hg: jdk8/tl/jdk: 8011799: CompletableFuture/Basic.java fails intermittently

2013-04-14 Thread chris . hegarty
Changeset: 5c406a747192 Author:chegar Date: 2013-04-14 19:17 +0100 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/5c406a747192 8011799: CompletableFuture/Basic.java fails intermittently Reviewed-by: martin, alanb ! test/java/util/concurrent/CompletableFuture/Basic.java

Code review request: 8005527: [TEST_BUG] Failed Automatically with exit code 1.

2013-04-14 Thread Weijun Wang
Hi All Please take a look at the fix at http://cr.openjdk.java.net/~weijun/8005527/webrev.00/ The test was tagged "manual" which is because I do run it manually and directly in a console window. Turns out this "manual" only means it is ignored by "jtreg -a" but still launch-able with plain

Re: Code review request: 8005523: Unbound krb5 for TLS

2013-04-14 Thread Xuelei Fan
>> ... Especially, I make Handshaker public and pass it >> to KerberosClientKeyExchangeImpl so that its context can be used to >> check permissions. Is this necessary? I mean, is the context any >> different from the one inside KerberosClientKeyExchangeImpl? The access control context is reserved f

Re: Ignore SSL server_name extension alerts (Bug 7127374)

2013-04-14 Thread Xuelei Fan
On 1/21/2013 7:25 AM, Bernd Eckenfels wrote: > Hello, > > quite some time back I reported a bug, that the SSLSocket of Java will > terminate connections to servers which respond with a unrecognized_name > alert. > > http://bugs.sun.com/bugdatabase/view_bug.do?bug_id=7127374 > > This was intr

Re: Code review request: 8005523: Unbound krb5 for TLS

2013-04-14 Thread Weijun Wang
On 4/15/13 11:05 AM, Xuelei Fan wrote: ... Especially, I make Handshaker public and pass it to KerberosClientKeyExchangeImpl so that its context can be used to check permissions. Is this necessary? I mean, is the context any different from the one inside KerberosClientKeyExchangeImpl? The acce

Re: Code review request: 8005523: Unbound krb5 for TLS

2013-04-14 Thread Xuelei Fan
>> Do you want to file a simple enhancement request (CCC)? > > Why CCC? This is all internal. > Yes, it is optional. I think, now it can accept unbound principal in server side, it is an enhancement. It would be nice to have the community and SQE know the improvement. >> >> . KerberosClientKeyEx

Re: Code review request: 8005523: Unbound krb5 for TLS

2013-04-14 Thread Weijun Wang
On 4/15/13 1:38 PM, Xuelei Fan wrote: Do you want to file a simple enhancement request (CCC)? Why CCC? This is all internal. Yes, it is optional. I think, now it can accept unbound principal in server side, it is an enhancement. It would be nice to have the community and SQE know the improv