Closed
Bug 411643
Opened 17 years ago
Closed 3 years ago
ConcurrentModificationException in SSL ciphersuite test.
Categories
(JSS Graveyard :: Library, defect)
JSS Graveyard
Library
Tracking
(Not tracked)
RESOLVED
WONTFIX
4.2.7
People
(Reporter: slavomir.katuscak+mozilla, Unassigned)
Details
From nightly tests on simplify/SunOS5.10_64_DBG build 20080109.1:
============= SSL Ciphersuite JSS Server with Bypass Off and JSSE client
./startJssSelfServ.sh /share/builds/mccrel3/security/securitytip/builds/20080109.1/wozzeck_Solaris8/mozilla/dist/release/no-policy/classes_DBG/org/../xpclass_dbg.jar /share/builds/mccrel3/security/securitytip/builds/20080109.1/wozzeck_Solaris8/mozilla/tests_results/jss/simplify.3 localhost 2908 bypassOff /share/builds/components/jdk/1.5.0_09/SunOS64/jre/bin/java -d64
/share/builds/components/jdk/1.5.0_09/SunOS64/jre/bin/java -d64 -classpath /share/builds/mccrel3/security/securitytip/builds/20080109.1/wozzeck_Solaris8/mozilla/dist/release/no-policy/classes_DBG/org/../xpclass_dbg.jar org.mozilla.jss.tests.JSS_SelfServServer /share/builds/mccrel3/security/securitytip/builds/20080109.1/wozzeck_Solaris8/mozilla/tests_results/jss/simplify.3 passwords localhost false 2908 bypassOff verboseoff &
SSL Server is envoked using port 2908
/share/builds/components/jdk/1.5.0_09/SunOS64/jre/bin/java -d64 -cp /share/builds/mccrel3/security/securitytip/builds/20080109.1/wozzeck_Solaris8/mozilla/dist/release/no-policy/classes_DBG/org/../xpclass_dbg.jar org.mozilla.jss.tests.JSSE_SSLClient /share/builds/mccrel3/security/securitytip/builds/20080109.1/wozzeck_Solaris8/mozilla/tests_results/jss/simplify.3 2908 localhost JSS
main: jss library loaded
***FilePasswordCallback returns m1oZilla
using port: 2908
Server localhost ready to accept connections on 2908
Testing Connection:localhost:2908
connect isBound
SSL_RSA_WITH_RC4_128_MD5
SSL_RSA_WITH_RC4_128_SHA
TLS_RSA_WITH_AES_128_CBC_SHA
SSL_RSA_WITH_3DES_EDE_CBC_SHA
SSL_RSA_WITH_DES_CBC_SHA
SSL_RSA_EXPORT_WITH_RC4_40_MD5
SSL_RSA_WITH_NULL_MD5
----------------------------------------------------------
JSSE has 33 ciphersuites and 8 were configured and tested.
SSL_RSA_WITH_RC4_128_MD5
SSL_RSA_WITH_RC4_128_SHA
TLS_RSA_WITH_AES_128_CBC_SHA
SSL_RSA_WITH_NULL_SHA
Exception in thread "main" java.util.ConcurrentModificationException
at java.util.AbstractList$Itr.checkForComodification(AbstractList.java:449)
at java.util.AbstractList$Itr.next(AbstractList.java:420)
at org.mozilla.jss.tests.JSSE_SSLClient.outputCipherResults(JSSE_SSLClient.java:495)
at org.mozilla.jss.tests.JSSE_SSLClient.main(JSSE_SSLClient.java:587)
JSSTEST_CASE 23 (SSL Ciphersuite JSS Server with Bypass Off and JSSE client): FAIL return value 1
Updated•17 years ago
|
Target Milestone: 4.2.6 → 4.2.7
| Reporter | ||
Comment 1•17 years ago
|
||
Occured also in nightly tests on charm/HP-UXB.11.11_OPT build 20081024.1, JSSTEST_CASE 24 (SSL Ciphersuite JSS Server with Bypass On and JSSE client) (the same test with bypass on).
OS: Solaris → All
Hardware: Sun → All
Comment 2•15 years ago
|
||
This failure occurred in Tinderbox on trunk standard dositups SunOS/i386 64bit OPT on 2010/01/21 11:12:33
Log: http://tinderbox.mozilla.org/showlog.cgi?log=NSS/1264101153.1264106512.32721.gz&fulltext=1
(Test number/id is JSSTEST_CASE 25)
Relevant snippet from log:
============= SSL Ciphersuite JSS Server with Bypass Off and JSSE client
./startJssSelfServ.sh /export/tinderlight/data/dositups_64_OPT/mozilla/dist/SunOS5.10_i86pc_64_OPT.OBJ/../xpclass.jar /export/tinderlight/data/d
ositups_64_OPT/mozilla/tests_results/jss/dositups.1 localhost 8476 bypassOff /opt/jdk/1.6.0_01/SunOS_amd64/jre/bin/amd64/java
/opt/jdk/1.6.0_01/SunOS_amd64/jre/bin/amd64/java -classpath /export/tinderlight/data/dositups_64_OPT/mozilla/dist/SunOS5.10_i86pc_64_OPT.OBJ/../x
pclass.jar org.mozilla.jss.tests.JSS_SelfServServer /export/tinderlight/data/dositups_64_OPT/mozilla/tests_results/jss/dositups.1 passwords local
host false 8476 bypassOff verboseoff &
***FilePasswordCallback returns m1oZilla
JSS_SelfServServ localhost ready to accept connections on 8476
SSL Server is invoked using port 8476
/opt/jdk/1.6.0_01/SunOS_amd64/jre/bin/amd64/java -cp /export/tinderlight/data/dositups_64_OPT/mozilla/dist/SunOS5.10_i86pc_64_OPT.OBJ/../xpclass.
jar org.mozilla.jss.tests.JSSE_SSLClient /export/tinderlight/data/dositups_64_OPT/mozilla/tests_results/jss/dositups.1 8476 localhost JSS
using port: 8476
Testing Connection:localhost:8476
connect isBound
SSL_RSA_WITH_RC4_128_MD5
SSL_RSA_WITH_RC4_128_SHA
TLS_RSA_WITH_AES_128_CBC_SHA
SSL_RSA_WITH_3DES_EDE_CBC_SHA
SSL_RSA_WITH_DES_CBC_SHA
SSL_RSA_EXPORT_WITH_RC4_40_MD5
SSL_RSA_WITH_NULL_SHA
----------------------------------------------------------
JSSE has 33 ciphersuites and 8 were configured and tested.
SSL_RSA_WITH_RC4_128_MD5
SSL_RSA_WITH_RC4_128_SHA
TLS_RSA_WITH_AES_128_CBC_SHA
SSL_RSA_WITH_3DES_EDE_CBC_SHA
SSL_RSA_WITH_NULL_MD5
Exception in thread "main" java.util.ConcurrentModificationException
at java.util.AbstractList$Itr.checkForComodification(AbstractList.java:372)
at java.util.AbstractList$Itr.next(AbstractList.java:343)
at org.mozilla.jss.tests.JSSE_SSLClient.outputCipherResults(JSSE_SSLClient.java:495)
at org.mozilla.jss.tests.JSSE_SSLClient.main(JSSE_SSLClient.java:587)
JSSTEST_CASE 25 (SSL Ciphersuite JSS Server with Bypass Off and JSSE client): FAILED return value 1
Updated•15 years ago
|
Assignee: gbmozilla → nobody
Comment 3•3 years ago
|
||
JSS development has moved from the Mozilla community to the Dogtag PKI community. Please re-file this bug at https://github.com/dogtagpki/jss if it is still relevant. Thank you!
Status: NEW → RESOLVED
Closed: 3 years ago
Resolution: --- → WONTFIX
You need to log in
before you can comment on or make changes to this bug.
Description
•