Closed
Bug 314131
Opened 19 years ago
Closed 17 years ago
periodic token login failures
Categories
(JSS Graveyard :: Library, defect)
Tracking
(Not tracked)
RESOLVED
DUPLICATE
of bug 315445
People
(Reporter: jason.m.reid, Assigned: wtc)
Details
Periodically during the JSS test runs, the tests are unable to login to the token. From 20051027 securitytip biarritz-SunOS5.10_i86pc_OPT ============= test signing Available tokens: token : Internal Crypto Services Token token : Internal Key Storage Token token : Builtin Object Token org.mozilla.jss.crypto.TokenException: unable to login to token at org.mozilla.jss.pkcs11.PK11KeyPairGenerator.generateRSAKeyPair(Native Method) at org.mozilla.jss.pkcs11.PK11KeyPairGenerator.generateKeyPair(PK11KeyPairGenerator.java:183) at org.mozilla.jss.crypto.KeyPairGenerator.genKeyPair(KeyPairGenerator.java:82) at org.mozilla.jss.tests.SigTest.main(SigTest.java:107) SigTest returned 1 JSSTEST_CASE 8 (Signing): FAIL ============= test Mozilla-JSS SigatureSPI JCASigTest Provider 0: Mozilla-JSS Provider 1: SunJSSE Provider 2: SunRsaSign Provider 3: SunJCE Provider 4: SunJGSS org.mozilla.jss.crypto.TokenRuntimeException: unable to login to token at org.mozilla.jss.provider.java.security.JSSKeyPairGeneratorSpi.generateKeyPair(JSSKeyPairGeneratorSpi.java:85) at java.security.KeyPairGenerator$Delegate.generateKeyPair(KeyPairGenerator.java:475) at org.mozilla.jss.tests.JCASigTest.main(JCASigTest.java:123) TestJCASigTest returned 1 JSSTEST_CASE 9 (Mozilla-JSS SigatureSPI JCASigTest): FAIL ============= test Secret Decoder Ring Exception in thread "main" org.mozilla.jss.crypto.TokenException: Failed to login to token: (-8192) An I/O error occurred during security authorization. at org.mozilla.jss.SecretDecoderRing.KeyManager.lookupKeyNative(Native Method) at org.mozilla.jss.SecretDecoderRing.KeyManager.lookupKey(KeyManager.java:220) at org.mozilla.jss.SecretDecoderRing.KeyManager.keyExists(KeyManager.java:201) at org.mozilla.jss.SecretDecoderRing.KeyManager.generateUnusedKeyID(KeyManager.java:191) at org.mozilla.jss.SecretDecoderRing.KeyManager.generateKey(KeyManager.java:107) at org.mozilla.jss.tests.TestSDR.main(TestSDR.java:69) TestSDR returned 1 JSSTEST_CASE 10 (Secret Decoder Ring): FAIL ============= Generate known cert pair for testing org.mozilla.jss.pkcs11.PK11Token$NotInitializedException at org.mozilla.jss.pkcs11.PK11Token.nativeLogin(Native Method) at org.mozilla.jss.pkcs11.PK11Token.login(PK11Token.java:178) at org.mozilla.jss.tests.GenerateTestCert.doIt(GenerateTestCert.java:88) at org.mozilla.jss.tests.GenerateTestCert.main(GenerateTestCert.java:66) Generate known cert pair for testing returned 1 ============= convert PKCS11 cert to PKCS12 format pk12util: find user certs from nickname failed: security library: bad database. Convert PKCS11 to PKCS12 returned 24 ============= Start JSSE server tests ============= Start JSS client tests java.io.FileNotFoundException: ./SunOS5.10_i86pc_OPT.OBJ/keystore.pfx (No such file or directory) at java.io.FileInputStream.open(Native Method) at java.io.FileInputStream.<init>(FileInputStream.java:106) at java.io.FileInputStream.<init>(FileInputStream.java:66) at org.mozilla.jss.tests.JSSE_SSLServer.getServerSocketFactory(JSSE_SSLServer.java:207) at org.mozilla.jss.tests.JSSE_SSLServer.main(JSSE_SSLServer.java:112) ***FilePasswordCallback returns netscape Unable to connect: (-5981) Connection refused by peer. org.mozilla.jss.ssl.SSLSocketException: Unable to connect: (-5981) Connection refused by peer. at org.mozilla.jss.ssl.SSLSocket.socketConnect(Native Method) at org.mozilla.jss.ssl.SSLSocket.<init>(SSLSocket.java:259) at org.mozilla.jss.ssl.SSLSocket.<init>(SSLSocket.java:230) at org.mozilla.jss.tests.JSS_SSLClient.doIt(JSS_SSLClient.java:212) at org.mozilla.jss.tests.JSS_SSLClient.main(JSS_SSLClient.java:419) JSSTEST_CASE 11 (JSSE server / JSS client): PASS Here the login is attempted twice: From 20051027 securitytip mandela-SunOS5.10_i86pc_DBG ============= Setup DB main: jss library loaded org.mozilla.jss.crypto.AlreadyInitializedException at org.mozilla.jss.pkcs11.PK11Token.initPassword(PK11Token.java:258) at org.mozilla.jss.tests.SetupDBs.main(SetupDBs.java:58) SetupDBs returned 1 JSSTEST_CASE 1 (Setup DB): FAIL From 20051027 securitytip mandela-SunOS5.10_i86pc_OPT ============= test sockets Exception in thread "main" org.mozilla.jss.pkcs11.PK11Token$NotInitializedException at org.mozilla.jss.pkcs11.PK11Token.nativeLogin(Native Method) at org.mozilla.jss.pkcs11.PK11Token.login(PK11Token.java:178) at org.mozilla.jss.tests.SSLClientAuth.doIt(SSLClientAuth.java:125) at org.mozilla.jss.tests.SSLClientAuth.main(SSLClientAuth.java:104) SSLClientAuth returned 1 JSSTEST_CASE 3 (Sockets): FAIL ============= test key gen The following tokens support RSA keygen: Internal Crypto Services Token Internal Key Storage Token The following tokens support DSA keygen: Internal Crypto Services Token Internal Key Storage Token org.mozilla.jss.crypto.TokenRuntimeException: unable to login to token at org.mozilla.jss.provider.java.security.JSSKeyPairGeneratorSpi.generateKeyPair(JSSKeyPairGeneratorSpi.java:85) at java.security.KeyPairGenerator$Delegate.generateKeyPair(KeyPairGenerator.java:475) at java.security.KeyPairGenerator.genKeyPair(KeyPairGenerator.java:400) at org.mozilla.jss.tests.TestKeyGen.main(TestKeyGen.java:107) TestKeyGen returned 1 JSSTEST_CASE 4 (Key generation): FAIL ============= test KeyFactory org.mozilla.jss.pkcs11.PK11Token$NotInitializedException at org.mozilla.jss.pkcs11.PK11Token.nativeLogin(Native Method) at org.mozilla.jss.pkcs11.PK11Token.login(PK11Token.java:178) at org.mozilla.jss.tests.KeyFactoryTest.main(KeyFactoryTest.java:94) KeyFactoryTest returned 1 JSSTEST_CASE 5 (KeyFactoryTest): FAIL These could be related the recent change in JSS testing. Previously all test runs were done sequentially. Now all runs are done in parrallel (host parallelism only. Individual hosts run tests sequentially e.g. DBG, OPT, DBG64, then OPT64.)
Reporter | ||
Comment 1•19 years ago
|
||
Same failures were seen on 20051027 security310 charm-HP-UXB.11.11_DBG and mandela-SunOS5.10_i86pc_OPT, and 20051025 security310 chavez-SunOS5.9_i86pc_DBG.
Reporter | ||
Comment 2•19 years ago
|
||
Encounter again on biarritz-SunOS5.10_i86pc_DBG and biarritz-SunOS5.10_i86pc_OPT on securitytip 20051029. Also biarritz-SunOS5.10_i86pc_DBG on security310 20051029 and biarritz-SunOS5.10_i86pc_OPT on security310 20051029.
Reporter | ||
Comment 3•19 years ago
|
||
NFS stale file handles were found on these machines. Could be the problem.
Reporter | ||
Comment 4•19 years ago
|
||
Christophe Ravel discovered that some elements of the JSS test script were not parallel safe. Specifically files were being copied into locations that were already in use.
Reporter | ||
Comment 5•19 years ago
|
||
Encountered these login problems: 20051106 securitytip mandela OPT 20051107 securitytip mandela OPT
Comment 6•18 years ago
|
||
More similar failures are seen on a regular basis in JSS nightly QA. These seem to occur at different tests randomly. As Jason mentioned, these could be the result of running JSS tests from a single NFS location and a previous platform has not yet released the tokens? [1] nssamdrhel3: RehHat Linux AS 3.x ============= test Secret Decoder Ring main: jss library loaded Exception in thread "main" org.mozilla.jss.crypto.TokenException: Failed to login to token: (-8177) The security password entered is incorrect. at org.mozilla.jss.SecretDecoderRing.KeyManager.lookupKeyNative(Native Method) at org.mozilla.jss.SecretDecoderRing.KeyManager.lookupKey(KeyManager.java:220) at org.mozilla.jss.SecretDecoderRing.KeyManager.keyExists(KeyManager.java:201) at org.mozilla.jss.SecretDecoderRing.KeyManager.generateUnusedKeyID(KeyManager.java:191) at org.mozilla.jss.SecretDecoderRing.KeyManager.generateKey(KeyManager.java:107) at org.mozilla.jss.tests.TestSDR.main(TestSDR.java:69) TestSDR returned 1 JSSTEST_CASE 10 (Secret Decoder Ring): FAIL [2] workout: RedHat Linux ============= test Mozilla-JSS SigatureSPI JCASigTest Provider 0: Mozilla-JSS Provider 1: SunJSSE Provider 2: SunRsaSign Provider 3: SunJCE Provider 4: SunJGSS org.mozilla.jss.crypto.TokenRuntimeException: unable to login to token at org.mozilla.jss.provider.java.security.JSSKeyPairGeneratorSpi.generateKeyPair(JSSKeyPairGeneratorSpi.java:85) at java.security.KeyPairGenerator$Delegate.generateKeyPair(KeyPairGenerator.java:475) at org.mozilla.jss.tests.JCASigTest.main(JCASigTest.java:123) TestJCASigTest returned 1 JSSTEST_CASE 9 (Mozilla-JSS SigatureSPI JCASigTest): FAIL
Comment 7•18 years ago
|
||
nssamdrhel3 Linux2.4_x86_glibc_PTH_DBG - nightly test 20060411 ============= test key gen main: jss library loaded The following tokens support RSA keygen: NSS Internal FIPS-140-1 Cryptogr The following tokens support DSA keygen: NSS Internal FIPS-140-1 Cryptogr Generating 512-bit RSA KeyPair! Generating 1024-bit RSA KeyPair! Generating 512-bit RSA KeyPair with public exponent=3! Generating 512-bit DSA KeyPair! Generating 1024-bit DSA KeyPair with PQG params! org.mozilla.jss.crypto.TokenRuntimeException: unable to login to token at org.mozilla.jss.provider.java.security.JSSKeyPairGeneratorSpi.generateKeyPair(JSSKeyPairGeneratorSpi.java:85) at java.security.KeyPairGenerator$Delegate.generateKeyPair(KeyPairGenerator.java:475) at java.security.KeyPairGenerator.genKeyPair(KeyPairGenerator.java:400) at org.mozilla.jss.tests.TestKeyGen.main(TestKeyGen.java:216) TestKeyGen returned 1 JSSTEST_CASE 5 (Key generation): FAIL ============= test KeyFactory main: jss library loaded org.mozilla.jss.util.IncorrectPasswordException at org.mozilla.jss.pkcs11.PK11Token.nativeLogin(Native Method) at org.mozilla.jss.pkcs11.PK11Token.login(PK11Token.java:178) at org.mozilla.jss.tests.KeyFactoryTest.main(KeyFactoryTest.java:104) KeyFactoryTest returned 1 JSSTEST_CASE 6 (KeyFactoryTest): FAIL ============= test HMAC 39 bytes to be digested main: jss library loaded Provider 0: Mozilla-JSS Provider 1: SUN Provider 2: SunJSSE Provider 3: SunRsaSign Provider 4: SunJCE Provider 5: SunJGSS Enter password for NSS Internal FIPS-140-1 Cryptogr Enter password for NSS Internal FIPS-140-1 Cryptogr Exception in thread "main" java.lang.ExceptionInInitializerError at javax.crypto.SecretKeyFactory.getInstance(DashoA6275) at org.mozilla.jss.tests.HMACTest.main(HMACTest.java:140) Caused by: java.lang.SecurityException: Cannot set up certs for trusted CAs at javax.crypto.SunJCE_b.<clinit>(DashoA6275) ... 2 more Caused by: java.lang.SecurityException: Signature classes have been tampered with at javax.crypto.SunJCE_b.c(DashoA6275) at javax.crypto.SunJCE_b.b(DashoA6275) at javax.crypto.SunJCE_s.run(DashoA6275) at java.security.AccessController.doPrivileged(Native Method) ... 3 more HMACTest returned 1 JSSTEST_CASE 8 (HMACTest): FAIL ============= test Mozilla-JSS SigatureSPI JCASigTest main: jss library loaded Provider 0: Mozilla-JSS Provider 1: SunJSSE Provider 2: SunRsaSign Provider 3: SunJCE Provider 4: SunJGSS org.mozilla.jss.crypto.TokenRuntimeException: unable to login to token at org.mozilla.jss.provider.java.security.JSSKeyPairGeneratorSpi.generateKeyPair(JSSKeyPairGeneratorSpi.java:85) at java.security.KeyPairGenerator$Delegate.generateKeyPair(KeyPairGenerator.java:475) at org.mozilla.jss.tests.JCASigTest.main(JCASigTest.java:123) TestJCASigTest returned 1 JSSTEST_CASE 9 (Mozilla-JSS SigatureSPI JCASigTest): FAIL
Comment 8•18 years ago
|
||
============= test sockets Exception in thread "main" org.mozilla.jss.pkcs11.PK11Token$NotInitializedException at org.mozilla.jss.pkcs11.PK11Token.nativeLogin(Native Method) at org.mozilla.jss.pkcs11.PK11Token.login(PK11Token.java:178) at org.mozilla.jss.tests.SSLClientAuth.doIt(SSLClientAuth.java:126) at org.mozilla.jss.tests.SSLClientAuth.main(SSLClientAuth.java:104) SSLClientAuth returned 1 JSSTEST_CASE 3 (Sockets): FAIL ============= test sockets using bypass Exception in thread "main" org.mozilla.jss.pkcs11.PK11Token$NotInitializedException at org.mozilla.jss.pkcs11.PK11Token.nativeLogin(Native Method) at org.mozilla.jss.pkcs11.PK11Token.login(PK11Token.java:178) at org.mozilla.jss.tests.SSLClientAuth.doIt(SSLClientAuth.java:126) at org.mozilla.jss.tests.SSLClientAuth.main(SSLClientAuth.java:104) SSLClientAuth using bypass mode returned 1 JSSTEST_CASE 4 (SSLClientAuth using bypass): FAIL ============= test key gen The following tokens support RSA keygen: Internal Crypto Services Token Internal Key Storage Token The following tokens support DSA keygen: Internal Crypto Services Token Internal Key Storage Token Generating 512-bit RSA KeyPair! Generating 1024-bit RSA KeyPair! Generating 512-bit RSA KeyPair with public exponent=3! Generating 512-bit DSA KeyPair! Generating 1024-bit DSA KeyPair with PQG params! org.mozilla.jss.crypto.TokenRuntimeException: unable to login to token at org.mozilla.jss.provider.java.security.JSSKeyPairGeneratorSpi.generateKeyPair(JSSKeyPairGeneratorSpi.java:85) at java.security.KeyPairGenerator$Delegate.generateKeyPair(KeyPairGenerator.java:632) at java.security.KeyPairGenerator.genKeyPair(KeyPairGenerator.java:410) at org.mozilla.jss.tests.TestKeyGen.main(TestKeyGen.java:216) TestKeyGen returned 1 JSSTEST_CASE 5 (Key generation): FAIL Appeared during nightly testing securityjes5 20060508.1 on Linux2.4_x86_glibc_PTH_OPT architecture.
Comment 9•18 years ago
|
||
============= test sockets Exception in thread "main" org.mozilla.jss.pkcs11.PK11Token$NotInitializedException at org.mozilla.jss.pkcs11.PK11Token.nativeLogin(Native Method) at org.mozilla.jss.pkcs11.PK11Token.login(PK11Token.java:178) at org.mozilla.jss.tests.SSLClientAuth.doIt(SSLClientAuth.java:126) at org.mozilla.jss.tests.SSLClientAuth.main(SSLClientAuth.java:104) SSLClientAuth returned 1 JSSTEST_CASE 3 (Sockets): FAIL ============= test sockets using bypass Exception in thread "main" org.mozilla.jss.pkcs11.PK11Token$NotInitializedException at org.mozilla.jss.pkcs11.PK11Token.nativeLogin(Native Method) at org.mozilla.jss.pkcs11.PK11Token.login(PK11Token.java:178) at org.mozilla.jss.tests.SSLClientAuth.doIt(SSLClientAuth.java:126) at org.mozilla.jss.tests.SSLClientAuth.main(SSLClientAuth.java:104) SSLClientAuth using bypass mode returned 1 JSSTEST_CASE 4 (SSLClientAuth using bypass): FAIL Appeared during nightly testing securityjes5 20060509.1 on Linux2.4_x86_glibc_PTH_OPT architecture.
Comment 10•18 years ago
|
||
============= Setup DB main: jss library loaded ***FilePasswordCallback returns netscape org.mozilla.jss.util.IncorrectPasswordException: Incorrect security officer PIN at org.mozilla.jss.pkcs11.PK11Token.initPassword(Native Method) at org.mozilla.jss.pkcs11.PK11Token.initPassword(PK11Token.java:278) at org.mozilla.jss.tests.SetupDBs.main(SetupDBs.java:58) SetupDBs returned 1 JSSTEST_CASE 1 (Setup DB): FAIL ============= List CA certs main: jss library loaded An unexpected exception has been detected in native code outside the VM. Unexpected Signal : 7 occurred at PC=0x4001186D Function=(null)+0x4001186D Library=/lib/ld-linux.so.2 NOTE: We are unable to locate the function name symbol for the error just occurred. Please refer to release documentation for possible reason and solutions. Current Java thread: at org.mozilla.jss.CryptoManager.initializeAllNative2(Native Method) at org.mozilla.jss.CryptoManager.initialize(CryptoManager.java:832) - locked <0x48928750> (a java.lang.Class) at org.mozilla.jss.CryptoManager.initialize(CryptoManager.java:798) - locked <0x48928750> (a java.lang.Class) at org.mozilla.jss.tests.ListCACerts.main(ListCACerts.java:15) Dynamic libraries: 08048000-08056000 r-xp 00000000 00:19 1959846 /share/builds/components/jdk/1.4.2_05/Linux/jre/bin/java 08056000-08059000 rw-p 0000d000 00:19 1959846 /share/builds/components/jdk/1.4.2_05/Linux/jre/bin/java 40000000-40016000 r-xp 00000000 08:03 147462 /lib/ld-2.2.4.so 40016000-40017000 rw-p 00015000 08:03 147462 /lib/ld-2.2.4.so 40018000-40020000 r-xp 00000000 00:19 1959863 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/native_threads/libhpi.so 40020000-40021000 rw-p 00007000 00:19 1959863 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/native_threads/libhpi.so 40021000-4002b000 r-xp 00000000 08:03 147496 /lib/libnss_files-2.2.4.so 4002b000-4002c000 rw-p 00009000 08:03 147496 /lib/libnss_files-2.2.4.so 4002c000-4002f000 r--s 00000000 00:19 1959901 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/ext/dnsns.jar 4002f000-4003c000 r-xp 00000000 08:03 1310733 /lib/i686/libpthread-0.9.so 4003c000-40040000 rw-p 0000c000 08:03 1310733 /lib/i686/libpthread-0.9.so 40060000-40063000 r-xp 00000000 08:03 147475 /lib/libdl-2.2.4.so 40063000-40064000 rw-p 00002000 08:03 147475 /lib/libdl-2.2.4.so 40064000-40197000 r-xp 00000000 08:03 1310729 /lib/i686/libc-2.2.4.so 40197000-4019c000 rw-p 00132000 08:03 1310729 /lib/i686/libc-2.2.4.so 401a0000-4059c000 r-xp 00000000 00:19 1959869 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/client/libjvm.so 4059c000-405b7000 rw-p 003fb000 00:19 1959869 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/client/libjvm.so 405c9000-405dc000 r-xp 00000000 08:03 147480 /lib/libnsl-2.2.4.so 405dc000-405dd000 rw-p 00012000 08:03 147480 /lib/libnsl-2.2.4.so 405df000-40601000 r-xp 00000000 08:03 1310731 /lib/i686/libm-2.2.4.so 40601000-40602000 rw-p 00021000 08:03 1310731 /lib/i686/libm-2.2.4.so 40602000-40606000 rw-s 00000000 08:03 885449 /tmp/hsperfdata_svbld/16106 40606000-40616000 r-xp 00000000 00:19 1959874 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/libverify.so 40616000-40618000 rw-p 0000f000 00:19 1959874 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/libverify.so 40619000-40623000 r-xp 00000000 08:03 147504 /lib/libnss_nisplus-2.2.4.so 40623000-40624000 rw-p 00009000 08:03 147504 /lib/libnss_nisplus-2.2.4.so 40624000-4062e000 r-xp 00000000 08:03 147501 /lib/libnss_nis-2.2.4.so 4062e000-4062f000 rw-p 00009000 08:03 147501 /lib/libnss_nis-2.2.4.so 4062f000-4064f000 r-xp 00000000 00:19 1959875 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/libjava.so 4064f000-40651000 rw-p 0001f000 00:19 1959875 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/libjava.so 40651000-40665000 r-xp 00000000 00:19 1959877 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/libzip.so 40665000-40668000 rw-p 00013000 00:19 1959877 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/libzip.so 40668000-4200c000 r--s 00000000 00:19 1960404 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/rt.jar 42056000-4206c000 r--s 00000000 00:19 1959904 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/sunrsasign.jar 4206c000-42149000 r--s 00000000 00:19 1959912 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/jsse.jar 42149000-4215a000 r--s 00000000 00:19 1959905 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/jce.jar 4215a000-426b3000 r--s 00000000 00:19 1960400 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/charsets.jar 4475b000-4475f000 r-xp 00000000 00:18 1440252 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/nsprpub/Linux2.4_x86_glibc_PTH_DBG.OBJ/lib/libc/src/libplc4.so 4475f000-44760000 rw-p 00003000 00:18 1440252 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/nsprpub/Linux2.4_x86_glibc_PTH_DBG.OBJ/lib/libc/src/libplc4.so 4cb67000-4cb83000 r--s 00000000 00:19 1959900 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/ext/sunjce_provider.jar 4cb83000-4cc3f000 r--s 00000000 00:19 1959902 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/ext/localedata.jar 4cc3f000-4cc4c000 r--s 00000000 00:19 1959903 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/ext/ldapsec.jar 4cc4c000-4cd0a000 r--s 00000000 00:18 1426409 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/dist/release/no-policy/classes_DBG/jss4_dbg.jar 4cd0a000-4cd3c000 r-xp 00000000 00:18 1451747 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/jss/lib/Linux2.4_x86_glibc_PTH_DBG.OBJ/libjss4.so 4cd3c000-4cd3f000 rw-p 00031000 00:18 1451747 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/jss/lib/Linux2.4_x86_glibc_PTH_DBG.OBJ/libjss4.so 4cd3f000-4cde7000 r-xp 00000000 00:18 1448522 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/nss/Linux2.4_x86_glibc_PTH_DBG.OBJ/libnss3.so 4cde7000-4cdee000 rw-p 000a7000 00:18 1448522 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/nss/Linux2.4_x86_glibc_PTH_DBG.OBJ/libnss3.so 4cdef000-4ce1d000 r-xp 00000000 00:18 1449074 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/smime/Linux2.4_x86_glibc_PTH_DBG.OBJ/libsmime3.so 4ce1d000-4ce20000 rw-p 0002d000 00:18 1449074 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/smime/Linux2.4_x86_glibc_PTH_DBG.OBJ/libsmime3.so 4ce20000-4ce5d000 r-xp 00000000 00:18 1448789 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/ssl/Linux2.4_x86_glibc_PTH_DBG.OBJ/libssl3.so 4ce5d000-4ce5f000 rw-p 0003c000 00:18 1448789 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/ssl/Linux2.4_x86_glibc_PTH_DBG.OBJ/libssl3.so 4ce5f000-4ce62000 r-xp 00000000 00:18 1440192 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/nsprpub/Linux2.4_x86_glibc_PTH_DBG.OBJ/lib/ds/libplds4.so 4ce62000-4ce63000 rw-p 00002000 00:18 1440192 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/nsprpub/Linux2.4_x86_glibc_PTH_DBG.OBJ/lib/ds/libplds4.so 4ce63000-4cea4000 r-xp 00000000 00:18 1440157 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/nsprpub/Linux2.4_x86_glibc_PTH_DBG.OBJ/pr/src/libnspr4.so 4cea4000-4cea6000 rw-p 00040000 00:18 1440157 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/nsprpub/Linux2.4_x86_glibc_PTH_DBG.OBJ/pr/src/libnspr4.so 4cea8000-4cf15000 r-xp 00000000 00:18 1447997 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/softoken/Linux2.4_x86_glibc_PTH_DBG.OBJ/libsoftokn3.so 4cf15000-4cf1a000 rw-p 0006c000 00:18 1447997 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/softoken/Linux2.4_x86_glibc_PTH_DBG.OBJ/libsoftokn3.so 4cf1a000-4cf72000 r-xp 00000000 00:18 1447789 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/freebl/Linux2.4_x86_glibc_PTH_DBG.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so 4cf72000-4cf74000 rw-p 00057000 00:18 1447789 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/freebl/Linux2.4_x86_glibc_PTH_DBG.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so 4cf74000-4cfb4000 r-xp 00000000 00:18 1515621 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/jss/org/mozilla/jss/tests/Linux2.4_x86_glibc_PTH_DBG.OBJ/libnssckbi.so 4cfb4000-4cfbc000 rw-p 0003f000 00:18 1515621 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/jss/org/mozilla/jss/tests/Linux2.4_x86_glibc_PTH_DBG.OBJ/libnssckbi.so Heap at VM Abort: Heap def new generation total 576K, used 149K [0x44760000, 0x44800000, 0x44c40000) eden space 512K, 16% used [0x44760000, 0x447755e8, 0x447e0000) from space 64K, 100% used [0x447e0000, 0x447f0000, 0x447f0000) to space 64K, 0% used [0x447f0000, 0x447f0000, 0x44800000) tenured generation total 1408K, used 1136K [0x44c40000, 0x44da0000, 0x48760000) the space 1408K, 80% used [0x44c40000, 0x44d5c2c0, 0x44d5c400, 0x44da0000) compacting perm gen total 4096K, used 1948K [0x48760000, 0x48b60000, 0x4c760000) the space 4096K, 47% used [0x48760000, 0x48947028, 0x48947200, 0x48b60000) Local Time = Wed May 10 07:40:09 2006 Elapsed Time = 0 # # The exception above was detected in native code outside the VM # # Java VM: Java HotSpot(TM) Client VM (1.4.2_05-b04 mixed mode) # # An error report file has been saved as hs_err_pid16106.log. # Please refer to the file for further information. # JSSTEST_CASE 2 (List CA certs): PASS ============= test sockets main: jss library loaded Exception in thread "main" org.mozilla.jss.pkcs11.PK11Token$NotInitializedException at org.mozilla.jss.pkcs11.PK11Token.nativeLogin(Native Method) at org.mozilla.jss.pkcs11.PK11Token.login(PK11Token.java:178) at org.mozilla.jss.tests.SSLClientAuth.doIt(SSLClientAuth.java:126) at org.mozilla.jss.tests.SSLClientAuth.main(SSLClientAuth.java:104) SSLClientAuth returned 1 JSSTEST_CASE 3 (Sockets): FAIL ============= test sockets using bypass main: jss library loaded Exception in thread "main" org.mozilla.jss.pkcs11.PK11Token$NotInitializedException at org.mozilla.jss.pkcs11.PK11Token.nativeLogin(Native Method) at org.mozilla.jss.pkcs11.PK11Token.login(PK11Token.java:178) at org.mozilla.jss.tests.SSLClientAuth.doIt(SSLClientAuth.java:126) at org.mozilla.jss.tests.SSLClientAuth.main(SSLClientAuth.java:104) SSLClientAuth using bypass mode returned 1 JSSTEST_CASE 4 (SSLClientAuth using bypass): FAIL ============= test key gen main: jss library loaded The following tokens support RSA keygen: Internal Crypto Services Token Internal Key Storage Token The following tokens support DSA keygen: Internal Crypto Services Token Internal Key Storage Token Generating 512-bit RSA KeyPair! Generating 1024-bit RSA KeyPair! Generating 512-bit RSA KeyPair with public exponent=3! Generating 512-bit DSA KeyPair! Generating 1024-bit DSA KeyPair with PQG params! org.mozilla.jss.crypto.TokenRuntimeException: unable to login to token at org.mozilla.jss.provider.java.security.JSSKeyPairGeneratorSpi.generateKeyPair(JSSKeyPairGeneratorSpi.java:85) at java.security.KeyPairGenerator$Delegate.generateKeyPair(KeyPairGenerator.java:475) at java.security.KeyPairGenerator.genKeyPair(KeyPairGenerator.java:400) at org.mozilla.jss.tests.TestKeyGen.main(TestKeyGen.java:216) TestKeyGen returned 1 JSSTEST_CASE 5 (Key generation): FAIL ============= test KeyFactory main: jss library loaded org.mozilla.jss.pkcs11.PK11Token$NotInitializedException at org.mozilla.jss.pkcs11.PK11Token.nativeLogin(Native Method) at org.mozilla.jss.pkcs11.PK11Token.login(PK11Token.java:178) at org.mozilla.jss.tests.KeyFactoryTest.main(KeyFactoryTest.java:104) KeyFactoryTest returned 1 JSSTEST_CASE 6 (KeyFactoryTest): FAIL Appeared during nightly testing securityjes5 20060510.1 on Linux2.4_x86_glibc_PTH_DBG architecture.
Comment 11•18 years ago
|
||
============= test Secret Decoder Ring ***FilePasswordCallback returns netscape Successfully generated key Successfully looked up key Successfully deleted key Good: deleted key not found Exception in thread "main" org.mozilla.jss.crypto.TokenException: Failed to generate token symmetric key: (-8192) An I/O error occurred during security authorization. at org.mozilla.jss.SecretDecoderRing.KeyManager.generateKeyNative(Native Method) at org.mozilla.jss.SecretDecoderRing.KeyManager.generateKey(KeyManager.java:108) at org.mozilla.jss.tests.TestSDR.main(TestSDR.java:90) TestSDR returned 1 JSSTEST_CASE 10 (Secret Decoder Ring): FAIL ============= Generate known cert pair for testing An unexpected exception has been detected in native code outside the VM. Unexpected Signal : 7 occurred at PC=0x4001186D Function=(null)+0x4001186D Library=/lib/ld-linux.so.2 NOTE: We are unable to locate the function name symbol for the error just occurred. Please refer to release documentation for possible reason and solutions. Current Java thread: at org.mozilla.jss.CryptoManager.initializeAllNative2(Native Method) at org.mozilla.jss.CryptoManager.initialize(CryptoManager.java:832) - locked <0x48929ba0> (a java.lang.Class) at org.mozilla.jss.CryptoManager.initialize(CryptoManager.java:798) - locked <0x48929ba0> (a java.lang.Class) at org.mozilla.jss.tests.GenerateTestCert.doIt(GenerateTestCert.java:98) at org.mozilla.jss.tests.GenerateTestCert.main(GenerateTestCert.java:77) Dynamic libraries: 08048000-08056000 r-xp 00000000 00:19 1959846 /share/builds/components/jdk/1.4.2_05/Linux/jre/bin/java 08056000-08059000 rw-p 0000d000 00:19 1959846 /share/builds/components/jdk/1.4.2_05/Linux/jre/bin/java 40000000-40016000 r-xp 00000000 08:03 147462 /lib/ld-2.2.4.so 40016000-40017000 rw-p 00015000 08:03 147462 /lib/ld-2.2.4.so 40018000-40020000 r-xp 00000000 00:19 1959863 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/native_threads/libhpi.so 40020000-40021000 rw-p 00007000 00:19 1959863 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/native_threads/libhpi.so 40021000-4002b000 r-xp 00000000 08:03 147496 /lib/libnss_files-2.2.4.so 4002b000-4002c000 rw-p 00009000 08:03 147496 /lib/libnss_files-2.2.4.so 4002c000-4002f000 r--s 00000000 00:19 1959901 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/ext/dnsns.jar 4002f000-4003c000 r-xp 00000000 08:03 1310733 /lib/i686/libpthread-0.9.so 4003c000-40040000 rw-p 0000c000 08:03 1310733 /lib/i686/libpthread-0.9.so 40060000-40063000 r-xp 00000000 08:03 147475 /lib/libdl-2.2.4.so 40063000-40064000 rw-p 00002000 08:03 147475 /lib/libdl-2.2.4.so 40064000-40197000 r-xp 00000000 08:03 1310729 /lib/i686/libc-2.2.4.so 40197000-4019c000 rw-p 00132000 08:03 1310729 /lib/i686/libc-2.2.4.so 401a0000-4059c000 r-xp 00000000 00:19 1959869 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/client/libjvm.so 4059c000-405b7000 rw-p 003fb000 00:19 1959869 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/client/libjvm.so 405c9000-405dc000 r-xp 00000000 08:03 147480 /lib/libnsl-2.2.4.so 405dc000-405dd000 rw-p 00012000 08:03 147480 /lib/libnsl-2.2.4.so 405df000-40601000 r-xp 00000000 08:03 1310731 /lib/i686/libm-2.2.4.so 40601000-40602000 rw-p 00021000 08:03 1310731 /lib/i686/libm-2.2.4.so 40602000-40606000 rw-s 00000000 08:03 885449 /tmp/hsperfdata_svbld/16542 40606000-40616000 r-xp 00000000 00:19 1959874 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/libverify.so 40616000-40618000 rw-p 0000f000 00:19 1959874 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/libverify.so 40619000-40623000 r-xp 00000000 08:03 147504 /lib/libnss_nisplus-2.2.4.so 40623000-40624000 rw-p 00009000 08:03 147504 /lib/libnss_nisplus-2.2.4.so 40624000-4062e000 r-xp 00000000 08:03 147501 /lib/libnss_nis-2.2.4.so 4062e000-4062f000 rw-p 00009000 08:03 147501 /lib/libnss_nis-2.2.4.so 4062f000-4064f000 r-xp 00000000 00:19 1959875 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/libjava.so 4064f000-40651000 rw-p 0001f000 00:19 1959875 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/libjava.so 40651000-40665000 r-xp 00000000 00:19 1959877 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/libzip.so 40665000-40668000 rw-p 00013000 00:19 1959877 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/i386/libzip.so 40668000-4200c000 r--s 00000000 00:19 1960404 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/rt.jar 42056000-4206c000 r--s 00000000 00:19 1959904 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/sunrsasign.jar 4206c000-42149000 r--s 00000000 00:19 1959912 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/jsse.jar 42149000-4215a000 r--s 00000000 00:19 1959905 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/jce.jar 4215a000-426b3000 r--s 00000000 00:19 1960400 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/charsets.jar 4475b000-4475f000 r-xp 00000000 00:18 1452528 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/nsprpub/Linux2.4_x86_glibc_PTH_OPT.OBJ/lib/libc/src/libplc4.so 4475f000-44760000 rw-p 00003000 00:18 1452528 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/nsprpub/Linux2.4_x86_glibc_PTH_OPT.OBJ/lib/libc/src/libplc4.so 4cb67000-4cb83000 r--s 00000000 00:19 1959900 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/ext/sunjce_provider.jar 4cb83000-4cc3f000 r--s 00000000 00:19 1959902 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/ext/localedata.jar 4cc3f000-4cc4c000 r--s 00000000 00:19 1959903 /share/builds/components/jdk/1.4.2_05/Linux/jre/lib/ext/ldapsec.jar 4cc4c000-4ccf7000 r--s 00000000 00:18 1426034 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/dist/release/no-policy/classes/jss4.jar 4ccf7000-4cd1a000 r-xp 00000000 00:18 1458212 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/jss/lib/Linux2.4_x86_glibc_PTH_OPT.OBJ/libjss4.so 4cd1a000-4cd1d000 rw-p 00022000 00:18 1458212 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/jss/lib/Linux2.4_x86_glibc_PTH_OPT.OBJ/libjss4.so 4cd1d000-4cd86000 r-xp 00000000 00:18 1455512 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/nss/Linux2.4_x86_glibc_PTH_OPT.OBJ/libnss3.so 4cd86000-4cd8d000 rw-p 00068000 00:18 1455512 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/nss/Linux2.4_x86_glibc_PTH_OPT.OBJ/libnss3.so 4cd8d000-4cdae000 r-xp 00000000 00:18 1455963 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/smime/Linux2.4_x86_glibc_PTH_OPT.OBJ/libsmime3.so 4cdae000-4cdb1000 rw-p 00020000 00:18 1455963 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/smime/Linux2.4_x86_glibc_PTH_OPT.OBJ/libsmime3.so 4cdb1000-4cdd6000 r-xp 00000000 00:18 1455736 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/ssl/Linux2.4_x86_glibc_PTH_OPT.OBJ/libssl3.so 4cdd6000-4cdd8000 rw-p 00024000 00:18 1455736 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/ssl/Linux2.4_x86_glibc_PTH_OPT.OBJ/libssl3.so 4cdd9000-4cddb000 r-xp 00000000 00:18 1452476 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/nsprpub/Linux2.4_x86_glibc_PTH_OPT.OBJ/lib/ds/libplds4.so 4cddb000-4cddc000 rw-p 00001000 00:18 1452476 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/nsprpub/Linux2.4_x86_glibc_PTH_OPT.OBJ/lib/ds/libplds4.so 4cddc000-4ce09000 r-xp 00000000 00:18 1452460 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/nsprpub/Linux2.4_x86_glibc_PTH_OPT.OBJ/pr/src/libnspr4.so 4ce09000-4ce0b000 rw-p 0002c000 00:18 1452460 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/nsprpub/Linux2.4_x86_glibc_PTH_OPT.OBJ/pr/src/libnspr4.so 4ce0d000-4ce5c000 r-xp 00000000 00:18 1454870 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/softoken/Linux2.4_x86_glibc_PTH_OPT.OBJ/libsoftokn3.so 4ce5c000-4ce62000 rw-p 0004e000 00:18 1454870 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/softoken/Linux2.4_x86_glibc_PTH_OPT.OBJ/libsoftokn3.so 4ce62000-4cea4000 r-xp 00000000 00:18 1454687 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/freebl/Linux2.4_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so 4cea4000-4cea7000 rw-p 00041000 00:18 1454687 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/nss/lib/freebl/Linux2.4_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so 4cea7000-4ceda000 r-xp 00000000 00:18 1515822 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/jss/org/mozilla/jss/tests/Linux2.4_x86_glibc_PTH_OPT.OBJ/libnssckbi.so 4ceda000-4cee3000 rw-p 00032000 00:18 1515822 /share/builds/mccrel3/security/securityjes5/builds/20060510.1/wozzeck_Solaris8/mozilla/security/jss/org/mozilla/jss/tests/Linux2.4_x86_glibc_PTH_OPT.OBJ/libnssckbi.so Heap at VM Abort: Heap def new generation total 576K, used 222K [0x44760000, 0x44800000, 0x44c40000) eden space 512K, 31% used [0x44760000, 0x44787b10, 0x447e0000) from space 64K, 100% used [0x447e0000, 0x447f0000, 0x447f0000) to space 64K, 0% used [0x447f0000, 0x447f0000, 0x44800000) tenured generation total 1408K, used 1144K [0x44c40000, 0x44da0000, 0x48760000) the space 1408K, 81% used [0x44c40000, 0x44d5e3d8, 0x44d5e400, 0x44da0000) compacting perm gen total 4096K, used 1973K [0x48760000, 0x48b60000, 0x4c760000) the space 4096K, 48% used [0x48760000, 0x4894d730, 0x4894d800, 0x48b60000) Local Time = Wed May 10 07:41:24 2006 Elapsed Time = 0 # # The exception above was detected in native code outside the VM # # Java VM: Java HotSpot(TM) Client VM (1.4.2_05-b04 mixed mode) # # An error report file has been saved as hs_err_pid16542.log. # Please refer to the file for further information. # ============= List cert by certnick 0 certs found with this nickname. END JSSTEST_CASE 11 (List cert by certnick): PASS ============= Verify cert by certnick org.mozilla.jss.crypto.ObjectNotFoundException at org.mozilla.jss.CryptoManager.verifyCertNowNative(Native Method) at org.mozilla.jss.CryptoManager.isCertValid(CryptoManager.java:1411) at org.mozilla.jss.tests.VerifyCert.validateCertInDB(VerifyCert.java:194) at org.mozilla.jss.tests.VerifyCert.main(VerifyCert.java:134) The certificate is not valid. JSSTEST_CASE 12 (Verify cert by certnick): PASS Appeared during nightly testing securityjes5 20060510.1 on Linux2.4_x86_glibc_PTH_OPT architecture.
Comment 12•17 years ago
|
||
issue resolved after bug 315445
Status: NEW → RESOLVED
Closed: 17 years ago
Resolution: --- → DUPLICATE
You need to log in
before you can comment on or make changes to this bug.
Description
•