Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

jdk_security3_0 sun/security/ssl/SSLSocketImpl/SocketExceptionForSocketIssues.java BadPaddingException: Insufficient buffer remaining for AEAD cipher fragment (2). Needs to be more than tag size (16) #20991

Open
JasonFengJ9 opened this issue Jan 21, 2025 · 0 comments

Comments

@JasonFengJ9
Copy link
Member

Failure link

From internal Test_openjdk17_j9_extended.openjdk_s390x_linux_testList_0 (rhel8s390x-svl-rt7-1)

java version "17.0.14-beta" 2025-01-21
IBM Semeru Runtime Certified Edition 17.0.14+6-202501181531 (build 17.0.14-beta+6-202501181531)
Eclipse OpenJ9 VM 17.0.14+6-202501181531 (build master-c1949d7088, JRE 17 Linux s390x-64-Bit Compressed References 20250118_879 (JIT enabled, AOT enabled)
OpenJ9   - c1949d7088
OMR      - 6bfb20f78
JCL      - 18a0766619 based on jdk-17.0.14+6)

Rerun in Grinder - Change TARGET to run only the failed test targets

Optional info

Failure output (captured from console output)

[2025-01-18T16:25:47.856Z] variation: Mode150
[2025-01-18T16:25:47.856Z] JVM_OPTIONS:  -XX:+UseCompressedOops -Xverbosegclog 

[2025-01-18T16:48:07.119Z] TEST: sun/security/ssl/SSLSocketImpl/SocketExceptionForSocketIssues.java

[2025-01-18T16:48:07.120Z] STDERR:
[2025-01-18T16:48:07.120Z] javax.net.ssl.SSLHandshakeException: Insufficient buffer remaining for AEAD cipher fragment (2). Needs to be more than tag size (16)
[2025-01-18T16:48:07.120Z] 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
[2025-01-18T16:48:07.120Z] 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:383)
[2025-01-18T16:48:07.120Z] 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:326)
[2025-01-18T16:48:07.120Z] 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:321)
[2025-01-18T16:48:07.120Z] 	at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:134)
[2025-01-18T16:48:07.120Z] 	at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1510)
[2025-01-18T16:48:07.120Z] 	at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1425)
[2025-01-18T16:48:07.120Z] 	at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:455)
[2025-01-18T16:48:07.120Z] 	at java.base/sun.security.ssl.SSLSocketImpl.ensureNegotiated(SSLSocketImpl.java:925)
[2025-01-18T16:48:07.120Z] 	at java.base/sun.security.ssl.SSLSocketImpl$AppOutputStream.write(SSLSocketImpl.java:1295)
[2025-01-18T16:48:07.120Z] 	at java.base/sun.nio.cs.StreamEncoder.writeBytes(StreamEncoder.java:234)
[2025-01-18T16:48:07.120Z] 	at java.base/sun.nio.cs.StreamEncoder.implFlushBuffer(StreamEncoder.java:313)
[2025-01-18T16:48:07.120Z] 	at java.base/sun.nio.cs.StreamEncoder.implFlush(StreamEncoder.java:318)
[2025-01-18T16:48:07.120Z] 	at java.base/sun.nio.cs.StreamEncoder.flush(StreamEncoder.java:160)
[2025-01-18T16:48:07.120Z] 	at java.base/java.io.OutputStreamWriter.flush(OutputStreamWriter.java:248)
[2025-01-18T16:48:07.120Z] 	at java.base/java.io.BufferedWriter.flush(BufferedWriter.java:257)
[2025-01-18T16:48:07.120Z] 	at SocketExceptionForSocketIssues.runServerApplication(SocketExceptionForSocketIssues.java:72)
[2025-01-18T16:48:07.120Z] 	at SSLSocketTemplate.doServerSide(SSLSocketTemplate.java:223)
[2025-01-18T16:48:07.120Z] 	at SSLSocketTemplate.startServer(SSLSocketTemplate.java:427)
[2025-01-18T16:48:07.120Z] 	at SSLSocketTemplate.bootup(SSLSocketTemplate.java:341)
[2025-01-18T16:48:07.120Z] 	at SSLSocketTemplate.run(SSLSocketTemplate.java:73)
[2025-01-18T16:48:07.120Z] 	at SocketExceptionForSocketIssues.main(SocketExceptionForSocketIssues.java:49)
[2025-01-18T16:48:07.120Z] 	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
[2025-01-18T16:48:07.120Z] 	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
[2025-01-18T16:48:07.120Z] 	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
[2025-01-18T16:48:07.120Z] 	at java.base/java.lang.reflect.Method.invoke(Method.java:575)
[2025-01-18T16:48:07.120Z] 	at com.sun.javatest.regtest.agent.MainWrapper$MainTask.run(MainWrapper.java:138)
[2025-01-18T16:48:07.120Z] 	at java.base/java.lang.Thread.run(Thread.java:853)
[2025-01-18T16:48:07.120Z] Caused by: javax.crypto.BadPaddingException: Insufficient buffer remaining for AEAD cipher fragment (2). Needs to be more than tag size (16)
[2025-01-18T16:48:07.120Z] 	at java.base/sun.security.ssl.SSLCipher$T13GcmReadCipherGenerator$GcmReadCipher.decrypt(SSLCipher.java:1898)
[2025-01-18T16:48:07.120Z] 	at java.base/sun.security.ssl.SSLSocketInputRecord.decodeInputRecord(SSLSocketInputRecord.java:264)
[2025-01-18T16:48:07.120Z] 	at java.base/sun.security.ssl.SSLSocketInputRecord.decode(SSLSocketInputRecord.java:181)
[2025-01-18T16:48:07.120Z] 	at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:111)
[2025-01-18T16:48:07.120Z] 	... 23 more

[2025-01-18T18:17:13.250Z] jdk_security3_0_FAILED

50x internal Grinder

FYI @jasonkatonica

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants