m: [MD5withRSA]
Signature:
0000: 69 36 89 F7 34 2A 33 72 2F 6D 3B D4 22 B2 B8 6F i6..4*3r/m;."..o
0010: 9A C5 36 66 0E 1B 3C A1 B1 75 5A E6 FD 35 D3 F8 ..6f..<..uZ..5..
0020: A8 F2 07 6F 85 67 8E DE 2B B9 E2 17 B0 3A A0 F0 ...o.g..+....:..
0030: 0E A2 00 9A DF F3 14 15 6E BB C8 85 5A 98 80 F9 ........n...Z...
0040: FF BE 74 1D 3D F3 FE 30 25 D1 37 34 67 FA A5 71 ..t.=..0%.74g..q
0050: 79 30 61 29 72 C0 E0 2C 4C FB 56 E4 3A A8 6F E5 y0a)r..,L.V.:.o.
0060: 32 59 52 DB 75 28 50 59 0C F8 0B 19 E4 AC D9 AF 2YR.u(PY........
0070: 96 8D 2F 50 DB 07 C3 EA 1F AB 33 E0 F5 2B 31 89 ../P......3..+1.
]
Comparing certificate against Root CA certificate:
[
[
Version: V3
Subject: EmailAddress=###@###.###, CN=Thawte Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.rsajca.JSA_RSAPublicKey@29ce8c
Validity: [From: Wed Jul 31 17:00:00 PDT 1996,
To: Thu Dec 31 15:59:59 PST 2020]
Issuer: EmailAddress=###@###.###, CN=Thawte Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA
SerialNumber: [ 01]
Certificate Extensions: 1
[1]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
]
Algorithm: [MD5withRSA]
Signature:
0000: 07 FA 4C 69 5C FB 95 CC 46 EE 85 83 4D 21 30 8E ..Li\...F...M!0.
0010: CA D9 A8 6F 49 1A E6 DA 51 E3 60 70 6C 84 61 11 ...oI...Q.`pl.a.
0020: A1 1A C8 48 3E 59 43 7D 4F 95 3D A1 8B B7 0B 62 ...H>YC.O.=....b
0030: 98 7A 75 8A DD 88 4E 4E 9E 40 DB A8 CC 32 74 B9 .zu...NN.@...2t.
0040: 6F 0D C6 E3 B3 44 0B D9 8A 6F 9A 29 9B 99 18 28 o....D...o.)...(
0050: 3B D1 E3 40 28 9A 5A 3C D5 B5 E7 20 1B 8B CA A4 ;..@(.Z<... ....
0060: AB 8D E9 51 D9 E2 4C 2C 59 A9 DA B9 B2 75 1B F6 ...Q..L,Y....u..
0070: 42 F2 EF C7 F2 18 F9 89 BC A3 FF 8A 23 2E 70 47 B...........#.pG
]
Certificate has been verified with Root CA certificates sucessfully
Checking if certificate is in JPI permanent certificate store
Checking if certificate is in JPI session certificate store
Modality pushed
Modality popped
User selected: 0
User has granted the priviledges to the code for this session only
Adding certificate in JPI session certificate store
Added certificate in JPI session certificate store
Saving certificates from JPI session certificate store
Saved certificates from JPI session certificate store
Starting the installation of F:\Documents and Settings\Administrator\java_plugin_AppletStore\1.3.1\ext\java3d.jar
Launching Native Installer for Optional Package Installation
Modality pushed
Modality popped
Optional Package Installation succeeded.
Installation successful
Unregistered modality listener
Removed trace listener: sun.plugin.ocx.ActiveXAppletViewer[HelloUniverse,0,0,256x256,invalid,layout=java.awt.BorderLayout]
Sending events to applet. STOP
Sending events to applet. DESTROY
Sending events to applet. DISPOSE
Sending events to applet. QUIT
Optional Package Installation is failing on windows for Native Installer testing on IE only.The installation of optional packages silently fails , Java 3D installer is never envoked and fails silently with NoClassFound Exception.
The Security dialog asking for the permissions to proceed with the installation doesnot popup of Java#d optional package.
Java Plug-in security dialog should popup for the signed native Installer and when the user grants the permission the installation should proceed and Java3D applet should be loaded after the sucessful Installation.The same works on Netscape 4.7 version .
Test case works fine as expected with ladybird .I am attaching with is report are the Plug-in trace files for reference with ladybird and merlin test runs , I suspect the certificate verification part in merlin for IE is not happening .
Tested on Host : bharath ,
Plug-in : Merlin build 79/78
Platform : win2000 and NT
Browsers: NS4.72 and IE5
How to reproduce the problem :
1.Install Java Plug-in Merlin build 79
2.Remove .java.policy file ( if any already there check from policy tool)
Remove Java 3D if already installed and also make sure you donot have
Java#d jar files in <JRE>/lib/ext directory
3. Load the following applet in IE
http://javaweb.sfbay.sun.com/~sridhare/stdext/testcases/java3d/Hello_3D12.html
4. Option package installation and security dialog doesn't popup and silently
throws ClassNotFound Exception.
