aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorkbuilder <kokoro-team@google.com>2018-04-06 11:25:17 -0700
committerkbuilder <kokoro-team@google.com>2018-04-06 11:25:17 -0700
commit0305ca227611e4ab19e3937161a32fffc2d07763 (patch)
treeb810664568999ee81c45b26ac7a463a9c5c98b3f
parentd49718272f175b00405e245c5dded7450de76bda (diff)
downloadwycheproof-0305ca227611e4ab19e3937161a32fffc2d07763.zip
wycheproof-0305ca227611e4ab19e3937161a32fffc2d07763.tar.gz
wycheproof-0305ca227611e4ab19e3937161a32fffc2d07763.tar.bz2
Testlogs auto-pushed to gh-pages
-rwxr-xr-xtestlogs/ConscryptAllTests_1_0_1.txt707
-rw-r--r--testlogs/index.html2
2 files changed, 74 insertions, 635 deletions
diff --git a/testlogs/ConscryptAllTests_1_0_1.txt b/testlogs/ConscryptAllTests_1_0_1.txt
index 6a7391d..c1c371d 100755
--- a/testlogs/ConscryptAllTests_1_0_1.txt
+++ b/testlogs/ConscryptAllTests_1_0_1.txt
@@ -175,432 +175,44 @@ Signature.SHA512withECDSA SupportedKeyFormats
Signature.SHA512withRSA/PSS
Signature.SHA512withRSA/PSS SupportedKeyClasses
Signature.SHA512withRSA/PSS SupportedKeyFormats
-
-Provider:SUN
-AlgorithmParameterGenerator.DSA
-AlgorithmParameterGenerator.DSA ImplementedIn
-AlgorithmParameterGenerator.DSA KeySize
-AlgorithmParameters.DSA
-AlgorithmParameters.DSA ImplementedIn
-CertPathBuilder.PKIX
-CertPathBuilder.PKIX ImplementedIn
-CertPathBuilder.PKIX ValidationAlgorithm
-CertPathValidator.PKIX
-CertPathValidator.PKIX ImplementedIn
-CertPathValidator.PKIX ValidationAlgorithm
-CertStore.Collection
-CertStore.Collection ImplementedIn
-CertStore.LDAP
-CertStore.LDAP ImplementedIn
-CertStore.LDAP LDAPSchema
-CertStore.com.sun.security.IndexedCollection
-CertStore.com.sun.security.IndexedCollection ImplementedIn
-CertificateFactory.X.509
-CertificateFactory.X.509 ImplementedIn
-Configuration.JavaLoginConfig
-KeyFactory.DSA
-KeyFactory.DSA ImplementedIn
-KeyPairGenerator.DSA
-KeyPairGenerator.DSA ImplementedIn
-KeyPairGenerator.DSA KeySize
-KeyStore.CaseExactJKS
-KeyStore.DKS
-KeyStore.JKS
-KeyStore.JKS ImplementedIn
-MessageDigest.MD2
-MessageDigest.MD5
-MessageDigest.MD5 ImplementedIn
-MessageDigest.SHA
-MessageDigest.SHA ImplementedIn
-MessageDigest.SHA-224
-MessageDigest.SHA-256
-MessageDigest.SHA-384
-MessageDigest.SHA-512
-Policy.JavaPolicy
-Provider.id className
-Provider.id info
-Provider.id name
-Provider.id version
-SecureRandom.NativePRNG
-SecureRandom.NativePRNGBlocking
-SecureRandom.NativePRNGNonBlocking
-SecureRandom.SHA1PRNG
-SecureRandom.SHA1PRNG ImplementedIn
-Signature.NONEwithDSA
-Signature.NONEwithDSA KeySize
-Signature.NONEwithDSA SupportedKeyClasses
-Signature.SHA1withDSA
-Signature.SHA1withDSA ImplementedIn
-Signature.SHA1withDSA KeySize
-Signature.SHA1withDSA SupportedKeyClasses
-Signature.SHA224withDSA
-Signature.SHA224withDSA KeySize
-Signature.SHA224withDSA SupportedKeyClasses
-Signature.SHA256withDSA
-Signature.SHA256withDSA KeySize
-Signature.SHA256withDSA SupportedKeyClasses
-
-Provider:SunRsaSign
-KeyFactory.RSA
-KeyPairGenerator.RSA
-Provider.id className
-Provider.id info
-Provider.id name
-Provider.id version
-Signature.MD2withRSA
-Signature.MD2withRSA SupportedKeyClasses
-Signature.MD5withRSA
-Signature.MD5withRSA SupportedKeyClasses
-Signature.SHA1withRSA
-Signature.SHA1withRSA SupportedKeyClasses
-Signature.SHA224withRSA
-Signature.SHA224withRSA SupportedKeyClasses
-Signature.SHA256withRSA
-Signature.SHA256withRSA SupportedKeyClasses
-Signature.SHA384withRSA
-Signature.SHA384withRSA SupportedKeyClasses
-Signature.SHA512withRSA
-Signature.SHA512withRSA SupportedKeyClasses
-
-Provider:SunEC
-AlgorithmParameters.EC
-AlgorithmParameters.EC ImplementedIn
-AlgorithmParameters.EC KeySize
-AlgorithmParameters.EC SupportedCurves
-KeyAgreement.ECDH
-KeyAgreement.ECDH ImplementedIn
-KeyAgreement.ECDH SupportedKeyClasses
-KeyFactory.EC
-KeyFactory.EC ImplementedIn
-KeyPairGenerator.EC
-KeyPairGenerator.EC ImplementedIn
-KeyPairGenerator.EC KeySize
-Provider.id className
-Provider.id info
-Provider.id name
-Provider.id version
-Signature.NONEwithECDSA
-Signature.NONEwithECDSA ImplementedIn
-Signature.NONEwithECDSA SupportedKeyClasses
-Signature.SHA1withECDSA
-Signature.SHA1withECDSA ImplementedIn
-Signature.SHA1withECDSA KeySize
-Signature.SHA1withECDSA SupportedKeyClasses
-Signature.SHA224withECDSA
-Signature.SHA224withECDSA ImplementedIn
-Signature.SHA224withECDSA SupportedKeyClasses
-Signature.SHA256withECDSA
-Signature.SHA256withECDSA ImplementedIn
-Signature.SHA256withECDSA SupportedKeyClasses
-Signature.SHA384withECDSA
-Signature.SHA384withECDSA ImplementedIn
-Signature.SHA384withECDSA SupportedKeyClasses
-Signature.SHA512withECDSA
-Signature.SHA512withECDSA ImplementedIn
-Signature.SHA512withECDSA SupportedKeyClasses
-
-Provider:SunJSSE
-KeyFactory.RSA
-KeyManagerFactory.NewSunX509
-KeyManagerFactory.SunX509
-KeyPairGenerator.RSA
-KeyStore.PKCS12
-Provider.id className
-Provider.id info
-Provider.id name
-Provider.id version
-SSLContext.Default
-SSLContext.TLS
-SSLContext.TLSv1
-SSLContext.TLSv1.1
-SSLContext.TLSv1.2
-Signature.MD2withRSA
-Signature.MD5andSHA1withRSA
-Signature.MD5withRSA
-Signature.SHA1withRSA
-TrustManagerFactory.PKIX
-TrustManagerFactory.SunX509
-
-Provider:SunJCE
-AlgorithmParameterGenerator.DiffieHellman
-AlgorithmParameters.AES
-AlgorithmParameters.Blowfish
-AlgorithmParameters.DES
-AlgorithmParameters.DESede
-AlgorithmParameters.DiffieHellman
-AlgorithmParameters.GCM
-AlgorithmParameters.OAEP
-AlgorithmParameters.PBE
-AlgorithmParameters.PBES2
-AlgorithmParameters.PBEWithHmacSHA1AndAES_128
-AlgorithmParameters.PBEWithHmacSHA1AndAES_256
-AlgorithmParameters.PBEWithHmacSHA224AndAES_128
-AlgorithmParameters.PBEWithHmacSHA224AndAES_256
-AlgorithmParameters.PBEWithHmacSHA256AndAES_128
-AlgorithmParameters.PBEWithHmacSHA256AndAES_256
