public inbox for mauve-patches@sourceware.org
 help / color / mirror / Atom feed
* FYI: Comment fixes
@ 2006-06-02  9:53 Gary Benson
  0 siblings, 0 replies; 2+ messages in thread
From: Gary Benson @ 2006-06-02  9:53 UTC (permalink / raw)
  To: mauve-patches

[-- Attachment #1: Type: text/plain, Size: 152 bytes --]

Hi all,

My last commit fixed some broken throwpoint comments that were
breaking http://people.redhat.com/gbenson/throwpoint-report.html.

Cheers,
Gary

[-- Attachment #2: patch --]
[-- Type: text/plain, Size: 2849 bytes --]

Index: ChangeLog
===================================================================
RCS file: /cvs/mauve/mauve/ChangeLog,v
retrieving revision 1.1652
diff -u -r1.1652 ChangeLog
--- ChangeLog	1 Jun 2006 16:56:29 -0000	1.1652
+++ ChangeLog	2 Jun 2006 09:26:31 -0000
@@ -1,3 +1,8 @@
+2006-06-02  Gary Benson  <gbenson@redhat.com>
+
+	* gnu/testlet/java/awt/Robot/security.java: Comment fixes.
+	* gnu/testlet/java/awt/Window/security.java: Likewise.
+
 2006-06-01  Robert Schuster  <robertschuster@fsfe.org>
 
 	* gnu/testlet/javax/xml/parsers/DocumentBuilder/PR27864.java: New test.
Index: gnu/testlet/java/awt/Robot/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/awt/Robot/security.java,v
retrieving revision 1.1
diff -u -r1.1 security.java
--- gnu/testlet/java/awt/Robot/security.java	23 May 2006 09:41:46 -0000	1.1
+++ gnu/testlet/java/awt/Robot/security.java	2 Jun 2006 09:26:31 -0000
@@ -56,7 +56,7 @@
       try {
 	sm.install();
 
-	// throwpoint: java.awt.Robot()
+	// throwpoint: java.awt.Robot-Robot()
 	harness.checkPoint("0-arg constructor");
 	try {
 	  sm.prepareChecks(createRobot, readProperty);
@@ -68,7 +68,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// throwpoint: java.awt.Robot(GraphicsDevice)
+	// throwpoint: java.awt.Robot-Robot(GraphicsDevice)
 	harness.checkPoint("1-arg constructor");
 	try {
 	  sm.prepareChecks(createRobot, readProperty);
Index: gnu/testlet/java/awt/Window/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/awt/Window/security.java,v
retrieving revision 1.1
diff -u -r1.1 security.java
--- gnu/testlet/java/awt/Window/security.java	23 May 2006 10:41:23 -0000	1.1
+++ gnu/testlet/java/awt/Window/security.java	2 Jun 2006 09:26:31 -0000
@@ -39,7 +39,6 @@
   {
     try {
       Toolkit.getDefaultToolkit();
-      //Math.log(1);
 
       Frame frame = new Frame();
       Window window = new Window(frame);
@@ -52,7 +51,7 @@
       try {
 	sm.install();
 
-	// throwpoint: java.awt.Window(Frame)
+	// throwpoint: java.awt.Window-Window(Frame)
 	harness.checkPoint("Window(Frame)");
 	try {
 	  sm.prepareChecks(showWindowWithoutWarningBanner);
@@ -64,7 +63,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// throwpoint: java.awt.Window(Window)
+	// throwpoint: java.awt.Window-Window(Window)
 	harness.checkPoint("Window(Window)");
 	try {
 	  sm.prepareChecks(showWindowWithoutWarningBanner);
@@ -76,7 +75,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// throwpoint: java.awt.Window(Window, GraphicsConfiguration)
+	// throwpoint: java.awt.Window-Window(Window, GraphicsConfiguration)
 	harness.checkPoint("Window(Window, GraphicsConfiguration)");
 	try {
 	  sm.prepareChecks(showWindowWithoutWarningBanner);

^ permalink raw reply	[flat|nested] 2+ messages in thread

* FYI: Comment fixes
@ 2006-02-03 10:24 Gary Benson
  0 siblings, 0 replies; 2+ messages in thread
From: Gary Benson @ 2006-02-03 10:24 UTC (permalink / raw)
  To: mauve-patches

[-- Attachment #1: Type: text/plain, Size: 154 bytes --]

Hi all,

My last commit changed the name of the marker I've been using to
tag throwpoint tests in comments from "security" to "throwpoint".

Cheers,
Gary

[-- Attachment #2: patch --]
[-- Type: text/plain, Size: 27431 bytes --]

Index: ChangeLog
===================================================================
RCS file: /cvs/mauve/mauve/ChangeLog,v
retrieving revision 1.1433
diff -u -r1.1433 ChangeLog
--- ChangeLog	3 Feb 2006 09:53:43 -0000	1.1433
+++ ChangeLog	3 Feb 2006 10:21:20 -0000
@@ -1,3 +1,17 @@
+2006-02-03  Gary Benson  <gbenson@redhat.com>
+
+	* gnu/testlet/java/io/File/security.java: Renamed the marker
+	that tags throwpoint tests from "security" to "throwpoint".
+	* gnu/testlet/java/io/FileInputStream/security.java: Likewise.
+	* gnu/testlet/java/io/FileOutputStream/security.java: Likewise.
+	* gnu/testlet/java/io/ObjectInputStream/security.java: Likewise.
+	* gnu/testlet/java/io/ObjectOutputStream/security.java: Likewise.
+	* gnu/testlet/java/io/RandomAccessFile/security.java: Likewise.
+	* gnu/testlet/java/lang/Class/security.java: Likewise.
+	* gnu/testlet/java/lang/ClassLoader/security.java: Likewise.
+	* gnu/testlet/java/lang/Runtime/security.java: Likewise.
+	* gnu/testlet/java/lang/System/security.java: Likewise.
+
 2006-02-03  Raif S. Naffah  <raif@swiftdsl.com.au>
 
 	* gnu/testlet/javax/crypto: Removed.
Index: gnu/testlet/java/io/File/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/io/File/security.java,v
retrieving revision 1.10
diff -u -r1.10 security.java
--- gnu/testlet/java/io/File/security.java	31 Jan 2006 15:00:54 -0000	1.10
+++ gnu/testlet/java/io/File/security.java	3 Feb 2006 10:21:21 -0000
@@ -91,7 +91,7 @@
     try {
       sm.install();
 	
-      // security: java.io.File-canWrite-DIR
+      // throwpoint: java.io.File-canWrite-DIR
       harness.checkPoint("dir.canWrite");
       try {
 	sm.prepareChecks(new Permission[]{tmpdirWritePerm}, noPerms);
@@ -103,7 +103,7 @@
 	harness.check(false, "dir.canWrite - unexpected exception");
       }
 
-      // security: java.io.File-canRead-DIR
+      // throwpoint: java.io.File-canRead-DIR
       harness.checkPoint("dir.canRead");
       try {
 	sm.prepareChecks(new Permission[]{tmpdirReadPerm}, noPerms);
@@ -115,7 +115,7 @@
 	harness.check(false, "dir.canRead - unexpected exception");
       }
 
-      // security: java.io.File-createNewFile
+      // throwpoint: java.io.File-createNewFile
       harness.checkPoint("file.createNewFile");
       try {
 	sm.prepareChecks(new Permission[]{tmpfileWritePerm}, noPerms);
@@ -127,7 +127,7 @@
 	harness.check(false, "file.createNewFile - unexpected exception");
       }
 
-      // security: java.io.File-delete-FILE
+      // throwpoint: java.io.File-delete-FILE
       harness.checkPoint("file.delete");
       try {
 	sm.prepareChecks(new Permission[]{tmpfileDeletePerm}, noPerms);
@@ -139,7 +139,7 @@
 	harness.check(false, "file.delete - unexpected exception");
       }
 
-      // security: java.io.File-list(FilenameFilter)
+      // throwpoint: java.io.File-list(FilenameFilter)
       harness.checkPoint("dir.list(null)");
       try {
 	sm.prepareChecks(new Permission[]{tmpdirReadPerm}, noPerms);
@@ -151,7 +151,7 @@
 	harness.check(false, "dir.list(null) - unexpected exception");
       }
 
-      // security: java.io.File-list
+      // throwpoint: java.io.File-list
       harness.checkPoint("dir.list()");
       try {
 	sm.prepareChecks(new Permission[]{tmpdirReadPerm}, noPerms);
@@ -163,7 +163,7 @@
 	harness.check(false, "dir.list() - unexpected exception");
       }
 
