From zhuoren.wz at alibaba-inc.com Tue Sep 1 05:35:01 2020 From: zhuoren.wz at alibaba-inc.com (=?UTF-8?B?V2FuZyBaaHVvKFpodW9yZW4p?=) Date: Tue, 01 Sep 2020 13:35:01 +0800 Subject: [aarch64-port-dev ] =?utf-8?b?WzE2XVJGUihTKTo4MjQ5MDkyOkludGVy?= =?utf-8?q?nalError=3A_a_fault_occurred_in_a_recent_unsafe_memory_access_o?= =?utf-8?q?peration_in_compiled_Java_code?= Message-ID: <90fda75f-62f9-4d96-b434-6dc15a5537af.zhuoren.wz@alibaba-inc.com> Hi, this is a fix for a test case. In -Xcomp mode, compiler/unsafe/TestUnsafeUnalignedSwap.java will fail because the catch misses the error due to async exception. This patch uses a loop to make sure the error can be caught. Also -Xcomp is added in test. BUG: https://bugs.openjdk.java.net/browse/JDK-8249092 Patch: http://cr.openjdk.java.net/~wzhuo/8249092/webrev.00/ Regards, Zhuoren From ci_notify at linaro.org Tue Sep 1 06:33:47 2020 From: ci_notify at linaro.org (ci_notify at linaro.org) Date: Tue, 1 Sep 2020 06:33:47 +0000 (UTC) Subject: [aarch64-port-dev ] Linaro OpenJDK AArch64 jdk/jdk build 4339 Fixed Message-ID: <1004786814.7436.1598942028112@localhost> OpenJDK AArch64 jdk/jdk build status is Fixed Build details - https://ci.linaro.org/jenkins/job/jdkX-ci-build/4339/ Changes - shade: a7e6fbe4595750b4542f0cf000fa5a3775958e12 - src/hotspot/share/gc/shenandoah/mode/shenandoahIUMode.cpp - src/hotspot/share/gc/shenandoah/mode/shenandoahSATBMode.cpp - src/hotspot/share/gc/shenandoah/shenandoahArguments.cpp - src/hotspot/share/gc/shenandoah/shenandoahHeap.cpp --"8252592: Non-PCH build is broken after JDK-8251560 Reviewed-by: zgu, iklam " Build output - Creating jdk.internal.le.jmod Creating jdk.internal.opt.jmod Creating jdk.internal.vm.ci.jmod Creating jdk.internal.vm.compiler.jmod Creating jdk.internal.vm.compiler.management.jmod Creating jdk.jartool.jmod Creating jdk.javadoc.jmod Creating jdk.jcmd.jmod Creating jdk.jconsole.jmod Creating jdk.jdeps.jmod Creating jdk.jdi.jmod Creating jdk.jdwp.agent.jmod Creating jdk.jfr.jmod Creating interim java.base.jmod Creating interim java.logging.jmod Creating jdk.jshell.jmod Creating jdk.jsobject.jmod Creating jdk.jstatd.jmod Creating jdk.localedata.jmod Creating jdk.management.jmod Creating jdk.management.agent.jmod Creating jdk.management.jfr.jmod Creating jdk.naming.dns.jmod Creating jdk.naming.rmi.jmod Creating jdk.net.jmod Creating jdk.nio.mapmode.jmod Creating jdk.sctp.jmod Creating jdk.security.auth.jmod Creating jdk.security.jgss.jmod Creating jdk.unsupported.jmod Creating jdk.unsupported.desktop.jmod Creating jdk.xml.dom.jmod Creating jdk.zipfs.jmod Compiling 3 files for BUILD_DEMO_CodePointIM Updating support/demos/image/jfc/CodePointIM/src.zip Compiling 3 files for BUILD_DEMO_FileChooserDemo Updating support/demos/image/jfc/FileChooserDemo/src.zip Compiling 29 files for BUILD_DEMO_SwingSet2 Updating support/demos/image/jfc/SwingSet2/src.zip Compiling 3 files for BUILD_DEMO_Font2DTest Updating support/demos/image/jfc/Font2DTest/src.zip Compiling 64 files for BUILD_DEMO_J2Ddemo Updating support/demos/image/jfc/J2Ddemo/src.zip Compiling 15 files for BUILD_DEMO_Metalworks Updating support/demos/image/jfc/Metalworks/src.zip Compiling 2 files for BUILD_DEMO_Notepad Updating support/demos/image/jfc/Notepad/src.zip Compiling 5 files for BUILD_DEMO_Stylepad Updating support/demos/image/jfc/Stylepad/src.zip Compiling 5 files for BUILD_DEMO_SampleTree Updating support/demos/image/jfc/SampleTree/src.zip Compiling 8 files for BUILD_DEMO_TableExample Updating support/demos/image/jfc/TableExample/src.zip Compiling 1 files for BUILD_DEMO_TransparentRuler Updating support/demos/image/jfc/TransparentRuler/src.zip Creating support/demos/image/jfc/CodePointIM/CodePointIM.jar