-AlgorithmParameters.PBEWithHmacSHA384AndAES_128
-AlgorithmParameters.PBEWithHmacSHA384AndAES_256
-AlgorithmParameters.PBEWithHmacSHA512AndAES_128
-AlgorithmParameters.PBEWithHmacSHA512AndAES_256
-AlgorithmParameters.PBEWithMD5AndDES
-AlgorithmParameters.PBEWithMD5AndTripleDES
-AlgorithmParameters.PBEWithSHA1AndDESede
-AlgorithmParameters.PBEWithSHA1AndRC2_128
-AlgorithmParameters.PBEWithSHA1AndRC2_40
-AlgorithmParameters.PBEWithSHA1AndRC4_128
-AlgorithmParameters.PBEWithSHA1AndRC4_40
-AlgorithmParameters.RC2
-Cipher.AES
-Cipher.AES SupportedKeyFormats
-Cipher.AES SupportedModes
-Cipher.AES SupportedPaddings
-Cipher.AESWrap
-Cipher.AESWrap SupportedKeyFormats
-Cipher.AESWrap SupportedModes
-Cipher.AESWrap SupportedPaddings
-Cipher.AESWrap_128
-Cipher.AESWrap_192
-Cipher.AESWrap_256
-Cipher.AES_128/CBC/NoPadding
-Cipher.AES_128/CFB/NoPadding
-Cipher.AES_128/ECB/NoPadding
-Cipher.AES_128/GCM/NoPadding
-Cipher.AES_128/OFB/NoPadding
-Cipher.AES_192/CBC/NoPadding
-Cipher.AES_192/CFB/NoPadding
-Cipher.AES_192/ECB/NoPadding
-Cipher.AES_192/GCM/NoPadding
-Cipher.AES_192/OFB/NoPadding
-Cipher.AES_256/CBC/NoPadding
-Cipher.AES_256/CFB/NoPadding
-Cipher.AES_256/ECB/NoPadding
-Cipher.AES_256/GCM/NoPadding
-Cipher.AES_256/OFB/NoPadding
-Cipher.ARCFOUR
-Cipher.ARCFOUR SupportedKeyFormats
-Cipher.ARCFOUR SupportedModes
-Cipher.ARCFOUR SupportedPaddings
-Cipher.Blowfish
-Cipher.Blowfish SupportedKeyFormats
-Cipher.Blowfish SupportedModes
-Cipher.Blowfish SupportedPaddings
-Cipher.DES
-Cipher.DES SupportedKeyFormats
-Cipher.DES SupportedModes
-Cipher.DES SupportedPaddings
-Cipher.DESede
-Cipher.DESede SupportedKeyFormats
-Cipher.DESede SupportedModes
-Cipher.DESede SupportedPaddings
-Cipher.DESedeWrap
-Cipher.DESedeWrap SupportedKeyFormats
-Cipher.DESedeWrap SupportedModes
-Cipher.DESedeWrap SupportedPaddings
-Cipher.PBEWithHmacSHA1AndAES_128
-Cipher.PBEWithHmacSHA1AndAES_256
-Cipher.PBEWithHmacSHA224AndAES_128
-Cipher.PBEWithHmacSHA224AndAES_256
-Cipher.PBEWithHmacSHA256AndAES_128
-Cipher.PBEWithHmacSHA256AndAES_256
-Cipher.PBEWithHmacSHA384AndAES_128
-Cipher.PBEWithHmacSHA384AndAES_256
-Cipher.PBEWithHmacSHA512AndAES_128
-Cipher.PBEWithHmacSHA512AndAES_256
-Cipher.PBEWithMD5AndDES
-Cipher.PBEWithMD5AndTripleDES
-Cipher.PBEWithSHA1AndDESede
-Cipher.PBEWithSHA1AndRC2_128
-Cipher.PBEWithSHA1AndRC2_40
-Cipher.PBEWithSHA1AndRC4_128
-Cipher.PBEWithSHA1AndRC4_40
-Cipher.RC2
-Cipher.RC2 SupportedKeyFormats
-Cipher.RC2 SupportedModes
-Cipher.RC2 SupportedPaddings
-Cipher.RSA
-Cipher.RSA SupportedKeyClasses
-Cipher.RSA SupportedModes
-Cipher.RSA SupportedPaddings
-KeyAgreement.DiffieHellman
-KeyAgreement.DiffieHellman SupportedKeyClasses
-KeyFactory.DiffieHellman
-KeyGenerator.AES
-KeyGenerator.ARCFOUR
-KeyGenerator.Blowfish
-KeyGenerator.DES
-KeyGenerator.DESede
-KeyGenerator.HmacMD5
-KeyGenerator.HmacSHA1
-KeyGenerator.HmacSHA224
-KeyGenerator.HmacSHA256
-KeyGenerator.HmacSHA384
-KeyGenerator.HmacSHA512
-KeyGenerator.RC2
-KeyGenerator.SunTls12Prf
-KeyGenerator.SunTlsKeyMaterial
-KeyGenerator.SunTlsMasterSecret
-KeyGenerator.SunTlsPrf
-KeyGenerator.SunTlsRsaPremasterSecret
-KeyPairGenerator.DiffieHellman
-KeyStore.JCEKS
-Mac.HmacMD5
-Mac.HmacMD5 SupportedKeyFormats
-Mac.HmacPBESHA1
-Mac.HmacPBESHA1 SupportedKeyFormats
-Mac.HmacSHA1
-Mac.HmacSHA1 SupportedKeyFormats
-Mac.HmacSHA224
-Mac.HmacSHA224 SupportedKeyFormats
-Mac.HmacSHA256
-Mac.HmacSHA256 SupportedKeyFormats
-Mac.HmacSHA384
-Mac.HmacSHA384 SupportedKeyFormats
-Mac.HmacSHA512
-Mac.HmacSHA512 SupportedKeyFormats
-Mac.PBEWithHmacSHA1
-Mac.PBEWithHmacSHA1 SupportedKeyFormatS
-Mac.PBEWithHmacSHA224
-Mac.PBEWithHmacSHA224 SupportedKeyFormats
-Mac.PBEWithHmacSHA256
-Mac.PBEWithHmacSHA256 SupportedKeyFormats
-Mac.PBEWithHmacSHA384
-Mac.PBEWithHmacSHA384 SupportedKeyFormats
-Mac.PBEWithHmacSHA512
-Mac.PBEWithHmacSHA512 SupportedKeyFormats
-Mac.SslMacMD5
-Mac.SslMacMD5 SupportedKeyFormats
-Mac.SslMacSHA1
-Mac.SslMacSHA1 SupportedKeyFormats
-Provider.id className
-Provider.id info
-Provider.id name
-Provider.id version
-SecretKeyFactory.DES
-SecretKeyFactory.DESede
-SecretKeyFactory.PBEWithHmacSHA1AndAES_128
-SecretKeyFactory.PBEWithHmacSHA1AndAES_256
-SecretKeyFactory.PBEWithHmacSHA224AndAES_128
-SecretKeyFactory.PBEWithHmacSHA224AndAES_256
-SecretKeyFactory.PBEWithHmacSHA256AndAES_128
-SecretKeyFactory.PBEWithHmacSHA256AndAES_256
-SecretKeyFactory.PBEWithHmacSHA384AndAES_128
-SecretKeyFactory.PBEWithHmacSHA384AndAES_256
-SecretKeyFactory.PBEWithHmacSHA512AndAES_128
-SecretKeyFactory.PBEWithHmacSHA512AndAES_256
-SecretKeyFactory.PBEWithMD5AndDES
-SecretKeyFactory.PBEWithMD5AndTripleDES
-SecretKeyFactory.PBEWithSHA1AndDESede
-SecretKeyFactory.PBEWithSHA1AndRC2_128
-SecretKeyFactory.PBEWithSHA1AndRC2_40
-SecretKeyFactory.PBEWithSHA1AndRC4_128
-SecretKeyFactory.PBEWithSHA1AndRC4_40
-SecretKeyFactory.PBKDF2WithHmacSHA1
-SecretKeyFactory.PBKDF2WithHmacSHA224
-SecretKeyFactory.PBKDF2WithHmacSHA256
-SecretKeyFactory.PBKDF2WithHmacSHA384
-SecretKeyFactory.PBKDF2WithHmacSHA512
-
-Provider:SunJGSS
-GssApiMechanism.1.2.840.113554.1.2.2
-GssApiMechanism.1.3.6.1.5.5.2
-Provider.id className
-Provider.id info
-Provider.id name
-Provider.id version
-
-Provider:SunSASL
-Provider.id className
-Provider.id info
-Provider.id name
-Provider.id version
-SaslClientFactory.CRAM-MD5
-SaslClientFactory.DIGEST-MD5
-SaslClientFactory.EXTERNAL
-SaslClientFactory.GSSAPI
-SaslClientFactory.NTLM
-SaslClientFactory.PLAIN
-SaslServerFactory.CRAM-MD5
-SaslServerFactory.DIGEST-MD5
-SaslServerFactory.GSSAPI
-SaslServerFactory.NTLM
-
-Provider:XMLDSig
-KeyInfoFactory.DOM
-Provider.id className
-Provider.id info
-Provider.id name
-Provider.id version
-TransformService.http://www.w3.org/2000/09/xmldsig#base64
-TransformService.http://www.w3.org/2000/09/xmldsig#base64 MechanismType
-TransformService.http://www.w3.org/2000/09/xmldsig#enveloped-signature
-TransformService.http://www.w3.org/2000/09/xmldsig#enveloped-signature MechanismType
-TransformService.http://www.w3.org/2001/10/xml-exc-c14n#
-TransformService.http://www.w3.org/2001/10/xml-exc-c14n# MechanismType
-TransformService.http://www.w3.org/2001/10/xml-exc-c14n#WithComments
-TransformService.http://www.w3.org/2001/10/xml-exc-c14n#WithComments MechanismType
-TransformService.http://www.w3.org/2002/06/xmldsig-filter2
-TransformService.http://www.w3.org/2002/06/xmldsig-filter2 MechanismType
-TransformService.http://www.w3.org/2006/12/xml-c14n11
-TransformService.http://www.w3.org/2006/12/xml-c14n11 MechanismType
-TransformService.http://www.w3.org/2006/12/xml-c14n11#WithComments
-TransformService.http://www.w3.org/2006/12/xml-c14n11#WithComments MechanismType
-TransformService.http://www.w3.org/TR/1999/REC-xpath-19991116
-TransformService.http://www.w3.org/TR/1999/REC-xpath-19991116 MechanismType
-TransformService.http://www.w3.org/TR/1999/REC-xslt-19991116
-TransformService.http://www.w3.org/TR/1999/REC-xslt-19991116 MechanismType
-TransformService.http://www.w3.org/TR/2001/REC-xml-c14n-20010315
-TransformService.http://www.w3.org/TR/2001/REC-xml-c14n-20010315 MechanismType
-TransformService.http://www.w3.org/TR/2001/REC-xml-c14n-20010315#WithComments
-TransformService.http://www.w3.org/TR/2001/REC-xml-c14n-20010315#WithComments MechanismType
-XMLSignatureFactory.DOM
-
-Provider:SunPCSC
-Provider.id className
-Provider.id info
-Provider.id name
-Provider.id version
-TerminalFactory.PC/SC
-.E.E.Skipping testAesEax
-.E.E.Skipping testAesEax
-.E..java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
-java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported
-java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported
-java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported
-java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported
-..Encoded ECPrivateKey:308187020100301306072a8648ce3d020106082a8648ce3d030107046d306b0201010420681c3fd33297cc7085e6a2ab96b013854f440318fd05cd2f0bd998bc5e8fcb8ea14403420004db0e5d4ff1aefa02fd9e89f98bb7691c490dc89dfe41c18c73b4461fecc35eea6ba7a6e242e2e3cf8038beac5473113635c24492b1867f25362c01a63205add4
+...Skipping testAesEax
+..E.Skipping testAesEax
+...java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
+java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
+java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
+java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
+java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
+..Encoded ECPrivateKey:308187020100301306072a8648ce3d020106082a8648ce3d030107046d306b020101042009043bf963fecbd3720c4a91b13c2fb77904e8a7c5cd80bd6f2bfb7a85f68aa8a1440342000482e5fd623eb25a628520acaed428ca2684c04f93e53b4ae475fdbe7a159a49d5c5b368f7ce6e5d8f4ee647f1381dd7c0872ccae7642b56deb76534be3813f13c
...testWrongOrder: ECDHC not supported
testWrongOrder: ECDHC not supported
-..testModifiedPublic:public point not on curve throws java.security.InvalidKeyException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
-testModifiedPublic:public point = (0,0) throws java.security.InvalidKeyException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
-testModifiedPublic:order = 1 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported
-testModifiedPublic:order = 26959946660873538060741835960514744168612397095220107664918121663170 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported
-testModifiedPublic:generator = (0,0) throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported
-testModifiedPublic:generator not on curve throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported
-testModifiedPublic:cofactor = 2 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported
-testModifiedPublic:cofactor = None throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported
-testModifiedPublic:modified prime throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported
-testModifiedPublic:using secp224r1 throws java.security.InvalidKeyException: error:0f000080:elliptic curve routines:OPENSSL_internal:DECODE_ERROR
-testModifiedPublic:a = 0 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported
-testModifiedPublic:new curve with generator of order 3 that is also on secp256r1 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported
-testModifiedPublic:order = -115792089210356248762697446949407573529996955224135760342422259061068512044369 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported
-testModifiedPublic:order = 0 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported
-testModifiedPublic:cofactor = -1 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported
-testModifiedPublic:cofactor = 0 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: IOException: Only named ECParameters supported
+..testModifiedPublic:public point not on curve throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
+testModifiedPublic:public point = (0,0) throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
+testModifiedPublic:order = 1 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
+testModifiedPublic:order = 26959946660873538060741835960514744168612397095220107664918121663170 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
+testModifiedPublic:generator = (0,0) throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
+testModifiedPublic:generator not on curve throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
+testModifiedPublic:cofactor = 2 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
+testModifiedPublic:cofactor = None throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
+testModifiedPublic:modified prime throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
