You are viewing a plain text version of this content. The canonical link for it is here.
Posted to wss4j-dev@ws.apache.org by "Lukasz L." <Lu...@sabre.com> on 2009/01/29 17:42:47 UTC

java.security.cert.CertificateParsingException: signed overrun, bytes = 166

For the same configuration as in
http://www.nabble.com/Exception%3A-DerInputStream.getLength()%3A-lengthTag%3D119%2C-too-big-tt21711285.html#a21724785
but for other key I got another exception (below)
also, any hints? do you think it's connected with keytool itself or not?

attached is that key: 
http://www.nabble.com/file/p21730667/PublicKeystore.jks PublicKeystore.jks 

java.security.cert.CertificateParsingException: signed overrun, bytes = 166
	at sun.security.x509.X509CertImpl.parse(X509CertImpl.java:1691)
	at sun.security.x509.X509CertImpl.<init>(X509CertImpl.java:179)
	at
sun.security.provider.X509Factory.engineGenerateCertificate(X509Factory.java:90)
	at
java.security.cert.CertificateFactory.generateCertificate(CertificateFactory.java:271)
	at sun.security.provider.JavaKeyStore.engineLoad(JavaKeyStore.java:745)
	at java.security.KeyStore.load(KeyStore.java:1150)
	at
org.apache.ws.security.components.crypto.AbstractCrypto.load(AbstractCrypto.java:141)
	at
org.apache.ws.security.components.crypto.AbstractCrypto.<init>(AbstractCrypto.java:100)
	at org.apache.ws.security.components.crypto.Merlin.<init>(Merlin.java:72)
	at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
	at
sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
	at
sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
	at java.lang.reflect.Constructor.newInstance(Constructor.java:494)
	at
org.apache.ws.security.components.crypto.CryptoFactory.loadClass(CryptoFactory.java:211)
	at
org.apache.ws.security.components.crypto.CryptoFactory.getInstance(CryptoFactory.java:176)
	at
org.apache.ws.security.handler.WSHandler.loadSignatureCrypto(WSHandler.java:372)
	at
org.apache.ws.security.handler.WSHandler.decodeSignatureParameter2(WSHandler.java:897)
	at
org.apache.ws.security.handler.WSHandler.doReceiverAction(WSHandler.java:256)
	at
org.apache.cxf.ws.security.wss4j.WSS4JInInterceptor.handleMessage(WSS4JInInterceptor.java:145)
	at
org.apache.cxf.ws.security.wss4j.WSS4JInInterceptor.handleMessage(WSS4JInInterceptor.java:65)
	at
org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:220)
	at
org.apache.cxf.transport.ChainInitiationObserver.onMessage(ChainInitiationObserver.java:77)
	at
org.apache.cxf.transport.http_jetty.JettyHTTPDestination.serviceRequest(JettyHTTPDestination.java:278)
	at
org.apache.cxf.transport.http_jetty.JettyHTTPDestination.doService(JettyHTTPDestination.java:252)
	at
org.apache.cxf.transport.http_jetty.JettyHTTPHandler.handle(JettyHTTPHandler.java:70)
	at org.mortbay.jetty.handler.ContextHandler.handle(ContextHandler.java:766)
	at
org.mortbay.jetty.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:230)
	at org.mortbay.jetty.handler.HandlerList.handle(HandlerList.java:49)
	at org.mortbay.jetty.handler.HandlerWrapper.handle(HandlerWrapper.java:152)
	at org.mortbay.jetty.Server.handle(Server.java:324)
	at org.mortbay.jetty.HttpConnection.handleRequest(HttpConnection.java:534)
	at
org.mortbay.jetty.HttpConnection$RequestHandler.content(HttpConnection.java:879)
	at org.mortbay.jetty.HttpParser.parseNext(HttpParser.java:741)
	at org.mortbay.jetty.HttpParser.parseAvailable(HttpParser.java:213)
	at org.mortbay.jetty.HttpConnection.handle(HttpConnection.java:403)
	at
org.mortbay.io.nio.SelectChannelEndPoint.run(SelectChannelEndPoint.java:409)
	at
org.mortbay.thread.QueuedThreadPool$PoolThread.run(QueuedThreadPool.java:522)
java.lang.reflect.InvocationTargetException
	at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
	at
sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
	at
sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
	at java.lang.reflect.Constructor.newInstance(Constructor.java:494)
	at
org.apache.ws.security.components.crypto.CryptoFactory.loadClass(CryptoFactory.java:211)
	at
org.apache.ws.security.components.crypto.CryptoFactory.getInstance(CryptoFactory.java:176)
	at
org.apache.ws.security.handler.WSHandler.loadSignatureCrypto(WSHandler.java:372)
	at
org.apache.ws.security.handler.WSHandler.decodeSignatureParameter2(WSHandler.java:897)
	at
org.apache.ws.security.handler.WSHandler.doReceiverAction(WSHandler.java:256)
	at
org.apache.cxf.ws.security.wss4j.WSS4JInInterceptor.handleMessage(WSS4JInInterceptor.java:145)
	at
org.apache.cxf.ws.security.wss4j.WSS4JInInterceptor.handleMessage(WSS4JInInterceptor.java:65)
	at
org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:220)
	at
org.apache.cxf.transport.ChainInitiationObserver.onMessage(ChainInitiationObserver.java:77)
	at
org.apache.cxf.transport.http_jetty.JettyHTTPDestination.serviceRequest(JettyHTTPDestination.java:278)
	at
org.apache.cxf.transport.http_jetty.JettyHTTPDestination.doService(JettyHTTPDestination.java:252)
	at
org.apache.cxf.transport.http_jetty.JettyHTTPHandler.handle(JettyHTTPHandler.java:70)
	at org.mortbay.jetty.handler.ContextHandler.handle(ContextHandler.java:766)
	at
org.mortbay.jetty.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:230)
	at org.mortbay.jetty.handler.HandlerList.handle(HandlerList.java:49)
	at org.mortbay.jetty.handler.HandlerWrapper.handle(HandlerWrapper.java:152)
	at org.mortbay.jetty.Server.handle(Server.java:324)
	at org.mortbay.jetty.HttpConnection.handleRequest(HttpConnection.java:534)
	at
org.mortbay.jetty.HttpConnection$RequestHandler.content(HttpConnection.java:879)
	at org.mortbay.jetty.HttpParser.parseNext(HttpParser.java:741)
	at org.mortbay.jetty.HttpParser.parseAvailable(HttpParser.java:213)
	at org.mortbay.jetty.HttpConnection.handle(HttpConnection.java:403)
	at
org.mortbay.io.nio.SelectChannelEndPoint.run(SelectChannelEndPoint.java:409)
	at
org.mortbay.thread.QueuedThreadPool$PoolThread.run(QueuedThreadPool.java:522)
Caused by: org.apache.ws.security.components.crypto.CredentialException:
Failed to load credentials. Inner Exception: [signed overrun, bytes = 166]
	at
org.apache.ws.security.components.crypto.AbstractCrypto.load(AbstractCrypto.java:147)
	at
org.apache.ws.security.components.crypto.AbstractCrypto.<init>(AbstractCrypto.java:100)
	at org.apache.ws.security.components.crypto.Merlin.<init>(Merlin.java:72)
	... 28 more
-- 
View this message in context: http://www.nabble.com/java.security.cert.CertificateParsingException%3A-signed-overrun%2C-bytes-%3D-166-tp21730667p21730667.html
Sent from the WSS4J mailing list archive at Nabble.com.


---------------------------------------------------------------------
To unsubscribe, e-mail: wss4j-dev-unsubscribe@ws.apache.org
For additional commands, e-mail: wss4j-dev-help@ws.apache.org


Re: java.security.cert.CertificateParsingException: signed overrun, bytes = 166

Posted by "Lukasz L." <Lu...@sabre.com>.
I forgot to say that one difference was that I added -validity option to
keytool -gen and -selfcert


Lukasz L. wrote:
> 
> For the same configuration as in
> http://www.nabble.com/Exception%3A-DerInputStream.getLength()%3A-lengthTag%3D119%2C-too-big-tt21711285.html#a21724785
> 

-- 
View this message in context: http://www.nabble.com/java.security.cert.CertificateParsingException%3A-signed-overrun%2C-bytes-%3D-166-tp21730667p21734667.html
Sent from the WSS4J mailing list archive at Nabble.com.


---------------------------------------------------------------------
To unsubscribe, e-mail: wss4j-dev-unsubscribe@ws.apache.org
For additional commands, e-mail: wss4j-dev-help@ws.apache.org