-
Bug
-
Resolution: Duplicate
-
P2
-
5.0u4
-
sparc
-
solaris_10
OS
======
SunOS sb2500-1 5.10 Generic_119205-02 sun4u sparc SUNW,Sun-Blade-2500
JDK
================
java version "1.5.0_03"
Java(TM) 2 Runtime Environment, Standard Edition (build 1.5.0_03-b06)
Java HotSpot(TM) Server VM (build 1.5.0_03-b06, mixed mode)
The folowing tests failed
api/javax_net/ssl/SSLEngine/SSLEngineTests.html#SSLEngineClientAuthMode Failed. test cases: 6; passed: 2; failed: 4; first test case failure: SSLEngineNeedClientAuth001
api/javax_net/ssl/SSLEngine/SSLEngineTests.html#SSLEngineHandshake Failed. test cases: 7; passed: 1; failed: 6; first test case failure: SSLEngineHandshake002
api/javax_net/ssl/SSLEngine/SSLEngineTests.html#SSLEngineInOutBound Failed. test cases: 3; passed: 1; failed: 2; first test case failure: SSLEngineBound002
api/javax_net/ssl/SSLEngine/SSLEngineTests.html#SSLEngineWrap Failed. test cases: 7; passed: 1; failed: 6; first test case failure: SSLEngineWrap002
api/javax_net/ssl/SSLPUEx.html#SSLPUEx Failed. test cases: 1; all failed; first test case failure: SSLPUEx
api/javax_net/ssl/SSLS.html#SSLS1 Failed. test cases: 1; all failed; first test case failure: SSLS1
api/javax_net/ssl/SSLSock.html#SSLSock1 Failed. test cases: 1; all failed; first test case failure: SSLSock1
api/javax_net/ssl/SSLSock.html#SSLSock2 Failed.
NB These tests pass with Solaris FCS
================================================
TO REPRODUCE
================================================
1.
export LD_LIBRARY_PATH=/net/latte.ireland/export/home4/jck/JCK-runtime-15/lib/SunOS.sparc:/net/latte.ireland/export/home4/jck/JCK-runtime-15/lib/SunOS.sparc/jmx:/net/latte.ireland/export/home4/jck/JCK-runtime-15/lib/SunOS.sparc
2.
set your display variable xhost you machine
3.
java -client -Xint -Djavatest.security.allowPropertiesAccess=true -Xfuture -classpath /net/latte.ireland/export/home4/jck/JCK-runtime-15/classes -Djava.security.policy=/net/latte.ireland/export/home4/jck/JCK-runtime-15/lib/jck.policy javasoft.sqe.tests.api.javax.net.ssl.SSLSock1 -TestCaseID ALL -KeyStoreURL file:///net/latte.ireland/export/home4/jck/JCK-runtime-15/tests/api/javax_net/ssl/SSLSock.html#SSLSock1
The output from all of the failures is basically the same here is teh out put from api/javax_net/ssl/SSLSock.html#SSLSock2
============================
out1
===========================
JRE is installed with the following security providers.
0. SunPKCS11-Solaris
1. SUN
2. SunRsaSign
3. SunJSSE
4. SunJCE
5. SunJGSS
6. SunSASL
This test sucessfully open the keystore file: "/net/latte.ireland/export/home4/jck/JCK-runtime-15/tests/api/javax_net/ssl//testkeys"
with the keystore's password "DukesSecretPassword"
------------------------------------------------------------
Establishing an "SSLContext" with protocol "SSL"
Client's Default Cipher Suites = SSL_RSA_WITH_RC4_128_MD5
Client's Default Cipher Suites = SSL_RSA_WITH_RC4_128_SHA
Client's Default Cipher Suites = TLS_RSA_WITH_AES_128_CBC_SHA
Client's Default Cipher Suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA
Client's Default Cipher Suites = TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Client's Default Cipher Suites = SSL_RSA_WITH_3DES_EDE_CBC_SHA
Client's Default Cipher Suites = SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Client's Default Cipher Suites = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Client's Default Cipher Suites = SSL_RSA_WITH_DES_CBC_SHA
Client's Default Cipher Suites = SSL_DHE_RSA_WITH_DES_CBC_SHA
Client's Default Cipher Suites = SSL_DHE_DSS_WITH_DES_CBC_SHA
Client's Default Cipher Suites = SSL_RSA_EXPORT_WITH_RC4_40_MD5
Client's Default Cipher Suites = SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
Client's Default Cipher Suites = SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Client's Default Cipher Suites = SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
Client's Supported Cipher Suites = SSL_RSA_WITH_RC4_128_MD5
Client's Supported Cipher Suites = SSL_RSA_WITH_RC4_128_SHA
Client's Supported Cipher Suites = TLS_RSA_WITH_AES_128_CBC_SHA
Client's Supported Cipher Suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA
Client's Supported Cipher Suites = TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Client's Supported Cipher Suites = SSL_RSA_WITH_3DES_EDE_CBC_SHA
Client's Supported Cipher Suites = SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Client's Supported Cipher Suites = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Client's Supported Cipher Suites = SSL_RSA_WITH_DES_CBC_SHA
Client's Supported Cipher Suites = SSL_DHE_RSA_WITH_DES_CBC_SHA
Client's Supported Cipher Suites = SSL_DHE_DSS_WITH_DES_CBC_SHA
Client's Supported Cipher Suites = SSL_RSA_EXPORT_WITH_RC4_40_MD5
Client's Supported Cipher Suites = SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
Client's Supported Cipher Suites = SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Client's Supported Cipher Suites = SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
Client's Supported Cipher Suites = SSL_RSA_WITH_NULL_MD5
Client's Supported Cipher Suites = SSL_RSA_WITH_NULL_SHA
Client's Supported Cipher Suites = SSL_DH_anon_WITH_RC4_128_MD5
Client's Supported Cipher Suites = TLS_DH_anon_WITH_AES_128_CBC_SHA
Client's Supported Cipher Suites = SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
Client's Supported Cipher Suites = SSL_DH_anon_WITH_DES_CBC_SHA
Client's Supported Cipher Suites = SSL_DH_anon_EXPORT_WITH_RC4_40_MD5
Client's Supported Cipher Suites = SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
Client's Supported Cipher Suites = TLS_KRB5_WITH_RC4_128_SHA
Client's Supported Cipher Suites = TLS_KRB5_WITH_RC4_128_MD5
Client's Supported Cipher Suites = TLS_KRB5_WITH_3DES_EDE_CBC_SHA
Client's Supported Cipher Suites = TLS_KRB5_WITH_3DES_EDE_CBC_MD5
Client's Supported Cipher Suites = TLS_KRB5_WITH_DES_CBC_SHA
Client's Supported Cipher Suites = TLS_KRB5_WITH_DES_CBC_MD5
Client's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_RC4_40_SHA
Client's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_RC4_40_MD5
Client's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
Client's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
Server's Default Cipher Suites = SSL_RSA_WITH_RC4_128_MD5
Server's Default Cipher Suites = SSL_RSA_WITH_RC4_128_SHA
Server's Default Cipher Suites = TLS_RSA_WITH_AES_128_CBC_SHA
Server's Default Cipher Suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA
Server's Default Cipher Suites = TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Server's Default Cipher Suites = SSL_RSA_WITH_3DES_EDE_CBC_SHA
Server's Default Cipher Suites = SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Server's Default Cipher Suites = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Server's Default Cipher Suites = SSL_RSA_WITH_DES_CBC_SHA
Server's Default Cipher Suites = SSL_DHE_RSA_WITH_DES_CBC_SHA
Server's Default Cipher Suites = SSL_DHE_DSS_WITH_DES_CBC_SHA
Server's Default Cipher Suites = SSL_RSA_EXPORT_WITH_RC4_40_MD5
Server's Default Cipher Suites = SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
Server's Default Cipher Suites = SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Server's Default Cipher Suites = SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
Server's Supported Cipher Suites = SSL_RSA_WITH_RC4_128_MD5
Server's Supported Cipher Suites = SSL_RSA_WITH_RC4_128_SHA
Server's Supported Cipher Suites = TLS_RSA_WITH_AES_128_CBC_SHA
Server's Supported Cipher Suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA
Server's Supported Cipher Suites = TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Server's Supported Cipher Suites = SSL_RSA_WITH_3DES_EDE_CBC_SHA
Server's Supported Cipher Suites = SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Server's Supported Cipher Suites = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Server's Supported Cipher Suites = SSL_RSA_WITH_DES_CBC_SHA
Server's Supported Cipher Suites = SSL_DHE_RSA_WITH_DES_CBC_SHA
Server's Supported Cipher Suites = SSL_DHE_DSS_WITH_DES_CBC_SHA
Server's Supported Cipher Suites = SSL_RSA_EXPORT_WITH_RC4_40_MD5
Server's Supported Cipher Suites = SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
Server's Supported Cipher Suites = SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Server's Supported Cipher Suites = SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
Server's Supported Cipher Suites = SSL_RSA_WITH_NULL_MD5
Server's Supported Cipher Suites = SSL_RSA_WITH_NULL_SHA
Server's Supported Cipher Suites = SSL_DH_anon_WITH_RC4_128_MD5
Server's Supported Cipher Suites = TLS_DH_anon_WITH_AES_128_CBC_SHA
Server's Supported Cipher Suites = SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
Server's Supported Cipher Suites = SSL_DH_anon_WITH_DES_CBC_SHA
Server's Supported Cipher Suites = SSL_DH_anon_EXPORT_WITH_RC4_40_MD5
Server's Supported Cipher Suites = SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
Server's Supported Cipher Suites = TLS_KRB5_WITH_RC4_128_SHA
Server's Supported Cipher Suites = TLS_KRB5_WITH_RC4_128_MD5
Server's Supported Cipher Suites = TLS_KRB5_WITH_3DES_EDE_CBC_SHA
Server's Supported Cipher Suites = TLS_KRB5_WITH_3DES_EDE_CBC_MD5
Server's Supported Cipher Suites = TLS_KRB5_WITH_DES_CBC_SHA
Server's Supported Cipher Suites = TLS_KRB5_WITH_DES_CBC_MD5
Server's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_RC4_40_SHA
Server's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_RC4_40_MD5
Server's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
Server's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
Port 35598 was allocated as a free port.
This test use Secure Socket Layer port 35598
Creating SSLServerSocket...Done
Before shut down port 35598 wait for client to go away first ...
Client thread went away. Proceed to shut down port 35598
------------------------------------------------------------
Establishing an "SSLContext" with protocol "SSLv3"
Client's Default Cipher Suites = SSL_RSA_WITH_RC4_128_MD5
Client's Default Cipher Suites = SSL_RSA_WITH_RC4_128_SHA
Client's Default Cipher Suites = TLS_RSA_WITH_AES_128_CBC_SHA
Client's Default Cipher Suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA
Client's Default Cipher Suites = TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Client's Default Cipher Suites = SSL_RSA_WITH_3DES_EDE_CBC_SHA
Client's Default Cipher Suites = SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Client's Default Cipher Suites = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Client's Default Cipher Suites = SSL_RSA_WITH_DES_CBC_SHA
Client's Default Cipher Suites = SSL_DHE_RSA_WITH_DES_CBC_SHA
Client's Default Cipher Suites = SSL_DHE_DSS_WITH_DES_CBC_SHA
Client's Default Cipher Suites = SSL_RSA_EXPORT_WITH_RC4_40_MD5
Client's Default Cipher Suites = SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
Client's Default Cipher Suites = SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Client's Default Cipher Suites = SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
Client's Supported Cipher Suites = SSL_RSA_WITH_RC4_128_MD5
Client's Supported Cipher Suites = SSL_RSA_WITH_RC4_128_SHA
Client's Supported Cipher Suites = TLS_RSA_WITH_AES_128_CBC_SHA
Client's Supported Cipher Suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA
Client's Supported Cipher Suites = TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Client's Supported Cipher Suites = SSL_RSA_WITH_3DES_EDE_CBC_SHA
Client's Supported Cipher Suites = SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Client's Supported Cipher Suites = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Client's Supported Cipher Suites = SSL_RSA_WITH_DES_CBC_SHA
Client's Supported Cipher Suites = SSL_DHE_RSA_WITH_DES_CBC_SHA
Client's Supported Cipher Suites = SSL_DHE_DSS_WITH_DES_CBC_SHA
Client's Supported Cipher Suites = SSL_RSA_EXPORT_WITH_RC4_40_MD5
Client's Supported Cipher Suites = SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
Client's Supported Cipher Suites = SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Client's Supported Cipher Suites = SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
Client's Supported Cipher Suites = SSL_RSA_WITH_NULL_MD5
Client's Supported Cipher Suites = SSL_RSA_WITH_NULL_SHA
Client's Supported Cipher Suites = SSL_DH_anon_WITH_RC4_128_MD5
Client's Supported Cipher Suites = TLS_DH_anon_WITH_AES_128_CBC_SHA
Client's Supported Cipher Suites = SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
Client's Supported Cipher Suites = SSL_DH_anon_WITH_DES_CBC_SHA
Client's Supported Cipher Suites = SSL_DH_anon_EXPORT_WITH_RC4_40_MD5
Client's Supported Cipher Suites = SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
Client's Supported Cipher Suites = TLS_KRB5_WITH_RC4_128_SHA
Client's Supported Cipher Suites = TLS_KRB5_WITH_RC4_128_MD5
Client's Supported Cipher Suites = TLS_KRB5_WITH_3DES_EDE_CBC_SHA
Client's Supported Cipher Suites = TLS_KRB5_WITH_3DES_EDE_CBC_MD5
Client's Supported Cipher Suites = TLS_KRB5_WITH_DES_CBC_SHA
Client's Supported Cipher Suites = TLS_KRB5_WITH_DES_CBC_MD5
Client's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_RC4_40_SHA
Client's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_RC4_40_MD5
Client's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
Client's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
Server's Default Cipher Suites = SSL_RSA_WITH_RC4_128_MD5
Server's Default Cipher Suites = SSL_RSA_WITH_RC4_128_SHA
Server's Default Cipher Suites = TLS_RSA_WITH_AES_128_CBC_SHA
Server's Default Cipher Suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA
Server's Default Cipher Suites = TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Server's Default Cipher Suites = SSL_RSA_WITH_3DES_EDE_CBC_SHA
Server's Default Cipher Suites = SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Server's Default Cipher Suites = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Server's Default Cipher Suites = SSL_RSA_WITH_DES_CBC_SHA
Server's Default Cipher Suites = SSL_DHE_RSA_WITH_DES_CBC_SHA
Server's Default Cipher Suites = SSL_DHE_DSS_WITH_DES_CBC_SHA
Server's Default Cipher Suites = SSL_RSA_EXPORT_WITH_RC4_40_MD5
Server's Default Cipher Suites = SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
Server's Default Cipher Suites = SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Server's Default Cipher Suites = SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
Server's Supported Cipher Suites = SSL_RSA_WITH_RC4_128_MD5
Server's Supported Cipher Suites = SSL_RSA_WITH_RC4_128_SHA
Server's Supported Cipher Suites = TLS_RSA_WITH_AES_128_CBC_SHA
Server's Supported Cipher Suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA
Server's Supported Cipher Suites = TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Server's Supported Cipher Suites = SSL_RSA_WITH_3DES_EDE_CBC_SHA
Server's Supported Cipher Suites = SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Server's Supported Cipher Suites = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Server's Supported Cipher Suites = SSL_RSA_WITH_DES_CBC_SHA
Server's Supported Cipher Suites = SSL_DHE_RSA_WITH_DES_CBC_SHA
Server's Supported Cipher Suites = SSL_DHE_DSS_WITH_DES_CBC_SHA
Server's Supported Cipher Suites = SSL_RSA_EXPORT_WITH_RC4_40_MD5
Server's Supported Cipher Suites = SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
Server's Supported Cipher Suites = SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Server's Supported Cipher Suites = SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
Server's Supported Cipher Suites = SSL_RSA_WITH_NULL_MD5
Server's Supported Cipher Suites = SSL_RSA_WITH_NULL_SHA
Server's Supported Cipher Suites = SSL_DH_anon_WITH_RC4_128_MD5
Server's Supported Cipher Suites = TLS_DH_anon_WITH_AES_128_CBC_SHA
Server's Supported Cipher Suites = SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
Server's Supported Cipher Suites = SSL_DH_anon_WITH_DES_CBC_SHA
Server's Supported Cipher Suites = SSL_DH_anon_EXPORT_WITH_RC4_40_MD5
Server's Supported Cipher Suites = SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
Server's Supported Cipher Suites = TLS_KRB5_WITH_RC4_128_SHA
Server's Supported Cipher Suites = TLS_KRB5_WITH_RC4_128_MD5
Server's Supported Cipher Suites = TLS_KRB5_WITH_3DES_EDE_CBC_SHA
Server's Supported Cipher Suites = TLS_KRB5_WITH_3DES_EDE_CBC_MD5
Server's Supported Cipher Suites = TLS_KRB5_WITH_DES_CBC_SHA
Server's Supported Cipher Suites = TLS_KRB5_WITH_DES_CBC_MD5
Server's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_RC4_40_SHA
Server's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_RC4_40_MD5
Server's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
Server's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
Port 35601 was allocated as a free port.
This test use Secure Socket Layer port 35601
Creating SSLServerSocket...Done
Before shut down port 35601 wait for client to go away first ...
Client thread went away. Proceed to shut down port 35601
------------------------------------------------------------
Establishing an "SSLContext" with protocol "TLSv1"
java.security.ProviderException: Could not obtain session
at sun.security.pkcs11.SessionManager.ge
###@###.### 2005-04-07 18:25:12 GMT
======
SunOS sb2500-1 5.10 Generic_119205-02 sun4u sparc SUNW,Sun-Blade-2500
JDK
================
java version "1.5.0_03"
Java(TM) 2 Runtime Environment, Standard Edition (build 1.5.0_03-b06)
Java HotSpot(TM) Server VM (build 1.5.0_03-b06, mixed mode)
The folowing tests failed
api/javax_net/ssl/SSLEngine/SSLEngineTests.html#SSLEngineClientAuthMode Failed. test cases: 6; passed: 2; failed: 4; first test case failure: SSLEngineNeedClientAuth001
api/javax_net/ssl/SSLEngine/SSLEngineTests.html#SSLEngineHandshake Failed. test cases: 7; passed: 1; failed: 6; first test case failure: SSLEngineHandshake002
api/javax_net/ssl/SSLEngine/SSLEngineTests.html#SSLEngineInOutBound Failed. test cases: 3; passed: 1; failed: 2; first test case failure: SSLEngineBound002
api/javax_net/ssl/SSLEngine/SSLEngineTests.html#SSLEngineWrap Failed. test cases: 7; passed: 1; failed: 6; first test case failure: SSLEngineWrap002
api/javax_net/ssl/SSLPUEx.html#SSLPUEx Failed. test cases: 1; all failed; first test case failure: SSLPUEx
api/javax_net/ssl/SSLS.html#SSLS1 Failed. test cases: 1; all failed; first test case failure: SSLS1
api/javax_net/ssl/SSLSock.html#SSLSock1 Failed. test cases: 1; all failed; first test case failure: SSLSock1
api/javax_net/ssl/SSLSock.html#SSLSock2 Failed.
NB These tests pass with Solaris FCS
================================================
TO REPRODUCE
================================================
1.
export LD_LIBRARY_PATH=/net/latte.ireland/export/home4/jck/JCK-runtime-15/lib/SunOS.sparc:/net/latte.ireland/export/home4/jck/JCK-runtime-15/lib/SunOS.sparc/jmx:/net/latte.ireland/export/home4/jck/JCK-runtime-15/lib/SunOS.sparc
2.
set your display variable xhost you machine
3.
java -client -Xint -Djavatest.security.allowPropertiesAccess=true -Xfuture -classpath /net/latte.ireland/export/home4/jck/JCK-runtime-15/classes -Djava.security.policy=/net/latte.ireland/export/home4/jck/JCK-runtime-15/lib/jck.policy javasoft.sqe.tests.api.javax.net.ssl.SSLSock1 -TestCaseID ALL -KeyStoreURL file:///net/latte.ireland/export/home4/jck/JCK-runtime-15/tests/api/javax_net/ssl/SSLSock.html#SSLSock1
The output from all of the failures is basically the same here is teh out put from api/javax_net/ssl/SSLSock.html#SSLSock2
============================
out1
===========================
JRE is installed with the following security providers.
0. SunPKCS11-Solaris
1. SUN
2. SunRsaSign
3. SunJSSE
4. SunJCE
5. SunJGSS
6. SunSASL
This test sucessfully open the keystore file: "/net/latte.ireland/export/home4/jck/JCK-runtime-15/tests/api/javax_net/ssl//testkeys"
with the keystore's password "DukesSecretPassword"
------------------------------------------------------------
Establishing an "SSLContext" with protocol "SSL"
Client's Default Cipher Suites = SSL_RSA_WITH_RC4_128_MD5
Client's Default Cipher Suites = SSL_RSA_WITH_RC4_128_SHA
Client's Default Cipher Suites = TLS_RSA_WITH_AES_128_CBC_SHA
Client's Default Cipher Suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA
Client's Default Cipher Suites = TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Client's Default Cipher Suites = SSL_RSA_WITH_3DES_EDE_CBC_SHA
Client's Default Cipher Suites = SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Client's Default Cipher Suites = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Client's Default Cipher Suites = SSL_RSA_WITH_DES_CBC_SHA
Client's Default Cipher Suites = SSL_DHE_RSA_WITH_DES_CBC_SHA
Client's Default Cipher Suites = SSL_DHE_DSS_WITH_DES_CBC_SHA
Client's Default Cipher Suites = SSL_RSA_EXPORT_WITH_RC4_40_MD5
Client's Default Cipher Suites = SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
Client's Default Cipher Suites = SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Client's Default Cipher Suites = SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
Client's Supported Cipher Suites = SSL_RSA_WITH_RC4_128_MD5
Client's Supported Cipher Suites = SSL_RSA_WITH_RC4_128_SHA
Client's Supported Cipher Suites = TLS_RSA_WITH_AES_128_CBC_SHA
Client's Supported Cipher Suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA
Client's Supported Cipher Suites = TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Client's Supported Cipher Suites = SSL_RSA_WITH_3DES_EDE_CBC_SHA
Client's Supported Cipher Suites = SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Client's Supported Cipher Suites = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Client's Supported Cipher Suites = SSL_RSA_WITH_DES_CBC_SHA
Client's Supported Cipher Suites = SSL_DHE_RSA_WITH_DES_CBC_SHA
Client's Supported Cipher Suites = SSL_DHE_DSS_WITH_DES_CBC_SHA
Client's Supported Cipher Suites = SSL_RSA_EXPORT_WITH_RC4_40_MD5
Client's Supported Cipher Suites = SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
Client's Supported Cipher Suites = SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Client's Supported Cipher Suites = SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
Client's Supported Cipher Suites = SSL_RSA_WITH_NULL_MD5
Client's Supported Cipher Suites = SSL_RSA_WITH_NULL_SHA
Client's Supported Cipher Suites = SSL_DH_anon_WITH_RC4_128_MD5
Client's Supported Cipher Suites = TLS_DH_anon_WITH_AES_128_CBC_SHA
Client's Supported Cipher Suites = SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
Client's Supported Cipher Suites = SSL_DH_anon_WITH_DES_CBC_SHA
Client's Supported Cipher Suites = SSL_DH_anon_EXPORT_WITH_RC4_40_MD5
Client's Supported Cipher Suites = SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
Client's Supported Cipher Suites = TLS_KRB5_WITH_RC4_128_SHA
Client's Supported Cipher Suites = TLS_KRB5_WITH_RC4_128_MD5
Client's Supported Cipher Suites = TLS_KRB5_WITH_3DES_EDE_CBC_SHA
Client's Supported Cipher Suites = TLS_KRB5_WITH_3DES_EDE_CBC_MD5
Client's Supported Cipher Suites = TLS_KRB5_WITH_DES_CBC_SHA
Client's Supported Cipher Suites = TLS_KRB5_WITH_DES_CBC_MD5
Client's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_RC4_40_SHA
Client's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_RC4_40_MD5
Client's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
Client's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
Server's Default Cipher Suites = SSL_RSA_WITH_RC4_128_MD5
Server's Default Cipher Suites = SSL_RSA_WITH_RC4_128_SHA
Server's Default Cipher Suites = TLS_RSA_WITH_AES_128_CBC_SHA
Server's Default Cipher Suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA
Server's Default Cipher Suites = TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Server's Default Cipher Suites = SSL_RSA_WITH_3DES_EDE_CBC_SHA
Server's Default Cipher Suites = SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Server's Default Cipher Suites = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Server's Default Cipher Suites = SSL_RSA_WITH_DES_CBC_SHA
Server's Default Cipher Suites = SSL_DHE_RSA_WITH_DES_CBC_SHA
Server's Default Cipher Suites = SSL_DHE_DSS_WITH_DES_CBC_SHA
Server's Default Cipher Suites = SSL_RSA_EXPORT_WITH_RC4_40_MD5
Server's Default Cipher Suites = SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
Server's Default Cipher Suites = SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Server's Default Cipher Suites = SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
Server's Supported Cipher Suites = SSL_RSA_WITH_RC4_128_MD5
Server's Supported Cipher Suites = SSL_RSA_WITH_RC4_128_SHA
Server's Supported Cipher Suites = TLS_RSA_WITH_AES_128_CBC_SHA
Server's Supported Cipher Suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA
Server's Supported Cipher Suites = TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Server's Supported Cipher Suites = SSL_RSA_WITH_3DES_EDE_CBC_SHA
Server's Supported Cipher Suites = SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Server's Supported Cipher Suites = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Server's Supported Cipher Suites = SSL_RSA_WITH_DES_CBC_SHA
Server's Supported Cipher Suites = SSL_DHE_RSA_WITH_DES_CBC_SHA
Server's Supported Cipher Suites = SSL_DHE_DSS_WITH_DES_CBC_SHA
Server's Supported Cipher Suites = SSL_RSA_EXPORT_WITH_RC4_40_MD5
Server's Supported Cipher Suites = SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
Server's Supported Cipher Suites = SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Server's Supported Cipher Suites = SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
Server's Supported Cipher Suites = SSL_RSA_WITH_NULL_MD5
Server's Supported Cipher Suites = SSL_RSA_WITH_NULL_SHA
Server's Supported Cipher Suites = SSL_DH_anon_WITH_RC4_128_MD5
Server's Supported Cipher Suites = TLS_DH_anon_WITH_AES_128_CBC_SHA
Server's Supported Cipher Suites = SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
Server's Supported Cipher Suites = SSL_DH_anon_WITH_DES_CBC_SHA
Server's Supported Cipher Suites = SSL_DH_anon_EXPORT_WITH_RC4_40_MD5
Server's Supported Cipher Suites = SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
Server's Supported Cipher Suites = TLS_KRB5_WITH_RC4_128_SHA
Server's Supported Cipher Suites = TLS_KRB5_WITH_RC4_128_MD5
Server's Supported Cipher Suites = TLS_KRB5_WITH_3DES_EDE_CBC_SHA
Server's Supported Cipher Suites = TLS_KRB5_WITH_3DES_EDE_CBC_MD5
Server's Supported Cipher Suites = TLS_KRB5_WITH_DES_CBC_SHA
Server's Supported Cipher Suites = TLS_KRB5_WITH_DES_CBC_MD5
Server's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_RC4_40_SHA
Server's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_RC4_40_MD5
Server's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
Server's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
Port 35598 was allocated as a free port.
This test use Secure Socket Layer port 35598
Creating SSLServerSocket...Done
Before shut down port 35598 wait for client to go away first ...
Client thread went away. Proceed to shut down port 35598
------------------------------------------------------------
Establishing an "SSLContext" with protocol "SSLv3"
Client's Default Cipher Suites = SSL_RSA_WITH_RC4_128_MD5
Client's Default Cipher Suites = SSL_RSA_WITH_RC4_128_SHA
Client's Default Cipher Suites = TLS_RSA_WITH_AES_128_CBC_SHA
Client's Default Cipher Suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA
Client's Default Cipher Suites = TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Client's Default Cipher Suites = SSL_RSA_WITH_3DES_EDE_CBC_SHA
Client's Default Cipher Suites = SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Client's Default Cipher Suites = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Client's Default Cipher Suites = SSL_RSA_WITH_DES_CBC_SHA
Client's Default Cipher Suites = SSL_DHE_RSA_WITH_DES_CBC_SHA
Client's Default Cipher Suites = SSL_DHE_DSS_WITH_DES_CBC_SHA
Client's Default Cipher Suites = SSL_RSA_EXPORT_WITH_RC4_40_MD5
Client's Default Cipher Suites = SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
Client's Default Cipher Suites = SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Client's Default Cipher Suites = SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
Client's Supported Cipher Suites = SSL_RSA_WITH_RC4_128_MD5
Client's Supported Cipher Suites = SSL_RSA_WITH_RC4_128_SHA
Client's Supported Cipher Suites = TLS_RSA_WITH_AES_128_CBC_SHA
Client's Supported Cipher Suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA
Client's Supported Cipher Suites = TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Client's Supported Cipher Suites = SSL_RSA_WITH_3DES_EDE_CBC_SHA
Client's Supported Cipher Suites = SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Client's Supported Cipher Suites = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Client's Supported Cipher Suites = SSL_RSA_WITH_DES_CBC_SHA
Client's Supported Cipher Suites = SSL_DHE_RSA_WITH_DES_CBC_SHA
Client's Supported Cipher Suites = SSL_DHE_DSS_WITH_DES_CBC_SHA
Client's Supported Cipher Suites = SSL_RSA_EXPORT_WITH_RC4_40_MD5
Client's Supported Cipher Suites = SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
Client's Supported Cipher Suites = SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Client's Supported Cipher Suites = SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
Client's Supported Cipher Suites = SSL_RSA_WITH_NULL_MD5
Client's Supported Cipher Suites = SSL_RSA_WITH_NULL_SHA
Client's Supported Cipher Suites = SSL_DH_anon_WITH_RC4_128_MD5
Client's Supported Cipher Suites = TLS_DH_anon_WITH_AES_128_CBC_SHA
Client's Supported Cipher Suites = SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
Client's Supported Cipher Suites = SSL_DH_anon_WITH_DES_CBC_SHA
Client's Supported Cipher Suites = SSL_DH_anon_EXPORT_WITH_RC4_40_MD5
Client's Supported Cipher Suites = SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
Client's Supported Cipher Suites = TLS_KRB5_WITH_RC4_128_SHA
Client's Supported Cipher Suites = TLS_KRB5_WITH_RC4_128_MD5
Client's Supported Cipher Suites = TLS_KRB5_WITH_3DES_EDE_CBC_SHA
Client's Supported Cipher Suites = TLS_KRB5_WITH_3DES_EDE_CBC_MD5
Client's Supported Cipher Suites = TLS_KRB5_WITH_DES_CBC_SHA
Client's Supported Cipher Suites = TLS_KRB5_WITH_DES_CBC_MD5
Client's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_RC4_40_SHA
Client's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_RC4_40_MD5
Client's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
Client's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
Server's Default Cipher Suites = SSL_RSA_WITH_RC4_128_MD5
Server's Default Cipher Suites = SSL_RSA_WITH_RC4_128_SHA
Server's Default Cipher Suites = TLS_RSA_WITH_AES_128_CBC_SHA
Server's Default Cipher Suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA
Server's Default Cipher Suites = TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Server's Default Cipher Suites = SSL_RSA_WITH_3DES_EDE_CBC_SHA
Server's Default Cipher Suites = SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Server's Default Cipher Suites = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Server's Default Cipher Suites = SSL_RSA_WITH_DES_CBC_SHA
Server's Default Cipher Suites = SSL_DHE_RSA_WITH_DES_CBC_SHA
Server's Default Cipher Suites = SSL_DHE_DSS_WITH_DES_CBC_SHA
Server's Default Cipher Suites = SSL_RSA_EXPORT_WITH_RC4_40_MD5
Server's Default Cipher Suites = SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
Server's Default Cipher Suites = SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Server's Default Cipher Suites = SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
Server's Supported Cipher Suites = SSL_RSA_WITH_RC4_128_MD5
Server's Supported Cipher Suites = SSL_RSA_WITH_RC4_128_SHA
Server's Supported Cipher Suites = TLS_RSA_WITH_AES_128_CBC_SHA
Server's Supported Cipher Suites = TLS_DHE_RSA_WITH_AES_128_CBC_SHA
Server's Supported Cipher Suites = TLS_DHE_DSS_WITH_AES_128_CBC_SHA
Server's Supported Cipher Suites = SSL_RSA_WITH_3DES_EDE_CBC_SHA
Server's Supported Cipher Suites = SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Server's Supported Cipher Suites = SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Server's Supported Cipher Suites = SSL_RSA_WITH_DES_CBC_SHA
Server's Supported Cipher Suites = SSL_DHE_RSA_WITH_DES_CBC_SHA
Server's Supported Cipher Suites = SSL_DHE_DSS_WITH_DES_CBC_SHA
Server's Supported Cipher Suites = SSL_RSA_EXPORT_WITH_RC4_40_MD5
Server's Supported Cipher Suites = SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
Server's Supported Cipher Suites = SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Server's Supported Cipher Suites = SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
Server's Supported Cipher Suites = SSL_RSA_WITH_NULL_MD5
Server's Supported Cipher Suites = SSL_RSA_WITH_NULL_SHA
Server's Supported Cipher Suites = SSL_DH_anon_WITH_RC4_128_MD5
Server's Supported Cipher Suites = TLS_DH_anon_WITH_AES_128_CBC_SHA
Server's Supported Cipher Suites = SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
Server's Supported Cipher Suites = SSL_DH_anon_WITH_DES_CBC_SHA
Server's Supported Cipher Suites = SSL_DH_anon_EXPORT_WITH_RC4_40_MD5
Server's Supported Cipher Suites = SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
Server's Supported Cipher Suites = TLS_KRB5_WITH_RC4_128_SHA
Server's Supported Cipher Suites = TLS_KRB5_WITH_RC4_128_MD5
Server's Supported Cipher Suites = TLS_KRB5_WITH_3DES_EDE_CBC_SHA
Server's Supported Cipher Suites = TLS_KRB5_WITH_3DES_EDE_CBC_MD5
Server's Supported Cipher Suites = TLS_KRB5_WITH_DES_CBC_SHA
Server's Supported Cipher Suites = TLS_KRB5_WITH_DES_CBC_MD5
Server's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_RC4_40_SHA
Server's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_RC4_40_MD5
Server's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
Server's Supported Cipher Suites = TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
Port 35601 was allocated as a free port.
This test use Secure Socket Layer port 35601
Creating SSLServerSocket...Done
Before shut down port 35601 wait for client to go away first ...
Client thread went away. Proceed to shut down port 35601
------------------------------------------------------------
Establishing an "SSLContext" with protocol "TLSv1"
java.security.ProviderException: Could not obtain session
at sun.security.pkcs11.SessionManager.ge
###@###.### 2005-04-07 18:25:12 GMT