+testModifiedPublic:using secp224r1 throws java.security.InvalidKeyException: error:06000066:public key routines:OPENSSL_internal:DECODE_ERROR
+testModifiedPublic:a = 0 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
+testModifiedPublic:new curve with generator of order 3 that is also on secp256r1 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
+testModifiedPublic:order = -115792089210356248762697446949407573529996955224135760342422259061068512044369 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
+testModifiedPublic:order = 0 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
+testModifiedPublic:cofactor = -1 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
+testModifiedPublic:cofactor = 0 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
testWrongOrder: ECDHC not supported
.Generated shared secret with a modified order:ECDH
-expected:05c5ab197b2ce0e92560b94d35a8b0fd74b17fa67bdfea442ea7196cf23ba6d6 computed:05c5ab197b2ce0e92560b94d35a8b0fd74b17fa67bdfea442ea7196cf23ba6d6
+expected:5495f74745ffbab9deb9338f48680a941e5f030f861469d03dd9f071501348bf computed:5495f74745ffbab9deb9338f48680a941e5f030f861469d03dd9f071501348bf
testWrongOrder: can't modify order.
-..testModifiedPublic:public point not on curve throws java.security.InvalidKeyException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
-testModifiedPublic:public point = (0,0) throws java.security.InvalidKeyException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
-testModifiedPublic:order = 1 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: EC parameters error
-testModifiedPublic:order = 26959946660873538060741835960514744168612397095220107664918121663170 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: EC parameters error
-testModifiedPublic:generator = (0,0) throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: EC parameters error
-testModifiedPublic:generator not on curve throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: EC parameters error
-testModifiedPublic:cofactor = 2 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: EC parameters error
+..testModifiedPublic:public point not on curve throws java.security.spec.InvalidKeySpecException: java.lang.RuntimeException: error:0f000078:elliptic curve routines:OPENSSL_internal:POINT_IS_NOT_ON_CURVE
+testModifiedPublic:public point = (0,0) throws java.security.spec.InvalidKeySpecException: java.lang.RuntimeException: error:0f000078:elliptic curve routines:OPENSSL_internal:POINT_IS_NOT_ON_CURVE
+testModifiedPublic:generator = (0,0) throws java.security.spec.InvalidKeySpecException: java.security.InvalidAlgorithmParameterException: EC_GROUP_new_arbitrary failed
+testModifiedPublic:generator not on curve throws java.security.spec.InvalidKeySpecException: java.security.InvalidAlgorithmParameterException: EC_GROUP_new_arbitrary failed
modified prime throws java.lang.IllegalArgumentException: first coefficient is too large
-testModifiedPublic:using secp224r1 throws java.security.InvalidKeyException: error:0f000078:elliptic curve routines:OPENSSL_internal:POINT_IS_NOT_ON_CURVE
-testModifiedPublic:a = 0 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: EC parameters error
-testModifiedPublic:new curve with generator of order 3 that is also on secp256r1 throws java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: EC parameters error
+testModifiedPublic:using secp224r1 throws java.security.InvalidKeyException: error:0f00006a:elliptic curve routines:OPENSSL_internal:INCOMPATIBLE_OBJECTS
+testModifiedPublic:a = 0 throws java.security.InvalidKeyException: error:0f00006a:elliptic curve routines:OPENSSL_internal:INCOMPATIBLE_OBJECTS
+testModifiedPublic:new curve with generator of order 3 that is also on secp256r1 throws java.security.InvalidKeyException: error:0f00006a:elliptic curve routines:OPENSSL_internal:INCOMPATIBLE_OBJECTS
order = -115792089210356248762697446949407573529996955224135760342422259061068512044369 throws java.lang.IllegalArgumentException: n is not positive
order = 0 throws java.lang.IllegalArgumentException: n is not positive
cofactor = -1 throws java.lang.IllegalArgumentException: h is not positive
@@ -611,49 +223,49 @@ Hash:185f8db32271fe25f561a6fc938b2e264306ec304eda518007d1764826381969
Curve:secp256r1
Order:115792089210356248762697446949407573529996955224135760342422259061068512044369
Private key:
-S:51960316606265081544687965366214918106270765247170103551400791125721595126581
-encoded:308187020100301306072a8648ce3d020106082a8648ce3d030107046d306b020101042072e07f3b79eaff36061f39f5f0044ae871115d38f6f9ac4ba8ac441245fa2335a14403420004097d292e4cba7d6ca74301ef2584a64d7ba2b6cc01d03e8bc65ed44f038097d960b8603c58575b937fedbd240c53d04421b93f034732f8e91624ec5d28fccecf
+S:35446506914683346530403638171900547563459317474911942713041797056668754056248
+encoded:308187020100301306072a8648ce3d020106082a8648ce3d030107046d306b02010104204e5e030eaeeb3aa7c1aeab08f0feb2fd9df959e4293ee48284b9b92097951438a144034200046593cf246197630c8ba122f865d09d40fc0634d10637b2bd75e5ef4012ade7882de268f362aa4b811e85f654a527da79a57776d955b978bfb17a0cd2ca0500ec
Public key:
-X:4291955740184912316612093208454070108183248153202999420950575102305702549465
-Y:43747797518462306471831980660987368580663604532726865985179372866304147771087
-encoded:3059301306072a8648ce3d020106082a8648ce3d03010703420004097d292e4cba7d6ca74301ef2584a64d7ba2b6cc01d03e8bc65ed44f038097d960b8603c58575b937fedbd240c53d04421b93f034732f8e91624ec5d28fccecf
-Signature:304402205b8c5f99166b58a1c58a748d146be9c1301ba1c4aace02f3f6b0263e51b5725402201d0d1a8a8e1785a5d02c1d693cc5dbc11add1f97a0987ce2e9db742ba4e2c346
-r:41408487603282030415343416996443145046407776240712836945244840544568742343252
-s:13140224801598522712283509237813148947023737148337037593170219640474801718086
-.Conscrypt curve:secp256r1 countLsb:494 countMsb:501
-Conscrypt curve:secp224r1 countLsb:483 countMsb:519
-Conscrypt curve:secp384r1 countLsb:511 countMsb:514
-Conscrypt curve:secp521r1 countLsb:500 countMsb:556
-Conscrypt curve:brainpoolP256r1 countLsb:486 countMsb:515
+X:45944753867761762640785745519970608771737193196590969312340380353191253763976
+Y:20754109966164668529577403496795897606565336313761112970930558747150997848300
+encoded:3059301306072a8648ce3d020106082a8648ce3d030107034200046593cf246197630c8ba122f865d09d40fc0634d10637b2bd75e5ef4012ade7882de268f362aa4b811e85f654a527da79a57776d955b978bfb17a0cd2ca0500ec
+Signature:3045022100eb951e82690732883537334c718e2f8ed305d72b7d27db02faba757312c57817022030f56d08a750b23a697bec61a2d5820e45981a0d1ef1bdc82b85d774d3ed87ee
+r:106556990197963802439402594362813815957037061304716438936315130732644630099991
+s:22144646786519213512751131383531344929972872558418278740719195820285106161646
+.Conscrypt curve:secp256r1 countLsb:521 countMsb:514
+Conscrypt curve:secp224r1 countLsb:521 countMsb:518
+Conscrypt curve:secp384r1 countLsb:537 countMsb:531
+Conscrypt curve:secp521r1 countLsb:487 countMsb:508
+Conscrypt curve:brainpoolP256r1 countLsb:502 countMsb:492
..testTiming algorithm:SHA256WithECDSA
-count:50000 cutoff:349931 relative average:1.004052121107007 sigmas:1.5693797564253769
-count:25041 cutoff:39318 relative average:1.0049570790859916 sigmas:1.358664753986472
-count:12519 cutoff:39093 relative average:1.0007022957313807 sigmas:0.1361023035683595
-count:6284 cutoff:38972 relative average:1.0037075224257037 sigmas:0.5090524150510641
-count:3127 cutoff:38892 relative average:0.9946437369037198 sigmas:0.5187838754423801
-count:1563 cutoff:38837 relative average:0.9841092671223877 sigmas:1.0881381668779933
-count:787 cutoff:38794 relative average:1.0025121166169606 sigmas:0.12206405403439706
-count:394 cutoff:38759 relative average:1.0155271597632511 sigmas:0.5338272753902615
-count:197 cutoff:38727 relative average:1.0114321373712922 sigmas:0.27792087910370167
-count:99 cutoff:38699 relative average:1.025476906150289 sigmas:0.43906105026091863
-count:49 cutoff:38671 relative average:1.0740730863402321 sigmas:0.8980884431030283
-count:25 cutoff:38647 relative average:1.115231075531731 sigmas:0.9979303871588238
-count:13 cutoff:38632 relative average:1.256567375195096 sigmas:1.6022627445477065
-..................testDefaultSize: keysize=2048
+count:50000 cutoff:3513776 relative average:1.0006529890343518 sigmas:0.2529015655300517
+count:25017 cutoff:39395 relative average:1.0032386524393044 sigmas:0.8872430073247648
+count:12534 cutoff:39147 relative average:1.0056248022282215 sigmas:1.0907186258648822
+count:6278 cutoff:39032 relative average:1.010747264180705 sigmas:1.4749225226851859
+count:3157 cutoff:38963 relative average:1.016795980503624 sigmas:1.6345690827771184
+count:1566 cutoff:38912 relative average:1.021543613180642 sigmas:1.4766414287784124
+count:782 cutoff:38872 relative average:1.0298976488843237 sigmas:1.4481082946620267
+count:395 cutoff:38836 relative average:1.0029412280419474 sigmas:0.1012483310369333
+count:199 cutoff:38807 relative average:0.9816443378109576 sigmas:0.44849460379780326
+count:99 cutoff:38780 relative average:1.0502446057744175 sigmas:0.8658998565652437
+count:49 cutoff:38750 relative average:1.0533378078570317 sigmas:0.6466865522090766
+count:25 cutoff:38734 relative average:1.0102438228046235 sigmas:0.08871410780670433
+count:13 cutoff:38709 relative average:1.0317081761622526 sigmas:0.19801749666613208
+............testDefaultSize: keysize=2048
....Message:Hello
Hash:185f8db32271fe25f561a6fc938b2e264306ec304eda518007d1764826381969
Public key:
-Modulus:17448444141705520141592074532543626434330358064825014667079186856037254320751463330289974621932458298460071535848147068624915855931652124162238545831147370424164620631691894029860086969496672516076436652149013177819041708252999529687845510723103811501421773868041322444710543703527073582620521032194035154742093517992300806456886438475508084682993410545269132715562208881150695251881475998028534644015899709088585213827980997160888082724558327667765325260133726161824319778649061999799754536159363118674949772223426038124960618692485773895463837344164368862130671724525958049064814621336064770661117489043635928213309
+Modulus:20161514534357158053797782876901771294883512885129638044632678560541698291134791039558949921703553093499919544784894267310648359617611317061384794776233445866705863568051269385419128276901313970882210664258408736595093130253122378995361693118088838660075788306938212836031406642425995867321209708546696570248240027355713549660446933212870690167008803704515417643556110056997589761254347294716825383632642870403790159198501658920815284345591722858738405709554614961562876006234488784651496230852750310811459370599208641684832431967661590973338751761536267366151031893092602051914168721998699068112783392381236707100137
E:65537
-encoded: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
+encoded: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
Private key:
-D:4129751763188201713174320828105504698660532967980426553067714526411368698541836267265711603340179240681804166017799613271516582987988799059196533311867226701472901001395987217055628713968409230406024797134586842665060430864494899137174659193759628486264306351436943605919215079378979841567636785188180360754655884315969817414746083253983094185795012303890653444438022340019166634498713401826143459439183131578375380811892933591146870398083406586766234055046579606480448266980283357358323690846429897133348495513379450435310977451969066231688251183984483012516818914018943611708431794254439466402449805377435576417155
