Uploaded image for project: 'JDK'
  1. JDK
  2. JDK-4504389

Optional Package Native Installation doesnot work on IE

    XMLWordPrintable

Details

    • rc1
    • x86
    • windows_2000
    • Verified

    Description

      m: [MD5withRSA]
        Signature:
      0000: 69 36 89 F7 34 2A 33 72 2F 6D 3B D4 22 B2 B8 6F i6..4*3r/m;."..o
      0010: 9A C5 36 66 0E 1B 3C A1 B1 75 5A E6 FD 35 D3 F8 ..6f..<..uZ..5..
      0020: A8 F2 07 6F 85 67 8E DE 2B B9 E2 17 B0 3A A0 F0 ...o.g..+....:..
      0030: 0E A2 00 9A DF F3 14 15 6E BB C8 85 5A 98 80 F9 ........n...Z...
      0040: FF BE 74 1D 3D F3 FE 30 25 D1 37 34 67 FA A5 71 ..t.=..0%.74g..q
      0050: 79 30 61 29 72 C0 E0 2C 4C FB 56 E4 3A A8 6F E5 y0a)r..,L.V.:.o.
      0060: 32 59 52 DB 75 28 50 59 0C F8 0B 19 E4 AC D9 AF 2YR.u(PY........
      0070: 96 8D 2F 50 DB 07 C3 EA 1F AB 33 E0 F5 2B 31 89 ../P......3..+1.

      ]
      Comparing certificate against Root CA certificate:
      [
      [
        Version: V3
        Subject: EmailAddress=###@###.###, CN=Thawte Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA
        Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4

        Key: com.sun.rsajca.JSA_RSAPublicKey@29ce8c
        Validity: [From: Wed Jul 31 17:00:00 PDT 1996,
                     To: Thu Dec 31 15:59:59 PST 2020]
        Issuer: EmailAddress=###@###.###, CN=Thawte Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA
        SerialNumber: [ 01]

      Certificate Extensions: 1
      [1]: ObjectId: 2.5.29.19 Criticality=true
      BasicConstraints:[
      CA:true
      PathLen:2147483647
      ]

      ]
        Algorithm: [MD5withRSA]
        Signature:
      0000: 07 FA 4C 69 5C FB 95 CC 46 EE 85 83 4D 21 30 8E ..Li\...F...M!0.
      0010: CA D9 A8 6F 49 1A E6 DA 51 E3 60 70 6C 84 61 11 ...oI...Q.`pl.a.
      0020: A1 1A C8 48 3E 59 43 7D 4F 95 3D A1 8B B7 0B 62 ...H>YC.O.=....b
      0030: 98 7A 75 8A DD 88 4E 4E 9E 40 DB A8 CC 32 74 B9 .zu...NN.@...2t.
      0040: 6F 0D C6 E3 B3 44 0B D9 8A 6F 9A 29 9B 99 18 28 o....D...o.)...(
      0050: 3B D1 E3 40 28 9A 5A 3C D5 B5 E7 20 1B 8B CA A4 ;..@(.Z<... ....
      0060: AB 8D E9 51 D9 E2 4C 2C 59 A9 DA B9 B2 75 1B F6 ...Q..L,Y....u..
      0070: 42 F2 EF C7 F2 18 F9 89 BC A3 FF 8A 23 2E 70 47 B...........#.pG

      ]
      Certificate has been verified with Root CA certificates sucessfully
      Checking if certificate is in JPI permanent certificate store
      Checking if certificate is in JPI session certificate store
      Modality pushed
      Modality popped
      User selected: 0
      User has granted the priviledges to the code for this session only
      Adding certificate in JPI session certificate store
      Added certificate in JPI session certificate store
      Saving certificates from JPI session certificate store
      Saved certificates from JPI session certificate store
      Starting the installation of F:\Documents and Settings\Administrator\java_plugin_AppletStore\1.3.1\ext\java3d.jar
      Launching Native Installer for Optional Package Installation
      Modality pushed
      Modality popped
      Optional Package Installation succeeded.
      Installation successful
      Unregistered modality listener
      Removed trace listener: sun.plugin.ocx.ActiveXAppletViewer[HelloUniverse,0,0,256x256,invalid,layout=java.awt.BorderLayout]
      Sending events to applet. STOP
      Sending events to applet. DESTROY
      Sending events to applet. DISPOSE
      Sending events to applet. QUIT

      Optional Package Installation is failing on windows for Native Installer testing on IE only.The installation of optional packages silently fails , Java 3D installer is never envoked and fails silently with NoClassFound Exception.

