT
============= test sockets
Exception in thread "main" org.mozilla.jss.pkcs11.PK11Token$NotInitializedException
        at org.mozilla.jss.pkcs11.PK11Token.nativeLogin(Native Method)
        at org.mozilla.jss.pkcs11.PK11Token.login(PK11Token.java:178)
        at org.mozilla.jss.tests.SSLClientAuth.doIt(SSLClientAuth.java:125)
        at org.mozilla.jss.tests.SSLClientAuth.main(SSLClientAuth.java:104)
SSLClientAuth returned 1
JSSTEST_CASE 3 (Sockets): FAIL
============= test key gen
The following tokens support RSA keygen:
        Internal Crypto Services Token
        Internal Key Storage Token
The following tokens support DSA keygen:
        Internal Crypto Services Token
        Internal Key Storage Token
org.mozilla.jss.crypto.TokenRuntimeException: unable to login to token
        at org.mozilla.jss.provider.java.security.JSSKeyPairGeneratorSpi.generateKeyPair(JSSKeyPairGeneratorSpi.java:85)
        at java.security.KeyPairGenerator$Delegate.generateKeyPair(KeyPairGenerator.java:475)
        at java.security.KeyPairGenerator.genKeyPair(KeyPairGenerator.java:400)
        at org.mozilla.jss.tests.TestKeyGen.main(TestKeyGen.java:107)
TestKeyGen returned 1
JSSTEST_CASE 4 (Key generation): FAIL
============= test KeyFactory
org.mozilla.jss.pkcs11.PK11Token$NotInitializedException
        at org.mozilla.jss.pkcs11.PK11Token.nativeLogin(Native Method)
        at org.mozilla.jss.pkcs11.PK11Token.login(PK11Token.java:178)
        at org.mozilla.jss.tests.KeyFactoryTest.main(KeyFactoryTest.java:94)
KeyFactoryTest returned 1
JSSTEST_CASE 5 (KeyFactoryTest): FAIL

These could be related the recent change in JSS testing. Previously all test runs were done sequentially. Now all runs are done in parrallel (host parallelism only. Individual hosts run tests sequentially e.g. DBG, OPT, DBG64, then OPT64.)
(Reporter)

Comment 1

13 years ago
Same failures were seen on 20051027 security310 charm-HP-UXB.11.11_DBG
and mandela-SunOS5.10_i86pc_OPT, and 20051025 security310 chavez-SunOS5.9_i86pc_DBG.
(Reporter)

Comment 2

13 years ago
Encounter again on biarritz-SunOS5.10_i86pc_DBG and 
biarritz-SunOS5.10_i86pc_OPT on securitytip 20051029.
Also biarritz-SunOS5.10_i86pc_DBG on security310 20051029
and biarritz-SunOS5.10_i86pc_OPT on security310 20051029.
(Reporter)

Comment 3

13 years ago
NFS stale file handles were found on these machines. Could be the problem.
(Reporter)

Comment 4

13 years ago
Christophe Ravel discovered that some elements of the JSS test script were
not parallel safe. Specifically files were being copied into locations that
were already in use.
(Reporter)

Comment 5

13 years ago
Encountered these login problems:
20051106 securitytip mandela OPT
20051107 securitytip mandela OPT

Comment 6

13 years ago
More similar failures are seen on a regular basis in JSS nightly QA. These seem to occur at different tests randomly. As Jason mentioned, these could be the result of running JSS tests from a single NFS location and a previous platform has not yet released the tokens?

[1] nssamdrhel3: RehHat Linux AS 3.x

============= test Secret Decoder Ring
main: jss library loaded
Exception in thread "main" org.mozilla.jss.crypto.TokenException: Failed to login to token: (-8177) The security password entered is incorrect.
	at org.mozilla.jss.SecretDecoderRing.KeyManager.lookupKeyNative(Native Method)
	at org.mozilla.jss.SecretDecoderRing.KeyManager.lookupKey(KeyManager.java:220)
	at org.mozilla.jss.SecretDecoderRing.KeyManager.keyExists(KeyManager.java:201)
	at org.mozilla.jss.SecretDecoderRing.KeyManager.generateUnusedKeyID(KeyManager.java:191)
	at org.mozilla.jss.SecretDecoderRing.KeyManager.generateKey(KeyManager.java:107)
	at org.mozilla.jss.tests.TestSDR.main(TestSDR.java:69)
TestSDR returned 1
JSSTEST_CASE 10 (Secret Decoder Ring): FAIL

[2] workout: RedHat Linux

============= test Mozilla-JSS SigatureSPI JCASigTest
Provider 0: Mozilla-JSS
Provider 1: SunJSSE
Provider 2: SunRsaSign
Provider 3: SunJCE
Provider 4: SunJGSS
org.mozilla.jss.crypto.TokenRuntimeException: unable to login to token
	at org.mozilla.jss.provider.java.security.JSSKeyPairGeneratorSpi.generateKeyPair(JSSKeyPairGeneratorSpi.java:85)
	at java.security.KeyPairGenerator$Delegate.generateKeyPair(KeyPairGenerator.java:475)
	at org.mozilla.jss.tests.JCASigTest.main(JCASigTest.java:123)
TestJCASigTest returned 1
JSSTEST_CASE 9 (Mozilla-JSS SigatureSPI JCASigTest): FAIL

Comment 7

13 years ago
nssamdrhel3 Linux2.4_x86_glibc_PTH_DBG - nightly test 20060411

============= test key gen
main: jss library loaded
The following tokens support RSA keygen:
	NSS Internal FIPS-140-1 Cryptogr
The following tokens support DSA keygen:
	NSS Internal FIPS-140-1 Cryptogr
Generating 512-bit RSA KeyPair!
Generating 1024-bit RSA KeyPair!
Generating 512-bit RSA KeyPair with public exponent=3!
Generating 512-bit DSA KeyPair!
Generating 1024-bit DSA KeyPair with PQG params!
org.mozilla.jss.crypto.TokenRuntimeException: unable to login to token
	at org.mozilla.jss.provider.java.security.JSSKeyPairGeneratorSpi.generateKeyPair(JSSKeyPairGeneratorSpi.java:85)
	at java.security.KeyPairGenerator$Delegate.generateKeyPair(KeyPairGenerator.java:475)
	at java.security.KeyPairGenerator.genKeyPair(KeyPairGenerator.java:400)
	at org.mozilla.jss.tests.TestKeyGen.main(TestKeyGen.java:216)
TestKeyGen returned 1
JSSTEST_CASE 5 (Key generation): FAIL
============= test KeyFactory
main: jss library loaded
org.mozilla.jss.util.IncorrectPasswordException
	at org.mozilla.jss.pkcs11.PK11Token.nativeLogin(Native Method)
	at org.mozilla.jss.pkcs11.PK11Token.login(PK11Token.java:178)
	at org.mozilla.jss.tests.KeyFactoryTest.main(KeyFactoryTest.java:104)
KeyFactoryTest returned 1
JSSTEST_CASE 6 (KeyFactoryTest): FAIL
============= test HMAC
39 bytes to be digested
main: jss library loaded
Provider 0: Mozilla-JSS
Provider 1: SUN
Provider 2: SunJSSE
Provider 3: SunRsaSign
Provider 4: SunJCE
Provider 5: SunJGSS
Enter password for NSS Internal FIPS-140-1 Cryptogr
Enter password for NSS Internal FIPS-140-1 Cryptogr
Exception in thread "main" java.lang.ExceptionInInitializerError
	at javax.crypto.SecretKeyFactory.getInstance(DashoA6275)
	at org.mozilla.jss.tests.HMACTest.main(HMACTest.java:140)
Caused by: java.lang.SecurityException: Cannot set up certs for trusted CAs
	at javax.crypto.SunJCE_b.<clinit>(DashoA6275)
	... 2 more
Caused by: java.lang.SecurityException: Signature classes have been tampered with
	at javax.crypto.SunJCE_b.c(DashoA6275)
	at javax.crypto.SunJCE_b.b(DashoA6275)
	at javax.crypto.SunJCE_s.run(DashoA6275)
	at java.security.AccessController.doPrivileged(Native Method)
	... 3 more
HMACTest returned 1
JSSTEST_CASE 8 (HMACTest): FAIL
============= test Mozilla-JSS SigatureSPI JCASigTest
main: jss library loaded
Provider 0: Mozilla-JSS
Provider 1: SunJSSE
Provider 2: SunRsaSign
Provider 3: SunJCE
Provider 4: SunJGSS
org.mozilla.jss.crypto.TokenRuntimeException: unable to login to token
	at org.mozilla.jss.provider.java.security.JSSKeyPairGeneratorSpi.generateKeyPair(JSSKeyPairGeneratorSpi.java:85)
	at java.security.KeyPairGenerator$Delegate.generateKeyPair(KeyPairGenerator.java:475)
	at org.mozilla.jss.tests.JCASigTest.main(JCASigTest.java:123)
TestJCASigTest returned 1
JSSTEST_CASE 9 (Mozilla-JSS SigatureSPI JCASigTest): FAIL

Comment 8

13 years ago
============= test sockets
Exception in thread "main" org.mozilla.jss.pkcs11.PK11Token$NotInitializedException
	at org.mozilla.jss.pkcs11.PK11Token.nativeLogin(Native Method)
	at org.mozilla.jss.pkcs11.PK11Token.login(PK11Token.java:178)
	at org.mozilla.jss.tests.SSLClientAuth.doIt(SSLClientAuth.java:126)
	at org.mozilla.jss.tests.SSLClientAuth.main(SSLClientAuth.java:104)
SSLClientAuth returned 1
JSSTEST_CASE 3 (Sockets): FAIL
============= test sockets using bypass 
Exception in thread "main" org.mozilla.jss.pkcs11.PK11Token$NotInitializedException
	at org.mozilla.jss.pkcs11.PK11Token.nativeLogin(Native Method)
	at org.mozilla.jss.pkcs11.PK11Token.login(PK11Token.java:178)
	at org.mozilla.jss.tests.SSLClientAuth.doIt(SSLClientAuth.java:126)
	at org.mozilla.jss.tests.SSLClientAuth.main(SSLClientAuth.java:104)
SSLClientAuth using bypass mode returned 1
JSSTEST_CASE 4 (SSLClientAuth using bypass): FAIL
============= test key gen
The following tokens support RSA keygen:
	Internal Crypto Services Token
	Internal Key Storage Token
The following tokens support DSA keygen:
	Internal Crypto Services Token
	Internal Key Storage Token
Generating 512-bit RSA KeyPair!
Generating 1024-bit RSA KeyPair!
Generating 512-bit RSA KeyPair with public exponent=3!
Generating 512-bit DSA KeyPair!
Generating 1024-bit DSA KeyPair with PQG params!
org.mozilla.jss.crypto.TokenRuntimeException: unable to login to token
	at org.mozilla.jss.provider.java.security.JSSKeyPairGeneratorSpi.generateKeyPair(JSSKeyPairGeneratorSpi.java:85)
	at java.security.KeyPairGenerator$Delegate.generateKeyPair(KeyPairGenerator.java:632)
	at java.security.KeyPairGenerator.genKeyPair(KeyPairGenerator.java:410)
	at org.mozilla.jss.tests.TestKeyGen.main(TestKeyGen.java:216)
TestKeyGen returned 1
JSSTEST_CASE 5 (Key generation): FAIL

Appeared during nightly testing securityjes5 20060508.1 on
Linux2.4_x86_glibc_PTH_OPT architecture.

Comment 9

12 years ago
============= test sockets
Exception in thread "main" org.mozilla.jss.pkcs11.PK11Token$NotInitializedException
	at org.mozilla.jss.pkcs11.PK11Token.nativeLogin(Native Method)
	at org.mozilla.jss.pkcs11.PK11Token.login(PK11Token.java:178)
	at org.mozilla.jss.tests.SSLClientAuth.doIt(SSLClientAuth.java:126)
	at org.mozilla.jss.tests.SSLClientAuth.main(SSLClientAuth.java:104)
SSLClientAuth returned 1
JSSTEST_CASE 3 (Sockets): FAIL
============= test sockets using bypass 
Exception in thread "main" org.mozilla.jss.pkcs11.PK11Token$NotInitializedException
	at org.mozilla.jss.pkcs11.PK11Token.nativeLogin(Native Method)
	at org.mozilla.jss.pkcs11.PK11Token.login(PK11Token.java:178)
	at org.mozilla.jss.tests.SSLClientAuth.doIt(SSLClientAuth.java:126)
	at org.mozilla.jss.tests.SSLClientAuth.main(SSLClientAuth.java:104)
SSLClientAuth using bypass mode returned 1
JSSTEST_CASE 4 (SSLClientAuth using bypass): FAIL


Appeared during nightly testing securityjes5 20060509.1 on Linux2.4_x86_glibc_PTH_OPT architecture.

Comment 10

12 years ago
============= Setup DB
main: jss library loaded
***FilePasswordCallback returns netscape
org.mozilla.jss.util.IncorrectPasswordException: Incorrect security officer PIN
	at org.mozilla.jss.pkcs11.PK11Token.initPassword(Native Method)
	at org.mozilla.jss.pkcs11.PK11Token.initPassword(PK11Token.java:278)
	at org.mozilla.jss.tests.SetupDBs.main(SetupDBs.java:58)
SetupDBs returned 1
JSSTEST_CASE 1 (Setup DB): FAIL
============= List CA certs
main: jss library loaded

An unexpected exception has been detected in native code outside the VM.
Unexpected Signal : 7 occurred at PC=0x4001186D
Function=(null)+0x4001186D
Library=/lib/ld-linux.so.2

NOTE: We are unable to locate the function name symbol for the error
      just occurred. Please refer to release documentation for possible
      reason and solutions.


Current Java thread:
	at org.mozilla.jss.CryptoManager.initializeAllNative2(Native Method)
	at org.mozilla.jss.CryptoManager.initialize(CryptoManager.java:832)
	- locked <0x48928750> (a java.lang.Class)
	at org.mozilla.jss.CryptoManager.initialize(CryptoManager.java:798)
	- locked <0x48928750> (a java.lang.Class)
	at org.mozilla.jss.tests.ListCACerts.main(ListCACerts.java:15)

Dynamic libraries:
08048000-08056000 r-xp 00000000 00:19 1959846    /share/builds/components/jdk/1.4.2_05/Linux/jre/bin/java
08056000-08059000 rw-p 0000d000 00:19 1959846    /share/builds/components/jdk/1.4.2_05/Linux/jre/bin/java
40000000-40016000 r-xp 00000000 08:03 147462     /lib/ld-2.2.4.so
40016000-40017000 rw-p 00015000 08:03 147462     /lib/ld-2.2.4.so
40018000-40020000 r-xp 00000000 00:19 1959863    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/native_threads/libhpi.so
40020000-40021000 rw-p 00007000 00:19 1959863    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/native_threads/libhpi.so
40021000-4002b000 r-xp 00000000 08:03 147496     /lib/libnss_files-2.2.4.so
4002b000-4002c000 rw-p 00009000 08:03 147496     /lib/libnss_files-2.2.4.so
4002c000-4002f000 r--s 00000000 00:19 1959901    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/ext/dnsns.jar
4002f000-4003c000 r-xp 00000000 08:03 1310733    /lib/i686/libpthread-0.9.so
4003c000-40040000 rw-p 0000c000 08:03 1310733    /lib/i686/libpthread-0.9.so
40060000-40063000 r-xp 00000000 08:03 147475     /lib/libdl-2.2.4.so
40063000-40064000 rw-p 00002000 08:03 147475     /lib/libdl-2.2.4.so
40064000-40197000 r-xp 00000000 08:03 1310729    /lib/i686/libc-2.2.4.so
40197000-4019c000 rw-p 00132000 08:03 1310729    /lib/i686/libc-2.2.4.so
401a0000-4059c000 r-xp 00000000 00:19 1959869    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/client/libjvm.so
4059c000-405b7000 rw-p 003fb000 00:19 1959869    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/client/libjvm.so
405c9000-405dc000 r-xp 00000000 08:03 147480     /lib/libnsl-2.2.4.so
405dc000-405dd000 rw-p 00012000 08:03 147480     /lib/libnsl-2.2.4.so
405df000-40601000 r-xp 00000000 08:03 1310731    /lib/i686/libm-2.2.4.so
40601000-40602000 rw-p 00021000 08:03 1310731    /lib/i686/libm-2.2.4.so
40602000-40606000 rw-s 00000000 08:03 885449     /tmp/hsperfdata_svbld/16106
40606000-40616000 r-xp 00000000 00:19 1959874    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/libverify.so
40616000-40618000 rw-p 0000f000 00:19 1959874    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/libverify.so
40619000-40623000 r-xp 00000000 08:03 147504     /lib/libnss_nisplus-2.2.4.so
40623000-40624000 rw-p 00009000 08:03 147504     /lib/libnss_nisplus-2.2.4.so
40624000-4062e000 r-xp 00000000 08:03 147501     /lib/libnss_nis-2.2.4.so
4062e000-4062f000 rw-p 00009000 08:03 147501     /lib/libnss_nis-2.2.4.so
4062f000-4064f000 r-xp 00000000 00:19 1959875    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/libjava.so
4064f000-40651000 rw-p 0001f000 00:19 1959875    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/libjava.so
40651000-40665000 r-xp 00000000 00:19 1959877    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/libzip.so
40665000-40668000 rw-p 00013000 00:19 1959877    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/libzip.so
40668000-4200c000 r--s 00000000 00:19 1960404    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/rt.jar
42056000-4206c000 r--s 00000000 00:19 1959904    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/sunrsasign.jar
4206c000-42149000 r--s 00000000 00:19 1959912    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/jsse.jar
42149000-4215a000 r--s 00000000 00:19 1959905    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/jce.jar
4215a000-426b3000 r--s 00000000 00:19 1960400    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/charsets.jar
4475b000-4475f000 r-xp 00000000 00:18 1440252    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/nsprpub/Linux2.4_x86_glibc_PTH_DBG.OBJ/lib/libc/src/libplc4.so
4475f000-44760000 rw-p 00003000 00:18 1440252    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/nsprpub/Linux2.4_x86_glibc_PTH_DBG.OBJ/lib/libc/src/libplc4.so
4cb67000-4cb83000 r--s 00000000 00:19 1959900    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/ext/sunjce_provider.jar
4cb83000-4cc3f000 r--s 00000000 00:19 1959902    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/ext/localedata.jar
4cc3f000-4cc4c000 r--s 00000000 00:19 1959903    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/ext/ldapsec.jar
4cc4c000-4cd0a000 r--s 00000000 00:18 1426409    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/dist/release/no-policy/classes_DBG/jss4_dbg.jar
4cd0a000-4cd3c000 r-xp 00000000 00:18 1451747    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/jss/lib/Linux2.4_x86_glibc_PTH_DBG.OBJ/libjss4.so
4cd3c000-4cd3f000 rw-p 00031000 00:18 1451747    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/jss/lib/Linux2.4_x86_glibc_PTH_DBG.OBJ/libjss4.so
4cd3f000-4cde7000 r-xp 00000000 00:18 1448522    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/nss/Linux2.4_x86_glibc_PTH_DBG.OBJ/libnss3.so
4cde7000-4cdee000 rw-p 000a7000 00:18 1448522    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/nss/Linux2.4_x86_glibc_PTH_DBG.OBJ/libnss3.so
4cdef000-4ce1d000 r-xp 00000000 00:18 1449074    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/smime/Linux2.4_x86_glibc_PTH_DBG.OBJ/libsmime3.so
4ce1d000-4ce20000 rw-p 0002d000 00:18 1449074    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/smime/Linux2.4_x86_glibc_PTH_DBG.OBJ/libsmime3.so
4ce20000-4ce5d000 r-xp 00000000 00:18 1448789    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/ssl/Linux2.4_x86_glibc_PTH_DBG.OBJ/libssl3.so
4ce5d000-4ce5f000 rw-p 0003c000 00:18 1448789    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/ssl/Linux2.4_x86_glibc_PTH_DBG.OBJ/libssl3.so
4ce5f000-4ce62000 r-xp 00000000 00:18 1440192    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/nsprpub/Linux2.4_x86_glibc_PTH_DBG.OBJ/lib/ds/libplds4.so
4ce62000-4ce63000 rw-p 00002000 00:18 1440192    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/nsprpub/Linux2.4_x86_glibc_PTH_DBG.OBJ/lib/ds/libplds4.so
4ce63000-4cea4000 r-xp 00000000 00:18 1440157    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/nsprpub/Linux2.4_x86_glibc_PTH_DBG.OBJ/pr/src/libnspr4.so
4cea4000-4cea6000 rw-p 00040000 00:18 1440157    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/nsprpub/Linux2.4_x86_glibc_PTH_DBG.OBJ/pr/src/libnspr4.so
4cea8000-4cf15000 r-xp 00000000 00:18 1447997    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/softoken/Linux2.4_x86_glibc_PTH_DBG.OBJ/libsoftokn3.so
4cf15000-4cf1a000 rw-p 0006c000 00:18 1447997    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/softoken/Linux2.4_x86_glibc_PTH_DBG.OBJ/libsoftokn3.so
4cf1a000-4cf72000 r-xp 00000000 00:18 1447789    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/freebl/Linux2.4_x86_glibc_PTH_DBG.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so
4cf72000-4cf74000 rw-p 00057000 00:18 1447789    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/freebl/Linux2.4_x86_glibc_PTH_DBG.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so
4cf74000-4cfb4000 r-xp 00000000 00:18 1515621    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/jss/org/mozilla/jss/tests/Linux2.4_x86_glibc_PTH_DBG.OBJ/libnssckbi.so
4cfb4000-4cfbc000 rw-p 0003f000 00:18 1515621    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/jss/org/mozilla/jss/tests/Linux2.4_x86_glibc_PTH_DBG.OBJ/libnssckbi.so

