exec ${PAGER:-/usr/bin/less} "$0" || exit 1 ----------------------------------------------------------------------------- JUnit4 Test Runner .testDefaultTagSizeAlgorithmParameterGenerator:java.security.NoSuchAlgorithmException: GCM AlgorithmParameterGenerator not available ......E......E..... Provider:Conscrypt AlgorithmParameters.AES AlgorithmParameters.ChaCha20 AlgorithmParameters.DESEDE AlgorithmParameters.EC AlgorithmParameters.GCM AlgorithmParameters.OAEP CertificateFactory.X509 Cipher.AES/CBC/NoPadding Cipher.AES/CBC/NoPadding SupportedKeyFormats Cipher.AES/CBC/PKCS5Padding Cipher.AES/CBC/PKCS5Padding SupportedKeyFormats Cipher.AES/CTR/NoPadding Cipher.AES/CTR/NoPadding SupportedKeyFormats Cipher.AES/ECB/NoPadding Cipher.AES/ECB/NoPadding SupportedKeyFormats Cipher.AES/ECB/PKCS5Padding Cipher.AES/ECB/PKCS5Padding SupportedKeyFormats Cipher.AES/GCM/NoPadding Cipher.AES/GCM/NoPadding SupportedKeyFormats Cipher.AES_128/CBC/NoPadding Cipher.AES_128/CBC/NoPadding SupportedKeyFormats Cipher.AES_128/CBC/PKCS5Padding Cipher.AES_128/CBC/PKCS5Padding SupportedKeyFormats Cipher.AES_128/ECB/NoPadding Cipher.AES_128/ECB/NoPadding SupportedKeyFormats Cipher.AES_128/ECB/PKCS5Padding Cipher.AES_128/ECB/PKCS5Padding SupportedKeyFormats Cipher.AES_128/GCM/NoPadding Cipher.AES_128/GCM/NoPadding SupportedKeyFormats Cipher.AES_256/CBC/NoPadding Cipher.AES_256/CBC/NoPadding SupportedKeyFormats Cipher.AES_256/CBC/PKCS5Padding Cipher.AES_256/CBC/PKCS5Padding SupportedKeyFormats Cipher.AES_256/ECB/NoPadding Cipher.AES_256/ECB/NoPadding SupportedKeyFormats Cipher.AES_256/ECB/PKCS5Padding Cipher.AES_256/ECB/PKCS5Padding SupportedKeyFormats Cipher.AES_256/GCM/NoPadding Cipher.AES_256/GCM/NoPadding SupportedKeyFormats Cipher.ARC4 Cipher.ARC4 SupportedKeyFormats Cipher.ChaCha20 Cipher.ChaCha20 SupportedKeyFormats Cipher.ChaCha20/Poly1305/NoPadding Cipher.ChaCha20/Poly1305/NoPadding SupportedKeyFormats Cipher.DESEDE/CBC/NoPadding Cipher.DESEDE/CBC/NoPadding SupportedKeyFormats Cipher.DESEDE/CBC/PKCS5Padding Cipher.DESEDE/CBC/PKCS5Padding SupportedKeyFormats Cipher.RSA/ECB/NoPadding Cipher.RSA/ECB/NoPadding SupportedKeyClasses Cipher.RSA/ECB/OAEPPadding Cipher.RSA/ECB/OAEPPadding SupportedKeyClasses Cipher.RSA/ECB/OAEPWithSHA-1AndMGF1Padding Cipher.RSA/ECB/OAEPWithSHA-1AndMGF1Padding SupportedKeyClasses Cipher.RSA/ECB/OAEPWithSHA-224AndMGF1Padding Cipher.RSA/ECB/OAEPWithSHA-224AndMGF1Padding SupportedKeyClasses Cipher.RSA/ECB/OAEPWithSHA-256AndMGF1Padding Cipher.RSA/ECB/OAEPWithSHA-256AndMGF1Padding SupportedKeyClasses Cipher.RSA/ECB/OAEPWithSHA-384AndMGF1Padding Cipher.RSA/ECB/OAEPWithSHA-384AndMGF1Padding SupportedKeyClasses Cipher.RSA/ECB/OAEPWithSHA-512AndMGF1Padding Cipher.RSA/ECB/OAEPWithSHA-512AndMGF1Padding SupportedKeyClasses Cipher.RSA/ECB/PKCS1Padding Cipher.RSA/ECB/PKCS1Padding SupportedKeyClasses KeyAgreement.ECDH KeyAgreement.ECDH SupportedKeyClasses KeyAgreement.ECDH SupportedKeyFormats KeyFactory.EC KeyFactory.RSA KeyGenerator.AES KeyGenerator.ChaCha20 KeyGenerator.DESEDE KeyGenerator.HmacMD5 KeyGenerator.HmacSHA1 KeyGenerator.HmacSHA224 KeyGenerator.HmacSHA256 KeyGenerator.HmacSHA384 KeyGenerator.HmacSHA512 KeyPairGenerator.EC KeyPairGenerator.RSA Mac.HmacMD5 Mac.HmacMD5 SupportedKeyClasses Mac.HmacMD5 SupportedKeyFormats Mac.HmacSHA1 Mac.HmacSHA1 SupportedKeyClasses Mac.HmacSHA1 SupportedKeyFormats Mac.HmacSHA224 Mac.HmacSHA224 SupportedKeyClasses Mac.HmacSHA224 SupportedKeyFormats Mac.HmacSHA256 Mac.HmacSHA256 SupportedKeyClasses Mac.HmacSHA256 SupportedKeyFormats Mac.HmacSHA384 Mac.HmacSHA384 SupportedKeyClasses Mac.HmacSHA384 SupportedKeyFormats Mac.HmacSHA512 Mac.HmacSHA512 SupportedKeyClasses Mac.HmacSHA512 SupportedKeyFormats MessageDigest.MD5 MessageDigest.SHA-1 MessageDigest.SHA-224 MessageDigest.SHA-256 MessageDigest.SHA-384 MessageDigest.SHA-512 Provider.id className Provider.id info Provider.id name Provider.id version SSLContext.Default SSLContext.SSL SSLContext.TLS SSLContext.TLSv1 SSLContext.TLSv1.1 SSLContext.TLSv1.2 SecretKeyFactory.DESEDE SecureRandom.SHA1PRNG SecureRandom.SHA1PRNG ImplementedIn Signature.MD5WithRSA Signature.MD5WithRSA SupportedKeyClasses Signature.MD5WithRSA SupportedKeyFormats Signature.NONEwithECDSA Signature.NONEwithECDSA SupportedKeyClasses Signature.NONEwithECDSA SupportedKeyFormats Signature.NONEwithRSA Signature.NONEwithRSA SupportedKeyClasses Signature.SHA1WithRSA Signature.SHA1WithRSA SupportedKeyClasses Signature.SHA1WithRSA SupportedKeyFormats Signature.SHA1withECDSA Signature.SHA1withECDSA SupportedKeyClasses Signature.SHA1withECDSA SupportedKeyFormats Signature.SHA1withRSA/PSS Signature.SHA1withRSA/PSS SupportedKeyClasses Signature.SHA1withRSA/PSS SupportedKeyFormats Signature.SHA224WithRSA Signature.SHA224WithRSA SupportedKeyClasses Signature.SHA224WithRSA SupportedKeyFormats Signature.SHA224withECDSA Signature.SHA224withECDSA SupportedKeyClasses Signature.SHA224withECDSA SupportedKeyFormats Signature.SHA224withRSA/PSS Signature.SHA224withRSA/PSS SupportedKeyClasses Signature.SHA224withRSA/PSS SupportedKeyFormats Signature.SHA256WithRSA Signature.SHA256WithRSA SupportedKeyClasses Signature.SHA256WithRSA SupportedKeyFormats Signature.SHA256withECDSA Signature.SHA256withECDSA SupportedKeyClasses Signature.SHA256withECDSA SupportedKeyFormats Signature.SHA256withRSA/PSS Signature.SHA256withRSA/PSS SupportedKeyClasses Signature.SHA256withRSA/PSS SupportedKeyFormats Signature.SHA384WithRSA Signature.SHA384WithRSA SupportedKeyClasses Signature.SHA384WithRSA SupportedKeyFormats Signature.SHA384withECDSA Signature.SHA384withECDSA SupportedKeyClasses Signature.SHA384withECDSA SupportedKeyFormats Signature.SHA384withRSA/PSS Signature.SHA384withRSA/PSS SupportedKeyClasses Signature.SHA384withRSA/PSS SupportedKeyFormats Signature.SHA512WithRSA Signature.SHA512WithRSA SupportedKeyClasses Signature.SHA512WithRSA SupportedKeyFormats Signature.SHA512withECDSA Signature.SHA512withECDSA SupportedKeyClasses Signature.SHA512withECDSA SupportedKeyFormats Signature.SHA512withRSA/PSS Signature.SHA512withRSA/PSS SupportedKeyClasses Signature.SHA512withRSA/PSS SupportedKeyFormats ...Skipping testAesEax ...Skipping testAesEax ...java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key ..Encoded ECPrivateKey:308187020100301306072a8648ce3d020106082a8648ce3d030107046d306b0201010420c1cf457bea837d25b78237f38e612feea6f5ceabf1de90420aafedf47de8ac4da14403420004b9202d6837a0c7c4b43bdb9d82aef460d9b7b291f93ed67e32678ba0f3eb8bd54e1528811de5844cd24f05bce9df8793d493c1c74e2e5154d1b2b2992ef4943c ...testWrongOrder: ECDHC not supported testWrongOrder: ECDHC not supported ..testModifiedPublic:public point not on curve throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key testModifiedPublic:public point = (0,0) throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key testModifiedPublic:order = 1 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key testModifiedPublic:order = 26959946660873538060741835960514744168612397095220107664918121663170 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key testModifiedPublic:generator = (0,0) throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key testModifiedPublic:generator not on curve throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key testModifiedPublic:cofactor = 2 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key testModifiedPublic:cofactor = None throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key testModifiedPublic:modified prime throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key testModifiedPublic:using secp224r1 throws java.security.InvalidKeyException: error:06000066:public key routines:OPENSSL_internal:DECODE_ERROR testModifiedPublic:a = 0 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key testModifiedPublic:new curve with generator of order 3 that is also on secp256r1 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key testModifiedPublic:order = -115792089210356248762697446949407573529996955224135760342422259061068512044369 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key testModifiedPublic:order = 0 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key testModifiedPublic:cofactor = -1 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key testModifiedPublic:cofactor = 0 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key testWrongOrder: ECDHC not supported .Generated shared secret with a modified order:ECDH expected:a00ddbd7313f449e4f3a58de9ac9d78bd8d52bf030d69b75b12e960378b433d7 computed:a00ddbd7313f449e4f3a58de9ac9d78bd8d52bf030d69b75b12e960378b433d7 testWrongOrder: can't modify order. ..testModifiedPublic:public point not on curve throws java.security.spec.InvalidKeySpecException: java.lang.RuntimeException: error:0f000078:elliptic curve routines:OPENSSL_internal:POINT_IS_NOT_ON_CURVE testModifiedPublic:public point = (0,0) throws java.security.spec.InvalidKeySpecException: java.lang.RuntimeException: error:0f000078:elliptic curve routines:OPENSSL_internal:POINT_IS_NOT_ON_CURVE testModifiedPublic:generator = (0,0) throws java.security.spec.InvalidKeySpecException: java.security.InvalidAlgorithmParameterException: EC_GROUP_new_arbitrary failed testModifiedPublic:generator not on curve throws java.security.spec.InvalidKeySpecException: java.security.InvalidAlgorithmParameterException: EC_GROUP_new_arbitrary failed modified prime throws java.lang.IllegalArgumentException: first coefficient is too large testModifiedPublic:using secp224r1 throws java.security.InvalidKeyException: error:0f00006a:elliptic curve routines:OPENSSL_internal:INCOMPATIBLE_OBJECTS testModifiedPublic:a = 0 throws java.security.InvalidKeyException: error:0f00006a:elliptic curve routines:OPENSSL_internal:INCOMPATIBLE_OBJECTS testModifiedPublic:new curve with generator of order 3 that is also on secp256r1 throws java.security.InvalidKeyException: error:0f00006a:elliptic curve routines:OPENSSL_internal:INCOMPATIBLE_OBJECTS order = -115792089210356248762697446949407573529996955224135760342422259061068512044369 throws java.lang.IllegalArgumentException: n is not positive order = 0 throws java.lang.IllegalArgumentException: n is not positive cofactor = -1 throws java.lang.IllegalArgumentException: h is not positive cofactor = 0 throws java.lang.IllegalArgumentException: h is not positive testWrongOrder: ECDHC not supported .....Message:Hello Hash:185f8db32271fe25f561a6fc938b2e264306ec304eda518007d1764826381969 Curve:secp256r1 Order:115792089210356248762697446949407573529996955224135760342422259061068512044369 Private key: S:41508048581254992335392189966875657887006978714357129502518083623189738759498 encoded:308187020100301306072a8648ce3d020106082a8648ce3d030107046d306b02010104205bc4b91301987e7ebfd1875e3dbc6484a82529907e19bf11361870788275254aa14403420004b41008a23714b1b9ef8fabffc5f56b6644af2bce3a136bd9c89f9dfa86baab84c287e279c7bd22e2aaabddfdbc656aa974b91d102b7392ae36b2bc9f71f2fda8 Public key: X:81444641885307227619114557974436278237654452399927516156155073352793631402884 Y:87988780056761634812641661264467351854881697285038383410234562844264297069992 encoded:3059301306072a8648ce3d020106082a8648ce3d03010703420004b41008a23714b1b9ef8fabffc5f56b6644af2bce3a136bd9c89f9dfa86baab84c287e279c7bd22e2aaabddfdbc656aa974b91d102b7392ae36b2bc9f71f2fda8 Signature:3046022100e10928795cf8e1a0fa11929ec9cb4cfe1d6d07517cd4787923c3625f4409e4f5022100da9a41bcc6deff31761824a5080a66220f885920bdbd31e5f45c8937bda7acd0 r:101786571896616475878332175447875317101783234251678494866332066766654815200501 s:98876749142054027996087544405958941878098897382515081852861643876245508173008 .Conscrypt curve:secp256r1 countLsb:515 countMsb:520 Conscrypt curve:secp224r1 countLsb:504 countMsb:541 Conscrypt curve:secp384r1 countLsb:522 countMsb:513 Conscrypt curve:secp521r1 countLsb:551 countMsb:504 Conscrypt curve:brainpoolP256r1 countLsb:510 countMsb:515 ..testTiming algorithm:SHA256WithECDSA count:50000 cutoff:153638 relative average:1.0002105292819192 sigmas:0.0815376402761955 count:25020 cutoff:51641 relative average:1.0015013749643311 sigmas:0.41133290212557233 count:12541 cutoff:51354 relative average:1.005060548666823 sigmas:0.9815768722538737 count:6261 cutoff:51107 relative average:1.0106688031774838 sigmas:1.4621710550304332 count:3125 cutoff:48881 relative average:1.0147660255907245 sigmas:1.4297142800637181 count:1569 cutoff:48571 relative average:1.012920228839651 sigmas:0.8864256305843974 count:784 cutoff:48460 relative average:1.003699194351599 sigmas:0.1794013917931513 count:398 cutoff:48389 relative average:0.9874594085136104 sigmas:0.4333314241838888 count:200 cutoff:48334 relative average:0.9736592981890677 sigmas:0.6452127890358904 count:98 cutoff:48276 relative average:1.020215773735074 sigmas:0.3466283128454264 count:49 cutoff:48234 relative average:1.0105517614702615 sigmas:0.1279333088308849 count:25 cutoff:48188 relative average:1.060008504579634 sigmas:0.519688894090779 count:13 cutoff:48151 relative average:1.0334964771122688 sigmas:0.20918543251951568 ............testDefaultSize: keysize=2048 ....Message:Hello Hash:185f8db32271fe25f561a6fc938b2e264306ec304eda518007d1764826381969 Public key: Modulus:26793122092162363697169875392992572744763633675400778165683867042164090448492397714666563295036015511509415005173742727052389244232596571525560655801484363732277921377767551726367169640966438160308314628684628887897348754499889762598226759944797287794531505819401258988497565688159522778726836044419474705381162528079359086163499889209591488645721934399924653199837184164241409128446027076989819711586609179615026062379848644630907172511233453310226298998443764649799568524290207103710496160662171950176369331906788770771287877648822684355049491423553342182802308694392933764901676277969054286842997159764742868759361 E:65537 encoded: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 Private key: D:1068707759908473609423253601245432113341877333275328046796682741579888442275416587056317242314320889705613039428485906629654252152958339527670905142601282866663834387805699940001776373017537665667668115276019475652722269544504048528434694495806866198081767694012494180719768778940412415824188200615178430922014147447301003187951148716270622019854093121948016890449481363264733754457719725982924830031080773568503054280557121840687928390941887033491136759063818833852395484655221246037437963592306840238064988649271115654361655043830795137835859709041816367976144130818628174459041599137808367101167348025440753877273 