diff options
author | kbuilder <kokoro-team@google.com> | 2018-04-06 11:25:17 -0700 |
---|---|---|
committer | kbuilder <kokoro-team@google.com> | 2018-04-06 11:25:17 -0700 |
commit | 0305ca227611e4ab19e3937161a32fffc2d07763 (patch) | |
tree | b810664568999ee81c45b26ac7a463a9c5c98b3f | |
parent | d49718272f175b00405e245c5dded7450de76bda (diff) | |
download | wycheproof-0305ca227611e4ab19e3937161a32fffc2d07763.zip wycheproof-0305ca227611e4ab19e3937161a32fffc2d07763.tar.gz wycheproof-0305ca227611e4ab19e3937161a32fffc2d07763.tar.bz2 |
Testlogs auto-pushed to gh-pages
-rwxr-xr-x | testlogs/ConscryptAllTests_1_0_1.txt | 707 | ||||
-rw-r--r-- | testlogs/index.html | 2 |
2 files changed, 74 insertions, 635 deletions
diff --git a/testlogs/ConscryptAllTests_1_0_1.txt b/testlogs/ConscryptAllTests_1_0_1.txt index 6a7391d..c1c371d 100755 --- a/testlogs/ConscryptAllTests_1_0_1.txt +++ b/testlogs/ConscryptAllTests_1_0_1.txt @@ -175,432 +175,44 @@ Signature.SHA512withECDSA SupportedKeyFormats Signature.SHA512withRSA/PSS Signature.SHA512withRSA/PSS SupportedKeyClasses Signature.SHA512withRSA/PSS SupportedKeyFormats - -Provider:SUN -AlgorithmParameterGenerator.DSA -AlgorithmParameterGenerator.DSA ImplementedIn -AlgorithmParameterGenerator.DSA KeySize -AlgorithmParameters.DSA -AlgorithmParameters.DSA ImplementedIn -CertPathBuilder.PKIX -CertPathBuilder.PKIX ImplementedIn -CertPathBuilder.PKIX ValidationAlgorithm -CertPathValidator.PKIX -CertPathValidator.PKIX ImplementedIn -CertPathValidator.PKIX ValidationAlgorithm -CertStore.Collection -CertStore.Collection ImplementedIn -CertStore.LDAP -CertStore.LDAP ImplementedIn -CertStore.LDAP LDAPSchema -CertStore.com.sun.security.IndexedCollection -CertStore.com.sun.security.IndexedCollection ImplementedIn -CertificateFactory.X.509 -CertificateFactory.X.509 ImplementedIn -Configuration.JavaLoginConfig -KeyFactory.DSA -KeyFactory.DSA ImplementedIn -KeyPairGenerator.DSA -KeyPairGenerator.DSA ImplementedIn -KeyPairGenerator.DSA KeySize -KeyStore.CaseExactJKS -KeyStore.DKS -KeyStore.JKS -KeyStore.JKS ImplementedIn -MessageDigest.MD2 -MessageDigest.MD5 -MessageDigest.MD5 ImplementedIn -MessageDigest.SHA -MessageDigest.SHA ImplementedIn -MessageDigest.SHA-224 -MessageDigest.SHA-256 -MessageDigest.SHA-384 -MessageDigest.SHA-512 -Policy.JavaPolicy -Provider.id className -Provider.id info -Provider.id name -Provider.id version -SecureRandom.NativePRNG -SecureRandom.NativePRNGBlocking -SecureRandom.NativePRNGNonBlocking -SecureRandom.SHA1PRNG -SecureRandom.SHA1PRNG ImplementedIn -Signature.NONEwithDSA -Signature.NONEwithDSA KeySize -Signature.NONEwithDSA SupportedKeyClasses -Signature.SHA1withDSA -Signature.SHA1withDSA ImplementedIn -Signature.SHA1withDSA KeySize -Signature.SHA1withDSA SupportedKeyClasses -Signature.SHA224withDSA -Signature.SHA224withDSA KeySize -Signature.SHA224withDSA SupportedKeyClasses -Signature.SHA256withDSA -Signature.SHA256withDSA KeySize -Signature.SHA256withDSA SupportedKeyClasses - -Provider:SunRsaSign -KeyFactory.RSA -KeyPairGenerator.RSA -Provider.id className -Provider.id info -Provider.id name -Provider.id version -Signature.MD2withRSA -Signature.MD2withRSA SupportedKeyClasses -Signature.MD5withRSA -Signature.MD5withRSA SupportedKeyClasses -Signature.SHA1withRSA -Signature.SHA1withRSA SupportedKeyClasses -Signature.SHA224withRSA -Signature.SHA224withRSA SupportedKeyClasses -Signature.SHA256withRSA -Signature.SHA256withRSA SupportedKeyClasses -Signature.SHA384withRSA -Signature.SHA384withRSA SupportedKeyClasses -Signature.SHA512withRSA -Signature.SHA512withRSA SupportedKeyClasses - -Provider:SunEC -AlgorithmParameters.EC -AlgorithmParameters.EC ImplementedIn -AlgorithmParameters.EC KeySize -AlgorithmParameters.EC SupportedCurves -KeyAgreement.ECDH -KeyAgreement.ECDH ImplementedIn -KeyAgreement.ECDH SupportedKeyClasses -KeyFactory.EC -KeyFactory.EC ImplementedIn -KeyPairGenerator.EC -KeyPairGenerator.EC ImplementedIn -KeyPairGenerator.EC KeySize -Provider.id className -Provider.id info -Provider.id name -Provider.id version -Signature.NONEwithECDSA -Signature.NONEwithECDSA ImplementedIn -Signature.NONEwithECDSA SupportedKeyClasses -Signature.SHA1withECDSA -Signature.SHA1withECDSA ImplementedIn -Signature.SHA1withECDSA KeySize -Signature.SHA1withECDSA SupportedKeyClasses -Signature.SHA224withECDSA -Signature.SHA224withECDSA ImplementedIn -Signature.SHA224withECDSA SupportedKeyClasses -Signature.SHA256withECDSA -Signature.SHA256withECDSA ImplementedIn -Signature.SHA256withECDSA SupportedKeyClasses -Signature.SHA384withECDSA -Signature.SHA384withECDSA ImplementedIn -Signature.SHA384withECDSA SupportedKeyClasses -Signature.SHA512withECDSA -Signature.SHA512withECDSA ImplementedIn -Signature.SHA512withECDSA SupportedKeyClasses - -Provider:SunJSSE -KeyFactory.RSA -KeyManagerFactory.NewSunX509 -KeyManagerFactory.SunX509 -KeyPairGenerator.RSA -KeyStore.PKCS12 -Provider.id className -Provider.id info -Provider.id name -Provider.id version -SSLContext.Default -SSLContext.TLS -SSLContext.TLSv1 -SSLContext.TLSv1.1 -SSLContext.TLSv1.2 -Signature.MD2withRSA -Signature.MD5andSHA1withRSA -Signature.MD5withRSA -Signature.SHA1withRSA -TrustManagerFactory.PKIX -TrustManagerFactory.SunX509 - -Provider:SunJCE -AlgorithmParameterGenerator.DiffieHellman -AlgorithmParameters.AES -AlgorithmParameters.Blowfish -AlgorithmParameters.DES -AlgorithmParameters.DESede -AlgorithmParameters.DiffieHellman -AlgorithmParameters.GCM -AlgorithmParameters.OAEP -AlgorithmParameters.PBE -AlgorithmParameters.PBES2 -AlgorithmParameters.PBEWithHmacSHA1AndAES_128 -AlgorithmParameters.PBEWithHmacSHA1AndAES_256 -AlgorithmParameters.PBEWithHmacSHA224AndAES_128 -AlgorithmParameters.PBEWithHmacSHA224AndAES_256 -AlgorithmParameters.PBEWithHmacSHA256AndAES_128 -AlgorithmParameters.PBEWithHmacSHA256AndAES_256 -AlgorithmParameters.PBEWithHmacSHA384AndAES_128 -AlgorithmParameters.PBEWithHmacSHA384AndAES_256 -AlgorithmParameters.PBEWithHmacSHA512AndAES_128 -AlgorithmParameters.PBEWithHmacSHA512AndAES_256 -AlgorithmParameters.PBEWithMD5AndDES -AlgorithmParameters.PBEWithMD5AndTripleDES -AlgorithmParameters.PBEWithSHA1AndDESede -AlgorithmParameters.PBEWithSHA1AndRC2_128 -AlgorithmParameters.PBEWithSHA1AndRC2_40 -AlgorithmParameters.PBEWithSHA1AndRC4_128 -AlgorithmParameters.PBEWithSHA1AndRC4_40 -AlgorithmParameters.RC2 -Cipher.AES -Cipher.AES SupportedKeyFormats -Cipher.AES SupportedModes -Cipher.AES SupportedPaddings -Cipher.AESWrap -Cipher.AESWrap SupportedKeyFormats -Cipher.AESWrap SupportedModes -Cipher.AESWrap SupportedPaddings -Cipher.AESWrap_128 -Cipher.AESWrap_192 -Cipher.AESWrap_256 -Cipher.AES_128/CBC/NoPadding -Cipher.AES_128/CFB/NoPadding -Cipher.AES_128/ECB/NoPadding -Cipher.AES_128/GCM/NoPadding -Cipher.AES_128/OFB/NoPadding -Cipher.AES_192/CBC/NoPadding -Cipher.AES_192/CFB/NoPadding -Cipher.AES_192/ECB/NoPadding -Cipher.AES_192/GCM/NoPadding -Cipher.AES_192/OFB/NoPadding -Cipher.AES_256/CBC/NoPadding -Cipher.AES_256/CFB/NoPadding -Cipher.AES_256/ECB/NoPadding -Cipher.AES_256/GCM/NoPadding -Cipher.AES_256/OFB/NoPadding -Cipher.ARCFOUR -Cipher.ARCFOUR SupportedKeyFormats -Cipher.ARCFOUR SupportedModes -Cipher.ARCFOUR SupportedPaddings -Cipher.Blowfish -Cipher.Blowfish SupportedKeyFormats -Cipher.Blowfish SupportedModes -Cipher.Blowfish SupportedPaddings -Cipher.DES -Cipher.DES SupportedKeyFormats -Cipher.DES SupportedModes -Cipher.DES SupportedPaddings -Cipher.DESede -Cipher.DESede SupportedKeyFormats -Cipher.DESede SupportedModes -Cipher.DESede SupportedPaddings -Cipher.DESedeWrap -Cipher.DESedeWrap SupportedKeyFormats -Cipher.DESedeWrap SupportedModes -Cipher.DESedeWrap SupportedPaddings -Cipher.PBEWithHmacSHA1AndAES_128 -Cipher.PBEWithHmacSHA1AndAES_256 -Cipher.PBEWithHmacSHA224AndAES_128 -Cipher.PBEWithHmacSHA224AndAES_256 -Cipher.PBEWithHmacSHA256AndAES_128 -Cipher.PBEWithHmacSHA256AndAES_256 -Cipher.PBEWithHmacSHA384AndAES_128 -Cipher.PBEWithHmacSHA384AndAES_256 -Cipher.PBEWithHmacSHA512AndAES_128 -Cipher.PBEWithHmacSHA512AndAES_256 -Cipher.PBEWithMD5AndDES -Cipher.PBEWithMD5AndTripleDES -Cipher.PBEWithSHA1AndDESede -Cipher.PBEWithSHA1AndRC2_128 -Cipher.PBEWithSHA1AndRC2_40 -Cipher.PBEWithSHA1AndRC4_128 -Cipher.PBEWithSHA1AndRC4_40 -Cipher.RC2 -Cipher.RC2 SupportedKeyFormats -Cipher.RC2 SupportedModes -Cipher.RC2 SupportedPaddings -Cipher.RSA -Cipher.RSA SupportedKeyClasses -Cipher.RSA SupportedModes -Cipher.RSA SupportedPaddings -KeyAgreement.DiffieHellman -KeyAgreement.DiffieHellman SupportedKeyClasses -KeyFactory.DiffieHellman -KeyGenerator.AES -KeyGenerator.ARCFOUR -KeyGenerator.Blowfish -KeyGenerator.DES -KeyGenerator.DESede -KeyGenerator.HmacMD5 -KeyGenerator.HmacSHA1 -KeyGenerator.HmacSHA224 -KeyGenerator.HmacSHA256 -KeyGenerator.HmacSHA384 -KeyGenerator.HmacSHA512 -KeyGenerator.RC2 -KeyGenerator.SunTls12Prf -KeyGenerator.SunTlsKeyMaterial -KeyGenerator.SunTlsMasterSecret -KeyGenerator.SunTlsPrf -KeyGenerator.SunTlsRsaPremasterSecret -KeyPairGenerator.DiffieHellman -KeyStore.JCEKS -Mac.HmacMD5 -Mac.HmacMD5 SupportedKeyFormats -Mac.HmacPBESHA1 -Mac.HmacPBESHA1 SupportedKeyFormats -Mac.HmacSHA1 -Mac.HmacSHA1 SupportedKeyFormats -Mac.HmacSHA224 -Mac.HmacSHA224 SupportedKeyFormats -Mac.HmacSHA256 -Mac.HmacSHA256 SupportedKeyFormats -Mac.HmacSHA384 -Mac.HmacSHA384 SupportedKeyFormats -Mac.HmacSHA512 -Mac.HmacSHA512 SupportedKeyFormats -Mac.PBEWithHmacSHA1 -Mac.PBEWithHmacSHA1 SupportedKeyFormatS -Mac.PBEWithHmacSHA224 -Mac.PBEWithHmacSHA224 SupportedKeyFormats -Mac.PBEWithHmacSHA256 -Mac.PBEWithHmacSHA256 SupportedKeyFormats -Mac.PBEWithHmacSHA384 -Mac.PBEWithHmacSHA384 SupportedKeyFormats -Mac.PBEWithHmacSHA512 -Mac.PBEWithHmacSHA512 SupportedKeyFormats -Mac.SslMacMD5 -Mac.SslMacMD5 SupportedKeyFormats -Mac.SslMacSHA1 -Mac.SslMacSHA1 SupportedKeyFormats -Provider.id className -Provider.id info -Provider.id name -Provider.id version -SecretKeyFactory.DES -SecretKeyFactory.DESede -SecretKeyFactory.PBEWithHmacSHA1AndAES_128 -SecretKeyFactory.PBEWithHmacSHA1AndAES_256 -SecretKeyFactory.PBEWithHmacSHA224AndAES_128 -SecretKeyFactory.PBEWithHmacSHA224AndAES_256 -SecretKeyFactory.PBEWithHmacSHA256AndAES_128 -SecretKeyFactory.PBEWithHmacSHA256AndAES_256 -SecretKeyFactory.PBEWithHmacSHA384AndAES_128 -SecretKeyFactory.PBEWithHmacSHA384AndAES_256 -SecretKeyFactory.PBEWithHmacSHA512AndAES_128 -SecretKeyFactory.PBEWithHmacSHA512AndAES_256 -SecretKeyFactory.PBEWithMD5AndDES -SecretKeyFactory.PBEWithMD5AndTripleDES -SecretKeyFactory.PBEWithSHA1AndDESede -SecretKeyFactory.PBEWithSHA1AndRC2_128 -SecretKeyFactory.PBEWithSHA1AndRC2_40 -SecretKeyFactory.PBEWithSHA1AndRC4_128 -SecretKeyFactory.PBEWithSHA1AndRC4_40 -SecretKeyFactory.PBKDF2WithHmacSHA1 -SecretKeyFactory.PBKDF2WithHmacSHA224 -SecretKeyFactory.PBKDF2WithHmacSHA256 -SecretKeyFactory.PBKDF2WithHmacSHA384 -SecretKeyFactory.PBKDF2WithHmacSHA512 - -Provider:SunJGSS -GssApiMechanism.1.2.840.113554.1.2.2 -GssApiMechanism.1.3.6.1.5.5.2 -Provider.id className -Provider.id info -Provider.id name -Provider.id version - -Provider:SunSASL -Provider.id className -Provider.id info -Provider.id name -Provider.id version -SaslClientFactory.CRAM-MD5 -SaslClientFactory.DIGEST-MD5 -SaslClientFactory.EXTERNAL -SaslClientFactory.GSSAPI -SaslClientFactory.NTLM -SaslClientFactory.PLAIN -SaslServerFactory.CRAM-MD5 -SaslServerFactory.DIGEST-MD5 -SaslServerFactory.GSSAPI -SaslServerFactory.NTLM - -Provider:XMLDSig -KeyInfoFactory.DOM -Provider.id className -Provider.id info -Provider.id name -Provider.id version -TransformService.http://www.w3.org/2000/09/xmldsig#base64 -TransformService.http://www.w3.org/2000/09/xmldsig#base64 MechanismType -TransformService.http://www.w3.org/2000/09/xmldsig#enveloped-signature -TransformService.http://www.w3.org/2000/09/xmldsig#enveloped-signature MechanismType -TransformService.http://www.w3.org/2001/10/xml-exc-c14n# -TransformService.http://www.w3.org/2001/10/xml-exc-c14n# MechanismType -TransformService.http://www.w3.org/2001/10/xml-exc-c14n#WithComments -TransformService.http://www.w3.org/2001/10/xml-exc-c14n#WithComments MechanismType -TransformService.http://www.w3.org/2002/06/xmldsig-filter2 -TransformService.http://www.w3.org/2002/06/xmldsig-filter2 MechanismType -TransformService.http://www.w3.org/2006/12/xml-c14n11 -TransformService.http://www.w3.org/2006/12/xml-c14n11 MechanismType -TransformService.http://www.w3.org/2006/12/xml-c14n11#WithComments -TransformService.http://www.w3.org/2006/12/xml-c14n11#WithComments MechanismType -TransformService.http://www.w3.org/TR/1999/REC-xpath-19991116 -TransformService.http://www.w3.org/TR/1999/REC-xpath-19991116 MechanismType -TransformService.http://www.w3.org/TR/1999/REC-xslt-19991116 -TransformService.http://www.w3.org/TR/1999/REC-xslt-19991116 MechanismType -TransformService.http://www.w3.org/TR/2001/REC-xml-c14n-20010315 -TransformService.http://www.w3.org/TR/2001/REC-xml-c14n-20010315 MechanismType -TransformService.http://www.w3.org/TR/2001/REC-xml-c14n-20010315#WithComments -TransformService.http://www.w3.org/TR/2001/REC-xml-c14n-20010315#WithComments MechanismType -XMLSignatureFactory.DOM - -Provider:SunPCSC -Provider.id className -Provider.id info -Provider.id name -Provider.id version -TerminalFactory.PC/SC -.E.E.Skipping testAesEax -.E.E.Skipping testAesEax -.E..java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key -java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported -java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported -java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported -java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported -..Encoded ECPrivateKey:308187020100301306072a8648ce3d020106082a8648ce3d030107046d306b0201010420681c3fd33297cc7085e6a2ab96b013854f440318fd05cd2f0bd998bc5e8fcb8ea14403420004db0e5d4ff1aefa02fd9e89f98bb7691c490dc89dfe41c18c73b4461fecc35eea6ba7a6e242e2e3cf8038beac5473113635c24492b1867f25362c01a63205add4 +...Skipping testAesEax +..E.Skipping testAesEax +...java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +..Encoded ECPrivateKey:308187020100301306072a8648ce3d020106082a8648ce3d030107046d306b020101042009043bf963fecbd3720c4a91b13c2fb77904e8a7c5cd80bd6f2bfb7a85f68aa8a1440342000482e5fd623eb25a628520acaed428ca2684c04f93e53b4ae475fdbe7a159a49d5c5b368f7ce6e5d8f4ee647f1381dd7c0872ccae7642b56deb76534be3813f13c ...testWrongOrder: ECDHC not supported testWrongOrder: ECDHC not supported -..testModifiedPublic:public point not on curve throws java.security.InvalidKeyException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key -testModifiedPublic:public point = (0,0) throws java.security.InvalidKeyException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key -testModifiedPublic:order = 1 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported -testModifiedPublic:order = 26959946660873538060741835960514744168612397095220107664918121663170 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported -testModifiedPublic:generator = (0,0) throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported -testModifiedPublic:generator not on curve throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported -testModifiedPublic:cofactor = 2 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported -testModifiedPublic:cofactor = None throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported -testModifiedPublic:modified prime throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported -testModifiedPublic:using secp224r1 throws java.security.InvalidKeyException: error:0f000080:elliptic curve routines:OPENSSL_internal:DECODE_ERROR -testModifiedPublic:a = 0 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported -testModifiedPublic:new curve with generator of order 3 that is also on secp256r1 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported -testModifiedPublic:order = -115792089210356248762697446949407573529996955224135760342422259061068512044369 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported -testModifiedPublic:order = 0 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported -testModifiedPublic:cofactor = -1 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported -testModifiedPublic:cofactor = 0 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported +..testModifiedPublic:public point not on curve throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:public point = (0,0) throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:order = 1 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:order = 26959946660873538060741835960514744168612397095220107664918121663170 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:generator = (0,0) throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:generator not on curve throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:cofactor = 2 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:cofactor = None throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:modified prime throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:using secp224r1 throws java.security.InvalidKeyException: error:06000066:public key routines:OPENSSL_internal:DECODE_ERROR +testModifiedPublic:a = 0 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:new curve with generator of order 3 that is also on secp256r1 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:order = -115792089210356248762697446949407573529996955224135760342422259061068512044369 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:order = 0 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:cofactor = -1 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:cofactor = 0 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key testWrongOrder: ECDHC not supported .Generated shared secret with a modified order:ECDH -expected:05c5ab197b2ce0e92560b94d35a8b0fd74b17fa67bdfea442ea7196cf23ba6d6 computed:05c5ab197b2ce0e92560b94d35a8b0fd74b17fa67bdfea442ea7196cf23ba6d6 +expected:5495f74745ffbab9deb9338f48680a941e5f030f861469d03dd9f071501348bf computed:5495f74745ffbab9deb9338f48680a941e5f030f861469d03dd9f071501348bf testWrongOrder: can't modify order. -..testModifiedPublic:public point not on curve throws java.security.InvalidKeyException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key -testModifiedPublic:public point = (0,0) throws java.security.InvalidKeyException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key -testModifiedPublic:order = 1 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: EC parameters error -testModifiedPublic:order = 26959946660873538060741835960514744168612397095220107664918121663170 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: EC parameters error -testModifiedPublic:generator = (0,0) throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: EC parameters error -testModifiedPublic:generator not on curve throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: EC parameters error -testModifiedPublic:cofactor = 2 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: EC parameters error +..testModifiedPublic:public point not on curve throws java.security.spec.InvalidKeySpecException: java.lang.RuntimeException: error:0f000078:elliptic curve routines:OPENSSL_internal:POINT_IS_NOT_ON_CURVE +testModifiedPublic:public point = (0,0) throws java.security.spec.InvalidKeySpecException: java.lang.RuntimeException: error:0f000078:elliptic curve routines:OPENSSL_internal:POINT_IS_NOT_ON_CURVE +testModifiedPublic:generator = (0,0) throws java.security.spec.InvalidKeySpecException: java.security.InvalidAlgorithmParameterException: EC_GROUP_new_arbitrary failed +testModifiedPublic:generator not on curve throws java.security.spec.InvalidKeySpecException: java.security.InvalidAlgorithmParameterException: EC_GROUP_new_arbitrary failed modified prime throws java.lang.IllegalArgumentException: first coefficient is too large -testModifiedPublic:using secp224r1 throws java.security.InvalidKeyException: error:0f000078:elliptic curve routines:OPENSSL_internal:POINT_IS_NOT_ON_CURVE -testModifiedPublic:a = 0 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: EC parameters error -testModifiedPublic:new curve with generator of order 3 that is also on secp256r1 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: EC parameters error +testModifiedPublic:using secp224r1 throws java.security.InvalidKeyException: error:0f00006a:elliptic curve routines:OPENSSL_internal:INCOMPATIBLE_OBJECTS +testModifiedPublic:a = 0 throws java.security.InvalidKeyException: error:0f00006a:elliptic curve routines:OPENSSL_internal:INCOMPATIBLE_OBJECTS +testModifiedPublic:new curve with generator of order 3 that is also on secp256r1 throws java.security.InvalidKeyException: error:0f00006a:elliptic curve routines:OPENSSL_internal:INCOMPATIBLE_OBJECTS order = -115792089210356248762697446949407573529996955224135760342422259061068512044369 throws java.lang.IllegalArgumentException: n is not positive order = 0 throws java.lang.IllegalArgumentException: n is not positive cofactor = -1 throws java.lang.IllegalArgumentException: h is not positive @@ -611,49 +223,49 @@ Hash:185f8db32271fe25f561a6fc938b2e264306ec304eda518007d1764826381969 Curve:secp256r1 Order:115792089210356248762697446949407573529996955224135760342422259061068512044369 Private key: -S:51960316606265081544687965366214918106270765247170103551400791125721595126581 -encoded:308187020100301306072a8648ce3d020106082a8648ce3d030107046d306b020101042072e07f3b79eaff36061f39f5f0044ae871115d38f6f9ac4ba8ac441245fa2335a14403420004097d292e4cba7d6ca74301ef2584a64d7ba2b6cc01d03e8bc65ed44f038097d960b8603c58575b937fedbd240c53d04421b93f034732f8e91624ec5d28fccecf +S:35446506914683346530403638171900547563459317474911942713041797056668754056248 +encoded:308187020100301306072a8648ce3d020106082a8648ce3d030107046d306b02010104204e5e030eaeeb3aa7c1aeab08f0feb2fd9df959e4293ee48284b9b92097951438a144034200046593cf246197630c8ba122f865d09d40fc0634d10637b2bd75e5ef4012ade7882de268f362aa4b811e85f654a527da79a57776d955b978bfb17a0cd2ca0500ec Public key: -X:4291955740184912316612093208454070108183248153202999420950575102305702549465 -Y:43747797518462306471831980660987368580663604532726865985179372866304147771087 -encoded:3059301306072a8648ce3d020106082a8648ce3d03010703420004097d292e4cba7d6ca74301ef2584a64d7ba2b6cc01d03e8bc65ed44f038097d960b8603c58575b937fedbd240c53d04421b93f034732f8e91624ec5d28fccecf -Signature:304402205b8c5f99166b58a1c58a748d146be9c1301ba1c4aace02f3f6b0263e51b5725402201d0d1a8a8e1785a5d02c1d693cc5dbc11add1f97a0987ce2e9db742ba4e2c346 -r:41408487603282030415343416996443145046407776240712836945244840544568742343252 -s:13140224801598522712283509237813148947023737148337037593170219640474801718086 -.Conscrypt curve:secp256r1 countLsb:494 countMsb:501 -Conscrypt curve:secp224r1 countLsb:483 countMsb:519 -Conscrypt curve:secp384r1 countLsb:511 countMsb:514 -Conscrypt curve:secp521r1 countLsb:500 countMsb:556 -Conscrypt curve:brainpoolP256r1 countLsb:486 countMsb:515 +X:45944753867761762640785745519970608771737193196590969312340380353191253763976 +Y:20754109966164668529577403496795897606565336313761112970930558747150997848300 +encoded:3059301306072a8648ce3d020106082a8648ce3d030107034200046593cf246197630c8ba122f865d09d40fc0634d10637b2bd75e5ef4012ade7882de268f362aa4b811e85f654a527da79a57776d955b978bfb17a0cd2ca0500ec +Signature:3045022100eb951e82690732883537334c718e2f8ed305d72b7d27db02faba757312c57817022030f56d08a750b23a697bec61a2d5820e45981a0d1ef1bdc82b85d774d3ed87ee +r:106556990197963802439402594362813815957037061304716438936315130732644630099991 +s:22144646786519213512751131383531344929972872558418278740719195820285106161646 +.Conscrypt curve:secp256r1 countLsb:521 countMsb:514 +Conscrypt curve:secp224r1 countLsb:521 countMsb:518 +Conscrypt curve:secp384r1 countLsb:537 countMsb:531 +Conscrypt curve:secp521r1 countLsb:487 countMsb:508 +Conscrypt curve:brainpoolP256r1 countLsb:502 countMsb:492 ..testTiming algorithm:SHA256WithECDSA -count:50000 cutoff:349931 relative average:1.004052121107007 sigmas:1.5693797564253769 -count:25041 cutoff:39318 relative average:1.0049570790859916 sigmas:1.358664753986472 -count:12519 cutoff:39093 relative average:1.0007022957313807 sigmas:0.1361023035683595 -count:6284 cutoff:38972 relative average:1.0037075224257037 sigmas:0.5090524150510641 -count:3127 cutoff:38892 relative average:0.9946437369037198 sigmas:0.5187838754423801 -count:1563 cutoff:38837 relative average:0.9841092671223877 sigmas:1.0881381668779933 -count:787 cutoff:38794 relative average:1.0025121166169606 sigmas:0.12206405403439706 -count:394 cutoff:38759 relative average:1.0155271597632511 sigmas:0.5338272753902615 -count:197 cutoff:38727 relative average:1.0114321373712922 sigmas:0.27792087910370167 -count:99 cutoff:38699 relative average:1.025476906150289 sigmas:0.43906105026091863 -count:49 cutoff:38671 relative average:1.0740730863402321 sigmas:0.8980884431030283 -count:25 cutoff:38647 relative average:1.115231075531731 sigmas:0.9979303871588238 -count:13 cutoff:38632 relative average:1.256567375195096 sigmas:1.6022627445477065 -..................testDefaultSize: keysize=2048 +count:50000 cutoff:3513776 relative average:1.0006529890343518 sigmas:0.2529015655300517 +count:25017 cutoff:39395 relative average:1.0032386524393044 sigmas:0.8872430073247648 +count:12534 cutoff:39147 relative average:1.0056248022282215 sigmas:1.0907186258648822 +count:6278 cutoff:39032 relative average:1.010747264180705 sigmas:1.4749225226851859 +count:3157 cutoff:38963 relative average:1.016795980503624 sigmas:1.6345690827771184 +count:1566 cutoff:38912 relative average:1.021543613180642 sigmas:1.4766414287784124 +count:782 cutoff:38872 relative average:1.0298976488843237 sigmas:1.4481082946620267 +count:395 cutoff:38836 relative average:1.0029412280419474 sigmas:0.1012483310369333 +count:199 cutoff:38807 relative average:0.9816443378109576 sigmas:0.44849460379780326 +count:99 cutoff:38780 relative average:1.0502446057744175 sigmas:0.8658998565652437 +count:49 cutoff:38750 relative average:1.0533378078570317 sigmas:0.6466865522090766 +count:25 cutoff:38734 relative average:1.0102438228046235 sigmas:0.08871410780670433 +count:13 cutoff:38709 relative average:1.0317081761622526 sigmas:0.19801749666613208 +............testDefaultSize: keysize=2048 ....Message:Hello Hash:185f8db32271fe25f561a6fc938b2e264306ec304eda518007d1764826381969 Public key: -Modulus:17448444141705520141592074532543626434330358064825014667079186856037254320751463330289974621932458298460071535848147068624915855931652124162238545831147370424164620631691894029860086969496672516076436652149013177819041708252999529687845510723103811501421773868041322444710543703527073582620521032194035154742093517992300806456886438475508084682993410545269132715562208881150695251881475998028534644015899709088585213827980997160888082724558327667765325260133726161824319778649061999799754536159363118674949772223426038124960618692485773895463837344164368862130671724525958049064814621336064770661117489043635928213309 +Modulus:20161514534357158053797782876901771294883512885129638044632678560541698291134791039558949921703553093499919544784894267310648359617611317061384794776233445866705863568051269385419128276901313970882210664258408736595093130253122378995361693118088838660075788306938212836031406642425995867321209708546696570248240027355713549660446933212870690167008803704515417643556110056997589761254347294716825383632642870403790159198501658920815284345591722858738405709554614961562876006234488784651496230852750310811459370599208641684832431967661590973338751761536267366151031893092602051914168721998699068112783392381236707100137 E:65537 -encoded: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 +encoded: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 Private key: -D:4129751763188201713174320828105504698660532967980426553067714526411368698541836267265711603340179240681804166017799613271516582987988799059196533311867226701472901001395987217055628713968409230406024797134586842665060430864494899137174659193759628486264306351436943605919215079378979841567636785188180360754655884315969817414746083253983094185795012303890653444438022340019166634498713401826143459439183131578375380811892933591146870398083406586766234055046579606480448266980283357358323690846429897133348495513379450435310977451969066231688251183984483012516818914018943611708431794254439466402449805377435576417155 -encoded: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 -Signature:561a19aad000b8afda84869c73f31926cbccfdeafcb62ab705fc3e086353b1580ea0cae555d0d3a50933fbdb9f03ee60d378730ef6ea8fcd7546e5b94f8e781be6438c6f14cef8be750fdf838cf984a9c5c50eddb36994cedd1330d9beb3cd6173a9931b393238b1e905eeb13b41360fc00447c4aebc36a4e5291bd483f5ec0d3e81afb811ef915b4aabb2bff3d8b080776375cf10465fd7685aec60e20821f311bb812c8bdf154f617a7a0e2076003f8ece34672584b084847e3d07d42ce17a27e890f5470bacafa0b901b4015412322d7a487e90507812e579e485ee1cc7435921e88b9827c3de575a0ed05889dc96a87265f7d15cf52c43eb2c1d8cebafa0 +D:1645004479818138050310056830317423692823380140607740009981569043942453822837031163865932144724801627770838530690312737398368317758903705008720109920613001715225642445706427670189090646179418513676242442810256437077652497684453188902191858240775448106033084502254838619214625923809640453507687849825691185670054822894502206168135664522324631961450051405175412167871383767390414024050401546504867964293458950121447131863364925887750624971873357974296240438133273301569898477173768025601335903767677796483230186855406867702602352566747891809434473893943857507036835210458421672291159647019330643713088646581444517435013 +encoded:308204be020100300d06092a864886f70d0101010500048204a8308204a402010002820101009fb5bfe2aefe0fc6e3c1ba26fe5d6b093108fc24d6e4399f57f7801719b5dbaab810106748500b98008b25e834b191c60378c64f0b9e00f9aa0b70d9ef5e21fe82a220b13a6d0bb6cc3f71dfd3758bf785eae572f176e1f19cd4b3fb11a34b445c74e1fd34b981eb448e3b26fae4b58fbde16004b3e0f0bf940a6ec4f9a86e4283525ae16b03efaf9b2164e4a02dcf1e24c5429136b2216998306f6e17848907afc41605d0c13e3a2515b1f797e619ce40554374b491cfa9be2854eb88f6cc85e48165bd5c4830f012a08a688f2eb1b751da3c063149b62e849d217b0fd7cc8c9eb5e71fe11a9093314b69839142f7d13be335561a050b753c4a3a02035085e90203010001028201000d07ec0c5f9950a9ba6f15d4752823a1d81ba2d111ac84ec14a617d02ab39d24f8882d027452bda36d15ed659d1908eb1660ee1348801f95bf5358259c037af4146e0c8b515850de9d1b271c2b5979ae5c419e6f8ab697b85a42bb9da66283b363f4d07493aef823fd4fba915362c252a45c457494c5ab770229f8c03f1b88456988d5b48f123398b449246ea4f10434c61867de5305159054a5e26523505b5369e10e2533e20ccdc2529df0dedb315f764b1e425c08bccdf9b5ee203099670294ee51296bdeb23d3e4bc57646eb4bb7019486b7c94a829a561044a7549dfcdb93207c9ea99d9fb81045bad81cb05657242db7de485b84609ce46cb7afd2168502818100cb8951fc09f5dd3e9bcc30442e71547e47dc9f080cf70170bdfad79fa7e66081813e36b3e06eefe4ff06344e1823382df9883195aee3348fd4f5137acb73fb9741bd772c9a907e6fb392315edb6a9dd64514344cfb863c7a2b3d13e798ac98d626c9efed15473479927f43ba2b9436b75b7900425dc10d7abfaee122c9c1978502818100c8e07857a1b8c33980fc630a34d4da3172d53a29e8af6128774a0588f59290dadce8ce15acb5b5ab0adf975901c042dd6ac36ba354f56289e0c75a60a7cb94bdf31dd63bc6e4f84b52f4757f502268b924d4485d2243a45e5875e8d9e384cd294f3ca8c28ab3a993b0b04d7b931e5675db0f41212d709cc61c47c6a4e9423815028181008bdd2a3c62efd40010f9887561e0b8ea2a219e1adf25e19482c85be1b773e4ff393bf2453b45a08e20fd37762eba0d01f2c637249fd03baf56ecae5d246fe80471c56b9e77fc31163b348bbe9e52ae71ae788ad417c78fc977eaf9c19d3585b52b647afdd530600be6b2936cdc4376321ba6939a0769010547b139be391c522d02818051cd17349866e51945ad81a7665c477e5b84f96a9796d3b9e6d9fde70819e763391294d9bebb407fa6ade6b4184272f837c1dcd3668586db1eee0f9fccb4da9d7fa366da70e44d385f4fad896ad8984cccf2a58547aec400a7855c8d5e5976329c51d7676194483a1c79af13e39537204754aef113d00807a4fc95a81255250102818100c2e8c78eb3f9982be3c11fcdaca8cf7fdbca4fadd10b5fc5abd44e93690a1647e16ef097e98c54abd01ea50f576fb67e51a595658c99a37eeda324e90263bbd97f04eeab7712f83a47fe28449f1b70beba69f5f96959ae1acb9487f7d74eda7187e4cc04c6ff03a69f247a85907e205f7e13dc6b7755d407f8f24f51c94fa56d +Signature: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 ..Rejected legacy signature:253e1d19bbe91064f2364c1e7db3ba8eb6dc5b19202e440eab6fbdf28c8c6ec05b812983713c338c72b6e99b8edf506a89ff9fc8e5c2c52362097a56dc228060eca01e1ff318c6c81617691438703411c1f953b21cd74331f87c9b8b189fdffdfe8550bd2bd1d47be915f8604a0f472199dd705e19b1b815f99b68d60bc257c7 -Time: 116.574 -There were 7 failures: +Time: 10 +There were 3 failures: 1) testByteBufferShiftedAlias(com.google.security.wycheproof.AesGcmTest) java.lang.AssertionError: Overlapping buffers test failed with buffer type: direct buffers and output offset -1 at com.google.security.wycheproof.AesGcmTest.testByteBufferShiftedAlias(AesGcmTest.java:583) @@ -737,184 +349,11 @@ java.lang.AssertionError: ciphertext size:32 expected:<16> but was:<32> at com.google.testing.junit.runner.junit4.JUnit4Runner.run(JUnit4Runner.java:112) at com.google.testing.junit.runner.BazelTestRunner.runTestsInSuite(BazelTestRunner.java:144) at com.google.testing.junit.runner.BazelTestRunner.main(BazelTestRunner.java:82) -3) testEmptyPlaintext(com.google.security.wycheproof.CipherInputStreamTest) -java.security.InvalidKeyException: Illegal key size - at javax.crypto.Cipher.checkCryptoPerm(Cipher.java:1039) - at javax.crypto.Cipher.implInit(Cipher.java:805) - at javax.crypto.Cipher.chooseProvider(Cipher.java:864) - at javax.crypto.Cipher.init(Cipher.java:1396) - at javax.crypto.Cipher.init(Cipher.java:1327) - at com.google.security.wycheproof.CipherInputStreamTest$TestVector.<init>(CipherInputStreamTest.java:77) - at com.google.security.wycheproof.CipherInputStreamTest.getTestVectors(CipherInputStreamTest.java:97) - at com.google.security.wycheproof.CipherInputStreamTest.testEmptyPlaintext(CipherInputStreamTest.java:261) - at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) - at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) - at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) - at java.lang.reflect.Method.invoke(Method.java:498) - at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:47) - at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) - at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:44) - at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) - at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:271) - at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:70) - at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:50) - at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) - at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) - at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) - at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) - at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) - at org.junit.runners.ParentRunner.run(ParentRunner.java:309) - at org.junit.runners.Suite.runChild(Suite.java:127) - at org.junit.runners.Suite.runChild(Suite.java:26) - at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) - at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) - at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) - at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) - at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) - at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) - at org.junit.runners.ParentRunner.run(ParentRunner.java:309) - at com.google.testing.junit.runner.internal.junit4.CancellableRequestFactory$CancellableRunner.run(CancellableRequestFactory.java:89) - at org.junit.runner.JUnitCore.run(JUnitCore.java:160) - at org.junit.runner.JUnitCore.run(JUnitCore.java:138) - at com.google.testing.junit.runner.junit4.JUnit4Runner.run(JUnit4Runner.java:112) - at com.google.testing.junit.runner.BazelTestRunner.runTestsInSuite(BazelTestRunner.java:144) - at com.google.testing.junit.runner.BazelTestRunner.main(BazelTestRunner.java:82) -4) testCorruptAesGcm(com.google.security.wycheproof.CipherInputStreamTest) -java.security.InvalidKeyException: Illegal key size - at javax.crypto.Cipher.checkCryptoPerm(Cipher.java:1039) - at javax.crypto.Cipher.implInit(Cipher.java:805) - at javax.crypto.Cipher.chooseProvider(Cipher.java:864) - at javax.crypto.Cipher.init(Cipher.java:1396) - at javax.crypto.Cipher.init(Cipher.java:1327) - at com.google.security.wycheproof.CipherInputStreamTest$TestVector.<init>(CipherInputStreamTest.java:77) - at com.google.security.wycheproof.CipherInputStreamTest.getTestVectors(CipherInputStreamTest.java:97) - at com.google.security.wycheproof.CipherInputStreamTest.testCorruptAesGcm(CipherInputStreamTest.java:244) - at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) - at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) - at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) - at java.lang.reflect.Method.invoke(Method.java:498) - at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:47) - at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) - at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:44) - at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) - at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:271) - at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:70) - at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:50) - at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) - at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) - at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) - at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) - at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) - at org.junit.runners.ParentRunner.run(ParentRunner.java:309) - at org.junit.runners.Suite.runChild(Suite.java:127) - at org.junit.runners.Suite.runChild(Suite.java:26) - at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) - at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) - at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) - at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) - at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) - at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) - at org.junit.runners.ParentRunner.run(ParentRunner.java:309) - at com.google.testing.junit.runner.internal.junit4.CancellableRequestFactory$CancellableRunner.run(CancellableRequestFactory.java:89) - at org.junit.runner.JUnitCore.run(JUnitCore.java:160) - at org.junit.runner.JUnitCore.run(JUnitCore.java:138) - at com.google.testing.junit.runner.junit4.JUnit4Runner.run(JUnit4Runner.java:112) - at com.google.testing.junit.runner.BazelTestRunner.runTestsInSuite(BazelTestRunner.java:144) - at com.google.testing.junit.runner.BazelTestRunner.main(BazelTestRunner.java:82) -5) testAesGcm(com.google.security.wycheproof.CipherInputStreamTest) -java.security.InvalidKeyException: Illegal key size - at javax.crypto.Cipher.checkCryptoPerm(Cipher.java:1039) - at javax.crypto.Cipher.implInit(Cipher.java:805) - at javax.crypto.Cipher.chooseProvider(Cipher.java:864) - at javax.crypto.Cipher.init(Cipher.java:1396) - at javax.crypto.Cipher.init(Cipher.java:1327) - at com.google.security.wycheproof.CipherInputStreamTest$TestVector.<init>(CipherInputStreamTest.java:77) - at com.google.security.wycheproof.CipherInputStreamTest.getTestVectors(CipherInputStreamTest.java:97) - at com.google.security.wycheproof.CipherInputStreamTest.testAesGcm(CipherInputStreamTest.java:231) - at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) - at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) - at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) - at java.lang.reflect.Method.invoke(Method.java:498) - at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:47) - at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) - at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:44) - at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) - at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:271) - at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:70) - at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:50) - at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) - at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) - at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) - at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) - at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) - at org.junit.runners.ParentRunner.run(ParentRunner.java:309) - at org.junit.runners.Suite.runChild(Suite.java:127) - at