5. Start Netscape and load applet
http://javaweb.sfbay.sun.com/~sridhare/stdext/testcases/java3d/Hello_3D12.html
6. During installtion , choose the different JVM and choose Merlin
(Current JVM option is not working , a bug on the Java3D side)
7. Installtion continues and Java 3D is installed , applet is loaded.
TRACE FILES :
USING MERLIN PLUG-IN:
Java(TM) Plug-in: Version 1.4.0
Using JRE version 1.4.0-beta3 Java HotSpot(TM) Client VM
User home directory = F:\Documents and Settings\Administrator
Proxy Configuration: Manual Configuration
Proxy: http=129.145.155.56:8080,https=129.145.155.56:8080,ftp=129.145.155.56:8080,gopher=129.145.155.56:8080
Proxy Overrides: javator.eng
----------------------------------------------------
c: clear console window
f: finalize objects on finalization queue
g: garbage collect
h: display this help message
l: dump classloader list
m: print memory usage
o: trigger logging
p: reload proxy configuration
q: hide console
r: reload policy configuration
s: dump system properties
t: dump thread list
x: clear classloader cache
0-5: set trace level to <n>
----------------------------------------------------
Trace level set to 5: basic, net, security, ext, liveconnect ... completed.
Trace level set to 4: basic, net, security, ext ... completed.
Stopping applet...
Removed progress listener: sun.plugin.AppletViewer[DigitalClock,0,0,170x150,invalid,layout=java.awt.BorderLayout]
Removed trace listener: sun.plugin.AppletViewer[DigitalClock,0,0,170x150,invalid,layout=java.awt.BorderLayout]
Unregistered modality listener
Destroying applet...
Disposing applet...
Quiting applet...
Finding information...
Releasing classloader: sun.plugin.ClassLoaderInfo@da3a1e, refcount=0
Caching classloader: sun.plugin.ClassLoaderInfo@da3a1e
Current classloader cache size: 1
Done...
Registered modality listener
Referencing classloader: sun.plugin.ClassLoaderInfo@955cd5, refcount=1
Added trace listener: sun.plugin.AppletViewer[HelloUniverse,0,0,256x256,invalid,layout=java.awt.BorderLayout]
Added progress listener: sun.plugin.AppletViewer[HelloUniverse,0,0,256x256,invalid,layout=java.awt.BorderLayout]
Loading applet...
Initializing applet...
Starting applet...
Opening http://javaweb.eng.sun.com/~sridhare/stdext/testcases/java3d/test3d12.jar
Connecting http://javaweb.eng.sun.com/~sridhare/stdext/testcases/java3d/test3d12.jar with proxy=129.145.155.56:8080
Connecting http://javaweb.eng.sun.com/~sridhare/stdext/testcases/java3d/test3d12.jar with cookie "sun_visitor_uid=3733303736303039355e30"
Downloading http://javaweb.eng.sun.com/~sridhare/stdext/testcases/java3d/test3d12.jar to JAR cache
Cached JAR file name: test3d12.jar-1497923b-1976e4c0.zip
Opening http://javaweb.eng.sun.com/~sridhare/stdext/testcases/java3d/javax/media/j3d/SceneGraphObject.class
Connecting http://javaweb.eng.sun.com/~sridhare/stdext/testcases/java3d/javax/media/j3d/SceneGraphObject.class with proxy=129.145.155.56:8080
Connecting http://javaweb.eng.sun.com/~sridhare/stdext/testcases/java3d/javax/media/j3d/SceneGraphObject.class with cookie "sun_visitor_uid=3733303736303039355e30"
java.lang.NoClassDefFoundError: javax/media/j3d/SceneGraphObject
at java.lang.Class.getDeclaredConstructors0(Native Method)
at java.lang.Class.privateGetDeclaredConstructors(Unknown Source)
at java.lang.Class.getConstructor0(Unknown Source)
at java.lang.Class.newInstance0(Unknown Source)
at java.lang.Class.newInstance(Unknown Source)
at sun.applet.AppletPanel.createApplet(Unknown Source)
at sun.plugin.AppletViewer.createApplet(Unknown Source)
at sun.applet.AppletPanel.runLoader(Unknown Source)
at sun.applet.AppletPanel.run(Unknown Source)
at java.lang.Thread.run(Unknown Source)
Stopping applet...
Removed progress listener: sun.plugin.AppletViewer[HelloUniverse,0,0,256x256,invalid,layout=java.awt.BorderLayout]
Removed trace listener: sun.plugin.AppletViewer[HelloUniverse,0,0,256x256,invalid,layout=java.awt.BorderLayout]
Unregistered modality listener
Destroying applet...
Disposing applet...
Quiting applet...
