Security provider in JAVA 7.1
Hello experts,
I was hoping you know this, but since web as 7.1 the visual admin tool was replaced by nwa.
The problem is mapping the functionalities.
In Security provider (Visual Admin) i could insert permitions in actions or roles, but how do i do that in netweaver administrator?
I know which permission to grant to which user, but i don't know how to grant the permission. And i can't use "user admin" because it doesn't deal with permissions, it only deals with actions, roles, groups and users and that is not enought.
Cheers,
Thiago Delou
Basis Team
Hello Thiago,
I recommend you to check the following online security documentation where it is explainned how to manage security in 7.1:
http://help.sap.com-> SAP NetWeaver CE 7.1 -> SAP NetWeaver Composition Environment Library u2192 Administrator's Guide u2192 SAPNetWeaver CE Security Guide u2192 SAP NetWeaver Application Server Java Security Guide u2192 User Administration and Authentication
I hope this helps you.
Regards,
Blanca
Similar Messages
-
I'm trying to use the JCE with JWS1.0.2. All I want to do is generate a KeyPair and I can NOT use a signed application. The code is:
public static KeyPair genDHKeyPair() throws Exception {
// properties...
DHParameterSpec dhSkipParamSpec;
dhSkipParamSpec = new DHParameterSpec(skip1024Modulus, skip1024Base);
KeyPairGenerator keyPairGenerator = KeyPairGenerator.getInstance("DH");
keyPairGenerator.initialize(dhSkipParamSpec);
KeyPair keyPair = keyPairGenerator.generateKeyPair();
return keyPair;
I'm using JDK1.4. This code works fine outside of JWS.
If I call this code I get an exception that states I need the stated RuntimePermission. IMHO this is a bug because I should be able to make use of simple standard extension methods like this. Is getting an instance of a KeyPairGenerator and generating a key pair a security risk?
The fix for this should be a simple addition to the security policy for JWS which gives SUN javax.crypto code access to the appropriate RuntimePermission.
Can anyone think of a reason why NOT to do this?
Thank you.
BTW, here's the Exception you would get if you tried this:
java.security.AccessControlException: access denied (java.lang.RuntimePermission accessClassInPackage.sun.security.provider)
at java.security.AccessControlContext.checkPermission(AccessControlContext.java:270)
at java.security.AccessController.checkPermission(AccessController.java:401)
at java.lang.SecurityManager.checkPermission(SecurityManager.java:542)
at java.lang.SecurityManager.checkPackageAccess(SecurityManager.java:1513)
at sun.misc.Launcher$AppClassLoader.loadClass(Launcher.java:262)
at java.lang.ClassLoader.loadClass(ClassLoader.java:299)
at java.lang.ClassLoader.loadClass(ClassLoader.java:262)
at java.lang.ClassLoader.loadClassInternal(ClassLoader.java:322)
at com.wss.calendar.client.swing.Main.main(Main.java:47)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
at java.lang.reflect.Method.invoke(Method.java:324)
at com.sun.javaws.Launcher.executeApplication(Launcher.java:739)
at com.sun.javaws.Launcher.executeMainClass(Launcher.java:701)
at com.sun.javaws.Launcher.continueLaunch(Launcher.java:584)
at com.sun.javaws.Launcher.handleApplicationDesc(Launcher.java:328)
at com.sun.javaws.Launcher.handleLaunchFile(Launcher.java:166)
at com.sun.javaws.Launcher.run(Launcher.java:134)
at java.lang.Thread.run(Thread.java:536)hi there,
Please I have the same problem in an applet that uses DSA with the following call:
pkey = (PublicKey) new DSAPublicKey(server_pub_key);
The Exception i am having on the console is
java.security.AccessControlException: access denied (java.lang.RuntimePermission accessClassInPackage.sun.security.provider)
Note that I am NOT using JCE and that both netscape and IE browsers gave this error
Can somebody help me please?
Thanks in advance,
JPDib -
Problems using NSS library as PKCS#11 provider with JAVA 6
Hi,
I�m trying to configure JAVA 6 on Solaris 10 SPARC to use Mozilla NSS library as PKCS#11 provider (to achieve FIPS-140 certification for my application). I�m following the guidelines from http://java.sun.com/javase/6/docs/technotes/guides/security/p11guide.html#NSS but unfortunately something doesn�t work for me as expected...
Let me describe the exact steps that I followed (because devil may be in the small details :-)
I downloaded NSS 3.11.4 and NSPR 4.6.4 binaries from mozilla.org (32 bit �debug� versions for Solaris 9, because these were the only �binary� versions for SPARC available on Mozilla site and as far as I understand these are the exact versions that passed FIPS-140 certification), unpacked them under the /opt directory and copied both of them into a single /opt/nss tree as follows:
mkdir /opt/nss
cp �r /opt/nss-3.11.4/* /opt/nss
cp �r /opt/nspr-4.6.4/* /opt/nss
I created a PKCS#11 configuration file /opt/nss/pkcs11.cfg as per JAVA 6 security guide:
name = NSScrypto
nssLibraryDirectory = /opt/nss/lib
nssDbMode = noDb
attributes = compatibility
(I know that this configuration is not for FIPS mode � but I thought that I�d better start with a simple NSS configuration)
Then I modified /usr/jdk/jdk1.6.0_03/jre/lib/security/java.security file and replaced 1st provider with:
security.provider.1=sun.security.pkcs11.SunPKCS11 /opt/nss/pkcs11.cfg
Now everything should be in place � so I created a small JAVA program and ran it:
import javax.crypto.SecretKeyFactory;
import javax.crypto.spec.DESedeKeySpec;
import javax.crypto.SecretKey;
import javax.crypto.Cipher;
import java.security.*;
public class Test
public static void main(String[] args)
try
SecretKeyFactory keyFactory = SecretKeyFactory.getInstance("DESede");
DESedeKeySpec keySpec = null;
keySpec = new DESedeKeySpec(new String("laKuf1Tcc6sOhsdPf49=m4es").getBytes());
System.out.println("keyFactory provider: " + keyFactory.getProvider().getName());
SecretKey key = keyFactory.generateSecret(keySpec);
Cipher decryptCipher = Cipher.getInstance("DESede");
decryptCipher.init(Cipher.DECRYPT_MODE, key);
System.out.println("decryptCipher provider: " + decryptCipher.getProvider().getName());
catch (Exception ex)
ex.printStackTrace();
Unfortunately it produced the following output:
EMS-Server42# java test
keyFactory provider: SunPKCS11-NSScrypto
decryptCipher provider: SunJCE
And when I comment out SunJCE provider in java.security file I get the following exception:
java.security.NoSuchAlgorithmException: Cannot find any provider supporting DESede
at javax.crypto.Cipher.getInstance(DashoA13*..)
at test.main(test.java:38)
So it looks like something is wrong with my NSS configuration. Because AFAIK DESede (3DES) is supported by the NSS library, but for some reason JAVA doesn�t see this algorithm implemented in NSS PKCS#11 provider.
Any suggestions on what am I doing wrong?
Best regards,
AlexWorks for me:
import java.security.Provider;
import java.security.SecureRandom;
import java.security.Security;
import javax.crypto.Cipher;
import javax.crypto.SecretKey;
import javax.crypto.SecretKeyFactory;
import javax.crypto.spec.DESedeKeySpec;
import javax.crypto.spec.IvParameterSpec;
public class Test
public static void main(String[] args)
try
String configFileName = "/nss/nss.cfg";
Provider nss = new sun.security.pkcs11.SunPKCS11(configFileName);
Security.addProvider(nss);
SecretKeyFactory keyFactory = SecretKeyFactory.getInstance("DESede", nss);
DESedeKeySpec keySpec = new DESedeKeySpec(new String("laKuf1Tcc6sOhsdPf49=m4es").getBytes("UTF-8"));
System.out.println("keyFactory provider: " + keyFactory.getProvider().getName());
SecretKey key = keyFactory.generateSecret(keySpec);
//iv for CBC mode - note, in practice you don't generate a random iv for decryption :)
byte[] iv = new byte[8]; //64-bit block size for 3DES
SecureRandom sr = SecureRandom.getInstance("PKCS11", nss);
sr.nextBytes(iv);
IvParameterSpec params = new IvParameterSpec(iv);
Cipher decryptCipher = Cipher.getInstance("DESede/CBC/NoPadding", nss);
decryptCipher.init(Cipher.DECRYPT_MODE, key, params);
System.out.println("decryptCipher provider: " + decryptCipher.getProvider().getName());
catch (Exception ex)
ex.printStackTrace();
}Oh, I wouldn't expect your key loading to work when you switch over to FIPS mode.
cfg file:
name = NSScrypto
nssLibraryDirectory = /nss
nssSecmodDirectory = /nss
nssModule = fipsYields the following error:
java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: Could not create key
because you can't directly handle keying material in FIPS. You'll have to save the secret key in the NSS certDB or generate a random one each time and send it wrapped to the other side. -
Hi ,
I have the following error while i am stopping a Weblogic instance. Did anyone face a similar issue, please let me know. I see a classnotfound error , but not sure what is that jar file. Is it a application jar or a weblogic one?
Stopping Weblogic Server...
Initializing WebLogic Scripting Tool (WLST) ...
log4j: Trying to find [resources/comdev/default-log4j.properties] using context classloader java.net.URLClassLoader@183f74d.
log4j: Using URL [jar:file:/teamrule/10.2/modules/com.bea.cie.comdev_5.3.0.0.jar!/resources/comdev/default-log4j.properties] for automatic log4j configuration.
log4j: Reading configuration from URL jar:file:/teamrule/10.2/modules/com.bea.cie.comdev_5.3.0.0.jar!/resources/comdev/default-log4j.properties
log4j: Hierarchy threshold set to [ALL].
log4j: Parsing for [root] with value=[INFO, NA].
log4j: Level token is [INFO].
log4j: Category root set to INFO
log4j: Parsing appender named "NA".
log4j: Parsed "NA" options.
log4j: Finished configuring.
Welcome to WebLogic Server Administration Scripting Shell
Type help() for help on available commands
Connecting to t3://localhost:7009 with userid weblogic ...
This Exception occurred at Sun Apr 10 14:17:03 UTC 2011.
javax.naming.CommunicationException [Root exception is java.rmi.UnmarshalException: failed to unmarshal class weblogic.security.acl.internal.AuthenticatedUser; nested excep
tion is:
java.lang.ClassNotFoundException: Failed to load class com.msl.security.providers.SessionPrincipal]
at weblogic.jndi.internal.ExceptionTranslator.toNamingException(ExceptionTranslator.java:74)
at weblogic.jndi.internal.ExceptionTranslator.toNamingException(ExceptionTranslator.java:32)
at weblogic.jndi.WLInitialContextFactoryDelegate.toNamingException(WLInitialContextFactoryDelegate.java:773)
at weblogic.jndi.WLInitialContextFactoryDelegate.pushSubject(WLInitialContextFactoryDelegate.java:673)
at weblogic.jndi.WLInitialContextFactoryDelegate.newContext(WLInitialContextFactoryDelegate.java:466)
at weblogic.jndi.WLInitialContextFactoryDelegate.getInitialContext(WLInitialContextFactoryDelegate.java:373)
... 48 more
Problem invoking WLST - Traceback (innermost last):
File "/web/10.2/user_projects/domains/dom/shutdown.py", line 1, in ?
File "<iostream>", line 22, in connect
WLSTException: 'Error occured while performing connect : Error getting the initial context. There is no server running at t3://localhost:7009 Use dumpStac
k() to view the full stacktrace'
Thanks a lot for your time.
ManishHi Manish,
It seems that you are using a custom security provider and the weblogic server is not able to find the class / jar file that contains the class.
java.lang.ClassNotFoundException: Failed to load class com.msl.security.providers.SessionPrincipal]
Make sure you have all the required jar files in the server classpath.
You can use the JarScan utility to find the jar that contains the class.
Refer the below link regarding the jarScan.
http://weblogic-wonders.com/weblogic/2011/01/26/finding-jar-files-using-jarscan/
Regards,
Anandraj
http://weblogic-wonders.com -
Hi,
I developed an ADF UIX application in JDeveloper 10.1.2. It works fine when I run on embedded oc4j in my machine.
I deployed it to Oracle Application Server 10g in AIX. When I run the application from the Application Server and try to open a uix page with data I get the following error:
500 Internal Server Error
java.lang.NoClassDefFoundError: sun/security/provider/Sun at oracle.jbo.common.ampool.PoolMgr.createPool(PoolMgr.java:280) at oracle.jbo.common.ampool.PoolMgr.findPool(PoolMgr.java:482) at oracle.jbo.common.ampool.ContextPoolManager.findPool(ContextPoolManager.java:165) at oracle.adf.model.bc4j.DataControlFactoryImpl.findOrCreateSessionCookie(DataControlFactoryImpl.java(Compiled Code)) at oracle.adf.model.bc4j.DataControlFactoryImpl.createSession(DataControlFactoryImpl.java(Compiled Code)) at oracle.adf.model.binding.DCDataControlReference.getDataControl(DCDataControlReference.java(Compiled Code)) at oracle.adf.model.BindingContext.get(BindingContext.java(Compiled Code)) at oracle.adf.model.binding.DCUtil.findSpelObject(DCUtil.java:228) at oracle.adf.model.binding.DCUtil.findContextObject(DCUtil.java:308) at oracle.adf.model.binding.DCIteratorBinding.<init>(DCIteratorBinding.java:127) at oracle.jbo.uicli.binding.JUIteratorBinding.<init>(JUIteratorBinding.java:59) at oracle.jbo.uicli.binding.JUIteratorDef.createIterBinding(JUIteratorDef.java:58) at oracle.jbo.uicli.binding.JUIteratorDef.createIterBinding(JUIteratorDef.java:47) at oracle.adf.model.binding.DCBindingContainerDef.createIterBindings(DCBindingContainerDef.java(Compiled Code)) at oracle.adf.model.binding.DCBindingContainerDef.createBindingContainer(DCBindingContainerDef.java(Compiled Code)) at oracle.adf.model.binding.DCBindingContainerReference.getBindingContainer(DCBindingContainerReference.java(Inlined Compiled Code)) at oracle.adf.model.BindingContext.get(BindingContext.java(Compiled Code)) at oracle.adf.model.binding.DCUtil.findSpelObject(DCUtil.java:228) at oracle.adf.model.binding.DCUtil.findContextObject(DCUtil.java:308) at oracle.adf.model.binding.DCUtil.findBindingContainer(DCUtil.java:536) at oracle.adf.controller.lifecycle.LifecycleContext.initialize(LifecycleContext.java:121) at oracle.adf.controller.lifecycle.LifecycleContext.initialize(LifecycleContext.java:77) at oracle.adf.controller.struts.actions.DataActionContext.initialize(DataActionContext.java:51) at oracle.adf.controller.struts.actions.DataAction.execute(DataAction.java:150) at org.apache.struts.action.RequestProcessor.processActionPerform(RequestProcessor.java:484) at org.apache.struts.action.RequestProcessor.process(RequestProcessor.java:274) at org.apache.struts.action.ActionServlet.process(ActionServlet.java:1482) at org.apache.struts.action.ActionServlet.doGet(ActionServlet.java:507) at javax.servlet.http.HttpServlet.service(HttpServlet.java(Compiled Code)) at javax.servlet.http.HttpServlet.service(HttpServlet.java(Compiled Code)) at com.evermind[Oracle Application Server Containers for J2EE 10g (10.1.2.0.2)].server.http.ResourceFilterChain.doFilter(ResourceFilterChain.java(Compiled Code)) at oracle.adf.model.servlet.ADFBindingFilter.doFilter(ADFBindingFilter.java(Compiled Code)) at com.evermind[Oracle Application Server Containers for J2EE 10g (10.1.2.0.2)].server.http.ServletRequestDispatcher.invoke(ServletRequestDispatcher.java(Compiled Code)) at com.evermind[Oracle Application Server Containers for J2EE 10g (10.1.2.0.2)].server.http.ServletRequestDispatcher.forwardInternal(ServletRequestDispatcher.java(Compiled Code)) at com.evermind[Oracle Application Server Containers for J2EE 10g (10.1.2.0.2)].server.http.HttpRequestHandler.processRequest(HttpRequestHandler.java(Compiled Code)) at com.evermind[Oracle Application Server Containers for J2EE 10g (10.1.2.0.2)].server.http.AJPRequestHandler.run(AJPRequestHandler.java(Compiled Code)) at com.evermind[Oracle Application Server Containers for J2EE 10g (10.1.2.0.2)].server.http.AJPRequestHandler.run(AJPRequestHandler.java(Compiled Code)) at com.evermind[Oracle Application Server Containers for J2EE 10g (10.1.2.0.2)].util.ReleasableResourcePooledExecutor$MyWorker.run(ReleasableResourcePooledExecutor.java(Compiled Code)) at java.lang.Thread.run(Thread.java:568)
Can anybody tell/help why I am getting this error?
Thanks
SyedI believe this counts to be a bug in adf. I met with such errors as well in migration 1012 from NT to AIX platform, and after decompiling adf jar code and tak a look at it, the following code block indicates that In class- oracle.jbo.client.Configuration
, it is hard coded to get secure provider- sun/security/provider/Sun, as listed below...
import sun.security.provider.Sun;
static void checkSecurityProviders()
Provider aprovider[] = Security.getProviders();
boolean flag = false;
for(int i = 0; i < aprovider.length; i++)
if(!aprovider.getName().equals("SUN"))
continue;
flag = true;
break;
if(!flag)
try
Sun sun = new Sun();
Security.addProvider(sun);
catch(Exception exception)
exception.printStackTrace();
Adam -
How to get domain name in java code/custom security provider
Hi all,
I've developed a custom security provider and deployed it in WL_HOME/server/lib/mbeantypes folder. I also have multiple domain created and running in the same machine. now if a user logs in from a specific domain, say, t3://localhost:7005, how do I retrieve the domain name in my custom security provider?
I found the following code could do it, but this code needs to know the port number in advance
Hashtable env = new Hashtable();
env.put(Context.PROVIDER_URL,"t3://localhost:7101");
env.put(Context.INITIAL_CONTEXT_FACTORY,
"weblogic.jndi.WLInitialContextFactory");
env.put(Context.SECURITY_PRINCIPAL,"weblogic");
env.put(Context.SECURITY_CREDENTIALS,"weblogic1");
Context ctx = new InitialContext(env);
MBeanHome home = (MBeanHome)ctx.lookup(MBeanHome.ADMIN_JNDI_NAME);
String domainName = home.getDomainName();
System.out.println(domainName);
Any help is greatly appreciated...
Thanks,
Philip
Edited by: VivaCuba on Nov 14, 2010 9:43 AMCheck out methods in the following classes: LegacyDirectoryLocator and DirectoryLocator.
Jonathan
http://jonathanhult.com -
[JavaPolicyProvider]: System Property [java.vendor => Sun Microsystems Inc.]
[JavaPolicyProvider]: System Property [oracle.deployed.app.ext => \-]
[JavaPolicyProvider]: System Property [sun.java.launcher => SUN_STANDARD]
[JavaPolicyProvider]: System Property [sun.management.compiler => HotSpot Client Compiler]
[JavaPolicyProvider]: System Property [java.security.debug => jpspolicy]
[JavaPolicyProvider]: System Property [oracle.core.ojdl.logging.usercontextprovider => oracle.core.ojdl.logging.impl.UserContextImpl]
[JavaPolicyProvider]: System Property [os.name => Windows 7]
[JavaPolicyProvider]: System Property [sun.boot.class.path => D:\ORACLE~1.6_M\JDK160~1\jre\lib\resources.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\rt.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\sunrsasign.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\jsse.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\jce.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\charsets.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\modules\jdk.boot.jar;D:\ORACLE~1.6_M\JDK160~1\jre\classes]
[JavaPolicyProvider]: System Property [sun.desktop => windows]
[JavaPolicyProvider]: System Property [java.vm.specification.vendor => Sun Microsystems Inc.]
[JavaPolicyProvider]: System Property [java.runtime.version => 1.6.0_24-b50]
[JavaPolicyProvider]: System Property [igf.arisidbeans.carmlloc => D:\JDevSys\SYSTEM~1.92_\DEFAUL~1\config\FMWCON~1\carml]
[JavaPolicyProvider]: System Property [oracle.domain.config.dir => D:\JDevSys\SYSTEM~1.92_\DEFAUL~1\config\FMWCON~1]
[JavaPolicyProvider]: System Property [weblogic.Name => DefaultServer]
[JavaPolicyProvider]: System Property [user.name => SudhanshuG]
[JavaPolicyProvider]: System Property [DebugOPSSPolicyLoading => true]
[JavaPolicyProvider]: System Property [java.naming.factory.initial => weblogic.jndi.WLInitialContextFactory]
[JavaPolicyProvider]: System Property [user.language => en]
[JavaPolicyProvider]: System Property [jrockit.optfile => D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.jrf_11.1.1\jrocket_optfile.txt]
[JavaPolicyProvider]: System Property [sun.boot.library.path => D:\ORACLE~1.6_M\JDK160~1\jre\bin]
[JavaPolicyProvider]: System Property [domain.home => D:\JDevSys\SYSTEM~1.92\DEFAUL~1]
[JavaPolicyProvider]: System Property [igf.arisidstack.home => D:\JDevSys\SYSTEM~1.92_\DEFAUL~1\config\FMWCON~1\arisidprovider]
[JavaPolicyProvider]: System Property [wlw.testConsole => ]
[JavaPolicyProvider]: System Property [wlw.iterativeDev => ]
[JavaPolicyProvider]: System Property [jps.combiner.optimize => true]
[JavaPolicyProvider]: System Property [jps.auth => ACC]
[JavaPolicyProvider]: System Property [java.version => 1.6.0_24]
[JavaPolicyProvider]: System Property [user.timezone => Asia/Calcutta]
[JavaPolicyProvider]: System Property [sun.arch.data.model => 32]
[JavaPolicyProvider]: System Property [javax.rmi.CORBA.UtilClass => weblogic.iiop.UtilDelegateImpl]
[JavaPolicyProvider]: System Property [java.endorsed.dirs => D:\ORACLE~1.6_M\JDK160~1\jre\lib\endorsed]
[JavaPolicyProvider]: System Property [vde.home => D:\JDevSys\system11.1.1.6.38.61.92\DefaultDomain\servers\DefaultServer\data\ldap]
[JavaPolicyProvider]: System Property [jps.combiner.optimize.lazyeval => true]
[JavaPolicyProvider]: System Property [sun.cpu.isalist => pentium_pro+mmx pentium_pro pentium+mmx pentium i486 i386 i86]
[JavaPolicyProvider]: System Property [sun.jnu.encoding => Cp1252]
[JavaPolicyProvider]: System Property [file.encoding.pkg => sun.io]
[JavaPolicyProvider]: System Property [wlw.logErrorsToConsole => ]
[JavaPolicyProvider]: System Property [file.separator => \]
[JavaPolicyProvider]: System Property [java.specification.name => Java Platform API Specification]
[JavaPolicyProvider]: System Property [java.class.version => 50.0]
[JavaPolicyProvider]: System Property [weblogic.home => D:\ORACLE~1.6_M\WLSERV~1.3\server]
[JavaPolicyProvider]: System Property [user.country => IN]
[JavaPolicyProvider]: System Property [java.home => D:\ORACLE~1.6_M\JDK160~1\jre]
[JavaPolicyProvider]: System Property [platform.home => D:\ORACLE~1.6_M\WLSERV~1.3]
[JavaPolicyProvider]: System Property [java.vm.info => mixed mode]
[JavaPolicyProvider]: System Property [os.version => 6.1]
[JavaPolicyProvider]: System Property [org.omg.CORBA.ORBSingletonClass => weblogic.corba.orb.ORB]
[JavaPolicyProvider]: System Property [path.separator => ;]
[JavaPolicyProvider]: System Property [java.vm.version => 19.1-b02]
[JavaPolicyProvider]: System Property [weblogic.alternateTypesDirectory => D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.ossoiap_11.1.1,D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.oamprovider_11.1.1]
[JavaPolicyProvider]: System Property [user.variant => ]
[JavaPolicyProvider]: System Property [java.protocol.handler.pkgs => oracle.mds.net.protocol|weblogic.net]
[JavaPolicyProvider]: System Property [oracle.deployed.app.dir => D:\JDevSys\SYSTEM~1.92\DEFAUL~1\servers\DefaultServer\tmp\_WL_user]
[JavaPolicyProvider]: System Property [wc.oracle.home => D:\Oracle_Jdev11.1.1.6_Middleware_Home\jdeveloper]
[JavaPolicyProvider]: System Property [java.awt.printerjob => sun.awt.windows.WPrinterJob]
[JavaPolicyProvider]: System Property [java.security.policy => D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\weblogic.policy]
[JavaPolicyProvider]: System Property [sun.io.unicode.encoding => UnicodeLittle]
[JavaPolicyProvider]: System Property [awt.toolkit => sun.awt.windows.WToolkit]
[JavaPolicyProvider]: System Property [weblogic.jdbc.remoteEnabled => false]
[JavaPolicyProvider]: System Property [weblogic.nodemanager.ServiceEnabled => true]
[JavaPolicyProvider]: System Property [java.naming.factory.url.pkgs => weblogic.jndi.factories:weblogic.corba.j2ee.naming.url:weblogic.jndi.factories:weblogic.corba.j2ee.naming.url]
[JavaPolicyProvider]: System Property [oracle.webcenter.tagging.scopeTags => false]
[JavaPolicyProvider]: System Property [user.home => C:\Users\SudhanshuG]
[JavaPolicyProvider]: System Property [wls.home => D:\ORACLE~1.6_M\WLSERV~1.3\server]
[JavaPolicyProvider]: System Property [java.specification.vendor => Sun Microsystems Inc.]
[JavaPolicyProvider]: System Property [oracle.server.config.dir => D:\JDevSys\SYSTEM~1.92_\DEFAUL~1\config\FMWCON~1\servers\DefaultServer]
[JavaPolicyProvider]: System Property [java.library.path => D:\ORACLE~1.6_M\JDK160~1\bin;.;C:\Windows\Sun\Java\bin;C:\Windows\system32;C:\Windows;D:\ORACLE~1.6_M\patch_wls1035\profiles\default\native;D:\ORACLE~1.6_M\patch_jdev1111\profiles\default\native;D:\ORACLE~1.6_M\WLSERV~1.3\server\native\win\32;D:\ORACLE~1.6_M\WLSERV~1.3\server\bin;D:\ORACLE~1.6_M\modules\ORGAPA~1.1\bin;D:\ORACLE~1.6_M\JDK160~1\jre\bin;D:\ORACLE~1.6_M\JDK160~1\bin;D:\oraclexe\app\oracle\product\10.2.0\server\bin;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Program Files\TortoiseSVN\bin;D:\ORACLE~1.6_M\WLSERV~1.3\server\native\win\32\oci920_8]
[JavaPolicyProvider]: System Property [java.vendor.url => http://java.sun.com/]
[JavaPolicyProvider]: System Property [jps.policystore.hybrid.mode => false]
[JavaPolicyProvider]: System Property [USE_JAAS => false]
[JavaPolicyProvider]: System Property [java.vm.vendor => Sun Microsystems Inc.]
[JavaPolicyProvider]: System Property [java.runtime.name => Java(TM) SE Runtime Environment]
[JavaPolicyProvider]: System Property [java.class.path => D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.jdbc_11.1.1\ojdbc6dms.jar;D:\ORACLE~1.6_M\patch_wls1035\profiles\default\sys_manifest_classpath\weblogic_patch.jar;D:\ORACLE~1.6_M\patch_jdev1111\profiles\default\sys_manifest_classpath\weblogic_patch.jar;D:\ORACLE~1.6_M\JDK160~1\lib\tools.jar;D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\weblogic_sp.jar;D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\weblogic.jar;D:\ORACLE~1.6_M\modules\features\weblogic.server.modules_10.3.5.0.jar;D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\webservices.jar;D:\ORACLE~1.6_M\modules\ORGAPA~1.1/lib/ant-all.jar;D:\ORACLE~1.6_M\modules\NETSFA~1.0_1/lib/ant-contrib.jar;D:\JDevSys\SYSTEM~1.92\DEFAUL~1\wcps-lib\derby-10.6.1.0.jar;D:\JDevSys\SYSTEM~1.92\DEFAUL~1\wcps-lib\derbytools-10.6.1.0.jar;D:\Oracle_Jdev11.1.1.6_Middleware_Home\jdeveloper\webcenter\modules\oracle.portlet.server_11.1.1\oracle-portlet-api.jar;D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.jrf_11.1.1\jrf.jar;D:\Oracle_Jdev11.1.1.6_Middleware_Home\jdeveloper\webcenter\modules\wcps_11.1.1.4.0\wcps-connection-mbeans.jar;D:\ORACLE~1.6_M\WLSERV~1.3\common\derby\lib\derbyclient.jar;D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\xqrl.jar]
[JavaPolicyProvider]: System Property [oracle.security.jps.config => D:\JDevSys\SYSTEM~1.92\DEFAUL~1\config\fmwconfig\jps-config.xml]
[JavaPolicyProvider]: System Property [java.vm.specification.name => Java Virtual Machine Specification]
[JavaPolicyProvider]: System Property [javax.rmi.CORBA.PortableRemoteObjectClass => weblogic.iiop.PortableRemoteObjectDelegateImpl]
[JavaPolicyProvider]: System Property [java.vm.specification.version => 1.0]
[JavaPolicyProvider]: System Property [sun.cpu.endian => little]
[JavaPolicyProvider]: System Property [sun.os.patch.level => Service Pack 1]
[JavaPolicyProvider]: System Property [portlet.oracle.home => D:\Oracle_Jdev11.1.1.6_Middleware_Home\jdeveloper]
[JavaPolicyProvider]: System Property [java.io.tmpdir => C:\Users\SUDHAN~1\AppData\Local\Temp\]
[JavaPolicyProvider]: System Property [jrf.version => 11.1.1]
[JavaPolicyProvider]: System Property [oracle.webcenter.analytics.disable-native-partitioning => false]
[JavaPolicyProvider]: System Property [java.vendor.url.bug => http://java.sun.com/cgi-bin/bugreport.cgi]
[JavaPolicyProvider]: System Property [jps.app.credential.overwrite.allowed => true]
[JavaPolicyProvider]: System Property [os.arch => x86]
[JavaPolicyProvider]: System Property [java.awt.graphicsenv => sun.awt.Win32GraphicsEnvironment]
[JavaPolicyProvider]: System Property [java.ext.dirs => D:\ORACLE~1.6_M\JDK160~1\jre\lib\ext;C:\Windows\Sun\Java\lib\ext]
[JavaPolicyProvider]: System Property [user.dir => D:\JDevSys\system11.1.1.6.38.61.92\DefaultDomain]
[JavaPolicyProvider]: System Property [common.components.home => D:\ORACLE~1.6_M\ORACLE~1]
[JavaPolicyProvider]: System Property [weblogic.ext.dirs => D:\ORACLE~1.6_M\patch_wls1035\profiles\default\sysext_manifest_classpath;D:\ORACLE~1.6_M\patch_jdev1111\profiles\default\sysext_manifest_classpath]
[JavaPolicyProvider]: System Property [wsm.repository.path => D:\JDevSys\SYSTEM~1.92\DEFAUL~1\oracle\store\gmds]
[JavaPolicyProvider]: System Property [line.separator =>
[JavaPolicyProvider]: System Property [java.vm.name => Java HotSpot(TM) Client VM]
[JavaPolicyProvider]: System Property [org.apache.commons.logging.Log => org.apache.commons.logging.impl.Jdk14Logger]
[JavaPolicyProvider]: System Property [weblogic.management.discover => true]
[JavaPolicyProvider]: System Property [org.omg.CORBA.ORBClass => weblogic.corba.orb.ORB]
[JavaPolicyProvider]: System Property [file.encoding => Cp1252]
[JavaPolicyProvider]: System Property [weblogic.classloader.preprocessor => weblogic.diagnostics.instrumentation.DiagnosticClassPreProcessor]
[JavaPolicyProvider]: System Property [java.specification.version => 1.6]
[JavaPolicyProvider]: System Property [javax.net.ssl.trustStore => D:\Oracle_Jdev11.1.1.6_Middleware_Home\wlserver_10.3\server\lib\DemoTrust.jks]
policy: reading file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/lib/weblogic.policy
java.lang.IllegalArgumentException: null KeyStore name
at sun.security.util.PolicyUtil.getKeyStore(PolicyUtil.java:65)
at sun.security.provider.PolicyFile.init(PolicyFile.java:635)
at sun.security.provider.PolicyFile.access$400(PolicyFile.java:266)
at sun.security.provider.PolicyFile$3.run(PolicyFile.java:546)
at java.security.AccessController.doPrivileged(Native Method)
at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:519)
at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:505)
at sun.security.provider.PolicyFile.init(PolicyFile.java:464)
at sun.security.provider.PolicyFile.<init>(PolicyFile.java:309)
at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
at java.lang.Class.newInstance0(Class.java:355)
at java.lang.Class.newInstance(Class.java:308)
at java.security.Policy.getPolicyNoCheck(Policy.java:167)
at java.security.ProtectionDomain.implies(ProtectionDomain.java:224)
at java.security.AccessControlContext.checkPermission(AccessControlContext.java:352)
at java.security.AccessController.checkPermission(AccessController.java:546)
at oracle.security.jps.util.JpsAuth$AuthorizationMechanism$3.checkPermission(JpsAuth.java:458)
at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:518)
at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:544)
at oracle.security.jps.internal.credstore.util.CsfUtil.checkPermission(CsfUtil.java:643)
at oracle.security.jps.internal.credstore.ssp.SspCredentialStore.containsCredential(SspCredentialStore.java:320)
at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:176)
at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:174)
at java.security.AccessController.doPrivileged(Native Method)
at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.CsContainsHash(FileKeyStoreIntegrityChecker.java:174)
at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.<init>(FileKeyStoreIntegrityChecker.java:81)
at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.<init>(FileKeyStoreManager.java:165)
at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.getInstance(FileKeyStoreManager.java:146)
at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.doInit(FileKeyStoreServiceImpl.java:95)
at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:76)
at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:66)
at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:157)
at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:64)
at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.findServiceInstance(ContextFactoryImpl.java:139)
at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:170)
at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:191)
at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:132)
at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:127)
at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2827)
at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2821)
at java.security.AccessController.doPrivileged(Native Method)
at oracle.security.jps.internal.policystore.PolicyUtil.getDefaultPDPService(PolicyUtil.java:2821)
at oracle.security.jps.internal.policystore.PolicyUtil.getPDPService(PolicyUtil.java:3097)
at oracle.security.jps.internal.policystore.PolicyDelegationController.<init>(PolicyDelegationController.java:164)
at oracle.security.jps.internal.policystore.JavaPolicyProvider.<init>(JavaPolicyProvider.java:369)
at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
at java.lang.Class.newInstance0(Class.java:355)
at java.lang.Class.newInstance(Class.java:308)
at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.loadOPSSPolicy(CommonSecurityServiceManagerDelegateImpl.java:1339)
at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.initialize(CommonSecurityServiceManagerDelegateImpl.java:1018)
at weblogic.security.service.SecurityServiceManager.initialize(SecurityServiceManager.java:873)
at weblogic.security.SecurityService.start(SecurityService.java:141)
at weblogic.t3.srvr.SubsystemRequest.run(SubsystemRequest.java:64)
at weblogic.work.ExecuteThread.execute(ExecuteThread.java:209)
at weblogic.work.ExecuteThread.run(ExecuteThread.java:178)
policy: Adding policy entry:
policy: signedBy null
policy: codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/lib/-
policy: (java.security.AllPermission <all permissions> <all actions>)
policy:
policy: Adding policy entry:
policy: signedBy null
policy: codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/../modules/-
policy: (java.security.AllPermission <all permissions> <all actions>)
policy:
policy: Adding policy entry:
policy: signedBy null
policy: codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/ext/-
policy: (java.security.AllPermission <all permissions> <all actions>)
policy:
policy: Adding policy entry:
policy: signedBy null
policy: codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/lib/ext/*
policy: (java.security.AllPermission <all permissions> <all actions>)
policy:
policy: Adding policy entry:
policy: signedBy null
policy: codeBase file:D:/ORACLE~1.6_M/patch_wls1035/profiles/default/sysext_manifest_classpath%3bD:/ORACLE~1.6_M/patch_jdev1111/profiles/default/sysext_manifest_classpath/*
policy: (java.security.AllPermission <all permissions> <all actions>)
policy:
policy: Adding policy entry:
policy: signedBy null
policy: codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/eval/pointbase/lib/-
policy: (java.security.AllPermission <all permissions> <all actions>)
policy:
policy: Adding policy entry:
policy: signedBy null
policy: codeBase file:D:/ORACLE~1.6_M/ORACLE~1/modules/oracle.jps_11.1.1/*
policy: (java.security.AllPermission <all permissions> <all actions>)
policy:
policy: Adding policy entry:
policy: signedBy null
policy: codeBase file:D:/ORACLE~1.6_M/ORACLE~1/modules/oracle.pki_11.1.1/*
policy: (java.security.AllPermission <all permissions> <all actions>)
policy:
policy: Adding policy entry:
policy: signedBy null
policy: codeBase file:/weblogic/application/defaults/EJB
policy: (java.lang.RuntimePermission queuePrintJob)
policy: (java.net.SocketPermission * connect,resolve)
policy: (java.util.PropertyPermission * read)
policy: (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\- read)
policy: (java.lang.management.ManagementPermission control)
policy:
policy: Adding policy entry:
policy: signedBy null
policy: codeBase file:/weblogic/application/defaults/Web
policy: (java.lang.RuntimePermission loadLibrary)
policy: (java.lang.RuntimePermission queuePrintJob)
policy: (java.net.SocketPermission * connect,resolve)
policy: (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\- read,write)
policy: (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\..\- read)
policy: (java.util.PropertyPermission * read)
policy: (java.lang.management.ManagementPermission control)
policy:
policy: Adding policy entry:
policy: signedBy null
policy: codeBase file:/weblogic/application/defaults/Connector
policy: (java.net.SocketPermission * connect,resolve)
policy: (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\- read,write)
policy: (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\..\- read)
policy: (java.util.PropertyPermission * read)
policy: (java.lang.management.ManagementPermission control)
policy:
policy: Adding policy entry:
policy: signedBy null
policy: codeBase file:/D:/ORACLE~1.6_M/JDK160~1/jre/lib/ext/*
policy: (java.security.AllPermission <all permissions> <all actions>)
policy:
policy: Adding policy entry:
policy: signedBy null
policy: codeBase file:/C:/Windows/Sun/Java/lib/ext/*
policy: (java.security.AllPermission <all permissions> <all actions>)
policy:
policy: Adding policy entry:
policy: signedBy null
policy: codeBase file:D:/ORACLE~1.6_M/JDK160~1/jre/lib/ext/*
policy: (java.security.AllPermission <all permissions> <all actions>)
policy:
policy: Adding policy entry:
policy: signedBy null
policy: codeBase null
policy: weblogic.security.principal.WLSGroupImpl/Administrators
policy: (javax.management.MBeanPermission * addNotificationListener)
policy: (javax.management.MBeanPermission * removeNotificationListener)
policy:
policy: Adding policy entry:
policy: signedBy null
policy: codeBase null
policy: weblogic.security.principal.WLSGroupImpl/Deployers
policy: (javax.management.MBeanPermission * addNotificationListener)
policy: (javax.management.MBeanPermission * removeNotificationListener)
policy:
policy: Adding policy entry:
policy: signedBy null
policy: codeBase null
policy: weblogic.security.principal.WLSGroupImpl/Operators
policy: (javax.management.MBeanPermission * addNotificationListener)
policy: (javax.management.MBeanPermission * removeNotificationListener)
policy:
policy: Adding policy entry:
policy: signedBy null
policy: codeBase null
policy: weblogic.security.principal.WLSGroupImpl/Monitors
policy: (javax.management.MBeanPermission * addNotificationListener)
policy: (javax.management.MBeanPermission * removeNotificationListener)
policy:
policy: Adding policy entry:
policy: signedBy null
policy: codeBase null
policy: weblogic.security.principal.WLSKernelIdentity/*
policy: (javax.management.MBeanPermission * addNotificationListener)
policy: (javax.management.MBeanPermission * removeNotificationListener)
policy:
policy: Adding policy entry:
policy: signedBy null
policy: codeBase null
policy: (java.util.PropertyPermission java.version read)
policy: (java.util.PropertyPermission java.vendor read)
policy: (java.util.PropertyPermission java.vendor.url read)
policy: (java.util.PropertyPermission java.class.version read)
policy: (java.util.PropertyPermission os.name read)
policy: (java.util.PropertyPermission os.version read)
policy: (java.util.PropertyPermission os.arch read)
policy: (java.util.PropertyPermission file.separator read)
policy: (java.util.PropertyPermission path.separator read)
policy: (java.util.PropertyPermission line.separator read)
policy: (java.util.PropertyPermission java.specification.version read)
policy: (java.util.PropertyPermission java.specification.vendor read)
policy: (java.util.PropertyPermission java.specification.name read)
policy: (java.util.PropertyPermission java.vm.specification.version read)
policy: (java.util.PropertyPermission java.vm.specification.vendor read)
policy: (java.util.PropertyPermission java.vm.specification.name read)
policy: (java.util.PropertyPermission java.vm.version read)
policy: (java.util.PropertyPermission java.vm.vendor read)
policy: (java.util.PropertyPermission java.vm.name read)
policy:
policy: reading file:/D:/ORACLE~1.6_M/JDK160~1/jre/lib/security/java.policy
java.lang.IllegalArgumentException: null KeyStore name
at sun.security.util.PolicyUtil.getKeyStore(PolicyUtil.java:65)
at sun.security.provider.PolicyFile.init(PolicyFile.java:635)
at sun.security.provider.PolicyFile.access$400(PolicyFile.java:266)
at sun.security.provider.PolicyFile$3.run(PolicyFile.java:587)
at java.security.AccessController.doPrivileged(Native Method)
at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:519)
at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:505)
at sun.security.provider.PolicyFile.init(PolicyFile.java:464)
at sun.security.provider.PolicyFile.<init>(PolicyFile.java:309)
at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
at java.lang.Class.newInstance0(Class.java:355)
at java.lang.Class.newInstance(Class.java:308)
at java.security.Policy.getPolicyNoCheck(Policy.java:167)
at java.security.ProtectionDomain.implies(ProtectionDomain.java:224)
at java.security.AccessControlContext.checkPermission(AccessControlContext.java:352)
at java.security.AccessController.checkPermission(AccessController.java:546)
at oracle.security.jps.util.JpsAuth$AuthorizationMechanism$3.checkPermission(JpsAuth.java:458)
at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:518)
at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:544)
at oracle.security.jps.internal.credstore.util.CsfUtil.checkPermission(CsfUtil.java:643)
at oracle.security.jps.internal.credstore.ssp.SspCredentialStore.containsCredential(SspCredentialStore.java:320)
at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:176)
at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:174)
at java.security.AccessController.doPrivileged(Native Method)
at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.CsContainsHash(FileKeyStoreIntegrityChecker.java:174)
at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.<init>(FileKeyStoreIntegrityChecker.java:81)
at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.<init>(FileKeyStoreManager.java:165)
at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.getInstance(FileKeyStoreManager.java:146)
at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.doInit(FileKeyStoreServiceImpl.java:95)
at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:76)
at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:66)
at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:157)
at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:64)
at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.findServiceInstance(ContextFactoryImpl.java:139)
at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:170)
at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:191)
at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:132)
at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:127)
at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2827)
at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2821)
at java.security.AccessController.doPrivileged(Native Method)
at oracle.security.jps.internal.policystore.PolicyUtil.getDefaultPDPService(PolicyUtil.java:2821)
at oracle.security.jps.internal.policystore.PolicyUtil.getPDPService(PolicyUtil.java:3097)
at oracle.security.jps.internal.policystore.PolicyDelegationController.<init>(PolicyDelegationController.java:164)
at oracle.security.jps.internal.policystore.JavaPolicyProvider.<init>(JavaPolicyProvider.java:369)
at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
at java.lang.Class.newInstance0(Class.java:355)
at java.lang.Class.newInstance(Class.java:308)
at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.loadOPSSPolicy(CommonSecurityServiceManagerDelegateImpl.java:1339)
at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.initialize(CommonSecurityServiceManagerDelegateImpl.java:1018)
at weblogic.security.service.SecurityServiceManager.initialize(SecurityServiceManager.java:873)
at weblogic.security.SecurityService.start(SecurityService.java:141)
at weblogic.t3.srvr.SubsystemRequest.run(SubsystemRequest.java:64)
at weblogic.work.ExecuteThread.execute(ExecuteThread.java:209)
at weblogic.work.ExecuteThread.run(ExecuteThread.java:178)
policy: Adding policy entry:
policy: signedBy null
policy: codeBase file:/D:/ORACLE~1.6_M/JDK160~1/jre/lib/ext/*
policy: (java.security.AllPermission <all permissions> <all actions>)
policy:
policy: Adding policy entry:
policy: signedBy null
policy: codeBase file:/C:/Windows/Sun/Java/lib/ext/*
policy: (java.security.AllPermission <all permissions> <all actions>)
policy:
policy: Adding policy entry:
policy: signedBy null
policy: codeBase null
policy: (java.lang.RuntimePermission stopThread)
policy: (java.net.SocketPermission localhost:1024- listen,resolve)
policy: (java.util.PropertyPermission java.version read)
policy: (java.util.PropertyPermission java.vendor read)
policy: (java.util.PropertyPermission java.vendor.url read)
policy: (java.util.PropertyPermission java.class.version read)
policy: (java.util.PropertyPermission os.name read)
policy: (java.util.PropertyPermission os.version read)
policy: (java.util.PropertyPermission os.arch read)
policy: (java.util.PropertyPermission file.separator read)
policy: (java.util.PropertyPermission path.separator read)
policy: (java.util.PropertyPermission line.separator read)
policy: (java.util.PropertyPermission java.specification.version read)
policy: (java.util.PropertyPermission java.specification.vendor read)
policy: (java.util.PropertyPermission java.specification.name read)
policy: (java.util.PropertyPermission java.vm.specification.version read)
policy: (java.util.PropertyPermission java.vm.specification.vendor read)
policy: (java.util.PropertyPermission java.vm.specification.name read)
policy: (java.util.PropertyPermission java.vm.version read)
policy: (java.util.PropertyPermission java.vm.vendor read)
policy: (java.util.PropertyPermission java.vm.name read)
policy:
policy: reading file:/C:/Users/SudhanshuG/.java.policy
policy: error parsing file:/C:/Users/SudhanshuG/.java.policy
policy: java.io.FileNotFoundException: C:\Users\SudhanshuG\.java.policy (The system cannot find the file specified)
java.io.FileNotFoundException: C:\Users\SudhanshuG\.java.policy (The system cannot find the file specified)
at java.io.FileInputStream.open(Native Method)
at java.io.FileInputStream.<init>(FileInputStream.java:106)
at java.io.FileInputStream.<init>(FileInputStream.java:66)
at sun.security.util.PolicyUtil.getInputStream(PolicyUtil.java:43)
at sun.security.provider.PolicyFile.init(PolicyFile.java:626)
at sun.security.provider.PolicyFile.access$400(PolicyFile.java:266)
at sun.security.provider.PolicyFile$3.run(PolicyFile.java:587)
at java.security.AccessController.doPrivileged(Native Method)
at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:519)
at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:505)
at sun.security.provider.PolicyFile.init(PolicyFile.java:464)
at sun.security.provider.PolicyFile.<init>(PolicyFile.java:309)
at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
at java.lang.Class.newInstance0(Class.java:355)
at java.lang.Class.newInstance(Class.java:308)
at java.security.Policy.getPolicyNoCheck(Policy.java:167)
at java.security.ProtectionDomain.implies(ProtectionDomain.java:224)
at java.security.AccessControlContext.checkPermission(AccessControlContext.java:352)
at java.security.AccessController.checkPermission(AccessController.java:546)
at oracle.security.jps.util.JpsAuth$AuthorizationMechanism$3.checkPermission(JpsAuth.java:458)
at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:518)
at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:544)
at oracle.security.jps.internal.credstore.util.CsfUtil.checkPermission(CsfUtil.java:643)
at oracle.security.jps.internal.credstore.ssp.SspCredentialStore.containsCredential(SspCredentialStore.java:320)
at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:176)
at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:174)
at java.security.AccessController.doPrivileged(Native Method)
at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.CsContainsHash(FileKeyStoreIntegrityChecker.java:174)
at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.<init>(FileKeyStoreIntegrityChecker.java:81)
at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.<init>(FileKeyStoreManager.java:165)
at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.getInstance(FileKeyStoreManager.java:146)
at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.doInit(FileKeyStoreServiceImpl.java:95)
at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:76)
at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:66)
at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:157)
at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:64)
at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.findServiceInstance(ContextFactoryImpl.java:139)
at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:170)
at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:191)
at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:132)
at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:127)
at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2827)
at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2821)
at java.security.AccessController.doPrivileged(Native Method)
at oracle.security.jps.internal.policystore.PolicyUtil.getDefaultPDPService(PolicyUtil.java:2821)
at oracle.security.jps.internal.policystore.PolicyUtil.getPDPService(PolicyUtil.java:3097)
at oracle.security.jps.internal.policystore.PolicyDelegationController.<init>(PolicyDelegationController.java:164)
at oracle.security.jps.internal.policystore.JavaPolicyProvider.<init>(JavaPolicyProvider.java:369)
at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
at java.lang.Class.newInstance0(Class.java:355)
at java.lang.Class.newInstance(Class.java:308)
at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.loadOPSSPolicy(CommonSecurityServiceManagerDelegateImpl.java:1339)
at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.initialize(CommonSecurityServiceManagerDelegateImpl.java:1018)
at weblogic.security.service.SecurityServiceManager.initialize(SecurityServiceManager.java:873)
at weblogic.security.SecurityService.start(SecurityService.java:141)
at weblogic.t3.srvr.SubsystemRequest.run(SubsystemRequest.java:64)
at weblogic.work.ExecuteThread.execute(ExecuteThread.java:209)
at weblogic.work.ExecuteThread.run(ExecuteThread.java:178)
policy: getPermissions:
PD CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
PD ClassLoader: sun.misc.Launcher$AppClassLoader@1172e08
PD Principals: <no principals>
policy: evaluate codesources:
Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/lib/- <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/modules/- <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/ext/- <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/lib/ext/* <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/patch_wls1035/profiles/default/sysext_manifest_classpath%3bD:/ORACLE~1.6_M/patch_jdev1111/profiles/default/sysext_manifest_classpath/* <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/eval/pointbase/lib/- <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/* <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
policy: evaluate principals:
Policy Principals: []
Active Principals: []
policy: granting (java.security.AllPermission <all permissions> <all actions>)
policy: evaluation (codesource/principals) passed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.pki_11.1.1/* <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/weblogic/application/defaults/EJB <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/weblogic/application/defaults/Web <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/weblogic/application/defaults/Connector <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/C:/Windows/Sun/Java/lib/ext/* <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (null <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
policy: evaluate principals:
Policy Principals: [weblogic.security.principal.WLSGroupImpl/Administrators]
Active Principals: []
policy: evaluation (principals) failed
policy: evaluate codesources:
Policy CodeSource: (null <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
policy: evaluate principals:
Policy Principals: [weblogic.security.principal.WLSGroupImpl/Deployers]
Active Principals: []
policy: evaluation (principals) failed
policy: evaluate codesources:
Policy CodeSource: (null <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
policy: evaluate principals:
Policy Principals: [weblogic.security.principal.WLSGroupImpl/Operators]
Active Principals: []
policy: evaluation (principals) failed
policy: evaluate codesources:
Policy CodeSource: (null <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
policy: evaluate principals:
Policy Principals: [weblogic.security.principal.WLSGroupImpl/Monitors]
Active Principals: []
policy: evaluation (principals) failed
policy: evaluate codesources:
Policy CodeSource: (null <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
policy: evaluate principals:
Policy Principals: [weblogic.security.principal.WLSKernelIdentity/*]
Active Principals: []
policy: evaluation (principals) failed
policy: evaluate codesources:
Policy CodeSource: (null <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
policy: evaluate principals:
Policy Principals: []
Active Principals: []
policy: granting (java.util.PropertyPermission java.version read)
policy: granting (java.util.PropertyPermission java.vendor read)
policy: granting (java.util.PropertyPermission java.vendor.url read)
policy: granting (java.util.PropertyPermission java.class.version read)
policy: granting (java.util.PropertyPermission os.name read)
policy: granting (java.util.PropertyPermission os.version read)
policy: granting (java.util.PropertyPermission os.arch read)
policy: granting (java.util.PropertyPermission file.separator read)
policy: granting (java.util.PropertyPermission path.separator read)
policy: granting (java.util.PropertyPermission line.separator read)
policy: granting (java.util.PropertyPermission java.specification.version read)
policy: granting (java.util.PropertyPermission java.specification.vendor read)
policy: granting (java.util.PropertyPermission java.specification.name read)
policy: granting (java.util.PropertyPermission java.vm.specification.version read)
policy: granting (java.util.PropertyPermission java.vm.specification.vendor read)
policy: granting (java.util.PropertyPermission java.vm.specification.name read)
policy: granting (java.util.PropertyPermission java.vm.version read)
policy: granting (java.util.PropertyPermission java.vm.vendor read)
policy: granting (java.util.PropertyPermission java.vm.name read)
policy: evaluation (codesource/principals) passed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/C:/Windows/Sun/Java/lib/ext/* <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (null <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
policy: evaluate principals:
Policy Principals: []
Active Principals: []
policy: granting (java.lang.RuntimePermission stopThread)
policy: granting (java.net.SocketPermission localhost:1024- listen,resolve)
policy: granting (java.util.PropertyPermission java.version read)
policy: granting (java.util.PropertyPermission java.vendor read)
policy: granting (java.util.PropertyPermission java.vendor.url read)
policy: granting (java.util.PropertyPermission java.class.version read)
policy: granting (java.util.PropertyPermission os.name read)
policy: granting (java.util.PropertyPermission os.version read)
policy: granting (java.util.PropertyPermission os.arch read)
policy: granting (java.util.PropertyPermission file.separator read)
policy: granting (java.util.PropertyPermission path.separator read)
policy: granting (java.util.PropertyPermission line.separator read)
policy: granting (java.util.PropertyPermission java.specification.version read)
policy: granting (java.util.PropertyPermission java.specification.vendor read)
policy: granting (java.util.PropertyPermission java.specification.name read)
policy: granting (java.util.PropertyPermission java.vm.specification.version read)
policy: granting (java.util.PropertyPermission java.vm.specification.vendor read)
policy: granting (java.util.PropertyPermission java.vm.specification.name read)
policy: granting (java.util.PropertyPermission java.vm.version read)
policy: granting (java.util.PropertyPermission java.vm.vendor read)
policy: granting (java.util.PropertyPermission java.vm.name read)
policy: evaluation (codesource/principals) passed
policy: getPermissions:
PD CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
PD ClassLoader: sun.misc.Launcher$AppClassLoader@1172e08
PD Principals: <no principals>
policy: evaluate codesources:
Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/lib/- <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/modules/- <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/ext/- <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/lib/ext/* <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/patch_wls1035/profiles/default/sysext_manifest_classpath%3bD:/ORACLE~1.6_M/patch_jdev1111/profiles/default/sysext_manifest_classpath/* <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/eval/pointbase/lib/- <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/* <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
policy: evaluate principals:
Policy Principals: []
Active Principals: []
policy: granting (java.security.AllPermission <all permissions> <all actions>)
policy: evaluation (codesource/principals) passed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.pki_11.1.1/* <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/weblogic/application/defaults/EJB <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/weblogic/application/defaults/Web <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/weblogic/application/defaults/Connector <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/C:/Windows/Sun/Java/lib/ext/* <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
policy: evaluation (codesource) failed
policy: evaluate codesources:
Policy CodeSource: (null <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
policy: evaluate principals:
Policy Principals: [weblogic.security.principal.WLSGroupImpl/Administrators]
Active Principals: []
policy: evaluation (principals) failed
policy: evaluate codesources:
Policy CodeSource: (null <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
policy: evaluate principals:
Policy Principals: [weblogic.security.principal.WLSGroupImpl/Deployers]
Active Principals: []
policy: evaluation (principals) failed
policy: evaluate codesources:
Policy CodeSource: (null <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
policy: evaluate principals:
Policy Principals: [weblogic.security.principal.WLSGroupImpl/Operators]
Active Principals: []
policy: evaluation (principals) failed
policy: evaluate codesources:
Policy CodeSource: (null <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
policy: evaluate principals:
Policy Principals: [weblogic.security.principal.WLSGroupImpl/Monitors]
Active Principals: []
policy: evaluation (principals) failed
policy: evaluate codesources:
Policy CodeSource: (null <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
policy: evaluate principals:
Policy Principals: [weblogic.security.principal.WLSKernelIdentity/*]
Active Principals: []
policy: evaluation (principals) failed
policy: evaluate codesources:
Policy CodeSource: (null <no signer certificates>)
Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
policy: evaluate principals:
Policy Principals: []
Active Principals: []
policy: granting (java.util.PropertyPermission java.version read)
policy: granting (java.util.PropertyPermission java.vendor read)
policy: granting (java.util.PropertyPermission java.vendor.url read)
policy: granting (java.util.PropertyPermission java.class.version read)
policy: granting (java.util.PropertyPermission os.name read)
policy: granting (java.util.PropertyPermission os.version read)
policy: granting (java.util.PropertyPermission os.arch read)
policy: granting (java.util.PropertyPermission file.separator read)
policy: granting (java.util.PropertyPermission path.separator read)
policy: granting (java.util.PropertyPermission line.separator read)
policy: granting (java.util.PropertyPermission java.specification.version read)
policy: granting (java.util.PropertyPermission java.specification.vendor read)
policy: granting (java.util.PropertyPermission java.specification.name read)
policy: granting (java.util.PropertyPermission java.vm.specification.version read)
policy: granting (java.util.PropertyPermission java.vm.specification.vendor read)
policy: granting (java.util.PropertyPermission java.vm.specification.name read)
policy: granting (java.util.PropertyPermission java.vm.version read)
policy: granting (java.util.PropertyPermission java.vm.vendor read)
policy: granting (java.util.PropertyPermission java.vm.name read)
policy: evaluation (codesource/principals) passed
policy: evaluate codesourcesHi,
Your issue is something similar to the issue described in below metalink id. Please check below metalink id, you issue may be resolved.
Start OMS failed with "javax.xml.stream.XMLStreamException: Premature end of file encountered" [ID 1481158.1]
Mark if this helps you.
Regards,
Kishore -
Custom security provider exception
Good day, colleagues. I want to raise an old topic.
I use custom security provider exceptions:
-AccountExpiredException
-AccountLockedException
However, the login() method only captures FailedLoginException
try
CallbackHandler pwcall = new weblogic.security.URLCallbackHandler(user, pass.getBytes("UTF-8"));
subject = weblogic.security.services.Authentication.login(pwcall);
weblogic.servlet.security.ServletAuthentication.runAs(subject, request);
catch (javax.security.auth.login.LoginException e) {
e.printStackTrace();
javax.security.auth.login.FailedLoginException: [Security:090304]Authentication Failed: User ...
at weblogic.security.providers.authentication.LDAPAtnLoginModuleImpl.login(LDAPAtnLoginModuleImpl.java:240)
at com.bea.common.security.internal.service.LoginModuleWrapper$1.run(LoginModuleWrapper.java:110)
at java.security.AccessController.doPrivileged(Native Method)
I found similar questions IdentityAssertion custom exception, FailedLoginException asked many years ago for WLS 9.2
Their solution (wlp.propogate.login.exception.cause=true) does not work for WLS 10.3.
How to propagate original LoginException?
Or exception message only.I did it! look closely to source code:
javax.security.auth.login.LoginContext:875
if (moduleStack[i].entry.getControlFlag() == AppConfigurationEntry.LoginModuleControlFlag.REQUISITE) {
// if REQUISITE, then immediately throw an exception
if (methodName.equals(ABORT_METHOD) || methodName.equals(LOGOUT_METHOD)) {
if (firstRequiredError == null)
firstRequiredError = le;
} else {
throwException(firstRequiredError, le);
} else if (moduleStack[i].entry.getControlFlag() == AppConfigurationEntry.LoginModuleControlFlag.REQUIRED) {
// mark down that a REQUIRED module failed
if (firstRequiredError == null)
firstRequiredError = le;
} else {
// mark down that an OPTIONAL module failed
if (firstError == null)
firstError = le;
javax.security.auth.login.LoginContext:922
// we went thru all the LoginModules.
if (firstRequiredError != null) {
// a REQUIRED module failed -- return the error
throwException(firstRequiredError, null);
} else if (success == false && firstError != null) {
// no module succeeded -- return the first error
throwException(firstError, null);
} else...
I set Control flag: OPTION to DefaultAuth (was REQUIRED)
and order it after my LoginModule. (restart required!)
Now I catch my exceptions %) -
Security Provider for a web dynpro with tool Visual Administrator
Hello all,
after deploying successfully my web dynpro on the J2EE 7.0 WAS, I'm trying to set up authentication to it but I cannot find my applicaiton in the list of policy configurations of the Security Provider entry. When I try to add the path to my local web dynpro, the engine doesn't find it.
I have noticed that all other policy configurations reference a servlet_jsp application. Should I transform my web dynpro into a servlet_jsp? How do I do that?
Thanks for your input,
Tanguy MezzanoHello Marcel,
in fact, I don't succeed to redeploy with another provider name... I have undeployed my webdynpro with SDM on the Java stack, but from NWDS, when I change the application-j2ee-engine.xml and application.xml files, and that I rebuild the webdynpro, when I run and deploy, it always redeploys under the former provider: local.
When I create the application, I tell to use the existing component, should I select create a new one, but that means that I have to rebuild the whole application.
Will then the webdynpro be in the Security Provider list, so that I can configure it with http header?
Thx for your help,
Tanguy -
Access denied to a security provider on a signed applet
Hi,
I'm having permissions problems to work with a security provider.
The security provider is already installed at java.security. In fact, at Netbeans when debbuging the app it's working perfectly.
If I'm working the provider in an signed applet, then there are errors.
Even, I have created a .jar file and I have saved in the /ext directory, wich by default in the java.policy file has got all security permissions.
grant codeBase "file:${{java.ext.dirs}}/*" {
permission java.security.AllPermission;
Even with these granted permissions, I'm getting problems to work with the security provider that I have installed. Also, with these permissions I should be able to install the security provider.
log:
<record>
<date>2012-03-13T12:13:39</date>
<millis>1331637219126</millis>
<sequence>17</sequence>
<logger>appletpdf.appletPdf</logger>
<level>SEVERE</level>
<class>appletpdf.appletPdf</class>
<method>applTest</method>
<thread>11</thread>
<message>excepcion: {0} </message>
<exception>
<message>java.security.AccessControlException: access denied (java.security.SecurityPermission authProvider.SunPKCS11-Provider-name)</message>
<frame>
<class>java.security.AccessControlContext</class>
<method>checkPermission</method>
<line>393</line>
</frame>
<frame>
<class>java.security.AccessController</class>
<method>checkPermission</method>
<line>553</line>
</frame>
<frame>
<class>java.lang.SecurityManager</class>
<method>checkPermission</method>
<line>549</line>
</frame>
<frame>
<class>net.sourceforge.jnlp.runtime.JNLPSecurityManager</class>
<method>checkPermission</method>
<line>250</line>
</frame>
<frame>
<class>sun.security.pkcs11.SunPKCS11</class>
<method>login</method>
<line>1036</line>
</frame>
<frame>
<class>sun.security.pkcs11.P11KeyStore</class>
<method>login</method>
<line>874</line>
</frame>
<frame>
<class>sun.security.pkcs11.P11KeyStore</class>
<method>engineLoad</method>
<line>764</line>
</frame>
<frame>
<class>java.security.KeyStore</class>
<method>load</method>
<line>1201</line>
</frame>
<frame>
<class>apppdf.appPdf</class>
<method>tPKCS11</method>
<line>174</line>
</frame>
<frame>
<class>appletpdf.appletPdf</class>
<method>applTest</method>
<line>137</line>
</frame>
<frame>
<class>appletpdf.appletPdf</class>
<method>initapplDPdf</method>
<line>116</line>
</frame>
<frame>
<class>sun.reflect.NativeMethodAccessorImpl</class>
<method>invoke0</method>
</frame>
<frame>
<class>sun.reflect.NativeMethodAccessorImpl</class>
<method>invoke</method>
<line>57</line>
</frame>
<frame>
<class>sun.reflect.DelegatingMethodAccessorImpl</class>
<method>invoke</method>
<line>43</line>
</frame>
<frame>
<class>java.lang.reflect.Method</class>
<method>invoke</method>
<line>616</line>
</frame>
<frame>
<class>sun.applet.PluginAppletSecurityContext$4</class>
<method>run</method>
<line>699</line>
</frame>
<frame>
<class>java.security.AccessController</class>
<method>doPrivileged</method>
</frame>
<frame>
<class>sun.applet.PluginAppletSecurityContext</class>
<method>handleMessage</method>
<line>696</line>
</frame>
<frame>
<class>sun.applet.AppletSecurityContextManager</class>
<method>handleMessage</method>
<line>69</line>
</frame>
<frame>
<class>sun.applet.PluginStreamHandler</class>
<method>handleMessage</method>
<line>273</line>
</frame>
<frame>
<class>sun.applet.PluginMessageHandlerWorker</class>
<method>run</method>
<line>82</line>
</frame>
</exception>
</record>
Fails in the line where the KeyStore is loading:(Pin is correct)
KeyStore myKeyStore=null;
Provider p = Security.getProvider("SunPKCS11-Provider-Name");
myKeyStore = KeyStore.getInstance("PKCS11",p);
char[] pinData = pin.toCharArray();
myKeyStore.load(null, pinData);
Any help would be apreciated.
Thank you.
ByeThank you for your information, Frank, as it clarifies part of my confusion. However, there are a couple more loose ends I'd love to address before I mark your responses as answers.
Do backup and restore privileges apply at all over a network mount created via "net use"?
The network mount requires a username and password for the destination machine. Assuming the destination machine is a Windows box with a simple CIFS share, how does this user affect our permissions and access? Do we end up effectively impersonating this
user, or is the access check still done with our sync process's run-as user?
We require that both our configured run-as user for our sync process *and* the credentials passed to the network mount be administrator users of the local system and destination system, respectively, meaning they're in of the "BUILTIN\Administrators,
S-1-5-32-544" group.
On re-syncs, the destination file will exist and since we don't have the ability to read the ACL in all cases (we're running as one user, the file is owned by another user, and we aren't specified in the ACL in any way), we aren't able to determine if the
file has changed. Is it possible to determine the owner of this file in this case? Preferably, we'd obtain the entire SDDL.
My proposed plan is to interpret access denied as a difference requiring re-sync, resulting in us taking ownership of the file, granting ourselves access, determining if there are data differences, and then re-syncing the metadata as appropriate. -
Security Provider(JAAS chaine module)logging with SAP J2EE Agent Policy 2.2
Hello,
I have installed and configured a SAP J2EE Policy Agent 2.2 on a SAP J2EE Application Server 7.0 and installed an opensso 8.0.
I have configured and deployed a jsp application with the descriptor containing the agent filter on the SAP J2EE.
I have configured the security provider (based on JAAS) as follows:
EvaluateTicketModule
AmSAPWASLoginModule
CreateTicketLoginModule
I have then increased the severity check of logging on the SAP J2EE Application Server for:
com.sap.security.server.jaas
com.sap.engine.services.security
But since the installation of the agent, I am not able to see the logs of the different logon modules and be sure that the CreateLoginModule has been done.
I need to check that after the success of the agent login module, it goes through the CreateTicketLoginModule, how can I check that.
Thanks,
Tanguy Mezzano
amFilter log:
11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
AmFilter: now processing: Notification Task Handler
11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
AmFilter: now processing: Port Check Task Handler
11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
PortCheckTaskHandler: request is on valid port
11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
AmFilter: now processing: FQDN Task Handler
11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
FQDNHelper: Incoming Server Name: [myserver] Result: null
11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
AmFilter: now processing: Not Enforced List Task Handler
11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
NotenforcedURIHelper.isNotEnforced(/myApp.jsp) found in enforced cache
11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
NotenforcedURIHelper.isNotEnforced(/myApp.jsp) => false
11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
AmFilter: now processing: SSO Task Handler
11/13/2008 06:02:40:122 PM CET: SAPEngine_Application_Thread[impl:3]_35
SSOTaskHandler: SSO Validation successful for id=myUser,ou=user,dc=myCompany,dc=com
11/13/2008 06:02:40:122 PM CET: SAPEngine_Application_Thread[impl:3]_35
AmFilter: now processing: URL Policy Task Handler
11/13/2008 06:02:40:310 PM CET: SAPEngine_Application_Thread[impl:3]_35
URLPolicyTaskHandler: access allowed by AmWebPolicy
11/13/2008 06:02:40:310 PM CET: SAPEngine_Application_Thread[impl:3]_35
AmFilter: now processing: Redirect Check Result Handler
11/13/2008 06:02:40:310 PM CET: SAPEngine_Application_Thread[impl:3]_35
RedirectCheckResultHandler: removing redirect counter cookie
11/13/2008 06:02:40:310 PM CET: SAPEngine_Application_Thread[impl:3]_35
AmFilter: result =>
FilterResult:
Status : CONTINUE
RedirectURL : null
RequestHelper:
null
Data:
null
-----------------------------------------------------------I want to use my login page in BEA instead of Access Manager or Distributed Authentication Module. I think it is similar to the problem you have? Did you come up with a solution?
My problem is described in more detail on this thread:
http://forum.java.sun.com/thread.jspa?threadID=5197783 -
Because of performance issues, we have a security provider that has a native back end. All the core pieces are implemented (SHA1, SHA256, RSA, DSA, etc.). However, when I add the new provider to the top of the list in java.security and start an app with signed jars. My provider isn't used. Digging through the openjdk code, it appears that JarVerifier refers to ManifestEntryVerifier and SignatureFileVerifier which has it hard coded to use the Sun security provider. Does anybody know a way around that? It seems that this would make it impossible to be FIPS compliant with a certified security provider, because the code signing verification would still be done by Sun/SunRsa/SunEC.
BillBecause of performance issues, we have a security provider that has a native back end. All the core pieces are implemented (SHA1, SHA256, RSA, DSA, etc.). However, when I add the new provider to the top of the list in java.security and start an app with signed jars. My provider isn't used. Digging through the openjdk code, it appears that JarVerifier refers to ManifestEntryVerifier and SignatureFileVerifier which has it hard coded to use the Sun security provider. Does anybody know a way around that? It seems that this would make it impossible to be FIPS compliant with a certified security provider, because the code signing verification would still be done by Sun/SunRsa/SunEC.
Bill -
Bug in 'sun.security.provider.MD5'
I have created a non-blocking server and a blocking client using NIO and SSLEngine.
I have put the two in an endless read/write loop, i.e
- the client writes to the server
- the server reads
- the server writes to the client
- the client reads
and so on...
Everything works fine for a while, the "while" being almost constant, the I get the following exception:
Exception in thread "Thread-0" java.lang.StackOverflowError
at sun.security.provider.MD5.implCompress(MD5.java:129)
at sun.security.provider.MD5.implDigest(MD5.java:92)
at sun.security.provider.DigestBase.engineDigest(DigestBase.java:169)
at sun.security.provider.DigestBase.engineDigest(DigestBase.java:148)
at java.security.MessageDigest$Delegate.engineDigest(MessageDigest.java:545)
at java.security.MessageDigest.digest(MessageDigest.java:323)
at com.sun.crypto.provider.HmacCore.b(DashoA13*..)
at com.sun.crypto.provider.HmacMD5.engineDoFinal(DashoA13*..)
at javax.crypto.Mac.doFinal(DashoA13*..)
at com.sun.net.ssl.internal.ssl.MAC.compute(MAC.java:172)
at com.sun.net.ssl.internal.ssl.MAC.compute(MAC.java:136)
at com.sun.net.ssl.internal.ssl.EngineInputRecord.checkMAC(EngineInputRecord.java:193)
at com.sun.net.ssl.internal.ssl.SSLEngineImpl.readRecord(SSLEngineImpl.java:881)
at com.sun.net.ssl.internal.ssl.SSLEngineImpl.readNetRecord(SSLEngineImpl.java:791)
at com.sun.net.ssl.internal.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:667)
at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:607)
at pt.jmdsc.coms.SSLChannel.read(SSLChannel.java:126)This seems to be a bug in the MD5 class of the provider, has anyone come across the same issue?Yip I did shorten the post, the last 4 lines below keep repeating
Exception in thread "Thread-0" java.lang.StackOverflowError
at sun.security.provider.MD5.implCompress(MD5.java:129)
at sun.security.provider.DigestBase.engineUpdate(DigestBase.java:116)
at java.security.MessageDigestSpi.engineUpdate(MessageDigestSpi.java:97)
at java.security.MessageDigest$Delegate.engineUpdate(MessageDigest.java:541)
at java.security.MessageDigest.update(MessageDigest.java:311)
at com.sun.crypto.provider.HmacCore.a(DashoA13*..)
at com.sun.crypto.provider.HmacMD5.engineUpdate(DashoA13*..)
at javax.crypto.Mac.update(DashoA13*..)
at com.sun.net.ssl.internal.ssl.MAC.compute(MAC.java:167)
at com.sun.net.ssl.internal.ssl.MAC.compute(MAC.java:136)
at com.sun.net.ssl.internal.ssl.EngineInputRecord.checkMAC(EngineInputRecord.java:193)
at com.sun.net.ssl.internal.ssl.SSLEngineImpl.readRecord(SSLEngineImpl.java:881)
at com.sun.net.ssl.internal.ssl.SSLEngineImpl.readNetRecord(SSLEngineImpl.java:791)
at com.sun.net.ssl.internal.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:667)
at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:607)
at pt.jmdsc.coms.SSLChannel.read(SSLChannel.java:126)
at pt.jmdsc.coms.Client.read(Client.java:92)
at pt.jmdsc.coms.Client.write(Client.java:85)
at pt.jmdsc.coms.Client.read(Client.java:92)
at pt.jmdsc.coms.Client.write(Client.java:85)
.... -
Configuration file for pkcs11 security provider
Hi all,
I'm using Mandriva 2008.0 . In the jdk 1.5.0 documentation, it is given that, the security provider pkcs11 can be configured statically by adding an entry, as shown below, in the java.security file present in the directory jre/lib/security/.
*# configuration for security providers 1-6 ommitted*
security.provider.7=sun.security.pkcs11.SunPKCS11 /opt/bar/cfg/pkcs11.cfg
Where can I get the configuration file (pkcs11.cfg) from? Please direct me how to proceed.
Thanks.Hi,
I went through that Java SE6 documentation link. It describes the contents of the configuration file for pkcs11. But I couldn't find the information of where can I get the configuration file for pkcs11 security provider from.
Thanks. -
Custom Security Provider impossible to remove the MBean Jar File
Hi,
I am currently developping a custom security provider for Weblogic. I
have deploy my Mbean File Jar on a remote server weblogic running on
solaris. NO authentication provider for this security provider has
been defined in the console, it means there is no link with this
security provider. Nevertheless, when I remove the MJF the server
crashes when starting:
<...>
<May 21, 2003 3:37:08 PM CEST> <Critical> <WebLogicServer> <000364>
<Server failed during initialization.
Exception:weblogic.management.configuration.ConfigurationException: -
with nested exception:
[javax.management.MBeanException: Commo type:
be.fgov.minfin.ccff.security.provider.CCFFSimpleSampleAuthenticator is
not loaded. Checks MJFs.]
javax.management.MBeanException: Commo type:
be.fgov.minfin.ccff.security.provider.CCFFSimpleSampleAuthenticator is
not loaded. Checks MJFs.
at weblogic.management.commo.CommoModelMBean.load(CommoModelMBean.java:588)
at weblogic.management.commo.Commo.initInstances(Commo.java:241)
at weblogic.management.commo.Commo.init(Commo.java:125)
at weblogic.management.AdminServerAdmin.initializeCommo(AdminServerAdmin.java:477)
at weblogic.management.AdminServerAdmin.initialize(AdminServerAdmin.java:108)
at weblogic.t3.srvr.T3Srvr.initialize1(T3Srvr.java:659)
at weblogic.t3.srvr.T3Srvr.initialize(T3Srvr.java:589)
at weblogic.t3.srvr.T3Srvr.run(T3Srvr.java:277)
at weblogic.Server.main(Server.java:32)
<...>
I have been looking through all the config file where the MJF
(removed) could be linked but I did not find anything.
I am really confused because with my local weblogic running on
win2000, there is no problem to remove this MJF.
Thx in advance,
tiggyTiggy,
Remove the userConfig directory under your domain directory. That should
fix the problem.
Thanks,
~satya
Tiggy wrote:
Hi,
I am currently developping a custom security provider for Weblogic. I
have deploy my Mbean File Jar on a remote server weblogic running on
solaris. NO authentication provider for this security provider has
been defined in the console, it means there is no link with this
security provider. Nevertheless, when I remove the MJF the server
crashes when starting:
<...>
<May 21, 2003 3:37:08 PM CEST> <Critical> <WebLogicServer> <000364>
<Server failed during initialization.
Exception:weblogic.management.configuration.ConfigurationException: -
with nested exception:
[javax.management.MBeanException: Commo type:
be.fgov.minfin.ccff.security.provider.CCFFSimpleSampleAuthenticator is
not loaded. Checks MJFs.]
javax.management.MBeanException: Commo type:
be.fgov.minfin.ccff.security.provider.CCFFSimpleSampleAuthenticator is
not loaded. Checks MJFs.
at weblogic.management.commo.CommoModelMBean.load(CommoModelMBean.java:588)
at weblogic.management.commo.Commo.initInstances(Commo.java:241)
at weblogic.management.commo.Commo.init(Commo.java:125)
at weblogic.management.AdminServerAdmin.initializeCommo(AdminServerAdmin.java:477)
at weblogic.management.AdminServerAdmin.initialize(AdminServerAdmin.java:108)
at weblogic.t3.srvr.T3Srvr.initialize1(T3Srvr.java:659)
at weblogic.t3.srvr.T3Srvr.initialize(T3Srvr.java:589)
at weblogic.t3.srvr.T3Srvr.run(T3Srvr.java:277)
at weblogic.Server.main(Server.java:32)
<...>
I have been looking through all the config file where the MJF
(removed) could be linked but I did not find anything.
I am really confused because with my local weblogic running on
win2000, there is no problem to remove this MJF.
Thx in advance,
tiggy
Maybe you are looking for
-
I noticed that when using the Loader component in Flash 8 - the following issue: I have a thumbnail gallery that uses the Loader component to view the large image. when i view the site in fire fox it works perfectly (scaling the content and centering
-
HT1688 Iphone 3gs can't slide to button to access the phone
I have tried to reboot by holding power and home button. Also installed the latest update. Still can't slide the button on the screen. Also can't slide the button to turn off the phone. What can I do to fix this? Thanks.
-
Convert Date in dd-MM-yy format
I am taking parameter as date in front end and I am comparing it with database through view object through executeParams. But both the date formats are different, that's why I can't compare both formats. Please suggest me to compare both formats in d
-
Blank page after submitting.
Hi all the Java Geeks can any one help me with this,<br> <br> I am getting a blank page after hitting the submit button. can you help me finding a solution for this in the JSP page or tell me where the error is. <br> <br> <br> <br> <br> <%@page conte
-
Final cut pro X project problem
Hi there.... I have an unusual problem with my project..... i was working and everythig is good when FCP crashes and all of the sudden it wont open project.... it shows it but after few seconds beachball appears..... when I move project away everythi