Tests an element with an illegal Name containing #0x300
<?xml version="1.1" encoding="UTF-8"?> <!DOCTYPE root [ <!ELEMENT root ANY> <!ELEMENT ̀BadName EMPTY> ]> <!-- BadName containing char 0x300; --> <root> <̀BadName/> </root>
| Expected result | Actual result for org.apache.crimson.parser.XMLReaderImpl |
|---|---|
<?xml version="1.0" encoding="UTF-8"?>
<ConformanceResults>
<startDocument/>
<fatalError/>
<endDocument/>
</ConformanceResults>
| <?xml version="1.0" encoding="UTF-8"?>
<ConformanceResults>
<startDocument/>
<fatalError/>
</ConformanceResults>
|