Trace file using ladybird Java Plug-in :
Java(TM) Plug-in: Version 1.3.1
Using JRE version 1.3.1 Java HotSpot(TM) Client VM
User home directory = F:\Documents and Settings\Administrator
Proxy Configuration: Manual Configuration
Proxy: 129.145.155.56:8080
Proxy Overrides: javator.eng
----------------------------------------------------
c: clear console window
f: finalize objects on finalization queue
g: garbage collect
h: display this help message
l: dump classloader list
m: print memory usage
q: hide console
s: dump system properties
t: dump thread list
x: clear classloader cache
0-5: set trace level to <n>
----------------------------------------------------
Trace level set to 5: basic, net, security, ext, liveconnect ... completed.
Removed trace listener: sun.plugin.ocx.ActiveXAppletViewer[DigitalClock,0,0,170x150,invalid,layout=java.awt.BorderLayout]
Sending events to applet. STOP
Sending events to applet. DESTROY
Sending events to applet. DISPOSE
Sending events to applet. QUIT
Finding information...
Releasing classloader: sun.plugin.ClassLoaderInfo@40ec97, refcount=0
Caching classloader: sun.plugin.ClassLoaderInfo@40ec97
Current classloader cache size: 1
Done...
Unregistered modality listener
Registered modality listener
Referencing classloader: sun.plugin.ClassLoaderInfo@56f122, refcount=1
Added trace listener: sun.plugin.ocx.ActiveXAppletViewer[HelloUniverse,0,0,256x256,invalid,layout=java.awt.BorderLayout]
Sending events to applet. LOAD
Sending events to applet. INIT
Sending events to applet. START
Determine if the applet requests to install any HTML page
HTML Installation finished.
Determine if the applet requests to install any JAR
Jar cache option: null
Jar archive(s): null
Jar cache version(s): null
Applet Installation finished.
Opening http://javaweb.eng.sun.com/~sridhare/stdext/testcases/java3d/test3d12.jar
Cache filename: F:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\I183GH4B\test3d12[1].jar
Optional Package to be installed Extension : null(javax.media.j3d), spec version(1.2), impl version(1.2.1) from null(com.sun)
Modality pushed
Modality popped
User selected: 0
Optional package download granted by user, download from http://javaweb.SFBay.sun.com/~sridhare/stdext/testcases/java3d/java3d.jar
Opening http://javaweb.SFBay.sun.com/~sridhare/stdext/testcases/java3d/java3d.jar
Cache filename: F:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\8V2BA5M7\java3d[1].jar
Loading Root CA certificates from F:\PROGRA~1\JavaSoft\JRE\132E6D~1.1\lib\security\cacerts
Loaded Root CA certificates from F:\PROGRA~1\JavaSoft\JRE\132E6D~1.1\lib\security\cacerts
Loading JPI certificates from F:\Documents and Settings\Administrator\.java\jpicerts131
Loaded JPI certificates from F:\Documents and Settings\Administrator\.java\jpicerts131
Loading certificates from JPI session certificate store
Loaded certificates from JPI session certificate store
Check if certificate can be verified using certificates in Root CA certificate store
Certificate to be verified:
[
[
Version: V3
Subject: EmailAddress=###@###.###, CN=Thawte Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.rsajca.JSA_RSAPublicKey@465216
Validity: [From: Wed Jul 31 17:00:00 PDT 1996,
To: Thu Dec 31 15:59:59 PST 2020]
Issuer: EmailAddress=###@###.###, CN=Thawte Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA
SerialNumber: [ 01]
Certificate Extensions: 1
[1]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
]
Algorithm: [MD5withRSA]
Signature:
0000: 07 FA 4C 69 5C FB 95 CC 46 EE 85 83 4D 21 30 8E ..Li\...F...M!0.
0010: CA D9 A8 6F 49 1A E6 DA 51 E3 60 70 6C 84 61 11 ...oI...Q.`pl.a.
0020: A1 1A C8 48 3E 59 43 7D 4F 95 3D A1 8B B7 0B 62 ...H>YC.O.=....b
0030: 98 7A 75 8A DD 88 4E 4E 9E 40 DB A8 CC 32 74 B9 .zu...NN.@...2t.
0040: 6F 0D C6 E3 B3 44 0B D9 8A 6F 9A 29 9B 99 18 28 o....D...o.)...(
0050: 3B D1 E3 40 28 9A 5A 3C D5 B5 E7 20 1B 8B CA A4 ;..@(.Z<... ....
0060: AB 8D E9 51 D9 E2 4C 2C 59 A9 DA B9 B2 75 1B F6 ...Q..L,Y....u..
0070: 42 F2 EF C7 F2 18 F9 89 BC A3 FF 8A 23 2E 70 47 B...........#.pG
]
Comparing certificate against Root CA certificate:
[
[
Version: V3
Subject: EmailAddress=###@###.###, CN=Thawte Personal Freemail CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.rsajca.JSA_RSAPublicKey@ea9ba
Validity: [From: Sun Dec 31 16:00:00 PST 1995,
To: Thu Dec 31 15:59:59 PST 2020]
Issuer: EmailAddress=###@###.###, CN=Thawte Personal Freemail CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA
SerialNumber: [ 0 ]
Certificate Extensions: 1
[1]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
]
Algorithm: [MD5withRSA]
Signature:
0000: C7 EC 92 7E 4E F8 F5 96 A5 67 62 2A A4 F0 4D 11 ....N....gb*..M.
