You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@harmony.apache.org by ml...@apache.org on 2006/06/13 10:58:17 UTC

svn commit: r413841 [2/9] - in /incubator/harmony/enhanced/classlib/trunk/modules/security/src: main/java/common/java/security/ test/api/java.injected/java/security/ test/api/java/org/apache/harmony/security/tests/java/security/ test/impl/java.injected...

Added: incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/UnresolvedPermissionTest.java
URL: http://svn.apache.org/viewvc/incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/UnresolvedPermissionTest.java?rev=413841&view=auto
==============================================================================
--- incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/UnresolvedPermissionTest.java (added)
+++ incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/UnresolvedPermissionTest.java Tue Jun 13 01:58:11 2006
@@ -0,0 +1,103 @@
+/*
+ *  Copyright 2005 The Apache Software Foundation or its licensors, as applicable.
+ *
+ *  Licensed under the Apache License, Version 2.0 (the "License");
+ *  you may not use this file except in compliance with the License.
+ *  You may obtain a copy of the License at
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ *  Unless required by applicable law or agreed to in writing, software
+ *  distributed under the License is distributed on an "AS IS" BASIS,
+ *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ *  See the License for the specific language governing permissions and
+ *  limitations under the License.
+ */
+
+/**
+* @author Alexey V. Varlamov
+* @version $Revision$
+*/
+
+package java.security;
+
+import junit.framework.TestCase;
+
+/**
+ * Tests for <code>UnresolvedPermission</code> class fields and methods
+ * 
+ */
+
+public class UnresolvedPermissionTest extends TestCase {
+
+    public static void main(String[] args) {
+        junit.textui.TestRunner.run(UnresolvedPermissionTest.class);
+    }
+
+    /**
+     * Constructor for UnresolvedPermissionTest.
+     * @param arg0
+     */
+    public UnresolvedPermissionTest(String arg0) {
+        super(arg0);
+    }
+    
+    /**
+     * Creates an Object with given name, type, action, certificaties. 
+     * Empty or null type is not allowed - exception should be thrown.
+     */
+    public void testCtor()
+    {
+        String type = "laskjhlsdk 2345346";
+        String name = "^%#UHVKU^%V  887y";
+        String action = "JHB ^%(*&T klj3h4";
+        UnresolvedPermission up = new UnresolvedPermission(type, name, action, null);
+        assertEquals(type, up.getName());
+        assertEquals("", up.getActions());
+        assertEquals("(unresolved " + type + " " + name + " " + action + ")", up.toString());
+        
+        up = new UnresolvedPermission(type, null, null, null);
+        assertEquals(type, up.getName());
+        assertEquals("", up.getActions());
+        assertEquals("(unresolved " + type + " null null)", up.toString());
+        
+        up = new UnresolvedPermission(type, "", "", new java.security.cert.Certificate[0]);
+        assertEquals(type, up.getName());
+        assertEquals("", up.getActions());
+        assertEquals("(unresolved " + type + "  )", up.toString());
+        
+        try {
+            new UnresolvedPermission(null, name, action, null);
+            fail("exception is not thrown on null type");
+        }
+        catch (Exception ok) {}
+        /*try {
+            new UnresolvedPermission("", name, action, null);
+            fail("exception is not thrown on empty type");
+        }
+        catch (Exception ok) {}*/
+    }
+    
+    /** 
+     * UnresolvedPermission never implies any other permission.
+     */
+    public void testImplies()
+    {
+        UnresolvedPermission up = new UnresolvedPermission("java.security.SecurityPermission", "a.b.c", null, null);
+        assertFalse(up.implies(up));
+        assertFalse(up.implies(new AllPermission()));
+        assertFalse(up.implies(new SecurityPermission("a.b.c")));
+    }
+    
+    /**
+     * newPermissionCollection() should return new BasicPermissionCollection on every invokation
+     */
+    public void testCollection()
+    {
+        UnresolvedPermission up = new UnresolvedPermission("a.b.c", null, null, null);
+        PermissionCollection pc1 = up.newPermissionCollection();
+        PermissionCollection pc2 = up.newPermissionCollection();
+        assertTrue((pc1 instanceof UnresolvedPermissionCollection) && (pc2 instanceof UnresolvedPermissionCollection));
+        assertNotSame(pc1, pc2);
+    }
+}

Copied: incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/AccessControlExceptionTest.java (from r412639, incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/AccessControlExceptionTest.java)
URL: http://svn.apache.org/viewvc/incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/AccessControlExceptionTest.java?p2=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/AccessControlExceptionTest.java&p1=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/AccessControlExceptionTest.java&r1=412639&r2=413841&rev=413841&view=diff
==============================================================================
--- incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/AccessControlExceptionTest.java (original)
+++ incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/AccessControlExceptionTest.java Tue Jun 13 01:58:11 2006
@@ -19,7 +19,9 @@
 * @version $Revision$
 */
 
-package java.security;
+package org.apache.harmony.security.tests.java.security;
+
+import java.security.*;
 
 import junit.framework.TestCase;
 

Copied: incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator1Test.java (from r412639, incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/AlgorithmParameterGenerator1Test.java)
URL: http://svn.apache.org/viewvc/incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator1Test.java?p2=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator1Test.java&p1=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/AlgorithmParameterGenerator1Test.java&r1=412639&r2=413841&rev=413841&view=diff
==============================================================================
--- incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/AlgorithmParameterGenerator1Test.java (original)
+++ incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator1Test.java Tue Jun 13 01:58:11 2006
@@ -19,8 +19,8 @@
 * @version $Revision$
 */
 
-package java.security;
-
+package org.apache.harmony.security.tests.java.security;
+import java.security.*;
 import java.security.spec.AlgorithmParameterSpec;
 
 import org.apache.harmony.security.tests.support.MyAlgorithmParameterGeneratorSpi;
@@ -317,33 +317,6 @@
         AlgorithmParameters ap = apg.generateParameters();
         assertEquals("Incorrect algorithm", ap.getAlgorithm().toUpperCase(),
                 apg.getAlgorithm().toUpperCase());
-    }
-
-    /**
-     * Test for <code>init(int size)</code> and
-     * <code>init(int size, SecureRandom random<code> methods
-     * Assertion: throws InvalidParameterExceptiom when size is incorrect
-     */
-    public void testAlgorithmParameterGenerator11() throws InvalidParameterException {        
-        if (!DSASupported) {
-            fail(validAlgName + " algorithm is not supported");
-            return;
-        }
-        int [] keys = {-10000, -512, -1, 0, 10000};
-        SecureRandom random = new SecureRandom();
-        AlgorithmParameterGenerator[] apgs = createAPGen();
-        assertNotNull("AlgorithmParameterGenerator objects were not created",
-                apgs);
-
-        for (int i = 0; i < apgs.length; i++) {
-            for (int j = 0; j < keys.length; j++) {
-                apgs[i].init(keys[j]);
-                apgs[i].init(keys[j], random);
-                apgs[i].init(keys[j], null);
-            }
-            apgs[i].init(1024);
-            apgs[i].init(1024, random);
-        }
     }
     
     /**

Copied: incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator2Test.java (from r412639, incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/AlgorithmParameterGenerator2Test.java)
URL: http://svn.apache.org/viewvc/incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator2Test.java?p2=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator2Test.java&p1=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/AlgorithmParameterGenerator2Test.java&r1=412639&r2=413841&rev=413841&view=diff
==============================================================================
--- incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/AlgorithmParameterGenerator2Test.java (original)
+++ incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator2Test.java Tue Jun 13 01:58:11 2006
@@ -19,8 +19,8 @@
 * @version $Revision$
 */
 
-package java.security;
-
+package org.apache.harmony.security.tests.java.security;
+import java.security.*;
 import java.security.NoSuchAlgorithmException;
 import java.security.NoSuchProviderException;
 import java.security.Provider;

Copied: incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/AlgorithmParametersTest.java (from r412639, incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/AlgorithmParametersTest.java)
URL: http://svn.apache.org/viewvc/incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/AlgorithmParametersTest.java?p2=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/AlgorithmParametersTest.java&p1=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/AlgorithmParametersTest.java&r1=412639&r2=413841&rev=413841&view=diff
==============================================================================
--- incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/AlgorithmParametersTest.java (original)
+++ incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/AlgorithmParametersTest.java Tue Jun 13 01:58:11 2006
@@ -19,8 +19,9 @@
 * @version $Revision$
 */
 
-package java.security;
+package org.apache.harmony.security.tests.java.security;
 
+import java.security.*;
 import junit.framework.TestCase;
 import java.security.spec.AlgorithmParameterSpec;
 

Copied: incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/CodeSignerTest.java (from r412639, incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/CodeSignerTest.java)
URL: http://svn.apache.org/viewvc/incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/CodeSignerTest.java?p2=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/CodeSignerTest.java&p1=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/CodeSignerTest.java&r1=412639&r2=413841&rev=413841&view=diff
==============================================================================
--- incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/CodeSignerTest.java (original)
+++ incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/CodeSignerTest.java Tue Jun 13 01:58:11 2006
@@ -19,8 +19,8 @@
 * @version $Revision$
 */
 
