* FYI: Comment fixes
@ 2006-06-02 9:53 Gary Benson
0 siblings, 0 replies; 2+ messages in thread
From: Gary Benson @ 2006-06-02 9:53 UTC (permalink / raw)
To: mauve-patches
[-- Attachment #1: Type: text/plain, Size: 152 bytes --]
Hi all,
My last commit fixed some broken throwpoint comments that were
breaking http://people.redhat.com/gbenson/throwpoint-report.html.
Cheers,
Gary
[-- Attachment #2: patch --]
[-- Type: text/plain, Size: 2849 bytes --]
Index: ChangeLog
===================================================================
RCS file: /cvs/mauve/mauve/ChangeLog,v
retrieving revision 1.1652
diff -u -r1.1652 ChangeLog
--- ChangeLog 1 Jun 2006 16:56:29 -0000 1.1652
+++ ChangeLog 2 Jun 2006 09:26:31 -0000
@@ -1,3 +1,8 @@
+2006-06-02 Gary Benson <gbenson@redhat.com>
+
+ * gnu/testlet/java/awt/Robot/security.java: Comment fixes.
+ * gnu/testlet/java/awt/Window/security.java: Likewise.
+
2006-06-01 Robert Schuster <robertschuster@fsfe.org>
* gnu/testlet/javax/xml/parsers/DocumentBuilder/PR27864.java: New test.
Index: gnu/testlet/java/awt/Robot/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/awt/Robot/security.java,v
retrieving revision 1.1
diff -u -r1.1 security.java
--- gnu/testlet/java/awt/Robot/security.java 23 May 2006 09:41:46 -0000 1.1
+++ gnu/testlet/java/awt/Robot/security.java 2 Jun 2006 09:26:31 -0000
@@ -56,7 +56,7 @@
try {
sm.install();
- // throwpoint: java.awt.Robot()
+ // throwpoint: java.awt.Robot-Robot()
harness.checkPoint("0-arg constructor");
try {
sm.prepareChecks(createRobot, readProperty);
@@ -68,7 +68,7 @@
harness.check(false, "unexpected check");
}
- // throwpoint: java.awt.Robot(GraphicsDevice)
+ // throwpoint: java.awt.Robot-Robot(GraphicsDevice)
harness.checkPoint("1-arg constructor");
try {
sm.prepareChecks(createRobot, readProperty);
Index: gnu/testlet/java/awt/Window/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/awt/Window/security.java,v
retrieving revision 1.1
diff -u -r1.1 security.java
--- gnu/testlet/java/awt/Window/security.java 23 May 2006 10:41:23 -0000 1.1
+++ gnu/testlet/java/awt/Window/security.java 2 Jun 2006 09:26:31 -0000
@@ -39,7 +39,6 @@
{
try {
Toolkit.getDefaultToolkit();
- //Math.log(1);
Frame frame = new Frame();
Window window = new Window(frame);
@@ -52,7 +51,7 @@
try {
sm.install();
- // throwpoint: java.awt.Window(Frame)
+ // throwpoint: java.awt.Window-Window(Frame)
harness.checkPoint("Window(Frame)");
try {
sm.prepareChecks(showWindowWithoutWarningBanner);
@@ -64,7 +63,7 @@
harness.check(false, "unexpected check");
}
- // throwpoint: java.awt.Window(Window)
+ // throwpoint: java.awt.Window-Window(Window)
harness.checkPoint("Window(Window)");
try {
sm.prepareChecks(showWindowWithoutWarningBanner);
@@ -76,7 +75,7 @@
harness.check(false, "unexpected check");
}
- // throwpoint: java.awt.Window(Window, GraphicsConfiguration)
+ // throwpoint: java.awt.Window-Window(Window, GraphicsConfiguration)
harness.checkPoint("Window(Window, GraphicsConfiguration)");
try {
sm.prepareChecks(showWindowWithoutWarningBanner);
^ permalink raw reply [flat|nested] 2+ messages in thread
* FYI: Comment fixes
@ 2006-02-03 10:24 Gary Benson
0 siblings, 0 replies; 2+ messages in thread
From: Gary Benson @ 2006-02-03 10:24 UTC (permalink / raw)
To: mauve-patches
[-- Attachment #1: Type: text/plain, Size: 154 bytes --]
Hi all,
My last commit changed the name of the marker I've been using to
tag throwpoint tests in comments from "security" to "throwpoint".
Cheers,
Gary
[-- Attachment #2: patch --]
[-- Type: text/plain, Size: 27431 bytes --]
Index: ChangeLog
===================================================================
RCS file: /cvs/mauve/mauve/ChangeLog,v
retrieving revision 1.1433
diff -u -r1.1433 ChangeLog
--- ChangeLog 3 Feb 2006 09:53:43 -0000 1.1433
+++ ChangeLog 3 Feb 2006 10:21:20 -0000
@@ -1,3 +1,17 @@
+2006-02-03 Gary Benson <gbenson@redhat.com>
+
+ * gnu/testlet/java/io/File/security.java: Renamed the marker
+ that tags throwpoint tests from "security" to "throwpoint".
+ * gnu/testlet/java/io/FileInputStream/security.java: Likewise.
+ * gnu/testlet/java/io/FileOutputStream/security.java: Likewise.
+ * gnu/testlet/java/io/ObjectInputStream/security.java: Likewise.
+ * gnu/testlet/java/io/ObjectOutputStream/security.java: Likewise.
+ * gnu/testlet/java/io/RandomAccessFile/security.java: Likewise.
+ * gnu/testlet/java/lang/Class/security.java: Likewise.
+ * gnu/testlet/java/lang/ClassLoader/security.java: Likewise.
+ * gnu/testlet/java/lang/Runtime/security.java: Likewise.
+ * gnu/testlet/java/lang/System/security.java: Likewise.
+
2006-02-03 Raif S. Naffah <raif@swiftdsl.com.au>
* gnu/testlet/javax/crypto: Removed.
Index: gnu/testlet/java/io/File/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/io/File/security.java,v
retrieving revision 1.10
diff -u -r1.10 security.java
--- gnu/testlet/java/io/File/security.java 31 Jan 2006 15:00:54 -0000 1.10
+++ gnu/testlet/java/io/File/security.java 3 Feb 2006 10:21:21 -0000
@@ -91,7 +91,7 @@
try {
sm.install();
- // security: java.io.File-canWrite-DIR
+ // throwpoint: java.io.File-canWrite-DIR
harness.checkPoint("dir.canWrite");
try {
sm.prepareChecks(new Permission[]{tmpdirWritePerm}, noPerms);
@@ -103,7 +103,7 @@
harness.check(false, "dir.canWrite - unexpected exception");
}
- // security: java.io.File-canRead-DIR
+ // throwpoint: java.io.File-canRead-DIR
harness.checkPoint("dir.canRead");
try {
sm.prepareChecks(new Permission[]{tmpdirReadPerm}, noPerms);
@@ -115,7 +115,7 @@
harness.check(false, "dir.canRead - unexpected exception");
}
- // security: java.io.File-createNewFile
+ // throwpoint: java.io.File-createNewFile
harness.checkPoint("file.createNewFile");
try {
sm.prepareChecks(new Permission[]{tmpfileWritePerm}, noPerms);
@@ -127,7 +127,7 @@
harness.check(false, "file.createNewFile - unexpected exception");
}
- // security: java.io.File-delete-FILE
+ // throwpoint: java.io.File-delete-FILE
harness.checkPoint("file.delete");
try {
sm.prepareChecks(new Permission[]{tmpfileDeletePerm}, noPerms);
@@ -139,7 +139,7 @@
harness.check(false, "file.delete - unexpected exception");
}
- // security: java.io.File-list(FilenameFilter)
+ // throwpoint: java.io.File-list(FilenameFilter)
harness.checkPoint("dir.list(null)");
try {
sm.prepareChecks(new Permission[]{tmpdirReadPerm}, noPerms);
@@ -151,7 +151,7 @@
harness.check(false, "dir.list(null) - unexpected exception");
}
- // security: java.io.File-list
+ // throwpoint: java.io.File-list
harness.checkPoint("dir.list()");
try {
sm.prepareChecks(new Permission[]{tmpdirReadPerm}, noPerms);
@@ -163,7 +163,7 @@
harness.check(false, "dir.list() - unexpected exception");
}
- // security: java.io.File-listFiles
+ // throwpoint: java.io.File-listFiles
harness.checkPoint("dir.listFiles()");
try {
sm.prepareChecks(new Permission[]{tmpdirReadPerm}, noPerms);
@@ -175,7 +175,7 @@
harness.check(false, "dir.listFiles() - unexpected exception");
}
- // security: java.io.File-listFiles(FilenameFilter)