Creating support/demos/image/jfc/FileChooserDemo/FileChooserDemo.jar Creating support/demos/image/jfc/SwingSet2/SwingSet2.jar [0.045s][error][cds] Unable to map CDS archive -- os::vm_allocation_granularity() expected: 65536 actual: 4096 [0.039s][error][cds] Unable to map CDS archive -- os::vm_allocation_granularity() expected: 65536 actual: 4096 [0.039s][error][cds] Unable to map CDS archive -- os::vm_allocation_granularity() expected: 65536 actual: 4096 Creating support/demos/image/jfc/Font2DTest/Font2DTest.jar [0.011s][error][cds] Unable to map CDS archive -- os::vm_allocation_granularity() expected: 65536 actual: 4096 [0.055s][error][cds] Unable to map CDS archive -- os::vm_allocation_granularity() expected: 65536 actual: 4096 [0.008s][error][cds] Unable to map CDS archive -- os::vm_allocation_granularity() expected: 65536 actual: 4096 [0.006s][error][cds] Unable to map CDS archive -- os::vm_allocation_granularity() expected: 65536 actual: 4096 [0.007s][error][cds] Unable to map CDS archive -- os::vm_allocation_granularity() expected: 65536 actual: 4096 Creating support/demos/image/jfc/J2Ddemo/J2Ddemo.jar Creating support/demos/image/jfc/Metalworks/Metalworks.jar [0.007s][error][cds] Unable to map CDS archive -- os::vm_allocation_granularity() expected: 65536 actual: 4096 [0.011s][error][cds] Unable to map CDS archive -- os::vm_allocation_granularity() expected: 65536 actual: 4096 Creating support/demos/image/jfc/Notepad/Notepad.jar Creating support/demos/image/jfc/Stylepad/Stylepad.jar [0.040s][error][cds] Unable to map CDS archive -- os::vm_allocation_granularity() expected: 65536 actual: 4096 [0.043s][error][cds] Unable to map CDS archive -- os::vm_allocation_granularity() expected: 65536 actual: 4096 [0.008s][error][cds] Unable to map CDS archive -- os::vm_allocation_granularity() expected: 65536 actual: 4096 [0.008s][error][cds] Unable to map CDS archive -- os::vm_allocation_granularity() expected: 65536 actual: 4096 [0.011s][error][cds] Unable to map CDS archive -- os::vm_allocation_granularity() expected: 65536 actual: 4096 [0.007s][error][cds] Unable to map CDS archive -- os::vm_allocation_granularity() expected: 65536 actual: 4096 Creating support/demos/image/jfc/SampleTree/SampleTree.jar [0.007s][error][cds] Unable to map CDS archive -- os::vm_allocation_granularity() expected: 65536 actual: 4096 Creating support/demos/image/jfc/TableExample/TableExample.jar [0.015s][error][cds] Unable to map CDS archive -- os::vm_allocation_granularity() expected: 65536 actual: 4096 Creating support/demos/image/jfc/TransparentRuler/TransparentRuler.jar [0.007s][error][cds] Unable to map CDS archive -- os::vm_allocation_granularity() expected: 65536 actual: 4096 [0.006s][error][cds] Unable to map CDS archive -- os::vm_allocation_granularity() expected: 65536 actual: 4096 [0.025s][error][cds] Unable to map CDS archive -- os::vm_allocation_granularity() expected: 65536 actual: 4096 [0.049s][error][cds] Unable to map CDS archive -- os::vm_allocation_granularity() expected: 65536 actual: 4096 Creating interim jimage Compiling 1 files for CLASSLIST_JAR Creating support/classlist.jar [0.071s][error][cds] Unable to map CDS archive -- os::vm_allocation_granularity() expected: 65536 actual: 4096 [0.057s][error][cds] Unable to map CDS archive -- os::vm_allocation_granularity() expected: 65536 actual: 4096 Creating jdk.jlink.jmod Creating java.base.jmod Creating jdk image Creating CDS archive for jdk image Creating CDS-NOCOOPS archive for jdk image Stopping sjavac server Finished building target 'images' in configuration '/home/buildslave/workspace/jdkX-ci-build/build' From aph at redhat.com Tue Sep 1 07:52:03 2020 From: aph at redhat.com (Andrew Haley) Date: Tue, 1 Sep 2020 08:52:03 +0100 Subject: [aarch64-port-dev ] RFR: 8252204: AArch64: Implement SHA3 accelerator/intrinsic In-Reply-To: References: <1729f1b1-056d-76c9-c820-d38bd6c1235d@redhat.com> Message-ID: On 31/08/2020 10:46, Yangfei (Felix) wrote: > >> -----Original Message----- >> From: Andrew Haley [mailto:aph at redhat.com] >> Sent: Monday, August 31, 2020 4:41 PM >> On 31/08/2020 07:50, Yangfei (Felix) wrote: >>> >> >> This looks like a direct copy of the sha3-cecore.S file.You'll need Linaro to >> contribute it. I don't imagine they'll have any problem with that: they are >> OCA signatories > >> Also, given that we've got the assembly source file, why not just copy that >> into OpenJDK? I can't see the point rewriting it into the HotSpot assembler. > > Actually, we referenced the existing intrinsics implementation and > took a similar way. It looks strange to have one intrinsic that goes > differently. And we won't be able to emit this code on demand if we > go that different way. Some cpu does not support these special sha3 > instructions and thus does need this code at all. I think that's > one advantage of using a stub. OK. But you'll still need Linaro to contribute it to OpenJDK. We could ask Stuart to help with that. -- Andrew Haley (he/him) Java Platform Lead Engineer Red Hat UK Ltd. https://keybase.io/andrewhaley EAC8 43EB D3EF DB98 CC77 2FAD A5CD 6035 332F A671 From sgehwolf at redhat.com Tue Sep 1 08:49:52 2020 From: sgehwolf at redhat.com (Severin Gehwolf) Date: Tue, 01 Sep 2020 10:49:52 +0200 Subject: [aarch64-port-dev ] A binary download for aarch64. In-Reply-To: <17F1A584-2B04-49AF-B846-F76F56D48B59@kvernes.no> References: <17F1A584-2B04-49AF-B846-F76F56D48B59@kvernes.no> Message-ID: <67f690617c2940ecc0c3c1afaecc569ace814ade.camel@redhat.com> On Mon, 2020-08-31 at 20:15 +0200, Terje Kvernes wrote: > Dear all, > > I am currently working on expanding EasyBuilds[1] support for ARM in the HPC space. One of the hurdles I have come across is that EasyBuild on both x86_64 and POWER install OpenJDK as a binary. On x86_64 this is done by fetching and installing https://download.java.net/java/GA/jdk11/9/GPL/openjdk-11.0.2_linux-x64_bin.tar.gz ;, linked from https://jdk.java.net/archive/ ;. > > Now, I have been unable to find a similar service for aarch64, and I was hoping I had simply missed something. Is there such a binary available for aarch64? > We provide JDK 11 aarch64 vanilla OpenJDK builds here: https://adoptopenjdk.net/upstream.html?variant=openjdk11&ga=ga That's the closest equivalent (for OpenJDK 11u) to what Oracle does with jdk.java.net for more recent JDKs. Unfortunately, there are no vanilla OpenJDK 8u binaries for Aarch64 as the port landed in mainline JDK with the release of JDK 9. So any downstream builders would have to build from the aarch64-port 8u tree. There are a variety of downstream builds of OpenJDK 8u aarch64 which would suit your needs. For example the ones from AdoptOpenJDK (or Eclipse Adoptium) here: https://adoptopenjdk.net/releases.html?variant=openjdk8&jvmVariant=hotspot Note the two links are not the same. The former are upstream builds, the latter is a downstream curation of OpenJDK. Depending on what you need both might work. HTH, Severin > > [1] https://easybuild.readthedocs.io/en/latest/ > > From stuart.monteith at arm.com Tue Sep 1 08:59:51 2020 From: stuart.monteith at arm.com (Stuart Monteith) Date: Tue, 1 Sep 2020 09:59:51 +0100 Subject: [aarch64-port-dev ] RFR: 8252204: AArch64: Implement SHA3 accelerator/intrinsic In-Reply-To: References: <1729f1b1-056d-76c9-c820-d38bd6c1235d@redhat.com> Message-ID: <6bf14122-c904-5da8-3f75-76cd92ed2a62@arm.com> On 01/09/2020 08:52, Andrew Haley wrote: > On 31/08/2020 10:46, Yangfei (Felix) wrote: >> >>> -----Original Message----- >>> From: Andrew Haley [mailto:aph at redhat.com] >>> Sent: Monday, August 31, 2020 4:41 PM >>> On 31/08/2020 07:50, Yangfei (Felix) wrote: >>>> >>> >>> This looks like a direct copy of the sha3-cecore.S file.You'll need Linaro to >>> contribute it. I don't imagine they'll have any problem with that: they are >>> OCA signatories >> >>> Also, given that we've got the assembly source file, why not just copy that >>> into OpenJDK? I can't see the point rewriting it into the HotSpot assembler. >> >> Actually, we referenced the existing intrinsics implementation and >> took a similar way. It looks strange to have one intrinsic that goes >> differently. And we won't be able to emit this code on demand if we >> go that different way. Some cpu does not support these special sha3 >> instructions and thus does need this code at all. I think that's >> one advantage of using a stub. > > OK. But you'll still need Linaro to contribute it to OpenJDK. We could > ask Stuart to help with that. > Hello, I'll see what I can do - I'll establish who'll be able to help you with this. The original contributor works for Arm now. BR, Stuart From felix.yang at huawei.com Tue Sep 1 10:53:12 2020 From: felix.yang at huawei.com (Yangfei (Felix)) Date: Tue, 1 Sep 2020 10:53:12 +0000 Subject: [aarch64-port-dev ] RFR: 8252204: AArch64: Implement SHA3 accelerator/intrinsic In-Reply-To: References: <1729f1b1-056d-76c9-c820-d38bd6c1235d@redhat.com> Message-ID: Hi, > -----Original Message----- > From: Andrew Haley [mailto:aph at redhat.com] > Sent: Tuesday, September 1, 2020 3:52 PM > To: Yangfei (Felix) ; hotspot-compiler- > dev at openjdk.java.net; core-libs-dev at openjdk.java.net > Cc: aarch64-port-dev at openjdk.java.net; Stuart Monteith > > Subject: Re: [aarch64-port-dev ] RFR: 8252204: AArch64: Implement SHA3 > accelerator/intrinsic > > On 31/08/2020 10:46, Yangfei (Felix) wrote: > > > >> -----Original Message----- > >> From: Andrew Haley [mailto:aph at redhat.com] > >> Sent: Monday, August 31, 2020 4:41 PM On 31/08/2020 07:50, Yangfei > >> (Felix) wrote: > >>> > >> > >> This looks like a direct copy of the sha3-cecore.S file.You'll need > >> Linaro to contribute it. I don't imagine they'll have any problem > >> with that: they are OCA signatories > > > >> Also, given that we've got the assembly source file, why not just > >> copy that into OpenJDK? I can't see the point rewriting it into the HotSpot > assembler. > > > > Actually, we referenced the existing intrinsics implementation and > > took a similar way. It looks strange to have one intrinsic that goes > > differently. And we won't be able to emit this code on demand if we > > go that different way. Some cpu does not support these special sha3 > > instructions and thus does need this code at all. I think that's one > > advantage of using a stub. > > OK. But you'll still need Linaro to contribute it to OpenJDK. We could ask > Stuart to help with that. Sure, I am happy if the original author of the assembly code or someone else from Linaro could help here. I wasn't aware there was such an requirement here given that assembly code is licensed under GPL. Should we separate the patch into two parts: changes for the shared code part and the aarch64 port-specific changes? Thanks, Felix From dalibor.topic at oracle.com Tue Sep 1 13:06:42 2020 From: dalibor.topic at oracle.com (Dalibor Topic) Date: Tue, 1 Sep 2020 15:06:42 +0200 Subject: [aarch64-port-dev ] A binary download for aarch64. In-Reply-To: <17F1A584-2B04-49AF-B846-F76F56D48B59@kvernes.no> References: <17F1A584-2B04-49AF-B846-F76F56D48B59@kvernes.no> Message-ID: Hi Terje, you can find Early Access builds of JDK 15 for Aarch64 at https://jdk.java.net/15/ . cheers, dalibor topic On 31.08.2020 20:15, Terje Kvernes wrote: > Dear all, > > I am currently working on expanding EasyBuilds[1] support for ARM in the HPC space. One of the hurdles I have come across is that EasyBuild on both x86_64 and POWER install OpenJDK as a binary. On x86_64 this is done by fetching and installing https://download.java.net/java/GA/jdk11/9/GPL/openjdk-11.0.2_linux-x64_bin.tar.gz , linked from https://jdk.java.net/archive/ . > > Now, I have been unable to find a similar service for aarch64, and I was hoping I had simply missed something. Is there such a binary available for aarch64? > > > > [1] https://easybuild.readthedocs.io/en/latest/ > > -- Dalibor Topic Consulting Product Manager Phone: +494089091214 , Mobile: +491737185961 , Video: dalibor.topic at oracle.com Oracle Global Services Germany GmbH Hauptverwaltung: Riesstr. 25, D-80992 M?nchen Registergericht: Amtsgericht M?nchen, HRB 246209 Gesch?ftsf?hrer: Ralf Herrmann From aph at redhat.com Tue Sep 1 14:44:07 2020 From: aph at redhat.com (Andrew Haley) Date: Tue, 1 Sep 2020 15:44:07 +0100 Subject: [aarch64-port-dev ] RFR: 8252204: AArch64: Implement SHA3 accelerator/intrinsic In-Reply-To: References: <1729f1b1-056d-76c9-c820-d38bd6c1235d@redhat.com> Message-ID: <95965aeb-9d97-3b27-e684-967b6155eb34@redhat.com> On 01/09/2020 11:53, Yangfei (Felix) wrote: > Sure, I am happy if the original author of the assembly code or someone else from Linaro could help here. > I wasn't aware there was such an requirement here given that assembly code is licensed under GPL. There sure is. All code must be contributed by its owner and put on the cr.openjdk site. Especially GPL code. > Should we separate the patch into two parts: changes for the shared code part and the aarch64 port-specific changes? I think not. -- Andrew Haley (he/him) Java Platform Lead Engineer Red Hat UK Ltd. https://keybase.io/andrewhaley EAC8 43EB D3EF DB98 CC77 2FAD A5CD 6035 332F A671 From aph at redhat.com Tue Sep 1 15:48:02 2020 From: aph at redhat.com (Andrew Haley) Date: Tue, 1 Sep 2020 16:48:02 +0100 Subject: [aarch64-port-dev ] [16] RFR(S): 8251525: AARCH64: Faster Math.signum(fp) In-Reply-To: <0cca5c0c-9240-3a9f-98f0-519384ea69cb@bell-sw.com> References: <4b0176e2-317b-8fa2-1409-0f77be3f41c3@redhat.com> <67e67230-cac7-d940-1cca-6ab4e8cba8d4@redhat.com> <9e792a33-4f90-8829-2f7b-158d07d3fd15@bell-sw.com> <0cca5c0c-9240-3a9f-98f0-519384ea69cb@bell-sw.com> Message-ID: <11530b87-8124-19ca-936b-16dec5994411@redhat.com> On 31/08/2020 15:28, Dmitry Chuyko wrote: > Here is another version of intrinsics. It is an extension of webrev.03. > Additional thing is that constants 0 and 1 that are used internally by > intrinics are constructed as nodes. This is somehow similar to what is > done for passing pointers to tables. > > webrev: http://cr.openjdk.java.net/~dchuyko/8251525/webrev.04/ > results: > http://cr.openjdk.java.net/~dchuyko/8251525/webrev.04/benchmarks/signum-facgt_ir-copysign.ods Hi, Thank you. That certainly looks better. It's unfortunate that signum doesn't help in all cases, but I'm happy that we have something positive in general. Certainly the code looks nice. I'm still rather baffled that an intrinsification of copySign actually makes things much worse on blackhole on Neoverse N1, but it doesn't really matter because the copySign intrinsic isn't enabled by default. So please go ahead with this version. Having said all of that, it's a fairly minor improvement for some considerable complexity. And it depends terribly on the micorarchitecture of a particular part, albeit an important one. -- Andrew Haley (he/him) Java Platform Lead Engineer Red Hat UK Ltd. https://keybase.io/andrewhaley EAC8 43EB D3EF DB98 CC77 2FAD A5CD 6035 332F A671 From ningsheng.jian at arm.com Wed Sep 2 06:40:59 2020 From: ningsheng.jian at arm.com (Ningsheng Jian) Date: Wed, 2 Sep 2020 14:40:59 +0800 Subject: [aarch64-port-dev ] RFR(L): 8231441: AArch64: Initial SVE backend support In-Reply-To: References: <42fca25d-7172-b4f3-335b-92e2b05e8195@arm.com> <707df21c-849d-ac9d-0ab2-61a30d1354f9@arm.com> <2df4a73f-7e84-87f1-6b2f-1ed6b45bbc27@redhat.com> <8bc0d357-07e7-ae55-b7b2-23ec54ea3e6a@arm.com> <50271ba1-cc78-a325-aed5-2fc468084515@arm.com> <66a9812d-256d-d8ef-d435-3a18daa6bb1e@redhat.com> Message-ID: <39965f4d-af53-524c-36db-917509b2198f@arm.com> Hi, Thanks a lot for the reviews! I think I have addressed the review comments from Andrew, Vladimir and Erik. This is the new webrev: Full: http://cr.openjdk.java.net/~njian/8231441/webrev.05/ Incremental: http://cr.openjdk.java.net/~njian/8231441/webrev.05-vs-04/ Tests: Tested with jtreg hotspot_all_no_apps, jdk_core and langtools:tier1 on AArch64 systems with and without SVE as well as some x86_64 systems. Mach5 submit test also reported passed. Could you please help to take a look again? OK for jdk/jdk? Thanks, Ningsheng On 8/19/20 5:53 PM, Ningsheng Jian wrote: > Hi Andrew, > > I have updated the patch based on the review comments. Would you mind > taking another look? Thanks! > > Full: > http://cr.openjdk.java.net/~njian/8231441/webrev.04/ > > Incremental: > http://cr.openjdk.java.net/~njian/8231441/webrev.04-vs-03/ > > Also add build-dev, as there's a makefile change. > > And the split parts: > > 1) SVE feature detection: > http://cr.openjdk.java.net/~njian/8231441/webrev.04-feature > > 2) c2 register allocation: > http://cr.openjdk.java.net/~njian/8231441/webrev.04-ra > > 3) SVE c2 backend: > http://cr.openjdk.java.net/~njian/8231441/webrev.04-c2 > > Bug: https://bugs.openjdk.java.net/browse/JDK-8231441 > CSR: https://bugs.openjdk.java.net/browse/JDK-8248742 > From dmitry.chuyko at bell-sw.com Wed Sep 2 10:01:13 2020 From: dmitry.chuyko at bell-sw.com (Dmitry Chuyko) Date: Wed, 2 Sep 2020 13:01:13 +0300 Subject: [aarch64-port-dev ] [16] RFR(S): 8251525: AARCH64: Faster Math.signum(fp) In-Reply-To: <11530b87-8124-19ca-936b-16dec5994411@redhat.com> References: <4b0176e2-317b-8fa2-1409-0f77be3f41c3@redhat.com> <67e67230-cac7-d940-1cca-6ab4e8cba8d4@redhat.com> <9e792a33-4f90-8829-2f7b-158d07d3fd15@bell-sw.com> <0cca5c0c-9240-3a9f-98f0-519384ea69cb@bell-sw.com> <11530b87-8124-19ca-936b-16dec5994411@redhat.com> Message-ID: Andrew, thank you very much for the review. Vladimir Ivanov pointed that constructed nested nodes must be introduced to gvn, otherwise there is potentially a violated assert. Here is an updated change with correct creation of constant nodes and a few minor cleanups: http://cr.openjdk.java.net/~dchuyko/8251525/webrev.05/ -Dmitry On 9/1/20 6:48 PM, Andrew Haley wrote: > On 31/08/2020 15:28, Dmitry Chuyko wrote: >> Here is another version of intrinsics. It is an extension of webrev.03. >> Additional thing is that constants 0 and 1 that are used internally by >> intrinics are constructed as nodes. This is somehow similar to what is >> done for passing pointers to tables. >> >> webrev: http://cr.openjdk.java.net/~dchuyko/8251525/webrev.04/ >> results: >> http://cr.openjdk.java.net/~dchuyko/8251525/webrev.04/benchmarks/signum-facgt_ir-copysign.ods > Hi, > > Thank you. That certainly looks better. > > It's unfortunate that signum doesn't help in all cases, but I'm happy > that we have something positive in general. Certainly the code looks > nice. I'm still rather baffled that an intrinsification of copySign > actually makes things much worse on blackhole on Neoverse N1, but it > doesn't really matter because the copySign intrinsic isn't enabled by > default. So please go ahead with this version. > > Having said all of that, it's a fairly minor improvement for some > considerable complexity. And it depends terribly on the > micorarchitecture of a particular part, albeit an important one. > From patric.hedlin at oracle.com Wed Sep 2 12:22:34 2020 From: patric.hedlin at oracle.com (Patric Hedlin) Date: Wed, 2 Sep 2020 14:22:34 +0200 Subject: [aarch64-port-dev ] [16]RFR(S):8249092:InternalError: a fault occurred in a recent unsafe memory access operation in compiled Java code In-Reply-To: <90fda75f-62f9-4d96-b434-6dc15a5537af.zhuoren.wz@alibaba-inc.com> References: <90fda75f-62f9-4d96-b434-6dc15a5537af.zhuoren.wz@alibaba-inc.com> Message-ID: <82b0f0e3-b782-00d5-a778-264fa1e64eda@oracle.com> Hi Zhuoren, I don't actually know what behaviour to expect from the Unsafe atomics in this test-case but perhaps you could re-cap the original problem (addressed in JDK-8246051) since it seems to raise some questions. Did you have an example (real code) where this behaviour is essential? Best regards, Patric Hedlin (Including hotspot-runtime-dev at openjdk.java.net) On 2020-09-01 07:35, Wang Zhuo(Zhuoren) wrote: > Hi, this is a fix for a test case. > In -Xcomp mode, compiler/unsafe/TestUnsafeUnalignedSwap.java will fail > because the catch misses the error due to async exception. > This patch uses a loop to make sure the error can be caught. Also > -Xcomp is added in test. > BUG: https://bugs.openjdk.java.net/browse/JDK-8249092 > Patch: http://cr.openjdk.java.net/~wzhuo/8249092/webrev.00/ > > > Regards, > Zhuoren > From adinn at redhat.com Wed Sep 2 13:58:38 2020 From: adinn at redhat.com (Andrew Dinn) Date: Wed, 2 Sep 2020 14:58:38 +0100 Subject: [aarch64-port-dev ] RFR(L): 8231441: AArch64: Initial SVE backend support In-Reply-To: <39965f4d-af53-524c-36db-917509b2198f@arm.com> References: <42fca25d-7172-b4f3-335b-92e2b05e8195@arm.com> <707df21c-849d-ac9d-0ab2-61a30d1354f9@arm.com> <2df4a73f-7e84-87f1-6b2f-1ed6b45bbc27@redhat.com> <8bc0d357-07e7-ae55-b7b2-23ec54ea3e6a@arm.com> <50271ba1-cc78-a325-aed5-2fc468084515@arm.com> <66a9812d-256d-d8ef-d435-3a18daa6bb1e@redhat.com> <39965f4d-af53-524c-36db-917509b2198f@arm.com> Message-ID: Hi Ningsheng, On 02/09/2020 07:40, Ningsheng Jian wrote: > Thanks a lot for the reviews! I think I have addressed the review > comments from Andrew, Vladimir and Erik. This is the new webrev: > > Full: > http://cr.openjdk.java.net/~njian/8231441/webrev.05/ > > Incremental: > http://cr.openjdk.java.net/~njian/8231441/webrev.05-vs-04/ > > Tests: > Tested with jtreg hotspot_all_no_apps, jdk_core and langtools:tier1 on > AArch64 systems with and without SVE as well as some x86_64 systems. > Mach5 submit test also reported passed. > > Could you please help to take a look again? OK for jdk/jdk? That looks good to me. regards, Andrew Dinn ----------- Red Hat Distinguished Engineer Red Hat UK Ltd Registered in England and Wales under Company Registration No. 03798903 Directors: Michael Cunningham, Michael ("Mike") O'Neill From aph at redhat.com Wed Sep 2 16:07:58 2020 From: aph at redhat.com (Andrew Haley) Date: Wed, 2 Sep 2020 17:07:58 +0100 Subject: [aarch64-port-dev ] [16] RFR(S): 8251525: AARCH64: Faster Math.signum(fp) In-Reply-To: References: <4b0176e2-317b-8fa2-1409-0f77be3f41c3@redhat.com> <67e67230-cac7-d940-1cca-6ab4e8cba8d4@redhat.com> <9e792a33-4f90-8829-2f7b-158d07d3fd15@bell-sw.com> <0cca5c0c-9240-3a9f-98f0-519384ea69cb@bell-sw.com> <11530b87-8124-19ca-936b-16dec5994411@redhat.com> Message-ID: <9b14a8bc-b4a1-ec74-d86b-1204a9831dfa@redhat.com> On 02/09/2020 