      The Security dialog asking for the permissions to proceed with the installation doesnot popup of Java#d optional package.

      Java Plug-in security dialog should popup for the signed native Installer and when the user grants the permission the installation should proceed and Java3D applet should be loaded after the sucessful Installation.The same works on Netscape 4.7 version .

      Test case works fine as expected with ladybird .I am attaching with is report are the Plug-in trace files for reference with ladybird and merlin test runs , I suspect the certificate verification part in merlin for IE is not happening .


      Tested on Host : bharath ,
      Plug-in : Merlin build 79/78
      Platform : win2000 and NT
      Browsers: NS4.72 and IE5


      How to reproduce the problem :

      1.Install Java Plug-in Merlin build 79

      2.Remove .java.policy file ( if any already there check from policy tool)
        Remove Java 3D if already installed and also make sure you donot have
        Java#d jar files in <JRE>/lib/ext directory

      3. Load the following applet in IE

        http://javaweb.sfbay.sun.com/~sridhare/stdext/testcases/java3d/Hello_3D12.html
        

      4. Option package installation and security dialog doesn't popup and silently
         throws ClassNotFound Exception.


      5. Start Netscape and load applet

      http://javaweb.sfbay.sun.com/~sridhare/stdext/testcases/java3d/Hello_3D12.html

      6. During installtion , choose the different JVM and choose Merlin
         (Current JVM option is not working , a bug on the Java3D side)

      7. Installtion continues and Java 3D is installed , applet is loaded.

      TRACE FILES :

      USING MERLIN PLUG-IN:

      Java(TM) Plug-in: Version 1.4.0
      Using JRE version 1.4.0-beta3 Java HotSpot(TM) Client VM
      User home directory = F:\Documents and Settings\Administrator
      Proxy Configuration: Manual Configuration
           Proxy: http=129.145.155.56:8080,https=129.145.155.56:8080,ftp=129.145.155.56:8080,gopher=129.145.155.56:8080
           Proxy Overrides: javator.eng


      ----------------------------------------------------
      c: clear console window
      f: finalize objects on finalization queue
      g: garbage collect
      h: display this help message
      l: dump classloader list
      m: print memory usage
      o: trigger logging
      p: reload proxy configuration
      q: hide console
      r: reload policy configuration
      s: dump system properties
      t: dump thread list
      x: clear classloader cache
      0-5: set trace level to <n>
      ----------------------------------------------------
      Trace level set to 5: basic, net, security, ext, liveconnect ... completed.
      Trace level set to 4: basic, net, security, ext ... completed.
      Stopping applet...
      Removed progress listener: sun.plugin.AppletViewer[DigitalClock,0,0,170x150,invalid,layout=java.awt.BorderLayout]
      Removed trace listener: sun.plugin.AppletViewer[DigitalClock,0,0,170x150,invalid,layout=java.awt.BorderLayout]
      Unregistered modality listener
      Destroying applet...
      Disposing applet...
      Quiting applet...
      Finding information...
      Releasing classloader: sun.plugin.ClassLoaderInfo@da3a1e, refcount=0
      Caching classloader: sun.plugin.ClassLoaderInfo@da3a1e
      Current classloader cache size: 1
      Done...
      Registered modality listener
      Referencing classloader: sun.plugin.ClassLoaderInfo@955cd5, refcount=1
      Added trace listener: sun.plugin.AppletViewer[HelloUniverse,0,0,256x256,invalid,layout=java.awt.BorderLayout]
      Added progress listener: sun.plugin.AppletViewer[HelloUniverse,0,0,256x256,invalid,layout=java.awt.BorderLayout]
      Loading applet...
      Initializing applet...
      Starting applet...
      Opening http://javaweb.eng.sun.com/~sridhare/stdext/testcases/java3d/test3d12.jar
      Connecting http://javaweb.eng.sun.com/~sridhare/stdext/testcases/java3d/test3d12.jar with proxy=129.145.155.56:8080
      Connecting http://javaweb.eng.sun.com/~sridhare/stdext/testcases/java3d/test3d12.jar with cookie "sun_visitor_uid=3733303736303039355e30"
      Downloading http://javaweb.eng.sun.com/~sridhare/stdext/testcases/java3d/test3d12.jar to JAR cache
      Cached JAR file name: test3d12.jar-1497923b-1976e4c0.zip
      Opening http://javaweb.eng.sun.com/~sridhare/stdext/testcases/java3d/javax/media/j3d/SceneGraphObject.class
      Connecting http://javaweb.eng.sun.com/~sridhare/stdext/testcases/java3d/javax/media/j3d/SceneGraphObject.class with proxy=129.145.155.56:8080
      Connecting http://javaweb.eng.sun.com/~sridhare/stdext/testcases/java3d/javax/media/j3d/SceneGraphObject.class with cookie "sun_visitor_uid=3733303736303039355e30"
      java.lang.NoClassDefFoundError: javax/media/j3d/SceneGraphObject
      at java.lang.Class.getDeclaredConstructors0(Native Method)
      at java.lang.Class.privateGetDeclaredConstructors(Unknown Source)
      at java.lang.Class.getConstructor0(Unknown Source)
      at java.lang.Class.newInstance0(Unknown Source)
      at java.lang.Class.newInstance(Unknown Source)
      at sun.applet.AppletPanel.createApplet(Unknown Source)
      at sun.plugin.AppletViewer.createApplet(Unknown Source)
      at sun.applet.AppletPanel.runLoader(Unknown Source)
      at sun.applet.AppletPanel.run(Unknown Source)
      at java.lang.Thread.run(Unknown Source)
      Stopping applet...
      Removed progress listener: sun.plugin.AppletViewer[HelloUniverse,0,0,256x256,invalid,layout=java.awt.BorderLayout]
      Removed trace listener: sun.plugin.AppletViewer[HelloUniverse,0,0,256x256,invalid,layout=java.awt.BorderLayout]
      Unregistered modality listener
      Destroying applet...
      Disposing applet...
      Quiting applet...




