Bug in 'sun.security.provider.MD5'

I have created a non-blocking server and a blocking client using NIO and SSLEngine.
I have put the two in an endless read/write loop, i.e
- the client writes to the server
- the server reads
- the server writes to the client
- the client reads
and so on...
Everything works fine for a while, the "while" being almost constant, the I get the following exception:
Exception in thread "Thread-0" java.lang.StackOverflowError
        at sun.security.provider.MD5.implCompress(MD5.java:129)
        at sun.security.provider.MD5.implDigest(MD5.java:92)
        at sun.security.provider.DigestBase.engineDigest(DigestBase.java:169)
        at sun.security.provider.DigestBase.engineDigest(DigestBase.java:148)
        at java.security.MessageDigest$Delegate.engineDigest(MessageDigest.java:545)
        at java.security.MessageDigest.digest(MessageDigest.java:323)
        at com.sun.crypto.provider.HmacCore.b(DashoA13*..)
        at com.sun.crypto.provider.HmacMD5.engineDoFinal(DashoA13*..)
        at javax.crypto.Mac.doFinal(DashoA13*..)
        at com.sun.net.ssl.internal.ssl.MAC.compute(MAC.java:172)
        at com.sun.net.ssl.internal.ssl.MAC.compute(MAC.java:136)
        at com.sun.net.ssl.internal.ssl.EngineInputRecord.checkMAC(EngineInputRecord.java:193)
        at com.sun.net.ssl.internal.ssl.SSLEngineImpl.readRecord(SSLEngineImpl.java:881)
        at com.sun.net.ssl.internal.ssl.SSLEngineImpl.readNetRecord(SSLEngineImpl.java:791)
        at com.sun.net.ssl.internal.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:667)
        at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:607)
        at pt.jmdsc.coms.SSLChannel.read(SSLChannel.java:126)This seems to be a bug in the MD5 class of the provider, has anyone come across the same issue?

Yip I did shorten the post, the last 4 lines below keep repeating
Exception in thread "Thread-0" java.lang.StackOverflowError
        at sun.security.provider.MD5.implCompress(MD5.java:129)
        at sun.security.provider.DigestBase.engineUpdate(DigestBase.java:116)
        at java.security.MessageDigestSpi.engineUpdate(MessageDigestSpi.java:97)
        at java.security.MessageDigest$Delegate.engineUpdate(MessageDigest.java:541)
        at java.security.MessageDigest.update(MessageDigest.java:311)
        at com.sun.crypto.provider.HmacCore.a(DashoA13*..)
        at com.sun.crypto.provider.HmacMD5.engineUpdate(DashoA13*..)
        at javax.crypto.Mac.update(DashoA13*..)
        at com.sun.net.ssl.internal.ssl.MAC.compute(MAC.java:167)
        at com.sun.net.ssl.internal.ssl.MAC.compute(MAC.java:136)
        at com.sun.net.ssl.internal.ssl.EngineInputRecord.checkMAC(EngineInputRecord.java:193)
        at com.sun.net.ssl.internal.ssl.SSLEngineImpl.readRecord(SSLEngineImpl.java:881)
        at com.sun.net.ssl.internal.ssl.SSLEngineImpl.readNetRecord(SSLEngineImpl.java:791)
        at com.sun.net.ssl.internal.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:667)
        at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:607)
        at pt.jmdsc.coms.SSLChannel.read(SSLChannel.java:126)
        at pt.jmdsc.coms.Client.read(Client.java:92)
        at pt.jmdsc.coms.Client.write(Client.java:85)
        at pt.jmdsc.coms.Client.read(Client.java:92)
        at pt.jmdsc.coms.Client.write(Client.java:85)
        ....

Similar Messages

  • Error "java.lang.NoClassDefFoundError: sun/security/provider/Sun" in 10.1.2

    Hi,
    I developed an ADF UIX application in JDeveloper 10.1.2. It works fine when I run on embedded oc4j in my machine.
    I deployed it to Oracle Application Server 10g in AIX. When I run the application from the Application Server and try to open a uix page with data I get the following error:
    500 Internal Server Error
    java.lang.NoClassDefFoundError: sun/security/provider/Sun     at oracle.jbo.common.ampool.PoolMgr.createPool(PoolMgr.java:280)     at oracle.jbo.common.ampool.PoolMgr.findPool(PoolMgr.java:482)     at oracle.jbo.common.ampool.ContextPoolManager.findPool(ContextPoolManager.java:165)     at oracle.adf.model.bc4j.DataControlFactoryImpl.findOrCreateSessionCookie(DataControlFactoryImpl.java(Compiled Code))     at oracle.adf.model.bc4j.DataControlFactoryImpl.createSession(DataControlFactoryImpl.java(Compiled Code))     at oracle.adf.model.binding.DCDataControlReference.getDataControl(DCDataControlReference.java(Compiled Code))     at oracle.adf.model.BindingContext.get(BindingContext.java(Compiled Code))     at oracle.adf.model.binding.DCUtil.findSpelObject(DCUtil.java:228)     at oracle.adf.model.binding.DCUtil.findContextObject(DCUtil.java:308)     at oracle.adf.model.binding.DCIteratorBinding.<init>(DCIteratorBinding.java:127)     at oracle.jbo.uicli.binding.JUIteratorBinding.<init>(JUIteratorBinding.java:59)     at oracle.jbo.uicli.binding.JUIteratorDef.createIterBinding(JUIteratorDef.java:58)     at oracle.jbo.uicli.binding.JUIteratorDef.createIterBinding(JUIteratorDef.java:47)     at oracle.adf.model.binding.DCBindingContainerDef.createIterBindings(DCBindingContainerDef.java(Compiled Code))     at oracle.adf.model.binding.DCBindingContainerDef.createBindingContainer(DCBindingContainerDef.java(Compiled Code))     at oracle.adf.model.binding.DCBindingContainerReference.getBindingContainer(DCBindingContainerReference.java(Inlined Compiled Code))     at oracle.adf.model.BindingContext.get(BindingContext.java(Compiled Code))     at oracle.adf.model.binding.DCUtil.findSpelObject(DCUtil.java:228)     at oracle.adf.model.binding.DCUtil.findContextObject(DCUtil.java:308)     at oracle.adf.model.binding.DCUtil.findBindingContainer(DCUtil.java:536)     at oracle.adf.controller.lifecycle.LifecycleContext.initialize(LifecycleContext.java:121)     at oracle.adf.controller.lifecycle.LifecycleContext.initialize(LifecycleContext.java:77)     at oracle.adf.controller.struts.actions.DataActionContext.initialize(DataActionContext.java:51)     at oracle.adf.controller.struts.actions.DataAction.execute(DataAction.java:150)     at org.apache.struts.action.RequestProcessor.processActionPerform(RequestProcessor.java:484)     at org.apache.struts.action.RequestProcessor.process(RequestProcessor.java:274)     at org.apache.struts.action.ActionServlet.process(ActionServlet.java:1482)     at org.apache.struts.action.ActionServlet.doGet(ActionServlet.java:507)     at javax.servlet.http.HttpServlet.service(HttpServlet.java(Compiled Code))     at javax.servlet.http.HttpServlet.service(HttpServlet.java(Compiled Code))     at com.evermind[Oracle Application Server Containers for J2EE 10g (10.1.2.0.2)].server.http.ResourceFilterChain.doFilter(ResourceFilterChain.java(Compiled Code))     at oracle.adf.model.servlet.ADFBindingFilter.doFilter(ADFBindingFilter.java(Compiled Code))     at com.evermind[Oracle Application Server Containers for J2EE 10g (10.1.2.0.2)].server.http.ServletRequestDispatcher.invoke(ServletRequestDispatcher.java(Compiled Code))     at com.evermind[Oracle Application Server Containers for J2EE 10g (10.1.2.0.2)].server.http.ServletRequestDispatcher.forwardInternal(ServletRequestDispatcher.java(Compiled Code))     at com.evermind[Oracle Application Server Containers for J2EE 10g (10.1.2.0.2)].server.http.HttpRequestHandler.processRequest(HttpRequestHandler.java(Compiled Code))     at com.evermind[Oracle Application Server Containers for J2EE 10g (10.1.2.0.2)].server.http.AJPRequestHandler.run(AJPRequestHandler.java(Compiled Code))     at com.evermind[Oracle Application Server Containers for J2EE 10g (10.1.2.0.2)].server.http.AJPRequestHandler.run(AJPRequestHandler.java(Compiled Code))     at com.evermind[Oracle Application Server Containers for J2EE 10g (10.1.2.0.2)].util.ReleasableResourcePooledExecutor$MyWorker.run(ReleasableResourcePooledExecutor.java(Compiled Code))     at java.lang.Thread.run(Thread.java:568)
    Can anybody tell/help why I am getting this error?
    Thanks
    Syed

    I believe this counts to be a bug in adf. I met with such errors as well in migration 1012 from NT to AIX platform, and after decompiling adf jar code and tak a look at it, the following code block indicates that In class- oracle.jbo.client.Configuration
    , it is hard coded to get secure provider- sun/security/provider/Sun, as listed below...
    import sun.security.provider.Sun;
    static void checkSecurityProviders()
    Provider aprovider[] = Security.getProviders();
    boolean flag = false;
    for(int i = 0; i < aprovider.length; i++)
    if(!aprovider.getName().equals("SUN"))
    continue;
    flag = true;
    break;
    if(!flag)
    try
    Sun sun = new Sun();
    Security.addProvider(sun);
    catch(Exception exception)
    exception.printStackTrace();
    Adam

  • JCE requires: java.lang.RuntimePermission requires accessClassInPackage.sun.security.provider

    I'm trying to use the JCE with JWS1.0.2. All I want to do is generate a KeyPair and I can NOT use a signed application. The code is:
    public static KeyPair genDHKeyPair() throws Exception {
    // properties...
    DHParameterSpec dhSkipParamSpec;
    dhSkipParamSpec = new      DHParameterSpec(skip1024Modulus, skip1024Base);
    KeyPairGenerator keyPairGenerator = KeyPairGenerator.getInstance("DH");
    keyPairGenerator.initialize(dhSkipParamSpec);
    KeyPair keyPair = keyPairGenerator.generateKeyPair();
    return keyPair;
    I'm using JDK1.4. This code works fine outside of JWS.
    If I call this code I get an exception that states I need the stated RuntimePermission. IMHO this is a bug because I should be able to make use of simple standard extension methods like this. Is getting an instance of a KeyPairGenerator and generating a key pair a security risk?
    The fix for this should be a simple addition to the security policy for JWS which gives SUN javax.crypto code access to the appropriate RuntimePermission.
    Can anyone think of a reason why NOT to do this?
    Thank you.
    BTW, here's the Exception you would get if you tried this:
    java.security.AccessControlException: access denied (java.lang.RuntimePermission accessClassInPackage.sun.security.provider)
         at java.security.AccessControlContext.checkPermission(AccessControlContext.java:270)
         at java.security.AccessController.checkPermission(AccessController.java:401)
         at java.lang.SecurityManager.checkPermission(SecurityManager.java:542)
         at java.lang.SecurityManager.checkPackageAccess(SecurityManager.java:1513)
         at sun.misc.Launcher$AppClassLoader.loadClass(Launcher.java:262)
         at java.lang.ClassLoader.loadClass(ClassLoader.java:299)
         at java.lang.ClassLoader.loadClass(ClassLoader.java:262)
         at java.lang.ClassLoader.loadClassInternal(ClassLoader.java:322)
         at com.wss.calendar.client.swing.Main.main(Main.java:47)
         at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
         at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
         at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
         at java.lang.reflect.Method.invoke(Method.java:324)
         at com.sun.javaws.Launcher.executeApplication(Launcher.java:739)
         at com.sun.javaws.Launcher.executeMainClass(Launcher.java:701)
         at com.sun.javaws.Launcher.continueLaunch(Launcher.java:584)
         at com.sun.javaws.Launcher.handleApplicationDesc(Launcher.java:328)
         at com.sun.javaws.Launcher.handleLaunchFile(Launcher.java:166)
         at com.sun.javaws.Launcher.run(Launcher.java:134)
         at java.lang.Thread.run(Thread.java:536)

    hi there,
    Please I have the same problem in an applet that uses DSA with the following call:
    pkey = (PublicKey) new DSAPublicKey(server_pub_key);
    The Exception i am having on the console is
    java.security.AccessControlException: access denied (java.lang.RuntimePermission accessClassInPackage.sun.security.provider)
    Note that I am NOT using JCE and that both netscape and IE browsers gave this error
    Can somebody help me please?
    Thanks in advance,
    JPDib

  • Problem in loading OPSS security provider: Cannot read from policy store  Error getting while starting weblogic server

    [JavaPolicyProvider]: System Property [java.vendor => Sun Microsystems Inc.]
    [JavaPolicyProvider]: System Property [oracle.deployed.app.ext => \-]
    [JavaPolicyProvider]: System Property [sun.java.launcher => SUN_STANDARD]
    [JavaPolicyProvider]: System Property [sun.management.compiler => HotSpot Client Compiler]
    [JavaPolicyProvider]: System Property [java.security.debug => jpspolicy]
    [JavaPolicyProvider]: System Property [oracle.core.ojdl.logging.usercontextprovider => oracle.core.ojdl.logging.impl.UserContextImpl]
    [JavaPolicyProvider]: System Property [os.name => Windows 7]
    [JavaPolicyProvider]: System Property [sun.boot.class.path => D:\ORACLE~1.6_M\JDK160~1\jre\lib\resources.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\rt.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\sunrsasign.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\jsse.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\jce.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\charsets.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\modules\jdk.boot.jar;D:\ORACLE~1.6_M\JDK160~1\jre\classes]
    [JavaPolicyProvider]: System Property [sun.desktop => windows]
    [JavaPolicyProvider]: System Property [java.vm.specification.vendor => Sun Microsystems Inc.]
    [JavaPolicyProvider]: System Property [java.runtime.version => 1.6.0_24-b50]
    [JavaPolicyProvider]: System Property [igf.arisidbeans.carmlloc => D:\JDevSys\SYSTEM~1.92_\DEFAUL~1\config\FMWCON~1\carml]
    [JavaPolicyProvider]: System Property [oracle.domain.config.dir => D:\JDevSys\SYSTEM~1.92_\DEFAUL~1\config\FMWCON~1]
    [JavaPolicyProvider]: System Property [weblogic.Name => DefaultServer]
    [JavaPolicyProvider]: System Property [user.name => SudhanshuG]
    [JavaPolicyProvider]: System Property [DebugOPSSPolicyLoading => true]
    [JavaPolicyProvider]: System Property [java.naming.factory.initial => weblogic.jndi.WLInitialContextFactory]
    [JavaPolicyProvider]: System Property [user.language => en]
    [JavaPolicyProvider]: System Property [jrockit.optfile => D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.jrf_11.1.1\jrocket_optfile.txt]
    [JavaPolicyProvider]: System Property [sun.boot.library.path => D:\ORACLE~1.6_M\JDK160~1\jre\bin]
    [JavaPolicyProvider]: System Property [domain.home => D:\JDevSys\SYSTEM~1.92\DEFAUL~1]
    [JavaPolicyProvider]: System Property [igf.arisidstack.home => D:\JDevSys\SYSTEM~1.92_\DEFAUL~1\config\FMWCON~1\arisidprovider]
    [JavaPolicyProvider]: System Property [wlw.testConsole => ]
    [JavaPolicyProvider]: System Property [wlw.iterativeDev => ]
    [JavaPolicyProvider]: System Property [jps.combiner.optimize => true]
    [JavaPolicyProvider]: System Property [jps.auth => ACC]
    [JavaPolicyProvider]: System Property [java.version => 1.6.0_24]
    [JavaPolicyProvider]: System Property [user.timezone => Asia/Calcutta]
    [JavaPolicyProvider]: System Property [sun.arch.data.model => 32]
    [JavaPolicyProvider]: System Property [javax.rmi.CORBA.UtilClass => weblogic.iiop.UtilDelegateImpl]
    [JavaPolicyProvider]: System Property [java.endorsed.dirs => D:\ORACLE~1.6_M\JDK160~1\jre\lib\endorsed]
    [JavaPolicyProvider]: System Property [vde.home => D:\JDevSys\system11.1.1.6.38.61.92\DefaultDomain\servers\DefaultServer\data\ldap]
    [JavaPolicyProvider]: System Property [jps.combiner.optimize.lazyeval => true]
    [JavaPolicyProvider]: System Property [sun.cpu.isalist => pentium_pro+mmx pentium_pro pentium+mmx pentium i486 i386 i86]
    [JavaPolicyProvider]: System Property [sun.jnu.encoding => Cp1252]
    [JavaPolicyProvider]: System Property [file.encoding.pkg => sun.io]
    [JavaPolicyProvider]: System Property [wlw.logErrorsToConsole => ]
    [JavaPolicyProvider]: System Property [file.separator => \]
    [JavaPolicyProvider]: System Property [java.specification.name => Java Platform API Specification]
    [JavaPolicyProvider]: System Property [java.class.version => 50.0]
    [JavaPolicyProvider]: System Property [weblogic.home => D:\ORACLE~1.6_M\WLSERV~1.3\server]
    [JavaPolicyProvider]: System Property [user.country => IN]
    [JavaPolicyProvider]: System Property [java.home => D:\ORACLE~1.6_M\JDK160~1\jre]
    [JavaPolicyProvider]: System Property [platform.home => D:\ORACLE~1.6_M\WLSERV~1.3]
    [JavaPolicyProvider]: System Property [java.vm.info => mixed mode]
    [JavaPolicyProvider]: System Property [os.version => 6.1]
    [JavaPolicyProvider]: System Property [org.omg.CORBA.ORBSingletonClass => weblogic.corba.orb.ORB]
    [JavaPolicyProvider]: System Property [path.separator => ;]
    [JavaPolicyProvider]: System Property [java.vm.version => 19.1-b02]
    [JavaPolicyProvider]: System Property [weblogic.alternateTypesDirectory => D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.ossoiap_11.1.1,D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.oamprovider_11.1.1]
    [JavaPolicyProvider]: System Property [user.variant => ]
    [JavaPolicyProvider]: System Property [java.protocol.handler.pkgs => oracle.mds.net.protocol|weblogic.net]
    [JavaPolicyProvider]: System Property [oracle.deployed.app.dir => D:\JDevSys\SYSTEM~1.92\DEFAUL~1\servers\DefaultServer\tmp\_WL_user]
    [JavaPolicyProvider]: System Property [wc.oracle.home => D:\Oracle_Jdev11.1.1.6_Middleware_Home\jdeveloper]
    [JavaPolicyProvider]: System Property [java.awt.printerjob => sun.awt.windows.WPrinterJob]
    [JavaPolicyProvider]: System Property [java.security.policy => D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\weblogic.policy]
    [JavaPolicyProvider]: System Property [sun.io.unicode.encoding => UnicodeLittle]
    [JavaPolicyProvider]: System Property [awt.toolkit => sun.awt.windows.WToolkit]
    [JavaPolicyProvider]: System Property [weblogic.jdbc.remoteEnabled => false]
    [JavaPolicyProvider]: System Property [weblogic.nodemanager.ServiceEnabled => true]
    [JavaPolicyProvider]: System Property [java.naming.factory.url.pkgs => weblogic.jndi.factories:weblogic.corba.j2ee.naming.url:weblogic.jndi.factories:weblogic.corba.j2ee.naming.url]
    [JavaPolicyProvider]: System Property [oracle.webcenter.tagging.scopeTags => false]
    [JavaPolicyProvider]: System Property [user.home => C:\Users\SudhanshuG]
    [JavaPolicyProvider]: System Property [wls.home => D:\ORACLE~1.6_M\WLSERV~1.3\server]
    [JavaPolicyProvider]: System Property [java.specification.vendor => Sun Microsystems Inc.]
    [JavaPolicyProvider]: System Property [oracle.server.config.dir => D:\JDevSys\SYSTEM~1.92_\DEFAUL~1\config\FMWCON~1\servers\DefaultServer]
    [JavaPolicyProvider]: System Property [java.library.path => D:\ORACLE~1.6_M\JDK160~1\bin;.;C:\Windows\Sun\Java\bin;C:\Windows\system32;C:\Windows;D:\ORACLE~1.6_M\patch_wls1035\profiles\default\native;D:\ORACLE~1.6_M\patch_jdev1111\profiles\default\native;D:\ORACLE~1.6_M\WLSERV~1.3\server\native\win\32;D:\ORACLE~1.6_M\WLSERV~1.3\server\bin;D:\ORACLE~1.6_M\modules\ORGAPA~1.1\bin;D:\ORACLE~1.6_M\JDK160~1\jre\bin;D:\ORACLE~1.6_M\JDK160~1\bin;D:\oraclexe\app\oracle\product\10.2.0\server\bin;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Program Files\TortoiseSVN\bin;D:\ORACLE~1.6_M\WLSERV~1.3\server\native\win\32\oci920_8]
    [JavaPolicyProvider]: System Property [java.vendor.url => http://java.sun.com/]
    [JavaPolicyProvider]: System Property [jps.policystore.hybrid.mode => false]
    [JavaPolicyProvider]: System Property [USE_JAAS => false]
    [JavaPolicyProvider]: System Property [java.vm.vendor => Sun Microsystems Inc.]
    [JavaPolicyProvider]: System Property [java.runtime.name => Java(TM) SE Runtime Environment]
    [JavaPolicyProvider]: System Property [java.class.path => D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.jdbc_11.1.1\ojdbc6dms.jar;D:\ORACLE~1.6_M\patch_wls1035\profiles\default\sys_manifest_classpath\weblogic_patch.jar;D:\ORACLE~1.6_M\patch_jdev1111\profiles\default\sys_manifest_classpath\weblogic_patch.jar;D:\ORACLE~1.6_M\JDK160~1\lib\tools.jar;D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\weblogic_sp.jar;D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\weblogic.jar;D:\ORACLE~1.6_M\modules\features\weblogic.server.modules_10.3.5.0.jar;D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\webservices.jar;D:\ORACLE~1.6_M\modules\ORGAPA~1.1/lib/ant-all.jar;D:\ORACLE~1.6_M\modules\NETSFA~1.0_1/lib/ant-contrib.jar;D:\JDevSys\SYSTEM~1.92\DEFAUL~1\wcps-lib\derby-10.6.1.0.jar;D:\JDevSys\SYSTEM~1.92\DEFAUL~1\wcps-lib\derbytools-10.6.1.0.jar;D:\Oracle_Jdev11.1.1.6_Middleware_Home\jdeveloper\webcenter\modules\oracle.portlet.server_11.1.1\oracle-portlet-api.jar;D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.jrf_11.1.1\jrf.jar;D:\Oracle_Jdev11.1.1.6_Middleware_Home\jdeveloper\webcenter\modules\wcps_11.1.1.4.0\wcps-connection-mbeans.jar;D:\ORACLE~1.6_M\WLSERV~1.3\common\derby\lib\derbyclient.jar;D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\xqrl.jar]
    [JavaPolicyProvider]: System Property [oracle.security.jps.config => D:\JDevSys\SYSTEM~1.92\DEFAUL~1\config\fmwconfig\jps-config.xml]
    [JavaPolicyProvider]: System Property [java.vm.specification.name => Java Virtual Machine Specification]
    [JavaPolicyProvider]: System Property [javax.rmi.CORBA.PortableRemoteObjectClass => weblogic.iiop.PortableRemoteObjectDelegateImpl]
    [JavaPolicyProvider]: System Property [java.vm.specification.version => 1.0]
    [JavaPolicyProvider]: System Property [sun.cpu.endian => little]
    [JavaPolicyProvider]: System Property [sun.os.patch.level => Service Pack 1]
    [JavaPolicyProvider]: System Property [portlet.oracle.home => D:\Oracle_Jdev11.1.1.6_Middleware_Home\jdeveloper]
    [JavaPolicyProvider]: System Property [java.io.tmpdir => C:\Users\SUDHAN~1\AppData\Local\Temp\]
    [JavaPolicyProvider]: System Property [jrf.version => 11.1.1]
    [JavaPolicyProvider]: System Property [oracle.webcenter.analytics.disable-native-partitioning => false]
    [JavaPolicyProvider]: System Property [java.vendor.url.bug => http://java.sun.com/cgi-bin/bugreport.cgi]
    [JavaPolicyProvider]: System Property [jps.app.credential.overwrite.allowed => true]
    [JavaPolicyProvider]: System Property [os.arch => x86]
    [JavaPolicyProvider]: System Property [java.awt.graphicsenv => sun.awt.Win32GraphicsEnvironment]
    [JavaPolicyProvider]: System Property [java.ext.dirs => D:\ORACLE~1.6_M\JDK160~1\jre\lib\ext;C:\Windows\Sun\Java\lib\ext]
    [JavaPolicyProvider]: System Property [user.dir => D:\JDevSys\system11.1.1.6.38.61.92\DefaultDomain]
    [JavaPolicyProvider]: System Property [common.components.home => D:\ORACLE~1.6_M\ORACLE~1]
    [JavaPolicyProvider]: System Property [weblogic.ext.dirs => D:\ORACLE~1.6_M\patch_wls1035\profiles\default\sysext_manifest_classpath;D:\ORACLE~1.6_M\patch_jdev1111\profiles\default\sysext_manifest_classpath]
    [JavaPolicyProvider]: System Property [wsm.repository.path => D:\JDevSys\SYSTEM~1.92\DEFAUL~1\oracle\store\gmds]
    [JavaPolicyProvider]: System Property [line.separator =>
    [JavaPolicyProvider]: System Property [java.vm.name => Java HotSpot(TM) Client VM]
    [JavaPolicyProvider]: System Property [org.apache.commons.logging.Log => org.apache.commons.logging.impl.Jdk14Logger]
    [JavaPolicyProvider]: System Property [weblogic.management.discover => true]
    [JavaPolicyProvider]: System Property [org.omg.CORBA.ORBClass => weblogic.corba.orb.ORB]
    [JavaPolicyProvider]: System Property [file.encoding => Cp1252]
    [JavaPolicyProvider]: System Property [weblogic.classloader.preprocessor => weblogic.diagnostics.instrumentation.DiagnosticClassPreProcessor]
    [JavaPolicyProvider]: System Property [java.specification.version => 1.6]
    [JavaPolicyProvider]: System Property [javax.net.ssl.trustStore => D:\Oracle_Jdev11.1.1.6_Middleware_Home\wlserver_10.3\server\lib\DemoTrust.jks]
    policy: reading file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/lib/weblogic.policy
    java.lang.IllegalArgumentException: null KeyStore name
        at sun.security.util.PolicyUtil.getKeyStore(PolicyUtil.java:65)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:635)
        at sun.security.provider.PolicyFile.access$400(PolicyFile.java:266)
        at sun.security.provider.PolicyFile$3.run(PolicyFile.java:546)
        at java.security.AccessController.doPrivileged(Native Method)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:519)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:505)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:464)
        at sun.security.provider.PolicyFile.<init>(PolicyFile.java:309)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at java.security.Policy.getPolicyNoCheck(Policy.java:167)
        at java.security.ProtectionDomain.implies(ProtectionDomain.java:224)
        at java.security.AccessControlContext.checkPermission(AccessControlContext.java:352)
        at java.security.AccessController.checkPermission(AccessController.java:546)
        at oracle.security.jps.util.JpsAuth$AuthorizationMechanism$3.checkPermission(JpsAuth.java:458)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:518)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:544)
        at oracle.security.jps.internal.credstore.util.CsfUtil.checkPermission(CsfUtil.java:643)
        at oracle.security.jps.internal.credstore.ssp.SspCredentialStore.containsCredential(SspCredentialStore.java:320)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:176)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:174)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.CsContainsHash(FileKeyStoreIntegrityChecker.java:174)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.<init>(FileKeyStoreIntegrityChecker.java:81)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.<init>(FileKeyStoreManager.java:165)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.getInstance(FileKeyStoreManager.java:146)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.doInit(FileKeyStoreServiceImpl.java:95)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:76)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:66)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:157)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:64)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.findServiceInstance(ContextFactoryImpl.java:139)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:170)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:191)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:132)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:127)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2827)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2821)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.policystore.PolicyUtil.getDefaultPDPService(PolicyUtil.java:2821)
        at oracle.security.jps.internal.policystore.PolicyUtil.getPDPService(PolicyUtil.java:3097)
        at oracle.security.jps.internal.policystore.PolicyDelegationController.<init>(PolicyDelegationController.java:164)
        at oracle.security.jps.internal.policystore.JavaPolicyProvider.<init>(JavaPolicyProvider.java:369)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.loadOPSSPolicy(CommonSecurityServiceManagerDelegateImpl.java:1339)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.initialize(CommonSecurityServiceManagerDelegateImpl.java:1018)
        at weblogic.security.service.SecurityServiceManager.initialize(SecurityServiceManager.java:873)
        at weblogic.security.SecurityService.start(SecurityService.java:141)
        at weblogic.t3.srvr.SubsystemRequest.run(SubsystemRequest.java:64)
        at weblogic.work.ExecuteThread.execute(ExecuteThread.java:209)
        at weblogic.work.ExecuteThread.run(ExecuteThread.java:178)
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/lib/-
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/../modules/-
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/ext/-
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/ORACLE~1.6_M/patch_wls1035/profiles/default/sysext_manifest_classpath%3bD:/ORACLE~1.6_M/patch_jdev1111/profiles/default/sysext_manifest_classpath/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/eval/pointbase/lib/-
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/ORACLE~1.6_M/ORACLE~1/modules/oracle.jps_11.1.1/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/ORACLE~1.6_M/ORACLE~1/modules/oracle.pki_11.1.1/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/weblogic/application/defaults/EJB
    policy:   (java.lang.RuntimePermission queuePrintJob)
    policy:   (java.net.SocketPermission * connect,resolve)
    policy:   (java.util.PropertyPermission * read)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\- read)
    policy:   (java.lang.management.ManagementPermission control)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/weblogic/application/defaults/Web
    policy:   (java.lang.RuntimePermission loadLibrary)
    policy:   (java.lang.RuntimePermission queuePrintJob)
    policy:   (java.net.SocketPermission * connect,resolve)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\- read,write)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\..\- read)
    policy:   (java.util.PropertyPermission * read)
    policy:   (java.lang.management.ManagementPermission control)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/weblogic/application/defaults/Connector
    policy:   (java.net.SocketPermission * connect,resolve)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\- read,write)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\..\- read)
    policy:   (java.util.PropertyPermission * read)
    policy:   (java.lang.management.ManagementPermission control)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/D:/ORACLE~1.6_M/JDK160~1/jre/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/C:/Windows/Sun/Java/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/ORACLE~1.6_M/JDK160~1/jre/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSGroupImpl/Administrators
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSGroupImpl/Deployers