-      // security: java.io.File-listFiles
+      // throwpoint: java.io.File-listFiles
       harness.checkPoint("dir.listFiles()");
       try {
 	sm.prepareChecks(new Permission[]{tmpdirReadPerm}, noPerms);
@@ -175,7 +175,7 @@
 	harness.check(false, "dir.listFiles() - unexpected exception");
       }
 
-      // security: java.io.File-listFiles(FilenameFilter)
+      // throwpoint: java.io.File-listFiles(FilenameFilter)
       harness.checkPoint("dir.listFiles(FilenameFilter)");
       try {
 	sm.prepareChecks(new Permission[]{tmpdirReadPerm}, noPerms);
@@ -188,7 +188,7 @@
 		      "dir.listFiles(FilenameFilter) - unexpected exception");
       }
 
-      // security: java.io.File-listFiles(FileFilter)
+      // throwpoint: java.io.File-listFiles(FileFilter)
       harness.checkPoint("dir.listFiles(FileFilter)");
       try {
 	sm.prepareChecks(new Permission[]{tmpdirReadPerm}, noPerms);
@@ -201,7 +201,7 @@
 		      "dir.listFiles(FileFilter) - unexpected exception");
       }
 
-      // security: java.io.File-createTempFile(String, String)
+      // throwpoint: java.io.File-createTempFile(String, String)
       harness.checkPoint("createTempFile(2-args)");
       try {
 	sm.prepareChecks(new Permission[]{tmpallWritePerm},
@@ -214,7 +214,7 @@
 	harness.check(false, "createTempFile(2-args) - unexpected exception");
       }
 
-      // security: java.io.File-createTempFile(String, String, File)
+      // throwpoint: java.io.File-createTempFile(String, String, File)
       harness.checkPoint("createTempFile(3-args)");
       try {
 	sm.prepareChecks(new Permission[]{tmpdirallWritePerm}, noPerms);
@@ -226,7 +226,7 @@
 	harness.check(false, "createTempFile(3-args) - unexpected exception");
       }
 
-      // security: java.io.File-setReadOnly-DIR
+      // throwpoint: java.io.File-setReadOnly-DIR
       harness.checkPoint("dir.setReadOnly");
       try {
 	sm.prepareChecks(new Permission[]{tmpdir2WritePerm}, noPerms);
@@ -238,7 +238,7 @@
 	harness.check(false, "dir.setReadOnly - unexpected exception");
       }
 
-      // security: java.io.File-delete-DIR
+      // throwpoint: java.io.File-delete-DIR
       // Make sure we remove the read only temp dir
       harness.checkPoint("dir.delete");
       try {
@@ -251,7 +251,7 @@
 	harness.check(false, "dir.delete - unexpected exception");
       }
       
-      // security: java.io.File-listRoots
+      // throwpoint: java.io.File-listRoots
       harness.checkPoint("listRoots()");
       try {
 	sm.prepareChecks(new Permission[]{rootReadPerm}, noPerms);
@@ -264,7 +264,7 @@
 	harness.check(false, "listRoots() - unexpected exception");
       }
 
-      // security: java.io.File-renameTo
+      // throwpoint: java.io.File-renameTo
       harness.checkPoint("file.renameTo");
       try {
 	sm.prepareChecks(new Permission[]{tmpfileWritePerm, 
@@ -278,7 +278,7 @@
 	harness.check(false, "file.renameTo - unexpected exception");
       }
 
-      // security: java.io.File-setLastModified-DIR
+      // throwpoint: java.io.File-setLastModified-DIR
       harness.checkPoint("dir.setLastModified()");
       try {
 	sm.prepareChecks(new Permission[]{tmpdirWritePerm}, noPerms);
@@ -290,7 +290,7 @@
 	harness.check(false, "dir.setLastModified() - unexpected exception");
       }
 
-      // security: java.io.File-deleteOnExit-DIR
+      // throwpoint: java.io.File-deleteOnExit-DIR
       harness.checkPoint("dir.deleteOnExit()");
       try {
 	sm.prepareChecks(new Permission[]{tmpdirDeletePerm}, noPerms);
@@ -302,18 +302,18 @@
 	harness.check(false, "dir.deleteOnExit() - unexpected exception");
       }
 
