diff options
author | kbuilder <kokoro-team@google.com> | 2018-04-05 17:46:27 -0700 |
---|---|---|
committer | kbuilder <kokoro-team@google.com> | 2018-04-05 17:46:27 -0700 |
commit | a5dc0afddc3254d451418d5b561ea0f0ef14aeeb (patch) | |
tree | b82858da367146b2a9e0d36dace3b802b724d586 | |
parent | d09c45e20e37cd3077e7a53de539950204db543c (diff) | |
download | wycheproof-a5dc0afddc3254d451418d5b561ea0f0ef14aeeb.zip wycheproof-a5dc0afddc3254d451418d5b561ea0f0ef14aeeb.tar.gz wycheproof-a5dc0afddc3254d451418d5b561ea0f0ef14aeeb.tar.bz2 |
Testlogs auto-pushed to gh-pages
-rwxr-xr-x | testlogs/ConscryptAllTests_1_0_1.txt | 572 | ||||
-rw-r--r-- | testlogs/index.html | 1 |
2 files changed, 573 insertions, 0 deletions
diff --git a/testlogs/ConscryptAllTests_1_0_1.txt b/testlogs/ConscryptAllTests_1_0_1.txt new file mode 100755 index 0000000..1fee600 --- /dev/null +++ b/testlogs/ConscryptAllTests_1_0_1.txt @@ -0,0 +1,572 @@ +exec ${PAGER:-/usr/bin/less} "$0" || exit 1 +----------------------------------------------------------------------------- +JUnit4 Test Runner +.testDefaultTagSizeAlgorithmParameterGenerator:java.security.NoSuchAlgorithmException: GCM AlgorithmParameterGenerator not available +......E......E..... +Provider:Conscrypt +AlgorithmParameters.AES +AlgorithmParameters.ChaCha20 +AlgorithmParameters.DESEDE +AlgorithmParameters.EC +AlgorithmParameters.GCM +AlgorithmParameters.OAEP +CertificateFactory.X509 +Cipher.AES/CBC/NoPadding +Cipher.AES/CBC/NoPadding SupportedKeyFormats +Cipher.AES/CBC/PKCS5Padding +Cipher.AES/CBC/PKCS5Padding SupportedKeyFormats +Cipher.AES/CTR/NoPadding +Cipher.AES/CTR/NoPadding SupportedKeyFormats +Cipher.AES/ECB/NoPadding +Cipher.AES/ECB/NoPadding SupportedKeyFormats +Cipher.AES/ECB/PKCS5Padding +Cipher.AES/ECB/PKCS5Padding SupportedKeyFormats +Cipher.AES/GCM/NoPadding +Cipher.AES/GCM/NoPadding SupportedKeyFormats +Cipher.AES_128/CBC/NoPadding +Cipher.AES_128/CBC/NoPadding SupportedKeyFormats +Cipher.AES_128/CBC/PKCS5Padding +Cipher.AES_128/CBC/PKCS5Padding SupportedKeyFormats +Cipher.AES_128/ECB/NoPadding +Cipher.AES_128/ECB/NoPadding SupportedKeyFormats +Cipher.AES_128/ECB/PKCS5Padding +Cipher.AES_128/ECB/PKCS5Padding SupportedKeyFormats +Cipher.AES_128/GCM/NoPadding +Cipher.AES_128/GCM/NoPadding SupportedKeyFormats +Cipher.AES_256/CBC/NoPadding +Cipher.AES_256/CBC/NoPadding SupportedKeyFormats +Cipher.AES_256/CBC/PKCS5Padding +Cipher.AES_256/CBC/PKCS5Padding SupportedKeyFormats +Cipher.AES_256/ECB/NoPadding +Cipher.AES_256/ECB/NoPadding SupportedKeyFormats +Cipher.AES_256/ECB/PKCS5Padding +Cipher.AES_256/ECB/PKCS5Padding SupportedKeyFormats +Cipher.AES_256/GCM/NoPadding +Cipher.AES_256/GCM/NoPadding SupportedKeyFormats +Cipher.ARC4 +Cipher.ARC4 SupportedKeyFormats +Cipher.ChaCha20 +Cipher.ChaCha20 SupportedKeyFormats +Cipher.ChaCha20/Poly1305/NoPadding +Cipher.ChaCha20/Poly1305/NoPadding SupportedKeyFormats +Cipher.DESEDE/CBC/NoPadding +Cipher.DESEDE/CBC/NoPadding SupportedKeyFormats +Cipher.DESEDE/CBC/PKCS5Padding +Cipher.DESEDE/CBC/PKCS5Padding SupportedKeyFormats +Cipher.RSA/ECB/NoPadding +Cipher.RSA/ECB/NoPadding SupportedKeyClasses +Cipher.RSA/ECB/OAEPPadding +Cipher.RSA/ECB/OAEPPadding SupportedKeyClasses +Cipher.RSA/ECB/OAEPWithSHA-1AndMGF1Padding +Cipher.RSA/ECB/OAEPWithSHA-1AndMGF1Padding SupportedKeyClasses +Cipher.RSA/ECB/OAEPWithSHA-224AndMGF1Padding +Cipher.RSA/ECB/OAEPWithSHA-224AndMGF1Padding SupportedKeyClasses +Cipher.RSA/ECB/OAEPWithSHA-256AndMGF1Padding +Cipher.RSA/ECB/OAEPWithSHA-256AndMGF1Padding SupportedKeyClasses +Cipher.RSA/ECB/OAEPWithSHA-384AndMGF1Padding +Cipher.RSA/ECB/OAEPWithSHA-384AndMGF1Padding SupportedKeyClasses +Cipher.RSA/ECB/OAEPWithSHA-512AndMGF1Padding +Cipher.RSA/ECB/OAEPWithSHA-512AndMGF1Padding SupportedKeyClasses +Cipher.RSA/ECB/PKCS1Padding +Cipher.RSA/ECB/PKCS1Padding SupportedKeyClasses +KeyAgreement.ECDH +KeyAgreement.ECDH SupportedKeyClasses +KeyAgreement.ECDH SupportedKeyFormats +KeyFactory.EC +KeyFactory.RSA +KeyGenerator.AES +KeyGenerator.ChaCha20 +KeyGenerator.DESEDE +KeyGenerator.HmacMD5 +KeyGenerator.HmacSHA1 +KeyGenerator.HmacSHA224 +KeyGenerator.HmacSHA256 +KeyGenerator.HmacSHA384 +KeyGenerator.HmacSHA512 +KeyPairGenerator.EC +KeyPairGenerator.RSA +Mac.HmacMD5 +Mac.HmacMD5 SupportedKeyClasses +Mac.HmacMD5 SupportedKeyFormats +Mac.HmacSHA1 +Mac.HmacSHA1 SupportedKeyClasses +Mac.HmacSHA1 SupportedKeyFormats +Mac.HmacSHA224 +Mac.HmacSHA224 SupportedKeyClasses +Mac.HmacSHA224 SupportedKeyFormats +Mac.HmacSHA256 +Mac.HmacSHA256 SupportedKeyClasses +Mac.HmacSHA256 SupportedKeyFormats +Mac.HmacSHA384 +Mac.HmacSHA384 SupportedKeyClasses +Mac.HmacSHA384 SupportedKeyFormats +Mac.HmacSHA512 +Mac.HmacSHA512 SupportedKeyClasses +Mac.HmacSHA512 SupportedKeyFormats +MessageDigest.MD5 +MessageDigest.SHA-1 +MessageDigest.SHA-224 +MessageDigest.SHA-256 +MessageDigest.SHA-384 +MessageDigest.SHA-512 +Provider.id className +Provider.id info +Provider.id name +Provider.id version +SSLContext.Default +SSLContext.SSL +SSLContext.TLS +SSLContext.TLSv1 +SSLContext.TLSv1.1 +SSLContext.TLSv1.2 +SecretKeyFactory.DESEDE +SecureRandom.SHA1PRNG +SecureRandom.SHA1PRNG ImplementedIn +Signature.MD5WithRSA +Signature.MD5WithRSA SupportedKeyClasses +Signature.MD5WithRSA SupportedKeyFormats +Signature.NONEwithECDSA +Signature.NONEwithECDSA SupportedKeyClasses +Signature.NONEwithECDSA SupportedKeyFormats +Signature.NONEwithRSA +Signature.NONEwithRSA SupportedKeyClasses +Signature.SHA1WithRSA +Signature.SHA1WithRSA SupportedKeyClasses +Signature.SHA1WithRSA SupportedKeyFormats +Signature.SHA1withECDSA +Signature.SHA1withECDSA SupportedKeyClasses +Signature.SHA1withECDSA SupportedKeyFormats +Signature.SHA1withRSA/PSS +Signature.SHA1withRSA/PSS SupportedKeyClasses +Signature.SHA1withRSA/PSS SupportedKeyFormats +Signature.SHA224WithRSA +Signature.SHA224WithRSA SupportedKeyClasses +Signature.SHA224WithRSA SupportedKeyFormats +Signature.SHA224withECDSA +Signature.SHA224withECDSA SupportedKeyClasses +Signature.SHA224withECDSA SupportedKeyFormats +Signature.SHA224withRSA/PSS +Signature.SHA224withRSA/PSS SupportedKeyClasses +Signature.SHA224withRSA/PSS SupportedKeyFormats +Signature.SHA256WithRSA +Signature.SHA256WithRSA SupportedKeyClasses +Signature.SHA256WithRSA SupportedKeyFormats +Signature.SHA256withECDSA +Signature.SHA256withECDSA SupportedKeyClasses +Signature.SHA256withECDSA SupportedKeyFormats +Signature.SHA256withRSA/PSS +Signature.SHA256withRSA/PSS SupportedKeyClasses +Signature.SHA256withRSA/PSS SupportedKeyFormats +Signature.SHA384WithRSA +Signature.SHA384WithRSA SupportedKeyClasses +Signature.SHA384WithRSA SupportedKeyFormats +Signature.SHA384withECDSA +Signature.SHA384withECDSA SupportedKeyClasses +Signature.SHA384withECDSA SupportedKeyFormats +Signature.SHA384withRSA/PSS +Signature.SHA384withRSA/PSS SupportedKeyClasses +Signature.SHA384withRSA/PSS SupportedKeyFormats +Signature.SHA512WithRSA +Signature.SHA512WithRSA SupportedKeyClasses +Signature.SHA512WithRSA SupportedKeyFormats +Signature.SHA512withECDSA +Signature.SHA512withECDSA SupportedKeyClasses +Signature.SHA512withECDSA SupportedKeyFormats +Signature.SHA512withRSA/PSS +Signature.SHA512withRSA/PSS SupportedKeyClasses +Signature.SHA512withRSA/PSS SupportedKeyFormats +.E.E.Skipping testAesEax +.E.E.Skipping testAesEax +.E..java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +..Encoded ECPrivateKey:308187020100301306072a8648ce3d020106082a8648ce3d030107046d306b0201010420485cf33db9398288cfb3325f8ff205903186c0f24e76d399ef0f73b89de80d67a14403420004ebb0c6c638880686ac466061d94258e49260bfc1664c6613ff904dc3583a6ea1f732ab007d17d89c4834316a612840113e68f8a2226d6484a28908df5ac43359 +...testWrongOrder: ECDHC not supported +testWrongOrder: ECDHC not supported +..testModifiedPublic:public point not on curve throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:public point = (0,0) throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:order = 1 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:order = 26959946660873538060741835960514744168612397095220107664918121663170 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:generator = (0,0) throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:generator not on curve throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:cofactor = 2 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:cofactor = None throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:modified prime throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:using secp224r1 throws java.security.InvalidKeyException: error:06000066:public key routines:OPENSSL_internal:DECODE_ERROR +testModifiedPublic:a = 0 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:new curve with generator of order 3 that is also on secp256r1 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:order = -115792089210356248762697446949407573529996955224135760342422259061068512044369 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:order = 0 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:cofactor = -1 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testModifiedPublic:cofactor = 0 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key +testWrongOrder: ECDHC not supported +.Generated shared secret with a modified order:ECDH +expected:4f40fc32ad17a270c0114bcd7be21f27e34ff7c95daf44418a8558675a6233e1 computed:4f40fc32ad17a270c0114bcd7be21f27e34ff7c95daf44418a8558675a6233e1 +testWrongOrder: can't modify order. +..testModifiedPublic:public point not on curve throws java.security.spec.InvalidKeySpecException: java.lang.RuntimeException: error:0f000078:elliptic curve routines:OPENSSL_internal:POINT_IS_NOT_ON_CURVE +testModifiedPublic:public point = (0,0) throws java.security.spec.InvalidKeySpecException: java.lang.RuntimeException: error:0f000078:elliptic curve routines:OPENSSL_internal:POINT_IS_NOT_ON_CURVE +testModifiedPublic:generator = (0,0) throws java.security.spec.InvalidKeySpecException: java.security.InvalidAlgorithmParameterException: EC_GROUP_new_arbitrary failed +testModifiedPublic:generator not on curve throws java.security.spec.InvalidKeySpecException: java.security.InvalidAlgorithmParameterException: EC_GROUP_new_arbitrary failed +modified prime throws java.lang.IllegalArgumentException: first coefficient is too large +testModifiedPublic:using secp224r1 throws java.security.InvalidKeyException: error:0f00006a:elliptic curve routines:OPENSSL_internal:INCOMPATIBLE_OBJECTS +testModifiedPublic:a = 0 throws java.security.InvalidKeyException: error:0f00006a:elliptic curve routines:OPENSSL_internal:INCOMPATIBLE_OBJECTS +testModifiedPublic:new curve with generator of order 3 that is also on secp256r1 throws java.security.InvalidKeyException: error:0f00006a:elliptic curve routines:OPENSSL_internal:INCOMPATIBLE_OBJECTS +order = -115792089210356248762697446949407573529996955224135760342422259061068512044369 throws java.lang.IllegalArgumentException: n is not positive +order = 0 throws java.lang.IllegalArgumentException: n is not positive +cofactor = -1 throws java.lang.IllegalArgumentException: h is not positive +cofactor = 0 throws java.lang.IllegalArgumentException: h is not positive +testWrongOrder: ECDHC not supported +.....Message:Hello +Hash:185f8db32271fe25f561a6fc938b2e264306ec304eda518007d1764826381969 +Curve:secp256r1 +Order:115792089210356248762697446949407573529996955224135760342422259061068512044369 +Private key: +S:11218553821959772209868071551392264505308442844378585485404574964544623646988 +encoded:308187020100301306072a8648ce3d020106082a8648ce3d030107046d306b020101042018cd79f861df1c835d017d80ffe7dd2dfa043395f7067a26915290da68ac990ca144034200045b303982f5170d759595e496954c2f7b288160e01610afeeb2dc041546c8f1066983ded58a3ed4840ffd25d08c18fc4b7da77b622ac4527b8b273f157e2e7be7 +Public key: +X:41245674810332432319795966287140084781843665102762030792125851235927353520390 +Y:47725844011445509805355763671072397091315284519244497264545194958796652182503 +encoded:3059301306072a8648ce3d020106082a8648ce3d030107034200045b303982f5170d759595e496954c2f7b288160e01610afeeb2dc041546c8f1066983ded58a3ed4840ffd25d08c18fc4b7da77b622ac4527b8b273f157e2e7be7 +Signature:3045022100fabfbf165cdadce8120f07762b4727e4e772157fccc98e992bf16628fda9f712022024be48bd014698e910af7cbf70c6c5abd03bb6d8aad1c2eed50c9c4c8460b616 +r:113416998771639097990260330106363308580048012880512871203489804684267484739346 +s:16619465512606726355102349992668473395751188823319199685511978765200841029142 +.Conscrypt curve:secp256r1 countLsb:497 countMsb:506 +Conscrypt curve:secp224r1 countLsb:506 countMsb:540 +Conscrypt curve:secp384r1 countLsb:480 countMsb:497 +Conscrypt curve:secp521r1 countLsb:506 countMsb:511 +Conscrypt curve:brainpoolP256r1 countLsb:538 countMsb:518 +..testTiming algorithm:SHA256WithECDSA +count:50000 cutoff:906432 relative average:1.0037454484845443 sigmas:1.4506059604718131 +count:25020 cutoff:43389 relative average:0.9985826439448046 sigmas:0.3883141742599413 +count:12527 cutoff:43120 relative average:1.0053799446807024 sigmas:1.0429463682109181 +count:6268 cutoff:42929 relative average:1.0079703237549325 sigmas:1.0929519872811195 +count:3130 cutoff:42762 relative average:0.9984362066260679 sigmas:0.15153472485394742 +count:1573 cutoff:42655 relative average:1.005988865090826 sigmas:0.41140495555374496 +count:788 cutoff:42589 relative average:1.034887440906563 sigmas:1.6962616755775308 +count:404 cutoff:42537 relative average:1.0425898399770388 sigmas:1.4827137608975502 +count:196 cutoff:42491 relative average:1.0307285548738931 sigmas:0.7451278559865177 +count:99 cutoff:42450 relative average:1.0162929335730406 sigmas:0.2807873328186451 +count:52 cutoff:42423 relative average:1.0087924171079308 sigmas:0.10981725448022167 +count:25 cutoff:42401 relative average:1.0514954394342413 sigmas:0.445963587290959 +count:14 cutoff:42380 relative average:1.0654929519936946 sigmas:0.42444283944440964 +..................testDefaultSize: keysize=2048 +....Message:Hello +Hash:185f8db32271fe25f561a6fc938b2e264306ec304eda518007d1764826381969 +Public key: +Modulus:19485782324459151665936512463643441340814358912272048514824082321976525830328754468877152818783514198111968246226894308466873353463015566754375130569007999259096330633056389401396792402442331742395534076429724820300742934559046067754232229474250534557842417693503898918925469933043261211267300673450371514226485039835243290637340083672232912763490612560178818190953244257635855518295634491737195450920733784478265473915962767988095318454499639606889856780895248376793362269408107346795484564958690656317148823310627421432525126767427030274079918593983669567827707214777964522555311542127992671041931882561697919473201 +E:65537 +encoded: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 +Private key: +D:465594283788402910660943416876232493835996235087060431925092702857887176183323586688300168440093140517894089476510698683149094077528740999660557992981596888539763180047539259465960184872363876574304014027974573743599494345362019005200237908179687994383074724139539834858131217652022185739006976620963579412727027578411554513323546588616570193424656462567922819441452155207315208664937800048393569268566736175423149943345510687087951354654712657147740703476846122267155871774911109741929216276325941823357002285534585923195232005883912930365060189400932366563640994026392231599484442155360342517856029613339531713577 +encoded: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 +Signature:7fd8e4d74915ac24c25c67bc0c5bd0662c536a725cb7362110802f76da7069695f9e1d365c7d75486fd5d6fb91ede90501b58b84b7d0b29fc3c4c678aca8148c0412c75fc884c0c6e6dba41c721fa336899f294dd90d098632e9cd6329a215977f746c43fc4efa33dda796f78f80f97203c013564f9606cef6203d2e54fac9dbe9fb72aca111347733a000381b2db5447bdfda42946b534ceeff0d1dfe3182b10af44b3f3a68f490eefd9626e0773c41d19c1e44f0348052c060527bf3cf6032b1a9396c63aa3564fb9f30a6fbfd3437125c01a20ad7b0a14595fdf4a68795d0110229c63617b7f9999c09b5f1b0688697de6e9f1e5825055bf6f0a06d906b72 +..Rejected legacy signature:253e1d19bbe91064f2364c1e7db3ba8eb6dc5b19202e440eab6fbdf28c8c6ec05b812983713c338c72b6e99b8edf506a89ff9fc8e5c2c52362097a56dc228060eca01e1ff318c6c81617691438703411c1f953b21cd74331f87c9b8b189fdffdfe8550bd2bd1d47be915f8604a0f472199dd705e19b1b815f99b68d60bc257c7 + +Time: 114.878 +There were 7 failures: +1) testByteBufferShiftedAlias(com.google.security.wycheproof.AesGcmTest) +java.lang.AssertionError: Overlapping buffers test failed with buffer type: direct buffers and output offset -1 + at com.google.security.wycheproof.AesGcmTest.testByteBufferShiftedAlias(AesGcmTest.java:583) + at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) + at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) + at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) + at java.lang.reflect.Method.invoke(Method.java:498) + at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:47) + at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) + at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:44) + at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) + at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:271) + at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:70) + at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:50) + at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) + at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) + at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) + at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) + at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) + at org.junit.runners.ParentRunner.run(ParentRunner.java:309) + at org.junit.runners.Suite.runChild(Suite.java:127) + at org.junit.runners.Suite.runChild(Suite.java:26) + at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) + at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) + at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) + at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) + at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) + at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) + at org.junit.runners.ParentRunner.run(ParentRunner.java:309) + at com.google.testing.junit.runner.internal.junit4.CancellableRequestFactory$CancellableRunner.run(CancellableRequestFactory.java:89) + at org.junit.runner.JUnitCore.run(JUnitCore.java:160) + at org.junit.runner.JUnitCore.run(JUnitCore.java:138) + at com.google.testing.junit.runner.junit4.JUnit4Runner.run(JUnit4Runner.java:112) + at com.google.testing.junit.runner.BazelTestRunner.runTestsInSuite(BazelTestRunner.java:144) + at com.google.testing.junit.runner.BazelTestRunner.main(BazelTestRunner.java:82) +Caused by: java.lang.RuntimeException: error:1e000067:Cipher functions:OPENSSL_internal:BUFFER_TOO_SMALL + at org.conscrypt.NativeCrypto.EVP_AEAD_CTX_seal(Native Method) + at org.conscrypt.OpenSSLCipher$EVP_AEAD.doFinalInternal(OpenSSLCipher.java:1213) + at org.conscrypt.OpenSSLCipher.engineDoFinal(OpenSSLCipher.java:389) + at javax.crypto.CipherSpi.bufferCrypt(CipherSpi.java:830) + at javax.crypto.CipherSpi.engineDoFinal(CipherSpi.java:730) + at javax.crypto.Cipher.doFinal(Cipher.java:2460) + at com.google.security.wycheproof.AesGcmTest.testByteBufferShiftedAlias(AesGcmTest.java:562) + ... 32 more +2) testByteBufferSize(com.google.security.wycheproof.AesGcmTest) +java.lang.AssertionError: ciphertext size:32 expected:<16> but was:<32> + at org.junit.Assert.fail(Assert.java:88) + at org.junit.Assert.failNotEquals(Assert.java:743) + at org.junit.Assert.assertEquals(Assert.java:118) + at org.junit.Assert.assertEquals(Assert.java:555) + at com.google.security.wycheproof.AesGcmTest.testByteBufferSize(AesGcmTest.java:355) + at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) + at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) + at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) + at java.lang.reflect.Method.invoke(Method.java:498) + at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:47) + at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) + at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:44) + at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) + at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:271) + at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:70) + at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:50) + at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) + at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) + at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) + at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) + at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) + at org.junit.runners.ParentRunner.run(ParentRunner.java:309) + at org.junit.runners.Suite.runChild(Suite.java:127) + at org.junit.runners.Suite.runChild(Suite.java:26) + at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) + at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) + at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) + at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) + at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) + at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) + at org.junit.runners.ParentRunner.run(ParentRunner.java:309) + at com.google.testing.junit.runner.internal.junit4.CancellableRequestFactory$CancellableRunner.run(CancellableRequestFactory.java:89) + at org.junit.runner.JUnitCore.run(JUnitCore.java:160) + at org.junit.runner.JUnitCore.run(JUnitCore.java:138) + at com.google.testing.junit.runner.junit4.JUnit4Runner.run(JUnit4Runner.java:112) + at com.google.testing.junit.runner.BazelTestRunner.runTestsInSuite(BazelTestRunner.java:144) + at com.google.testing.junit.runner.BazelTestRunner.main(BazelTestRunner.java:82) +3) testEmptyPlaintext(com.google.security.wycheproof.CipherInputStreamTest) +java.security.InvalidKeyException: Illegal key size + at javax.crypto.Cipher.checkCryptoPerm(Cipher.java:1039) + at javax.crypto.Cipher.implInit(Cipher.java:805) + at javax.crypto.Cipher.chooseProvider(Cipher.java:864) + at javax.crypto.Cipher.init(Cipher.java:1396) + at javax.crypto.Cipher.init(Cipher.java:1327) + at com.google.security.wycheproof.CipherInputStreamTest$TestVector.