0010: 60 D0 6F 8D 60 58 61 AC 26 BB 52 35 5C 08 CF 30 `.o.`Xa.&.R5\..0
0020: FB A8 4A 96 8A 1F 62 42 23 8C 17 0F F4 BA 64 9C ..J...bB#.....d.
0030: 17 AC 47 29 DF 9D 98 5E D2 6C 60 71 5C A2 AC DC ..G)...^.l`q\...
0040: 79 E3 E7 6E 00 47 1F B5 0D 28 E8 02 9D E4 9A FD y..n.G...(......
0050: 13 F4 A6 D9 7C B1 F8 DC 5F 23 26 09 91 80 73 D0 ........_#&...s.
0060: 14 1B DE 43 A9 83 25 F2 E6 9C 2F 15 CA FE A6 AB ...C..%.../.....
0070: 8A 07 75 8B 0C DD 51 84 6B E4 F8 D1 CE 77 A2 81 ..u...Q.k....w..
]
Comparing certificate against Root CA certificate:
[
[
Version: V3
Subject: EmailAddress=###@###.###, CN=Thawte Personal Basic CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.rsajca.JSA_RSAPublicKey@5fc40c
Validity: [From: Sun Dec 31 16:00:00 PST 1995,
To: Thu Dec 31 15:59:59 PST 2020]
Issuer: EmailAddress=###@###.###, CN=Thawte Personal Basic CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA
SerialNumber: [ 0 ]
Certificate Extensions: 1
[1]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
]
Algorithm: [MD5withRSA]
Signature:
0000: 2D E2 99 6B B0 3D 7A 89 D7 59 A2 94 01 1F 2B DD -..k.=z..Y....+.
0010: 12 4B 53 C2 AD 7F AA A7 00 5C 91 40 57 25 4A 38 .KS......\.@W%J8
0020: AA 84 70 B9 D9 80 0F A5 7B 5C FB 73 C6 BD D7 8A ..p......\.s....
0030: 61 5C 03 E3 2D 27 A8 17 E0 84 85 42 DC 5E 9B C6 a\..-'.....B.^..
0040: B7 B2 6D BB 74 AF E4 3F CB A7 B7 B0 E0 5D BE 78 ..m.t..?.....].x
0050: 83 25 94 D2 DB 81 0F 79 07 6D 4F F4 39 15 5A 52 .%.....y.mO.9.ZR
0060: 01 7B DE 32 D6 4D 38 F6 12 5C 06 50 DF 05 5B BD ...2.M8..\.P..[.
0070: 14 4B A1 DF 29 BA 3B 41 8D F7 63 56 A1 DF 22 B1 .K..).;A..cV..".
]
Comparing certificate against Root CA certificate:
[
[
Version: V1
Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
Signature Algorithm: MD2withRSA, OID = 1.2.840.113549.1.1.2
Key: com.sun.rsajca.JSA_RSAPublicKey@7f45d
Validity: [From: Sun Jan 28 16:00:00 PST 1996,
To: Wed Jan 07 15:59:59 PST 2004]
Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
SerialNumber: [ e49efdf3 3ae80ecf a5113e19 a4240232 ]
]
Algorithm: [MD2withRSA]
Signature:
0000: 61 70 EC 2F 3F 9E FD 2B E6 68 54 21 B0 67 79 08 ap./?..+.hT!.gy.
0010: 0C 20 96 31 8A 0D 7A BE B6 26 DF 79 2C 22 69 49 . .1..z..&.y,"iI
0020: 36 E3 97 77 62 61 A2 32 D7 7A 54 21 36 BA 02 C9 6..wba.2.zT!6...
0030: 34 E7 25 DA 44 35 B0 D2 5C 80 5D B3 94 F8 F9 AC 4.%.D5..\.].....
0040: EE A4 60 75 2A 1F 95 49 23 B1 4A 7C F4 B3 47 72 ..`u*..I#.J...Gr
0050: 21 5B 7E 97 AB 54 AC 62 E7 5D EC AE 9B D2 C9 B2 ![...T.b.]......
0060: 24 FB 82 AD E9 67 15 4B BA AA A6 F0 97 A0 F6 B0 $....g.K........
0070: 97 57 00 C8 0C 3C 09 A0 82 04 BA 41 DA F7 99 A4 .W...<.....A....
]
Comparing certificate against Root CA certificate:
[
[
Version: V3
Subject: EmailAddress=###@###.###, CN=Thawte Personal Premium CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.rsajca.JSA_RSAPublicKey@b9279
Validity: [From: Sun Dec 31 16:00:00 PST 1995,
To: Thu Dec 31 15:59:59 PST 2020]
Issuer: EmailAddress=###@###.###, CN=Thawte Personal Premium CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA
SerialNumber: [ 0 ]
Certificate Extensions: 1
[1]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
]
Algorith
Signature:
0000: 69 36 89 F7 34 2A 33 72 2F 6D 3B D4 22 B2 B8 6F i6..4*3r/m;."..o
0010: 9A C5 36 66 0E 1B 3C A1 B1 75 5A E6 FD 35 D3 F8 ..6f..<..uZ..5..
0020: A8 F2 07 6F 85 67 8E DE 2B B9 E2 17 B0 3A A0 F0 ...o.g..+....:..
0030: 0E A2 00 9A DF F3 14 15 6E BB C8 85 5A 98 80 F9 ........n...Z...
0040: FF BE 74 1D 3D F3 FE 30 25 D1 37 34 67 FA A5 71 ..t.=..0%.74g..q
0050: 79 30 61 29 72 C0 E0 2C 4C FB 56 E4 3A A8 6F E5 y0a)r..,L.V.:.o.
0060: 32 59 52 DB 75 28 50 59 0C F8 0B 19 E4 AC D9 AF 2YR.u(PY........
0070: 96 8D 2F 50 DB 07 C3 EA 1F AB 33 E0 F5 2B 31 89 ../P......3..+1.
]
Comparing certificate against Root CA certificate:
[
[
Version: V3
Subject: EmailAddress=###@###.###, CN=Thawte Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.rsajca.JSA_RSAPublicKey@29ce8c
Validity: [From: Wed Jul 31 17:00:00 PDT 1996,
To: Thu Dec 31 15:59:59 PST 2020]
Issuer: EmailAddress=###@###.###, CN=Thawte Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA
SerialNumber: [ 01]
Certificate Extensions: 1
[1]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
]
Algorithm: [MD5withRSA]
Signature:
0000: 07 FA 4C 69 5C FB 95 CC 46 EE 85 83 4D 21 30 8E ..Li\...F...M!0.
0010: CA D9 A8 6F 49 1A E6 DA 51 E3 60 70 6C 84 61 11 ...oI...Q.`pl.a.
0020: A1 1A C8 48 3E 59 43 7D 4F 95 3D A1 8B B7 0B 62 ...H>YC.O.=....b
0030: 98 7A 75 8A DD 88 4E 4E 9E 40 DB A8 CC 32 74 B9 .zu...NN.@...2t.
0040: 6F 0D C6 E3 B3 44 0B D9 8A 6F 9A 29 9B 99 18 28 o....D...o.)...(
0050: 3B D1 E3 40 28 9A 5A 3C D5 B5 E7 20 1B 8B CA A4 ;..@(.Z<... ....
0060: AB 8D E9 51 D9 E2 4C 2C 59 A9 DA B9 B2 75 1B F6 ...Q..L,Y....u..
0070: 42 F2 EF C7 F2 18 F9 89 BC A3 FF 8A 23 2E 70 47 B...........#.pG
]
Certificate has been verified with Root CA certificates sucessfully
Checking if certificate is in JPI permanent certificate store
Checking if certificate is in JPI session certificate store
Modality pushed
Modality popped
User selected: 0
User has granted the priviledges to the code for this session only
Adding certificate in JPI session certificate store
Added certificate in JPI session certificate store
Saving certificates from JPI session certificate store
Saved certificates from JPI session certificate store
Starting the installation of F:\Documents and Settings\Administrator\java_plugin_AppletStore\1.3.1\ext\java3d.jar
Launching Native Installer for Optional Package Installation
Modality pushed
Modality popped
Optional Package Installation succeeded.
Installation successful
Unregistered modality listener
Removed trace listener: sun.plugin.ocx.ActiveXAppletViewer[HelloUniverse,0,0,256x256,invalid,layout=java.awt.BorderLayout]
Sending events to applet. STOP
Sending events to applet. DESTROY
Sending events to applet. DISPOSE
Sending events to applet. QUIT
Optional Package Installation is failing on windows for Native Installer testing on IE only.The installation of optional packages silently fails , Java 3D installer is never envoked and fails silently with NoClassFound Exception.
The Security dialog asking for the permissions to proceed with the installation doesnot popup of Java#d optional package.
Java Plug-in security dialog should popup for the signed native Installer and when the user grants the permission the installation should proceed and Java3D applet should be loaded after the sucessful Installation.The same works on Netscape 4.7 version .
Test case works fine as expected with ladybird .I am attaching with is report are the Plug-in trace files for reference with ladybird and merlin test runs , I suspect the certificate verification part in merlin for IE is not happening .
Tested on Host : bharath ,
Plug-in : Merlin build 79/78
Platform : win2000 and NT
Browsers: NS4.72 and IE5
How to reproduce the problem :
1.Install Java Plug-in Merlin build 79
2.Remove .java.policy file ( if any already there check from policy tool)
Remove Java 3D if already installed and also make sure you donot have
Java#d jar files in <JRE>/lib/ext directory
3. Load the following applet in IE
http://javaweb.sfbay.sun.com/~sridhare/stdext/testcases/java3d/Hello_3D12.html
4. Option package installation and security dialog doesn't popup and silently
throws ClassNotFound Exception.
5. Start Netscape and load applet
http://javaweb.sfbay.sun.com/~sridhare/stdext/testcases/java3d/Hello_3D12.html
6. During installtion , choose the different JVM and choose Merlin
(Current JVM option is not working , a bug on the Java3D side)
7. Installtion continues and Java 3D is installed , applet is loaded.
TRACE FILES :
USING MERLIN PLUG-IN:
Java(TM) Plug-in: Version 1.4.0
Using JRE version 1.4.0-beta3 Java HotSpot(TM) Client VM
User home directory = F:\Documents and Settings\Administrator
Proxy Configuration: Manual Configuration
Proxy: http=129.145.155.56:8080,https=129.145.155.56:8080,ftp=129.145.155.56:8080,gopher=129.145.155.56:8080
Proxy Overrides: javator.eng
----------------------------------------------------
c: clear console window
f: finalize objects on finalization queue
g: garbage collect
h: display this help message
l: dump classloader list
m: print memory usage
o: trigger logging
p: reload proxy configuration
q: hide console
r: reload policy configuration
s: dump system properties
t: dump thread list
x: clear classloader cache
0-5: set trace level to <n>
----------------------------------------------------
Trace level set to 5: basic, net, security, ext, liveconnect ... completed.
Trace level set to 4: basic, net, security, ext ... completed.
Stopping applet...
Removed progress listener: sun.plugin.AppletViewer[DigitalClock,0,0,170x150,invalid,layout=java.awt.BorderLayout]
Removed trace listener: sun.plugin.AppletViewer[DigitalClock,0,0,170x150,invalid,layout=java.awt.BorderLayout]
Unregistered modality listener
Destroying applet...
Disposing applet...
Quiting applet...
Finding information...
Releasing classloader: sun.plugin.ClassLoaderInfo@da3a1e, refcount=0
Caching classloader: sun.plugin.ClassLoaderInfo@da3a1e
Current classloader cache size: 1
Done...
Registered modality listener
Referencing classloader: sun.plugin.ClassLoaderInfo@955cd5, refcount=1
Added trace listener: sun.plugin.AppletViewer[HelloUniverse,0,0,256x256,invalid,layout=java.awt.BorderLayout]
Added progress listener: sun.plugin.AppletViewer[HelloUniverse,0,0,256x256,invalid,layout=java.awt.BorderLayout]
Loading applet...
Initializing applet...
Starting applet...
Opening http://javaweb.eng.sun.com/~sridhare/stdext/testcases/java3d/test3d12.jar
Connecting http://javaweb.eng.sun.com/~sridhare/stdext/testcases/java3d/test3d12.jar with proxy=129.145.155.56:8080
Connecting http://javaweb.eng.sun.com/~sridhare/stdext/testcases/java3d/test3d12.jar with cookie "sun_visitor_uid=3733303736303039355e30"
Downloading http://javaweb.eng.sun.com/~sridhare/stdext/testcases/java3d/test3d12.jar to JAR cache
Cached JAR file name: test3d12.jar-1497923b-1976e4c0.zip
Opening http://javaweb.eng.sun.com/~sridhare/stdext/testcases/java3d/javax/media/j3d/SceneGraphObject.class
Connecting http://javaweb.eng.sun.com/~sridhare/stdext/testcases/java3d/javax/media/j3d/SceneGraphObject.class with proxy=129.145.155.56:8080
Connecting http://javaweb.eng.sun.com/~sridhare/stdext/testcases/java3d/javax/media/j3d/SceneGraphObject.class with cookie "sun_visitor_uid=3733303736303039355e30"
java.lang.NoClassDefFoundError: javax/media/j3d/SceneGraphObject
at java.lang.Class.getDeclaredConstructors0(Native Method)
at java.lang.Class.privateGetDeclaredConstructors(Unknown Source)
at java.lang.Class.getConstructor0(Unknown Source)
at java.lang.Class.newInstance0(Unknown Source)
at java.lang.Class.newInstance(Unknown Source)
at sun.applet.AppletPanel.createApplet(Unknown Source)
at sun.plugin.AppletViewer.createApplet(Unknown Source)
at sun.applet.AppletPanel.runLoader(Unknown Source)
at sun.applet.AppletPanel.run(Unknown Source)
at java.lang.Thread.run(Unknown Source)
Stopping applet...
Removed progress listener: sun.plugin.AppletViewer[HelloUniverse,0,0,256x256,invalid,layout=java.awt.BorderLayout]
Removed trace listener: sun.plugin.AppletViewer[HelloUniverse,0,0,256x256,invalid,layout=java.awt.BorderLayout]
Unregistered modality listener
Destroying applet...
Disposing applet...
Quiting applet...
Trace file using ladybird Java Plug-in :
Java(TM) Plug-in: Version 1.3.1
Using JRE version 1.3.1 Java HotSpot(TM) Client VM
User home directory = F:\Documents and Settings\Administrator
Proxy Configuration: Manual Configuration
Proxy: 129.145.155.56:8080
Proxy Overrides: javator.eng
----------------------------------------------------
c: clear console window
f: finalize objects on finalization queue
g: garbage collect
h: display this help message
l: dump classloader list
m: print memory usage
q: hide console
s: dump system properties
t: dump thread list
x: clear classloader cache
0-5: set trace level to <n>
----------------------------------------------------
Trace level set to 5: basic, net, security, ext, liveconnect ... completed.
Removed trace listener: sun.plugin.ocx.ActiveXAppletViewer[DigitalClock,0,0,170x150,invalid,layout=java.awt.BorderLayout]
Sending events to applet. STOP
Sending events to applet. DESTROY
Sending events to applet. DISPOSE
Sending events to applet. QUIT
Finding information...
Releasing classloader: sun.plugin.ClassLoaderInfo@40ec97, refcount=0
Caching classloader: sun.plugin.ClassLoaderInfo@40ec97
Current classloader cache size: 1
Done...
Unregistered modality listener
Registered modality listener
Referencing classloader: sun.plugin.ClassLoaderInfo@56f122, refcount=1
Added trace listener: sun.plugin.ocx.ActiveXAppletViewer[HelloUniverse,0,0,256x256,invalid,layout=java.awt.BorderLayout]
Sending events to applet. LOAD
Sending events to applet. INIT
Sending events to applet. START
Determine if the applet requests to install any HTML page
HTML Installation finished.
Determine if the applet requests to install any JAR
Jar cache option: null
Jar archive(s): null
Jar cache version(s): null
Applet Installation finished.
Opening http://javaweb.eng.sun.com/~sridhare/stdext/testcases/java3d/test3d12.jar
Cache filename: F:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\I183GH4B\test3d12[1].jar
Optional Package to be installed Extension : null(javax.media.j3d), spec version(1.2), impl version(1.2.1) from null(com.sun)
Modality pushed
Modality popped
User selected: 0
Optional package download granted by user, download from http://javaweb.SFBay.sun.com/~sridhare/stdext/testcases/java3d/java3d.jar
Opening http://javaweb.SFBay.sun.com/~sridhare/stdext/testcases/java3d/java3d.jar
Cache filename: F:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\8V2BA5M7\java3d[1].jar
Loading Root CA certificates from F:\PROGRA~1\JavaSoft\JRE\132E6D~1.1\lib\security\cacerts
Loaded Root CA certificates from F:\PROGRA~1\JavaSoft\JRE\132E6D~1.1\lib\security\cacerts
Loading JPI certificates from F:\Documents and Settings\Administrator\.java\jpicerts131
Loaded JPI certificates from F:\Documents and Settings\Administrator\.java\jpicerts131
Loading certificates from JPI session certificate store
Loaded certificates from JPI session certificate store
Check if certificate can be verified using certificates in Root CA certificate store
Certificate to be verified:
[
[
Version: V3
Subject: EmailAddress=###@###.###, CN=Thawte Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.rsajca.JSA_RSAPublicKey@465216
Validity: [From: Wed Jul 31 17:00:00 PDT 1996,
To: Thu Dec 31 15:59:59 PST 2020]
Issuer: EmailAddress=###@###.###, CN=Thawte Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA
SerialNumber: [ 01]
Certificate Extensions: 1
[1]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
]
Algorithm: [MD5withRSA]
Signature:
0000: 07 FA 4C 69 5C FB 95 CC 46 EE 85 83 4D 21 30 8E ..Li\...F...M!0.
0010: CA D9 A8 6F 49 1A E6 DA 51 E3 60 70 6C 84 61 11 ...oI...Q.`pl.a.
0020: A1 1A C8 48 3E 59 43 7D 4F 95 3D A1 8B B7 0B 62 ...H>YC.O.=....b
0030: 98 7A 75 8A DD 88 4E 4E 9E 40 DB A8 CC 32 74 B9 .zu...NN.@...2t.
0040: 6F 0D C6 E3 B3 44 0B D9 8A 6F 9A 29 9B 99 18 28 o....D...o.)...(
0050: 3B D1 E3 40 28 9A 5A 3C D5 B5 E7 20 1B 8B CA A4 ;..@(.Z<... ....
0060: AB 8D E9 51 D9 E2 4C 2C 59 A9 DA B9 B2 75 1B F6 ...Q..L,Y....u..
0070: 42 F2 EF C7 F2 18 F9 89 BC A3 FF 8A 23 2E 70 47 B...........#.pG
]
Comparing certificate against Root CA certificate:
[
[
Version: V3
Subject: EmailAddress=###@###.###, CN=Thawte Personal Freemail CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.rsajca.JSA_RSAPublicKey@ea9ba
Validity: [From: Sun Dec 31 16:00:00 PST 1995,
To: Thu Dec 31 15:59:59 PST 2020]
Issuer: EmailAddress=###@###.###, CN=Thawte Personal Freemail CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA
SerialNumber: [ 0 ]
Certificate Extensions: 1
[1]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
]
Algorithm: [MD5withRSA]
Signature:
0000: C7 EC 92 7E 4E F8 F5 96 A5 67 62 2A A4 F0 4D 11 ....N....gb*..M.
0010: 60 D0 6F 8D 60 58 61 AC 26 BB 52 35 5C 08 CF 30 `.o.`Xa.&.R5\..0
0020: FB A8 4A 96 8A 1F 62 42 23 8C 17 0F F4 BA 64 9C ..J...bB#.....d.
0030: 17 AC 47 29 DF 9D 98 5E D2 6C 60 71 5C A2 AC DC ..G)...^.l`q\...
0040: 79 E3 E7 6E 00 47 1F B5 0D 28 E8 02 9D E4 9A FD y..n.G...(......
0050: 13 F4 A6 D9 7C B1 F8 DC 5F 23 26 09 91 80 73 D0 ........_#&...s.
0060: 14 1B DE 43 A9 83 25 F2 E6 9C 2F 15 CA FE A6 AB ...C..%.../.....
0070: 8A 07 75 8B 0C DD 51 84 6B E4 F8 D1 CE 77 A2 81 ..u...Q.k....w..
]
Comparing certificate against Root CA certificate:
[
[
Version: V3
Subject: EmailAddress=###@###.###, CN=Thawte Personal Basic CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.rsajca.JSA_RSAPublicKey@5fc40c
Validity: [From: Sun Dec 31 16:00:00 PST 1995,
To: Thu Dec 31 15:59:59 PST 2020]
Issuer: EmailAddress=###@###.###, CN=Thawte Personal Basic CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA
SerialNumber: [ 0 ]
Certificate Extensions: 1
[1]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
]
Algorithm: [MD5withRSA]
Signature:
0000: 2D E2 99 6B B0 3D 7A 89 D7 59 A2 94 01 1F 2B DD -..k.=z..Y....+.
0010: 12 4B 53 C2 AD 7F AA A7 00 5C 91 40 57 25 4A 38 .KS......\.@W%J8
0020: AA 84 70 B9 D9 80 0F A5 7B 5C FB 73 C6 BD D7 8A ..p......\.s....
0030: 61 5C 03 E3 2D 27 A8 17 E0 84 85 42 DC 5E 9B C6 a\..-'.....B.^..
0040: B7 B2 6D BB 74 AF E4 3F CB A7 B7 B0 E0 5D BE 78 ..m.t..?.....].x
0050: 83 25 94 D2 DB 81 0F 79 07 6D 4F F4 39 15 5A 52 .%.....y.mO.9.ZR
0060: 01 7B DE 32 D6 4D 38 F6 12 5C 06 50 DF 05 5B BD ...2.M8..\.P..[.
0070: 14 4B A1 DF 29 BA 3B 41 8D F7 63 56 A1 DF 22 B1 .K..).;A..cV..".
]
Comparing certificate against Root CA certificate:
[
[
Version: V1
Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
Signature Algorithm: MD2withRSA, OID = 1.2.840.113549.1.1.2
Key: com.sun.rsajca.JSA_RSAPublicKey@7f45d
Validity: [From: Sun Jan 28 16:00:00 PST 1996,
To: Wed Jan 07 15:59:59 PST 2004]
Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
SerialNumber: [ e49efdf3 3ae80ecf a5113e19 a4240232 ]
]
Algorithm: [MD2withRSA]
Signature:
0000: 61 70 EC 2F 3F 9E FD 2B E6 68 54 21 B0 67 79 08 ap./?..+.hT!.gy.
0010: 0C 20 96 31 8A 0D 7A BE B6 26 DF 79 2C 22 69 49 . .1..z..&.y,"iI
0020: 36 E3 97 77 62 61 A2 32 D7 7A 54 21 36 BA 02 C9 6..wba.2.zT!6...
0030: 34 E7 25 DA 44 35 B0 D2 5C 80 5D B3 94 F8 F9 AC 4.%.D5..\.].....
0040: EE A4 60 75 2A 1F 95 49 23 B1 4A 7C F4 B3 47 72 ..`u*..I#.J...Gr
0050: 21 5B 7E 97 AB 54 AC 62 E7 5D EC AE 9B D2 C9 B2 ![...T.b.]......
0060: 24 FB 82 AD E9 67 15 4B BA AA A6 F0 97 A0 F6 B0 $....g.K........
0070: 97 57 00 C8 0C 3C 09 A0 82 04 BA 41 DA F7 99 A4 .W...<.....A....
]
Comparing certificate against Root CA certificate:
[
[
Version: V3
Subject: EmailAddress=###@###.###, CN=Thawte Personal Premium CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA
Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
Key: com.sun.rsajca.JSA_RSAPublicKey@b9279
Validity: [From: Sun Dec 31 16:00:00 PST 1995,
To: Thu Dec 31 15:59:59 PST 2020]
Issuer: EmailAddress=###@###.###, CN=Thawte Personal Premium CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA
SerialNumber: [ 0 ]
Certificate Extensions: 1
[1]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
]
Algorith