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSGroupImpl/Operators
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSGroupImpl/Monitors
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSKernelIdentity/*
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   (java.util.PropertyPermission java.version read)
    policy:   (java.util.PropertyPermission java.vendor read)
    policy:   (java.util.PropertyPermission java.vendor.url read)
    policy:   (java.util.PropertyPermission java.class.version read)
    policy:   (java.util.PropertyPermission os.name read)
    policy:   (java.util.PropertyPermission os.version read)
    policy:   (java.util.PropertyPermission os.arch read)
    policy:   (java.util.PropertyPermission file.separator read)
    policy:   (java.util.PropertyPermission path.separator read)
    policy:   (java.util.PropertyPermission line.separator read)
    policy:   (java.util.PropertyPermission java.specification.version read)
    policy:   (java.util.PropertyPermission java.specification.vendor read)
    policy:   (java.util.PropertyPermission java.specification.name read)
    policy:   (java.util.PropertyPermission java.vm.specification.version read)
    policy:   (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   (java.util.PropertyPermission java.vm.specification.name read)
    policy:   (java.util.PropertyPermission java.vm.version read)
    policy:   (java.util.PropertyPermission java.vm.vendor read)
    policy:   (java.util.PropertyPermission java.vm.name read)
    policy:
    policy: reading file:/D:/ORACLE~1.6_M/JDK160~1/jre/lib/security/java.policy
    java.lang.IllegalArgumentException: null KeyStore name
        at sun.security.util.PolicyUtil.getKeyStore(PolicyUtil.java:65)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:635)
        at sun.security.provider.PolicyFile.access$400(PolicyFile.java:266)
        at sun.security.provider.PolicyFile$3.run(PolicyFile.java:587)
        at java.security.AccessController.doPrivileged(Native Method)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:519)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:505)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:464)
        at sun.security.provider.PolicyFile.<init>(PolicyFile.java:309)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at java.security.Policy.getPolicyNoCheck(Policy.java:167)
        at java.security.ProtectionDomain.implies(ProtectionDomain.java:224)
        at java.security.AccessControlContext.checkPermission(AccessControlContext.java:352)
        at java.security.AccessController.checkPermission(AccessController.java:546)
        at oracle.security.jps.util.JpsAuth$AuthorizationMechanism$3.checkPermission(JpsAuth.java:458)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:518)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:544)
        at oracle.security.jps.internal.credstore.util.CsfUtil.checkPermission(CsfUtil.java:643)
        at oracle.security.jps.internal.credstore.ssp.SspCredentialStore.containsCredential(SspCredentialStore.java:320)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:176)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:174)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.CsContainsHash(FileKeyStoreIntegrityChecker.java:174)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.<init>(FileKeyStoreIntegrityChecker.java:81)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.<init>(FileKeyStoreManager.java:165)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.getInstance(FileKeyStoreManager.java:146)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.doInit(FileKeyStoreServiceImpl.java:95)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:76)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:66)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:157)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:64)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.findServiceInstance(ContextFactoryImpl.java:139)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:170)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:191)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:132)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:127)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2827)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2821)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.policystore.PolicyUtil.getDefaultPDPService(PolicyUtil.java:2821)
        at oracle.security.jps.internal.policystore.PolicyUtil.getPDPService(PolicyUtil.java:3097)
        at oracle.security.jps.internal.policystore.PolicyDelegationController.<init>(PolicyDelegationController.java:164)
        at oracle.security.jps.internal.policystore.JavaPolicyProvider.<init>(JavaPolicyProvider.java:369)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.loadOPSSPolicy(CommonSecurityServiceManagerDelegateImpl.java:1339)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.initialize(CommonSecurityServiceManagerDelegateImpl.java:1018)
        at weblogic.security.service.SecurityServiceManager.initialize(SecurityServiceManager.java:873)
        at weblogic.security.SecurityService.start(SecurityService.java:141)
        at weblogic.t3.srvr.SubsystemRequest.run(SubsystemRequest.java:64)
        at weblogic.work.ExecuteThread.execute(ExecuteThread.java:209)
        at weblogic.work.ExecuteThread.run(ExecuteThread.java:178)
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/D:/ORACLE~1.6_M/JDK160~1/jre/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/C:/Windows/Sun/Java/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   (java.lang.RuntimePermission stopThread)
    policy:   (java.net.SocketPermission localhost:1024- listen,resolve)
    policy:   (java.util.PropertyPermission java.version read)
    policy:   (java.util.PropertyPermission java.vendor read)
    policy:   (java.util.PropertyPermission java.vendor.url read)
    policy:   (java.util.PropertyPermission java.class.version read)
    policy:   (java.util.PropertyPermission os.name read)
    policy:   (java.util.PropertyPermission os.version read)
    policy:   (java.util.PropertyPermission os.arch read)
    policy:   (java.util.PropertyPermission file.separator read)
    policy:   (java.util.PropertyPermission path.separator read)
    policy:   (java.util.PropertyPermission line.separator read)
    policy:   (java.util.PropertyPermission java.specification.version read)
    policy:   (java.util.PropertyPermission java.specification.vendor read)
    policy:   (java.util.PropertyPermission java.specification.name read)
    policy:   (java.util.PropertyPermission java.vm.specification.version read)
    policy:   (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   (java.util.PropertyPermission java.vm.specification.name read)
    policy:   (java.util.PropertyPermission java.vm.version read)
    policy:   (java.util.PropertyPermission java.vm.vendor read)
    policy:   (java.util.PropertyPermission java.vm.name read)
    policy:
    policy: reading file:/C:/Users/SudhanshuG/.java.policy
    policy: error parsing file:/C:/Users/SudhanshuG/.java.policy
    policy: java.io.FileNotFoundException: C:\Users\SudhanshuG\.java.policy (The system cannot find the file specified)
    java.io.FileNotFoundException: C:\Users\SudhanshuG\.java.policy (The system cannot find the file specified)
        at java.io.FileInputStream.open(Native Method)
        at java.io.FileInputStream.<init>(FileInputStream.java:106)
        at java.io.FileInputStream.<init>(FileInputStream.java:66)
        at sun.security.util.PolicyUtil.getInputStream(PolicyUtil.java:43)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:626)
        at sun.security.provider.PolicyFile.access$400(PolicyFile.java:266)
        at sun.security.provider.PolicyFile$3.run(PolicyFile.java:587)
        at java.security.AccessController.doPrivileged(Native Method)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:519)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:505)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:464)
        at sun.security.provider.PolicyFile.<init>(PolicyFile.java:309)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at java.security.Policy.getPolicyNoCheck(Policy.java:167)
        at java.security.ProtectionDomain.implies(ProtectionDomain.java:224)
        at java.security.AccessControlContext.checkPermission(AccessControlContext.java:352)
        at java.security.AccessController.checkPermission(AccessController.java:546)
        at oracle.security.jps.util.JpsAuth$AuthorizationMechanism$3.checkPermission(JpsAuth.java:458)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:518)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:544)
        at oracle.security.jps.internal.credstore.util.CsfUtil.checkPermission(CsfUtil.java:643)
        at oracle.security.jps.internal.credstore.ssp.SspCredentialStore.containsCredential(SspCredentialStore.java:320)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:176)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:174)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.CsContainsHash(FileKeyStoreIntegrityChecker.java:174)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.<init>(FileKeyStoreIntegrityChecker.java:81)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.<init>(FileKeyStoreManager.java:165)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.getInstance(FileKeyStoreManager.java:146)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.doInit(FileKeyStoreServiceImpl.java:95)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:76)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:66)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:157)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:64)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.findServiceInstance(ContextFactoryImpl.java:139)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:170)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:191)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:132)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:127)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2827)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2821)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.policystore.PolicyUtil.getDefaultPDPService(PolicyUtil.java:2821)
        at oracle.security.jps.internal.policystore.PolicyUtil.getPDPService(PolicyUtil.java:3097)
        at oracle.security.jps.internal.policystore.PolicyDelegationController.<init>(PolicyDelegationController.java:164)
        at oracle.security.jps.internal.policystore.JavaPolicyProvider.<init>(JavaPolicyProvider.java:369)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.loadOPSSPolicy(CommonSecurityServiceManagerDelegateImpl.java:1339)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.initialize(CommonSecurityServiceManagerDelegateImpl.java:1018)
        at weblogic.security.service.SecurityServiceManager.initialize(SecurityServiceManager.java:873)
        at weblogic.security.SecurityService.start(SecurityService.java:141)
        at weblogic.t3.srvr.SubsystemRequest.run(SubsystemRequest.java:64)
        at weblogic.work.ExecuteThread.execute(ExecuteThread.java:209)
        at weblogic.work.ExecuteThread.run(ExecuteThread.java:178)
    policy: getPermissions:
        PD CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
        PD ClassLoader: sun.misc.Launcher$AppClassLoader@1172e08
        PD Principals: <no principals>
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/lib/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/modules/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/ext/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/patch_wls1035/profiles/default/sysext_manifest_classpath%3bD:/ORACLE~1.6_M/patch_jdev1111/profiles/default/sysext_manifest_classpath/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/eval/pointbase/lib/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.security.AllPermission <all permissions> <all actions>)
    policy: evaluation (codesource/principals) passed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.pki_11.1.1/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/EJB <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/Web <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/Connector <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/C:/Windows/Sun/Java/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Administrators]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Deployers]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Operators]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Monitors]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSKernelIdentity/*]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.util.PropertyPermission java.version read)
    policy:   granting (java.util.PropertyPermission java.vendor read)
    policy:   granting (java.util.PropertyPermission java.vendor.url read)
    policy:   granting (java.util.PropertyPermission java.class.version read)
    policy:   granting (java.util.PropertyPermission os.name read)
    policy:   granting (java.util.PropertyPermission os.version read)
    policy:   granting (java.util.PropertyPermission os.arch read)
    policy:   granting (java.util.PropertyPermission file.separator read)
    policy:   granting (java.util.PropertyPermission path.separator read)
    policy:   granting (java.util.PropertyPermission line.separator read)
    policy:   granting (java.util.PropertyPermission java.specification.version read)
    policy:   granting (java.util.PropertyPermission java.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.version read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.version read)
    policy:   granting (java.util.PropertyPermission java.vm.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.name read)
    policy: evaluation (codesource/principals) passed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/C:/Windows/Sun/Java/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.lang.RuntimePermission stopThread)
    policy:   granting (java.net.SocketPermission localhost:1024- listen,resolve)
    policy:   granting (java.util.PropertyPermission java.version read)
    policy:   granting (java.util.PropertyPermission java.vendor read)
    policy:   granting (java.util.PropertyPermission java.vendor.url read)
    policy:   granting (java.util.PropertyPermission java.class.version read)
    policy:   granting (java.util.PropertyPermission os.name read)
    policy:   granting (java.util.PropertyPermission os.version read)
    policy:   granting (java.util.PropertyPermission os.arch read)
    policy:   granting (java.util.PropertyPermission file.separator read)
    policy:   granting (java.util.PropertyPermission path.separator read)
    policy:   granting (java.util.PropertyPermission line.separator read)
    policy:   granting (java.util.PropertyPermission java.specification.version read)
    policy:   granting (java.util.PropertyPermission java.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.version read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.version read)
    policy:   granting (java.util.PropertyPermission java.vm.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.name read)
    policy: evaluation (codesource/principals) passed
    policy: getPermissions:
        PD CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
        PD ClassLoader: sun.misc.Launcher$AppClassLoader@1172e08
        PD Principals: <no principals>
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/lib/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/modules/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/ext/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/patch_wls1035/profiles/default/sysext_manifest_classpath%3bD:/ORACLE~1.6_M/patch_jdev1111/profiles/default/sysext_manifest_classpath/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/eval/pointbase/lib/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.security.AllPermission <all permissions> <all actions>)
    policy: evaluation (codesource/principals) passed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.pki_11.1.1/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/EJB <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/Web <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/Connector <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/C:/Windows/Sun/Java/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Administrators]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Deployers]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Operators]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Monitors]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSKernelIdentity/*]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.util.PropertyPermission java.version read)
    policy:   granting (java.util.PropertyPermission java.vendor read)
    policy:   granting (java.util.PropertyPermission java.vendor.url read)
    policy:   granting (java.util.PropertyPermission java.class.version read)
    policy:   granting (java.util.PropertyPermission os.name read)
    policy:   granting (java.util.PropertyPermission os.version read)
    policy:   granting (java.util.PropertyPermission os.arch read)
    policy:   granting (java.util.PropertyPermission file.separator read)
    policy:   granting (java.util.PropertyPermission path.separator read)
    policy:   granting (java.util.PropertyPermission line.separator read)
    policy:   granting (java.util.PropertyPermission java.specification.version read)
    policy:   granting (java.util.PropertyPermission java.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.version read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.version read)
    policy:   granting (java.util.PropertyPermission java.vm.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.name read)
    policy: evaluation (codesource/principals) passed
    policy: evaluate codesources