encoded:308204be020100300d06092a864886f70d0101010500048204a8308204a40201000282010100d43e0e96816e1ff9be6d872f76636f6d8585c15484b8d586e6878a30b0a09ea013c77c39d0e651375c1c1c036086f36c4c0cdd6b54b6fb4789ee2e789a608c91e492a2b23e2b5460423201b6046d4604ccf34cd16834b9116a584542e287bae6add36ba7231c417fbadfc80d8a31b2ef523aa90cd177c54fccd3a23837a0c7efd5bc00b50195b52020b5c24fa971270d3fccf515d502db5ebc914b3fc5a69d8d998c00fef0aba136adbd9c04c0f517fa7eea72dc7a4f990a2067cffb1f66ad76cd6909b5d9aa0c0f2f704fb20afa88833e71a316edea3024a137361c9425edd7ec29818f130ef094355631778df4a8831250ccbe999e64a406cfc23a1b06f34102030100010282010008773e6b1e3e55fa6089d816adaa864ccd2923f51dfcf369d7ccc4d76fbf5d3136025c800cad97f7883aee678547a65905cf26c23bbb845a2e0dc5cbc2523c92c4c95cf4fb56d9503e03b3385f1e3b8273b5f6b4c004a18d8f2e7660c981631438a8f8b968449dc303d4b7dffcc8dbb53447908542dee23f6e5138be5b1c1493de28e416185b0086794009d8bab4649a3856a6d34858024e140d6c3c1e1c3dc3e09fb964dfdfa23a8fcb641bc0c4bbe713f261f8ba85c5f475ff39a81d2d3fc7fa5702a395093cfeda0464992d7e0d2c3cd6799a440562bb76af6f6a4ad646666793d9fa797ac63c3309a74669aaee454dbf88e6296374bd95e31646b74b011902818100e91fb36cdd47c4f27eeb1d5562fd0cb3cd90e07fb972883d94e7c68b5ccb7ca290f08f512cfed1115e532eccdda5e532789d3546ff5ca5baea3db9911c31dfb40fda8de4fcd29d566d11f26f188137fd6e2e18bd8bc8b00730dfecd7b8cd907d36ae1ac2bfeb675e4b5199a18204104ec9627ab35a0f25a473d829ad4924acbd02818100e911cb595a98ece8e5a2f91f6547a44d8126faddd0bc66007fd1ae4fb90e24993439ab24fcf1a86f75fc412cb76108c9a0368c5ba9a6e1587b02c8661c92e8c46c3c7d11f31e63cb2dc1393c5b7b5adafe0e0bfecb9b521a3999136a10b5eeff9dbf7cb3e029e6675f25bb454a9c6dea1c4a5c56371b3e9f443e5aafe6ccc2d502818100c2718d8fa4f5c2c0dcb9b0aad2b8ec4a609091a01706ffba15a448c75eebdf161d3c78dda56118f29ab1591cc95720d7bb20ad1a7dce41f1a885396d5e8dfedfca456a0af0119fe8416b31c21637598309ce6b16562c5b1e7456a1cec0b6bce8a39e0e7617ebfa38fd2b9fafc5a92c0cfb0e27f7c68b51c35c58955292ea832502818100c5b847c734b958f9b69dcc339b2aecb2a767171907d45bbffeaf35ee01f2828fc9a34692295724e9f1b09ee5bd67bf19b525b16aad8099d902f9f861cfc9bd57acee9fb79384eb69d915fb653dc266f032e85dbab8a5ba3fef2ef22e5fa0c7f0e7b523a840f9aab17521403e672e4f7c74a58cb1c32c04b2fe24dbb02fdef3450281806422cf3787a0089b291b6a6d63211f39c37b723c7ec48913c70afd92c7b2a1056723bd61819d0e4a02cc7ae56a67f966f0c5dcead6ee39cd7b940b799d249dbb8e016a4873dd99c574ba5b0f3642858a1568a52726fe1b7a59bd0e9904637fdfd9245aefa29a2c8ce3bb107a4cc140039cccac9da64ca3ae6c11d60e9a8001d5 Signature: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 ..Rejected legacy signature:253e1d19bbe91064f2364c1e7db3ba8eb6dc5b19202e440eab6fbdf28c8c6ec05b812983713c338c72b6e99b8edf506a89ff9fc8e5c2c52362097a56dc228060eca01e1ff318c6c81617691438703411c1f953b21cd74331f87c9b8b189fdffdfe8550bd2bd1d47be915f8604a0f472199dd705e19b1b815f99b68d60bc257c7 Time: 11.714 There were 2 failures: 1) testByteBufferShiftedAlias(com.google.security.wycheproof.AesGcmTest) java.lang.AssertionError: Overlapping buffers test failed with buffer type: direct buffers and output offset -1 at com.google.security.wycheproof.AesGcmTest.testByteBufferShiftedAlias(AesGcmTest.java:590) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:47) at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:44) at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:271) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:70) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:50) at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) at