-package java.security;
-
+package org.apache.harmony.security.tests.java.security;
+import java.security.*;
 import java.security.cert.CertPath;
 import java.util.Date;
 
@@ -47,15 +47,6 @@
     private Date now = new Date();
 
     private Timestamp ts = new Timestamp(now, cpath);
-
-    /**
-     * Tests CodeSigner.hashCode()
-     */
-    public void testHashCode() {
-        assertTrue(new CodeSigner(cpath, ts).hashCode() == (cpath.hashCode() ^ ts
-                .hashCode()));
-        assertTrue(new CodeSigner(cpath, null).hashCode() == cpath.hashCode());
-    }
 
     /**
      * must throw NPE if signerCertPath is null

Copied: incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/CodeSourceTest.java (from r412639, incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/CodeSourceTest.java)
URL: http://svn.apache.org/viewvc/incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/CodeSourceTest.java?p2=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/CodeSourceTest.java&p1=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/CodeSourceTest.java&r1=412639&r2=413841&rev=413841&view=diff
==============================================================================
--- incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/CodeSourceTest.java (original)
+++ incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/CodeSourceTest.java Tue Jun 13 01:58:11 2006
@@ -1,791 +1,623 @@
-/*
- *  Copyright 2005 The Apache Software Foundation or its licensors, as applicable.
- *
- *  Licensed under the Apache License, Version 2.0 (the "License");
- *  you may not use this file except in compliance with the License.
- *  You may obtain a copy of the License at
- *
- *     http://www.apache.org/licenses/LICENSE-2.0
- *
- *  Unless required by applicable law or agreed to in writing, software
- *  distributed under the License is distributed on an "AS IS" BASIS,
- *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- *  See the License for the specific language governing permissions and
- *  limitations under the License.
- */
-
-/**
-* @author Alexander V. Astapchuk
-* @version $Revision$
-*/
-
-package java.security;
-
-import java.io.File;
-import java.net.URL;
-import java.net.InetAddress;
-import java.net.MalformedURLException;
-import java.net.UnknownHostException;
-import java.security.cert.CertPath;
-import java.security.cert.Certificate;
-import java.security.cert.CertificateException;
-import java.security.cert.CertificateFactory;
-import java.security.cert.X509Certificate;
-import java.util.ArrayList;
-
-import javax.security.auth.x500.X500Principal;
-
-import org.apache.harmony.security.tests.support.TestCertUtils;
-
-import junit.framework.TestCase;
-
-
-/**
- * Unit test for CodeSource.
- * 
- */
-
-public class CodeSourceTest extends TestCase {
-    /**
-     * 
-     * Entry point for standalone runs.
-     *
-     * @param args command line arguments
-     */
-    public static void main(String[] args) throws Exception {
-        junit.textui.TestRunner.run(CodeSourceTest.class);
-    }
-
-    private java.security.cert.Certificate[] chain = null;
-
-    /* Below are various URLs used during the testing */
-    private static URL urlSite;
-
-    private static URL urlDir; // must NOT end with '/'
-
-    private static URL urlDirOtherSite; // same as urlDir, but another site
-
-    private static URL urlDir_port80, urlDir_port81;
-
-    /* must be exatly the same as urlDir, but with slash added */
-    private static URL urlDirWithSlash;
-
-    //private static URL urlDirFtp;
-    private static URL urlDir_FileProtocol;
-
-    private static URL urlDirIP;
-
-    private static URL urlFile, urlFileWithAdditionalDirs, urlFileDirOtherDir;
-
-    private static URL urlFileDirMinus;
-
-    private static URL urlFileDirStar;
-
-    private static URL urlRef1, urlRef2;
-
-    static {
-        try {
-            String siteName = "www.intel.com";
-            InetAddress addr = InetAddress.getByName(siteName);
-            String siteIP = addr.getHostAddress();
-
-            urlSite = new URL("http://"+siteName+"");
-            urlDir = new URL("http://"+siteName+"/drl_test");
-            urlDirOtherSite = new URL("http://www.any-other-site-which-is-not-siteName.com/drl_test");
-
-            urlDir_port80 = new URL("http://"+siteName+":80/drl_test");
-            urlDir_port81 = new URL("http://"+siteName+":81/drl_test");
-            urlDirWithSlash = new URL(urlDir + "/");
-
-            //urlDirFtp = new URL("ftp://www.intel.com/drl_test");
-            urlDir_FileProtocol = new URL("file://"+siteName+"/drl_test");
-
-            urlDirIP = new URL("http://"+siteIP+"/drl_test");
-
-            urlFile = new URL("http://"+siteName+"/drl_test/empty.jar");
-            urlFileWithAdditionalDirs = new URL(
-                    "http://"+siteName+"/drl_test/what/ever/here/empty.jar");
-
-            urlFileDirMinus = new URL("http://"+siteName+"/drl_test/-");
-            urlFileDirStar = new URL("http://"+siteName+"/drl_test/*");
-            urlFileDirOtherDir = new URL("http://"+siteName+"/_test_drl_/*");
-
-            urlRef1 = new URL("http://"+siteName+"/drl_test/index.html#ref1");
-            urlRef2 = new URL("http://"+siteName+"/drl_test/index.html#ref2");
-        } catch (MalformedURLException ex) {
-            throw new Error(ex);
-        } catch (UnknownHostException ex) {
-            throw new Error(ex);
-        }
-    }
-
-    protected void setUp() throws Exception {
-        super.setUp();
-        chain = TestCertUtils.getCertChain();
-    }
-
-    /**
-     * Tests hashCode().<br>
-     * javadoc says nothing, so test DRL-specific implementation. 
-     */
-    public void testHashCode() {
-        // when nothing is specified, then hashCode obviously must be 0. 
-        assertTrue(new CodeSource(null, (Certificate[]) null).hashCode() == 0);
-        // only URL.hashCode is taken into account...
-        assertTrue(new CodeSource(urlSite, (Certificate[]) null).hashCode() == urlSite
-                .hashCode());
-        // ... and certs[] does not affect it
-        assertTrue(new CodeSource(urlSite, chain).hashCode() == urlSite
-                .hashCode());
-    }
-
-    /**
-     * Tests CodeSource(URL, Certificate[]).
-     */
-    public void testCodeSourceURLCertificateArray() {
-        new CodeSource(null, (Certificate[]) null);
-        new CodeSource(urlSite, (Certificate[]) null);
-        new CodeSource(null, chain);
-        new CodeSource(urlSite, chain);
-    }
-
-    /**
-     * Tests CodeSource(URL, CodeSigner[]).
-     */
-    public void testCodeSourceURLCodeSignerArray() {
-        if (!has_15_features()) {
-            return;
-        }
-        new CodeSource(null, (CodeSigner[]) null);
-
-    }
-
-    /**
-     * equals(Object) must return <code>false</code> for null
-     */
-    public void testEqualsObject_00() {
-        CodeSource thiz = new CodeSource(urlSite, (Certificate[]) null);
-        assertFalse(thiz.equals(null));
-
-    }
-
-    /**
-     * equals(Object) must return <code>true</code> for the same object
-     */
-    public void testEqualsObject_01() {
-        CodeSource thiz = new CodeSource(urlSite, (Certificate[]) null);
-        assertTrue(thiz.equals(thiz));
-    }
-
-    /**
-     * Test for equals(Object)<br>
-     * The signer certificate chain must contain the same set of cerificates, but 
-     * the order of the certificates is not taken into account.
-     */
-    public void testEqualsObject_02() {
-        Certificate cert0 = new TestCertUtils.TestCertificate();
-        Certificate cert1 = new TestCertUtils.TestCertificate();
-        Certificate[] certs0 = new Certificate[] { cert0, cert1 };
-        Certificate[] certs1 = new Certificate[] { cert1, cert0 };
-        CodeSource thiz = new CodeSource(urlSite, certs0);
-        CodeSource that = new CodeSource(urlSite, certs1);
-        assertTrue(thiz.equals(that));
-    }
-
-    /**
-     * Test for equals(Object)<br>
-     * The signer certificate may contain nulls, and equals() must not fail with NPE 
-     */
-    public void testEqualsObject_03() {
-        Certificate cert0 = new TestCertUtils.TestCertificate();
-        Certificate[] certs0 = new Certificate[] { cert0, null };
-        Certificate[] certs1 = new Certificate[] { null, cert0 };
-        CodeSource thiz = new CodeSource(urlSite, certs0);
-        CodeSource that = new CodeSource(urlSite, certs1);
-        assertTrue(thiz.equals(that));
-    }
-
-    /**
-     * Test for equals(Object)<br>
-     * Checks that both 'null' and not-null URLs are taken into account - properly. 
-     */
-    public void testEqualsObject_04() {
-        CodeSource thiz = new CodeSource(urlSite, (Certificate[]) null);
-        CodeSource that = new CodeSource(null, (Certificate[]) null);
-        assertFalse(thiz.equals(that));
-        assertFalse(that.equals(thiz));
-
-        that = new CodeSource(urlFile, (Certificate[]) null);
-        assertFalse(thiz.equals(that));
-        assertFalse(that.equals(thiz));
-    }
-
-    /**
-     * Test for equals(Object)<br>
-     * Checks that both 'null' and not-null certs are taken into account - properly. 
-     */
-    public void testEqualsObject_05() {
-        Certificate cert0 = new TestCertUtils.TestCertificate("cert0");
-        Certificate cert1 = new TestCertUtils.TestCertificate("cert1");
-        Certificate cert2 = new TestCertUtils.TestCertificate("cert2");
-
-        Certificate[] smallSet = new Certificate[] { cert0, cert1 };
-        Certificate[] bigSet = new Certificate[] { cert0, cert1, cert2 };
-
-        CodeSource thiz = new CodeSource(urlSite, smallSet);
-        CodeSource that = new CodeSource(urlSite, (Certificate[]) null);
-        assertFalse(thiz.equals(that));
-
-        that = new CodeSource(urlSite, bigSet);
-        assertFalse(thiz.equals(that));
-
-        thiz = new CodeSource(urlSite, bigSet);
-        that = new CodeSource(urlSite, smallSet);
-        assertFalse(thiz.equals(that));
-
-        thiz = new CodeSource(urlSite, (Certificate[]) null);
-        that = new CodeSource(urlSite, /*any set*/smallSet);
-        assertFalse(thiz.equals(that));
-        assertFalse(that.equals(thiz));
-    }
-
-    /**
-     * Tests CodeSource.getCeritficates().
-     */
-    public void testGetCertificates_00() {
-        assertNull(new CodeSource(null, (Certificate[]) null).getCertificates());
-        java.security.cert.Certificate[] got = new CodeSource(null, chain)
-                .getCertificates();
-        // The returned array must be clone()-d ...
-        assertNotSame(got, chain);
-        // ... but must represent the same set of certificates
-        assertTrue(checkEqual(got, chain));
-    }
-
-    /**
-     * Tests whether the getCertificates() returns certificates obtained from 
-     * the signers.
-     */
-    public void testGetCertificates_01() {
-        if (!has_15_features()) {
-            return;
-        }
-        CertPath cpath = TestCertUtils.getCertPath();
-        Certificate[] certs = (Certificate[]) cpath.getCertificates().toArray();
-        CodeSigner[] signers = { new CodeSigner(cpath, null) };
-        CodeSource cs = new CodeSource(null, signers);
-        Certificate[] got = cs.getCertificates();
-        // The set of certificates must be exactly the same, 
-        // but the order is not specified
-        assertTrue(presented(certs, got));
-        assertTrue(presented(got, certs));
-    }
-
-    /**
-     * Checks whether two arrays of certificates represent the same same set of 
-     * certificates - in the same order.
-     * @param one first array 
-     * @param two second array
-     * @return <code>true</code> if both arrays represent the same set of 
-     * certificates, 
-     * <code>false</code> otherwise.
-     */
-    private static boolean checkEqual(java.security.cert.Certificate[] one,
-            java.security.cert.Certificate[] two) {
-
-        if (one == null) {
-            return two == null;
-        }
-
-        if (two == null) {
-            return false;
-        }
-
-        if (one.length != two.length) {
-            return false;
-        }
-
-        for (int i = 0; i < one.length; i++) {
-            if (one[i] == null) {
-                if (two[i] != null) {
-                    return false;
-                }
-            } else {
-                if (!one[i].equals(two[i])) {
-                    return false;
-                }
-            }
-        }
-        return true;
-    }
-
-    /**
-     * Performs a test whether the <code>what</code> certificates are all
-     * presented in <code>where</code> certificates.
-     * 
-     * @param what - first array of Certificates
-     * @param where  - second array of Certificates
-     * @return <code>true</code> if each and every certificate from 'what' 
-     * (including null) is presented in 'where' <code>false</code> otherwise
-     */
-    private static boolean presented(Certificate[] what, Certificate[] where) {
-        boolean whereHasNull = false;
-        for (int i = 0; i < what.length; i++) {
-            if (what[i] == null) {
-                if (whereHasNull) {
-                    continue;
-                }
-                for (int j = 0; j < where.length; j++) {
-                    if (where[j] == null) {
-                        whereHasNull = true;
-                        break;
-                    }
-                }
-                if (!whereHasNull) {
-                    return false;
-                }
-            } else {
-                boolean found = false;
-                for (int j = 0; j < where.length; j++) {
-                    if (what[i].equals(where[j])) {
-                        found = true;
-                        break;
-                    }
-                }
-                if (!found) {
-                    return false;
-                }
-            }
-
-        }
-        return true;
-    }
-
-    /**
-     * Tests CodeSource.getCodeSigners().
-     */
-    public void testGetCodeSigners_00() {
-        if (!has_15_features()) {
-            return;
-        }
-        CodeSigner[] signers = { new CodeSigner(TestCertUtils.getCertPath(),
-                null) };
-        CodeSource cs = new CodeSource(null, signers);
-        CodeSigner[] got = cs.getCodeSigners();
-        assertNotNull(got);
-        assertTrue(signers.length == got.length);
-        // not sure whether they must be in the same order
-        for (int i = 0; i < signers.length; i++) {
-            CodeSigner s = signers[i];
-            boolean found = false;
-            for (int j = 0; j < got.length; j++) {
-                if (got[j] == s) {
-                    found = true;
-                    break;
-                }
-            }
-            assertTrue(found);
-        }
-    }
-
-    /**
-     * getCodeSigners() must not take into account non-X509 certificates.
-     */
-    public void testGetCodeSigners_01() {
-        if (!has_15_features()) {
-            return;
-        }
-        Certificate[] certs = { new TestCertUtils.TestCertificate("00") };
-        CodeSource cs = new CodeSource(null, certs);
-        assertNull(cs.getCodeSigners());
-    }
-
-    /**
-     * getCodeSigners() must return null if no X509 factory available
-     */
-    public void testGetCodeSigners_02() {
-        if (!has_15_features()) {
-            return;
-        }
-        ArrayList al = new ArrayList();
-        boolean noMoreFactories = false;
-        try {
-            // remove all providers for x509
-            // 'for' loop here for the sake of avoding endless loop - well, just 
-            // in case if something is wrong with add/remove machinery.
-            // '100' seems reasonable big to remove all necessary providers
-            // ...
-            for (int i = 0; i < 100; i++) {
-                try {
-                    CertificateFactory f = CertificateFactory
-                            .getInstance("X.509");
-                    al.add(f.getProvider());
-                    Security.removeProvider(f.getProvider().getName());
-                } catch (CertificateException ex) {
-                    noMoreFactories = true;
-                    break;
-                }
-            }
-            if (!noMoreFactories) {
-                throw new Error(
-                        "Unable to setup test: too many providers provide X.509");
-            }
-            Certificate[] certs = new Certificate[] { TestCertUtils.rootCA };
-            CodeSource cs = new CodeSource(null, certs);
-            assertNull(cs.getCodeSigners());
-        } finally {
-            // .. and restore providers back - to avoid affecting following tests
-            for (int i = 0; i < al.size(); i++) {
-                Security.addProvider((Provider) al.get(i));
-            }
-        }
-
-    }
-
-    /**
-     * getCodeSigners() must return an array of CodeSigners. Just make sure
-     * the array looks healthy.
-     */
-    public void testGetCodeSigners_03() {
-        if (!has_15_features()) {
-            return;
-        }
-
-        TestCertUtils.install_test_x509_factory();
-        try {
-            X500Principal[] ps = TestCertUtils.UniGen.genX500s(3);
-
-            // 2-certs chain 
-            X509Certificate rootCA = TestCertUtils.rootCA;
-            X509Certificate c0 = new TestCertUtils.TestX509Certificate(ps[0],
-                    rootCA.getIssuerX500Principal());
-            //
-            X509Certificate c1 = new TestCertUtils.TestX509Certificate(ps[1],
-                    ps[1]);
-            X509Certificate c2 = new TestCertUtils.TestX509Certificate(ps[2],
-                    ps[2]);
-
-            java.security.cert.Certificate [] certs = new java.security.cert.Certificate[] {
-                    c0, rootCA, c1, c2 };
-            CodeSource cs = new CodeSource(null, certs);
-            CodeSigner[] signers = cs.getCodeSigners();
-
-            // must get exactly 3 CodeSigner-s: one for the chain, and one 
-            // for each of single certs
-            assertEquals(3, signers.length);
-        } finally {
-            TestCertUtils.uninstall_test_x509_factory();
-        }
-    }
-
-    /**
-     * getCodeSigners(). Make sure, that CertException is handled properly
-     */
-    public void testGetCodeSigners_04() {
-        if (!has_15_features()) {
-            return;
-        }
-        try {
-            TestCertUtils.install_test_x509_factory();
-            X500Principal[] ps = TestCertUtils.UniGen.genX500s(1);
-
-            // 2-certs chain 
-            X509Certificate rootCA = TestCertUtils.rootCA;
-            X509Certificate c0 = new TestCertUtils.TestInvalidX509Certificate(
-                    ps[0], rootCA.getIssuerX500Principal());
-            java.security.cert.Certificate [] certs = new java.security.cert.Certificate[] {
-                    c0, rootCA };
-
-            CodeSource cs = new CodeSource(null, certs);
-            CodeSigner[] signers = cs.getCodeSigners();
-
-            assertNull(signers);
-
-            // Must force a check for 'factory==null' 
-            cs.getCodeSigners();
-        } finally {
-            TestCertUtils.uninstall_test_x509_factory();
-        }
-    }
-
-    /**
-     * Tests CodeSource.getLocation()
-     */
-    public void testGetLocation() {
-        assertTrue(new CodeSource(urlSite, (Certificate[]) null).getLocation() == urlSite);
-        assertTrue(new CodeSource(urlSite, chain).getLocation() == urlSite);
-        assertNull(new CodeSource(null, (Certificate[]) null).getLocation());
-        assertNull(new CodeSource(null, chain).getLocation());
-    }
-
-    /**
-     * Tests CodeSource.toString()
-     */
-    public void testToString() {
-        // Javadoc keeps silence about String's format, 
-        // just make sure it can be invoked.
-        new CodeSource(urlSite, chain).toString();
-        new CodeSource(null, chain).toString();
-        new CodeSource(null, (Certificate[]) null).toString();
-    }
-
-    /**
-     * Tests whether we are running with the 1.5 features.<br>
-     * The test is preformed by looking for (via reflection) the CodeSource's 
-     * costructor  {@link CodeSource#CodeSource(URL, CodeSigner[])}.
-     * @return <code>true</code> if 1.5 feature is presented, <code>false</code> 
-     * otherwise.
-     */
-    private static boolean has_15_features() {
-        Class klass = CodeSource.class;
-        Class[] ctorArgs = { URL.class, new CodeSigner[] {}.getClass() };
-        try {
-            klass.getConstructor(ctorArgs);
-        } catch (NoSuchMethodException ex) {
-            // NoSuchMethod == Not RI.v1.5 and not DRL 
-            return false;
-        }
-        return true;
-    }
-
-    /**
-     * must not imply null CodeSource
-     */
-    public void testImplies_00() {
-        CodeSource cs0 = new CodeSource(null, (Certificate[]) null);
-        assertFalse(cs0.implies(null));
-    }
-
-    /**
-     * CodeSource with location=null && Certificate[] == null implies any other
-     * CodeSource
-     */
-    public void testImplies_01() throws Exception {
-        CodeSource thizCS = new CodeSource(urlSite, (Certificate[]) null);
-        CodeSource thatCS = new CodeSource(null, (Certificate[]) null);
-        assertTrue(thatCS.implies(thizCS));
-        assertTrue(thatCS.implies(thatCS));
-
-        assertFalse(thizCS.implies(thatCS));
-    }
-
-    /**
-     * If this object's location equals codesource's location, then return true.
-     */
-    public void testImplies_02() throws Exception {
-        CodeSource thizCS = new CodeSource(urlSite, (Certificate[]) null);
-        CodeSource thatCS = new CodeSource(thizCS.getLocation(),
-                (Certificate[]) null);
-        assertTrue(thizCS.implies(thatCS));
-        assertTrue(thatCS.implies(thizCS));
-
-    }
-
-    /**
-     * This object's protocol (getLocation().getProtocol()) must be equal to
-     * codesource's protocol.
-     */
-    /*
-     * FIXME
-     * commented out for temporary, as there is no FTP:// protocol supported yet.
-     * to be uncommented back.
-     public void testImplies_03() throws Exception {
-     CodeSource thizCS = new CodeSource(urlDir, (Certificate[]) null);
-     CodeSource thatCS = new CodeSource(urlDirFtp, (Certificate[]) null);
-     assertFalse(thizCS.implies(thatCS));
-     assertFalse(thatCS.implies(thizCS));
-     }
-     */
-
-    public void testImplies_03_tmp() throws Exception {
-        CodeSource thizCS = new CodeSource(urlDir, (Certificate[]) null);
-        CodeSource thatCS = new CodeSource(urlDir_FileProtocol,
-                (Certificate[]) null);
-        assertFalse(thizCS.implies(thatCS));
-        assertFalse(thatCS.implies(thizCS));
-    }
-
-    /**
-     * If this object's host (getLocation().getHost()) is not null, then the
-     * SocketPermission constructed with this object's host must imply the
-     * SocketPermission constructed with codesource's host.
-     */
-    public void testImplies_04() throws Exception {
-        CodeSource thizCS = new CodeSource(urlDir, (Certificate[]) null);
-        CodeSource thatCS = new CodeSource(urlDirIP, (Certificate[]) null);
-
-        assertTrue(thizCS.implies(thatCS));
-        assertTrue(thatCS.implies(thizCS));
-
-        // 
-        // Check for another site - force to create SocketPermission
-        //
-        thatCS = new CodeSource(urlDirOtherSite, (Certificate[]) null);
-        assertFalse(thizCS.implies(thatCS));
-
-        //
-        // also check for getHost() == null
-        //
-        thizCS = new CodeSource(new URL("http", null, "file1"),
-                (Certificate[]) null);
-        thatCS = new CodeSource(new URL("http", "another.host.com", "file1"),
-                (Certificate[]) null);
-        // well, yes, this is accordint to the spec...
-        assertTrue(thizCS.implies(thatCS));
-        assertFalse(thatCS.implies(thizCS));
-    }
-
-    /**
-     * If this object's port (getLocation().getPort()) is not equal to -1 (that
-     * is, if a port is specified), it must equal codesource's port.
-     */
-    public void testImplies_05() throws Exception {
-        CodeSource thizCS = new CodeSource(urlDir_port80, (Certificate[]) null);
-        CodeSource thatCS = new CodeSource(urlDir, (Certificate[]) null);
-
-        assertTrue(thizCS.implies(thatCS));
-        assertTrue(thatCS.implies(thizCS));
-
-        thizCS = new CodeSource(urlDir, (Certificate[]) null);
-        thatCS = new CodeSource(urlDir_port81, (Certificate[]) null);
-        //assert*True* because thizCS has 'port=-1'
-        assertTrue(thizCS.implies(thatCS));
-
-        thizCS = new CodeSource(urlDir_port81, (Certificate[]) null);
-        thatCS = new CodeSource(urlDir, (Certificate[]) null);
-        assertFalse(thizCS.implies(thatCS));
-        //
-        thizCS = new CodeSource(urlDir_port80, (Certificate[]) null);
-        thatCS = new CodeSource(urlDir_port81, (Certificate[]) null);
-        assertFalse(thizCS.implies(thatCS));
-    }
-
-    /**
-     * If this object's file (getLocation().getFile()) doesn't equal
-     * codesource's file, then the following checks are made: ...
-     */
-    public void testImplies_06() throws Exception {
-        CodeSource thizCS = new CodeSource(urlFile, (Certificate[]) null);
-        CodeSource thatCS = new CodeSource(urlFile, (Certificate[]) null);
-        assertTrue(thizCS.implies(thatCS));
-    }
-
-    /**
-     * ... If this object's file ends with "/-", then codesource's file must
-     * start with this object's file (exclusive the trailing "-").
-     */
-    public void testImplies_07() throws Exception {
-        CodeSource thiz = new CodeSource(urlFileDirMinus, (Certificate[]) null);
-        CodeSource that = new CodeSource(urlFile, (Certificate[]) null);
-        assertTrue(thiz.implies(that));
-
-        that = new CodeSource(urlFileWithAdditionalDirs, (Certificate[]) null);
-        assertTrue(thiz.implies(that));
-
-        that = new CodeSource(urlFileDirOtherDir, (Certificate[]) null);
-        assertFalse(thiz.implies(that));
-    }
-
-    /**
-     * ... If this object's file ends with a "/*", then codesource's file must
-     * start with this object's file and must not have any further "/"
-     * separators.
-     */
-    public void testImplies_08() throws Exception {
-        CodeSource thiz = new CodeSource(urlFileDirStar, (Certificate[]) null);
-        CodeSource that = new CodeSource(urlFile, (Certificate[]) null);
-        assertTrue(thiz.implies(that));
-        that = new CodeSource(urlFileWithAdditionalDirs, (Certificate[]) null);
-        assertFalse(thiz.implies(that));
-        //
-        that = new CodeSource(urlFileDirOtherDir, (Certificate[]) null);
-        assertFalse(thiz.implies(that));
-        // must not have any further '/'
-        that = new CodeSource(new URL(urlFile.toString() + "/"),
-                (Certificate[]) null);
-        assertFalse(thiz.implies(that));
-    }
-
-    /**
-     * ... If this object's file doesn't end with a "/", then codesource's file
-     * must match this object's file with a '/' appended.
-     */
-    public void testImplies_09() throws Exception {
-        CodeSource thizCS = new CodeSource(urlDir, (Certificate[]) null);
-        CodeSource thatCS = new CodeSource(urlDirWithSlash,
-                (Certificate[]) null);
-        assertTrue(thizCS.implies(thatCS));
-        assertFalse(thatCS.implies(thizCS));
-    }
-
-    /**
-     * If this object's reference (getLocation().getRef()) is not null, it must
-     * equal codesource's reference.
-     */
-    public void testImplies_0A() throws Exception {
-        CodeSource thizCS = new CodeSource(urlRef1, (Certificate[]) null);
-        CodeSource thatCS = new CodeSource(urlRef1, (Certificate[]) null);
-        assertTrue(thizCS.implies(thatCS));
-
-        thizCS = new CodeSource(urlRef1, (Certificate[]) null);
-        thatCS = new CodeSource(urlRef2, (Certificate[]) null);
-        assertFalse(thizCS.implies(thatCS));
-
-    }
-
-    /**
-     * If this certificates are not null, then all of this certificates should
-     * be presented in certificates of that codesource.
-     */
-    public void testImplies_0B() {
-
-        Certificate c0 = new TestCertUtils.TestCertificate("00");
-        Certificate c1 = new TestCertUtils.TestCertificate("01");
-        Certificate c2 = new TestCertUtils.TestCertificate("02");
-        Certificate[] thizCerts = { c0, c1 };
-        Certificate[] thatCerts = { c1, c0, c2 };
-
-        CodeSource thiz = new CodeSource(urlSite, thizCerts);
-        CodeSource that = new CodeSource(urlSite, thatCerts);
-        // two CodeSource-s with different set of certificates
-        assertTrue(thiz.implies(that));
-
-        //
-        that = new CodeSource(urlSite, (Certificate[]) null);
-        // 'thiz' has set of certs, while 'that' has no certs. URL-s are the 
-        // same.
-        assertFalse(thiz.implies(that));
-        assertTrue(that.implies(thiz));
-    }
-
-    /**
-     * Testing with special URLs like 'localhost', 'file://' scheme ...
-     * These cpesial URLs have a special processing in implies(), 
-     * so they need to be covered and performance need to be checked 
-     */
-    public void testImplies_0C() throws Exception {
-        URL url0 = new URL("http://localhost/someDir");
-        URL url1 = new URL("http://localhost/someOtherDir");
-
-        CodeSource thizCS = new CodeSource(url0, (Certificate[]) null);
-        CodeSource thatCS = new CodeSource(url1, (Certificate[]) null);
-        assertFalse(thizCS.implies(thatCS));
-        assertFalse(thatCS.implies(thizCS));
-    }
-
-    /**
-     * Testing with special URLs like 'localhost', 'file://' scheme ...
-     * These cpesial URLs have a special processing in implies(), 
-     * so they need to be covered and performance need to be checked 
-     */
-    public void testImplies_0D() throws Exception {
-        URL url0 = new URL("file:///" + System.getProperty("user.home")
-                + File.separator + "someDir");
-        URL url1 = new URL("file:///" + System.getProperty("user.home")
-                + File.separator + "someOtherDir");
-        CodeSource thizCS = new CodeSource(url0, (Certificate[]) null);
-        CodeSource thatCS = new CodeSource(url1, (Certificate[]) null);
-        assertFalse(thizCS.implies(thatCS));
-        assertFalse(thatCS.implies(thizCS));
-    }
-}
+/*
+ *  Copyright 2005 The Apache Software Foundation or its licensors, as applicable.
+ *
+ *  Licensed under the Apache License, Version 2.0 (the "License");
+ *  you may not use this file except in compliance with the License.
+ *  You may obtain a copy of the License at
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ *  Unless required by applicable law or agreed to in writing, software
+ *  distributed under the License is distributed on an "AS IS" BASIS,
+ *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ *  See the License for the specific language governing permissions and
+ *  limitations under the License.
+ */
+
+/**
+* @author Alexander V. Astapchuk
+* @version $Revision$
+*/
+
+package org.apache.harmony.security.tests.java.security;
+import java.security.*;
+import java.io.File;
+import java.net.URL;
+import java.net.InetAddress;
+import java.net.MalformedURLException;
+import java.net.UnknownHostException;
+import java.security.cert.CertPath;
+import java.security.cert.Certificate;
+
+import org.apache.harmony.security.tests.support.TestCertUtils;
+
+import junit.framework.TestCase;
+
+
+/**
+ * Unit test for CodeSource.
+ * 
+ */
+
+public class CodeSourceTest extends TestCase {
+    /**
+     * 
+     * Entry point for standalone runs.
+     *
+     * @param args command line arguments
+     */
+    public static void main(String[] args) throws Exception {
+        junit.textui.TestRunner.run(CodeSourceTest.class);
+    }
+
+    private java.security.cert.Certificate[] chain = null;
+
+    /* Below are various URLs used during the testing */
+    private static URL urlSite;
+
+    private static URL urlDir; // must NOT end with '/'
+
+    private static URL urlDirOtherSite; // same as urlDir, but another site
+
+    private static URL urlDir_port80, urlDir_port81;
+
+    /* must be exatly the same as urlDir, but with slash added */
+    private static URL urlDirWithSlash;
+
+    //private static URL urlDirFtp;
+    private static URL urlDir_FileProtocol;
+
+    private static URL urlDirIP;
+
+    private static URL urlFile, urlFileWithAdditionalDirs, urlFileDirOtherDir;
+
+    private static URL urlFileDirMinus;
+
+    private static URL urlFileDirStar;
+
+    private static URL urlRef1, urlRef2;
+
+    static {
+        try {
+            String siteName = "www.intel.com";
+            InetAddress addr = InetAddress.getByName(siteName);
+            String siteIP = addr.getHostAddress();
+
+            urlSite = new URL("http://"+siteName+"");
+            urlDir = new URL("http://"+siteName+"/drl_test");
+            urlDirOtherSite = new URL("http://www.any-other-site-which-is-not-siteName.com/drl_test");
+
+            urlDir_port80 = new URL("http://"+siteName+":80/drl_test");
+            urlDir_port81 = new URL("http://"+siteName+":81/drl_test");
+            urlDirWithSlash = new URL(urlDir + "/");
+
+            //urlDirFtp = new URL("ftp://www.intel.com/drl_test");
+            urlDir_FileProtocol = new URL("file://"+siteName+"/drl_test");
+
+            urlDirIP = new URL("http://"+siteIP+"/drl_test");
+
+            urlFile = new URL("http://"+siteName+"/drl_test/empty.jar");
+            urlFileWithAdditionalDirs = new URL(
+                    "http://"+siteName+"/drl_test/what/ever/here/empty.jar");
+
+            urlFileDirMinus = new URL("http://"+siteName+"/drl_test/-");
+            urlFileDirStar = new URL("http://"+siteName+"/drl_test/*");
+            urlFileDirOtherDir = new URL("http://"+siteName+"/_test_drl_/*");
+
+            urlRef1 = new URL("http://"+siteName+"/drl_test/index.html#ref1");
+            urlRef2 = new URL("http://"+siteName+"/drl_test/index.html#ref2");
+        } catch (MalformedURLException ex) {
+            throw new Error(ex);
+        } catch (UnknownHostException ex) {
+            throw new Error(ex);
+        }
+    }
+
+    protected void setUp() throws Exception {
+        super.setUp();
+        chain = TestCertUtils.getCertChain();
+    }
+
+    /**
+     * Tests hashCode().<br>
+     * javadoc says nothing, so test DRL-specific implementation. 
+     */
+    public void testHashCode() {
+        // when nothing is specified, then hashCode obviously must be 0. 
+        assertTrue(new CodeSource(null, (Certificate[]) null).hashCode() == 0);
+        // only URL.hashCode is taken into account...
+        assertTrue(new CodeSource(urlSite, (Certificate[]) null).hashCode() == urlSite
+                .hashCode());
+        // ... and certs[] does not affect it
+        assertTrue(new CodeSource(urlSite, chain).hashCode() == urlSite
+                .hashCode());
+    }
+
+    /**
+     * Tests CodeSource(URL, Certificate[]).
+     */
+    public void testCodeSourceURLCertificateArray() {
+        new CodeSource(null, (Certificate[]) null);
+        new CodeSource(urlSite, (Certificate[]) null);
+        new CodeSource(null, chain);
+        new CodeSource(urlSite, chain);
+    }
+
+    /**
+     * Tests CodeSource(URL, CodeSigner[]).
+     */
+    public void testCodeSourceURLCodeSignerArray() {
+        if (!has_15_features()) {
+            return;
+        }
+        new CodeSource(null, (CodeSigner[]) null);
+
+    }
+
+    /**
+     * equals(Object) must return <code>false</code> for null
+     */
+    public void testEqualsObject_00() {
+        CodeSource thiz = new CodeSource(urlSite, (Certificate[]) null);
+        assertFalse(thiz.equals(null));
+
+    }
+
+    /**
+     * equals(Object) must return <code>true</code> for the same object
+     */
+    public void testEqualsObject_01() {
+        CodeSource thiz = new CodeSource(urlSite, (Certificate[]) null);
+        assertTrue(thiz.equals(thiz));
+    }
+
+    /**
+     * Test for equals(Object)<br>
+     * The signer certificate chain must contain the same set of cerificates, but 
+     * the order of the certificates is not taken into account.
+     */
+    public void testEqualsObject_02() {
+        Certificate cert0 = new TestCertUtils.TestCertificate();
+        Certificate cert1 = new TestCertUtils.TestCertificate();
+        Certificate[] certs0 = new Certificate[] { cert0, cert1 };
+        Certificate[] certs1 = new Certificate[] { cert1, cert0 };
+        CodeSource thiz = new CodeSource(urlSite, certs0);
+        CodeSource that = new CodeSource(urlSite, certs1);
+        assertTrue(thiz.equals(that));
+    }
+
+    /**
+     * Test for equals(Object)<br>
+     * Checks that both 'null' and not-null URLs are taken into account - properly. 
+     */
+    public void testEqualsObject_04() {
+        CodeSource thiz = new CodeSource(urlSite, (Certificate[]) null);
+        CodeSource that = new CodeSource(null, (Certificate[]) null);
+        assertFalse(thiz.equals(that));
+        assertFalse(that.equals(thiz));
+
+        that = new CodeSource(urlFile, (Certificate[]) null);
+        assertFalse(thiz.equals(that));
+        assertFalse(that.equals(thiz));
+    }
+
+    /**
+     * Tests CodeSource.getCeritficates().
+     */
+    public void testGetCertificates_00() {
+        assertNull(new CodeSource(null, (Certificate[]) null).getCertificates());
+        java.security.cert.Certificate[] got = new CodeSource(null, chain)
+                .getCertificates();
+        // The returned array must be clone()-d ...
+        assertNotSame(got, chain);
+        // ... but must represent the same set of certificates
+        assertTrue(checkEqual(got, chain));
+    }
+
+    /**
+     * Tests whether the getCertificates() returns certificates obtained from 
+     * the signers.
+     */
+    public void testGetCertificates_01() {
+        if (!has_15_features()) {
+            return;
+        }
+        CertPath cpath = TestCertUtils.getCertPath();
+        Certificate[] certs = (Certificate[]) cpath.getCertificates().toArray();
+        CodeSigner[] signers = { new CodeSigner(cpath, null) };
+        CodeSource cs = new CodeSource(null, signers);
+        Certificate[] got = cs.getCertificates();
+        // The set of certificates must be exactly the same, 
+        // but the order is not specified
+        assertTrue(presented(certs, got));
+        assertTrue(presented(got, certs));
+    }
+
+    /**
+     * Checks whether two arrays of certificates represent the same same set of 
+     * certificates - in the same order.
+     * @param one first array 
+     * @param two second array
+     * @return <code>true</code> if both arrays represent the same set of 
+     * certificates, 
+     * <code>false</code> otherwise.
+     */
+    private static boolean checkEqual(java.security.cert.Certificate[] one,
+            java.security.cert.Certificate[] two) {
+
+        if (one == null) {
+            return two == null;
+        }
+
+        if (two == null) {
+            return false;
+        }
+
+        if (one.length != two.length) {
+            return false;
+        }
+
+        for (int i = 0; i < one.length; i++) {
+            if (one[i] == null) {
+                if (two[i] != null) {
+                    return false;
+                }
+            } else {
+                if (!one[i].equals(two[i])) {
+                    return false;
+                }
+            }
+        }
+        return true;
+    }
+
+    /**
+     * Performs a test whether the <code>what</code> certificates are all
+     * presented in <code>where</code> certificates.
+     * 
+     * @param what - first array of Certificates
+     * @param where  - second array of Certificates
+     * @return <code>true</code> if each and every certificate from 'what' 
+     * (including null) is presented in 'where' <code>false</code> otherwise
+     */
+    private static boolean presented(Certificate[] what, Certificate[] where) {
+        boolean whereHasNull = false;
+        for (int i = 0; i < what.length; i++) {
+            if (what[i] == null) {
+                if (whereHasNull) {
+                    continue;
+                }
+                for (int j = 0; j < where.length; j++) {
+                    if (where[j] == null) {
+                        whereHasNull = true;
+                        break;
+                    }
+                }
+                if (!whereHasNull) {
+                    return false;
+                }
+            } else {
+                boolean found = false;
+                for (int j = 0; j < where.length; j++) {
+                    if (what[i].equals(where[j])) {
+                        found = true;
+                        break;
+                    }
+                }
+                if (!found) {
+                    return false;
+                }
+            }
+
+        }
+        return true;
+    }
+
+    /**
+     * Tests CodeSource.getCodeSigners().
+     */
+    public void testGetCodeSigners_00() {
+        if (!has_15_features()) {
+            return;
+        }
+        CodeSigner[] signers = { new CodeSigner(TestCertUtils.getCertPath(),
+                null) };
+        CodeSource cs = new CodeSource(null, signers);
+        CodeSigner[] got = cs.getCodeSigners();
+        assertNotNull(got);
+        assertTrue(signers.length == got.length);
+        // not sure whether they must be in the same order
+        for (int i = 0; i < signers.length; i++) {
+            CodeSigner s = signers[i];
+            boolean found = false;
+            for (int j = 0; j < got.length; j++) {
+                if (got[j] == s) {
+                    found = true;
+                    break;
+                }
+            }
+            assertTrue(found);
+        }
+    }
+
+    /**
+     * Tests CodeSource.getLocation()
+     */
+    public void testGetLocation() {
+        assertTrue(new CodeSource(urlSite, (Certificate[]) null).getLocation() == urlSite);
+        assertTrue(new CodeSource(urlSite, chain).getLocation() == urlSite);
+        assertNull(new CodeSource(null, (Certificate[]) null).getLocation());
+        assertNull(new CodeSource(null, chain).getLocation());
+    }
+
+    /**
+     * Tests CodeSource.toString()
+     */
+    public void testToString() {
+        // Javadoc keeps silence about String's format, 
+        // just make sure it can be invoked.
+        new CodeSource(urlSite, chain).toString();
+        new CodeSource(null, chain).toString();
+        new CodeSource(null, (Certificate[]) null).toString();
+    }
+
+    /**
+     * Tests whether we are running with the 1.5 features.<br>
+     * The test is preformed by looking for (via reflection) the CodeSource's 
+     * costructor  {@link CodeSource#CodeSource(URL, CodeSigner[])}.
+     * @return <code>true</code> if 1.5 feature is presented, <code>false</code> 
+     * otherwise.
+     */
+    private static boolean has_15_features() {
+        Class klass = CodeSource.class;
+        Class[] ctorArgs = { URL.class, new CodeSigner[] {}.getClass() };
+        try {
+            klass.getConstructor(ctorArgs);
+        } catch (NoSuchMethodException ex) {
+            // NoSuchMethod == Not RI.v1.5 and not DRL 
+            return false;
+        }
+        return true;
+    }
+
+    /**
+     * must not imply null CodeSource
+     */
+    public void testImplies_00() {
+        CodeSource cs0 = new CodeSource(null, (Certificate[]) null);
+        assertFalse(cs0.implies(null));
+    }
+
+    /**
+     * CodeSource with location=null && Certificate[] == null implies any other
+     * CodeSource
+     */
+    public void testImplies_01() throws Exception {
+        CodeSource thizCS = new CodeSource(urlSite, (Certificate[]) null);
+        CodeSource thatCS = new CodeSource(null, (Certificate[]) null);
+        assertTrue(thatCS.implies(thizCS));
+        assertTrue(thatCS.implies(thatCS));
+
+        assertFalse(thizCS.implies(thatCS));
+    }
+
+    /**
+     * If this object's location equals codesource's location, then return true.
+     */
+    public void testImplies_02() throws Exception {
+        CodeSource thizCS = new CodeSource(urlSite, (Certificate[]) null);
+        CodeSource thatCS = new CodeSource(thizCS.getLocation(),
+                (Certificate[]) null);
+        assertTrue(thizCS.implies(thatCS));
+        assertTrue(thatCS.implies(thizCS));
+
+    }
+
+    /**
+     * This object's protocol (getLocation().getProtocol()) must be equal to
+     * codesource's protocol.
+     */
+    /*
+     * FIXME
+     * commented out for temporary, as there is no FTP:// protocol supported yet.
+     * to be uncommented back.
+     public void testImplies_03() throws Exception {
+     CodeSource thizCS = new CodeSource(urlDir, (Certificate[]) null);
+     CodeSource thatCS = new CodeSource(urlDirFtp, (Certificate[]) null);
+     assertFalse(thizCS.implies(thatCS));
+     assertFalse(thatCS.implies(thizCS));
+     }
+     */
+
+    public void testImplies_03_tmp() throws Exception {
+        CodeSource thizCS = new CodeSource(urlDir, (Certificate[]) null);
+        CodeSource thatCS = new CodeSource(urlDir_FileProtocol,
+                (Certificate[]) null);
+        assertFalse(thizCS.implies(thatCS));
+        assertFalse(thatCS.implies(thizCS));
+    }
+
+    /**
+     * If this object's host (getLocation().getHost()) is not null, then the
+     * SocketPermission constructed with this object's host must imply the
+     * SocketPermission constructed with codesource's host.
+     */
+    public void testImplies_04() throws Exception {
+        CodeSource thizCS = new CodeSource(urlDir, (Certificate[]) null);
+        CodeSource thatCS = new CodeSource(urlDirIP, (Certificate[]) null);
+
+        assertTrue(thizCS.implies(thatCS));
+        assertTrue(thatCS.implies(thizCS));
+
+        // 
+        // Check for another site - force to create SocketPermission
+        //
+        thatCS = new CodeSource(urlDirOtherSite, (Certificate[]) null);
+        assertFalse(thizCS.implies(thatCS));
+
+        //
+        // also check for getHost() == null
+        //
+        thizCS = new CodeSource(new URL("http", null, "file1"),
+                (Certificate[]) null);
+        thatCS = new CodeSource(new URL("http", "another.host.com", "file1"),
+                (Certificate[]) null);
+        // well, yes, this is accordint to the spec...
+        assertTrue(thizCS.implies(thatCS));
+        assertFalse(thatCS.implies(thizCS));
+    }
+
+    /**
+     * If this object's port (getLocation().getPort()) is not equal to -1 (that
+     * is, if a port is specified), it must equal codesource's port.
+     */
+    public void testImplies_05() throws Exception {
+        CodeSource thizCS = new CodeSource(urlDir_port80, (Certificate[]) null);
+        CodeSource thatCS = new CodeSource(urlDir, (Certificate[]) null);
+
+        assertTrue(thizCS.implies(thatCS));
+        assertTrue(thatCS.implies(thizCS));
+
+        thizCS = new CodeSource(urlDir, (Certificate[]) null);
+        thatCS = new CodeSource(urlDir_port81, (Certificate[]) null);
+        //assert*True* because thizCS has 'port=-1'
+        assertTrue(thizCS.implies(thatCS));
+
+        thizCS = new CodeSource(urlDir_port81, (Certificate[]) null);
+        thatCS = new CodeSource(urlDir, (Certificate[]) null);
+        assertFalse(thizCS.implies(thatCS));
+        //
+        thizCS = new CodeSource(urlDir_port80, (Certificate[]) null);
+        thatCS = new CodeSource(urlDir_port81, (Certificate[]) null);
+        assertFalse(thizCS.implies(thatCS));
+    }
+
+    /**
+     * If this object's file (getLocation().getFile()) doesn't equal
+     * codesource's file, then the following checks are made: ...
+     */
+    public void testImplies_06() throws Exception {
+        CodeSource thizCS = new CodeSource(urlFile, (Certificate[]) null);
+        CodeSource thatCS = new CodeSource(urlFile, (Certificate[]) null);
+        assertTrue(thizCS.implies(thatCS));
+    }
+
+    /**
+     * ... If this object's file ends with "/-", then codesource's file must
+     * start with this object's file (exclusive the trailing "-").
+     */
+    public void testImplies_07() throws Exception {
+        CodeSource thiz = new CodeSource(urlFileDirMinus, (Certificate[]) null);
+        CodeSource that = new CodeSource(urlFile, (Certificate[]) null);
+        assertTrue(thiz.implies(that));
+
+        that = new CodeSource(urlFileWithAdditionalDirs, (Certificate[]) null);
+        assertTrue(thiz.implies(that));
+
+        that = new CodeSource(urlFileDirOtherDir, (Certificate[]) null);
+        assertFalse(thiz.implies(that));
+    }
+
+    /**
+     * ... If this object's file ends with a "/*", then codesource's file must
+     * start with this object's file and must not have any further "/"
+     * separators.
+     */
+    public void testImplies_08() throws Exception {
+        CodeSource thiz = new CodeSource(urlFileDirStar, (Certificate[]) null);
+        CodeSource that = new CodeSource(urlFile, (Certificate[]) null);
+        assertTrue(thiz.implies(that));
+        that = new CodeSource(urlFileWithAdditionalDirs, (Certificate[]) null);
+        assertFalse(thiz.implies(that));
+        //
+        that = new CodeSource(urlFileDirOtherDir, (Certificate[]) null);
+        assertFalse(thiz.implies(that));
+        // must not have any further '/'
+        that = new CodeSource(new URL(urlFile.toString() + "/"),
+                (Certificate[]) null);
+        assertFalse(thiz.implies(that));
+    }
+
+    /**
+     * ... If this object's file doesn't end with a "/", then codesource's file
+     * must match this object's file with a '/' appended.
+     */
+    public void testImplies_09() throws Exception {
+        CodeSource thizCS = new CodeSource(urlDir, (Certificate[]) null);
+        CodeSource thatCS = new CodeSource(urlDirWithSlash,
+                (Certificate[]) null);
+        assertTrue(thizCS.implies(thatCS));
+        assertFalse(thatCS.implies(thizCS));
+    }
+
+    /**
+     * If this object's reference (getLocation().getRef()) is not null, it must
+     * equal codesource's reference.
+     */
+    public void testImplies_0A() throws Exception {
+        CodeSource thizCS = new CodeSource(urlRef1, (Certificate[]) null);
+        CodeSource thatCS = new CodeSource(urlRef1, (Certificate[]) null);
+        assertTrue(thizCS.implies(thatCS));
+
+        thizCS = new CodeSource(urlRef1, (Certificate[]) null);
+        thatCS = new CodeSource(urlRef2, (Certificate[]) null);
+        assertFalse(thizCS.implies(thatCS));
+
+    }
+
+    /**
+     * If this certificates are not null, then all of this certificates should
+     * be presented in certificates of that codesource.
+     */
+    public void testImplies_0B() {
+
+        Certificate c0 = new TestCertUtils.TestCertificate("00");
+        Certificate c1 = new TestCertUtils.TestCertificate("01");
+        Certificate c2 = new TestCertUtils.TestCertificate("02");
+        Certificate[] thizCerts = { c0, c1 };
+        Certificate[] thatCerts = { c1, c0, c2 };
+
+        CodeSource thiz = new CodeSource(urlSite, thizCerts);
+        CodeSource that = new CodeSource(urlSite, thatCerts);
+        // two CodeSource-s with different set of certificates
+        assertTrue(thiz.implies(that));
+
+        //
+        that = new CodeSource(urlSite, (Certificate[]) null);
+        // 'thiz' has set of certs, while 'that' has no certs. URL-s are the 
+        // same.
+        assertFalse(thiz.implies(that));
+        assertTrue(that.implies(thiz));
+    }
+
+    /**
+     * Testing with special URLs like 'localhost', 'file://' scheme ...
+     * These cpesial URLs have a special processing in implies(), 
+     * so they need to be covered and performance need to be checked 
+     */
+    public void testImplies_0C() throws Exception {
+        URL url0 = new URL("http://localhost/someDir");
+        URL url1 = new URL("http://localhost/someOtherDir");
+
+        CodeSource thizCS = new CodeSource(url0, (Certificate[]) null);
+        CodeSource thatCS = new CodeSource(url1, (Certificate[]) null);
+        assertFalse(thizCS.implies(thatCS));
+        assertFalse(thatCS.implies(thizCS));
+    }
+
+    /**
+     * Testing with special URLs like 'localhost', 'file://' scheme ...
+     * These cpesial URLs have a special processing in implies(), 
+     * so they need to be covered and performance need to be checked 
+     */
+    public void testImplies_0D() throws Exception {
+        URL url0 = new URL("file:///" + System.getProperty("user.home")
+                + File.separator + "someDir");
+        URL url1 = new URL("file:///" + System.getProperty("user.home")
+                + File.separator + "someOtherDir");
+        CodeSource thizCS = new CodeSource(url0, (Certificate[]) null);
+        CodeSource thatCS = new CodeSource(url1, (Certificate[]) null);
+        assertFalse(thizCS.implies(thatCS));
+        assertFalse(thatCS.implies(thizCS));
+    }
+}

Copied: incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/DigestExceptionTest.java (from r412639, incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/DigestExceptionTest.java)
URL: http://svn.apache.org/viewvc/incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/DigestExceptionTest.java?p2=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/DigestExceptionTest.java&p1=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/DigestExceptionTest.java&r1=412639&r2=413841&rev=413841&view=diff
==============================================================================
--- incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/DigestExceptionTest.java (original)
+++ incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/DigestExceptionTest.java Tue Jun 13 01:58:11 2006
@@ -19,8 +19,7 @@
 * @version $Revision$
 */
 
-package java.security;
-
+package org.apache.harmony.security.tests.java.security;
 import java.security.DigestException;
 
 import junit.framework.TestCase;

Copied: incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/DigestInputStreamTest.java (from r412639, incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/DigestInputStreamTest.java)
URL: http://svn.apache.org/viewvc/incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/DigestInputStreamTest.java?p2=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/DigestInputStreamTest.java&p1=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/DigestInputStreamTest.java&r1=412639&r2=413841&rev=413841&view=diff
==============================================================================
--- incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/DigestInputStreamTest.java (original)
+++ incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/DigestInputStreamTest.java Tue Jun 13 01:58:11 2006
@@ -19,7 +19,7 @@
 * @version $Revision$
 */
 
-package java.security;
+package org.apache.harmony.security.tests.java.security;
 
 import java.io.ByteArrayInputStream;
 import java.io.IOException;
@@ -27,8 +27,6 @@
 import java.security.DigestInputStream;
 import java.security.MessageDigest;
 import java.security.NoSuchAlgorithmException;
-
-
 import java.util.Arrays;
 
 import org.apache.harmony.security.tests.support.MDGoldenData;

Copied: incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/DigestOutputStreamTest.java (from r412639, incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/DigestOutputStreamTest.java)
URL: http://svn.apache.org/viewvc/incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/DigestOutputStreamTest.java?p2=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/DigestOutputStreamTest.java&p1=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/DigestOutputStreamTest.java&r1=412639&r2=413841&rev=413841&view=diff
==============================================================================
--- incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/DigestOutputStreamTest.java (original)
+++ incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/DigestOutputStreamTest.java Tue Jun 13 01:58:11 2006
@@ -19,8 +19,8 @@
 * @version $Revision$
 */
 
-package java.security;
-
+package org.apache.harmony.security.tests.java.security;
+import java.security.*;
 import java.io.ByteArrayOutputStream;
 import java.io.IOException;
 import java.io.OutputStream;

Copied: incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/GeneralSecurityExceptionTest.java (from r412639, incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/GeneralSecurityExceptionTest.java)
URL: http://svn.apache.org/viewvc/incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/GeneralSecurityExceptionTest.java?p2=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/GeneralSecurityExceptionTest.java&p1=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/GeneralSecurityExceptionTest.java&r1=412639&r2=413841&rev=413841&view=diff
==============================================================================
--- incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/GeneralSecurityExceptionTest.java (original)
+++ incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/GeneralSecurityExceptionTest.java Tue Jun 13 01:58:11 2006
@@ -19,8 +19,7 @@
 * @version $Revision$
 */
 
-package java.security;
-
+package org.apache.harmony.security.tests.java.security;
 import java.security.GeneralSecurityException;
 
 import junit.framework.TestCase;

Copied: incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/GuardedObjectTest.java (from r412639, incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/GuardedObjectTest.java)
URL: http://svn.apache.org/viewvc/incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/GuardedObjectTest.java?p2=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/GuardedObjectTest.java&p1=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/GuardedObjectTest.java&r1=412639&r2=413841&rev=413841&view=diff
==============================================================================
--- incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/GuardedObjectTest.java (original)
+++ incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/GuardedObjectTest.java Tue Jun 13 01:58:11 2006
@@ -19,8 +19,8 @@
 * @version $Revision$
 */
 
-package java.security;
-
+package org.apache.harmony.security.tests.java.security;
+import java.security.*;
 import junit.framework.TestCase;
 
 /**

Copied: incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/IdentityScopeTest.java (from r412639, incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/IdentityScopeTest.java)
URL: http://svn.apache.org/viewvc/incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/IdentityScopeTest.java?p2=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/IdentityScopeTest.java&p1=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/IdentityScopeTest.java&r1=412639&r2=413841&rev=413841&view=diff
==============================================================================
--- incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/IdentityScopeTest.java (original)
+++ incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/IdentityScopeTest.java Tue Jun 13 01:58:11 2006
@@ -19,8 +19,8 @@
 * @version $Revision$
 */
 
-package java.security;
-
+package org.apache.harmony.security.tests.java.security;
+import java.security.*;
 import org.apache.harmony.security.tests.support.IdentityScopeStub;
 
 import junit.framework.TestCase;

Copied: incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/InvalidAlgorithmParameterExceptionTest.java (from r412639, incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/InvalidAlgorithmParameterExceptionTest.java)
URL: http://svn.apache.org/viewvc/incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/InvalidAlgorithmParameterExceptionTest.java?p2=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/InvalidAlgorithmParameterExceptionTest.java&p1=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/InvalidAlgorithmParameterExceptionTest.java&r1=412639&r2=413841&rev=413841&view=diff
==============================================================================
--- incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/InvalidAlgorithmParameterExceptionTest.java (original)
+++ incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/InvalidAlgorithmParameterExceptionTest.java Tue Jun 13 01:58:11 2006
@@ -19,7 +19,7 @@
 * @version $Revision$
 */
 
-package java.security;
+package org.apache.harmony.security.tests.java.security;
 
 import java.security.InvalidAlgorithmParameterException;
 

Copied: incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/InvalidKeyExceptionTest.java (from r412639, incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/InvalidKeyExceptionTest.java)
URL: http://svn.apache.org/viewvc/incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/InvalidKeyExceptionTest.java?p2=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/InvalidKeyExceptionTest.java&p1=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/InvalidKeyExceptionTest.java&r1=412639&r2=413841&rev=413841&view=diff
==============================================================================
--- incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/InvalidKeyExceptionTest.java (original)
+++ incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/InvalidKeyExceptionTest.java Tue Jun 13 01:58:11 2006
@@ -19,8 +19,7 @@
 * @version $Revision$
 */
 
-package java.security;
-
+package org.apache.harmony.security.tests.java.security;
 import java.security.InvalidKeyException;
 
 import junit.framework.TestCase;

Copied: incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/InvalidParameterExceptionTest.java (from r412639, incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/InvalidParameterExceptionTest.java)
URL: http://svn.apache.org/viewvc/incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/InvalidParameterExceptionTest.java?p2=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/InvalidParameterExceptionTest.java&p1=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/InvalidParameterExceptionTest.java&r1=412639&r2=413841&rev=413841&view=diff
==============================================================================
--- incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/InvalidParameterExceptionTest.java (original)
+++ incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/InvalidParameterExceptionTest.java Tue Jun 13 01:58:11 2006
@@ -19,8 +19,7 @@
 * @version $Revision$
 */
 
-package java.security;
-
+package org.apache.harmony.security.tests.java.security;
 import java.security.InvalidParameterException;
 
 import junit.framework.TestCase;

Copied: incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/KSCallbackHandlerProtectionTest.java (from r412639, incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/KSCallbackHandlerProtectionTest.java)
URL: http://svn.apache.org/viewvc/incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/KSCallbackHandlerProtectionTest.java?p2=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/KSCallbackHandlerProtectionTest.java&p1=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/KSCallbackHandlerProtectionTest.java&r1=412639&r2=413841&rev=413841&view=diff
==============================================================================
--- incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/KSCallbackHandlerProtectionTest.java (original)
+++ incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/KSCallbackHandlerProtectionTest.java Tue Jun 13 01:58:11 2006
@@ -19,11 +19,13 @@
 * @version $Revision$
 */
 
-package java.security;
-
+package org.apache.harmony.security.tests.java.security;
 
+import java.security.KeyStore;
 
 import javax.security.auth.callback.CallbackHandler;
+
+import org.apache.harmony.security.tests.support.tmpCallbackHandler;
 
 import junit.framework.TestCase;
 

Copied: incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/KSPasswordProtectionTest.java (from r412639, incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/KSPasswordProtectionTest.java)
URL: http://svn.apache.org/viewvc/incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/KSPasswordProtectionTest.java?p2=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/KSPasswordProtectionTest.java&p1=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/KSPasswordProtectionTest.java&r1=412639&r2=413841&rev=413841&view=diff
==============================================================================
--- incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/KSPasswordProtectionTest.java (original)
+++ incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/KSPasswordProtectionTest.java Tue Jun 13 01:58:11 2006
@@ -19,9 +19,9 @@
 * @version $Revision$
 */
 
-package java.security;
-
+package org.apache.harmony.security.tests.java.security;
 
+import java.security.*;
 import javax.security.auth.DestroyFailedException;
 
 import junit.framework.TestCase;

Copied: incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/KSPrivateKeyEntryTest.java (from r412639, incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/KSPrivateKeyEntryTest.java)
URL: http://svn.apache.org/viewvc/incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/KSPrivateKeyEntryTest.java?p2=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/KSPrivateKeyEntryTest.java&p1=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/KSPrivateKeyEntryTest.java&r1=412639&r2=413841&rev=413841&view=diff
==============================================================================
--- incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/KSPrivateKeyEntryTest.java (original)
+++ incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/KSPrivateKeyEntryTest.java Tue Jun 13 01:58:11 2006
@@ -19,9 +19,9 @@
 * @version $Revision$
 */
 
-package java.security;
-
+package org.apache.harmony.security.tests.java.security;
 
+import java.security.*;
 import java.security.cert.Certificate;
 
 import org.apache.harmony.security.tests.support.cert.MyCertificate;

Copied: incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/KSSecretKeyEntryTest.java (from r412639, incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/KSSecretKeyEntryTest.java)
URL: http://svn.apache.org/viewvc/incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/KSSecretKeyEntryTest.java?p2=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/KSSecretKeyEntryTest.java&p1=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/KSSecretKeyEntryTest.java&r1=412639&r2=413841&rev=413841&view=diff
==============================================================================
--- incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/KSSecretKeyEntryTest.java (original)
+++ incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/KSSecretKeyEntryTest.java Tue Jun 13 01:58:11 2006
@@ -19,9 +19,9 @@
 * @version $Revision$
 */
 
-package java.security;
-
+package org.apache.harmony.security.tests.java.security;
 
+import java.security.*;
 import javax.crypto.SecretKey;
 
 import junit.framework.TestCase;

Copied: incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/KSTrustedCertificateEntryTest.java (from r412639, incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/KSTrustedCertificateEntryTest.java)
URL: http://svn.apache.org/viewvc/incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/KSTrustedCertificateEntryTest.java?p2=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/KSTrustedCertificateEntryTest.java&p1=incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/KSTrustedCertificateEntryTest.java&r1=412639&r2=413841&rev=413841&view=diff
==============================================================================
--- incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java.injected/java/security/KSTrustedCertificateEntryTest.java (original)
+++ incubator/harmony/enhanced/classlib/trunk/modules/security/src/test/api/java/org/apache/harmony/security/tests/java/security/KSTrustedCertificateEntryTest.java Tue Jun 13 01:58:11 2006
@@ -19,8 +19,8 @@
 * @version $Revision$
 */
 
-package java.security;
-
+package org.apache.harmony.security.tests.java.security;
+import java.security.*;
 import java.security.cert.Certificate;
 
 import org.apache.harmony.security.tests.support.cert.MyCertificate;