Code review request: 8016051: Possible ClassCastException in KdcComm

2013-06-24 Thread Artem Smotrakov
Hi, please review this fix for 8: http://bugs.sun.com/bugdatabase/view_bug.do?bug_id=8016051 http://1.smotrakov.z8.ru/8016051/webrev.00/ It fixes a possible ClassCastException if an exception thrown from send() method is not IOException or KrbException. The first exception is thrown if all co

Re: Code review request: 8016051: Possible ClassCastException in KdcComm

2013-06-25 Thread Artem Smotrakov
? Thanks Max On 6/25/2013 1:35 PM, Artem Smotrakov wrote: Hi, please review this fix for 8: http://bugs.sun.com/bugdatabase/view_bug.do?bug_id=8016051 http://1.smotrakov.z8.ru/8016051/webrev.00/ It fixes a possible ClassCastException if an exception thrown from send() method is not IOException or

Code Review request: 8028431: NullPointerException in DerValue.equals(DerValue)

2013-12-20 Thread Artem Smotrakov
Hi, please review this fix for 9: https://bugs.openjdk.java.net/browse/JDK-8028431 http://cr.openjdk.java.net/~asmotrak/8028431/webrev.00/ sun.security.util.DerValue.equals(DerValue) method does not check that null is passed. As a r

Re: Code Review request: 8028431: NullPointerException in DerValue.equals(DerValue)

2013-12-20 Thread Artem Smotrakov
tag for 'othervm'. Thanks. On 20/12/2013 12:51, Artem Smotrakov wrote: Hi, please review this fix for 9: https://bugs.openjdk.java.net/browse/JDK-8028431 http://cr.openjdk.java.net/~asmotrak/8028431/webrev.00/ <http://cr.openjdk.java.net/%7Easmotrak/8028431/webrev.00/> s

Re: Code Review request: 8028431: NullPointerException in DerValue.equals(DerValue)

2013-12-24 Thread Artem Smotrakov
the copyright year range at the start of DerValue.java. Also I would add the test to the existing test/java/security/cert/X509Certificate/ directory rather than create a new one. Finally, I think the test should run fine without the jtreg tag for 'othervm'. Thanks. On 20/12/2013 12:

Code Review request: 8028591: NegativeArraySizeException in sun.security.util.DerInputStream.getUnalignedBitString()

2014-01-30 Thread Artem Smotrakov
Please review this fix for 9: https://bugs.openjdk.java.net/browse/JDK-8028591 http://cr.openjdk.java.net/~asmotrak/8028591/webrev.00/ getLength() method is used to get a length of bit string. The method can return a negative value t

Re: Code Review request: 8028591: NegativeArraySizeException in sun.security.util.DerInputStream.getUnalignedBitString()

2014-02-25 Thread Artem Smotrakov
encodings where it is illegal to use the indefinite-length method, change the code to call the method with the flag set to true. --Sean On 01/30/2014 03:47 AM, Artem Smotrakov wrote: Please review this fix for 9: https://bugs.openjdk.java.net/browse/JDK-8028591 http://cr.openjdk.java.net

Re: Code Review request: 8028591: NegativeArraySizeException in sun.security.util.DerInputStream.getUnalignedBitString()

2014-03-12 Thread Artem Smotrakov
ible to be false? Thanks Max On Feb 26, 2014, at 15:41, Artem Smotrakov wrote: Hi Sean, Thank you for your feedback. It was confusing to me that the impl supports indefinite-length encoding for DER. According to [1], indefinite-length method shall be used for DER: ... 10.1 Length forms The defini

Re: Code Review request: 8028591: NegativeArraySizeException in sun.security.util.DerInputStream.getUnalignedBitString()

2014-03-12 Thread Artem Smotrakov
On 03/12/2014 02:14 PM, Wang Weijun wrote: First, let me clarify again that your webrev is fine. All items below are unrelated and we can address it with another bug if necessary. Ok, thank you. On Mar 12, 2014, at 16:55, Artem Smotrakov wrote: Hi Max, 1. DerInputStream.readVector

RFR: 8048603: Additional tests for MAC algorithms

2014-11-07 Thread Artem Smotrakov
Please review a couple of new test cases for MAC algorithms. https://bugs.openjdk.java.net/browse/JDK-8048603 http://cr.openjdk.java.net/~asmotrak/8048603/webrev.00/ Artem

[9] request for review 8059009: LDAPCertStore fails to retrieve CRL after LDAP server closes idle connection

2014-12-01 Thread Artem Smotrakov
Please review this fix for 9. It corrects the following issues: - InitialLdapContext and LDAPCertStore does not recover connection if it was closed, for example, by server, or due to some network issue - A cache of CertStore instances in LDAPCertStore does not work if LDAPCertStoreParameters is

Re: RFR: 8048603: Additional tests for MAC algorithms

2014-12-11 Thread Artem Smotrakov
check that CloneNotSupportedException is thrown on Solaris Please take a look. http://cr.openjdk.java.net/~asmotrak/8048603/webrev.01/ Artem On 11/07/2014 01:07 PM, Artem Smotrakov wrote: Please review a couple of new test cases for MAC algorithms. https://bugs.openjdk.java.net/browse/JDK-8048603

Re: RFR: 8048603: Additional tests for MAC algorithms

2014-12-22 Thread Artem Smotrakov
Mac.getInstance(). Since they are under the regression tests directory for SunJCE, perhaps we should specify SunJCE provider to be used. 2) 'ALGORITHMS' seems redundant for sun/security/pkcs11/Mac/MacSameTest.java Thanks, Valerie On 12/11/2014 2:17 AM, Artem Smotrakov wrote: I have a

[9] request for review: 8049171: Additional tests for jarsigner's warnings

2015-01-20 Thread Artem Smotrakov
Hello, Please review a couple of new tests for jarsigner's warnings. Basically tests run jarsigner and check warning/error messages and exit codes according to [1]. https://bugs.openjdk.java.net/browse/JDK-8049171 http://cr.openjdk.java.net/~asmotrak/8049171/webrev.00 [1] http://docs.oracle

Re: [9] request for review: 8049171: Additional tests for jarsigner's warnings

2015-01-22 Thread Artem Smotrakov
, at 14:35, Artem Smotrakov wrote: Hello, Please review a couple of new tests for jarsigner's warnings. Basically tests run jarsigner and check warning/error messages and exit codes according to [1]. https://bugs.openjdk.java.net/browse/JDK-8049171 http://cr.openjdk.java.net/~asmotrak/80

Re: [9] request for review: 8049171: Additional tests for jarsigner's warnings

2015-01-23 Thread Artem Smotrakov
Hi Max, Please see inline. On 01/23/2015 05:18 AM, Wang Weijun wrote: I have updated the webrev, updateJar() method does the following: >- creates a new jar file (destJarFilename) >- puts files which are specified in files parameter to destJarFilename >- copies files from srcJarFilename to dest

Re: [9] request for review: 8049171: Additional tests for jarsigner's warnings

2015-01-25 Thread Artem Smotrakov
Hi Max, Here is an updated webrev, please take a look. http://cr.openjdk.java.net/~asmotrak/8049171/webrev.02/ Artem On 01/26/2015 05:03 AM, Weijun Wang wrote: On 1/23/2015 16:12, Artem Smotrakov wrote: If the MANIFEST and the signature files must be at the beginning, should it be

Re: [9] request for review: 8049171: Additional tests for jarsigner's warnings

2015-01-26 Thread Artem Smotrakov
On 01/26/2015 11:11 AM, Wang Weijun wrote: JarUtils: You can break after line 83. Sure, I have updated the webrev http://cr.openjdk.java.net/~asmotrak/8049171/webrev.03/ Otherwise very good. Thanks for reviewing this. Thanks Max On Jan 26, 2015, at 15:55, Artem Smotrakov wrote: Hi

[9] request for review: 8048147: Privilege tests with JAAS Subject.doAs

2015-03-16 Thread Artem Smotrakov
Hello, Please review a couple of new tests for privilege checks on Subject.doAs(). https://bugs.openjdk.java.net/browse/JDK-8048147 http://cr.openjdk.java.net/~asmotrak/8048147/webrev.00/ Artem

Re: [9] request for review: 8048147: Privilege tests with JAAS Subject.doAs

2015-03-18 Thread Artem Smotrakov
16, 2015, at 18:47, Artem Smotrakov wrote: Hello, Please review a couple of new tests for privilege checks on Subject.doAs(). https://bugs.openjdk.java.net/browse/JDK-8048147 http://cr.openjdk.java.net/~asmotrak/8048147/webrev.00/ Artem

Re: [9] request for review: 8048147: Privilege tests with JAAS Subject.doAs

2015-03-18 Thread Artem Smotrakov
On Mar 18, 2015, at 17:39, Wang Weijun wrote: It looks like the classes are loaded from test.classes since there is nowhere setting classpath to those jars. Maybe you cannot rely on "@run main". --Max On Mar 18, 2015, at 17:21, Artem Smotrakov wrote: Hi Max, Thank you for the r

Re: [9] request for review: 8048147: Privilege tests with JAAS Subject.doAs

2015-03-19 Thread Artem Smotrakov
them clearer. Please take a look: http://cr.openjdk.java.net/~asmotrak/8048147/webrev.02/ Artem On 03/18/2015 06:08 PM, Wang Weijun wrote: On Mar 18, 2015, at 19:31, Artem Smotrakov wrote: The tests can be updated to start a new process with ProcessTools, or use a script. Choose anyone you

Re: [9] request for review: 8048147: Privilege tests with JAAS Subject.doAs

2015-03-19 Thread Artem Smotrakov
dn't update the webrev. Sorry about that and thanks for attention. Please take a look at http://cr.openjdk.java.net/~asmotrak/8048147/webrev.03/ Artem Thanks Max On Mar 19, 2015, at 19:39, Artem Smotrakov wrote: Hi Max, I agree that sometimes use of a shell script makes a test c

Re: [9] request for review: 8048147: Privilege tests with JAAS Subject.doAs

2015-03-20 Thread Artem Smotrakov
changeset comment you want to use. Thanks Max On Mar 20, 2015, at 14:49, Artem Smotrakov wrote: Hi Max, Please see inline. On 03/19/2015 05:33 PM, Wang Weijun wrote: This looks fine. One comment, 156 cmds.add("-Duser.dir=" + WORK_DIR); Looks unnecessary. In fact, I

[9] RFR: 8076221: Disable RC4 cipher suites

2015-04-13 Thread Artem Smotrakov
Hello, RFC 7465 [1] has been published to prohibit RC4. Please review this fix which disables RC4 cipher suites in JDK 9 by adding "RC4" to "jdk.tls.disabledAlgorithms" security property. Webrev: http://cr.openjdk.java.net/~asmotrak/8076221/webrev.00/ Bug: https://bugs.openjdk.java.net/browse

[8u] RFR: 8076221: Disable RC4 cipher suites

2015-04-15 Thread Artem Smotrakov
Hello, RFC 7465 [1] has been published to prohibit RC4. Please review this fix which disables RC4 cipher suites in JDK 8u by adding "RC4" to "jdk.tls.disabledAlgorithms" security property. Webrev: http://cr.openjdk.java.net/~asmotrak/8076221/webrev.8u.00/ Bug: https://bugs.openjdk.java.net/bro

Re: [8u] RFR: 8076221: Disable RC4 cipher suites

2015-04-15 Thread Artem Smotrakov
uelei Fan wrote: Looks fine to me. Xuelei On 4/15/2015 3:06 PM, Artem Smotrakov wrote: Hello, RFC 7465 [1] has been published to prohibit RC4. Please review this fix which disables RC4 cipher suites in JDK 8u by adding "RC4" to "jdk.tls.disabledAlgorithms" security property.

[9] RFR: 8050374: More Signature tests

2015-04-20 Thread Artem Smotrakov
Hello, Please review a couple of new tests for Signature and SignedObject. The test use different providers, that's why I put them to provider-specific locations. Bug: https://bugs.openjdk.java.net/browse/JDK-8050374 Webrev: http://cr.openjdk.java.net/~asmotrak/8050374/webrev.00/ Artem

[9] RFR: 8048138: Tests for JAAS callbacks

2015-04-21 Thread Artem Smotrakov
Hello, Please review a couple of new tests for JAAS: - StandardCallbacks.java is for standard JAAS callbacks (except RealmCallback and RealmChoiceCallback since the test is not about Sasl, and actually those two callback extends ChoiceCallback which is used in the test) - SharedState.java che

[9] RFR: 8075007: Additional tests for krb5-related cipher suites with unbound server

2015-04-21 Thread Artem Smotrakov
Hello, Please review a couple of new tests for krb5 cipher suites with unbound server: - tests check if an unbound server can handle connections only for allowed service principals - tests check if an unbound server picks up a correct key from keytab - tests check if an unbound server uses a s

Re: [9] RFR: 8048138: Tests for JAAS callbacks

2015-04-22 Thread Artem Smotrakov
vase/8/docs/api/javax/security/auth/login/LoginContext.html Please see an updated webrev: http://cr.openjdk.java.net/~asmotrak/8048138/webrev.01/ Artem Thanks Max On 4/21/2015 10:22 PM, Artem Smotrakov wrote: Hello, Please review a couple of new tests for JAAS: - StandardCallbacks.java is fo

Re: [9] RFR: 8075007: Additional tests for krb5-related cipher suites with unbound server

2015-04-22 Thread Artem Smotrakov
x27;t requite the policy file. But they still need to be run in othervm mode since they use system properties. I updated these two tests not to use the policy file http://cr.openjdk.java.net/~asmotrak/8075007/webrev.01/ Artem Thanks Max On 4/21/2015 10:41 PM, Artem Smotrakov wrote: Hello, P

Re: [9] RFR: 8075007: Additional tests for krb5-related cipher suites with unbound server

2015-04-23 Thread Artem Smotrakov
ght at the end of the startServer() method? I believe all the current tests can actually benefit from this. --Max On 4/23/2015 2:30 PM, Artem Smotrakov wrote: Hi Max, On 04/22/2015 05:51 PM, Weijun Wang wrote: Hi Artem These are splendid tests. So do they just all pass? :-) Yes, fortunate

[9] RFR: 8076486: javax/security/auth/Subject/doAs/NestedActions.java fails if extra VM options are given

2015-04-29 Thread Artem Smotrakov
Hello, Please review this fix for javax/security/auth/Subject/doAs/NestedActions.java test. The test runs java in a separate process. It fails if multiple java options are passed because ProcessBuilder expects each parameter to be put in to a separate array element, but the test didn't do th

Re: [9] RFR: 8076486: javax/security/auth/Subject/doAs/NestedActions.java fails if extra VM options are given

2015-04-29 Thread Artem Smotrakov
g. And it seems Collections.addAll() can add an array to a list. Of course, you are free to exercise any fancy jdk8 features. :-) Thanks Max On 4/29/2015 3:23 PM, Artem Smotrakov wrote: Hello, Please review this fix for javax/security/auth/Subject/doAs/NestedActions.java test. The test runs

Re: [9] RFR: 8076486: javax/security/auth/Subject/doAs/NestedActions.java fails if extra VM options are given

2015-05-05 Thread Artem Smotrakov
l be an empty string. If you can be sure JAVA_OPTS does not have them, your code change is fine. Thanks Max On 4/29/2015 11:44 PM, Artem Smotrakov wrote: Hi Max, These fancy things sometimes make me forget about simpler ways :-) Please take a look http://cr.openjdk.java.net/~asmotrak/8076486/w

Re: [9] RFR: 8050374: More Signature tests

2015-05-12 Thread Artem Smotrakov
Hello, I added 'randomness' key, and updated Offsets.java to use jdk.testlibrary.RandomFactory. Please take a look: http://cr.openjdk.java.net/~asmotrak/8050374/webrev.01/ Artem On 04/21/2015 08:25 AM, Artem Smotrakov wrote: Hello, Please review a couple of new tests for Sig

[9] RFR: 8074784: Additional tests for XML DSig API

2015-05-12 Thread Artem Smotrakov
Hello, Please review a new test for generating and validation of detached XML digital signatures. Bug: https://bugs.openjdk.java.net/browse/JDK-8074784 Webrev: http://cr.openjdk.java.net/~asmotrak/8074784/webrev.00/ Artem