      Trace file using ladybird Java Plug-in :

      Java(TM) Plug-in: Version 1.3.1
      Using JRE version 1.3.1 Java HotSpot(TM) Client VM
      User home directory = F:\Documents and Settings\Administrator
      Proxy Configuration: Manual Configuration
           Proxy: 129.145.155.56:8080
           Proxy Overrides: javator.eng

      ----------------------------------------------------
      c: clear console window
      f: finalize objects on finalization queue
      g: garbage collect
      h: display this help message
      l: dump classloader list
      m: print memory usage
      q: hide console
      s: dump system properties
      t: dump thread list
      x: clear classloader cache
      0-5: set trace level to <n>
      ----------------------------------------------------
      Trace level set to 5: basic, net, security, ext, liveconnect ... completed.
      Removed trace listener: sun.plugin.ocx.ActiveXAppletViewer[DigitalClock,0,0,170x150,invalid,layout=java.awt.BorderLayout]
      Sending events to applet. STOP
      Sending events to applet. DESTROY
      Sending events to applet. DISPOSE
      Sending events to applet. QUIT
      Finding information...
      Releasing classloader: sun.plugin.ClassLoaderInfo@40ec97, refcount=0
      Caching classloader: sun.plugin.ClassLoaderInfo@40ec97
      Current classloader cache size: 1
      Done...
      Unregistered modality listener
      Registered modality listener
      Referencing classloader: sun.plugin.ClassLoaderInfo@56f122, refcount=1
      Added trace listener: sun.plugin.ocx.ActiveXAppletViewer[HelloUniverse,0,0,256x256,invalid,layout=java.awt.BorderLayout]
      Sending events to applet. LOAD
      Sending events to applet. INIT
      Sending events to applet. START
      Determine if the applet requests to install any HTML page
      HTML Installation finished.
      Determine if the applet requests to install any JAR
      Jar cache option: null
      Jar archive(s): null
      Jar cache version(s): null
      Applet Installation finished.
      Opening http://javaweb.eng.sun.com/~sridhare/stdext/testcases/java3d/test3d12.jar
      Cache filename: F:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\I183GH4B\test3d12[1].jar
      Optional Package to be installed Extension : null(javax.media.j3d), spec version(1.2), impl version(1.2.1) from null(com.sun)
      Modality pushed
      Modality popped
      User selected: 0
      Optional package download granted by user, download from http://javaweb.SFBay.sun.com/~sridhare/stdext/testcases/java3d/java3d.jar
      Opening http://javaweb.SFBay.sun.com/~sridhare/stdext/testcases/java3d/java3d.jar
      Cache filename: F:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\8V2BA5M7\java3d[1].jar
      Loading Root CA certificates from F:\PROGRA~1\JavaSoft\JRE\132E6D~1.1\lib\security\cacerts
      Loaded Root CA certificates from F:\PROGRA~1\JavaSoft\JRE\132E6D~1.1\lib\security\cacerts
      Loading JPI certificates from F:\Documents and Settings\Administrator\.java\jpicerts131
      Loaded JPI certificates from F:\Documents and Settings\Administrator\.java\jpicerts131
      Loading certificates from JPI session certificate store
      Loaded certificates from JPI session certificate store
      Check if certificate can be verified using certificates in Root CA certificate store
      Certificate to be verified:
      [
      [
        Version: V3
        Subject: EmailAddress=###@###.###, CN=Thawte Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA
        Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4