-encoded:308204bd020100300d06092a864886f70d0101010500048204a7308204a302010002820101008a37e2a1682886ffd2e99ba89c33641e9fa68209466f83b6eebbb7c21a62a42c241d241de1602d15920b693c4deae931a01b594eebeec3db275e1de69cba852cb3736fb8f7352cd3d2022dbef23ea2d6bc73ef6c1e795d4191f95504d2d929538fb50f1d1175c60b98c86099feedf02e03e3fd64496e456f48db1822e9126fc1981274b8c5a99bc6f35744462eb87e8f801a302c423480da135e6117bec25e1b71816fe46aadf3f031f75e4db38c6eda9937c44afe45c130d7be747b076d137c034597c97560c3664caf511480f2c4ab5573d0f35b81499b1f61ce54d909ffeca017135c25ea930ba2e8de8d0ac86110237c83e35963ebf0b11ef42a1cfea73d02030100010282010020b6c479ae74f52ae4a92d11f5d2860e677c1a0806f74ae607d03f587e353da542f0f0c4efbc7b3f413f592b90479ae5077fa19e37e25dd1e799f39acb1aac7d9d85a37a546c6e0d3e860c7cc6ca43716ece43eb43b536f8d78b7b6f765636dd53c4a76c9a5ed53e966d4acbf8162a0442207aaf7b5fd1a85ac69c8a5abee5db43be77431de155e14cdd45f84b1d87917a340e42a4005096fb98aa8da71d7a6cc17b240e5f2db39b94d3f6c9fa5a273c908d65eaedf890017b29746891e9d8d1d3c3440992ba8dc84c5a1161eb4e7fc29fde7b4a980b3112ca505208c58000c1e8ab45091da1e621a4391975064d933945195d530baeaf241d4286b34d49bb8302818100c3736d2c25a7c2df67fabf1a9948585757792009aed3b156eec3405ab2d3d94c15869447d64b27557740f14562f1b1af9b7417e659ef234be559825ffc9ee6f9e328c87c8005d4fd09cba3bcaf8f8922ebc4aca098778a6632cbcec41fb90e84fb9c8b8c976825cf443b52ca49b83e73fff0596d8185e2a3b64d2b0ed7f19dcf02818100b50987696b7e1e032284eec4ed9cedf73c775dd721d2ecd9ecf3d139c9d6f9afc7d9db941385bbb5408cd370a66c27bf1587d293e4f7ba63371e17e8499667447b6915f4d6fc67b57b75692a6bbdd678234b17bac5a633a88f7c56575b174a6968dd18b99a8e9c478b9d3007b61a51518718c382b538cd6736ddd585311d1933028180562d2e95a884af8791711d91bcc4092f79820e7e36776059d42c82d37ac5ada9be53f84d344f2ea8a04c221555eafb4d525d7dac333b1d74f94ade1134715ba6126289035bef3659db57ce7a036e6628df8b7811d727ddfdf1a7ab230e59a9ed38836d842fbddbede747c0d93067ec217957a01688655fe88f18b7437433344102818022a107fdea49dd83cbfe918da9c5f2deeffa0541397f173f384c0b217ab25c607b61f8d682457a7a593696db5d7a22c0326620a9998aa964810e88942e3f4ed192a9af417e3e19b8653d38389d135b0aeff5553cacc1f5efb042a06165533730a296683c588c1ee8b09408b3f0e967d4a87adc2b0c6f291b2d2b91c44078c87102818100c263dc6078f2cc9097b8b964838333b668b5c649a35deffcd3a322e09c148b2d9591348df11b3b4d33721785a9d68fd4f5e9d241dbfcd08416b74bb56527bb6591f6088e7fb654b81d3d48f8860fca33ead4f1344c0768c4aa62d1ad321a8b400fde9b0d1252863341bbda6e699397208f3e75a1880f9bbcfe4fc7b89ca3fb7e
-Signature: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
+D:1645004479818138050310056830317423692823380140607740009981569043942453822837031163865932144724801627770838530690312737398368317758903705008720109920613001715225642445706427670189090646179418513676242442810256437077652497684453188902191858240775448106033084502254838619214625923809640453507687849825691185670054822894502206168135664522324631961450051405175412167871383767390414024050401546504867964293458950121447131863364925887750624971873357974296240438133273301569898477173768025601335903767677796483230186855406867702602352566747891809434473893943857507036835210458421672291159647019330643713088646581444517435013
+encoded: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
+Signature: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
..Rejected legacy signature:253e1d19bbe91064f2364c1e7db3ba8eb6dc5b19202e440eab6fbdf28c8c6ec05b812983713c338c72b6e99b8edf506a89ff9fc8e5c2c52362097a56dc228060eca01e1ff318c6c81617691438703411c1f953b21cd74331f87c9b8b189fdffdfe8550bd2bd1d47be915f8604a0f472199dd705e19b1b815f99b68d60bc257c7
-Time: 116.574
-There were 7 failures:
+Time: 10
+There were 3 failures:
1) testByteBufferShiftedAlias(com.google.security.wycheproof.AesGcmTest)
java.lang.AssertionError: Overlapping buffers test failed with buffer type: direct buffers and output offset -1
at com.google.security.wycheproof.AesGcmTest.testByteBufferShiftedAlias(AesGcmTest.java:583)
@@ -737,184 +349,11 @@ java.lang.AssertionError: ciphertext size:32 expected:<16> but was:<32>
at com.google.testing.junit.runner.junit4.JUnit4Runner.run(JUnit4Runner.java:112)
at com.google.testing.junit.runner.BazelTestRunner.runTestsInSuite(BazelTestRunner.java:144)
at com.google.testing.junit.runner.BazelTestRunner.main(BazelTestRunner.java:82)
-3) testEmptyPlaintext(com.google.security.wycheproof.CipherInputStreamTest)
-java.security.InvalidKeyException: Illegal key size
- at javax.crypto.Cipher.checkCryptoPerm(Cipher.java:1039)
- at javax.crypto.Cipher.implInit(Cipher.java:805)
- at javax.crypto.Cipher.chooseProvider(Cipher.java:864)
- at javax.crypto.Cipher.init(Cipher.java:1396)
- at javax.crypto.Cipher.init(Cipher.java:1327)
- at com.google.security.wycheproof.CipherInputStreamTest$TestVector.<init>(CipherInputStreamTest.java:77)
- at com.google.security.wycheproof.CipherInputStreamTest.getTestVectors(CipherInputStreamTest.java:97)
- at com.google.security.wycheproof.CipherInputStreamTest.testEmptyPlaintext(CipherInputStreamTest.java:261)
- at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
- at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
- at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
- at java.lang.reflect.Method.invoke(Method.java:498)
- at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:47)
- at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
- at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:44)
- at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
- at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:271)
- at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:70)
- at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:50)
- at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238)
- at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63)
- at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236)
- at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53)
- at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229)
- at org.junit.runners.ParentRunner.run(ParentRunner.java:309)
- at org.junit.runners.Suite.runChild(Suite.java:127)
- at org.junit.runners.Suite.runChild(Suite.java:26)
- at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238)
- at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63)
- at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236)
- at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53)
- at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229)
- at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
- at org.junit.runners.ParentRunner.run(ParentRunner.java:309)
- at com.google.testing.junit.runner.internal.junit4.CancellableRequestFactory$CancellableRunner.run(CancellableRequestFactory.java:89)
- at org.junit.runner.JUnitCore.run(JUnitCore.java:160)
- at org.junit.runner.JUnitCore.run(JUnitCore.java:138)
- at com.google.testing.junit.runner.junit4.JUnit4Runner.run(JUnit4Runner.java:112)
- at com.google.testing.junit.runner.BazelTestRunner.runTestsInSuite(BazelTestRunner.java:144)
- at com.google.testing.junit.runner.BazelTestRunner.main(BazelTestRunner.java:82)
-4) testCorruptAesGcm(com.google.security.wycheproof.CipherInputStreamTest)
-java.security.InvalidKeyException: Illegal key size
- at javax.crypto.Cipher.checkCryptoPerm(Cipher.java:1039)
- at javax.crypto.Cipher.implInit(Cipher.java:805)
- at javax.crypto.Cipher.chooseProvider(Cipher.java:864)
- at javax.crypto.Cipher.init(Cipher.java:1396)
- at javax.crypto.Cipher.init(Cipher.java:1327)
- at com.google.security.wycheproof.CipherInputStreamTest$TestVector.<init>(CipherInputStreamTest.java:77)
- at com.google.security.wycheproof.CipherInputStreamTest.getTestVectors(CipherInputStreamTest.java:97)
- at com.google.security.wycheproof.CipherInputStreamTest.testCorruptAesGcm(CipherInputStreamTest.java:244)
- at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
- at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
- at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
- at java.lang.reflect.Method.invoke(Method.java:498)
- at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:47)
- at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
- at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:44)
- at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
- at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:271)
- at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:70)
- at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:50)
- at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238)
- at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63)
- at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236)
- at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53)
- at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229)
- at org.junit.runners.ParentRunner.run(ParentRunner.java:309)
- at org.junit.runners.Suite.runChild(Suite.java:127)
- at org.junit.runners.Suite.runChild(Suite.java:26)
- at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238)
- at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63)
- at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236)
- at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53)
- at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229)
- at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
- at org.junit.runners.ParentRunner.run(ParentRunner.java:309)
- at com.google.testing.junit.runner.internal.junit4.CancellableRequestFactory$CancellableRunner.run(CancellableRequestFactory.java:89)
- at org.junit.runner.JUnitCore.run(JUnitCore.java:160)
- at org.junit.runner.JUnitCore.run(JUnitCore.java:138)
- at com.google.testing.junit.runner.junit4.JUnit4Runner.run(JUnit4Runner.java:112)
- at com.google.testing.junit.runner.BazelTestRunner.runTestsInSuite(BazelTestRunner.java:144)
- at com.google.testing.junit.runner.BazelTestRunner.main(BazelTestRunner.java:82)
-5) testAesGcm(com.google.security.wycheproof.CipherInputStreamTest)
-java.security.InvalidKeyException: Illegal key size
- at javax.crypto.Cipher.checkCryptoPerm(Cipher.java:1039)
- at javax.crypto.Cipher.implInit(Cipher.java:805)
- at javax.crypto.Cipher.chooseProvider(Cipher.java:864)
- at javax.crypto.Cipher.init(Cipher.java:1396)
- at javax.crypto.Cipher.init(Cipher.java:1327)
- at com.google.security.wycheproof.CipherInputStreamTest$TestVector.<init>(CipherInputStreamTest.java:77)
- at com.google.security.wycheproof.CipherInputStreamTest.getTestVectors(CipherInputStreamTest.java:97)
- at com.google.security.wycheproof.CipherInputStreamTest.testAesGcm(CipherInputStreamTest.java:231)
- at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
- at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
- at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
- at java.lang.reflect.Method.invoke(Method.java:498)
- at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:47)
- at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
- at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:44)
- at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
- at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:271)
- at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:70)
- at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:50)
- at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238)
- at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63)
- at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236)
- at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53)
- at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229)
- at org.junit.runners.ParentRunner.run(ParentRunner.java:309)
- at org.junit.runners.Suite.runChild(Suite.java:127)
- at org.junit.runners.Suite.runChild(Suite.java:26)
- at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238)
- at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63)
- at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236)
- at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53)
- at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229)
- at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
- at org.junit.runners.ParentRunner.run(ParentRunner.java:309)
- at com.google.testing.junit.runner.internal.junit4.CancellableRequestFactory$CancellableRunner.run(CancellableRequestFactory.java:89)
- at org.junit.runner.JUnitCore.run(JUnitCore.java:160)
- at org.junit.runner.JUnitCore.run(JUnitCore.java:138)
- at com.google.testing.junit.runner.junit4.JUnit4Runner.run(JUnit4Runner.java:112)
- at com.google.testing.junit.runner.BazelTestRunner.runTestsInSuite(BazelTestRunner.java:144)
- at com.google.testing.junit.runner.BazelTestRunner.main(BazelTestRunner.java:82)
-6) testEmptyPlaintext(com.google.security.wycheproof.CipherOutputStreamTest)
-java.security.InvalidKeyException: Illegal key size
- at javax.crypto.Cipher.checkCryptoPerm(Cipher.java:1039)
- at javax.crypto.Cipher.implInit(Cipher.java:805)
- at javax.crypto.Cipher.chooseProvider(Cipher.java:864)
- at javax.crypto.Cipher.init(Cipher.java:1396)
- at javax.crypto.Cipher.init(Cipher.java:1327)
- at com.google.security.wycheproof.CipherOutputStreamTest$TestVector.<init>(CipherOutputStreamTest.java:76)
- at com.google.security.wycheproof.CipherOutputStreamTest.getTestVectors(CipherOutputStreamTest.java:96)
- at com.google.security.wycheproof.CipherOutputStreamTest.testEmptyPlaintext(CipherOutputStreamTest.java:217)
- at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
- at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
- at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
- at java.lang.reflect.Method.invoke(Method.java:498)
- at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:47)
- at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
- at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:44)
- at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
- at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:271)
- at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:70)
- at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:50)
- at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238)
- at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63)
- at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236)
- at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53)
- at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229)
- at org.junit.runners.ParentRunner.run(ParentRunner.java:309)
- at org.junit.runners.Suite.runChild(Suite.java:127)
- at org.junit.runners.Suite.runChild(Suite.java:26)
- at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238)
- at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63)
- at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236)
- at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53)
- at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229)
- at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
- at org.junit.runners.ParentRunner.run(ParentRunner.java:309)
- at com.google.testing.junit.runner.internal.junit4.CancellableRequestFactory$CancellableRunner.run(CancellableRequestFactory.java:89)
- at org.junit.runner.JUnitCore.run(JUnitCore.java:160)
- at org.junit.runner.JUnitCore.run(JUnitCore.java:138)
- at com.google.testing.junit.runner.junit4.JUnit4Runner.run(JUnit4Runner.java:112)
- at com.google.testing.junit.runner.BazelTestRunner.runTestsInSuite(BazelTestRunner.java:144)
- at com.google.testing.junit.runner.BazelTestRunner.main(BazelTestRunner.java:82)
-7) testAesGcm(com.google.security.wycheproof.CipherOutputStreamTest)
-java.security.InvalidKeyException: Illegal key size
- at javax.crypto.Cipher.checkCryptoPerm(Cipher.java:1039)
- at javax.crypto.Cipher.implInit(Cipher.java:805)
- at javax.crypto.Cipher.chooseProvider(Cipher.java:864)
- at javax.crypto.Cipher.init(Cipher.java:1396)
- at javax.crypto.Cipher.init(Cipher.java:1327)
- at com.google.security.wycheproof.CipherOutputStreamTest$TestVector.<init>(CipherOutputStreamTest.java:76)
- at com.google.security.wycheproof.CipherOutputStreamTest.getTestVectors(CipherOutputStreamTest.java:96)
- at com.google.security.wycheproof.CipherOutputStreamTest.testAesGcm(CipherOutputStreamTest.java:198)
+3) testEmptyPlaintext(com.google.security.wycheproof.CipherOutputStreamTest)
+java.lang.AssertionError: this should fail; decrypted: pt:
+ at org.junit.Assert.fail(Assert.java:88)
+ at com.google.security.wycheproof.CipherOutputStreamTest.testCorruptDecryptEmpty(CipherOutputStreamTest.java:186)
+ at com.google.security.wycheproof.CipherOutputStreamTest.testEmptyPlaintext(CipherOutputStreamTest.java:227)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
@@ -949,12 +388,12 @@ java.security.InvalidKeyException: Illegal key size
at com.google.testing.junit.runner.BazelTestRunner.main(BazelTestRunner.java:82)
FAILURES!!!
-Tests run: 69, Failures: 7
+Tests run: 63, Failures: 3
BazelTestRunner exiting with a return value of 1
JVM shutdown hooks (if any) will run now.
The JVM will exit once they complete.
--- JVM shutdown starting at 2018-04-06 18:01:29 --
+-- JVM shutdown starting at 2018-04-06 18:25:16 --
diff --git a/testlogs/index.html b/testlogs/index.html
index c5506c9..d1b7465 100644
--- a/testlogs/index.html
+++ b/testlogs/index.html
@@ -1,3 +1,3 @@
<html><body><ul>
-<li><a href="ConscryptAllTests_1_0_1.txt">ConscryptAllTests_1_0_1.txt (7 failures)</a></li>
+<li><a href="ConscryptAllTests_1_0_1.txt">ConscryptAllTests_1_0_1.txt ()</a></li>
</ul></body></html>