+ // throwpoint: java.io.File-listFiles(FilenameFilter)
harness.checkPoint("dir.listFiles(FilenameFilter)");
try {
sm.prepareChecks(new Permission[]{tmpdirReadPerm}, noPerms);
@@ -188,7 +188,7 @@
"dir.listFiles(FilenameFilter) - unexpected exception");
}
- // security: java.io.File-listFiles(FileFilter)
+ // throwpoint: java.io.File-listFiles(FileFilter)
harness.checkPoint("dir.listFiles(FileFilter)");
try {
sm.prepareChecks(new Permission[]{tmpdirReadPerm}, noPerms);
@@ -201,7 +201,7 @@
"dir.listFiles(FileFilter) - unexpected exception");
}
- // security: java.io.File-createTempFile(String, String)
+ // throwpoint: java.io.File-createTempFile(String, String)
harness.checkPoint("createTempFile(2-args)");
try {
sm.prepareChecks(new Permission[]{tmpallWritePerm},
@@ -214,7 +214,7 @@
harness.check(false, "createTempFile(2-args) - unexpected exception");
}
- // security: java.io.File-createTempFile(String, String, File)
+ // throwpoint: java.io.File-createTempFile(String, String, File)
harness.checkPoint("createTempFile(3-args)");
try {
sm.prepareChecks(new Permission[]{tmpdirallWritePerm}, noPerms);
@@ -226,7 +226,7 @@
harness.check(false, "createTempFile(3-args) - unexpected exception");
}
- // security: java.io.File-setReadOnly-DIR
+ // throwpoint: java.io.File-setReadOnly-DIR
harness.checkPoint("dir.setReadOnly");
try {
sm.prepareChecks(new Permission[]{tmpdir2WritePerm}, noPerms);
@@ -238,7 +238,7 @@
harness.check(false, "dir.setReadOnly - unexpected exception");
}
- // security: java.io.File-delete-DIR
+ // throwpoint: java.io.File-delete-DIR
// Make sure we remove the read only temp dir
harness.checkPoint("dir.delete");
try {
@@ -251,7 +251,7 @@
harness.check(false, "dir.delete - unexpected exception");
}
- // security: java.io.File-listRoots
+ // throwpoint: java.io.File-listRoots
harness.checkPoint("listRoots()");
try {
sm.prepareChecks(new Permission[]{rootReadPerm}, noPerms);
@@ -264,7 +264,7 @@
harness.check(false, "listRoots() - unexpected exception");
}
- // security: java.io.File-renameTo
+ // throwpoint: java.io.File-renameTo
harness.checkPoint("file.renameTo");
try {
sm.prepareChecks(new Permission[]{tmpfileWritePerm,
@@ -278,7 +278,7 @@
harness.check(false, "file.renameTo - unexpected exception");
}
- // security: java.io.File-setLastModified-DIR
+ // throwpoint: java.io.File-setLastModified-DIR
harness.checkPoint("dir.setLastModified()");
try {
sm.prepareChecks(new Permission[]{tmpdirWritePerm}, noPerms);
@@ -290,7 +290,7 @@
harness.check(false, "dir.setLastModified() - unexpected exception");
}
- // security: java.io.File-deleteOnExit-DIR
+ // throwpoint: java.io.File-deleteOnExit-DIR
harness.checkPoint("dir.deleteOnExit()");
try {
sm.prepareChecks(new Permission[]{tmpdirDeletePerm}, noPerms);
@@ -302,18 +302,18 @@
harness.check(false, "dir.deleteOnExit() - unexpected exception");
}
- // security: TODO: java.io.File-deleteOnExit-FILE
- // security: TODO: java.io.File-exists
- // security: TODO: java.io.File-canRead-FILE
- // security: TODO: java.io.File-isFile
- // security: TODO: java.io.File-isDirectory
- // security: TODO: java.io.File-isHidden
- // security: TODO: java.io.File-lastModified
- // security: TODO: java.io.File-length
- // security: TODO: java.io.File-canWrite-FILE
- // security: TODO: java.io.File-mkdir
- // security: TODO: java.io.File-mkdirs
- // security: TODO: java.io.File-setLastModified-FILE
+ // throwpoint: TODO: java.io.File-deleteOnExit-FILE
+ // throwpoint: TODO: java.io.File-exists
+ // throwpoint: TODO: java.io.File-canRead-FILE
+ // throwpoint: TODO: java.io.File-isFile
+ // throwpoint: TODO: java.io.File-isDirectory
+ // throwpoint: TODO: java.io.File-isHidden
+ // throwpoint: TODO: java.io.File-lastModified
+ // throwpoint: TODO: java.io.File-length
+ // throwpoint: TODO: java.io.File-canWrite-FILE
+ // throwpoint: TODO: java.io.File-mkdir
+ // throwpoint: TODO: java.io.File-mkdirs
+ // throwpoint: TODO: java.io.File-setLastModified-FILE
}
catch (Throwable ex) {
harness.debug(ex);
Index: gnu/testlet/java/io/FileInputStream/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/io/FileInputStream/security.java,v
retrieving revision 1.4
diff -u -r1.4 security.java
--- gnu/testlet/java/io/FileInputStream/security.java 31 Jan 2006 15:00:54 -0000 1.4
+++ gnu/testlet/java/io/FileInputStream/security.java 3 Feb 2006 10:21:21 -0000
@@ -45,7 +45,7 @@
try {
sm.install();
- // security: java.io.FileInputStream-FileInputStream(File)
+ // throwpoint: java.io.FileInputStream-FileInputStream(File)
harness.checkPoint("File constructor");
try {
sm.prepareChecks(new Permission[] {perm});
@@ -57,7 +57,7 @@
harness.check(false, "Unexpected check");
}
- // security: java.io.FileInputStream-FileInputStream(String)
+ // throwpoint: java.io.FileInputStream-FileInputStream(String)
harness.checkPoint("String constructor");
try {
sm.prepareChecks(new Permission[] {perm});
@@ -69,7 +69,7 @@
harness.check(false, "Unexpected check");
}
- // security: java.io.FileInputStream-FileInputStream(FileDescriptor)
+ // throwpoint: java.io.FileInputStream-FileInputStream(FileDescriptor)
harness.checkPoint("FileDescriptor constructor");
try {
sm.prepareChecks(new Permission[] {fdPerm});
Index: gnu/testlet/java/io/FileOutputStream/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/io/FileOutputStream/security.java,v
retrieving revision 1.5
diff -u -r1.5 security.java
--- gnu/testlet/java/io/FileOutputStream/security.java 31 Jan 2006 15:00:55 -0000 1.5
+++ gnu/testlet/java/io/FileOutputStream/security.java 3 Feb 2006 10:21:21 -0000
@@ -49,7 +49,7 @@
try {
sm.install();
- // security: java.io.FileOutputStream-FileOutputStream(File)
+ // throwpoint: java.io.FileOutputStream-FileOutputStream(File)
harness.checkPoint("File constructor");
try {
sm.prepareChecks(new Permission[] {wperm}, new Permission[] {rperm});
@@ -61,7 +61,7 @@
harness.check(false, "Unexpected check");
}
- // security: java.io.FileOutputStream-FileOutputStream(File, boolean)
+ // throwpoint: java.io.FileOutputStream-FileOutputStream(File, boolean)
harness.checkPoint("File, boolean constructor");
for (int i = 0; i <= 1; i++) {
try {
@@ -75,7 +75,7 @@
}
}
- // security: java.io.FileOutputStream-FileOutputStream(String)
+ // throwpoint: java.io.FileOutputStream-FileOutputStream(String)
harness.checkPoint("String constructor");
try {
sm.prepareChecks(new Permission[] {wperm}, new Permission[] {rperm});
@@ -87,7 +87,7 @@
harness.check(false, "Unexpected check");
}
- // security: java.io.FileOutputStream-FileOutputStream(String, boolean)
+ // throwpoint: java.io.FileOutputStream-FileOutputStream(String, boolean)
harness.checkPoint("String, boolean constructor");
for (int i = 0; i <= 1; i++) {
try {
@@ -101,7 +101,7 @@
}
}
- // security: java.io.FileOutputStream-FileOutputStream(FileDescriptor)
+ // throwpoint: java.io.FileOutputStream-FileOutputStream(FileDescriptor)
harness.checkPoint("FileDescriptor constructor");
try {
sm.prepareChecks(new Permission[] {fdPerm});
Index: gnu/testlet/java/io/ObjectInputStream/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/io/ObjectInputStream/security.java,v
retrieving revision 1.2
diff -u -r1.2 security.java
--- gnu/testlet/java/io/ObjectInputStream/security.java 31 Jan 2006 15:00:55 -0000 1.2
+++ gnu/testlet/java/io/ObjectInputStream/security.java 3 Feb 2006 10:21:21 -0000
@@ -48,7 +48,7 @@
try {
sm.install();
- // security: java.io.ObjectInputStream-ObjectInputStream
+ // throwpoint: java.io.ObjectInputStream-ObjectInputStream
harness.checkPoint("constructor");
try {
sm.prepareChecks(enableSubclassImplementation);
@@ -60,7 +60,7 @@
harness.check(false, "unexpected check");
}
- // security: java.io.ObjectInputStream-enableResolveObject
+ // throwpoint: java.io.ObjectInputStream-enableResolveObject
harness.checkPoint("enableResolveObject");
try {
sm.prepareChecks(noPerms);
Index: gnu/testlet/java/io/ObjectOutputStream/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/io/ObjectOutputStream/security.java,v
retrieving revision 1.2
diff -u -r1.2 security.java
--- gnu/testlet/java/io/ObjectOutputStream/security.java 31 Jan 2006 15:00:55 -0000 1.2
+++ gnu/testlet/java/io/ObjectOutputStream/security.java 3 Feb 2006 10:21:21 -0000
@@ -48,7 +48,7 @@
try {
sm.install();
- // security: java.io.ObjectOutputStream-ObjectOutputStream
+ // throwpoint: java.io.ObjectOutputStream-ObjectOutputStream
harness.checkPoint("constructor");
try {
sm.prepareChecks(enableSubclassImplementation);
@@ -60,7 +60,7 @@
harness.check(false, "unexpected check");
}
- // security: java.io.ObjectOutputStream-enableReplaceObject
+ // throwpoint: java.io.ObjectOutputStream-enableReplaceObject
harness.checkPoint("enableReplaceObject");
try {
sm.prepareChecks(noPerms);
Index: gnu/testlet/java/io/RandomAccessFile/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/io/RandomAccessFile/security.java,v
retrieving revision 1.1
diff -u -r1.1 security.java
--- gnu/testlet/java/io/RandomAccessFile/security.java 5 Dec 2005 15:28:11 -0000 1.1
+++ gnu/testlet/java/io/RandomAccessFile/security.java 3 Feb 2006 10:21:21 -0000
@@ -76,7 +76,7 @@
RandomAccessFile raf;
- // security: java.io.RandomAccessFile-RandomAccessFile(File, String)
+ // throwpoint: java.io.RandomAccessFile-RandomAccessFile(File, String)
harness.checkPoint("File constructor, mode = \"" + mode + "\"");
try {
sm.prepareChecks(mustCheck, mayCheck);
@@ -90,7 +90,7 @@
harness.check(false, "unexpected check");
}
- // security: java.io.RandomAccessFile-RandomAccessFile(String, String)
+ // throwpoint: java.io.RandomAccessFile-RandomAccessFile(String, String)
harness.checkPoint("String constructor, mode = \"" + mode + "\"");
try {
sm.prepareChecks(mustCheck, mayCheck);
Index: gnu/testlet/java/lang/Class/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/lang/Class/security.java,v
retrieving revision 1.2
diff -u -r1.2 security.java
--- gnu/testlet/java/lang/Class/security.java 31 Jan 2006 15:00:55 -0000 1.2
+++ gnu/testlet/java/lang/Class/security.java 3 Feb 2006 10:21:21 -0000
@@ -78,7 +78,7 @@
try {
sm.install();
- // security: java.lang.Class-forName
+ // throwpoint: java.lang.Class-forName
harness.checkPoint("forName");
try {
sm.prepareChecks(getClassLoader);
@@ -90,7 +90,7 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.Class-getClassLoader
+ // throwpoint: java.lang.Class-getClassLoader
harness.checkPoint("getClassLoader");
try {
sm.prepareChecks(getClassLoader);
@@ -105,7 +105,7 @@
// getDeclaredMember checks
getMemberChecks(harness, sm, testClass, true, accessDeclaredMembers);
- // security: java.lang.Class-getProtectionDomain
+ // throwpoint: java.lang.Class-getProtectionDomain
harness.checkPoint("getProtectionDomain");
try {
sm.prepareChecks(getProtectionDomain);
@@ -158,8 +158,8 @@
{
int level;
- // security: java.lang.Class-getClasses
- // security: java.lang.Class-getDeclaredClasses
+ // throwpoint: java.lang.Class-getClasses
+ // throwpoint: java.lang.Class-getDeclaredClasses
if (declared)
harness.checkPoint("getDeclaredClasses");
else
@@ -177,8 +177,8 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.Class-getFields
- // security: java.lang.Class-getDeclaredFields
+ // throwpoint: java.lang.Class-getFields
+ // throwpoint: java.lang.Class-getDeclaredFields
if (declared)
harness.checkPoint("getDeclaredFields");
else
@@ -196,8 +196,8 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.Class-getMethods
- // security: java.lang.Class-getDeclaredMethods
+ // throwpoint: java.lang.Class-getMethods
+ // throwpoint: java.lang.Class-getDeclaredMethods
if (declared)
harness.checkPoint("getDeclaredMethods");
else
@@ -215,8 +215,8 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.Class-getConstructors
- // security: java.lang.Class-getDeclaredConstructors
+ // throwpoint: java.lang.Class-getConstructors
+ // throwpoint: java.lang.Class-getDeclaredConstructors
if (declared)
harness.checkPoint("getDeclaredConstructors");
else
@@ -234,8 +234,8 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.Class-getField
- // security: java.lang.Class-getDeclaredField
+ // throwpoint: java.lang.Class-getField
+ // throwpoint: java.lang.Class-getDeclaredField
if (declared) {
harness.checkPoint("getDeclaredField");
level = 0;
@@ -270,8 +270,8 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.Class-getMethod
- // security: java.lang.Class-getDeclaredMethod
+ // throwpoint: java.lang.Class-getMethod
+ // throwpoint: java.lang.Class-getDeclaredMethod
if (declared)
harness.checkPoint("getDeclaredMethod");
else
@@ -304,8 +304,8 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.Class-getConstructor
- // security: java.lang.Class-getDeclaredConstructor
+ // throwpoint: java.lang.Class-getConstructor
+ // throwpoint: java.lang.Class-getDeclaredConstructor
if (declared) {
harness.checkPoint("getDeclaredConstructor");
level = 0;
Index: gnu/testlet/java/lang/ClassLoader/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/lang/ClassLoader/security.java,v
retrieving revision 1.2
diff -u -r1.2 security.java
--- gnu/testlet/java/lang/ClassLoader/security.java 31 Jan 2006 15:00:55 -0000 1.2
+++ gnu/testlet/java/lang/ClassLoader/security.java 3 Feb 2006 10:21:21 -0000
@@ -65,7 +65,7 @@
try {
sm.install();
- // security: java.lang.ClassLoader-ClassLoader()
+ // throwpoint: java.lang.ClassLoader-ClassLoader()
harness.checkPoint("Constructor (no-args)");
try {
sm.prepareChecks(createClassLoader);
@@ -77,7 +77,7 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.ClassLoader-ClassLoader(ClassLoader)
+ // throwpoint: java.lang.ClassLoader-ClassLoader(ClassLoader)
harness.checkPoint("Constructor (one-arg)");
try {
sm.prepareChecks(createClassLoader);
@@ -89,7 +89,7 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.ClassLoader-getSystemClassLoader
+ // throwpoint: java.lang.ClassLoader-getSystemClassLoader
harness.checkPoint("getSystemClassLoader");
try {
sm.prepareChecks(getClassLoader);
@@ -101,7 +101,7 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.ClassLoader-getParent
+ // throwpoint: java.lang.ClassLoader-getParent
harness.checkPoint("getParent");
try {
sm.prepareChecks(getClassLoader);
Index: gnu/testlet/java/lang/Runtime/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/lang/Runtime/security.java,v
retrieving revision 1.3
diff -u -r1.3 security.java
--- gnu/testlet/java/lang/Runtime/security.java 31 Jan 2006 15:00:55 -0000 1.3
+++ gnu/testlet/java/lang/Runtime/security.java 3 Feb 2006 10:21:21 -0000
@@ -66,7 +66,7 @@
try {
sm.install();
- // security: java.lang.Runtime-exec(String)
+ // throwpoint: java.lang.Runtime-exec(String)
harness.checkPoint("exec(String)");
try {
sm.prepareChecks(executeCommand, modifyThread);
@@ -78,7 +78,7 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.Runtime-exec(String, String[])
+ // throwpoint: java.lang.Runtime-exec(String, String[])
harness.checkPoint("exec(String, String[])");
try {
sm.prepareChecks(executeCommand, modifyThread);
@@ -90,7 +90,7 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.Runtime-exec(String, String[], File)
+ // throwpoint: java.lang.Runtime-exec(String, String[], File)
harness.checkPoint("exec(String, String[], File)");
try {
sm.prepareChecks(executeCommand, modifyThread);
@@ -102,7 +102,7 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.Runtime-exec(String[])
+ // throwpoint: java.lang.Runtime-exec(String[])
harness.checkPoint("exec(String[])");
try {
sm.prepareChecks(executeCommand, modifyThread);
@@ -114,7 +114,7 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.Runtime-exec(String[], String[])
+ // throwpoint: java.lang.Runtime-exec(String[], String[])
harness.checkPoint("exec(String[], String[])");
try {
sm.prepareChecks(executeCommand, modifyThread);
@@ -126,7 +126,7 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.Runtime-exec(String[], String[], File)
+ // throwpoint: java.lang.Runtime-exec(String[], String[], File)
harness.checkPoint("exec(String[], String[], File)");
try {
sm.prepareChecks(executeCommand, modifyThread);
@@ -138,7 +138,7 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.Runtime-exit
+ // throwpoint: java.lang.Runtime-exit
harness.checkPoint("exit");
try {
sm.prepareChecks(exitVM, true);
@@ -155,7 +155,7 @@
}
}
- // security: java.lang.Runtime-runFinalizersOnExit
+ // throwpoint: java.lang.Runtime-runFinalizersOnExit
harness.checkPoint("runFinalizersOnExit");
try {
sm.prepareChecks(exitVM);
@@ -167,7 +167,7 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.Runtime-addShutdownHook
+ // throwpoint: java.lang.Runtime-addShutdownHook
harness.checkPoint("addShutdownHook");
try {
sm.prepareChecks(shutdownHooks);
@@ -179,7 +179,7 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.Runtime-removeShutdownHook
+ // throwpoint: java.lang.Runtime-removeShutdownHook
harness.checkPoint("removeShutdownHook");
try {
sm.prepareChecks(shutdownHooks);
@@ -191,7 +191,7 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.Runtime-load
+ // throwpoint: java.lang.Runtime-load
harness.checkPoint("load");
try {
sm.prepareChecks(loadLibrary_name, true);
@@ -208,7 +208,7 @@
}
}
- // security: java.lang.Runtime-loadLibrary
+ // throwpoint: java.lang.Runtime-loadLibrary
harness.checkPoint("loadLibrary");
try {
sm.prepareChecks(loadLibrary_path, true);
Index: gnu/testlet/java/lang/System/security.java
===================================================================
RCS file: /cvs/mauve/mauve/gnu/testlet/java/lang/System/security.java,v
retrieving revision 1.3
diff -u -r1.3 security.java
--- gnu/testlet/java/lang/System/security.java 31 Jan 2006 15:00:55 -0000 1.3
+++ gnu/testlet/java/lang/System/security.java 3 Feb 2006 10:21:21 -0000
@@ -86,7 +86,7 @@
try {
sm.install();
- // security: java.lang.System-exit
+ // throwpoint: java.lang.System-exit
harness.checkPoint("exit");
try {
sm.prepareChecks(exitVM, true);
@@ -103,7 +103,7 @@
}
}
- // security: java.lang.System-runFinalizersOnExit
+ // throwpoint: java.lang.System-runFinalizersOnExit
harness.checkPoint("runFinalizersOnExit");
try {
sm.prepareChecks(exitVM);
@@ -115,7 +115,7 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.System-load
+ // throwpoint: java.lang.System-load
harness.checkPoint("load");
try {
sm.prepareChecks(loadLibrary_name, true);
@@ -132,7 +132,7 @@
}
}
- // security: java.lang.System-loadLibrary
+ // throwpoint: java.lang.System-loadLibrary
harness.checkPoint("loadLibrary");
try {
sm.prepareChecks(loadLibrary_path, true);
@@ -149,9 +149,9 @@
}
}
- // security: TODO: java.lang.System-getenv()
+ // throwpoint: TODO: java.lang.System-getenv()
- // security: java.lang.System-getenv(String)
+ // throwpoint: java.lang.System-getenv(String)
harness.checkPoint("getenv(String)");
try {
sm.prepareChecks(readVariable);
@@ -172,7 +172,7 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.System-getProperties
+ // throwpoint: java.lang.System-getProperties
harness.checkPoint("getProperties");
try {
sm.prepareChecks(readWriteAllProperties);
@@ -184,7 +184,7 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.System-setProperties
+ // throwpoint: java.lang.System-setProperties
harness.checkPoint("setProperties");
try {
sm.prepareChecks(readWriteAllProperties);
@@ -196,7 +196,7 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.System-getProperty(String)
+ // throwpoint: java.lang.System-getProperty(String)
harness.checkPoint("getProperty(String)");
try {
sm.prepareChecks(readProperty);
@@ -217,7 +217,7 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.System-getProperty(String, String)
+ // throwpoint: java.lang.System-getProperty(String, String)
harness.checkPoint("getProperty(String, String)");
try {
sm.prepareChecks(readProperty);
@@ -238,7 +238,7 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.System-setIn
+ // throwpoint: java.lang.System-setIn
harness.checkPoint("setIn");
try {
sm.prepareChecks(setIO);
@@ -250,7 +250,7 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.System-setOut
+ // throwpoint: java.lang.System-setOut
harness.checkPoint("setOut");
try {
sm.prepareChecks(setIO);
@@ -262,7 +262,7 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.System-setErr
+ // throwpoint: java.lang.System-setErr
harness.checkPoint("setErr");
try {
sm.prepareChecks(setIO);
@@ -274,7 +274,7 @@
harness.check(false, "unexpected check");
}
- // security: java.lang.System-setProperty
+ // throwpoint: java.lang.System-setProperty
harness.checkPoint("setProperty");
try {
sm.prepareChecks(writeProperty);
@@ -295,9 +295,9 @@
harness.check(false, "unexpected check");
}
- // security: TODO: java.lang.System-clearProperty
+ // throwpoint: TODO: java.lang.System-clearProperty
- // security: java.lang.System-setSecurityManager
+ // throwpoint: java.lang.System-setSecurityManager
harness.checkPoint("setSecurityManager");
try {
sm.prepareChecks(setSecurityManager);
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2006-06-02 9:53 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2006-06-02 9:53 FYI: Comment fixes Gary Benson
-- strict thread matches above, loose matches on Subject: below --
2006-02-03 10:24 Gary Benson
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).