[9] RFR: 8079138: Additional negative tests for XML signature processing

2015-05-15 Thread Artem Smotrakov
Hello, Please review a couple of negative tests which check that invalid XML digital signatures are rejected. Bug: https://bugs.openjdk.java.net/browse/JDK-8079138 Webrev: http://cr.openjdk.java.net/~asmotrak/8079138/webrev.01/ Artem

[9] RFR: 8079140: IgnoreAllErrorHandler should use doPrivileged when it reads system properties

2015-05-15 Thread Artem Smotrakov
Hello, Please review this fix for 9. If security manager is enabled, but "org.jcp.xml.dsig.secureValidation" property is off, IgnoreAllErrorHandler tries to read two system properties. If appropriate permissions are not granted, it fails with ExceptionInInitializerError. Changes: - updated

Re: [9] RFR: 8079140: IgnoreAllErrorHandler should use doPrivileged when it reads system properties

2015-05-18 Thread Artem Smotrakov
50-52) because ideally this code needs to stay in sync with the Apache Santuario implementation which still supports JDK 1.6 and up. Thanks, Sean On 05/15/2015 02:23 PM, Artem Smotrakov wrote: Hello, Please review this fix for 9. If security manager is enabled, but

Re: [9] RFR: 8074784: Additional tests for XML DSig API

2015-05-20 Thread Artem Smotrakov
and ValidationTests in the test/javax/xml/crypto/dsig directory, so you could reuse common code. Thanks, Sean On 05/12/2015 11:32 AM, Artem Smotrakov wrote: Hello, Please review a new test for generating and validation of detached XML digital signatures. Bug: https://bugs.openjdk.java.net/bro

[9] RFR: 8078823: javax/net/ssl/ciphersuites/DisabledAlgorithms.java fails intermittently

2015-05-25 Thread Artem Smotrakov
Hello, Please review this fix for javax/net/ssl/ciphersuites/DisabledAlgorithms.java test. It fails very rarely with SocketException. The test runs clients in main thread, but a server runs in a separate thread. In checkFailure() method, clients expect a SSLHandshakeException, and when it oc

[9] RFR: 8129575: Equal DelegationPermission instances may return different hash codes

2015-06-25 Thread Artem Smotrakov
Hello, Please review this fix for 9. A string which contains a number of principals can be passed to constructor of DelegationPermission. The class parses this string, and extracts principals. But hashCode() method in DelegationPermission uses Permission.getName() to calculate a hash. Permiss

Re: [9] RFR: 8129575: Equal DelegationPermission instances may return different hash codes

2015-06-25 Thread Artem Smotrakov
Sure, http://cr.openjdk.java.net/~asmotrak/delegation_permission/webrev.02/ Artem On 06/25/2015 02:14 PM, Sean Mullan wrote: Looks good. There is an incorrect period at the end of line 152, can you also remove that? Thanks, Sean On 06/25/2015 06:56 AM, Artem Smotrakov wrote: Hello, Please

Re: [9] RFR: 8129575: Equal DelegationPermission instances may return different hash codes

2015-06-25 Thread Artem Smotrakov
Hi Max, Yes, please push it in to the repository. Artem On 06/25/2015 03:16 PM, Weijun Wang wrote: Good. Do you need me pushing it for you? --Max On 06/25/2015 07:33 PM, Artem Smotrakov wrote: Sure, http://cr.openjdk.java.net/~asmotrak/delegation_permission/webrev.02/ Artem On 06/25

Re: [9] RFR: 8074784: Additional tests for XML DSig API

2015-06-26 Thread Artem Smotrakov
Hi Sean, I added new test cases to GenerationTests, please take a look: http://cr.openjdk.java.net/~asmotrak/8074784/webrev.01/ Artem On 06/16/2015 07:23 PM, Sean Mullan wrote: On 05/20/2015 04:16 PM, Artem Smotrakov wrote: Hi Sean, Yes, at first, I thought about updating the existing

[9] RFR: 8049814: Additional SASL client-server tests

2015-07-08 Thread Artem Smotrakov
Hello, Please review a client/server test for SASL which uses different mechanisms and QOPs. Bug: https://bugs.openjdk.java.net/browse/JDK-8049814 Webrev: http://cr.openjdk.java.net/~asmotrak/8049814/webrev.00/ Artem

Re: [9] RFR: 8049814: Additional SASL client-server tests

2015-07-09 Thread Artem Smotrakov
Removed one duplicate test case at line 100 in webrev.00, please see updated webrev: http://cr.openjdk.java.net/~asmotrak/8049814/webrev.01/ Artem On 07/08/2015 05:30 PM, Artem Smotrakov wrote: Hello, Please review a client/server test for SASL which uses different mechanisms and QOPs

[9] RFR: 8048596: Tests for AEAD ciphers

2015-07-10 Thread Artem Smotrakov
Hello, Please review a couple of new tests for AEAD ciphers. Webrev: http://cr.openjdk.java.net/~asmotrak/8048596/webrev.01/ Bug: https://bugs.openjdk.java.net/browse/JDK-8048596 Artem

[9] RFR: 8130041: TsacertOptionTest.java intermittently fails on Mac

2015-07-11 Thread Artem Smotrakov
Hello, Please review this fix for TsacertOptionTest.java test. The test fails intermittently on some Macs. It starts a local TSA service which is actually an HTTP server. Then, it runs jarsigner which uses this local TSA service. The failure happens on some Macs due to system network settings

Re: [9] RFR: 8049814: Additional SASL client-server tests

2015-07-14 Thread Artem Smotrakov
e 90. Why not move lines 88-93 to the beginning? 92: s/authQopConf/authConfQop/; Thanks Max On 07/10/2015 01:16 AM, Artem Smotrakov wrote: Removed one duplicate test case at line 100 in webrev.00, please see updated webrev: http://cr.openjdk.java.net/~asmotrak/8049814/webrev.01/ Artem On

Re: [9] RFR: 8049814: Additional SASL client-server tests

2015-07-15 Thread Artem Smotrakov
Thanks Max! Yes, I still can't commit the changes, please push them http://cr.openjdk.java.net/~asmotrak/8049814/webrev.03/ Artem On 07/15/2015 05:11 AM, Weijun Wang wrote: On 07/15/2015 10:29 AM, Artem Smotrakov wrote: Hi Max, Status is currently used to indicate an error on server

[9] RFR: 8075297: Tests for RFEs 4515853 and 4745056

2015-07-15 Thread Artem Smotrakov
Hello, Please review a couple of new tests that check that: - Kerberos client tries slave KDC if master KDC is not responding - if refreshKrb5Config is set to true for Krb5LoginModule, then configuration will be refreshed before login() method is called KDC.java registers a name service which

Re: [9] RFR: 8075297: Tests for RFEs 4515853 and 4745056

2015-07-16 Thread Artem Smotrakov
BogusKDC.java? Thanks Max On 07/16/2015 01:38 PM, Artem Smotrakov wrote: Hello, Please review a couple of new tests that check that: - Kerberos client tries slave KDC if master KDC is not responding - if refreshKrb5Config is set to true for Krb5LoginModule, then configuration will be refreshed before

Re: [9] RFR: 8075297: Tests for RFEs 4515853 and 4745056

2015-07-16 Thread Artem Smotrakov
97/webrev.02/ I am trying to drag the review process longer so you can push it yourself. :-) It looks like my account has been updated, so probably I can push it by myself now :-) http://openjdk.java.net/census#asmotrak Artem Thanks Max On 07/17/2015 05:05 AM, Artem Smotrakov wrote: Hi

Re: [9] RFR: 8075297: Tests for RFEs 4515853 and 4745056

2015-07-17 Thread Artem Smotrakov
Hi Max, Please see an updated webrev: http://cr.openjdk.java.net/~asmotrak/8075297/webrev.03/ Artem On 07/16/2015 11:31 PM, Wang Weijun wrote: I think it it enough to add a "max_retries = 1" to [libdefaults] of krb5.conf, and left default timeout value for the test. Please take a look at upd

Re: [9] RFR: 8075297: Tests for RFEs 4515853 and 4745056

2015-07-17 Thread Artem Smotrakov
"max_retries = 1")); --Max On 07/18/2015 01:51 AM, Artem Smotrakov wrote: Hi Max, Please see an updated webrev: http://cr.openjdk.java.net/~asmotrak/8075297/webrev.03/ Artem On 07/16/2015 11:31 PM, Wang Weijun wrote: I think it it enough to add a "max_retries = 1" to [lib

Re: [9] RFR: 8048596: Tests for AEAD ciphers

2015-07-20 Thread Artem Smotrakov
line 190: I think either "generated" or "specified" is better than "saved". - line 117: template not reporting key length? - line 219: getInstance with "SunJCE"? - line 110: this check can be done earlier, e.g. on line 108. Thanks, Valerie On 7/10/2015 1

Re: [9] RFR: 8048596: Tests for AEAD ciphers

2015-07-24 Thread Artem Smotrakov
;s generally ok to just re-use the same input for various test scenarios in the same test class. As far as I am concerned, the benefit of get data in one line doesn't quite justify the extra dependency. The updated webrev looks fine. Valerie On 7/20/2015 11:33 PM, Artem Smotrakov wrote: Hi

[9] RFR: 8075299: Additional tests for 6857795

2015-08-05 Thread Artem Smotrakov
Hello, Please review a couple of new tests which checks if krb5 settings are read correctly from conf file and system properties. Bug: https://bugs.openjdk.java.net/browse/JDK-8075299 Webrev: http://cr.openjdk.java.net/~asmotrak/8075299/webrev.00/ Artem

Re: [9] RFR: 8075299: Additional tests for 6857795

2015-08-06 Thread Artem Smotrakov
bout details right now, need to do some experiments) What do you think? Thanks for review. Please take a look at updated webrev http://cr.openjdk.java.net/~asmotrak/8075299/webrev.01/ Artem Thanks Max On 08/05/2015 07:01 PM, Artem Smotrakov wrote: Hello, Please review a couple of new test

[9] RFR: 8048622: Enhance tests for PKCS11 keystores with NSS

2015-08-21 Thread Artem Smotrakov
Hello, Please review a couple of changes for PKCS11 tests: - Added a new test which checks that a keystore can't be loaded with incorrect password, found https://bugs.openjdk.java.net/browse/JDK-8134232 - Added a check that a trusted entry can be removedfrom keystore - Updated existing tests

[9] RFR: 8134708: Certpath validation fails to load certs and CRLs if AIA and CRLDP extensions point to LDAP resources

2015-09-01 Thread Artem Smotrakov
Hello, Please review this fix for 9. Certpath validation fails to load certs and CRLs if AIA and CRLDP extensions point to LDAP resources. This happens because LDAPCertStore accepts only instances of LDAPCertStoreParameters and URICertStoreParameters classes, but sun.security.provider.certpa

Re: [9] RFR: 8134708: Certpath validation fails to load certs and CRLs if AIA and CRLDP extensions point to LDAP resources

2015-09-08 Thread Artem Smotrakov
"Only LDAP URIs are supported for LDAP Certore"); Let's print the scheme received! } else if (!(selector instanceof X509CertSelector)) { throw new CertStoreException("need X509CertSelector to find certs"); this code occurs twice. Let's print

Re: [9] RFR: 8075299: Additional tests for 6857795

2015-09-10 Thread Artem Smotrakov
http://cr.openjdk.java.net/~asmotrak/8075299/webrev.02/ [1] http://docs.oracle.com/javase/8/docs/technotes/tools/windows/kinit.html Artem On 09/10/2015 11:48 AM, Wang Weijun wrote: Everything is fine. Some answers inline: On Aug 6, 2015, at 9:42 PM, Artem Smotrakov wrote: By the way, as far as I know, current

Re: [9] RFR: 8075299: Additional tests for 6857795

2015-09-10 Thread Artem Smotrakov
Sorry, I forgot to remove "-f" and "-p" options for kinit http://cr.openjdk.java.net/~asmotrak/8075299/webrev.03/ Artem On 09/10/2015 03:18 PM, Artem Smotrakov wrote: Hi Max, It seems that kinit doesn't print any info about ticket flags [1] (I am not sure that it

[9] RFR: 8134232: KeyStore.load() throws an IOException with a wrong cause in case of wrong password

2015-09-11 Thread Artem Smotrakov
Hello, Please review this for 9. According to [1], KeyStore.load(InputStream, char[]) method should throw an IOException, and the cause of the IOException should be an UnrecoverableKeyException: ... Throws: IOException - if there is an I/O or format problem with the keystore data, if a pass

Re: [9] RFR: 8048622: Enhance tests for PKCS11 keystores with NSS

2015-09-11 Thread Artem Smotrakov
Hello, I just sent out a suggested fix for 8048622. I'll update ProblemList.txt here if 8048622 is integrated. Please take a look. Artem On 08/21/2015 11:34 PM, Artem Smotrakov wrote: Hello, Please review a couple of changes for PKCS11 tests: - Added a new test which checks that a key

[9] RFR 8136600: sun/security/krb5/auto/tools/KinitConfPlusProps.java test intermittently fails because PortUnreachableException is missing

2015-09-29 Thread Artem Smotrakov
Hello, Please review this small test fix for https://bugs.openjdk.java.net/browse/JDK-8136600 The test runs kinit, and expects PortUnreachableException because of wrong KDC port number specified. It seems that other exceptions may be thrown as well. That may depend on platform where the test

Re: [9] RFR 8136600: sun/security/krb5/auto/tools/KinitConfPlusProps.java test intermittently fails because PortUnreachableException is missing

2015-09-29 Thread Artem Smotrakov
Hi Max, I observed SocketTimeoutException on Windows only, but I suppose it can happen on other platforms. Artem On 09/29/2015 05:49 PM, Wang Weijun wrote: Looks fine. Is it Mac or Windows? Is it a SocketTimeoutException? Thanks Max On 2015年9月29日, at 下午10:01, Artem Smotrakov wrote

Re: RFR: JDK-8134577 - Eliminate or standardize a replacement for sun.net.spi.nameservice.NameServiceDescriptor

2015-10-25 Thread Artem Smotrakov
Hi Mark, I am not a reviewer, just have a couple of comments about InetAddress.java 1. It may be better to create an instance of Scanner in try-with-resource block to be sure that Scanner.close() method is called. 2. Lines 909-923: There are two similar "if" blocks in the loop. Looks like th

[9] RFR: 8140470: javax/xml/crypto/dsig/SecurityManager/XMLDSigWithSecMgr.java failed with java.security.AccessControlException

2015-12-03 Thread Artem Smotrakov
Hello, Please review this small fix which updates XMLDSigWithSecMgr.java test to extend the default security policy instead of override. Please see details here: https://bugs.openjdk.java.net/browse/JDK-8140470?focusedCommentId=13873347&page=com.atlassian.jira.plugin.system.issuetabpanels:com

Re: [9] RFR: 8140470: javax/xml/crypto/dsig/SecurityManager/XMLDSigWithSecMgr.java failed with java.security.AccessControlException

2015-12-03 Thread Artem Smotrakov
I sent a wrong version of webrev, please use the following one http://cr.openjdk.java.net/~asmotrak/8140470/webrev.01/ Artem On 12/03/2015 05:10 PM, Artem Smotrakov wrote: Hello, Please review this small fix which updates XMLDSigWithSecMgr.java test to extend the default security policy

[9] RFR: 8144539: Update PKCS11 tests to run with security manager

2016-01-06 Thread Artem Smotrakov
Hello, Please review this enhancement for PKCS11 tests which updates them to run with both enabled and disable security manager. Tests enable a security manager before running actual test cases for each particular security provider, and disable it when the test cases finish. This helps to av

[9] RFR: 8151734: Mark Unreachable.java and MaxRetries.java as intermittently failing

2016-03-11 Thread Artem Smotrakov
Hello, The following krb5 tests have been observed to intermittently fail: sun/security/krb5/auto/Unreachable.java sun/security/krb5/auto/MaxRetries.java Please see the following bugs for details: https://bugs.openjdk.java.net/browse/JDK-8087144 https://bugs.openjdk.java.net/browse/JDK-8015595

[9] RFR: 8152798: Mark WeakCipherSuite.java as intermittently failing

2016-03-25 Thread Artem Smotrakov
Hello, The following DTLS test has been observed to intermittently fail: javax/net/ssl/DTLS/WeakCipherSuite.java Please see https://bugs.openjdk.java.net/browse/JDK-8138877 for details. Until this bug is fixed, the test should be marked accordingly. Please review the patch below which does th

Re: RFR 8153545: sun/security/pkcs11/Provider/Login.sh fails on Linux

2016-04-11 Thread Artem Smotrakov
Hi Max, The policy files already have SecurityPermission "putProviderProperty.*", PKCS11Test class is quite complex. PKCS11Test needs to be run without specifying -Djava.secutity.manager. In PKCS11Test.main(), if args[0] is "sm", then the class enables a security manager right before actual

[9] RFR: 8134267: javax/net/ssl/TLS/TestJSSE.java fails intermittently with BindException: Address already in use

2016-05-18 Thread Artem Smotrakov
Hello, Please review the following patch for javax/net/ssl/TLS/TestJSSE.java test. The test fails intermittently with BindException because it can use a busy port. The test uses jdk.testlibrary.Utils.getFreePort() which creates a server socket, and returns its local port number. Then this por

[9] RFR: 8129389: javax/net/ssl/DTLS tests fail intermittently

2016-05-18 Thread Artem Smotrakov
Hello, Please review the following patch for DTLS tests. A couple of DTLS tests which are based on DTLSOverDatagram.java fail intermittently. I was not able to reproduce these failures. I am proposing to update the tests to print more information to logs, so that more information will be avai

[9] RFR: 8157344: Multiple test timeouts after push for JDK-8141039

2016-05-19 Thread Artem Smotrakov
Hello, Please review this patch for SecureRandom tests which may fail with timeout because SeedGenerator. generateSeed() may block on /dev/random. The tests now use /dev/urandom instead. They also run in othervm mode since "java.security.egd" system property seems to be read once while initi

Re: [9] RFR: 8129389: javax/net/ssl/DTLS tests fail intermittently

2016-05-19 Thread Artem Smotrakov
I added more output for debugging intermittent failures in https://bugs.openjdk.java.net/browse/JDK-8132320 I also updated produceHandshakePackets() to handle NEED_UNWRAP_AGAIN. http://cr.openjdk.java.net/~asmotrak/8129389/webrev.01/ Artem On 05/18/2016 08:28 PM, Artem Smotrakov wrote

[9] RFR: 8159038: javax/net/ssl/SSLSession/SessionCacheSizeTests.java failed with java.net.SocketException: Address already in use

2016-06-13 Thread Artem Smotrakov
Hello, Please review this patch for 9. javax/net/ssl/SSLSession/SessionCacheSizeTests.java test fails intermittently with "java.net.SocketException: Address already in use" exception. This exception occurs while creating a server socket: ... void doServerSide(int serverPort, int serverConns)

[9] RFR: 8159501: ShortRSAKey512.java intermittently times out

2016-06-17 Thread Artem Smotrakov
Hello, Please review the patch below for javax/net/ssl/TLSv12/ShortRSAKey512.java test. The test has been seen to fail intermittently with a time out. I was not able to reproduce this failure. The test fails with "Client died ..." message which occurs in case of exception on client side. But

[9] RFR: 8074580: sun/security/pkcs11/rsa/TestKeyPairGenerator.java fails due to PKCS11Exception: CKR_FUNCTION_FAILED

2016-06-20 Thread Artem Smotrakov
Hello, Please review the following patch below for 9. TestKeyPairGenerator.java test intermittently fails with CKR_FUNCTION_FAILED error when NSS crypto libs is used via SunPKCS11 provider. Looks like the root cause is a bug 1012786 in NSS https://bugzilla.mozilla.org/show_bug.cgi?id=1012786

[9] RFR: 8049314: javax/net/ssl/templates/SSLSocketSSLEngineTemplate.java fails intermittently with "Unexpected EOF" message

2016-06-20 Thread Artem Smotrakov
Hello, Please review this patch for SSLSocketSSLEngineTemplate.java test. The test fails intermittently with "Unexpected EOF" error. Please see Brad's comment which explains the issue https://bugs.openjdk.java.net/browse/JDK-8049314?focusedCommentId=13519136&page=com.atlassian.jira.plugin.sys

[9] RFR: 8152745: javax/net/ssl/TLS/TestJSSE.java fails intermittently: Unsupported or unrecognized SSL message

2016-06-21 Thread Artem Smotrakov
Hello, Please review the patch below for javax/net/ssl/TLS/TestJSSE.java test. The test has been observed to fail intermittently with "Unsupported or unrecognized SSL" error. But I couldn't reproduce it manually while running the test in a loop for a couple of days on Linux x64. For now it's

Re: [9] RFR: 8074580: sun/security/pkcs11/rsa/TestKeyPairGenerator.java fails due to PKCS11Exception: CKR_FUNCTION_FAILED

2016-06-21 Thread Artem Smotrakov
I forgot to include PKCS11.java to webrev, here is an updated webrev http://cr.openjdk.java.net/~asmotrak/8074580/webrev.01/ Artem On 06/20/2016 11:12 AM, Artem Smotrakov wrote: Hello, Please review the following patch below for 9. TestKeyPairGenerator.java test intermittently fails with

Re: [9] RFR: 8152745: javax/net/ssl/TLS/TestJSSE.java fails intermittently: Unsupported or unrecognized SSL message

2016-06-21 Thread Artem Smotrakov
leguide/index-v6.html It has a recommendation about line lengths, but it allows lines more than 80 characters if it makes it more readable. Anyway, I avoided lines more than 80 characters (mostly I renamed variables). Please take a look at updated webrev: http://cr.openjdk.java.net/~asmotrak

[9] RFR: 8159416: javax/net/ssl/DTLS/CipherSuite.java failed on timeout

2016-06-27 Thread Artem Smotrakov
Hello, Please review this patch for javax/net/ssl/DTLS tests. A couple of DTLS tests fail intermittently on Mac with timeout or "Too many handshake loops ..." error. The tests use UDP to transfer DTLS records. It happens sometimes that server cannot receive UDP packets with DatagramSocket.rec

Re: [9] RFR: 8159416: javax/net/ssl/DTLS/CipherSuite.java failed on timeout

2016-06-28 Thread Artem Smotrakov
use custom UDP sockets. If we want to test real connections, then it should be different tests which take into account #1 and #2 above. Artem On 06/27/2016 06:25 PM, Xuelei Fan wrote: On 6/28/2016 9:12 AM, Artem Smotrakov wrote: Hello, Please review this patch for javax/net/ssl/DTLS tests. A

Re: [9] RFR: 8159416: javax/net/ssl/DTLS/CipherSuite.java failed on timeout

2016-06-28 Thread Artem Smotrakov
Hi Mike, On 06/28/2016 10:36 AM, Michael StJohns wrote: On 6/28/2016 1:02 PM, Artem Smotrakov wrote: Hi Xuelei, Even if the tests keep using UDP to transfer data, they may not be realistic since they run on local host. UDP implementation is based on functions provided by OS. If I remember

Re: Code Review Request JDK-8161106 Improve SSLSocket test template

2016-07-12 Thread Artem Smotrakov
Hi Xuelei, I am not an official reviewer, but I have a couple of comments. 1. line 149: would it be better to check this condition in a loop? 2. Using try-with-resources blocks might simplify doServerSide() a little bit (no need to call close() on sockets, and a couple of "try" blocks might b

Re: Code Review Request JDK-8161106 Improve SSLSocket test template

2016-07-13 Thread Artem Smotrakov
Hi Xuelei, The webrev looks good to me. Please see inline. On 07/12/2016 10:36 PM, Xuelei Fan wrote: Thanks for the feedback, Artem. Here is the updated webrev per your suggestions: http://cr.openjdk.java.net/~xuelei/8161106/webrev.02/ On 7/13/2016 1:03 AM, Artem Smotrakov wrote: Hi

Re: RFR 8054536: sun.security.x509.Extension object may throw NPE for hashCode and equals method

2016-07-14 Thread Artem Smotrakov
Hi Svetlana, I'll leave the main review to an official reviewer, but I have a couple of comments. There are a couple of other places in Extension.java where NPE may occur: - line 255: I see that "extensionId" is checked for null in other methods, but not in getId() - line 200: I see that "ext

Re: RFR 8054536: sun.security.x509.Extension object may throw NPE for hashCode and equals method

2016-07-15 Thread Artem Smotrakov
e duplicate code. As for unnecessary try-catch in test I'd prefer to have it to emphasis that we are checking for NPE. Okay. I'm not sure about "iff" but let it be, it seems like a right place to use it. Sure. Artem Thank you, Svetlana On 14.07.2016 19:35, Artem Smotr

Re: [9] RFR: 8159416: javax/net/ssl/DTLS/CipherSuite.java failed on timeout

2016-07-28 Thread Artem Smotrakov
test DTLS impl in worse conditions. Could you please take a look at updated webrev? http://cr.openjdk.java.net/~asmotrak/8159416/webrev.02/ Artem On 06/27/2016 06:25 PM, Xuelei Fan wrote: On 6/28/2016 9:12 AM, Artem Smotrakov wrote: Hello, Please review this patch for javax/net/ssl/DTLS

Re: [9] RFR: 8159416: javax/net/ssl/DTLS/CipherSuite.java failed on timeout

2016-08-01 Thread Artem Smotrakov
specified - Updated InvalidRecords.java tests not to drop packets by default because handshaking unexpectedly succeeds if an invalid packet was dropped http://cr.openjdk.java.net/~asmotrak/8159416/webrev.03/ Please take a look. Artem On 07/28/2016 04:36 PM, Artem Smotrakov wrote: Hi Xuelei, I

Re: [9] RFR: 8159416: javax/net/ssl/DTLS/CipherSuite.java failed on timeout

2016-08-02 Thread Artem Smotrakov
e debug log length, please turn off the debug log. Actually, we should turn off the debug log unless we need more detailed debug log for problematic test. Or alternatively, we can ask the JTREG to consider the behavior more about the debug length restrictions. Thanks, Xuelei On 8/2/2016 9:25 AM, A

Re: [9] RFR: 8159416: javax/net/ssl/DTLS/CipherSuite.java failed on timeout

2016-08-02 Thread Artem Smotrakov
Please see an updated webrev http://cr.openjdk.java.net/~asmotrak/8159416/webrev.04/ Artem On 08/02/2016 02:42 PM, Artem Smotrakov wrote: Hi Xuelei, Thank you for review. Please see inline. I'll send an updated webrev soon. On 08/01/2016 09:35 PM, Xuelei Fan wrote: DTLSOutputR

  1   2   >