org.junit.runners.ParentRunner.run(ParentRunner.java:309) at org.junit.runners.Suite.runChild(Suite.java:127) at org.junit.runners.Suite.runChild(Suite.java:26) at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) at org.junit.runners.ParentRunner.run(ParentRunner.java:309) at com.google.testing.junit.runner.internal.junit4.CancellableRequestFactory$CancellableRunner.run(CancellableRequestFactory.java:89) at org.junit.runner.JUnitCore.run(JUnitCore.java:160) at org.junit.runner.JUnitCore.run(JUnitCore.java:138) at com.google.testing.junit.runner.junit4.JUnit4Runner.run(JUnit4Runner.java:112) at com.google.testing.junit.runner.BazelTestRunner.runTestsInSuite(BazelTestRunner.java:144) at com.google.testing.junit.runner.BazelTestRunner.main(BazelTestRunner.java:82) Caused by: java.lang.RuntimeException: error:1e000067:Cipher functions:OPENSSL_internal:BUFFER_TOO_SMALL at org.conscrypt.NativeCrypto.EVP_AEAD_CTX_seal(Native Method) at org.conscrypt.OpenSSLCipher$EVP_AEAD.doFinalInternal(OpenSSLCipher.java:1213) at org.conscrypt.OpenSSLCipher.engineDoFinal(OpenSSLCipher.java:389) at javax.crypto.CipherSpi.bufferCrypt(CipherSpi.java:830) at javax.crypto.CipherSpi.engineDoFinal(CipherSpi.java:730) at javax.crypto.Cipher.doFinal(Cipher.java:2460) at com.google.security.wycheproof.AesGcmTest.testByteBufferShiftedAlias(AesGcmTest.java:569) ... 32 more 2) testByteBufferSize(com.google.security.wycheproof.AesGcmTest) java.lang.AssertionError: ciphertext size:32 expected:<16> but was:<32> at org.junit.Assert.fail(Assert.java:88) at org.junit.Assert.failNotEquals(Assert.java:743) at org.junit.Assert.assertEquals(Assert.java:118) at org.junit.Assert.assertEquals(Assert.java:555) at com.google.security.wycheproof.AesGcmTest.testByteBufferSize(AesGcmTest.java:353) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:47) at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:44) at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:271) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:70) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:50) at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) at org.junit.runners.ParentRunner.run(ParentRunner.java:309) at org.junit.runners.Suite.runChild(Suite.java:127) at org.junit.runners.Suite.runChild(Suite.java:26) at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238) at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63) at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236) at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53) at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229) at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) at org.junit.runners.ParentRunner.run(ParentRunner.java:309) at com.google.testing.junit.runner.internal.junit4.CancellableRequestFactory$CancellableRunner.run(CancellableRequestFactory.java:89) at org.junit.runner.JUnitCore.run(JUnitCore.java:160) at org.junit.runner.JUnitCore.run(JUnitCore.java:138) at com.google.testing.junit.runner.junit4.JUnit4Runner.run(JUnit4Runner.java:112) at com.google.testing.junit.runner.BazelTestRunner.runTestsInSuite(BazelTestRunner.java:144) at com.google.testing.junit.runner.BazelTestRunner.main(BazelTestRunner.java:82) FAILURES!!! Tests run: 63, Failures: 2 BazelTestRunner exiting with a return value of 1 JVM shutdown hooks (if any) will run now. The JVM will exit once they complete. -- JVM shutdown starting at 2018-04-07 00:48:31 --