8148147: Sync up @modules from jigsaw/jake

Reviewed-by: chegar, mchung
This commit is contained in:
Alan Bateman 2016-01-25 19:01:19 +00:00
parent 60134cc040
commit 3573d65040
47 changed files with 43 additions and 40 deletions
jdk/test
com
java
lang
nio/channels
SocketChannel
spi/SelectorProvider/inheritedChannel
security/KeyStore
util
javax
jdk/internal/jline
sun
awt/shell
net/www/http/HttpURLConnection
reflect/CallerSensitive
security
provider
ssl
ExtensionType
SSLSocketImpl
x509/AVA
text/resources
util/logging

@ -34,7 +34,6 @@ import javax.crypto.*;
import javax.crypto.spec.*;
import java.math.*;
import java.io.*;
import com.sun.crypto.provider.*;
import java.util.*;

@ -32,7 +32,6 @@ import java.security.*;
import javax.crypto.*;
import javax.crypto.spec.*;
import java.math.*;
import com.sun.crypto.provider.*;
import java.util.*;

@ -32,7 +32,6 @@ import java.security.*;
import javax.crypto.*;
import javax.crypto.spec.*;
import java.math.*;
import com.sun.crypto.provider.*;
import java.util.*;

@ -37,7 +37,6 @@ import java.util.Random;
import javax.crypto.*;
import javax.crypto.spec.*;
import java.security.Provider;
import com.sun.crypto.provider.*;
public class Test4513830 {

@ -37,7 +37,6 @@ import javax.crypto.*;
import javax.crypto.spec.*;
import java.math.*;
import java.io.*;
import com.sun.crypto.provider.*;
import java.util.*;

@ -36,7 +36,6 @@ import java.security.*;
import javax.crypto.*;
import javax.crypto.spec.*;
import java.math.*;
import com.sun.crypto.provider.*;
import java.util.*;

@ -25,6 +25,7 @@
/*
* @test
* @bug 8069072
* @modules java.base/com.sun.crypto.provider
* @summary Test vectors for com.sun.crypto.provider.GHASH.
*
* Single iteration to verify software-only GHASH algorithm.

@ -35,7 +35,6 @@ import java.security.spec.*;
import javax.crypto.*;
import javax.crypto.spec.*;
import java.security.Provider;
import com.sun.crypto.provider.*;
public class TestISO10126Padding {
private static final String ALGO = "AES";

@ -34,7 +34,6 @@ import java.security.*;
import javax.crypto.*;
import javax.crypto.spec.*;
import java.math.*;
import com.sun.crypto.provider.*;
import java.util.*;

@ -37,7 +37,6 @@ import java.security.*;
import javax.crypto.*;
import javax.crypto.spec.*;
import java.math.*;
import com.sun.crypto.provider.*;
import java.util.*;

@ -35,7 +35,6 @@ import java.math.BigInteger;
import javax.crypto.*;
import javax.crypto.spec.*;
import java.security.Provider;
import com.sun.crypto.provider.*;
public class TestShortBuffer {
private static final String ALGO = "AES";

@ -33,7 +33,7 @@ import java.lang.reflect.Method;
* with a lower-case letter
*
* @author Jaroslav Bachorik
* @modules java.management
* @modules java.management/com.sun.jmx.mbeanserver
* @run clean SimpleIntrospectorTest
* @run build SimpleIntrospectorTest BeanClass
* @run main SimpleIntrospectorTest

@ -27,7 +27,8 @@
* @summary Check that GarbageCollectionNotification contents are reasonable
* @author Frederic Parain
* @requires vm.opt.ExplicitGCInvokesConcurrent == null | vm.opt.ExplicitGCInvokesConcurrent == false
* @modules jdk.management
* @modules java.management/sun.management
* jdk.management
* @run main/othervm GarbageCollectionNotificationContentTest
*/

@ -27,7 +27,8 @@
* @summary Check that GarbageCollection notification are thrown by every GarbageCollectorMXBean
* @author Frederic Parain
* @requires vm.opt.ExplicitGCInvokesConcurrent == null | vm.opt.ExplicitGCInvokesConcurrent == false
* @modules jdk.management
* @modules java.management/sun.management
* jdk.management
* @run main/othervm GarbageCollectionNotificationTest
*/

@ -40,6 +40,7 @@ import jdk.internal.logger.LazyLoggers;
* @summary Cover the logXX and LogEvent.valueOf APIs of BootstrapLogger
* and logXX APIs of SimpleConsoleLogger.
* @modules java.base/jdk.internal.logger
* java.base/sun.util.logging
* @build BootstrapLoggerUtils LogStream
* @run main/othervm BootstrapLoggerAPIsTest
*/

@ -23,9 +23,7 @@
/* @test
* @summary test access checking by java.lang.invoke.MethodHandles.Lookup
* @library ../../../..
* @build test.java.lang.invoke.AccessControlTest
* @build test.java.lang.invoke.AccessControlTest_subpkg.Acquaintance_remote
* @compile AccessControlTest.java AccessControlTest_subpkg/Acquaintance_remote.java
* @run testng/othervm test.java.lang.invoke.AccessControlTest
*/

@ -38,6 +38,7 @@ import sun.invoke.util.Wrapper;
* @bug 8060483 8066746
* @key randomness
* @library /lib/testlibrary /lib/testlibrary/jsr292
* @modules java.base/sun.invoke.util
* @summary unit tests for MethodHandles.explicitCastArguments()
* @run main ExplicitCastArgumentsTest
*/

@ -27,7 +27,7 @@
* @summary ensures that j.l.i.InvokerByteCodeGenerator and ASM visitMethodInsn
* generate bytecodes with correct constant pool references
* @modules java.base/jdk.internal.org.objectweb.asm
* jdk.compiler/com.sun.tools.classfile
* jdk.jdeps/com.sun.tools.classfile
* @compile -XDignore.symbol.file LambdaAsm.java LUtils.java
* @run main/othervm LambdaAsm
*/

@ -32,7 +32,6 @@ import java.net.*;
import java.nio.*;
import java.nio.channels.*;
import java.util.*;
import sun.misc.*;
public class VectorIO {

@ -32,7 +32,6 @@ import java.net.*;
import java.nio.*;
import java.nio.channels.*;
import java.util.*;
import sun.misc.*;
public class Write {

@ -30,9 +30,6 @@ import java.io.*;
import java.nio.channels.*;
import java.lang.reflect.*;
// dependency on Sun implementation
import sun.nio.ch.*;
public class Util {
private static Object get(String className, String fieldName, Object o) throws Exception {

@ -32,8 +32,6 @@ import java.security.cert.*;
import java.util.*;
import java.io.*;
import sun.security.provider.*;
public class EntryMethods
extends Provider
implements KeyStore.Entry

@ -26,6 +26,7 @@
* @bug 8008577 8138613
* @summary Check whether CLDR locale provider adapter is enabled by default
* @compile -XDignore.symbol.file Bug8008577.java
* @modules java.base/sun.util.locale.provider
* @run main Bug8008577
*/

@ -26,9 +26,7 @@
import java.text.*;
import java.util.*;
import sun.text.resources.*;
import sun.util.locale.provider.*;
import sun.util.resources.*;
public class BreakIteratorProviderTest extends ProviderTest {

@ -28,7 +28,8 @@
* @test
* @bug 8043758
* @summary Datagram Transport Layer Security (DTLS)
* @compile DTLSOverDatagram.java
* @modules java.base/sun.security.util
* @build DTLSOverDatagram
* @run main/othervm CipherSuite TLS_RSA_WITH_AES_128_CBC_SHA
* @run main/othervm CipherSuite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
* @run main/othervm CipherSuite TLS_RSA_WITH_AES_128_CBC_SHA256

@ -28,7 +28,8 @@
* @test
* @bug 8043758
* @summary Datagram Transport Layer Security (DTLS)
* @compile DTLSOverDatagram.java
* @modules java.base/sun.security.util
* @build DTLSOverDatagram
* @run main/othervm ClientAuth
*/

@ -28,7 +28,8 @@
* @test
* @bug 8043758
* @summary Datagram Transport Layer Security (DTLS)
* @compile DTLSOverDatagram.java
* @modules java.base/sun.security.util
* @build DTLSOverDatagram
* @run main/othervm InvalidCookie
*/

@ -28,7 +28,8 @@
* @test
* @bug 8043758
* @summary Datagram Transport Layer Security (DTLS)
* @compile DTLSOverDatagram.java
* @modules java.base/sun.security.util
* @build DTLSOverDatagram
* @run main/othervm InvalidRecords
*/

@ -28,7 +28,8 @@
* @test
* @bug 8043758
* @summary Datagram Transport Layer Security (DTLS)
* @compile DTLSOverDatagram.java
* @modules java.base/sun.security.util
* @build DTLSOverDatagram
* @run main/othervm -Djdk.tls.client.enableStatusRequestExtension=false
* NoMacInitialClientHello
*/

@ -28,7 +28,8 @@
* @test
* @bug 8043758
* @summary Datagram Transport Layer Security (DTLS)
* @compile DTLSOverDatagram.java
* @modules java.base/sun.security.util
* @build DTLSOverDatagram
* @run main/othervm Reordered
*/

@ -28,7 +28,8 @@
* @test
* @bug 8043758
* @summary Datagram Transport Layer Security (DTLS)
* @compile DTLSOverDatagram.java
* @modules java.base/sun.security.util
* @build DTLSOverDatagram
* @run main/othervm Retransmission
*/

@ -28,7 +28,8 @@
* @test
* @bug 8043758
* @summary Datagram Transport Layer Security (DTLS)
* @compile DTLSOverDatagram.java
* @modules java.base/sun.security.util
* @build DTLSOverDatagram
* @run main/othervm WeakCipherSuite TLS_DH_anon_WITH_AES_128_GCM_SHA256
* @run main/othervm WeakCipherSuite SSL_DH_anon_WITH_DES_CBC_SHA
* @run main/othervm WeakCipherSuite SSL_RSA_WITH_DES_CBC_SHA

@ -31,6 +31,7 @@ import java.lang.reflect.Method;
* in com.sun.org.apache.xerces.internal.impl.dv.xs.PrecisionDecimalDV$XPrecisionDecimal.
* Since that method is private the test unfortunately needs to use reflection
* to invoke the method.
* @modules java.xml/com.sun.org.apache.xerces.internal.impl.dv.xs
* @run main XPrecisionDecimalToString
* @author Daniel Fuchs
*/

@ -25,6 +25,7 @@
* @test
* @bug 8080679
* @summary Verify the conversion from key events to escape sequences works properly.
* @modules jdk.internal.le/jdk.internal.jline
* @requires os.family == "windows"
*/

@ -24,6 +24,7 @@
/**
* @test
* @bug 8080679
* @modules jdk.internal.le/jdk.internal.jline.console
* @summary Verify ConsoleReader.stripAnsi strips escape sequences from its input correctly.
*/

@ -28,7 +28,7 @@
after calling Win32ShellFolder:listFiles
multiple times on some directory with
large number of files/folders
* @modules java.desktop/sun.awt
* @modules java.desktop/sun.awt.shell
* @requires (os.family == "windows")
* @run main/timeout=1000 ShellFolderMemoryLeak
*/
@ -223,4 +223,4 @@ public class ShellFolderMemoryLeak {
.log(Level.SEVERE, "Unable to delete files", ex);
}
}
}
}

@ -39,6 +39,7 @@ import sun.net.www.protocol.http.ntlm.NTLMAuthenticationCallback;
/*
* @test
* @bug 8137174
* @modules java.base/sun.net.www.protocol.http.ntlm
* @summary Checks if NTLM auth works fine if security manager set
* @run main/othervm/java.security.policy=NTLMAuthWithSM.policy NTLMAuthWithSM
*/

@ -48,7 +48,7 @@ import java.util.stream.Stream;
* @bug 8010117
* @summary Verify if CallerSensitive methods are annotated with
* sun.reflect.CallerSensitive annotation
* @modules jdk.compiler/com.sun.tools.classfile jdk.jdeps/com.sun.tools.jdeps
* @modules jdk.jdeps/com.sun.tools.classfile jdk.jdeps/com.sun.tools.jdeps
* @build CallerSensitiveFinder
* @run main/othervm/timeout=900 CallerSensitiveFinder
*/

@ -29,7 +29,6 @@
* @modules java.base/sun.reflect
* jdk.jdeps/com.sun.tools.classfile
* jdk.jdeps/com.sun.tools.jdeps
* @modules java.base/sun.reflect
* @compile -XDignore.symbol.file MissingCallerSensitive.java
* @build CallerSensitiveFinder
* @run main MissingCallerSensitive

@ -24,6 +24,7 @@
/**
* @test
* @bug 8047769
* @modules java.base/sun.security.provider
* @summary SecureRandom should be more frugal with file descriptors
*/

@ -25,6 +25,9 @@
* @test
* @bug 8046321
* @summary Unit tests for OCSPNonceExtension objects
* @modules java.base/sun.security.provider.certpath
* java.base/sun.security.util
* java.base/sun.security.x509
*/
import java.security.cert.Extension;

@ -25,6 +25,8 @@
* @test
* @bug 8046321
* @summary OCSP Stapling for TLS (ResponderId tests)
* @modules java.base/sun.security.provider.certpath
* java.base/sun.security.x509
*/
import java.io.*;

@ -26,6 +26,7 @@
* @bug 8080535
* @summary Expected size of Character.UnicodeBlock.map is not optimal
* @library /lib/testlibrary
* @modules java.base/sun.security.ssl
* @build jdk.testlibrary.OptimalCapacity
* @run main OptimalListSize
*/

@ -29,7 +29,6 @@
import java.net.*;
import java.util.*;
import java.lang.reflect.*;
import com.sun.net.ssl.internal.ssl.*;
public class CheckMethods {
static boolean debug = false;

@ -33,7 +33,6 @@ import java.io.*;
import javax.security.auth.x500.*;
import sun.security.util.*;
import sun.security.pkcs.*;
import sun.security.x509.*;
public class EmailAddressEncoding {

@ -38,6 +38,7 @@
* 7114053 7074882 7040556 8008577 8013836 8021121 6192407 6931564 8027695
* 8017142 8037343 8055222 8042126 8074791 8075173 8080774 8129361 8134916
* @summary Verify locale data
* @modules java.base/sun.util.resources
* @run main LocaleDataTest
* @run main LocaleDataTest -cldr
*

@ -30,6 +30,7 @@
* is not initialized.
*
* @modules java.base/sun.util.logging
* java.logging/sun.util.logging.internal
* @compile -XDignore.symbol.file PlatformLoggerTest.java
* @run main/othervm PlatformLoggerTest
*/