-      // security: TODO: java.io.File-deleteOnExit-FILE
-      // security: TODO: java.io.File-exists
-      // security: TODO: java.io.File-canRead-FILE
-      // security: TODO: java.io.File-isFile
-      // security: TODO: java.io.File-isDirectory
-      // security: TODO: java.io.File-isHidden
-      // security: TODO: java.io.File-lastModified
-      // security: TODO: java.io.File-length
-      // security: TODO: java.io.File-canWrite-FILE
-      // security: TODO: java.io.File-mkdir
-      // security: TODO: java.io.File-mkdirs
-      // security: TODO: java.io.File-setLastModified-FILE
+      // throwpoint: TODO: java.io.File-deleteOnExit-FILE
+      // throwpoint: TODO: java.io.File-exists
+      // throwpoint: TODO: java.io.File-canRead-FILE
+      // throwpoint: TODO: java.io.File-isFile
+      // throwpoint: TODO: java.io.File-isDirectory
+      // throwpoint: TODO: java.io.File-isHidden
+      // throwpoint: TODO: java.io.File-lastModified
+      // throwpoint: TODO: java.io.File-length
+      // throwpoint: TODO: java.io.File-canWrite-FILE
+      // throwpoint: TODO: java.io.File-mkdir
+      // throwpoint: TODO: java.io.File-mkdirs
+      // throwpoint: TODO: java.io.File-setLastModified-FILE
     }
     catch (Throwable ex) {
       harness.debug(ex);
Index: gnu/testlet/java/io/FileInputStream/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/io/FileInputStream/security.java,v
retrieving revision 1.4
diff -u -r1.4 security.java
--- gnu/testlet/java/io/FileInputStream/security.java	31 Jan 2006 15:00:54 -0000	1.4
+++ gnu/testlet/java/io/FileInputStream/security.java	3 Feb 2006 10:21:21 -0000
@@ -45,7 +45,7 @@
     try {
       sm.install();
 	
-      // security: java.io.FileInputStream-FileInputStream(File)
+      // throwpoint: java.io.FileInputStream-FileInputStream(File)
       harness.checkPoint("File constructor");
       try {
 	sm.prepareChecks(new Permission[] {perm});
@@ -57,7 +57,7 @@
 	harness.check(false, "Unexpected check");
       }
       
-      // security: java.io.FileInputStream-FileInputStream(String)
+      // throwpoint: java.io.FileInputStream-FileInputStream(String)
       harness.checkPoint("String constructor");
       try {
 	sm.prepareChecks(new Permission[] {perm});
@@ -69,7 +69,7 @@
 	harness.check(false, "Unexpected check");
       }
       
-      // security: java.io.FileInputStream-FileInputStream(FileDescriptor)
+      // throwpoint: java.io.FileInputStream-FileInputStream(FileDescriptor)
       harness.checkPoint("FileDescriptor constructor");
       try {
 	sm.prepareChecks(new Permission[] {fdPerm});
Index: gnu/testlet/java/io/FileOutputStream/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/io/FileOutputStream/security.java,v
retrieving revision 1.5
diff -u -r1.5 security.java
--- gnu/testlet/java/io/FileOutputStream/security.java	31 Jan 2006 15:00:55 -0000	1.5
+++ gnu/testlet/java/io/FileOutputStream/security.java	3 Feb 2006 10:21:21 -0000
@@ -49,7 +49,7 @@
     try {
       sm.install();
 	
-      // security: java.io.FileOutputStream-FileOutputStream(File)
+      // throwpoint: java.io.FileOutputStream-FileOutputStream(File)
       harness.checkPoint("File constructor");
       try {
 	sm.prepareChecks(new Permission[] {wperm}, new Permission[] {rperm});
@@ -61,7 +61,7 @@
 	harness.check(false, "Unexpected check");
       }
 
-      // security: java.io.FileOutputStream-FileOutputStream(File, boolean)
+      // throwpoint: java.io.FileOutputStream-FileOutputStream(File, boolean)
       harness.checkPoint("File, boolean constructor");
       for (int i = 0; i <= 1; i++) {
 	try {
@@ -75,7 +75,7 @@
 	}
       }
 
-      // security: java.io.FileOutputStream-FileOutputStream(String)
+      // throwpoint: java.io.FileOutputStream-FileOutputStream(String)
       harness.checkPoint("String constructor");
       try {
 	sm.prepareChecks(new Permission[] {wperm}, new Permission[] {rperm});
@@ -87,7 +87,7 @@
 	harness.check(false, "Unexpected check");
       }
 
-      // security: java.io.FileOutputStream-FileOutputStream(String, boolean)
+      // throwpoint: java.io.FileOutputStream-FileOutputStream(String, boolean)
       harness.checkPoint("String, boolean constructor");
       for (int i = 0; i <= 1; i++) {
 	try {
@@ -101,7 +101,7 @@
 	}
       }
 