<init>(CipherInputStreamTest.java:77) + at com.google.security.wycheproof.CipherInputStreamTest.getTestVectors(CipherInputStreamTest.java:97) + at com.google.security.wycheproof.CipherInputStreamTest.testEmptyPlaintext(CipherInputStreamTest.java:261) + at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) + at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) + at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) + at java.lang.reflect.Method.invoke(Method.java:498) + at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:47) + at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) + at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:44) + at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) + at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:271) + at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:70) + at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:50) + at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) + at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) + at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) + at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) + at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) + at org.junit.runners.ParentRunner.run(ParentRunner.java:309) + at org.junit.runners.Suite.runChild(Suite.java:127) + at org.junit.runners.Suite.runChild(Suite.java:26) + at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) + at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) + at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) + at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) + at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) + at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) + at org.junit.runners.ParentRunner.run(ParentRunner.java:309) + at com.google.testing.junit.runner.internal.junit4.CancellableRequestFactory$CancellableRunner.run(CancellableRequestFactory.java:89) + at org.junit.runner.JUnitCore.run(JUnitCore.java:160) + at org.junit.runner.JUnitCore.run(JUnitCore.java:138) + at com.google.testing.junit.runner.junit4.JUnit4Runner.run(JUnit4Runner.java:112) + at com.google.testing.junit.runner.BazelTestRunner.runTestsInSuite(BazelTestRunner.java:144) + at com.google.testing.junit.runner.BazelTestRunner.main(BazelTestRunner.java:82) +4) testCorruptAesGcm(com.google.security.wycheproof.CipherInputStreamTest) +java.security.InvalidKeyException: Illegal key size + at javax.crypto.Cipher.checkCryptoPerm(Cipher.java:1039) + at javax.crypto.Cipher.implInit(Cipher.java:805) + at javax.crypto.Cipher.chooseProvider(Cipher.java:864) + at javax.crypto.Cipher.init(Cipher.java:1396) + at javax.crypto.Cipher.init(Cipher.java:1327) + at com.google.security.wycheproof.CipherInputStreamTest$TestVector.<init>(CipherInputStreamTest.java:77) + at com.google.security.wycheproof.CipherInputStreamTest.getTestVectors(CipherInputStreamTest.java:97) + at com.google.security.wycheproof.CipherInputStreamTest.testCorruptAesGcm(CipherInputStreamTest.java:244) + at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) + at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) + at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) + at java.lang.reflect.Method.invoke(Method.java:498) + at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:47) + at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) + at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:44) + at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) + at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:271) + at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:70) + at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:50) + at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) + at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) + at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) + at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) + at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) + at org.junit.runners.ParentRunner.run(ParentRunner.java:309) + at org.junit.runners.Suite.runChild(Suite.java:127) + at org.junit.runners.Suite.runChild(Suite.java:26) + at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) + at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) + at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) + at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) + at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) + at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) + at org.junit.runners.ParentRunner.run(ParentRunner.java:309) + at com.google.testing.junit.runner.internal.junit4.CancellableRequestFactory$CancellableRunner.run(CancellableRequestFactory.java:89) + at org.junit.runner.JUnitCore.run(JUnitCore.java:160) + at org.junit.runner.JUnitCore.run(JUnitCore.java:138) + at com.google.testing.junit.runner.junit4.JUnit4Runner.run(JUnit4Runner.java:112) + at com.google.testing.junit.runner.BazelTestRunner.runTestsInSuite(BazelTestRunner.java:144) + at com.google.testing.junit.runner.BazelTestRunner.main(BazelTestRunner.java:82) +5) testAesGcm(com.google.security.wycheproof.CipherInputStreamTest) +java.security.InvalidKeyException: Illegal key size + at javax.crypto.Cipher.checkCryptoPerm(Cipher.java:1039) + at javax.crypto.Cipher.implInit(Cipher.java:805) + at javax.crypto.Cipher.chooseProvider(Cipher.java:864) + at javax.crypto.Cipher.init(Cipher.java:1396) + at javax.crypto.Cipher.init(Cipher.java:1327) + at com.google.security.wycheproof.CipherInputStreamTest$TestVector.<init>(CipherInputStreamTest.java:77) + at com.google.security.wycheproof.CipherInputStreamTest.getTestVectors(CipherInputStreamTest.java:97) + at com.google.security.wycheproof.CipherInputStreamTest.testAesGcm(CipherInputStreamTest.java:231) + at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) + at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) + at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) + at java.lang.reflect.Method.invoke(Method.java:498) + at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:47) + at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) + at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:44) + at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) + at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:271) + at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:70) + at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:50) + at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) + at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) + at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) + at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) + at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) + at org.junit.runners.ParentRunner.run(ParentRunner.java:309) + at org.junit.runners.Suite.runChild(Suite.java:127) + at org.junit.runners.Suite.runChild(Suite.java:26) + at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) + at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) + at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) + at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) + at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) + at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) + at org.junit.runners.ParentRunner.run(ParentRunner.java:309) + at com.google.testing.junit.runner.internal.junit4.CancellableRequestFactory$CancellableRunner.run(CancellableRequestFactory.java:89) + at org.junit.runner.JUnitCore.run(JUnitCore.java:160) + at org.junit.runner.JUnitCore.run(JUnitCore.java:138) + at com.google.testing.junit.runner.junit4.JUnit4Runner.run(JUnit4Runner.java:112) + at com.google.testing.junit.runner.BazelTestRunner.runTestsInSuite(BazelTestRunner.java:144) + at com.google.testing.junit.runner.BazelTestRunner.main(BazelTestRunner.java:82) +6) testEmptyPlaintext(com.google.security.wycheproof.CipherOutputStreamTest) +java.security.InvalidKeyException: Illegal key size + at javax.crypto.Cipher.checkCryptoPerm(Cipher.java:1039) + at javax.crypto.Cipher.implInit(Cipher.java:805) + at javax.crypto.Cipher.chooseProvider(Cipher.java:864) + at javax.crypto.Cipher.init(Cipher.java:1396) + at javax.crypto.Cipher.init(Cipher.java:1327) + at com.google.security.wycheproof.CipherOutputStreamTest$TestVector.<init>(CipherOutputStreamTest.java:76) + at com.google.security.wycheproof.CipherOutputStreamTest.getTestVectors(CipherOutputStreamTest.java:96) + at com.google.security.wycheproof.CipherOutputStreamTest.testEmptyPlaintext(CipherOutputStreamTest.java:217) + at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) + at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) + at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) + at java.lang.reflect.Method.invoke(Method.java:498) + at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:47) + at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) + at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:44) + at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) + at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:271) + at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:70) + at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:50) + at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) + at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) + at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) + at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) + at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) + at org.junit.runners.ParentRunner.run(ParentRunner.java:309) + at org.junit.runners.Suite.runChild(Suite.java:127) + at org.junit.runners.Suite.runChild(Suite.java:26) + at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) + at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) + at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) + at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) + at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) + at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) + at org.junit.runners.ParentRunner.run(ParentRunner.java:309) + at com.google.testing.junit.runner.internal.junit4.CancellableRequestFactory$CancellableRunner.run(CancellableRequestFactory.java:89) + at org.junit.runner.JUnitCore.run(JUnitCore.java:160) + at org.junit.runner.JUnitCore.run(JUnitCore.java:138) + at com.google.testing.junit.runner.junit4.JUnit4Runner.run(JUnit4Runner.java:112) + at com.google.testing.junit.runner.BazelTestRunner.runTestsInSuite(BazelTestRunner.java:144) + at com.google.testing.junit.runner.BazelTestRunner.main(BazelTestRunner.java:82) +7) testAesGcm(com.google.security.wycheproof.CipherOutputStreamTest) +java.security.InvalidKeyException: Illegal key size + at javax.crypto.Cipher.checkCryptoPerm(Cipher.java:1039) + at javax.crypto.Cipher.implInit(Cipher.java:805) + at javax.crypto.Cipher.chooseProvider(Cipher.java:864) + at javax.crypto.Cipher.init(Cipher.java:1396) + at javax.crypto.Cipher.init(Cipher.java:1327) + at com.google.security.wycheproof.CipherOutputStreamTest$TestVector.<init>(CipherOutputStreamTest.java:76) + at com.google.security.wycheproof.CipherOutputStreamTest.getTestVectors(CipherOutputStreamTest.java:96) + at com.google.security.wycheproof.CipherOutputStreamTest.testAesGcm(CipherOutputStreamTest.java:198) + at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) + at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) + at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) + at java.lang.reflect.Method.invoke(Method.java:498) + at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:47) + at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) + at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:44) + at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) + at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:271) + at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:70) + at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:50) + at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) + at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) + at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) + at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) + at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) + at org.junit.runners.ParentRunner.run(ParentRunner.java:309) + at org.junit.runners.Suite.runChild(Suite.java:127) + at org.junit.runners.Suite.runChild(Suite.java:26) + at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) + at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) + at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) + at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) + at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) + at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) + at org.junit.runners.ParentRunner.run(ParentRunner.java:309) + at com.google.testing.junit.runner.internal.junit4.CancellableRequestFactory$CancellableRunner.run(CancellableRequestFactory.java:89) + at org.junit.runner.JUnitCore.run(JUnitCore.java:160) + at org.junit.runner.JUnitCore.run(JUnitCore.java:138) + at com.google.testing.junit.runner.junit4.JUnit4Runner.run(JUnit4Runner.java:112) + at com.google.testing.junit.runner.BazelTestRunner.runTestsInSuite(BazelTestRunner.java:144) + at com.google.testing.junit.runner.BazelTestRunner.main(BazelTestRunner.java:82) + +FAILURES!!! +Tests run: 69, Failures: 7 + + +BazelTestRunner exiting with a return value of 1 +JVM shutdown hooks (if any) will run now. +The JVM will exit once they complete. + +-- JVM shutdown starting at 2018-04-06 00:46:26 -- + diff --git a/testlogs/index.html b/testlogs/index.html index 9ec1988..c5506c9 100644 --- a/testlogs/index.html +++ b/testlogs/index.html @@ -1,2 +1,3 @@ <html><body><ul> +<li><a href="ConscryptAllTests_1_0_1.txt">ConscryptAllTests_1_0_1.txt (7 failures)</a></li> </ul></body></html> |