-
Bug
-
Resolution: Duplicate
-
P2
-
None
-
5.0
-
x86, sparc
-
linux, solaris_8
() correctly generates SignatureException on uninitialized Signature object.
Provider SunRsaSign, algorithm SHA384withRSA: Failed. Cannot initialize Signature object for signing. Test not run.
Provider SunRsaSign, algorithm MD5withRSA: Passed. verify() correctly generates SignatureException on uninitialized Signature object.
Provider SunRsaSign, algorithm SHA1withRSA: Passed. verify() correctly generates SignatureException on uninitialized Signature object.
Provider SunRsaSign, algorithm SHA256withRSA: Passed. verify() correctly generates SignatureException on uninitialized Signature object.
Provider SunRsaSign, algorithm SHA512withRSA: Failed. Cannot initialize Signature object for signing. Test not run.
verify004: Failed. test cases: 10; passed: 8; failed: 2; first test case failure: Provider SunRsaSign, algorithm SHA384withRSA
STATUS:Failed.test cases: 4; all failed; first test case failure: verify001
result: Failed. test cases: 4; all failed; first test case failure: verify001
test result: Failed. test cases: 4; all failed; first test case failure: verify001
Specific machine info:
======================
Hostname: linux-10
OS: Solaris 8 (x86)
Hostname: linux-19
OS: Linux RedHat 7.3
======================================================================
Name: mmR10223 Date: 06/03/2003
Filed By : J2SE-SQA [###@###.###
JDK : JDK1.5.0-b07 (passes on JDK1.5.0-b06, JDK1.4.2-b24, JDK1.4.1-b21)
JCK : JCK1.4a-runtime
Platform[s] : all
switch/Mode : default
JCK test owner : http://javaweb.eng/jck/usr/owners.jto
Falling test[s]:
api/java_security/Signature/SignatureTests.html#verify [verify001, verify002, verify003, verify004]
api/java_security/Signature/SignatureTests.html#initSign [initSign001, initSign003, initSign004, initSign006]
api/java_security/Signature/SignatureTests.html#initVerify [initVerify001, initVerify002 ]
api/java_security/Signature/SignatureTests.html#signTests [sign003, sign005, sign006]
api/java_security/Signature/SignatureTests.html#update [update001, update002, update003]
api/java_security/Signature/SignatureTests.html#update2 [update005, update006]
api/java_security/Signature/SignatureTests.html#update3 [update007, update008, update009]
api/java_security/Signature/SignatureTests.html#update4 [update011, update012, update013]
api/java_security/Signature/SignatureTests.html#SIGclone [clone001]
api/java_security/SignedObject/SignedObjectTests.html#CtorGetTests [SignedObject001]
api/java_security/SignedObject/SignedObjectTests.html#getSignatureTests [getSignature001, getSignature002]
api/java_security/SignedObject/SignedObjectTests.html#verifyTests [verify001, verify002, verify003, verify004]
api/java_security/SignedObject/SignedObjectTests.html#miscTests [misc001, misc002, misc003, misc004, misc005]
api/java_security/SignedObject/serial/index.html#ConstructorTests [ConstructorTest0001]
Test source location:
=====================
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/verifyTests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/initSignTests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/initVerifyTests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/signTestsTests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/updateTests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/update2Tests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/update3Tests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/update4Tests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/SIGcloneTests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/SignedObject/CtorGetTests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/SignedObject/getSignatureTests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/SignedObject/verifyTests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/SignedObject/miscTests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/SignedObject/serial/ConstructorTests.java
jtr file location:
==================
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_verify.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_initSign.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_initVerify.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_signTests.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_update.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_update2.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_update3.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_update4.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_SIGclone.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/SignedObject/SignedObjectTests_CtorGetTests.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/SignedObject/SignedObjectTests_getSignatureTests.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/SignedObject/SignedObjectTests_verifyTests.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/SignedObject/SignedObjectTests_miscTests.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/SignedObject/serial/index_ConstructorTests.jtr
How to reproduce:
=================
Run the following script (you may need to change its variables)
--- script start (verifyTests ) ---
#!/bin/bash
JCK="/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a"
JDK="/java/re/jdk/1.5.0/promoted/latest/binaries/linux-i586"
CLASSPATH="$JCK/classes:$JCK/lib/javatest.jar"
$JDK/bin/java $switches -cp $CLASSPATH javasoft.sqe.tests.api.java.security.Signature.verifyTests -TestCaseID verify001, verify002, verify003, verify004
--- script end ---
Test output ( verifyTests ):
============
Using DSA algorithm from SUN
verify() returns true on bytes signed by Signature object with private key.
verify() returns false after the object has been reset and not updated.
Using RSA algorithm from SunJSSE
verify() returns true on bytes signed by Signature object with private key.
verify() returns false after the object has been reset and not updated.
Using RSA algorithm from SunJSSE
verify() returns true on bytes signed by Signature object with private key.
verify() returns false after the object has been reset and not updated.
Using RSA algorithm from SunJSSE
verify() returns true on bytes signed by Signature object with private key.
verify() returns false after the object has been reset and not updated.
Using RSA algorithm from SunRsaSign
verify() returns true on bytes signed by Signature object with private key.
verify() returns false after the object has been reset and not updated.
Using RSA algorithm from SunRsaSign
initVerify() throw unexpected InvalidKeyException.
Using RSA algorithm from SunRsaSign
verify() returns true on bytes signed by Signature object with private key.
verify() returns false after the object has been reset and not updated.
Using RSA algorithm from SunRsaSign
verify() returns true on bytes signed by Signature object with private key.
verify() returns false after the object has been reset and not updated.
Using RSA algorithm from SunRsaSign
verify() returns true on bytes signed by Signature object with private key.
verify() returns false after the object has been reset and not updated.
Using RSA algorithm from SunRsaSign
initVerify() throw unexpected InvalidKeyException.
Using DSA algorithm from SUN
verify() returns false on bytes signed by the different Signature object.
Signature objects differ on public/private keys
Using RSA algorithm from SunJSSE
verify() returns false on bytes signed by the different Signature object.
Signature objects differ on public/private keys
Using RSA algorithm from SunJSSE
verify() returns false on bytes signed by the different Signature object.
Signature objects differ on public/private keys
Using RSA algorithm from SunJSSE
verify() returns false on bytes signed by the different Signature object.
Signature objects differ on public/private keys
Using RSA algorithm from SunRsaSign
Unexpected SignatureException when verifying Signature object.
Using RSA algorithm from SunRsaSign
Unexpected exception during initSign/initVerify: java.security.InvalidKeyException: Key is too short for this signature algorithm
Using RSA algorithm from SunRsaSign
Unexpected SignatureException when verifying Signature object.
Using RSA algorithm from SunRsaSign
Unexpected SignatureException when verifying Signature object.
Using RSA algorithm from SunRsaSign
Unexpected SignatureException when verifying Signature object.
Using RSA algorithm from SunRsaSign
Unexpected exception during initSign/initVerify: java.security.InvalidKeyException: Key is too short for this signature algorithm
Using DSA algorithm from SUN
Expected SignatureException occured when verifying corrupted data.
Using RSA algorithm from SunJSSE
No exception thrown when verifying corrupted signature.
Corrupted data did not verified.
Using RSA algorithm from SunJSSE
No exception thrown when verifying corrupted signature.
Corrupted data did not verified.
Using RSA algorithm from SunJSSE
No exception thrown when verifying corrupted signature.
Corrupted data did not verified.
Using RSA algorithm from SunRsaSign
Expected SignatureException occured when verifying corrupted data.
Using RSA algorithm from SunRsaSign
initSign()/initVerify() throw unexpected InvalidKeyException.
Using RSA algorithm from SunRsaSign
Expected SignatureException occured when verifying corrupted data.
Using RSA algorithm from SunRsaSign
Expected SignatureException occured when verifying corrupted data.
Using RSA algorithm from SunRsaSign
Expected SignatureException occured when verifying corrupted data.
Using RSA algorithm from SunRsaSign
initSign()/initVerify() throw unexpected InvalidKeyException.
Using DSA algorithm from SUN
Expected SignatureException generated by verify()
Using RSA algorithm from SunJSSE
Expected SignatureException generated by verify()
Using RSA algorithm from SunJSSE
Expected SignatureException generated by verify()
Using RSA algorithm from SunJSSE
Expected SignatureException generated by verify()
Using RSA algorithm from SunRsaSign
Expected SignatureException generated by verify()
Using RSA algorithm from SunRsaSign
initSign()/initVerify() throw unexpected InvalidKeyException.
Using RSA algorithm from SunRsaSign
Expected SignatureException generated by verify()
Using RSA algorithm from SunRsaSign
Expected SignatureException generated by verify()
Using RSA algorithm from SunRsaSign
Expected SignatureException generated by verify()
Using RSA algorithm from SunRsaSign
initSign()/initVerify() throw unexpected InvalidKeyException.
