Uploaded image for project: 'JDK'
  1. JDK
  2. JDK-6449966

37 security test cases are failing with flag -Xcheck:jni for Tiger, warning in AWT

    XMLWordPrintable

Details

    • x86
    • windows_xp

    Description

      The following test cases are failing with flag -Xcheck:jni for 1.5.0_08b03 on winXP-x86 :

      AppletAttacks/AppletAttacks_test1 execute_script
      AppletAttacks/AppletAttacks_test2 execute_script
      AppletAttacks/AppletAttacks_test3 execute_script
      AppletAttacks/AppletAttacks_test5 execute_script
      AppletAttacks/AppletAttacks_test6 execute_script
      AppletAttacks/AppletAttacks_test8 execute_script
      AppletAttacks/AppletAttacks_test9 execute_script
      AppletAttacks/AppletAttacks_test10 execute_script
      AppletAttacks/AppletAttacks_test11 execute_script
      AppletAttacks/AppletAttacks_test12 execute_script
      AppletAttacks/AppletAttacks_test13 execute_script
      AppletAttacks/AppletAttacks_test14 execute_script
      AppletAttacks/AppletAttacks_test15 execute_script
      AppletAttacks/AppletAttacks_test16 execute_script
      AppletAttacks/AppletAttacks_test17 execute_script
      AppletAttacks/AppletAttacks_test18 execute_script
      AppletAttacks/AppletAttacks_test19 execute_script
      AppletAttacks/AppletAttacks_test20 execute_script
      AppletAttacks/AppletAttacks_test21 execute_script
      AppletAttacks/AppletAttacks_test22 execute_script
      AppletAttacks/AppletAttacks_test23 execute_script
      AppletAttacks/AppletAttacks_test24 execute_script
      AppletAttacks/AppletAttacks_test26 execute_script
      AppletAttacks/AppletAttacks_test27 execute_script
      AppletAttacks/AppletAttacks_test28 execute_script
      AppletAttacks/AppletAttacks_test29 execute_script
      SA/SignedAppletDemo execute_script
      headline/DOS/OverFlow execute_script
      headline/URLBugs/4415229 execute_script
      headline/noWarningApp execute_script
      headline/typeConfusion execute_script
      jce/Applet/SunJCE/Short_TestCipherBlowfish execute_script
      jce/Applet/SunJCE/Short_TestCipherPBE execute_script
      jce/Dynamic/Bundle/applet/SunJCE execute_script
      jce/Dynamic/RegisterProvider/applet/SunJCE/Short_TestCipherBlowfish execute_script
      jce/Dynamic/RegisterProvider/applet/SunJCE/Short_TestCipherPBE execute_script
      jce/Dynamic/RegisterProvider/applet/SunJCE/Strong_TestCipherDES execute_script

      Reason of failing : result of diff command with gold output file. All this test cases are passing without this flag.

      Almost all of these test cases (except two) are failing for 1.5.0 fsc also. These two test cases :

      jce/Applet/SunJCE/Short_TestCipherBlowfish execute_script
      jce/Dynamic/RegisterProvider/applet/SunJCE/Short_TestCipherBlowfish execute_script

      are passing for 1.5.0 fcs. With update 04, the test case

      jce/Applet/SunJCE/Short_TestCipherBlowfish execute_script

      is failing, but the test case

      jce/Dynamic/RegisterProvider/applet/SunJCE/Short_TestCipherBlowfish execute_script

      is passing.

      How to reproduce :

      Test suite location : /net/jqa.ireland/jqa6/dtf/dtf_ws/suites/1.5.0_URv09/security
      Launch the security test suite in DTF mode. Sample DTF XML job file :

      <testrequest priority="100"> -*-html-*-
       <jdk dir="c:/jdk1.5.0_08/" runtime="-Xcheck:jni"/>
       <jobname jobname="150_08b03-security-winXPpro-x86"/>
       <suitename suitename="1.5.0_URv09"/>
       <user-defs key="J2SE_COMPONENT_DIR" value="security" />
       <results dir="" emailto="###@###.###" subject="150 security DTF results"/>
       <attr key="network.name" value="morality"/>
      </testrequest>

      Attachments

        Issue Links

          Activity

            People

              chrisphi Chris Phillips
              iyatsishorcl Ilya Yatsishin (Inactive)
              Votes:
              0 Vote for this issue
              Watchers:
              0 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved:
                Imported:
                Indexed: