aboutsummaryrefslogtreecommitdiff
path: root/testlogs/ConscryptAllTests_1_0_1.txt
blob: 4c3ca5ac475355835cd78461ad1a75bed1689b9b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
exec ${PAGER:-/usr/bin/less} "$0" || exit 1
-----------------------------------------------------------------------------
JUnit4 Test Runner
.testDefaultTagSizeAlgorithmParameterGenerator:java.security.NoSuchAlgorithmException: GCM AlgorithmParameterGenerator not available
......E......E.....
Provider:Conscrypt
AlgorithmParameters.AES
AlgorithmParameters.ChaCha20
AlgorithmParameters.DESEDE
AlgorithmParameters.EC
AlgorithmParameters.GCM
AlgorithmParameters.OAEP
CertificateFactory.X509
Cipher.AES/CBC/NoPadding
Cipher.AES/CBC/NoPadding SupportedKeyFormats
Cipher.AES/CBC/PKCS5Padding
Cipher.AES/CBC/PKCS5Padding SupportedKeyFormats
Cipher.AES/CTR/NoPadding
Cipher.AES/CTR/NoPadding SupportedKeyFormats
Cipher.AES/ECB/NoPadding
Cipher.AES/ECB/NoPadding SupportedKeyFormats
Cipher.AES/ECB/PKCS5Padding
Cipher.AES/ECB/PKCS5Padding SupportedKeyFormats
Cipher.AES/GCM/NoPadding
Cipher.AES/GCM/NoPadding SupportedKeyFormats
Cipher.AES_128/CBC/NoPadding
Cipher.AES_128/CBC/NoPadding SupportedKeyFormats
Cipher.AES_128/CBC/PKCS5Padding
Cipher.AES_128/CBC/PKCS5Padding SupportedKeyFormats
Cipher.AES_128/ECB/NoPadding
Cipher.AES_128/ECB/NoPadding SupportedKeyFormats
Cipher.AES_128/ECB/PKCS5Padding
Cipher.AES_128/ECB/PKCS5Padding SupportedKeyFormats
Cipher.AES_128/GCM/NoPadding
Cipher.AES_128/GCM/NoPadding SupportedKeyFormats
Cipher.AES_256/CBC/NoPadding
Cipher.AES_256/CBC/NoPadding SupportedKeyFormats
Cipher.AES_256/CBC/PKCS5Padding
Cipher.AES_256/CBC/PKCS5Padding SupportedKeyFormats
Cipher.AES_256/ECB/NoPadding
Cipher.AES_256/ECB/NoPadding SupportedKeyFormats
Cipher.AES_256/ECB/PKCS5Padding
Cipher.AES_256/ECB/PKCS5Padding SupportedKeyFormats
Cipher.AES_256/GCM/NoPadding
Cipher.AES_256/GCM/NoPadding SupportedKeyFormats
Cipher.ARC4
Cipher.ARC4 SupportedKeyFormats
Cipher.ChaCha20
Cipher.ChaCha20 SupportedKeyFormats
Cipher.ChaCha20/Poly1305/NoPadding
Cipher.ChaCha20/Poly1305/NoPadding SupportedKeyFormats
Cipher.DESEDE/CBC/NoPadding
Cipher.DESEDE/CBC/NoPadding SupportedKeyFormats
Cipher.DESEDE/CBC/PKCS5Padding
Cipher.DESEDE/CBC/PKCS5Padding SupportedKeyFormats
Cipher.RSA/ECB/NoPadding
Cipher.RSA/ECB/NoPadding SupportedKeyClasses
Cipher.RSA/ECB/OAEPPadding
Cipher.RSA/ECB/OAEPPadding SupportedKeyClasses
Cipher.RSA/ECB/OAEPWithSHA-1AndMGF1Padding
Cipher.RSA/ECB/OAEPWithSHA-1AndMGF1Padding SupportedKeyClasses
Cipher.RSA/ECB/OAEPWithSHA-224AndMGF1Padding
Cipher.RSA/ECB/OAEPWithSHA-224AndMGF1Padding SupportedKeyClasses
Cipher.RSA/ECB/OAEPWithSHA-256AndMGF1Padding
Cipher.RSA/ECB/OAEPWithSHA-256AndMGF1Padding SupportedKeyClasses
Cipher.RSA/ECB/OAEPWithSHA-384AndMGF1Padding
Cipher.RSA/ECB/OAEPWithSHA-384AndMGF1Padding SupportedKeyClasses
Cipher.RSA/ECB/OAEPWithSHA-512AndMGF1Padding
Cipher.RSA/ECB/OAEPWithSHA-512AndMGF1Padding SupportedKeyClasses