----------log:(45/4850)----------
Provider SUN, algorithm SHA1withDSA: Passed. All verify() subtests passed in this test.
Provider SunJSSE, algorithm MD2withRSA: Passed. All verify() subtests passed in this test.
Provider SunJSSE, algorithm MD5withRSA: Passed. All verify() subtests passed in this test.
Provider SunJSSE, algorithm SHA1withRSA: Passed. All verify() subtests passed in this test.
Provider SunRsaSign, algorithm MD2withRSA: Passed. All verify() subtests passed in this test.
Provider SunRsaSign, algorithm SHA384withRSA: Failed. Cannot initialize Signature object for verifying. Test not run.
Provider SunRsaSign, algorithm MD5withRSA: Passed. All verify() subtests passed in this test.
Provider SunRsaSign, algorithm SHA1withRSA: Passed. All verify() subtests passed in this test.
Provider SunRsaSign, algorithm SHA256withRSA: Passed. All verify() subtests passed in this test.
Provider SunRsaSign, algorithm SHA512withRSA: Failed. Cannot initialize Signature object for verifying. Test not run.
verify001: Failed. test cases: 10; passed: 8; failed: 2; first test case failure: Provider SunRsaSign, algorithm SHA384withRSA
Provider SUN, algorithm SHA1withDSA: Passed. verify() correctly returns false on improper Signature.
Provider SunJSSE, algorithm MD2withRSA: Passed. verify() correctly returns false on improper Signature.
Provider SunJSSE, algorithm MD5withRSA: Passed. verify() correctly returns false on improper Signature.
Provider SunJSSE, algorithm SHA1withRSA: Passed. verify() correctly returns false on improper Signature.
Provider SunRsaSign, algorithm MD2withRSA: Failed. Unable to verify Signature object with input data.
Provider SunRsaSign, algorithm SHA384withRSA: Failed. Unable to initialize signature objects. Test not run.
Provider SunRsaSign, algorithm MD5withRSA: Failed. Unable to verify Signature object with input data.
Provider SunRsaSign, algorithm SHA1withRSA: Failed. Unable to verify Signature object with input data.
Provider SunRsaSign, algorithm SHA256withRSA: Failed. Unable to verify Signature object with input data.
Provider SunRsaSign, algorithm SHA512withRSA: Failed. Unable to initialize signature objects. Test not run.
verify002: Failed. test cases: 10; passed: 4; failed: 6; first test case failure: Provider SunRsaSign, algorithm MD2withRSA
Provider SUN, algorithm SHA1withDSA: Passed. SignatureException thrown when verifying corrupted signature.
Provider SunJSSE, algorithm MD2withRSA: Passed. OKAY
Provider SunJSSE, algorithm MD5withRSA: Passed. OKAY
Provider SunJSSE, algorithm SHA1withRSA: Passed. OKAY
Provider SunRsaSign, algorithm MD2withRSA: Passed. SignatureException thrown when verifying corrupted signature.
Provider SunRsaSign, algorithm SHA384withRSA: Failed. Cannot initialize Signature object for signing. Test not run.
Provider SunRsaSign, algorithm MD5withRSA: Passed. SignatureException thrown when verifying corrupted signature.
Provider SunRsaSign, algorithm SHA1withRSA: Passed. SignatureException thrown when verifying corrupted signature.
Provider SunRsaSign, algorithm SHA256withRSA: Passed. SignatureException thrown when verifying corrupted signature.
Provider SunRsaSign, algorithm SHA512withRSA: Failed. Cannot initialize Signature object for signing. Test not run.
verify003: Failed. test cases: 10; passed: 8; failed: 2; first test case failure: Provider SunRsaSign, algorithm SHA384withRSA
Provider SUN, algorithm SHA1withDSA: Passed. verify() correctly generates SignatureException on uninitialized Signature object.
Provider SunJSSE, algorithm MD2withRSA: Passed. verify() correctly generates SignatureException on uninitialized Signature object.
Provider SunJSSE, algorithm MD5withRSA: Passed. verify() correctly generates SignatureException on uninitialized Signature object.
Provider SunJSSE, algorithm SHA1withRSA: Passed. verify() correctly generates SignatureException on uninitialized Signature object.
Provider SunRsaSign, algorithm MD2withRSA: Passed. verify
Provider SunRsaSign, algorithm SHA384withRSA: Failed. Cannot initialize Signature object for signing. Test not run.
Provider SunRsaSign, algorithm MD5withRSA: Passed. verify() correctly generates SignatureException on uninitialized Signature object.
Provider SunRsaSign, algorithm SHA1withRSA: Passed. verify() correctly generates SignatureException on uninitialized Signature object.
Provider SunRsaSign, algorithm SHA256withRSA: Passed. verify() correctly generates SignatureException on uninitialized Signature object.
Provider SunRsaSign, algorithm SHA512withRSA: Failed. Cannot initialize Signature object for signing. Test not run.
verify004: Failed. test cases: 10; passed: 8; failed: 2; first test case failure: Provider SunRsaSign, algorithm SHA384withRSA
STATUS:Failed.test cases: 4; all failed; first test case failure: verify001
result: Failed. test cases: 4; all failed; first test case failure: verify001
test result: Failed. test cases: 4; all failed; first test case failure: verify001
Specific machine info:
======================
Hostname: linux-10
OS: Solaris 8 (x86)
Hostname: linux-19
OS: Linux RedHat 7.3
======================================================================
Name: mmR10223 Date: 06/03/2003
Filed By : J2SE-SQA [###@###.###
JDK : JDK1.5.0-b07 (passes on JDK1.5.0-b06, JDK1.4.2-b24, JDK1.4.1-b21)
JCK : JCK1.4a-runtime
Platform[s] : all
switch/Mode : default
JCK test owner : http://javaweb.eng/jck/usr/owners.jto
Falling test[s]:
api/java_security/Signature/SignatureTests.html#verify [verify001, verify002, verify003, verify004]
api/java_security/Signature/SignatureTests.html#initSign [initSign001, initSign003, initSign004, initSign006]
api/java_security/Signature/SignatureTests.html#initVerify [initVerify001, initVerify002 ]
api/java_security/Signature/SignatureTests.html#signTests [sign003, sign005, sign006]
api/java_security/Signature/SignatureTests.html#update [update001, update002, update003]
api/java_security/Signature/SignatureTests.html#update2 [update005, update006]
api/java_security/Signature/SignatureTests.html#update3 [update007, update008, update009]
api/java_security/Signature/SignatureTests.html#update4 [update011, update012, update013]
api/java_security/Signature/SignatureTests.html#SIGclone [clone001]
api/java_security/SignedObject/SignedObjectTests.html#CtorGetTests [SignedObject001]
api/java_security/SignedObject/SignedObjectTests.html#getSignatureTests [getSignature001, getSignature002]
api/java_security/SignedObject/SignedObjectTests.html#verifyTests [verify001, verify002, verify003, verify004]
api/java_security/SignedObject/SignedObjectTests.html#miscTests [misc001, misc002, misc003, misc004, misc005]
api/java_security/SignedObject/serial/index.html#ConstructorTests [ConstructorTest0001]
Test source location:
=====================
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/verifyTests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/initSignTests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/initVerifyTests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/signTestsTests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/updateTests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/update2Tests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/update3Tests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/update4Tests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/Signature/SIGcloneTests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/SignedObject/CtorGetTests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/SignedObject/getSignatureTests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/SignedObject/verifyTests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/SignedObject/miscTests.java
/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a/tests/api/java_security/SignedObject/serial/ConstructorTests.java
jtr file location:
==================
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_verify.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_initSign.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_initVerify.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_signTests.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_update.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_update2.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_update3.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_update4.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/Signature/SignatureTests_SIGclone.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/SignedObject/SignedObjectTests_CtorGetTests.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/SignedObject/SignedObjectTests_getSignatureTests.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/SignedObject/SignedObjectTests_verifyTests.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/SignedObject/SignedObjectTests_miscTests.jtr
/net/jtgb4u4c.sfbay/export/sail15/results/tiger/b07/jck14a/x86/s8_incgc_debug_linux-10/workDir/api/java_security/SignedObject/serial/index_ConstructorTests.jtr
How to reproduce:
=================
Run the following script (you may need to change its variables)
--- script start (verifyTests ) ---
#!/bin/bash
JCK="/java/re/jck/1.4a/archive/fcs/binaries/JCK-runtime-14a"
JDK="/java/re/jdk/1.5.0/promoted/latest/binaries/linux-i586"
CLASSPATH="$JCK/classes:$JCK/lib/javatest.jar"
$JDK/bin/java $switches -cp $CLASSPATH javasoft.sqe.tests.api.java.security.Signature.verifyTests -TestCaseID verify001, verify002, verify003, verify004
--- script end ---
Test output ( verifyTests ):
============
Using DSA algorithm from SUN
verify() returns true on bytes signed by Signature object with private key.
verify() returns false after the object has been reset and not updated.
Using RSA algorithm from SunJSSE
verify() returns true on bytes signed by Signature object with private key.
verify() returns false after the object has been reset and not updated.
Using RSA algorithm from SunJSSE
verify() returns true on bytes signed by Signature object with private key.
verify() returns false after the object has been reset and not updated.
Using RSA algorithm from SunJSSE
verify() returns true on bytes signed by Signature object with private key.
verify() returns false after the object has been reset and not updated.
Using RSA algorithm from SunRsaSign
verify() returns true on bytes signed by Signature object with private key.
verify() returns false after the object has been reset and not updated.
Using RSA algorithm from SunRsaSign
initVerify() throw unexpected InvalidKeyException.
Using RSA algorithm from SunRsaSign
verify() returns true on bytes signed by Signature object with private key.
verify() returns false after the object has been reset and not updated.
Using RSA algorithm from SunRsaSign
verify() returns true on bytes signed by Signature object with private key.
verify() returns false after the object has been reset and not updated.
Using RSA algorithm from SunRsaSign
verify() returns true on bytes signed by Signature object with private key.
verify() returns false after the object has been reset and not updated.
Using RSA algorithm from SunRsaSign
initVerify() throw unexpected InvalidKeyException.
Using DSA algorithm from SUN
verify() returns false on bytes signed by the different Signature object.
Signature objects differ on public/private keys
Using RSA algorithm from SunJSSE
verify() returns false on bytes signed by the different Signature object.
Signature objects differ on public/private keys
Using RSA algorithm from SunJSSE
verify() returns false on bytes signed by the different Signature object.
Signature objects differ on public/private keys
Using RSA algorithm from SunJSSE
verify() returns false on bytes signed by the different Signature object.
Signature objects differ on public/private keys
Using RSA algorithm from SunRsaSign
Unexpected SignatureException when verifying Signature object.
Using RSA algorithm from SunRsaSign
Unexpected exception during initSign/initVerify: java.security.InvalidKeyException: Key is too short for this signature algorithm
Using RSA algorithm from SunRsaSign
Unexpected SignatureException when verifying Signature object.
Using RSA algorithm from SunRsaSign
Unexpected SignatureException when verifying Signature object.
Using RSA algorithm from SunRsaSign
Unexpected SignatureException when verifying Signature object.
Using RSA algorithm from SunRsaSign
Unexpected exception during initSign/initVerify: java.security.InvalidKeyException: Key is too short for this signature algorithm
Using DSA algorithm from SUN
Expected SignatureException occured when verifying corrupted data.
Using RSA algorithm from SunJSSE
No exception thrown when verifying corrupted signature.
Corrupted data did not verified.
Using RSA algorithm from SunJSSE
No exception thrown when verifying corrupted signature.
Corrupted data did not verified.
Using RSA algorithm from SunJSSE
No exception thrown when verifying corrupted signature.
Corrupted data did not verified.
Using RSA algorithm from SunRsaSign
Expected SignatureException occured when verifying corrupted data.
Using RSA algorithm from SunRsaSign
initSign()/initVerify() throw unexpected InvalidKeyException.
Using RSA algorithm from SunRsaSign
Expected SignatureException occured when verifying corrupted data.
Using RSA algorithm from SunRsaSign
Expected SignatureException occured when verifying corrupted data.
Using RSA algorithm from SunRsaSign
Expected SignatureException occured when verifying corrupted data.
Using RSA algorithm from SunRsaSign
initSign()/initVerify() throw unexpected InvalidKeyException.
Using DSA algorithm from SUN
Expected SignatureException generated by verify()
Using RSA algorithm from SunJSSE
Expected SignatureException generated by verify()
Using RSA algorithm from SunJSSE
Expected SignatureException generated by verify()
Using RSA algorithm from SunJSSE
Expected SignatureException generated by verify()
Using RSA algorithm from SunRsaSign
Expected SignatureException generated by verify()
Using RSA algorithm from SunRsaSign
initSign()/initVerify() throw unexpected InvalidKeyException.
Using RSA algorithm from SunRsaSign
Expected SignatureException generated by verify()
Using RSA algorithm from SunRsaSign
Expected SignatureException generated by verify()
Using RSA algorithm from SunRsaSign
Expected SignatureException generated by verify()
Using RSA algorithm from SunRsaSign
initSign()/initVerify() throw unexpected InvalidKeyException.
----------log:(45/4850)----------
Provider SUN, algorithm SHA1withDSA: Passed. All verify() subtests passed in this test.
Provider SunJSSE, algorithm MD2withRSA: Passed. All verify() subtests passed in this test.
Provider SunJSSE, algorithm MD5withRSA: Passed. All verify() subtests passed in this test.
Provider SunJSSE, algorithm SHA1withRSA: Passed. All verify() subtests passed in this test.
Provider SunRsaSign, algorithm MD2withRSA: Passed. All verify() subtests passed in this test.
Provider SunRsaSign, algorithm SHA384withRSA: Failed. Cannot initialize Signature object for verifying. Test not run.
Provider SunRsaSign, algorithm MD5withRSA: Passed. All verify() subtests passed in this test.
Provider SunRsaSign, algorithm SHA1withRSA: Passed. All verify() subtests passed in this test.
Provider SunRsaSign, algorithm SHA256withRSA: Passed. All verify() subtests passed in this test.
Provider SunRsaSign, algorithm SHA512withRSA: Failed. Cannot initialize Signature object for verifying. Test not run.
verify001: Failed. test cases: 10; passed: 8; failed: 2; first test case failure: Provider SunRsaSign, algorithm SHA384withRSA
Provider SUN, algorithm SHA1withDSA: Passed. verify() correctly returns false on improper Signature.
Provider SunJSSE, algorithm MD2withRSA: Passed. verify() correctly returns false on improper Signature.
Provider SunJSSE, algorithm MD5withRSA: Passed. verify() correctly returns false on improper Signature.
Provider SunJSSE, algorithm SHA1withRSA: Passed. verify() correctly returns false on improper Signature.
Provider SunRsaSign, algorithm MD2withRSA: Failed. Unable to verify Signature object with input data.
Provider SunRsaSign, algorithm SHA384withRSA: Failed. Unable to initialize signature objects. Test not run.
Provider SunRsaSign, algorithm MD5withRSA: Failed. Unable to verify Signature object with input data.
Provider SunRsaSign, algorithm SHA1withRSA: Failed. Unable to verify Signature object with input data.
Provider SunRsaSign, algorithm SHA256withRSA: Failed. Unable to verify Signature object with input data.
Provider SunRsaSign, algorithm SHA512withRSA: Failed. Unable to initialize signature objects. Test not run.
verify002: Failed. test cases: 10; passed: 4; failed: 6; first test case failure: Provider SunRsaSign, algorithm MD2withRSA
Provider SUN, algorithm SHA1withDSA: Passed. SignatureException thrown when verifying corrupted signature.
Provider SunJSSE, algorithm MD2withRSA: Passed. OKAY
Provider SunJSSE, algorithm MD5withRSA: Passed. OKAY
Provider SunJSSE, algorithm SHA1withRSA: Passed. OKAY
Provider SunRsaSign, algorithm MD2withRSA: Passed. SignatureException thrown when verifying corrupted signature.
Provider SunRsaSign, algorithm SHA384withRSA: Failed. Cannot initialize Signature object for signing. Test not run.
Provider SunRsaSign, algorithm MD5withRSA: Passed. SignatureException thrown when verifying corrupted signature.
Provider SunRsaSign, algorithm SHA1withRSA: Passed. SignatureException thrown when verifying corrupted signature.
Provider SunRsaSign, algorithm SHA256withRSA: Passed. SignatureException thrown when verifying corrupted signature.
Provider SunRsaSign, algorithm SHA512withRSA: Failed. Cannot initialize Signature object for signing. Test not run.
verify003: Failed. test cases: 10; passed: 8; failed: 2; first test case failure: Provider SunRsaSign, algorithm SHA384withRSA
Provider SUN, algorithm SHA1withDSA: Passed. verify() correctly generates SignatureException on uninitialized Signature object.
Provider SunJSSE, algorithm MD2withRSA: Passed. verify() correctly generates SignatureException on uninitialized Signature object.
Provider SunJSSE, algorithm MD5withRSA: Passed. verify() correctly generates SignatureException on uninitialized Signature object.
Provider SunJSSE, algorithm SHA1withRSA: Passed. verify() correctly generates SignatureException on uninitialized Signature object.
Provider SunRsaSign, algorithm MD2withRSA: Passed. verify