Hi Lahiru,

Endorsing the JDK is required only if you building Rampart with tests. There
are no SAML 2.0 specific tests in WSS4J.

To overcome the above mentioned error, it is required to patch the the JDK
with unlimited jurisdiction policy files.

Thanks.
/thilina

On Wed, Jan 20, 2010 at 5:46 PM, Lahiru Gunathilake <[email protected]> wrote:

> Hi Thilina,
>
> Since we have a new builder file system I cannot download from the given
> URL and I want to know this thing can cause a test failure of wss4j or not.
> I haven't endorsed the JDK and build WSS4J.. and got Test Failures like
> this.
> Tests run: 109, Failures: 0, Errors: 10, Skipped: 0, Time elapsed: 8.861
> sec <<< FAILURE!
> testEncryptionDecryptionRSA15(wssec.TestWSSecurityNew2)  Time elapsed:
> 0.603 sec  <<< ERROR!
> org.apache.ws.security.WSSecurityException: Cannot encrypt data; nested
> exception is:
> org.apache.xml.security.encryption.XMLEncryptionException: Illegal key size
> or default parameters
> Original Exception was java.security.InvalidKeyException: Illegal key size
> or default parameters
> at
> org.apache.ws.security.message.WSSecEncrypt.doEncryption(WSSecEncrypt.java:594)
>  at
> org.apache.ws.security.message.WSSecEncrypt.doEncryption(WSSecEncrypt.java:454)
> at
> org.apache.ws.security.message.WSSecEncrypt.encryptForInternalRef(WSSecEncrypt.java:342)
>  at
> org.apache.ws.security.message.WSSecEncrypt.build(WSSecEncrypt.java:306)
> at
> wssec.TestWSSecurityNew2.testEncryptionDecryptionRSA15(TestWSSecurityNew2.java:175)
> Caused by: org.apache.xml.security.encryption.XMLEncryptionException:
> Illegal key size or default parameters
> Original Exception was java.security.InvalidKeyException: Illegal key size
> or default parameters
>  at org.apache.xml.security.encryption.XMLCipher.encryptData(Unknown
> Source)
> at org.apache.xml.security.encryption.XMLCipher.encryptData(Unknown Source)
>  at org.apache.xml.security.encryption.XMLCipher.encryptElement(Unknown
> Source)
> at org.apache.xml.security.encryption.XMLCipher.doFinal(Unknown Source)
>  at
> org.apache.ws.security.message.WSSecEncrypt.doEncryption(WSSecEncrypt.java:588)
> ... 32 more
>
> testSAMLUnsignedSenderVouches(wssec.TestWSSecurityNewST1)  Time elapsed:
> 0.944 sec  <<< ERROR!
> java.lang.NullPointerException
> at
> org.apache.ws.security.saml.SAMLIssuerImpl.newAssertion(SAMLIssuerImpl.java:125)
>  at
> wssec.TestWSSecurityNewST1.testSAMLUnsignedSenderVouches(TestWSSecurityNewST1.java:119)
>
> testSAMLSignedSenderVouches(wssec.TestWSSecurityNewST2)  Time elapsed: 0.02
> sec  <<< ERROR!
> java.lang.NullPointerException
> at
> org.apache.ws.security.saml.SAMLIssuerImpl.newAssertion(SAMLIssuerImpl.java:125)
> at
> wssec.TestWSSecurityNewST2.testSAMLSignedSenderVouches(TestWSSecurityNewST2.java:131)
>
> testSAMLSignedSenderVouchesKeyIdentifier(wssec.TestWSSecurityNewST2)  Time
> elapsed: 0.008 sec  <<< ERROR!
> java.lang.NullPointerException
> at
> org.apache.ws.security.saml.SAMLIssuerImpl.newAssertion(SAMLIssuerImpl.java:125)
>  at
> wssec.TestWSSecurityNewST2.testSAMLSignedSenderVouchesKeyIdentifier(TestWSSecurityNewST2.java:174)
>
> testDefaultIssuerClass(wssec.TestWSSecurityNewST2)  Time elapsed: 0.009 sec
>  <<< ERROR!
> java.lang.NullPointerException
> at
> org.apache.ws.security.saml.SAMLIssuerImpl.newAssertion(SAMLIssuerImpl.java:125)
> at
> wssec.TestWSSecurityNewST2.testDefaultIssuerClass(TestWSSecurityNewST2.java:219)
>
> testWSS62(wssec.TestWSSecurityNewST2)  Time elapsed: 0.033 sec  <<< ERROR!
> java.lang.NullPointerException
> at
> org.apache.ws.security.saml.SAMLIssuerImpl.newAssertion(SAMLIssuerImpl.java:125)
>  at wssec.TestWSSecurityNewST2.testWSS62(TestWSSecurityNewST2.java:263)
>
> testSAMLSignedKeyHolder(wssec.TestWSSecurityNewST3)  Time elapsed: 0.061
> sec  <<< ERROR!
> java.lang.NullPointerException
> at
> org.apache.ws.security.saml.SAMLIssuerImpl.newAssertion(SAMLIssuerImpl.java:125)
> at
> wssec.TestWSSecurityNewST3.testSAMLSignedKeyHolder(TestWSSecurityNewST3.java:135)
>
> testSAMLSignedKeyHolderKeyIdentifier(wssec.TestWSSecurityNewST3)  Time
> elapsed: 0.008 sec  <<< ERROR!
> java.lang.NullPointerException
> at
> org.apache.ws.security.saml.SAMLIssuerImpl.newAssertion(SAMLIssuerImpl.java:125)
>  at
> wssec.TestWSSecurityNewST3.testSAMLSignedKeyHolderKeyIdentifier(TestWSSecurityNewST3.java:183)
>
> testX509Signature(wssec.TestWSSecurityCertError)  Time elapsed: 0.007 sec
>  <<< ERROR!
> java.lang.RuntimeException: org.apache.ws.security.components.crypto.Merlin
> cannot create instance
> at
> org.apache.ws.security.components.crypto.CryptoFactory.loadClass(CryptoFactory.java:225)
>  at
> org.apache.ws.security.components.crypto.CryptoFactory.loadClass(CryptoFactory.java:180)
> at
> org.apache.ws.security.components.crypto.CryptoFactory.getInstance(CryptoFactory.java:162)
>  at
> org.apache.ws.security.components.crypto.CryptoFactory.getInstance(CryptoFactory.java:55)
> at
> wssec.TestWSSecurityCertError.testX509Signature(TestWSSecurityCertError.java:115)
> Caused by: java.lang.reflect.InvocationTargetException
> at sun.reflect.GeneratedConstructorAccessor10.newInstance(Unknown Source)
> at
> sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
>  at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
> at
> org.apache.ws.security.components.crypto.CryptoFactory.loadClass(CryptoFactory.java:211)
>  ... 32 more
> Caused by: org.apache.ws.security.components.crypto.CredentialException:
> Failed to load credentials.
> at
> org.apache.ws.security.components.crypto.AbstractCrypto.load(AbstractCrypto.java:174)
>  at
> org.apache.ws.security.components.crypto.AbstractCrypto.<init>(AbstractCrypto.java:111)
> at org.apache.ws.security.components.crypto.Merlin.<init>(Merlin.java:71)
>  ... 36 more
> Caused by: java.io.IOException: exception unwrapping private key -
> java.security.InvalidKeyException: Illegal key size
> at org.bouncycastle.jce.provider.JDKPKCS12KeyStore.unwrapKey(Unknown
> Source)
>  at org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Unknown
> Source)
> at java.security.KeyStore.load(KeyStore.java:1185)
>  at
> org.apache.ws.security.components.crypto.AbstractCrypto.load(AbstractCrypto.java:168)
> ... 38 more
>
> testEncryption(wssec.TestWSSecurityCertError)  Time elapsed: 0.008 sec  <<<
> ERROR!
> java.lang.RuntimeException: org.apache.ws.security.components.crypto.Merlin
> cannot create instance
>  at
> org.apache.ws.security.components.crypto.CryptoFactory.loadClass(CryptoFactory.java:225)
> at
> org.apache.ws.security.components.crypto.CryptoFactory.loadClass(CryptoFactory.java:180)
>  at
> org.apache.ws.security.components.crypto.CryptoFactory.getInstance(CryptoFactory.java:162)
> at
> org.apache.ws.security.components.crypto.CryptoFactory.getInstance(CryptoFactory.java:55)
>  at
> wssec.TestWSSecurityCertError.testEncryption(TestWSSecurityCertError.java:133)
> Caused by: java.lang.reflect.InvocationTargetException
>  at sun.reflect.GeneratedConstructorAccessor10.newInstance(Unknown Source)
> at
> sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
>  at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
> at
> org.apache.ws.security.components.crypto.CryptoFactory.loadClass(CryptoFactory.java:211)
>  ... 32 more
> Caused by: org.apache.ws.security.components.crypto.CredentialException:
> Failed to load credentials.
> at
> org.apache.ws.security.components.crypto.AbstractCrypto.load(AbstractCrypto.java:174)
>  at
> org.apache.ws.security.components.crypto.AbstractCrypto.<init>(AbstractCrypto.java:111)
> at org.apache.ws.security.components.crypto.Merlin.<init>(Merlin.java:71)
>  ... 36 more
> Caused by: java.io.IOException: exception unwrapping private key -
> java.security.InvalidKeyException: Illegal key size
> at org.bouncycastle.jce.provider.JDKPKCS12KeyStore.unwrapKey(Unknown
> Source)
>  at org.bouncycastle.jce.provider.JDKPKCS12KeyStore.engineLoad(Unknown
> Source)
> at java.security.KeyStore.load(KeyStore.java:1185)
>  at
> org.apache.ws.security.components.crypto.AbstractCrypto.load(AbstractCrypto.java:168)
> ... 38 more
>
>
> Results :
>
> Tests in error:
>   testEncryptionDecryptionRSA15(wssec.TestWSSecurityNew2)
>   testSAMLUnsignedSenderVouches(wssec.TestWSSecurityNewST1)
>   testSAMLSignedSenderVouches(wssec.TestWSSecurityNewST2)
>   testSAMLSignedSenderVouchesKeyIdentifier(wssec.TestWSSecurityNewST2)
>   testDefaultIssuerClass(wssec.TestWSSecurityNewST2)
>   testWSS62(wssec.TestWSSecurityNewST2)
>   testSAMLSignedKeyHolder(wssec.TestWSSecurityNewST3)
>   testSAMLSignedKeyHolderKeyIdentifier(wssec.TestWSSecurityNewST3)
>   testX509Signature(wssec.TestWSSecurityCertError)
>   testEncryption(wssec.TestWSSecurityCertError)
>
> Tests run: 116, Failures: 0, Errors: 10, Skipped: 0
>
> [INFO]
> ------------------------------------------------------------------------
> [ERROR] BUILD FAILURE
> [INFO]
> ------------------------------------------------------------------------
> [INFO] There are test failures.
>
> Please refer to /home/carbon/carbon-2.0.3/wss4j/target/surefire-reports for
> the individual test results.
> [INFO]
> ------------------------------------------------------------------------
> [INFO] For more information, run Maven with the -e switch
> [INFO]
> ------------------------------------------------------------------------
> [INFO] Total time: 1 minute 4 seconds
> [INFO] Finished at: Wed Jan 20 12:09:24 UTC 2010
> [INFO] Final Memory: 60M/707M
> [INFO]
> ------------------------------------------------------------------------
> car...@1ec2:~/carbon-2.0.3/wss4j$ mvn clean install -Dmaven.test.skip=true
> [INFO] Scanning for projects...
> [INFO]
> ------------------------------------------------------------------------
>
> Without tests it build successfully.
>
> Lahiru
>
> On Thu, Sep 3, 2009 at 5:08 PM, Thilina Mahesh Buddhika <[email protected]
> > wrote:
>
>> Hi all,
>>
>> Since we have merged some modifications to the Rampart custom branch, a
>> version upgrade is done from 1.4-wso2v2 to 1.4-wso2v3. These changes are
>> available in the 2.0.1 branch as of r44822. I have changed the dependencies
>> in carbon-platform which were referring to the older Rampart version.
>>
>> So before you build, update of carbon-platform/rampart and build it. You
>> have to endorse the default JAXP implementation in your JDK to get the
>> Rampart tests passed using Xerces and Xalan. For convenience, I have
>> uploaded the jars required for endorsing JAXP implementation here [1].
>> Download this zip archive and extract it. Then it will be extracted to
>> directory named "endorsed". Then copy that directory to $JAVA_HOME/jre/lib.
>>
>> Hiranya/Lahiru, please note the above step. It is required to do this
>> endorsement in the builder machine as well.
>>
>> Thanks.
>> / thilina
>>
>> [1] - 
>> http://builder.wso2.org/~carbon/thilina/endorsed.zip<http://builder.wso2.org/~carbon/thilina/endorsed.zip>
>>
>>
>>
>> Thilina Mahesh Buddhika
>> WSO2 Inc. ; http://wso2.com
>> [email protected]
>>
>> _______________________________________________
>> Carbon-dev mailing list
>> [email protected]
>> https://mail.wso2.org/cgi-bin/mailman/listinfo/carbon-dev
>>
>>
>
>
> --
> Lahiru Gunathilake
> Software Engineer - WSO2 Inc.
>
> _______________________________________________
> Carbon-dev mailing list
> [email protected]
> https://mail.wso2.org/cgi-bin/mailman/listinfo/carbon-dev
>
>


-- 
Thilina Mahesh Buddhika
WSO2 Inc. ; http://wso2.com
http://blog.thilinamb.com
_______________________________________________
Carbon-dev mailing list
[email protected]
https://mail.wso2.org/cgi-bin/mailman/listinfo/carbon-dev

Reply via email to