Cipher.RSA/ECB/PKCS1Padding
Cipher.RSA/ECB/PKCS1Padding SupportedKeyClasses
KeyAgreement.ECDH
KeyAgreement.ECDH SupportedKeyClasses
KeyAgreement.ECDH SupportedKeyFormats
KeyFactory.EC
KeyFactory.RSA
KeyGenerator.AES
KeyGenerator.ChaCha20
KeyGenerator.DESEDE
KeyGenerator.HmacMD5
KeyGenerator.HmacSHA1
KeyGenerator.HmacSHA224
KeyGenerator.HmacSHA256
KeyGenerator.HmacSHA384
KeyGenerator.HmacSHA512
KeyPairGenerator.EC
KeyPairGenerator.RSA
Mac.HmacMD5
Mac.HmacMD5 SupportedKeyClasses
Mac.HmacMD5 SupportedKeyFormats
Mac.HmacSHA1
Mac.HmacSHA1 SupportedKeyClasses
Mac.HmacSHA1 SupportedKeyFormats
Mac.HmacSHA224
Mac.HmacSHA224 SupportedKeyClasses
Mac.HmacSHA224 SupportedKeyFormats
Mac.HmacSHA256
Mac.HmacSHA256 SupportedKeyClasses
Mac.HmacSHA256 SupportedKeyFormats
Mac.HmacSHA384
Mac.HmacSHA384 SupportedKeyClasses
Mac.HmacSHA384 SupportedKeyFormats
Mac.HmacSHA512
Mac.HmacSHA512 SupportedKeyClasses
Mac.HmacSHA512 SupportedKeyFormats
MessageDigest.MD5
MessageDigest.SHA-1
MessageDigest.SHA-224
MessageDigest.SHA-256
MessageDigest.SHA-384
MessageDigest.SHA-512
Provider.id className
Provider.id info
Provider.id name
Provider.id version
SSLContext.Default
SSLContext.SSL
SSLContext.TLS
SSLContext.TLSv1
SSLContext.TLSv1.1
SSLContext.TLSv1.2
SecretKeyFactory.DESEDE
SecureRandom.SHA1PRNG
SecureRandom.SHA1PRNG ImplementedIn
Signature.MD5WithRSA
Signature.MD5WithRSA SupportedKeyClasses
Signature.MD5WithRSA SupportedKeyFormats
Signature.NONEwithECDSA
Signature.NONEwithECDSA SupportedKeyClasses
Signature.NONEwithECDSA SupportedKeyFormats
Signature.NONEwithRSA
Signature.NONEwithRSA SupportedKeyClasses
Signature.SHA1WithRSA
Signature.SHA1WithRSA SupportedKeyClasses
Signature.SHA1WithRSA SupportedKeyFormats
Signature.SHA1withECDSA
Signature.SHA1withECDSA SupportedKeyClasses
Signature.SHA1withECDSA SupportedKeyFormats
Signature.SHA1withRSA/PSS
Signature.SHA1withRSA/PSS SupportedKeyClasses
Signature.SHA1withRSA/PSS SupportedKeyFormats
Signature.SHA224WithRSA
Signature.SHA224WithRSA SupportedKeyClasses
Signature.SHA224WithRSA SupportedKeyFormats
Signature.SHA224withECDSA
Signature.SHA224withECDSA SupportedKeyClasses
Signature.SHA224withECDSA SupportedKeyFormats
Signature.SHA224withRSA/PSS
Signature.SHA224withRSA/PSS SupportedKeyClasses
Signature.SHA224withRSA/PSS SupportedKeyFormats
Signature.SHA256WithRSA
Signature.SHA256WithRSA SupportedKeyClasses
Signature.SHA256WithRSA SupportedKeyFormats
Signature.SHA256withECDSA
Signature.SHA256withECDSA SupportedKeyClasses
Signature.SHA256withECDSA SupportedKeyFormats
Signature.SHA256withRSA/PSS
Signature.SHA256withRSA/PSS SupportedKeyClasses
Signature.SHA256withRSA/PSS SupportedKeyFormats
Signature.SHA384WithRSA
Signature.SHA384WithRSA SupportedKeyClasses
Signature.SHA384WithRSA SupportedKeyFormats
Signature.SHA384withECDSA
Signature.SHA384withECDSA SupportedKeyClasses
Signature.SHA384withECDSA SupportedKeyFormats
Signature.SHA384withRSA/PSS
Signature.SHA384withRSA/PSS SupportedKeyClasses
Signature.SHA384withRSA/PSS SupportedKeyFormats
Signature.SHA512WithRSA
Signature.SHA512WithRSA SupportedKeyClasses
Signature.SHA512WithRSA SupportedKeyFormats
Signature.SHA512withECDSA
Signature.SHA512withECDSA SupportedKeyClasses
Signature.SHA512withECDSA SupportedKeyFormats
Signature.SHA512withRSA/PSS
Signature.SHA512withRSA/PSS SupportedKeyClasses
Signature.SHA512withRSA/PSS SupportedKeyFormats
...Skipping testAesEax
...Skipping testAesEax
...java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
..Encoded ECPrivateKey:308187020100301306072a8648ce3d020106082a8648ce3d030107046d306b0201010420c1cf457bea837d25b78237f38e612feea6f5ceabf1de90420aafedf47de8ac4da14403420004b9202d6837a0c7c4b43bdb9d82aef460d9b7b291f93ed67e32678ba0f3eb8bd54e1528811de5844cd24f05bce9df8793d493c1c74e2e5154d1b2b2992ef4943c
...testWrongOrder: ECDHC not supported
testWrongOrder: ECDHC not supported
..testModifiedPublic:public point not on curve throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
testModifiedPublic:public point = (0,0) throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
testModifiedPublic:order = 1 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
testModifiedPublic:order = 26959946660873538060741835960514744168612397095220107664918121663170 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
testModifiedPublic:generator = (0,0) throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
testModifiedPublic:generator not on curve throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
testModifiedPublic:cofactor = 2 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
testModifiedPublic:cofactor = None throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
testModifiedPublic:modified prime throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
testModifiedPublic:using secp224r1 throws java.security.InvalidKeyException: error:06000066:public key routines:OPENSSL_internal:DECODE_ERROR
testModifiedPublic:a = 0 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
testModifiedPublic:new curve with generator of order 3 that is also on secp256r1 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
testModifiedPublic:order = -115792089210356248762697446949407573529996955224135760342422259061068512044369 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
testModifiedPublic:order = 0 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
testModifiedPublic:cofactor = -1 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
testModifiedPublic:cofactor = 0 throws java.security.spec.InvalidKeySpecException: org.conscrypt.OpenSSLX509CertificateFactory$ParsingException: Error parsing public key
testWrongOrder: ECDHC not supported
.Generated shared secret with a modified order:ECDH
expected:a00ddbd7313f449e4f3a58de9ac9d78bd8d52bf030d69b75b12e960378b433d7 computed:a00ddbd7313f449e4f3a58de9ac9d78bd8d52bf030d69b75b12e960378b433d7
testWrongOrder: can't modify order.