-      // security: java.io.FileOutputStream-FileOutputStream(FileDescriptor)
+      // throwpoint: java.io.FileOutputStream-FileOutputStream(FileDescriptor)
       harness.checkPoint("FileDescriptor constructor");
       try {
 	sm.prepareChecks(new Permission[] {fdPerm});
Index: gnu/testlet/java/io/ObjectInputStream/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/io/ObjectInputStream/security.java,v
retrieving revision 1.2
diff -u -r1.2 security.java
--- gnu/testlet/java/io/ObjectInputStream/security.java	31 Jan 2006 15:00:55 -0000	1.2
+++ gnu/testlet/java/io/ObjectInputStream/security.java	3 Feb 2006 10:21:21 -0000
@@ -48,7 +48,7 @@
       try {
 	sm.install();
 
-	// security: java.io.ObjectInputStream-ObjectInputStream
+	// throwpoint: java.io.ObjectInputStream-ObjectInputStream
 	harness.checkPoint("constructor");
 	try {
 	  sm.prepareChecks(enableSubclassImplementation);
@@ -60,7 +60,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// security: java.io.ObjectInputStream-enableResolveObject
+	// throwpoint: java.io.ObjectInputStream-enableResolveObject
 	harness.checkPoint("enableResolveObject");
 	try {
 	  sm.prepareChecks(noPerms);
Index: gnu/testlet/java/io/ObjectOutputStream/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/io/ObjectOutputStream/security.java,v
retrieving revision 1.2
diff -u -r1.2 security.java
--- gnu/testlet/java/io/ObjectOutputStream/security.java	31 Jan 2006 15:00:55 -0000	1.2
+++ gnu/testlet/java/io/ObjectOutputStream/security.java	3 Feb 2006 10:21:21 -0000
@@ -48,7 +48,7 @@
       try {
 	sm.install();
 
-	// security: java.io.ObjectOutputStream-ObjectOutputStream
+	// throwpoint: java.io.ObjectOutputStream-ObjectOutputStream
 	harness.checkPoint("constructor");
 	try {
 	  sm.prepareChecks(enableSubclassImplementation);
@@ -60,7 +60,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// security: java.io.ObjectOutputStream-enableReplaceObject
+	// throwpoint: java.io.ObjectOutputStream-enableReplaceObject
 	harness.checkPoint("enableReplaceObject");
 	try {
 	  sm.prepareChecks(noPerms);
Index: gnu/testlet/java/io/RandomAccessFile/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/io/RandomAccessFile/security.java,v
retrieving revision 1.1
diff -u -r1.1 security.java
--- gnu/testlet/java/io/RandomAccessFile/security.java	5 Dec 2005 15:28:11 -0000	1.1
+++ gnu/testlet/java/io/RandomAccessFile/security.java	3 Feb 2006 10:21:21 -0000
@@ -76,7 +76,7 @@
 
 	RandomAccessFile raf;
 
-	// security: java.io.RandomAccessFile-RandomAccessFile(File, String)
+	// throwpoint: java.io.RandomAccessFile-RandomAccessFile(File, String)
 	harness.checkPoint("File constructor, mode = \"" + mode + "\"");
 	try {
 	  sm.prepareChecks(mustCheck, mayCheck);
@@ -90,7 +90,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// security: java.io.RandomAccessFile-RandomAccessFile(String, String)
+	// throwpoint: java.io.RandomAccessFile-RandomAccessFile(String, String)
 	harness.checkPoint("String constructor, mode = \"" + mode + "\"");
 	try {
 	  sm.prepareChecks(mustCheck, mayCheck);
Index: gnu/testlet/java/lang/Class/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/lang/Class/security.java,v
retrieving revision 1.2
diff -u -r1.2 security.java
--- gnu/testlet/java/lang/Class/security.java	31 Jan 2006 15:00:55 -0000	1.2
+++ gnu/testlet/java/lang/Class/security.java	3 Feb 2006 10:21:21 -0000
@@ -78,7 +78,7 @@
 	try {
 	  sm.install();
 
-	  // security: java.lang.Class-forName
+	  // throwpoint: java.lang.Class-forName
 	  harness.checkPoint("forName");
 	  try {
 	    sm.prepareChecks(getClassLoader);
@@ -90,7 +90,7 @@
 	    harness.check(false, "unexpected check");
 	  }
 
-	  // security: java.lang.Class-getClassLoader
+	  // throwpoint: java.lang.Class-getClassLoader
 	  harness.checkPoint("getClassLoader");
 	  try {
 	    sm.prepareChecks(getClassLoader);
@@ -105,7 +105,7 @@
 	  // getDeclaredMember checks
 	  getMemberChecks(harness, sm, testClass, true, accessDeclaredMembers);
 	  
-	  // security: java.lang.Class-getProtectionDomain
+	  // throwpoint: java.lang.Class-getProtectionDomain
 	  harness.checkPoint("getProtectionDomain");
 	  try {
 	    sm.prepareChecks(getProtectionDomain);
@@ -158,8 +158,8 @@
   {
     int level;
     
-    // security: java.lang.Class-getClasses
-    // security: java.lang.Class-getDeclaredClasses
+    // throwpoint: java.lang.Class-getClasses
+    // throwpoint: java.lang.Class-getDeclaredClasses
     if (declared)
       harness.checkPoint("getDeclaredClasses");
     else
@@ -177,8 +177,8 @@
       harness.check(false, "unexpected check");
     }
 
-    // security: java.lang.Class-getFields
-    // security: java.lang.Class-getDeclaredFields
+    // throwpoint: java.lang.Class-getFields
+    // throwpoint: java.lang.Class-getDeclaredFields
     if (declared)
       harness.checkPoint("getDeclaredFields");
     else
@@ -196,8 +196,8 @@
       harness.check(false, "unexpected check");
     }
 
-    // security: java.lang.Class-getMethods
-    // security: java.lang.Class-getDeclaredMethods
+    // throwpoint: java.lang.Class-getMethods
+    // throwpoint: java.lang.Class-getDeclaredMethods
     if (declared)
       harness.checkPoint("getDeclaredMethods");
     else
@@ -215,8 +215,8 @@
       harness.check(false, "unexpected check");
     }
 
-    // security: java.lang.Class-getConstructors
-    // security: java.lang.Class-getDeclaredConstructors
+    // throwpoint: java.lang.Class-getConstructors
+    // throwpoint: java.lang.Class-getDeclaredConstructors
     if (declared)
       harness.checkPoint("getDeclaredConstructors");
     else
@@ -234,8 +234,8 @@
       harness.check(false, "unexpected check");
     }
 
-    // security: java.lang.Class-getField
-    // security: java.lang.Class-getDeclaredField
+    // throwpoint: java.lang.Class-getField
+    // throwpoint: java.lang.Class-getDeclaredField
     if (declared) {
       harness.checkPoint("getDeclaredField");
       level = 0;
@@ -270,8 +270,8 @@
       harness.check(false, "unexpected check");
     }
     
-    // security: java.lang.Class-getMethod
-    // security: java.lang.Class-getDeclaredMethod
+    // throwpoint: java.lang.Class-getMethod
+    // throwpoint: java.lang.Class-getDeclaredMethod
     if (declared)
       harness.checkPoint("getDeclaredMethod");
     else
@@ -304,8 +304,8 @@
       harness.check(false, "unexpected check");
     }
 
-    // security: java.lang.Class-getConstructor
-    // security: java.lang.Class-getDeclaredConstructor
+    // throwpoint: java.lang.Class-getConstructor
+    // throwpoint: java.lang.Class-getDeclaredConstructor
     if (declared) {
       harness.checkPoint("getDeclaredConstructor");
       level = 0;
Index: gnu/testlet/java/lang/ClassLoader/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/lang/ClassLoader/security.java,v
retrieving revision 1.2
diff -u -r1.2 security.java
--- gnu/testlet/java/lang/ClassLoader/security.java	31 Jan 2006 15:00:55 -0000	1.2
+++ gnu/testlet/java/lang/ClassLoader/security.java	3 Feb 2006 10:21:21 -0000
@@ -65,7 +65,7 @@
       try {
 	sm.install();
 
-	// security: java.lang.ClassLoader-ClassLoader()
+	// throwpoint: java.lang.ClassLoader-ClassLoader()
 	harness.checkPoint("Constructor (no-args)");
 	try {
 	  sm.prepareChecks(createClassLoader);
@@ -77,7 +77,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// security: java.lang.ClassLoader-ClassLoader(ClassLoader)
+	// throwpoint: java.lang.ClassLoader-ClassLoader(ClassLoader)
 	harness.checkPoint("Constructor (one-arg)");
 	try {
 	  sm.prepareChecks(createClassLoader);
@@ -89,7 +89,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// security: java.lang.ClassLoader-getSystemClassLoader
+	// throwpoint: java.lang.ClassLoader-getSystemClassLoader
 	harness.checkPoint("getSystemClassLoader");
 	try {
 	  sm.prepareChecks(getClassLoader);
@@ -101,7 +101,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// security: java.lang.ClassLoader-getParent
+	// throwpoint: java.lang.ClassLoader-getParent
 	harness.checkPoint("getParent");
 	try {
 	  sm.prepareChecks(getClassLoader);
Index: gnu/testlet/java/lang/Runtime/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/lang/Runtime/security.java,v
retrieving revision 1.3
diff -u -r1.3 security.java
--- gnu/testlet/java/lang/Runtime/security.java	31 Jan 2006 15:00:55 -0000	1.3
+++ gnu/testlet/java/lang/Runtime/security.java	3 Feb 2006 10:21:21 -0000
@@ -66,7 +66,7 @@
       try {
 	sm.install();
 
-	// security: java.lang.Runtime-exec(String)
+	// throwpoint: java.lang.Runtime-exec(String)
 	harness.checkPoint("exec(String)");
 	try {
 	  sm.prepareChecks(executeCommand, modifyThread);
@@ -78,7 +78,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// security: java.lang.Runtime-exec(String, String[])
+	// throwpoint: java.lang.Runtime-exec(String, String[])
 	harness.checkPoint("exec(String, String[])");
 	try {
 	  sm.prepareChecks(executeCommand, modifyThread);
@@ -90,7 +90,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// security: java.lang.Runtime-exec(String, String[], File)
+	// throwpoint: java.lang.Runtime-exec(String, String[], File)
 	harness.checkPoint("exec(String, String[], File)");
 	try {
 	  sm.prepareChecks(executeCommand, modifyThread);
@@ -102,7 +102,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// security: java.lang.Runtime-exec(String[])
+	// throwpoint: java.lang.Runtime-exec(String[])
 	harness.checkPoint("exec(String[])");
 	try {
 	  sm.prepareChecks(executeCommand, modifyThread);
@@ -114,7 +114,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// security: java.lang.Runtime-exec(String[], String[])
+	// throwpoint: java.lang.Runtime-exec(String[], String[])
 	harness.checkPoint("exec(String[], String[])");
 	try {
 	  sm.prepareChecks(executeCommand, modifyThread);
@@ -126,7 +126,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// security: java.lang.Runtime-exec(String[], String[], File)
+	// throwpoint: java.lang.Runtime-exec(String[], String[], File)
 	harness.checkPoint("exec(String[], String[], File)");
 	try {
 	  sm.prepareChecks(executeCommand, modifyThread);
@@ -138,7 +138,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// security: java.lang.Runtime-exit
+	// throwpoint: java.lang.Runtime-exit
 	harness.checkPoint("exit");
 	try {
 	  sm.prepareChecks(exitVM, true);
@@ -155,7 +155,7 @@
 	  }
 	}
 	
-	// security: java.lang.Runtime-runFinalizersOnExit
+	// throwpoint: java.lang.Runtime-runFinalizersOnExit
 	harness.checkPoint("runFinalizersOnExit");
 	try {
 	  sm.prepareChecks(exitVM);
@@ -167,7 +167,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// security: java.lang.Runtime-addShutdownHook
+	// throwpoint: java.lang.Runtime-addShutdownHook
 	harness.checkPoint("addShutdownHook");
 	try {
 	  sm.prepareChecks(shutdownHooks);
@@ -179,7 +179,7 @@
 	  harness.check(false, "unexpected check");
 	}
 	
-	// security: java.lang.Runtime-removeShutdownHook
+	// throwpoint: java.lang.Runtime-removeShutdownHook
 	harness.checkPoint("removeShutdownHook");
 	try {
 	  sm.prepareChecks(shutdownHooks);
@@ -191,7 +191,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// security: java.lang.Runtime-load
+	// throwpoint: java.lang.Runtime-load
 	harness.checkPoint("load");
 	try {
 	  sm.prepareChecks(loadLibrary_name, true);
@@ -208,7 +208,7 @@
 	  }
 	}
 
-	// security: java.lang.Runtime-loadLibrary
+	// throwpoint: java.lang.Runtime-loadLibrary
 	harness.checkPoint("loadLibrary");
 	try {
 	  sm.prepareChecks(loadLibrary_path, true);
Index: gnu/testlet/java/lang/System/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/lang/System/security.java,v
retrieving revision 1.3
diff -u -r1.3 security.java
--- gnu/testlet/java/lang/System/security.java	31 Jan 2006 15:00:55 -0000	1.3
+++ gnu/testlet/java/lang/System/security.java	3 Feb 2006 10:21:21 -0000
@@ -86,7 +86,7 @@
       try {
 	sm.install();
 
-	// security: java.lang.System-exit
+	// throwpoint: java.lang.System-exit
 	harness.checkPoint("exit");
 	try {
 	  sm.prepareChecks(exitVM, true);
@@ -103,7 +103,7 @@
 	  }
 	}
 	
-	// security: java.lang.System-runFinalizersOnExit
+	// throwpoint: java.lang.System-runFinalizersOnExit
 	harness.checkPoint("runFinalizersOnExit");
 	try {
 	  sm.prepareChecks(exitVM);
@@ -115,7 +115,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// security: java.lang.System-load
+	// throwpoint: java.lang.System-load
 	harness.checkPoint("load");
 	try {
 	  sm.prepareChecks(loadLibrary_name, true);
@@ -132,7 +132,7 @@
 	  }
 	}
 
-	// security: java.lang.System-loadLibrary
+	// throwpoint: java.lang.System-loadLibrary
 	harness.checkPoint("loadLibrary");
 	try {
 	  sm.prepareChecks(loadLibrary_path, true);
@@ -149,9 +149,9 @@
 	  }
 	}
 
-	// security: TODO: java.lang.System-getenv()
+	// throwpoint: TODO: java.lang.System-getenv()
 
-	// security: java.lang.System-getenv(String)
+	// throwpoint: java.lang.System-getenv(String)
 	harness.checkPoint("getenv(String)");
 	try {
 	  sm.prepareChecks(readVariable);
@@ -172,7 +172,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// security: java.lang.System-getProperties
+	// throwpoint: java.lang.System-getProperties
 	harness.checkPoint("getProperties");
 	try {
 	  sm.prepareChecks(readWriteAllProperties);
@@ -184,7 +184,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// security: java.lang.System-setProperties
+	// throwpoint: java.lang.System-setProperties
 	harness.checkPoint("setProperties");
 	try {
 	  sm.prepareChecks(readWriteAllProperties);
@@ -196,7 +196,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// security: java.lang.System-getProperty(String)
+	// throwpoint: java.lang.System-getProperty(String)
 	harness.checkPoint("getProperty(String)");
 	try {
 	  sm.prepareChecks(readProperty);
@@ -217,7 +217,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// security: java.lang.System-getProperty(String, String)
+	// throwpoint: java.lang.System-getProperty(String, String)
 	harness.checkPoint("getProperty(String, String)");
 	try {
 	  sm.prepareChecks(readProperty);
@@ -238,7 +238,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// security: java.lang.System-setIn
+	// throwpoint: java.lang.System-setIn
 	harness.checkPoint("setIn");
 	try {
 	  sm.prepareChecks(setIO);
@@ -250,7 +250,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// security: java.lang.System-setOut
+	// throwpoint: java.lang.System-setOut
 	harness.checkPoint("setOut");
 	try {
 	  sm.prepareChecks(setIO);
@@ -262,7 +262,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// security: java.lang.System-setErr
+	// throwpoint: java.lang.System-setErr
 	harness.checkPoint("setErr");
 	try {
 	  sm.prepareChecks(setIO);
@@ -274,7 +274,7 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// security: java.lang.System-setProperty
+	// throwpoint: java.lang.System-setProperty
 	harness.checkPoint("setProperty");
 	try {
 	  sm.prepareChecks(writeProperty);
@@ -295,9 +295,9 @@
 	  harness.check(false, "unexpected check");
 	}
 
-	// security: TODO: java.lang.System-clearProperty
+	// throwpoint: TODO: java.lang.System-clearProperty
 
-	// security: java.lang.System-setSecurityManager
+	// throwpoint: java.lang.System-setSecurityManager
 	harness.checkPoint("setSecurityManager");
 	try {
 	  sm.prepareChecks(setSecurityManager);

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2006-06-02  9:53 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2006-06-02  9:53 FYI: Comment fixes Gary Benson
  -- strict thread matches above, loose matches on Subject: below --
2006-02-03 10:24 Gary Benson

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).