        Key: com.sun.rsajca.JSA_RSAPublicKey@465216
        Validity: [From: Wed Jul 31 17:00:00 PDT 1996,
                     To: Thu Dec 31 15:59:59 PST 2020]
        Issuer: EmailAddress=###@###.###, CN=Thawte Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA
        SerialNumber: [ 01]

      Certificate Extensions: 1
      [1]: ObjectId: 2.5.29.19 Criticality=true
      BasicConstraints:[
      CA:true
      PathLen:2147483647
      ]

      ]
        Algorithm: [MD5withRSA]
        Signature:
      0000: 07 FA 4C 69 5C FB 95 CC 46 EE 85 83 4D 21 30 8E ..Li\...F...M!0.
      0010: CA D9 A8 6F 49 1A E6 DA 51 E3 60 70 6C 84 61 11 ...oI...Q.`pl.a.
      0020: A1 1A C8 48 3E 59 43 7D 4F 95 3D A1 8B B7 0B 62 ...H>YC.O.=....b
      0030: 98 7A 75 8A DD 88 4E 4E 9E 40 DB A8 CC 32 74 B9 .zu...NN.@...2t.
      0040: 6F 0D C6 E3 B3 44 0B D9 8A 6F 9A 29 9B 99 18 28 o....D...o.)...(
      0050: 3B D1 E3 40 28 9A 5A 3C D5 B5 E7 20 1B 8B CA A4 ;..@(.Z<... ....
      0060: AB 8D E9 51 D9 E2 4C 2C 59 A9 DA B9 B2 75 1B F6 ...Q..L,Y....u..
      0070: 42 F2 EF C7 F2 18 F9 89 BC A3 FF 8A 23 2E 70 47 B...........#.pG

      ]
      Comparing certificate against Root CA certificate:
      [
      [
        Version: V3
        Subject: EmailAddress=###@###.###, CN=Thawte Personal Freemail CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA
        Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4

        Key: com.sun.rsajca.JSA_RSAPublicKey@ea9ba
        Validity: [From: Sun Dec 31 16:00:00 PST 1995,
                     To: Thu Dec 31 15:59:59 PST 2020]
        Issuer: EmailAddress=###@###.###, CN=Thawte Personal Freemail CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA
        SerialNumber: [ 0 ]

      Certificate Extensions: 1
      [1]: ObjectId: 2.5.29.19 Criticality=true
      BasicConstraints:[
      CA:true
      PathLen:2147483647
      ]

      ]
        Algorithm: [MD5withRSA]
        Signature:
      0000: C7 EC 92 7E 4E F8 F5 96 A5 67 62 2A A4 F0 4D 11 ....N....gb*..M.
      0010: 60 D0 6F 8D 60 58 61 AC 26 BB 52 35 5C 08 CF 30 `.o.`Xa.&.R5\..0
      0020: FB A8 4A 96 8A 1F 62 42 23 8C 17 0F F4 BA 64 9C ..J...bB#.....d.
      0030: 17 AC 47 29 DF 9D 98 5E D2 6C 60 71 5C A2 AC DC ..G)...^.l`q\...
      0040: 79 E3 E7 6E 00 47 1F B5 0D 28 E8 02 9D E4 9A FD y..n.G...(......
      0050: 13 F4 A6 D9 7C B1 F8 DC 5F 23 26 09 91 80 73 D0 ........_#&...s.
      0060: 14 1B DE 43 A9 83 25 F2 E6 9C 2F 15 CA FE A6 AB ...C..%.../.....
      0070: 8A 07 75 8B 0C DD 51 84 6B E4 F8 D1 CE 77 A2 81 ..u...Q.k....w..

      ]
      Comparing certificate against Root CA certificate:
      [
      [
        Version: V3
        Subject: EmailAddress=###@###.###, CN=Thawte Personal Basic CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA
        Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4

        Key: com.sun.rsajca.JSA_RSAPublicKey@5fc40c
        Validity: [From: Sun Dec 31 16:00:00 PST 1995,
                     To: Thu Dec 31 15:59:59 PST 2020]
        Issuer: EmailAddress=###@###.###, CN=Thawte Personal Basic CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA
        SerialNumber: [ 0 ]

      Certificate Extensions: 1
      [1]: ObjectId: 2.5.29.19 Criticality=true
      BasicConstraints:[
      CA:true
      PathLen:2147483647
      ]

      ]
        Algorithm: [MD5withRSA]
        Signature:
      0000: 2D E2 99 6B B0 3D 7A 89 D7 59 A2 94 01 1F 2B DD -..k.=z..Y....+.
      0010: 12 4B 53 C2 AD 7F AA A7 00 5C 91 40 57 25 4A 38 .KS......\.@W%J8
      0020: AA 84 70 B9 D9 80 0F A5 7B 5C FB 73 C6 BD D7 8A ..p......\.s....
      0030: 61 5C 03 E3 2D 27 A8 17 E0 84 85 42 DC 5E 9B C6 a\..-'.....B.^..
      0040: B7 B2 6D BB 74 AF E4 3F CB A7 B7 B0 E0 5D BE 78 ..m.t..?.....].x
      0050: 83 25 94 D2 DB 81 0F 79 07 6D 4F F4 39 15 5A 52 .%.....y.mO.9.ZR
      0060: 01 7B DE 32 D6 4D 38 F6 12 5C 06 50 DF 05 5B BD ...2.M8..\.P..[.
      0070: 14 4B A1 DF 29 BA 3B 41 8D F7 63 56 A1 DF 22 B1 .K..).;A..cV..".

      ]
      Comparing certificate against Root CA certificate:
      [
      [
        Version: V1
        Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
        Signature Algorithm: MD2withRSA, OID = 1.2.840.113549.1.1.2

        Key: com.sun.rsajca.JSA_RSAPublicKey@7f45d
        Validity: [From: Sun Jan 28 16:00:00 PST 1996,
                     To: Wed Jan 07 15:59:59 PST 2004]
        Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
        SerialNumber: [ e49efdf3 3ae80ecf a5113e19 a4240232 ]

      ]
        Algorithm: [MD2withRSA]
        Signature:
      0000: 61 70 EC 2F 3F 9E FD 2B E6 68 54 21 B0 67 79 08 ap./?..+.hT!.gy.
      0010: 0C 20 96 31 8A 0D 7A BE B6 26 DF 79 2C 22 69 49 . .1..z..&.y,"iI
      0020: 36 E3 97 77 62 61 A2 32 D7 7A 54 21 36 BA 02 C9 6..wba.2.zT!6...
      0030: 34 E7 25 DA 44 35 B0 D2 5C 80 5D B3 94 F8 F9 AC 4.%.D5..\.].....
      0040: EE A4 60 75 2A 1F 95 49 23 B1 4A 7C F4 B3 47 72 ..`u*..I#.J...Gr
      0050: 21 5B 7E 97 AB 54 AC 62 E7 5D EC AE 9B D2 C9 B2 ![...T.b.]......
      0060: 24 FB 82 AD E9 67 15 4B BA AA A6 F0 97 A0 F6 B0 $....g.K........
      0070: 97 57 00 C8 0C 3C 09 A0 82 04 BA 41 DA F7 99 A4 .W...<.....A....

      ]
      Comparing certificate against Root CA certificate:
      [
      [
        Version: V3
        Subject: EmailAddress=###@###.###, CN=Thawte Personal Premium CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA
        Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4

        Key: com.sun.rsajca.JSA_RSAPublicKey@b9279
        Validity: [From: Sun Dec 31 16:00:00 PST 1995,
                     To: Thu Dec 31 15:59:59 PST 2020]
        Issuer: EmailAddress=###@###.###, CN=Thawte Personal Premium CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape Town, ST=Western Cape, C=ZA
        SerialNumber: [ 0 ]

      Certificate Extensions: 1
      [1]: ObjectId: 2.5.29.19 Criticality=true
      BasicConstraints:[
      CA:true
      PathLen:2147483647
      ]

      ]
        Algorith

      Attachments

        Activity

          People

            djayaramsunw Devananda Jayaraman (Inactive)
            senugulaorcl Sridhar Enugula (Inactive)
            Votes:
            0 Vote for this issue
            Watchers:
            0 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved:
              Imported:
              Indexed: