openj9
openj9 copied to clipboard
jdk_security openjceplus mode failures
Failure link
From internal Test_openjdk11_j9_extended.openjdk_aarch64_linux_openjceplus_testList_0 (rhel8-aarch64-6)
openjdk version "11.0.28" 2025-07-15
IBM Semeru Runtime Open Edition 11.0.28.0-m1 (build 11.0.28+2)
Eclipse OpenJ9 VM 11.0.28.0-m1 (build v0.53.0-release-16d13ae2cc, JRE 11 Linux aarch64-64-Bit Compressed References 20250528_1262 (JIT enabled, AOT enabled)
OpenJ9 - 16d13ae2cc
OMR - 988ae21a0
JCL - 2313581e46 based on jdk-11.0.28+2)
Rerun in Grinder - Change TARGET to run only the failed test targets
Optional info
Failure output (captured from console output)
[2025-05-29T16:16:06.255Z] variation: Mode150
[2025-05-29T16:16:06.255Z] JVM_OPTIONS: -XX:+UseCompressedOops -Xverbosegclog -Djava.security.properties=/home/jenkins/workspace/Test_openjdk11_j9_extended.openjdk_aarch64_linux_openjceplus_testList_0/aqa-tests/config/openjceplus/jdk/java.security
[2025-05-29T16:26:31.117Z] TEST: jdk/security/jarsigner/Spec.java
[2025-05-29T16:26:31.143Z] STDERR:
[2025-05-29T16:26:31.143Z] java.lang.Exception: Not true
[2025-05-29T16:26:31.143Z] at Spec.assertTrue(Spec.java:241)
[2025-05-29T16:26:31.143Z] at Spec.main(Spec.java:202)
[2025-05-29T16:31:06.808Z] TEST: sun/security/provider/DSA/TestMaxLengthDER.java
[2025-05-29T16:31:06.822Z] STDERR:
[2025-05-29T16:31:06.822Z] java.security.SignatureException: com.ibm.crypto.plus.provider.ock.OCKException: nested asn1 error
[2025-05-29T16:31:06.822Z] at openjceplus/com.ibm.crypto.plus.provider.DSASignature.engineVerify(DSASignature.java:101)
[2025-05-29T16:31:06.823Z] at java.base/java.security.Signature$Delegate.engineVerify(Signature.java:1434)
[2025-05-29T16:31:06.823Z] at java.base/java.security.Signature.verify(Signature.java:790)
[2025-05-29T16:31:06.823Z] at TestMaxLengthDER.main(TestMaxLengthDER.java:74)
[2025-05-29T16:31:06.823Z] at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
[2025-05-29T16:31:06.823Z] at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
[2025-05-29T16:31:06.823Z] at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
[2025-05-29T16:31:06.823Z] at java.base/java.lang.reflect.Method.invoke(Method.java:572)
[2025-05-29T16:31:06.823Z] at com.sun.javatest.regtest.agent.MainActionHelper$AgentVMRunnable.run(MainActionHelper.java:333)
[2025-05-29T16:31:06.823Z] at java.base/java.lang.Thread.run(Thread.java:835)
[2025-05-29T16:31:06.823Z] Caused by: com.ibm.crypto.plus.provider.ock.OCKException: nested asn1 error
[2025-05-29T16:31:06.823Z] at openjceplus/com.ibm.crypto.plus.provider.ock.NativeInterface.SIGNATURE_verify(Native Method)
[2025-05-29T16:31:06.823Z] at openjceplus/com.ibm.crypto.plus.provider.ock.Signature.verify(Signature.java:106)
[2025-05-29T16:31:06.823Z] at openjceplus/com.ibm.crypto.plus.provider.DSASignature.engineVerify(DSASignature.java:98)
[2025-05-29T16:31:06.823Z] ... 9 more
[2025-05-29T16:47:15.223Z] TEST: sun/security/tools/jarsigner/TimestampCheck.java
[2025-05-29T16:47:15.256Z] java.lang.SecurityException: System.exit() forbidden by JT Harness
[2025-05-29T16:47:15.256Z] at com.sun.javatest.regtest.agent.JavaTestSecurityManager.checkExit(JavaTestSecurityManager.java:117)
[2025-05-29T16:47:15.256Z] at java.base/java.lang.Runtime.exit(Runtime.java:114)
[2025-05-29T16:47:15.256Z] at java.base/java.lang.System.exit(System.java:493)
[2025-05-29T16:47:15.256Z] at java.base/sun.security.tools.keytool.Main.run(Main.java:429)
[2025-05-29T16:47:15.256Z] at java.base/sun.security.tools.keytool.Main.main(Main.java:414)
[2025-05-29T16:47:15.256Z] at TimestampCheck.keytool(TimestampCheck.java:891)
[2025-05-29T16:47:15.256Z] at TimestampCheck.gencert(TimestampCheck.java:878)
[2025-05-29T16:47:15.256Z] at TimestampCheck.prepare(TimestampCheck.java:828)
[2025-05-29T16:47:15.256Z] at TimestampCheck.main(TimestampCheck.java:182)
[2025-05-29T16:48:03.738Z] TEST: sun/security/tools/keytool/CloseFile.java
[2025-05-29T16:48:03.745Z] STDERR:
[2025-05-29T16:48:03.745Z] java.lang.UnsupportedOperationException
[2025-05-29T16:48:03.745Z] at java.base/java.security.SignatureSpi.engineGetParameters(SignatureSpi.java:405)
[2025-05-29T16:48:03.745Z] at java.base/java.security.Signature$Delegate.engineGetParameters(Signature.java:1471)
[2025-05-29T16:48:03.745Z] at java.base/java.security.Signature.getParameters(Signature.java:1029)
[2025-05-29T16:48:03.745Z] at java.base/sun.security.pkcs10.PKCS10.encodeAndSign(PKCS10.java:235)
[2025-05-29T16:48:03.745Z] at java.base/sun.security.tools.keytool.Main.doCertReq(Main.java:1663)
[2025-05-29T16:48:03.745Z] at java.base/sun.security.tools.keytool.Main.doCommands(Main.java:1145)
[2025-05-29T16:48:03.745Z] at java.base/sun.security.tools.keytool.Main.run(Main.java:421)
[2025-05-29T16:48:03.745Z] at java.base/sun.security.tools.keytool.Main.main(Main.java:414)
[2025-05-29T16:48:03.745Z] at CloseFile.run(CloseFile.java:63)
[2025-05-29T16:48:03.745Z] at CloseFile.main(CloseFile.java:44)
[2025-05-29T16:49:01.313Z] TEST: sun/security/tools/keytool/KeyToolTest.java
[2025-05-29T16:49:01.347Z] OUT is:
[2025-05-29T16:49:01.347Z] Command line args: [-debug, -keystore, x.jks, -storetype, JKS, -storepass, changeit, -certreq, -file, csr1, -alias, mykey]
[2025-05-29T16:49:01.347Z] keytool error: java.lang.UnsupportedOperationException
[2025-05-29T16:49:01.347Z]
[2025-05-29T16:49:01.347Z] java.lang.UnsupportedOperationException
[2025-05-29T16:49:01.347Z] at java.base/java.security.SignatureSpi.engineGetParameters(SignatureSpi.java:405)
[2025-05-29T16:49:01.348Z] at java.base/java.security.Signature$Delegate.engineGetParameters(Signature.java:1471)
[2025-05-29T16:49:01.348Z] at java.base/java.security.Signature.getParameters(Signature.java:1029)
[2025-05-29T16:49:01.348Z] at java.base/sun.security.pkcs10.PKCS10.encodeAndSign(PKCS10.java:235)
[2025-05-29T16:49:01.348Z] at java.base/sun.security.tools.keytool.Main.doCertReq(Main.java:1663)
[2025-05-29T16:49:01.348Z] at java.base/sun.security.tools.keytool.Main.doCommands(Main.java:1145)
[2025-05-29T16:49:01.348Z] at java.base/sun.security.tools.keytool.Main.run(Main.java:421)
[2025-05-29T16:49:01.348Z] at java.base/sun.security.tools.keytool.Main.main(Main.java:414)
[2025-05-29T16:49:01.348Z] at KeyToolTest.test(KeyToolTest.java:181)
[2025-05-29T16:49:01.348Z] at KeyToolTest.test(KeyToolTest.java:149)
[2025-05-29T16:49:01.348Z] at KeyToolTest.testOK(KeyToolTest.java:204)
[2025-05-29T16:49:01.348Z] at KeyToolTest.sqeCsrTest(KeyToolTest.java:1195)
[2025-05-29T16:49:01.348Z] at KeyToolTest.sqeTest(KeyToolTest.java:793)
[2025-05-29T16:49:01.348Z] at KeyToolTest.main(KeyToolTest.java:1828)
[2025-05-29T16:50:14.779Z] TEST: sun/security/tools/keytool/WeakAlg.java
[2025-05-29T16:50:14.794Z] STDERR:
[2025-05-29T16:50:14.794Z]
[2025-05-29T16:50:14.794Z] Warning:
[2025-05-29T16:50:14.795Z] The certificate uses the MD5withRSA signature algorithm which is considered a security risk and is disabled.
[
[2025-05-29T16:50:14.806Z] TEST RESULT: Failed. Unexpected exit from test [exit code: 1]
[2025-05-29T16:50:14.806Z] --------------------------------------------------
[2025-05-29T16:50:50.671Z] TEST: sun/security/validator/certreplace.sh
[2025-05-29T16:50:50.673Z] Exception in thread "main" sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
[2025-05-29T16:50:50.673Z] at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
[2025-05-29T16:50:50.673Z] at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:249)
[2025-05-29T16:50:50.675Z] at java.base/sun.security.validator.Validator.validate(Validator.java:264)
[2025-05-29T16:50:50.675Z] at java.base/sun.security.validator.Validator.validate(Validator.java:231)
[2025-05-29T16:50:50.675Z] at java.base/sun.security.validator.Validator.validate(Validator.java:207)
[2025-05-29T16:50:50.675Z] at CertReplace.main(CertReplace.java:51)
[2025-05-29T16:50:50.675Z] Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
[2025-05-29T16:50:50.675Z] at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:148)
[2025-05-29T16:50:50.675Z] at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:129)
[2025-05-29T16:50:50.675Z] at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
[2025-05-29T16:50:50.675Z] at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
[2025-05-29T16:50:50.675Z] ... 5 more
[2025-05-29T16:50:50.677Z] TEST RESULT: Failed. Execution failed: exit code 1
[2025-05-29T16:50:50.677Z] --------------------------------------------------
[2025-05-29T16:57:59.785Z] Test results: passed: 768; failed: 7
[2025-05-29T16:58:23.312Z] jdk_security3_0_FAILED
openjdk11_j9_extended.openjdk_ppc64_aix_openjceplus
[2025-05-29T17:36:39.357Z] variation: Mode150
[2025-05-29T17:36:39.357Z] JVM_OPTIONS: -XX:+UseCompressedOops -Xverbosegclog -Djava.security.properties=/home/jenkins/workspace/Test_openjdk11_j9_extended.openjdk_ppc64_aix_openjceplus_testList_1/aqa-tests/config/openjceplus/jdk/java.security
[2025-05-29T17:38:09.200Z] TEST: com/sun/crypto/provider/Cipher/ChaCha20/ChaCha20NoReuse.java
[2025-05-29T17:38:09.222Z] STDERR:
[2025-05-29T17:38:09.222Z] java.lang.RuntimeException: Expected IllegalStateException not thrown
[2025-05-29T17:38:09.222Z] at ChaCha20NoReuse$6.run(ChaCha20NoReuse.java:399)
[2025-05-29T17:38:09.222Z] at ChaCha20NoReuse.main(ChaCha20NoReuse.java:608)
[2025-05-29T17:42:08.217Z] Test results: passed: 219; failed: 1
[2025-05-29T17:42:08.217Z] jdk_security2_extended_0_FAILED
openjdk11_j9_sanity.openjdk_x86-64_windows_openjceplus
[2025-05-29T15:40:49.659Z] variation: Mode150
[2025-05-29T15:40:49.660Z] JVM_OPTIONS: -XX:+UseCompressedOops -Xverbosegclog -Djava.security.properties=C:/Users/jenkins/workspace/Test_openjdk11_j9_sanity.openjdk_x86-64_windows_openjceplus_testList_2/aqa-tests/config/openjceplus/jdk/x86-64_windows/java.security
[2025-05-29T15:53:14.956Z] TEST: java/security/KeyPairGenerator/SolarisShortDSA.java
[2025-05-29T15:53:14.976Z] java.lang.ClassCastException: com.ibm.crypto.plus.provider.DSAPrivateKey incompatible with sun.security.provider.DSAPrivateKey
[2025-05-29T15:53:14.976Z] at SolarisShortDSA.main(SolarisShortDSA.java:42)
[2025-05-29T16:00:21.984Z] TEST: java/security/MessageDigest/UnsupportedProvider.java
[2025-05-29T16:00:22.004Z] java.lang.RuntimeException: SHA-3 is not supported by OpenJCEPlus provider, but expected NoSuchAlgorithmException is not thrown
[2025-05-29T16:00:22.004Z] at UnsupportedProvider.main(UnsupportedProvider.java:49)
[2025-05-29T16:07:22.798Z] TEST: java/security/Provider/SecurityProviderModularTest.java
[2025-05-29T16:07:22.913Z] STDERR:
[2025-05-29T16:07:22.913Z] java.lang.RuntimeException: FAIL: Unknown Exception occured. Expected: Client: found provider TestProvider
[2025-05-29T16:07:22.913Z] at SecurityProviderModularTest.execute(SecurityProviderModularTest.java:264)
[2025-05-29T16:07:22.913Z] at SecurityProviderModularTest.process(SecurityProviderModularTest.java:202)
[2025-05-29T16:07:22.913Z] at SecurityProviderModularTest.main(SecurityProviderModularTest.java:195)
[2025-05-29T16:13:00.287Z] Test results: passed: 198; failed: 3
[2025-05-29T16:13:17.358Z] jdk_security1_0_FAILED
openjdk11_j9_sanity.openjdk_x86-64_windows_openjceplus
[2025-05-29T15:40:11.046Z] variation: Mode150
[2025-05-29T15:40:11.046Z] JVM_OPTIONS: -XX:+UseCompressedOops -Xverbosegclog -Djava.security.properties=C:/Users/jenkins/workspace/Test_openjdk11_j9_sanity.openjdk_x86-64_windows_openjceplus_testList_0/aqa-tests/config/openjceplus/jdk/x86-64_windows/java.security
[2025-05-29T15:44:13.117Z] TEST: sun/security/krb5/auto/principalProperty/PrincipalSystemPropTest.java
[2025-05-29T15:44:13.149Z] STDERR:
[2025-05-29T15:44:13.149Z] java.lang.RuntimeException: KDC: unexpected exception
[2025-05-29T15:44:13.149Z] at KDC.startKDC(KDC.java:1681)
[2025-05-29T15:44:13.149Z] at PrincipalSystemPropTest.setupTest(PrincipalSystemPropTest.java:103)
[2025-05-29T15:44:13.149Z] at PrincipalSystemPropTest.main(PrincipalSystemPropTest.java:74)
[2025-05-29T15:44:13.149Z] at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
[2025-05-29T15:44:13.149Z] at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
[2025-05-29T15:44:13.149Z] at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
[2025-05-29T15:44:13.149Z] at java.base/java.lang.reflect.Method.invoke(Method.java:572)
[2025-05-29T15:44:13.149Z] at com.sun.javatest.regtest.agent.MainWrapper$MainTask.run(MainWrapper.java:138)
[2025-05-29T15:44:13.149Z] at java.base/java.lang.Thread.run(Thread.java:835)
[2025-05-29T15:44:13.149Z] Caused by: java.lang.IllegalArgumentException: EncryptionKey: Key bytes cannot be null!
[2025-05-29T15:44:13.149Z] at java.security.jgss/sun.security.krb5.EncryptionKey.<init>(EncryptionKey.java:209)
[2025-05-29T15:44:13.149Z] at java.security.jgss/sun.security.krb5.EncryptionKey.acquireSecretKeys(EncryptionKey.java:187)
[2025-05-29T15:44:13.149Z] at java.security.jgss/sun.security.krb5.internal.ktab.KeyTab.addEntry(KeyTab.java:378)
[2025-05-29T15:44:13.149Z] at KDC.writeKtab(KDC.java:354)
[2025-05-29T15:44:13.149Z] at KDC.writeKtab(KDC.java:394)
[2025-05-29T15:44:13.149Z] at KDC.startKDC(KDC.java:1664)
[2025-05-29T16:15:31.723Z] Test results: passed: 141; failed: 1
[2025-05-29T16:16:12.214Z] jdk_security4_0_FAILED
openjdk_x86-64_windows_openjceplus
[2025-05-29T15:34:51.031Z] variation: Mode150
[2025-05-29T15:34:51.031Z] JVM_OPTIONS: -XX:+UseCompressedOops -Xverbosegclog -Djava.security.properties=C:/Users/jenkins/workspace/Test_openjdk11_j9_sanity.openjdk_x86-64_windows_openjceplus_testList_1/aqa-tests/config/openjceplus/jdk/x86-64_windows/java.security
[2025-05-29T16:11:10.486Z] TEST: javax/xml/crypto/dsig/SecurityManager/XMLDSigWithSecMgr.java
[2025-05-29T16:11:10.496Z] STDERR:
[2025-05-29T16:11:10.496Z] java.lang.ExceptionInInitializerError
[2025-05-29T16:11:10.496Z] at java.base/java.lang.J9VMInternals.ensureError(J9VMInternals.java:214)
[2025-05-29T16:11:10.496Z] at java.base/java.lang.J9VMInternals.recordInitializationFailure(J9VMInternals.java:203)
[2025-05-29T16:11:10.496Z] at openjceplus/com.ibm.crypto.plus.provider.RSASignature.engineInitSign(RSASignature.java:107)
[2025-05-29T16:11:10.497Z] at java.base/java.security.Signature$Delegate.tryOperation(Signature.java:1326)
[2025-05-29T16:11:10.497Z] at java.base/java.security.Signature$Delegate.chooseProvider(Signature.java:1275)
[2025-05-29T16:11:10.497Z] at java.base/java.security.Signature$Delegate.engineInitSign(Signature.java:1372)
[2025-05-29T16:11:10.497Z] at java.base/java.security.Signature.initSign(Signature.java:636)
[2025-05-29T16:11:10.497Z] at java.xml.crypto/org.jcp.xml.dsig.internal.dom.DOMSignatureMethod.sign(DOMSignatureMethod.java:377)
[2025-05-29T16:11:10.497Z] at java.xml.crypto/org.jcp.xml.dsig.internal.dom.DOMXMLSignature.sign(DOMXMLSignature.java:421)
[2025-05-29T16:11:10.497Z] at XMLDSigWithSecMgr.<init>(XMLDSigWithSecMgr.java:134)
[2025-05-29T16:11:10.497Z] at XMLDSigWithSecMgr.main(XMLDSigWithSecMgr.java:155)
[2025-05-29T16:11:10.497Z] at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
[2025-05-29T16:11:10.497Z] at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
[2025-05-29T16:11:10.497Z] at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
[2025-05-29T16:11:10.497Z] at java.base/java.lang.reflect.Method.invoke(Method.java:572)
[2025-05-29T16:11:10.497Z] at com.sun.javatest.regtest.agent.MainWrapper$MainTask.run(MainWrapper.java:138)
[2025-05-29T16:11:10.497Z] at java.base/java.lang.Thread.run(Thread.java:835)
[2025-05-29T16:11:10.497Z] Caused by: java.security.AccessControlException: Access denied ("java.util.PropertyPermission" "com.ibm.crypto.provider.restrictRSAExponent" "read")
[2025-05-29T16:11:10.498Z] at java.base/java.security.AccessController.throwACE(AccessController.java:176)
[2025-05-29T16:11:10.498Z] at java.base/java.security.AccessController.checkPermissionHelper(AccessController.java:240)
[2025-05-29T16:11:10.498Z] at java.base/java.security.AccessController.checkPermission(AccessController.java:387)
[2025-05-29T16:11:10.498Z] at java.base/java.lang.SecurityManager.checkPermission(SecurityManager.java:322)
[2025-05-29T16:11:10.498Z] at java.base/java.lang.SecurityManager.checkPropertyAccess(SecurityManager.java:1066)
[2025-05-29T16:11:10.498Z] at java.base/java.lang.System.getProperty(System.java:597)
[2025-05-29T16:11:10.498Z] at openjceplus/com.ibm.crypto.plus.provider.RSAKeyFactory.<clinit>(RSAKeyFactory.java:50)
[2025-05-29T16:11:10.498Z] ... 15 more
FYI @jasonkatonica
openjdk17_j9_sanity.openjdk_aarch64_linux_openjceplus
[2025-05-30T15:02:50.717Z] variation: Mode150
[2025-05-30T15:02:50.717Z] JVM_OPTIONS: -XX:+UseCompressedOops -Xverbosegclog -Djava.security.properties=/home/jenkins/workspace/Test_openjdk17_j9_sanity.openjdk_aarch64_linux_openjceplus/aqa-tests/config/openjceplus/jdk/java.security
[2025-05-30T15:09:04.601Z] TEST: java/security/Provider/SecurityProviderModularTest.java
[2025-05-30T15:09:04.701Z] STDERR:
[2025-05-30T15:09:04.701Z] java.lang.RuntimeException: FAIL: Unknown Exception occured. Expected: Client: found provider TestProvider
[2025-05-30T15:09:04.701Z] at SecurityProviderModularTest.execute(SecurityProviderModularTest.java:264)
[2025-05-30T15:09:04.701Z] at SecurityProviderModularTest.process(SecurityProviderModularTest.java:202)
[2025-05-30T15:09:04.701Z] at SecurityProviderModularTest.main(SecurityProviderModularTest.java:195)
[2025-05-30T15:12:20.822Z] Test results: passed: 208; failed: 1
[2025-05-30T15:12:36.433Z] jdk_security1_0_FAILED
openjdk17_j9_sanity.openjdk_aarch64_linux_openjceplus
[2025-05-30T15:22:31.256Z] variation: Mode150
[2025-05-30T15:22:31.256Z] JVM_OPTIONS: -XX:+UseCompressedOops -Xverbosegclog -Djava.security.properties=/home/jenkins/workspace/Test_openjdk17_j9_sanity.openjdk_aarch64_linux_openjceplus/aqa-tests/config/openjceplus/jdk/java.security
[2025-05-30T15:24:04.376Z] TEST: com/sun/crypto/provider/Cipher/ChaCha20/ChaCha20NoReuse.java
[2025-05-30T15:24:04.401Z] STDERR:
[2025-05-30T15:24:04.401Z] java.lang.RuntimeException: Expected IllegalStateException not thrown
[2025-05-30T15:24:04.401Z] at ChaCha20NoReuse$6.run(ChaCha20NoReuse.java:394)
[2025-05-30T15:24:04.401Z] at ChaCha20NoReuse.main(ChaCha20NoReuse.java:603)
[2025-05-30T15:29:35.154Z] Test results: passed: 223; failed: 1
[2025-05-30T15:29:53.422Z] jdk_security2_0_FAILED
openjdk17_j9_sanity.openjdk_aarch64_linux_openjceplus
[2025-05-30T15:44:22.941Z] variation: Mode650
[2025-05-30T15:44:23.643Z] JVM_OPTIONS: -XX:-UseCompressedOops -Xverbosegclog -Djava.security.properties=/home/jenkins/workspace/Test_openjdk17_j9_sanity.openjdk_aarch64_linux_openjceplus/aqa-tests/config/openjceplus/jdk/java.security
[2025-05-30T15:45:45.465Z] TEST: sun/security/krb5/auto/principalProperty/PrincipalSystemPropTest.java
[2025-05-30T15:45:45.502Z] Caused by: java.lang.IllegalArgumentException: EncryptionKey: Key bytes cannot be null!
[2025-05-30T15:45:45.502Z] at java.security.jgss/sun.security.krb5.EncryptionKey.<init>(EncryptionKey.java:209)
[2025-05-30T15:45:45.502Z] at java.security.jgss/sun.security.krb5.EncryptionKey.acquireSecretKeys(EncryptionKey.java:187)
[2025-05-30T15:45:45.502Z] at java.security.jgss/sun.security.krb5.internal.ktab.KeyTab.addEntry(KeyTab.java:377)
[2025-05-30T15:45:45.502Z] at KDC.writeKtab(KDC.java:354)
[2025-05-30T15:45:45.502Z] at KDC.writeKtab(KDC.java:394)
[2025-05-30T15:45:45.502Z] at KDC.startKDC(KDC.java:1664)
[2025-05-30T15:52:23.256Z] jdk_security4_1_FAILED
openjdk17_j9_extended.openjdk_aarch64_linux_openjceplus
openjdk17_j9_sanity.openjdk_aarch64_mac_openjceplus
[2025-05-30T14:59:02.868Z] variation: Mode650
[2025-05-30T14:59:02.868Z] JVM_OPTIONS: -XX:-UseCompressedOops -Xverbosegclog -Djava.security.properties=/Users/jenkins/workspace/Test_openjdk17_j9_sanity.openjdk_aarch64_mac_openjceplus/aqa-tests/config/openjceplus/jdk/java.security
[2025-05-30T14:59:35.911Z] TEST: java/security/KeyStore/CheckMacOSKeyChainTrust.java
[2025-05-30T14:59:35.953Z] STDERR:
[2025-05-30T14:59:35.953Z] java.security.KeyStoreException: KEYCHAINSTORE not found
[2025-05-30T14:59:35.953Z] at java.base/java.security.KeyStore.getInstance(KeyStore.java:871)
[2025-05-30T14:59:35.953Z] at CheckMacOSKeyChainTrust.main(CheckMacOSKeyChainTrust.java:50)
[2025-05-30T14:59:35.953Z] Caused by: java.security.NoSuchAlgorithmException: KEYCHAINSTORE KeyStore not available
[2025-05-30T14:59:35.953Z] at java.base/sun.security.jca.GetInstance.getInstance(GetInstance.java:159)
[2025-05-30T14:59:35.953Z] at java.base/java.security.Security.getImpl(Security.java:692)
[2025-05-30T14:59:35.953Z] at java.base/java.security.KeyStore.getInstance(KeyStore.java:868)
[2025-05-30T14:59:35.953Z] JavaTest Message: shutting down test
[2025-05-30T14:59:35.953Z]
[2025-05-30T14:59:35.953Z]
[2025-05-30T14:59:35.953Z] TEST RESULT: Failed. Execution failed: `main' threw exception: java.security.KeyStoreException: KEYCHAINSTORE not found
[2025-05-30T14:59:35.953Z] --------------------------------------------------
[2025-05-30T15:02:00.207Z] Test results: passed: 210; failed: 1
[2025-05-30T15:02:00.208Z] jdk_security1_1_FAILED
openjdk17_j9_extended.openjdk_aarch64_mac_openjceplus/1/)
[2025-05-30T15:07:28.526Z] TEST: sun/security/provider/DSA/TestMaxLengthDER.java
openjdk17_j9_extended.openjdk_ppc64_aix_fips140_3_openjceplusfips.fips140-3
[2025-05-30T17:42:38.322Z] variation: Mode150
[2025-05-30T17:42:38.322Z] JVM_OPTIONS: -XX:+UseCompressedOops -Xverbosegclog -Dsemeru.fips=true -Dsemeru.customprofile=OpenJCEPlusFIPS.FIPS140-3
[2025-05-30T17:51:48.305Z] TEST: sun/security/pkcs12/KeytoolOpensslInteropTest.java#UseExistingPKCS12
2025-05-30T17:51:48.330Z] STDOUT:
[2025-05-30T17:51:48.330Z] java.security.KeyStoreException: Unrecognized keystore format. Please load it with a specified type
[2025-05-30T17:51:48.330Z] at java.base/java.security.KeyStore.getInstance(KeyStore.java:1808)
[2025-05-30T17:51:48.330Z] at java.base/java.security.KeyStore.getInstance(KeyStore.java:1681)
[2025-05-30T17:51:48.330Z] at KeytoolOpensslInteropTest.check(KeytoolOpensslInteropTest.java:570)
[2025-05-30T17:51:48.330Z] at KeytoolOpensslInteropTest.testWithJavaCommands(KeytoolOpensslInteropTest.java:159)
[2025-05-30T17:51:48.330Z] at KeytoolOpensslInteropTest.main(KeytoolOpensslInteropTest.java:115)
[2025-05-30T17:51:48.330Z] at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
[2025-05-30T17:51:48.330Z] STDERR:
[2025-05-30T17:51:48.330Z] java.lang.RuntimeException: os2-a-null-changeit-load expected: true but was: class java.security.KeyStoreException
[2025-05-30T17:51:48.330Z] at jdk.test.lib.Asserts.fail(Asserts.java:591)
[2025-05-30T17:51:48.330Z] at jdk.test.lib.Asserts.assertEquals(Asserts.java:202)
[2025-05-30T17:51:48.330Z] at jdk.test.lib.Asserts.assertEQ(Asserts.java:178)
[2025-05-30T17:51:48.330Z] at KeytoolOpensslInteropTest.check(KeytoolOpensslInteropTest.java:577)
[2025-05-30T17:51:48.330Z] at KeytoolOpensslInteropTest.testWithJavaCommands(KeytoolOpensslInteropTest.java:159)
[2025-05-30T17:51:48.330Z] at KeytoolOpensslInteropTest.main(KeytoolOpensslInteropTest.java:115)
[2025-05-30T18:16:49.535Z] Test results: passed: 369; failed: 1
[2025-05-30T18:16:57.442Z] jdk_security3_0_FAILED
openjdk17_j9_sanity.openjdk_x86-64_mac_openjceplus
[2025-05-30T15:00:39.897Z] variation: Mode150
[2025-05-30T15:00:39.897Z] JVM_OPTIONS: -XX:+UseCompressedOops -Xverbosegclog -Djava.security.properties=/Users/jenkins/workspace/Test_openjdk17_j9_sanity.openjdk_x86-64_mac_openjceplus/aqa-tests/config/openjceplus/jdk/java.security
[2025-05-30T15:01:22.028Z] TEST: java/security/KeyAgreement/MultiThreadTest.java
[2025-05-30T15:01:22.053Z] STDERR:
[2025-05-30T15:01:22.053Z] java.lang.InterruptedException
[2025-05-30T15:01:22.053Z] at java.base/java.util.concurrent.locks.AbstractQueuedSynchronizer.acquireSharedInterruptibly(AbstractQueuedSynchronizer.java:1048)
[2025-05-30T15:01:22.053Z] at java.base/java.util.concurrent.CountDownLatch.await(CountDownLatch.java:230)
[2025-05-30T15:01:22.053Z] at MultiThreadTest.runTest(MultiThreadTest.java:121)
[2025-05-30T15:01:22.053Z] at MultiThreadTest.main(MultiThreadTest.java:61)
openjdk21_j9_sanity.openjdk_aarch64_linux_openjceplus
[2025-05-31T20:30:54.135Z] variation: Mode150
[2025-05-31T20:30:54.136Z] JVM_OPTIONS: -XX:+UseCompressedOops -Xverbosegclog -Djava.security.properties=/home/jenkins/workspace/Test_openjdk21_j9_sanity.openjdk_aarch64_linux_openjceplus/aqa-tests/config/openjceplus/jdk/java.security
[2025-05-31T20:36:58.355Z] TEST: java/security/Provider/SecurityProviderModularTest.java
[2025-05-31T20:36:58.468Z] java.lang.RuntimeException: FAIL: Unknown Exception occured. Expected: Client: found provider TestProvider
[2025-05-31T20:36:58.468Z] at SecurityProviderModularTest.execute(SecurityProviderModularTest.java:268)
[2025-05-31T20:36:58.468Z] at SecurityProviderModularTest.process(SecurityProviderModularTest.java:206)
[2025-05-31T20:36:58.468Z] at SecurityProviderModularTest.main(SecurityProviderModularTest.java:199)
[2025-05-31T20:39:04.497Z] jdk_security1_0_FAILED
openjdk_ppc64_aix_fips140_3_openjceplusfips.fips140-3
[2025-05-31T21:57:22.727Z] variation: Mode150
[2025-05-31T21:57:22.727Z] JVM_OPTIONS: -XX:+UseCompressedOops -Xverbosegclog -Dsemeru.fips=true -Dsemeru.customprofile=OpenJCEPlusFIPS.FIPS140-3
[2025-05-31T21:58:16.769Z] TEST: java/security/cert/CertPathValidator/crlDP/CheckAllCRLs.java
[2025-05-31T21:58:16.780Z] java.io.IOException: SHA1 not supported
[2025-05-31T21:58:16.780Z] at java.base/sun.security.x509.KeyIdentifier.<init>(KeyIdentifier.java:97)
[2025-05-31T21:58:16.780Z] at jdk.test.lib.security.CertificateBuilder.addSubjectKeyIdExt(CertificateBuilder.java:349)
[2025-05-31T21:58:16.780Z] at CheckAllCRLs.createCert(CheckAllCRLs.java:152)
[2025-05-31T21:58:16.780Z] at CheckAllCRLs.main(CheckAllCRLs.java:79)
[2025-05-31T22:05:09.276Z] jdk_security1_0_FAILED
openjdk_ppc64le_linux_fips140_3_openjceplusfips.fips140-3
[2025-05-31T20:34:17.480Z] variation: Mode650
[2025-05-31T20:34:17.480Z] JVM_OPTIONS: -XX:-UseCompressedOops -Xverbosegclog -Dsemeru.fips=true -Dsemeru.customprofile=OpenJCEPlusFIPS.FIPS140-3
[2025-05-31T20:38:40.271Z] TEST: sun/security/pkcs12/AttributesCorrectness.java
[2025-05-31T20:38:40.293Z] STDERR:
[2025-05-31T20:38:40.293Z] java.security.KeyStoreException: pkcs12 not found
[2025-05-31T20:38:40.293Z] at java.base/java.security.KeyStore.getInstance(KeyStore.java:873)
[2025-05-31T20:38:40.293Z] at AttributesCorrectness.main(AttributesCorrectness.java:58)
[2025-05-31T20:38:40.293Z] at java.base/jdk.internal.reflect.DirectMethodHandleAccessor.invoke(DirectMethodHandleAccessor.java:103)
[2025-05-31T20:38:40.293Z] at java.base/java.lang.reflect.Method.invoke(Method.java:586)
[2025-05-31T20:38:40.293Z] at com.sun.javatest.regtest.agent.MainActionHelper$AgentVMRunnable.run(MainActionHelper.java:333)
[2025-05-31T20:38:40.293Z] at java.base/java.lang.Thread.run(Thread.java:1595)
[2025-05-31T20:38:40.293Z] Caused by: java.security.NoSuchAlgorithmException: pkcs12 KeyStore not available
[2025-05-31T20:38:40.293Z] at java.base/sun.security.jca.GetInstance.getInstance(GetInstance.java:159)
[2025-05-31T20:38:40.294Z] at java.base/java.security.Security.getImpl(Security.java:696)
[2025-05-31T20:38:40.294Z] at java.base/java.security.KeyStore.getInstance(KeyStore.java:870)
[2025-05-31T20:38:40.294Z] TEST: sun/security/pkcs12/AttributesMultiThread.java
[2025-05-31T20:38:40.305Z] TEST: sun/security/pkcs12/GetSetEntryTest.java
[2025-05-31T20:38:40.315Z] TEST: sun/security/pkcs12/KeytoolOpensslInteropTest.java#UseExistingPKCS12
[2025-05-31T20:56:42.187Z] jdk_security3_1_FAILED
This issue now appears to be unclosable since both both fips and non fips and openjceplus tests are all included into this single issue. We are looking into individual test failures in the various environments above however dont believe any of these issues so far are something that are considered a stop ship issue.
Once everything necessary happens for 0.53, it can be moved forward.
For the failed test “TEST: javax/xml/crypto/dsig/SecurityManager/XMLDSigWithSecMgr.java”
The failure is caused by the following exception:
Caused by: java.security.AccessControlException: Access denied ("java.util.PropertyPermission" "com.ibm.crypto.provider.restrictRSAExponent" "read")
In OpenJCEPlus, the class "com.ibm.crypto.plus.provider.RSAKeyFactory" attempts to read the system property "com.ibm.crypto.provider.restrictRSAExponent" as shown below:
private static final boolean restrictExpLen = Boolean.parseBoolean(
System.getProperty("com.ibm.crypto.provider.restrictRSAExponent", "false"));
The failing test case uses a custom java.policy file that only grants SocketPermission for accept, resolve, and connect to localhost.
When OpenJCEPlus is the first provider in the list, the test triggers initialization of RSAKeyFactory, which tries to read the system property. However, due to the custom java.policy, the read operation is not permitted, leading to the AccessControlException.
We do plan to address all the failures as soon as possible for now moving this issue to next release given that this is numerous failures in one issue at the moment.
Closed as per https://github.ibm.com/runtimes/jit-crypto/issues/821