org.junit.runners.Suite.runChild(Suite.java:26) - at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) - at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) - at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) - at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) - at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) - at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) - at org.junit.runners.ParentRunner.run(ParentRunner.java:309) - at com.google.testing.junit.runner.internal.junit4.CancellableRequestFactory$CancellableRunner.run(CancellableRequestFactory.java:89) - at org.junit.runner.JUnitCore.run(JUnitCore.java:160) - at org.junit.runner.JUnitCore.run(JUnitCore.java:138) - at com.google.testing.junit.runner.junit4.JUnit4Runner.run(JUnit4Runner.java:112) - at com.google.testing.junit.runner.BazelTestRunner.runTestsInSuite(BazelTestRunner.java:144) - at com.google.testing.junit.runner.BazelTestRunner.main(BazelTestRunner.java:82) -6) testEmptyPlaintext(com.google.security.wycheproof.CipherOutputStreamTest) -java.security.InvalidKeyException: Illegal key size - at javax.crypto.Cipher.checkCryptoPerm(Cipher.java:1039) - at javax.crypto.Cipher.implInit(Cipher.java:805) - at javax.crypto.Cipher.chooseProvider(Cipher.java:864) - at javax.crypto.Cipher.init(Cipher.java:1396) - at javax.crypto.Cipher.init(Cipher.java:1327) - at com.google.security.wycheproof.CipherOutputStreamTest$TestVector.<init>(CipherOutputStreamTest.java:76) - at com.google.security.wycheproof.CipherOutputStreamTest.getTestVectors(CipherOutputStreamTest.java:96) - at com.google.security.wycheproof.CipherOutputStreamTest.testEmptyPlaintext(CipherOutputStreamTest.java:217) - at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) - at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) - at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) - at java.lang.reflect.Method.invoke(Method.java:498) - at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:47) - at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) - at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:44) - at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) - at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:271) - at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:70) - at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:50) - at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) - at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) - at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) - at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) - at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) - at org.junit.runners.ParentRunner.run(ParentRunner.java:309) - at org.junit.runners.Suite.runChild(Suite.java:127) - at org.junit.runners.Suite.runChild(Suite.java:26) - at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) - at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) - at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) - at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) - at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) - at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) - at org.junit.runners.ParentRunner.run(ParentRunner.java:309) - at com.google.testing.junit.runner.internal.junit4.CancellableRequestFactory$CancellableRunner.run(CancellableRequestFactory.java:89) - at org.junit.runner.JUnitCore.run(JUnitCore.java:160) - at org.junit.runner.JUnitCore.run(JUnitCore.java:138) - at com.google.testing.junit.runner.junit4.JUnit4Runner.run(JUnit4Runner.java:112) - at com.google.testing.junit.runner.BazelTestRunner.runTestsInSuite(BazelTestRunner.java:144) - at com.google.testing.junit.runner.BazelTestRunner.main(BazelTestRunner.java:82) -7) testAesGcm(com.google.security.wycheproof.CipherOutputStreamTest) -java.security.InvalidKeyException: Illegal key size - at javax.crypto.Cipher.checkCryptoPerm(Cipher.java:1039) - at javax.crypto.Cipher.implInit(Cipher.java:805) - at javax.crypto.Cipher.chooseProvider(Cipher.java:864) - at javax.crypto.Cipher.init(Cipher.java:1396) - at javax.crypto.Cipher.init(Cipher.java:1327) - at com.google.security.wycheproof.CipherOutputStreamTest$TestVector.<init>(CipherOutputStreamTest.java:76) - at com.google.security.wycheproof.CipherOutputStreamTest.getTestVectors(CipherOutputStreamTest.java:96) - at com.google.security.wycheproof.CipherOutputStreamTest.testAesGcm(CipherOutputStreamTest.java:198) +3) testEmptyPlaintext(com.google.security.wycheproof.CipherOutputStreamTest) +java.lang.AssertionError: this should fail; decrypted: pt: + at org.junit.Assert.fail(Assert.java:88) + at com.google.security.wycheproof.CipherOutputStreamTest.testCorruptDecryptEmpty(CipherOutputStreamTest.java:186) + at com.google.security.wycheproof.CipherOutputStreamTest.testEmptyPlaintext(CipherOutputStreamTest.java:227) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) @@ -949,12 +388,12 @@ java.security.InvalidKeyException: Illegal key size at com.google.testing.junit.runner.BazelTestRunner.main(BazelTestRunner.java:82) FAILURES!!! -Tests run: 69, Failures: 7 +Tests run: 63, Failures: 3 BazelTestRunner exiting with a return value of 1 JVM shutdown hooks (if any) will run now. The JVM will exit once they complete. --- JVM shutdown starting at 2018-04-06 18:01:29 -- +-- JVM shutdown starting at 2018-04-06 18:25:16 -- diff --git a/testlogs/index.html b/testlogs/index.html index c5506c9..d1b7465 100644 --- a/testlogs/index.html +++ b/testlogs/index.html @@ -1,3 +1,3 @@ <html><body><ul> -<li><a href="ConscryptAllTests_1_0_1.txt">ConscryptAllTests_1_0_1.txt (7 failures)</a></li> +<li><a href="ConscryptAllTests_1_0_1.txt">ConscryptAllTests_1_0_1.txt ()</a></li> </ul></body></html> |