    Hi,
    Your issue is something similar to the issue described in below metalink id. Please check below metalink id, you issue may be resolved.
    Start OMS failed with "javax.xml.stream.XMLStreamException: Premature end of file encountered" [ID 1481158.1]
    Mark if this helps you.
    Regards,
    Kishore

  • Security Provider Issues

    Because of performance issues, we have a security provider that has a native back end. All the core pieces are implemented (SHA1, SHA256, RSA, DSA, etc.). However, when I add the new provider to the top of the list in java.security and start an app with signed jars. My provider isn't used. Digging through the openjdk code, it appears that JarVerifier refers to ManifestEntryVerifier and SignatureFileVerifier which has it hard coded to use the Sun security provider. Does anybody know a way around that? It seems that this would make it impossible to be FIPS compliant with a certified security provider, because the code signing verification would still be done by Sun/SunRsa/SunEC.
    Bill

    Because of performance issues, we have a security provider that has a native back end. All the core pieces are implemented (SHA1, SHA256, RSA, DSA, etc.). However, when I add the new provider to the top of the list in java.security and start an app with signed jars. My provider isn't used. Digging through the openjdk code, it appears that JarVerifier refers to ManifestEntryVerifier and SignatureFileVerifier which has it hard coded to use the Sun security provider. Does anybody know a way around that? It seems that this would make it impossible to be FIPS compliant with a certified security provider, because the code signing verification would still be done by Sun/SunRsa/SunEC.
    Bill

  • Java plugin crashes when creating a new sun.security.pkcs11.SunPKCS11 object

    Hi,
    I have created an applet which signs pdf files and works fine.
    Applet is used in a website that needs client authentication with the same smart card wich is used to sign the documents.
    The java plugin crashes at this line of code. The message showed - The java applet plugin has failed
    sunpkcs11 = new sun.security.pkcs11.SunPKCS11(pkcs11);
    I think it crashes because the pkcs11 module is still used, the light of the smart card reader is not blinking is a fixed light.
    I haven't got an error log because the java plugin crashes. Only shows the log lines before that line of code.
    Later the sunpkcs11 provider is added if the smarcard is unplugged and java plugin don't crashes.
    Security.addProvider(sunpkcs11);
    If I unplug the smart card after client authentication and before sign a document, the java plugin don't crashes and later, the provider is added, and the document is signed and the light of the smart card reader is blinking before signing.
    Firefox 27 version.
    Java Standar Edition version 7 update 51 compilation 1.7.0_51-b13
    I'm using mac os x v10.9 64 bits system
    I have seen:
    http://bugs.java.com/view_bug.do?bug_id=8026833
    I have tested the same applet with firefox, in windows 7, windows 8, ubuntu 13.10 and fedora 19, and works and signs documents after client authentication.
    when applet is loaded in windows is not using pkcs11. But I haven't got the same problem.
    But in mac os x v10.8 and v10.9 java plugin crashes.
    Is there a way to disconnect programatically the pkcs11 module or any other solution?
    I'm not sure why the java plugin crashes. Has got any relationship with the bug 8026833?
    Any suggestion?.
    Thank you.

    Hi,
    According to your post, my understanding is that you had Errors TF30162 and TF250025 when creating a New Team Project in TFS2012 with Sharepoint Site on Visual Studio.
    The Errors TF30162 seemed that the reports for TFS could not be uploaded due a permission problem. The fix was really easy.
    Go to your team foundation server 
    Open the administration console. 
    Click on Reporting
    Click on Edit
    Click on Reports Tab
    Enter the credential for the Reports
    Save
    Click on Start Jobs
    In addtion, the problem may be due to the caching done by Team Explorer in Visual Studio. Exiting the copy of VS on the client and reloading it will fix the problem as the updated team process settings will cached locally.
    To resolve the Errors TF250025, you will need to register a new internal URL for the SharePoint site using Alternate Access Mappings.
    Here are two great blogs for you to take a look at:
    http://blogbaris.blogspot.in/2012_08_01_archive.html
    http://petersullivan.com.au/2009/11/23/tf250025-and-tf262600-errors-on-team-foundation-server-tfs-2010-project-portal-dashboard/
    If still no help, for quick and accurate answers to your questions, it is recommended that you initial a new thread in Visual Studio Team Foundation Server forums.
    Team Foundation Server – General:
    http://social.msdn.microsoft.com/Forums/vstudio/en-US/home?forum=tfsgeneral
    Thank you for your understanding.
    Best Regards,
    Linda Li
    Linda Li
    TechNet Community Support

  • Sun.security.validator.ValidatorException: No trusted certificate found

    Hello,
    I am using Java 1.6.0_04 (JBoss-4.2.2.GA application). My application implements a WS client which needs to integrate with an external Web Service. This communication needs to be handled through https.
    I have created a jks keystore with the server certificate, and passed its details to JBoss through the System Properties:
    -Djavax.net.ssl.trustStore=/Path-to-file  -Djavax.net.ssl.trustStorePassword=password     On my development environment I can call the Web Service correctly.
    Although, on the production environment, I am getting the following exception:
    javax.xml.ws.WebServiceException: java.io.IOException: Could not transmit message
         at org.jboss.ws.core.jaxws.client.ClientImpl.handleRemoteException(ClientImpl.java:317)
         at org.jboss.ws.core.jaxws.client.ClientImpl.invoke(ClientImpl.java:255)
         at org.jboss.ws.core.jaxws.client.ClientProxy.invoke(ClientProxy.java:164)
         at org.jboss.ws.core.jaxws.client.ClientProxy.invoke(ClientProxy.java:150)
         at $Proxy171.send(Unknown Source)
         at com.xpto.integration.SmsHelper.send(SmsHelper.java:57)
         at com.xpto.services.sms.SMSSenderServiceMBean.run(SMSSenderServiceMBean.java:106)
         at java.lang.Thread.run(Thread.java:619)
    Caused by: java.io.IOException: Could not transmit message
         at org.jboss.ws.core.client.RemotingConnectionImpl.invoke(RemotingConnectionImpl.java:204)
         at org.jboss.ws.core.client.SOAPRemotingConnection.invoke(SOAPRemotingConnection.java:77)
         at org.jboss.ws.core.CommonClient.invoke(CommonClient.java:337)
         at org.jboss.ws.core.jaxws.client.ClientImpl.invoke(ClientImpl.java:243)
         ... 6 more
    Caused by: org.jboss.remoting.CannotConnectException: Can not connect http client invoker.
         at org.jboss.remoting.transport.http.HTTPClientInvoker.useHttpURLConnection(HTTPClientInvoker.java:
    333)
         at org.jboss.remoting.transport.http.HTTPClientInvoker.transport(HTTPClientInvoker.java:135)
         at org.jboss.remoting.MicroRemoteClientInvoker.invoke(MicroRemoteClientInvoker.java:122)
         at org.jboss.remoting.Client.invoke(Client.java:1634)
         at org.jboss.remoting.Client.invoke(Client.java:548)
         at org.jboss.ws.core.client.RemotingConnectionImpl.invoke(RemotingConnectionImpl.java:183)
         ... 9 more
    Caused by: javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: No truste
    d certificate found
         at com.sun.net.ssl.internal.ssl.Alerts.getSSLException(Alerts.java:174)
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1591)
         at com.sun.net.ssl.internal.ssl.Handshaker.fatalSE(Handshaker.java:187)
         at com.sun.net.ssl.internal.ssl.Handshaker.fatalSE(Handshaker.java:181)
         at com.sun.net.ssl.internal.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:975)
         at com.sun.net.ssl.internal.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:123)
         at com.sun.net.ssl.internal.ssl.Handshaker.processLoop(Handshaker.java:516)
         at com.sun.net.ssl.internal.ssl.Handshaker.process_record(Handshaker.java:454)
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:884)
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1096)
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1123)
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1107)
         at sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:405)
         at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLCo
    nnection.java:166)
         at sun.net.www.protocol.http.HttpURLConnection.getOutputStream(HttpURLConnection.java:832)
         at sun.net.www.protocol.https.HttpsURLConnectionImpl.getOutputStream(HttpsURLConnectionImpl.java:23
    0)
         at org.jboss.remoting.transport.http.HTTPClientInvoker.useHttpURLConnection(HTTPClientInvoker.java:
    275)
         ... 14 more
    Caused by: sun.security.validator.ValidatorException: No trusted certificate found
         at sun.security.validator.SimpleValidator.buildTrustedChain(SimpleValidator.java:304)
         at sun.security.validator.SimpleValidator.engineValidate(SimpleValidator.java:107)
         at sun.security.validator.Validator.validate(Validator.java:218)
         at com.sun.net.ssl.internal.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:126)
         at com.sun.net.ssl.internal.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:2
    09)
         at com.sun.net.ssl.internal.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:2
    49)
         at com.sun.net.ssl.internal.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:954)
         ... 26 more     Both systems are configured with the same JBoss, JVM, ...
    The certificate details are:
    Owner=
      CN=*...., OU=..., O=..., L=..., ST=..., C=PT
    Issuer=
      CN=..., O=..., C=PT
    Version=3
    Serial Number=BC81A81843E26C2597CD10354588F61E
    Valid From=Monday, 3 March 2008 18:50
    Valid Until=Tuesday, 3 March 2009 18:50
    Signature Algorithm=SHA1withRSA
    Fingerprints=
        MD5:     0A:A6:89:92:A4:CF:17:74:7C:4E:20:63:6B:81:AE:85
        SHA1:    35:01:74:8C:35:AB:9F:02:7B:23:3F:15:5E:73:C6:4D:DD:BB:C0:7A
    Key Usage= critical
        List:
        . digitalSignature
        . keyEncipherment
        . dataEncipherment
        . keyAgreement
    Extended Key Usage= none
         On production I have also tried adding the following properties:
    -Djavax.net.ssl.keyStore=/Path-to-file  -Djavax.net.ssl.keyStorePassword=password     But I still get the error.
    Any one has any hint for this problem? Is there any property which I can define to ignore untrusted certificates?
    Any help would really be welcome.
    Thanks in advance.
    Best regards,
    Victor Batista

    Hi,
    Thanks for your prompt reply.
    I have also tried to add all the chain of certificates on my truststore, although I get the exception:
    Caused by: java.security.cert.CertificateExpiredException: NotAfter: Fri Mar 07 12:54:22 WET 2008
         at sun.security.x509.CertificateValidity.valid(CertificateValidity.java:256)
         at sun.security.x509.X509CertImpl.checkValidity(X509CertImpl.java:570)
         at sun.security.validator.SimpleValidator.engineValidate(SimpleValidator.java:123)
         at sun.security.validator.Validator.validate(Validator.java:218)
         at com.sun.net.ssl.internal.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:126)
         at com.sun.net.ssl.internal.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:209)
         at com.sun.net.ssl.internal.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:249)
         at com.sun.net.ssl.internal.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:954)
         ... 26 moreAnd all the certificates are valid.
    I really don't understand what is going on.
    Can I Ignore expired certificates? Any property?
    When I use -Djavax.net.ssl.trustStore pointing to my keystore, will cacerts be also used?
    Do I need to import all the certificates in the chain of the server, or the top most is sufficient?
    The server where I am having the problem has limited connectivity. It should have connectivity to the issuers of the certificates, in order to validate them, or not?
    Thanks in advance,
    Victor

  • Access denied to a security provider on a signed applet

    Hi,
    I'm having permissions problems to work with a security provider.
    The security provider is already installed at java.security. In fact, at Netbeans when debbuging the app it's working perfectly.
    If I'm working the provider in an signed applet, then there are errors.
    Even, I have created a .jar file and I have saved in the /ext directory, wich by default in the java.policy file has got all security permissions.
    grant codeBase "file:${{java.ext.dirs}}/*" {
    permission java.security.AllPermission;
    Even with these granted permissions, I'm getting problems to work with the security provider that I have installed. Also, with these permissions I should be able to install the security provider.
    log:
    <record>
    <date>2012-03-13T12:13:39</date>
    <millis>1331637219126</millis>
    <sequence>17</sequence>
    <logger>appletpdf.appletPdf</logger>
    <level>SEVERE</level>
    <class>appletpdf.appletPdf</class>
    <method>applTest</method>
    <thread>11</thread>
    <message>excepcion: {0} </message>
    <exception>
    <message>java.security.AccessControlException: access denied (java.security.SecurityPermission authProvider.SunPKCS11-Provider-name)</message>
    <frame>
    <class>java.security.AccessControlContext</class>
    <method>checkPermission</method>
    <line>393</line>
    </frame>
    <frame>
    <class>java.security.AccessController</class>
    <method>checkPermission</method>
    <line>553</line>
    </frame>
    <frame>
    <class>java.lang.SecurityManager</class>
    <method>checkPermission</method>
    <line>549</line>
    </frame>
    <frame>
    <class>net.sourceforge.jnlp.runtime.JNLPSecurityManager</class>
    <method>checkPermission</method>
    <line>250</line>
    </frame>
    <frame>
    <class>sun.security.pkcs11.SunPKCS11</class>
    <method>login</method>
    <line>1036</line>
    </frame>
    <frame>
    <class>sun.security.pkcs11.P11KeyStore</class>
    <method>login</method>
    <line>874</line>
    </frame>
    <frame>
    <class>sun.security.pkcs11.P11KeyStore</class>
    <method>engineLoad</method>
    <line>764</line>
    </frame>
    <frame>
    <class>java.security.KeyStore</class>
    <method>load</method>
    <line>1201</line>
    </frame>
    <frame>
    <class>apppdf.appPdf</class>
    <method>tPKCS11</method>
    <line>174</line>
    </frame>
    <frame>
    <class>appletpdf.appletPdf</class>
    <method>applTest</method>
    <line>137</line>
    </frame>
    <frame>
    <class>appletpdf.appletPdf</class>
    <method>initapplDPdf</method>
    <line>116</line>
    </frame>
    <frame>
    <class>sun.reflect.NativeMethodAccessorImpl</class>
    <method>invoke0</method>
    </frame>
    <frame>
    <class>sun.reflect.NativeMethodAccessorImpl</class>
    <method>invoke</method>
    <line>57</line>
    </frame>
    <frame>
    <class>sun.reflect.DelegatingMethodAccessorImpl</class>
    <method>invoke</method>
    <line>43</line>
    </frame>
    <frame>
    <class>java.lang.reflect.Method</class>
    <method>invoke</method>
    <line>616</line>
    </frame>
    <frame>
    <class>sun.applet.PluginAppletSecurityContext$4</class>
    <method>run</method>
    <line>699</line>
    </frame>
    <frame>
    <class>java.security.AccessController</class>
    <method>doPrivileged</method>
    </frame>
    <frame>
    <class>sun.applet.PluginAppletSecurityContext</class>
    <method>handleMessage</method>
    <line>696</line>
    </frame>
    <frame>
    <class>sun.applet.AppletSecurityContextManager</class>
    <method>handleMessage</method>
    <line>69</line>
    </frame>
    <frame>
    <class>sun.applet.PluginStreamHandler</class>
    <method>handleMessage</method>
    <line>273</line>
    </frame>
    <frame>
    <class>sun.applet.PluginMessageHandlerWorker</class>
    <method>run</method>
    <line>82</line>
    </frame>
    </exception>
    </record>
    Fails in the line where the KeyStore is loading:(Pin is correct)
    KeyStore myKeyStore=null;
    Provider p = Security.getProvider("SunPKCS11-Provider-Name");
    myKeyStore = KeyStore.getInstance("PKCS11",p);
    char[] pinData = pin.toCharArray();
    myKeyStore.load(null, pinData);
    Any help would be apreciated.
    Thank you.
    Bye

    Thank you for your information, Frank, as it clarifies part of my confusion. However, there are a couple more loose ends I'd love to address before I mark your responses as answers.
    Do backup and restore privileges apply at all over a network mount created via "net use"?
    The network mount requires a username and password for the destination machine. Assuming the destination machine is a Windows box with a simple CIFS share, how does this user affect our permissions and access? Do we end up effectively impersonating this
    user, or is the access check still done with our sync process's run-as user?
    We require that both our configured run-as user for our sync process *and* the credentials passed to the network mount be administrator users of the local system and destination system, respectively, meaning they're in of the "BUILTIN\Administrators,
    S-1-5-32-544" group.
    On re-syncs, the destination file will exist and since we don't have the ability to read the ACL in all cases (we're running as one user, the file is owned by another user, and we aren't specified in the ACL in any way), we aren't able to determine if the
    file has changed. Is it possible to determine the owner of this file in this case? Preferably, we'd obtain the entire SDDL.
    My proposed plan is to interpret access denied as a difference requiring re-sync, resulting in us taking ownership of the file, granting ourselves access, determining if there are data differences, and then re-syncing the metadata as appropriate.

  • Problem with SUN cryptographic provider (PKCS#11)  & EclipseRCP

    Hi all,
    We developed a java program for using cryptographic tokens, for instance,smartcards. The crypto provider from SUN offers the API (PKCS#11) and all cryptographic functions to handle smartcards. The program works as standalone application, but if we are trying to implement the program into Eclipse RCP, it will not work.
    If the program tries to call up the SUN provider constructor, it fails without an error message.
    We searched in different forums, but without any success.
    We do not have any idea to solve this problem.
    Please help us.
    private Provider addToken() throws Exception {
      String pkcs11ConfigFile = "C:\\Downloads\\pkcs11.cfg";
      Provider pkcs11Provider = new sun.security.pkcs11.SunPKCS11(pkcs11ConfigFile);
      Security.addProvider(pkcs11Provider);
      return pkcs11Provider;
    }thx

    Can I ask you one question?
    Which driver did you specify? I mean the smarcard reader driver or the smartcard itself driver?
    If the second, does it come along with the card? because as far as I know I just got the smart card but no software at all (apart the smartcard reader driver).
    Can you help me out with this?
    thanks in advance,
    Marco

  • Security Provider(JAAS chaine module)logging with SAP J2EE Agent Policy 2.2

    Hello,
    I have installed and configured a SAP J2EE Policy Agent 2.2 on a SAP J2EE Application Server 7.0 and installed an opensso 8.0.
    I have configured and deployed a jsp application with the descriptor containing the agent filter on the SAP J2EE.
    I have configured the security provider (based on JAAS) as follows:
    EvaluateTicketModule
    AmSAPWASLoginModule
    CreateTicketLoginModule
    I have then increased the severity check of logging on the SAP J2EE Application Server for:
    com.sap.security.server.jaas
    com.sap.engine.services.security
    But since the installation of the agent, I am not able to see the logs of the different logon modules and be sure that the CreateLoginModule has been done.
    I need to check that after the success of the agent login module, it goes through the CreateTicketLoginModule, how can I check that.
    Thanks,
    Tanguy Mezzano
    amFilter log:
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    AmFilter: now processing: Notification Task Handler
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    AmFilter: now processing: Port Check Task Handler
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    PortCheckTaskHandler: request is on valid port
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    AmFilter: now processing: FQDN Task Handler
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    FQDNHelper: Incoming Server Name: [myserver] Result: null
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    AmFilter: now processing: Not Enforced List Task Handler
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    NotenforcedURIHelper.isNotEnforced(/myApp.jsp) found in enforced cache
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    NotenforcedURIHelper.isNotEnforced(/myApp.jsp) => false
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    AmFilter: now processing: SSO Task Handler
    11/13/2008 06:02:40:122 PM CET: SAPEngine_Application_Thread[impl:3]_35
    SSOTaskHandler: SSO Validation successful for id=myUser,ou=user,dc=myCompany,dc=com
    11/13/2008 06:02:40:122 PM CET: SAPEngine_Application_Thread[impl:3]_35
    AmFilter: now processing: URL Policy Task Handler
    11/13/2008 06:02:40:310 PM CET: SAPEngine_Application_Thread[impl:3]_35
    URLPolicyTaskHandler: access allowed by AmWebPolicy
    11/13/2008 06:02:40:310 PM CET: SAPEngine_Application_Thread[impl:3]_35
    AmFilter: now processing: Redirect Check Result Handler
    11/13/2008 06:02:40:310 PM CET: SAPEngine_Application_Thread[impl:3]_35
    RedirectCheckResultHandler: removing redirect counter cookie
    11/13/2008 06:02:40:310 PM CET: SAPEngine_Application_Thread[impl:3]_35
    AmFilter: result =>
    FilterResult:
    Status : CONTINUE
    RedirectURL : null
    RequestHelper:
    null
    Data:
    null
    -----------------------------------------------------------

    I want to use my login page in BEA instead of Access Manager or Distributed Authentication Module. I think it is similar to the problem you have? Did you come up with a solution?
    My problem is described in more detail on this thread:
    http://forum.java.sun.com/thread.jspa?threadID=5197783

  • Java.rmi.UnmarshalException: Failed to load class com.msl.security.provider

    Hi ,
    I have the following error while i am stopping a Weblogic instance. Did anyone face a similar issue, please let me know. I see a classnotfound error , but not sure what is that jar file. Is it a application jar or a weblogic one?
    Stopping Weblogic Server...
    Initializing WebLogic Scripting Tool (WLST) ...
    log4j: Trying to find [resources/comdev/default-log4j.properties] using context classloader java.net.URLClassLoader@183f74d.
    log4j: Using URL [jar:file:/teamrule/10.2/modules/com.bea.cie.comdev_5.3.0.0.jar!/resources/comdev/default-log4j.properties] for automatic log4j configuration.
    log4j: Reading configuration from URL jar:file:/teamrule/10.2/modules/com.bea.cie.comdev_5.3.0.0.jar!/resources/comdev/default-log4j.properties
    log4j: Hierarchy threshold set to [ALL].
    log4j: Parsing for [root] with value=[INFO, NA].
    log4j: Level token is [INFO].
    log4j: Category root set to INFO
    log4j: Parsing appender named "NA".
    log4j: Parsed "NA" options.
    log4j: Finished configuring.
    Welcome to WebLogic Server Administration Scripting Shell
    Type help() for help on available commands
    Connecting to t3://localhost:7009 with userid weblogic ...
    This Exception occurred at Sun Apr 10 14:17:03 UTC 2011.
    javax.naming.CommunicationException [Root exception is java.rmi.UnmarshalException: failed to unmarshal class weblogic.security.acl.internal.AuthenticatedUser; nested excep
    tion is:
    java.lang.ClassNotFoundException: Failed to load class com.msl.security.providers.SessionPrincipal]
    at weblogic.jndi.internal.ExceptionTranslator.toNamingException(ExceptionTranslator.java:74)
    at weblogic.jndi.internal.ExceptionTranslator.toNamingException(ExceptionTranslator.java:32)
    at weblogic.jndi.WLInitialContextFactoryDelegate.toNamingException(WLInitialContextFactoryDelegate.java:773)
    at weblogic.jndi.WLInitialContextFactoryDelegate.pushSubject(WLInitialContextFactoryDelegate.java:673)
    at weblogic.jndi.WLInitialContextFactoryDelegate.newContext(WLInitialContextFactoryDelegate.java:466)
    at weblogic.jndi.WLInitialContextFactoryDelegate.getInitialContext(WLInitialContextFactoryDelegate.java:373)
    ... 48 more
    Problem invoking WLST - Traceback (innermost last):
    File "/web/10.2/user_projects/domains/dom/shutdown.py", line 1, in ?
    File "<iostream>", line 22, in connect
    WLSTException: 'Error occured while performing connect : Error getting the initial context. There is no server running at t3://localhost:7009 Use dumpStac
    k() to view the full stacktrace'
    Thanks a lot for your time.
    Manish

    Hi Manish,
    It seems that you are using a custom security provider and the weblogic server is not able to find the class / jar file that contains the class.
    java.lang.ClassNotFoundException: Failed to load class com.msl.security.providers.SessionPrincipal]
    Make sure you have all the required jar files in the server classpath.
    You can use the JarScan utility to find the jar that contains the class.
    Refer the below link regarding the jarScan.
    http://weblogic-wonders.com/weblogic/2011/01/26/finding-jar-files-using-jarscan/
    Regards,
    Anandraj
    http://weblogic-wonders.com

  • Sun PKCS11 Provider - charset of configuration

    Hi,
    I have problem with configuring Sun PKCS11 Provider. When I have czech char in path to the nssSecmodDirectory it fails to initialize the provider. The exception is
    Exception in thread "main" java.security.ProviderException: Could not initialize NSS
         at sun.security.pkcs11.SunPKCS11.<init>(SunPKCS11.java:183)
         at sun.security.pkcs11.SunPKCS11.<init>(SunPKCS11.java:90)
         at cz.mathan.multisignature.example.TestNSS.main(TestNSS.java:51)
    Caused by: java.io.IOException: NSS initialization failed
         at sun.security.pkcs11.Secmod.initialize(Secmod.java:199)
         at sun.security.pkcs11.SunPKCS11.<init>(SunPKCS11.java:179)
         ... 2 more
    Do you know how to solve this problem?
    Thanks
    Lucie

    @see this link:
    http://forum.java.sun.com/thread.jspa?messageID=10308914

  • Question on OID Security Provider?

    1. I find two offical documents on config OID security provider, which one is correct?
    http://download.oracle.com/docs/cd/E15523_01/webcenter.1111/e12405/wcadm_security.htm#BGBBHAGJ
    http://download.oracle.com/docs/cd/E12839_01/apirefs.1111/e13952/taskhelp/security/ConfigureOracleInternetDirectoryATNProvider.html
    The main differences are:
    a. whether to change cn to uid at Groups related fields?
    for example:All Groups Filter to (&(uid=*)(|(objectclass=groupofUniqueNames)(objectclass=orcldynamicgroup)))
    b. whether to modify jps-config.xml file?
    2. I config provider successful based on http://download.oracle.com/docs/cd/E15523_01/webcenter.1111/e12405/wcadm_security.htm#BGBBHAGJ, I can find all user and group of OID at weblogic console. My question is why can't I delete or change group of user which at OID. When I add new user via weblogic console wizard I can't find OID provider at Authentication Provider list. What matter with it? a bug or somthing wrong with my configuration, even it is build-in design?

    a. whether to change cn to uid at Groups related fields?
    If the group name attribute for the static group object in the LDAP directory structure is a type other than cn, change that type in the settings for the All Groups Filter and Group Name From Filter attributes.
    For OID, Static group attribute is CN if i am not wrong. So I believe we dont need to change the All Groups Filter.
    b. whether to modify jps-config.xml file?
    I believe NO.
    why can't I delete or change group of user which at OID. When I add new user via weblogic console wizard I can't find OID provider at Authentication Provider list.
    The Weblogic OID Provider is read only, we cant modify anything on OID. Its not the bug, you get the same behaviour with the other providers as well.
    Hope it answers.

  • Configuration file for pkcs11 security provider

    Hi all,
    I'm using Mandriva 2008.0 . In the jdk 1.5.0 documentation, it is given that, the security provider pkcs11 can be configured statically by adding an entry, as shown below, in the java.security file present in the directory jre/lib/security/.
    *# configuration for security providers 1-6 ommitted*
    security.provider.7=sun.security.pkcs11.SunPKCS11 /opt/bar/cfg/pkcs11.cfg
    Where can I get the configuration file (pkcs11.cfg) from? Please direct me how to proceed.
    Thanks.

    Hi,
    I went through that Java SE6 documentation link. It describes the contents of the configuration file for pkcs11. But I couldn't find the information of where can I get the configuration file for pkcs11 security provider from.
    Thanks.

  • An error was encountered by the CAS Security Provider:   Error Code: SVR_ER

    Hi Everybody,
    when i open dimension library that time i get a error
    An error was encountered by the CAS Security Provider:
    Error Code: SVR_ERR_SESSION_MGR_CAS_SECURITY_ERROR
    How i can resolve i donot know ,pleas any body know help me.
    Regards,
    Ashis

    I ran into the same problem. It appears to be an "undocumented feature"; however, there is a patch that is supposed to resolve the issue. The link to the patch is here:
    https://updates.oracle.com/ARULink/PatchDetails/process_form?patch_num=9921096
    See the following for more details:
    Workspace: An error was encountered by the CAS Security Provider: Not SpecifiedError Code: SVR_ERR_SESSION_MGR_CAS_SECURITY_ERROR [ID 1265746.1]
    Modified 22-NOV-2010 Type PROBLEM Status PUBLISHED
    In this Document
    Symptoms
    Cause
    Solution
    References
    Applies to:
    Hyperion Planning - Version: 11.1.2.0.00 and later [Release: 11.1 and later ]
    Information in this document applies to any platform.
    Symptoms
    When trying to access BPMA via the Workspace, Active Directory users get the following error:An error was encountered by the CAS Security Provider: Not SpecifiedError Code: SVR_ERR_SESSION_MGR_CAS_SECURITY_ERROR.
    Cause
    This behaviour is described in unpublished bug 9921096
    When MSAD is configured as an external directory there is an option to enable or disable support for external groups. If Support Groups is disabled this triggers a code bug which leads to the observed behaviour on navigating to the Dimension Library.
    Solution
    As a workaround you can enable Support Groups.
    If you want to be able to disable Support Groups you must apply patch 9921096.
    References
    Related
    Products
    •Middleware > Enterprise Performance Management > Planning > Hyperion Planning
    Hope this resolves your problem!
    Jennifer

Maybe you are looking for