Closed Bug 411643 Opened 17 years ago Closed 3 years ago

ConcurrentModificationException in SSL ciphersuite test.

Categories

(JSS Graveyard :: Library, defect)

defect
Not set
normal

Tracking

(Not tracked)

RESOLVED WONTFIX

People

(Reporter: slavomir.katuscak+mozilla, Unassigned)

Details

From nightly tests on simplify/SunOS5.10_64_DBG build 20080109.1: ============= SSL Ciphersuite JSS Server with Bypass Off and JSSE client ./startJssSelfServ.sh /share/builds/mccrel3/security/securitytip/builds/20080109.1/wozzeck_Solaris8/mozilla/dist/release/no-policy/classes_DBG/org/../xpclass_dbg.jar /share/builds/mccrel3/security/securitytip/builds/20080109.1/wozzeck_Solaris8/mozilla/tests_results/jss/simplify.3 localhost 2908 bypassOff /share/builds/components/jdk/1.5.0_09/SunOS64/jre/bin/java -d64 /share/builds/components/jdk/1.5.0_09/SunOS64/jre/bin/java -d64 -classpath /share/builds/mccrel3/security/securitytip/builds/20080109.1/wozzeck_Solaris8/mozilla/dist/release/no-policy/classes_DBG/org/../xpclass_dbg.jar org.mozilla.jss.tests.JSS_SelfServServer /share/builds/mccrel3/security/securitytip/builds/20080109.1/wozzeck_Solaris8/mozilla/tests_results/jss/simplify.3 passwords localhost false 2908 bypassOff verboseoff & SSL Server is envoked using port 2908 /share/builds/components/jdk/1.5.0_09/SunOS64/jre/bin/java -d64 -cp /share/builds/mccrel3/security/securitytip/builds/20080109.1/wozzeck_Solaris8/mozilla/dist/release/no-policy/classes_DBG/org/../xpclass_dbg.jar org.mozilla.jss.tests.JSSE_SSLClient /share/builds/mccrel3/security/securitytip/builds/20080109.1/wozzeck_Solaris8/mozilla/tests_results/jss/simplify.3 2908 localhost JSS main: jss library loaded ***FilePasswordCallback returns m1oZilla using port: 2908 Server localhost ready to accept connections on 2908 Testing Connection:localhost:2908 connect isBound SSL_RSA_WITH_RC4_128_MD5 SSL_RSA_WITH_RC4_128_SHA TLS_RSA_WITH_AES_128_CBC_SHA SSL_RSA_WITH_3DES_EDE_CBC_SHA SSL_RSA_WITH_DES_CBC_SHA SSL_RSA_EXPORT_WITH_RC4_40_MD5 SSL_RSA_WITH_NULL_MD5 ---------------------------------------------------------- JSSE has 33 ciphersuites and 8 were configured and tested. SSL_RSA_WITH_RC4_128_MD5 SSL_RSA_WITH_RC4_128_SHA TLS_RSA_WITH_AES_128_CBC_SHA SSL_RSA_WITH_NULL_SHA Exception in thread "main" java.util.ConcurrentModificationException at java.util.AbstractList$Itr.checkForComodification(AbstractList.java:449) at java.util.AbstractList$Itr.next(AbstractList.java:420) at org.mozilla.jss.tests.JSSE_SSLClient.outputCipherResults(JSSE_SSLClient.java:495) at org.mozilla.jss.tests.JSSE_SSLClient.main(JSSE_SSLClient.java:587) JSSTEST_CASE 23 (SSL Ciphersuite JSS Server with Bypass Off and JSSE client): FAIL return value 1
Target Milestone: 4.2.6 → 4.2.7
Occured also in nightly tests on charm/HP-UXB.11.11_OPT build 20081024.1, JSSTEST_CASE 24 (SSL Ciphersuite JSS Server with Bypass On and JSSE client) (the same test with bypass on).
OS: Solaris → All
Hardware: Sun → All
This failure occurred in Tinderbox on trunk standard dositups SunOS/i386 64bit OPT on 2010/01/21 11:12:33 Log: http://tinderbox.mozilla.org/showlog.cgi?log=NSS/1264101153.1264106512.32721.gz&fulltext=1 (Test number/id is JSSTEST_CASE 25) Relevant snippet from log: ============= SSL Ciphersuite JSS Server with Bypass Off and JSSE client ./startJssSelfServ.sh /export/tinderlight/data/dositups_64_OPT/mozilla/dist/SunOS5.10_i86pc_64_OPT.OBJ/../xpclass.jar /export/tinderlight/data/d ositups_64_OPT/mozilla/tests_results/jss/dositups.1 localhost 8476 bypassOff /opt/jdk/1.6.0_01/SunOS_amd64/jre/bin/amd64/java /opt/jdk/1.6.0_01/SunOS_amd64/jre/bin/amd64/java -classpath /export/tinderlight/data/dositups_64_OPT/mozilla/dist/SunOS5.10_i86pc_64_OPT.OBJ/../x pclass.jar org.mozilla.jss.tests.JSS_SelfServServer /export/tinderlight/data/dositups_64_OPT/mozilla/tests_results/jss/dositups.1 passwords local host false 8476 bypassOff verboseoff & ***FilePasswordCallback returns m1oZilla JSS_SelfServServ localhost ready to accept connections on 8476 SSL Server is invoked using port 8476 /opt/jdk/1.6.0_01/SunOS_amd64/jre/bin/amd64/java -cp /export/tinderlight/data/dositups_64_OPT/mozilla/dist/SunOS5.10_i86pc_64_OPT.OBJ/../xpclass. jar org.mozilla.jss.tests.JSSE_SSLClient /export/tinderlight/data/dositups_64_OPT/mozilla/tests_results/jss/dositups.1 8476 localhost JSS using port: 8476 Testing Connection:localhost:8476 connect isBound SSL_RSA_WITH_RC4_128_MD5 SSL_RSA_WITH_RC4_128_SHA TLS_RSA_WITH_AES_128_CBC_SHA SSL_RSA_WITH_3DES_EDE_CBC_SHA SSL_RSA_WITH_DES_CBC_SHA SSL_RSA_EXPORT_WITH_RC4_40_MD5 SSL_RSA_WITH_NULL_SHA ---------------------------------------------------------- JSSE has 33 ciphersuites and 8 were configured and tested. SSL_RSA_WITH_RC4_128_MD5 SSL_RSA_WITH_RC4_128_SHA TLS_RSA_WITH_AES_128_CBC_SHA SSL_RSA_WITH_3DES_EDE_CBC_SHA SSL_RSA_WITH_NULL_MD5 Exception in thread "main" java.util.ConcurrentModificationException at java.util.AbstractList$Itr.checkForComodification(AbstractList.java:372) at java.util.AbstractList$Itr.next(AbstractList.java:343) at org.mozilla.jss.tests.JSSE_SSLClient.outputCipherResults(JSSE_SSLClient.java:495) at org.mozilla.jss.tests.JSSE_SSLClient.main(JSSE_SSLClient.java:587) JSSTEST_CASE 25 (SSL Ciphersuite JSS Server with Bypass Off and JSSE client): FAILED return value 1
Assignee: gbmozilla → nobody
JSS development has moved from the Mozilla community to the Dogtag PKI community. Please re-file this bug at https://github.com/dogtagpki/jss if it is still relevant. Thank you!
Status: NEW → RESOLVED
Closed: 3 years ago
Resolution: --- → WONTFIX
You need to log in before you can comment on or make changes to this bug.