..testModifiedPublic:public point not on curve throws java.security.spec.InvalidKeySpecException: java.lang.RuntimeException: error:0f000078:elliptic curve routines:OPENSSL_internal:POINT_IS_NOT_ON_CURVE
testModifiedPublic:public point = (0,0) throws java.security.spec.InvalidKeySpecException: java.lang.RuntimeException: error:0f000078:elliptic curve routines:OPENSSL_internal:POINT_IS_NOT_ON_CURVE
testModifiedPublic:generator = (0,0) throws java.security.spec.InvalidKeySpecException: java.security.InvalidAlgorithmParameterException: EC_GROUP_new_arbitrary failed
testModifiedPublic:generator not on curve throws java.security.spec.InvalidKeySpecException: java.security.InvalidAlgorithmParameterException: EC_GROUP_new_arbitrary failed
modified prime throws java.lang.IllegalArgumentException: first coefficient is too large
testModifiedPublic:using secp224r1 throws java.security.InvalidKeyException: error:0f00006a:elliptic curve routines:OPENSSL_internal:INCOMPATIBLE_OBJECTS
testModifiedPublic:a = 0 throws java.security.InvalidKeyException: error:0f00006a:elliptic curve routines:OPENSSL_internal:INCOMPATIBLE_OBJECTS
testModifiedPublic:new curve with generator of order 3 that is also on secp256r1 throws java.security.InvalidKeyException: error:0f00006a:elliptic curve routines:OPENSSL_internal:INCOMPATIBLE_OBJECTS
order = -115792089210356248762697446949407573529996955224135760342422259061068512044369 throws java.lang.IllegalArgumentException: n is not positive
order = 0 throws java.lang.IllegalArgumentException: n is not positive
cofactor = -1 throws java.lang.IllegalArgumentException: h is not positive
cofactor = 0 throws java.lang.IllegalArgumentException: h is not positive
testWrongOrder: ECDHC not supported
.....Message:Hello
Hash:185f8db32271fe25f561a6fc938b2e264306ec304eda518007d1764826381969
Curve:secp256r1
Order:115792089210356248762697446949407573529996955224135760342422259061068512044369
Private key:
S:41508048581254992335392189966875657887006978714357129502518083623189738759498
encoded:308187020100301306072a8648ce3d020106082a8648ce3d030107046d306b02010104205bc4b91301987e7ebfd1875e3dbc6484a82529907e19bf11361870788275254aa14403420004b41008a23714b1b9ef8fabffc5f56b6644af2bce3a136bd9c89f9dfa86baab84c287e279c7bd22e2aaabddfdbc656aa974b91d102b7392ae36b2bc9f71f2fda8
Public key:
X:81444641885307227619114557974436278237654452399927516156155073352793631402884
Y:87988780056761634812641661264467351854881697285038383410234562844264297069992
encoded:3059301306072a8648ce3d020106082a8648ce3d03010703420004b41008a23714b1b9ef8fabffc5f56b6644af2bce3a136bd9c89f9dfa86baab84c287e279c7bd22e2aaabddfdbc656aa974b91d102b7392ae36b2bc9f71f2fda8
Signature:3046022100e10928795cf8e1a0fa11929ec9cb4cfe1d6d07517cd4787923c3625f4409e4f5022100da9a41bcc6deff31761824a5080a66220f885920bdbd31e5f45c8937bda7acd0
r:101786571896616475878332175447875317101783234251678494866332066766654815200501
s:98876749142054027996087544405958941878098897382515081852861643876245508173008
.Conscrypt curve:secp256r1 countLsb:515 countMsb:520
Conscrypt curve:secp224r1 countLsb:504 countMsb:541
Conscrypt curve:secp384r1 countLsb:522 countMsb:513
Conscrypt curve:secp521r1 countLsb:551 countMsb:504
Conscrypt curve:brainpoolP256r1 countLsb:510 countMsb:515
..testTiming algorithm:SHA256WithECDSA
count:50000 cutoff:153638 relative average:1.0002105292819192 sigmas:0.0815376402761955
count:25020 cutoff:51641 relative average:1.0015013749643311 sigmas:0.41133290212557233
count:12541 cutoff:51354 relative average:1.005060548666823 sigmas:0.9815768722538737
count:6261 cutoff:51107 relative average:1.0106688031774838 sigmas:1.4621710550304332
count:3125 cutoff:48881 relative average:1.0147660255907245 sigmas:1.4297142800637181
count:1569 cutoff:48571 relative average:1.012920228839651 sigmas:0.8864256305843974
count:784 cutoff:48460 relative average:1.003699194351599 sigmas:0.1794013917931513
count:398 cutoff:48389 relative average:0.9874594085136104 sigmas:0.4333314241838888
count:200 cutoff:48334 relative average:0.9736592981890677 sigmas:0.6452127890358904
count:98 cutoff:48276 relative average:1.020215773735074 sigmas:0.3466283128454264
count:49 cutoff:48234 relative average:1.0105517614702615 sigmas:0.1279333088308849
count:25 cutoff:48188 relative average:1.060008504579634 sigmas:0.519688894090779
count:13 cutoff:48151 relative average:1.0334964771122688 sigmas:0.20918543251951568
............testDefaultSize: keysize=2048
....Message:Hello
Hash:185f8db32271fe25f561a6fc938b2e264306ec304eda518007d1764826381969
Public key:
Modulus:26793122092162363697169875392992572744763633675400778165683867042164090448492397714666563295036015511509415005173742727052389244232596571525560655801484363732277921377767551726367169640966438160308314628684628887897348754499889762598226759944797287794531505819401258988497565688159522778726836044419474705381162528079359086163499889209591488645721934399924653199837184164241409128446027076989819711586609179615026062379848644630907172511233453310226298998443764649799568524290207103710496160662171950176369331906788770771287877648822684355049491423553342182802308694392933764901676277969054286842997159764742868759361
E:65537
encoded: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
Private key:
D:1068707759908473609423253601245432113341877333275328046796682741579888442275416587056317242314320889705613039428485906629654252152958339527670905142601282866663834387805699940001776373017537665667668115276019475652722269544504048528434694495806866198081767694012494180719768778940412415824188200615178430922014147447301003187951148716270622019854093121948016890449481363264733754457719725982924830031080773568503054280557121840687928390941887033491136759063818833852395484655221246037437963592306840238064988649271115654361655043830795137835859709041816367976144130818628174459041599137808367101167348025440753877273
encoded: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
Signature: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
..Rejected legacy signature:253e1d19bbe91064f2364c1e7db3ba8eb6dc5b19202e440eab6fbdf28c8c6ec05b812983713c338c72b6e99b8edf506a89ff9fc8e5c2c52362097a56dc228060eca01e1ff318c6c81617691438703411c1f953b21cd74331f87c9b8b189fdffdfe8550bd2bd1d47be915f8604a0f472199dd705e19b1b815f99b68d60bc257c7

Time: 11.714
There were 2 failures:
1) testByteBufferShiftedAlias(com.google.security.wycheproof.AesGcmTest)
java.lang.AssertionError: Overlapping buffers test failed with buffer type: direct buffers and output offset -1
	at com.google.security.wycheproof.AesGcmTest.testByteBufferShiftedAlias(AesGcmTest.java:590)
	at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.lang.reflect.Method.invoke(Method.java:498)
	at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:47)
	at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
	at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:44)
	at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
	at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:271)
	at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:70)
	at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:50)
	at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238)
	at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63)
	at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236)
	at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53)
	at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229)
	at org.junit.runners.ParentRunner.run(ParentRunner.java:309)
	at org.junit.runners.Suite.runChild(Suite.java:127)
	at org.junit.runners.Suite.runChild(Suite.java:26)
	at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238)
	at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63)
	at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236)
	at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53)
	at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229)
	at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
	at org.junit.runners.ParentRunner.run(ParentRunner.java:309)
	at com.google.testing.junit.runner.internal.junit4.CancellableRequestFactory$CancellableRunner.run(CancellableRequestFactory.java:89)
	at org.junit.runner.JUnitCore.run(JUnitCore.java:160)
	at org.junit.runner.JUnitCore.run(JUnitCore.java:138)
	at com.google.testing.junit.runner.junit4.JUnit4Runner.run(JUnit4Runner.java:112)
	at com.google.testing.junit.runner.BazelTestRunner.runTestsInSuite(BazelTestRunner.java:144)
	at com.google.testing.junit.runner.BazelTestRunner.main(BazelTestRunner.java:82)
Caused by: java.lang.RuntimeException: error:1e000067:Cipher functions:OPENSSL_internal:BUFFER_TOO_SMALL
	at org.conscrypt.NativeCrypto.EVP_AEAD_CTX_seal(Native Method)
	at org.conscrypt.OpenSSLCipher$EVP_AEAD.doFinalInternal(OpenSSLCipher.java:1213)
	at org.conscrypt.OpenSSLCipher.engineDoFinal(OpenSSLCipher.java:389)
	at javax.crypto.CipherSpi.bufferCrypt(CipherSpi.java:830)
	at javax.crypto.CipherSpi.engineDoFinal(CipherSpi.java:730)
	at javax.crypto.Cipher.doFinal(Cipher.java:2460)
	at com.google.security.wycheproof.AesGcmTest.testByteBufferShiftedAlias(AesGcmTest.java:569)
	... 32 more
2) testByteBufferSize(com.google.security.wycheproof.AesGcmTest)
java.lang.AssertionError: ciphertext size:32 expected:<16> but was:<32>
	at org.junit.Assert.fail(Assert.java:88)
	at org.junit.Assert.failNotEquals(Assert.java:743)
	at org.junit.Assert.assertEquals(Assert.java:118)
	at org.junit.Assert.assertEquals(Assert.java:555)
	at com.google.security.wycheproof.AesGcmTest.testByteBufferSize(AesGcmTest.java:353)
	at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.lang.reflect.Method.invoke(Method.java:498)
	at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:47)
	at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
	at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:44)
	at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
	at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:271)
	at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:70)
	at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:50)
	at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238)
	at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63)
	at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236)
	at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53)
	at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229)
	at org.junit.runners.ParentRunner.run(ParentRunner.java:309)
	at org.junit.runners.Suite.runChild(Suite.java:127)
	at org.junit.runners.Suite.runChild(Suite.java:26)
	at org.junit.runners.ParentRunner$3.run(ParentRunner.java:238)
	at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:63)
	at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:236)
	at org.junit.runners.ParentRunner.access$000(ParentRunner.java:53)
	at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:229)
	at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26)
	at org.junit.runners.ParentRunner.run(ParentRunner.java:309)
	at com.google.testing.junit.runner.internal.junit4.CancellableRequestFactory$CancellableRunner.run(CancellableRequestFactory.java:89)
	at org.junit.runner.JUnitCore.run(JUnitCore.java:160)
	at org.junit.runner.JUnitCore.run(JUnitCore.java:138)
	at com.google.testing.junit.runner.junit4.JUnit4Runner.run(JUnit4Runner.java:112)
	at com.google.testing.junit.runner.BazelTestRunner.runTestsInSuite(BazelTestRunner.java:144)
	at com.google.testing.junit.runner.BazelTestRunner.main(BazelTestRunner.java:82)

FAILURES!!!
Tests run: 63,  Failures: 2


BazelTestRunner exiting with a return value of 1
JVM shutdown hooks (if any) will run now.
The JVM will exit once they complete.

-- JVM shutdown starting at 2018-04-07 00:48:31 --