JDK-8172005 : sun/security/ssl/ServerHandshaker/AnonCipherWithWantClientAuth.java failed with "Invalid TLS padding data"
  • Type: Bug
  • Component: security-libs
  • Sub-Component: javax.net.ssl
  • Affected Version: 9
  • Priority: P3
  • Status: Closed
  • Resolution: Cannot Reproduce
  • Submitted: 2016-12-26
  • Updated: 2017-09-27
  • Resolved: 2017-09-27
The Version table provides details related to the release that this issue/RFE will be addressed.

Unresolved : Release in which this issue/RFE will be addressed.
Resolved: Release in which this issue/RFE has been resolved.
Fixed : Release in which this issue/RFE has been fixed. The release containing this fix may be available for download as an Early Access Release or a General Availability Release.

To download the current JDK release, click here.
Other
tbd_majorResolved
Related Reports
Cloners :  
Duplicate :  
Relates :  
Relates :  
Sub Tasks
JDK-8172217 :  
Description
Test: sun/security/ssl/ServerHandshaker/AnonCipherWithWantClientAuth.java

Platform: SunOS 5.12 (sparcv9)

Log:
javax.net.ssl.SSLHandshakeException: Invalid TLS padding data
	at sun.security.ssl.Alerts.getSSLException(java.base@9-ea/Alerts.java:198)
	at sun.security.ssl.SSLSocketImpl.fatal(java.base@9-ea/SSLSocketImpl.java:1962)
	at sun.security.ssl.SSLSocketImpl.readRecord(java.base@9-ea/SSLSocketImpl.java:1031)
	at sun.security.ssl.SSLSocketImpl.readRecord(java.base@9-ea/SSLSocketImpl.java:968)
	at sun.security.ssl.SSLSocketImpl.performInitialHandshake(java.base@9-ea/SSLSocketImpl.java:1395)
	at sun.security.ssl.SSLSocketImpl.bytesInCompletePacket(java.base@9-ea/SSLSocketImpl.java:902)
	at sun.security.ssl.AppInputStream.read(java.base@9-ea/AppInputStream.java:144)
	at sun.security.ssl.AppInputStream.read(java.base@9-ea/AppInputStream.java:84)
	at AnonCipherWithWantClientAuth.doServerSide(AnonCipherWithWantClientAuth.java:109)
	at AnonCipherWithWantClientAuth.startServer(AnonCipherWithWantClientAuth.java:245)
	at AnonCipherWithWantClientAuth.<init>(AnonCipherWithWantClientAuth.java:202)
	at AnonCipherWithWantClientAuth.main(AnonCipherWithWantClientAuth.java:185)
	at jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(java.base@9-ea/Native Method)
	at jdk.internal.reflect.NativeMethodAccessorImpl.invoke(java.base@9-ea/NativeMethodAccessorImpl.java:62)
	at jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(java.base@9-ea/DelegatingMethodAccessorImpl.java:43)
	at java.lang.reflect.Method.invoke(java.base@9-ea/Method.java:537)
	at com.sun.javatest.regtest.agent.MainWrapper$MainThread.run(MainWrapper.java:110)
	at java.lang.Thread.run(java.base@9-ea/Thread.java:844)
Caused by: javax.crypto.BadPaddingException: Invalid TLS padding data
	at sun.security.ssl.CipherBox.removePadding(java.base@9-ea/CipherBox.java:802)
	at sun.security.ssl.CipherBox.decrypt(java.base@9-ea/CipherBox.java:574)
	at sun.security.ssl.InputRecord.decrypt(java.base@9-ea/InputRecord.java:403)
	at sun.security.ssl.InputRecord.decrypt(java.base@9-ea/InputRecord.java:377)
	at sun.security.ssl.SSLSocketInputRecord.decodeInputRecord(java.base@9-ea/SSLSocketInputRecord.java:244)
	at sun.security.ssl.SSLSocketInputRecord.decode(java.base@9-ea/SSLSocketInputRecord.java:178)
	at sun.security.ssl.SSLSocketImpl.readRecord(java.base@9-ea/SSLSocketImpl.java:1026)
	... 15 more

Comments
I created a sub-tack so as to dump more debug log. Please update this bug with detailed debug log if noticed the failure again.
03-01-2017