Heap at VM Abort:
Heap
 def new generation   total 576K, used 149K [0x44760000, 0x44800000, 0x44c40000)
  eden space 512K,  16% used [0x44760000, 0x447755e8, 0x447e0000)
  from space 64K, 100% used [0x447e0000, 0x447f0000, 0x447f0000)
  to   space 64K,   0% used [0x447f0000, 0x447f0000, 0x44800000)
 tenured generation   total 1408K, used 1136K [0x44c40000, 0x44da0000, 0x48760000)
   the space 1408K,  80% used [0x44c40000, 0x44d5c2c0, 0x44d5c400, 0x44da0000)
 compacting perm gen  total 4096K, used 1948K [0x48760000, 0x48b60000, 0x4c760000)
   the space 4096K,  47% used [0x48760000, 0x48947028, 0x48947200, 0x48b60000)

Local Time = Wed May 10 07:40:09 2006
Elapsed Time = 0
#
# The exception above was detected in native code outside the VM
#
# Java VM: Java HotSpot(TM) Client VM (1.4.2_05-b04 mixed mode)
#
# An error report file has been saved as hs_err_pid16106.log.
# Please refer to the file for further information.
#
JSSTEST_CASE 2 (List CA certs): PASS
============= test sockets
main: jss library loaded
Exception in thread "main" org.mozilla.jss.pkcs11.PK11Token$NotInitializedException
	at org.mozilla.jss.pkcs11.PK11Token.nativeLogin(Native Method)
	at org.mozilla.jss.pkcs11.PK11Token.login(PK11Token.java:178)
	at org.mozilla.jss.tests.SSLClientAuth.doIt(SSLClientAuth.java:126)
	at org.mozilla.jss.tests.SSLClientAuth.main(SSLClientAuth.java:104)
SSLClientAuth returned 1
JSSTEST_CASE 3 (Sockets): FAIL
============= test sockets using bypass 
main: jss library loaded
Exception in thread "main" org.mozilla.jss.pkcs11.PK11Token$NotInitializedException
	at org.mozilla.jss.pkcs11.PK11Token.nativeLogin(Native Method)
	at org.mozilla.jss.pkcs11.PK11Token.login(PK11Token.java:178)
	at org.mozilla.jss.tests.SSLClientAuth.doIt(SSLClientAuth.java:126)
	at org.mozilla.jss.tests.SSLClientAuth.main(SSLClientAuth.java:104)
SSLClientAuth using bypass mode returned 1
JSSTEST_CASE 4 (SSLClientAuth using bypass): FAIL
============= test key gen
main: jss library loaded
The following tokens support RSA keygen:
	Internal Crypto Services Token
	Internal Key Storage Token
The following tokens support DSA keygen:
	Internal Crypto Services Token
	Internal Key Storage Token
Generating 512-bit RSA KeyPair!
Generating 1024-bit RSA KeyPair!
Generating 512-bit RSA KeyPair with public exponent=3!
Generating 512-bit DSA KeyPair!
Generating 1024-bit DSA KeyPair with PQG params!
org.mozilla.jss.crypto.TokenRuntimeException: unable to login to token
	at org.mozilla.jss.provider.java.security.JSSKeyPairGeneratorSpi.generateKeyPair(JSSKeyPairGeneratorSpi.java:85)
	at java.security.KeyPairGenerator$Delegate.generateKeyPair(KeyPairGenerator.java:475)
	at java.security.KeyPairGenerator.genKeyPair(KeyPairGenerator.java:400)
	at org.mozilla.jss.tests.TestKeyGen.main(TestKeyGen.java:216)
TestKeyGen returned 1
JSSTEST_CASE 5 (Key generation): FAIL
============= test KeyFactory
main: jss library loaded
org.mozilla.jss.pkcs11.PK11Token$NotInitializedException
	at org.mozilla.jss.pkcs11.PK11Token.nativeLogin(Native Method)
	at org.mozilla.jss.pkcs11.PK11Token.login(PK11Token.java:178)
	at org.mozilla.jss.tests.KeyFactoryTest.main(KeyFactoryTest.java:104)
KeyFactoryTest returned 1
JSSTEST_CASE 6 (KeyFactoryTest): FAIL

Appeared during nightly testing securityjes5 20060510.1 on
Linux2.4_x86_glibc_PTH_DBG architecture.

Comment 11

12 years ago
============= test Secret Decoder Ring
***FilePasswordCallback returns netscape
Successfully generated key
Successfully looked up key
Successfully deleted key
Good: deleted key not found
Exception in thread "main" org.mozilla.jss.crypto.TokenException: Failed to generate token symmetric key: (-8192) An I/O error occurred during security authorization.
	at org.mozilla.jss.SecretDecoderRing.KeyManager.generateKeyNative(Native Method)
	at org.mozilla.jss.SecretDecoderRing.KeyManager.generateKey(KeyManager.java:108)
	at org.mozilla.jss.tests.TestSDR.main(TestSDR.java:90)
TestSDR returned 1
JSSTEST_CASE 10 (Secret Decoder Ring): FAIL
============= Generate known cert pair for testing

An unexpected exception has been detected in native code outside the VM.
Unexpected Signal : 7 occurred at PC=0x4001186D
Function=(null)+0x4001186D
Library=/lib/ld-linux.so.2

NOTE: We are unable to locate the function name symbol for the error
      just occurred. Please refer to release documentation for possible
      reason and solutions.


Current Java thread:
	at org.mozilla.jss.CryptoManager.initializeAllNative2(Native Method)
	at org.mozilla.jss.CryptoManager.initialize(CryptoManager.java:832)
	- locked <0x48929ba0> (a java.lang.Class)
	at org.mozilla.jss.CryptoManager.initialize(CryptoManager.java:798)
	- locked <0x48929ba0> (a java.lang.Class)
	at org.mozilla.jss.tests.GenerateTestCert.doIt(GenerateTestCert.java:98)
	at org.mozilla.jss.tests.GenerateTestCert.main(GenerateTestCert.java:77)

Dynamic libraries:
08048000-08056000 r-xp 00000000 00:19 1959846    /share/builds/components/jdk/1.4.2_05/Linux/jre/bin/java
08056000-08059000 rw-p 0000d000 00:19 1959846    /share/builds/components/jdk/1.4.2_05/Linux/jre/bin/java
40000000-40016000 r-xp 00000000 08:03 147462     /lib/ld-2.2.4.so
40016000-40017000 rw-p 00015000 08:03 147462     /lib/ld-2.2.4.so
40018000-40020000 r-xp 00000000 00:19 1959863    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/native_threads/libhpi.so
40020000-40021000 rw-p 00007000 00:19 1959863    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/native_threads/libhpi.so
40021000-4002b000 r-xp 00000000 08:03 147496     /lib/libnss_files-2.2.4.so
4002b000-4002c000 rw-p 00009000 08:03 147496     /lib/libnss_files-2.2.4.so
4002c000-4002f000 r--s 00000000 00:19 1959901    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/ext/dnsns.jar
4002f000-4003c000 r-xp 00000000 08:03 1310733    /lib/i686/libpthread-0.9.so
4003c000-40040000 rw-p 0000c000 08:03 1310733    /lib/i686/libpthread-0.9.so
40060000-40063000 r-xp 00000000 08:03 147475     /lib/libdl-2.2.4.so
40063000-40064000 rw-p 00002000 08:03 147475     /lib/libdl-2.2.4.so
40064000-40197000 r-xp 00000000 08:03 1310729    /lib/i686/libc-2.2.4.so
40197000-4019c000 rw-p 00132000 08:03 1310729    /lib/i686/libc-2.2.4.so
401a0000-4059c000 r-xp 00000000 00:19 1959869    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/client/libjvm.so
4059c000-405b7000 rw-p 003fb000 00:19 1959869    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/client/libjvm.so
405c9000-405dc000 r-xp 00000000 08:03 147480     /lib/libnsl-2.2.4.so
405dc000-405dd000 rw-p 00012000 08:03 147480     /lib/libnsl-2.2.4.so
405df000-40601000 r-xp 00000000 08:03 1310731    /lib/i686/libm-2.2.4.so
40601000-40602000 rw-p 00021000 08:03 1310731    /lib/i686/libm-2.2.4.so
40602000-40606000 rw-s 00000000 08:03 885449     /tmp/hsperfdata_svbld/16542
40606000-40616000 r-xp 00000000 00:19 1959874    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/libverify.so
40616000-40618000 rw-p 0000f000 00:19 1959874    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/libverify.so
40619000-40623000 r-xp 00000000 08:03 147504     /lib/libnss_nisplus-2.2.4.so
40623000-40624000 rw-p 00009000 08:03 147504     /lib/libnss_nisplus-2.2.4.so
40624000-4062e000 r-xp 00000000 08:03 147501     /lib/libnss_nis-2.2.4.so
4062e000-4062f000 rw-p 00009000 08:03 147501     /lib/libnss_nis-2.2.4.so
4062f000-4064f000 r-xp 00000000 00:19 1959875    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/libjava.so
4064f000-40651000 rw-p 0001f000 00:19 1959875    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/libjava.so
40651000-40665000 r-xp 00000000 00:19 1959877    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/libzip.so
40665000-40668000 rw-p 00013000 00:19 1959877    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/libzip.so
40668000-4200c000 r--s 00000000 00:19 1960404    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/rt.jar
42056000-4206c000 r--s 00000000 00:19 1959904    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/sunrsasign.jar
4206c000-42149000 r--s 00000000 00:19 1959912    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/jsse.jar
42149000-4215a000 r--s 00000000 00:19 1959905    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/jce.jar
4215a000-426b3000 r--s 00000000 00:19 1960400    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/charsets.jar
4475b000-4475f000 r-xp 00000000 00:18 1452528    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/nsprpub/Linux2.4_x86_glibc_PTH_OPT.OBJ/lib/libc/src/libplc4.so
4475f000-44760000 rw-p 00003000 00:18 1452528    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/nsprpub/Linux2.4_x86_glibc_PTH_OPT.OBJ/lib/libc/src/libplc4.so
4cb67000-4cb83000 r--s 00000000 00:19 1959900    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/ext/sunjce_provider.jar
4cb83000-4cc3f000 r--s 00000000 00:19 1959902    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/ext/localedata.jar
4cc3f000-4cc4c000 r--s 00000000 00:19 1959903    /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/ext/ldapsec.jar
4cc4c000-4ccf7000 r--s 00000000 00:18 1426034    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/dist/release/no-policy/classes/jss4.jar
4ccf7000-4cd1a000 r-xp 00000000 00:18 1458212    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/jss/lib/Linux2.4_x86_glibc_PTH_OPT.OBJ/libjss4.so
4cd1a000-4cd1d000 rw-p 00022000 00:18 1458212    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/jss/lib/Linux2.4_x86_glibc_PTH_OPT.OBJ/libjss4.so
4cd1d000-4cd86000 r-xp 00000000 00:18 1455512    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/nss/Linux2.4_x86_glibc_PTH_OPT.OBJ/libnss3.so
4cd86000-4cd8d000 rw-p 00068000 00:18 1455512    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/nss/Linux2.4_x86_glibc_PTH_OPT.OBJ/libnss3.so
4cd8d000-4cdae000 r-xp 00000000 00:18 1455963    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/smime/Linux2.4_x86_glibc_PTH_OPT.OBJ/libsmime3.so
4cdae000-4cdb1000 rw-p 00020000 00:18 1455963    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/smime/Linux2.4_x86_glibc_PTH_OPT.OBJ/libsmime3.so
4cdb1000-4cdd6000 r-xp 00000000 00:18 1455736    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/ssl/Linux2.4_x86_glibc_PTH_OPT.OBJ/libssl3.so
4cdd6000-4cdd8000 rw-p 00024000 00:18 1455736    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/ssl/Linux2.4_x86_glibc_PTH_OPT.OBJ/libssl3.so
4cdd9000-4cddb000 r-xp 00000000 00:18 1452476    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/nsprpub/Linux2.4_x86_glibc_PTH_OPT.OBJ/lib/ds/libplds4.so
4cddb000-4cddc000 rw-p 00001000 00:18 1452476    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/nsprpub/Linux2.4_x86_glibc_PTH_OPT.OBJ/lib/ds/libplds4.so
4cddc000-4ce09000 r-xp 00000000 00:18 1452460    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/nsprpub/Linux2.4_x86_glibc_PTH_OPT.OBJ/pr/src/libnspr4.so
4ce09000-4ce0b000 rw-p 0002c000 00:18 1452460    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/nsprpub/Linux2.4_x86_glibc_PTH_OPT.OBJ/pr/src/libnspr4.so
4ce0d000-4ce5c000 r-xp 00000000 00:18 1454870    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/softoken/Linux2.4_x86_glibc_PTH_OPT.OBJ/libsoftokn3.so
4ce5c000-4ce62000 rw-p 0004e000 00:18 1454870    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/softoken/Linux2.4_x86_glibc_PTH_OPT.OBJ/libsoftokn3.so
4ce62000-4cea4000 r-xp 00000000 00:18 1454687    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/freebl/Linux2.4_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so
4cea4000-4cea7000 rw-p 00041000 00:18 1454687    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/freebl/Linux2.4_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so
4cea7000-4ceda000 r-xp 00000000 00:18 1515822    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/jss/org/mozilla/jss/tests/Linux2.4_x86_glibc_PTH_OPT.OBJ/libnssckbi.so
4ceda000-4cee3000 rw-p 00032000 00:18 1515822    /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/jss/org/mozilla/jss/tests/Linux2.4_x86_glibc_PTH_OPT.OBJ/libnssckbi.so

Heap at VM Abort:
Heap
 def new generation   total 576K, used 222K [0x44760000, 0x44800000, 0x44c40000)
  eden space 512K,  31% used [0x44760000, 0x44787b10, 0x447e0000)
  from space 64K, 100% used [0x447e0000, 0x447f0000, 0x447f0000)
  to   space 64K,   0% used [0x447f0000, 0x447f0000, 0x44800000)
 tenured generation   total 1408K, used 1144K [0x44c40000, 0x44da0000, 0x48760000)
   the space 1408K,  81% used [0x44c40000, 0x44d5e3d8, 0x44d5e400, 0x44da0000)
 compacting perm gen  total 4096K, used 1973K [0x48760000, 0x48b60000, 0x4c760000)
   the space 4096K,  48% used [0x48760000, 0x4894d730, 0x4894d800, 0x48b60000)

Local Time = Wed May 10 07:41:24 2006
Elapsed Time = 0
#
# The exception above was detected in native code outside the VM
#
# Java VM: Java HotSpot(TM) Client VM (1.4.2_05-b04 mixed mode)
#
# An error report file has been saved as hs_err_pid16542.log.
# Please refer to the file for further information.
#
============= List cert by certnick
0 certs found with this nickname.
END
JSSTEST_CASE 11 (List cert by certnick): PASS
============= Verify cert by certnick
org.mozilla.jss.crypto.ObjectNotFoundException
	at org.mozilla.jss.CryptoManager.verifyCertNowNative(Native Method)
	at org.mozilla.jss.CryptoManager.isCertValid(CryptoManager.java:1411)
	at org.mozilla.jss.tests.VerifyCert.validateCertInDB(VerifyCert.java:194)
	at org.mozilla.jss.tests.VerifyCert.main(VerifyCert.java:134)
The certificate is not valid.
JSSTEST_CASE 12 (Verify cert by certnick): PASS

Appeared during nightly testing securityjes5 20060510.1 on
Linux2.4_x86_glibc_PTH_OPT architecture.

Comment 12

12 years ago
issue resolved after bug 315445

Status: NEW → RESOLVED
Last Resolved: 12 years ago
Resolution: --- → DUPLICATE
Duplicate of bug: 315445
You need to log in before you can comment on or make changes to this bug.