11:01, Dmitry Chuyko wrote: > Vladimir Ivanov pointed that constructed nested nodes must be introduced > to gvn, otherwise there is potentially a violated assert. Here is an > updated change with correct creation of constant nodes and a few minor > cleanups: > > http://cr.openjdk.java.net/~dchuyko/8251525/webrev.05/ Oh, good catch. Thanks. -- Andrew Haley (he/him) Java Platform Lead Engineer Red Hat UK Ltd. https://keybase.io/andrewhaley EAC8 43EB D3EF DB98 CC77 2FAD A5CD 6035 332F A671 From vladimir.x.ivanov at oracle.com Wed Sep 2 17:40:54 2020 From: vladimir.x.ivanov at oracle.com (Vladimir Ivanov) Date: Wed, 2 Sep 2020 20:40:54 +0300 Subject: [aarch64-port-dev ] [16] RFR(S): 8251525: AARCH64: Faster Math.signum(fp) In-Reply-To: References: <4b0176e2-317b-8fa2-1409-0f77be3f41c3@redhat.com> <67e67230-cac7-d940-1cca-6ab4e8cba8d4@redhat.com> <9e792a33-4f90-8829-2f7b-158d07d3fd15@bell-sw.com> <0cca5c0c-9240-3a9f-98f0-519384ea69cb@bell-sw.com> <11530b87-8124-19ca-936b-16dec5994411@redhat.com> Message-ID: > http://cr.openjdk.java.net/~dchuyko/8251525/webrev.05/ Overall, shared code changes look fine. src/hotspot/share/opto/intrinsicnode.cpp: +//------------------------------CopySign----------------------------------------- +CopySignDNode* CopySignDNode::make(PhaseGVN& gvn, Node* in1, Node* in2) { + return new CopySignDNode(in1, in2, gvn.makecon(TypeD::ZERO)); +} + +//------------------------------Signum------------------------------------------- +SignumDNode* SignumDNode::make(PhaseGVN& gvn, Node* in) { + return new SignumDNode(in, gvn.makecon(TypeD::ZERO), gvn.makecon(TypeD::ONE)); +} + +SignumFNode* SignumFNode::make(PhaseGVN& gvn, Node* in) { + return new SignumFNode(in, gvn.makecon(TypeF::ZERO), gvn.makecon(TypeF::ONE)); +} Putting auxiliary constants on ideal nodes doesn't look right (platform-specific implementation details leaking into shared code), but possible alternatives are much uglier. C2 doesn't rematerialize FP constants on AArch64, so code quality benefits from sharing ConF/ConD nodes. Introducing "constants as TEMPs" support in Matcher (insert constants as additional inputs during matching) seems the best option, but it is not implemented yet. (Something to consider as a separate enhancement.) Best regards, Vladimir Ivanov > On 9/1/20 6:48 PM, Andrew Haley wrote: >> On 31/08/2020 15:28, Dmitry Chuyko wrote: >>> Here is another version of intrinsics. It is an extension of webrev.03. >>> Additional thing is that constants 0 and 1 that are used internally by >>> intrinics are constructed as nodes. This is somehow similar to what is >>> done for passing pointers to tables. >>> >>> webrev: http://cr.openjdk.java.net/~dchuyko/8251525/webrev.04/ >>> results: >>> http://cr.openjdk.java.net/~dchuyko/8251525/webrev.04/benchmarks/signum-facgt_ir-copysign.ods >>> >> Hi, >> >> Thank you. That certainly looks better. >> >> It's unfortunate that signum doesn't help in all cases, but I'm happy >> that we have something positive in general. Certainly the code looks >> nice. I'm still rather baffled that an intrinsification of copySign >> actually makes things much worse on blackhole on Neoverse N1, but it >> doesn't really matter because the copySign intrinsic isn't enabled by >> default. So please go ahead with this version. >> >> Having said all of that, it's a fairly minor improvement for some >> considerable complexity. And it depends terribly on the >> micorarchitecture of a particular part, albeit an important one. >> From zhuoren.wz at alibaba-inc.com Thu Sep 3 02:07:50 2020 From: zhuoren.wz at alibaba-inc.com (=?UTF-8?B?V2FuZyBaaHVvKFpodW9yZW4p?=) Date: Thu, 03 Sep 2020 10:07:50 +0800 Subject: [aarch64-port-dev ] =?utf-8?b?WzE2XVJGUihTKTo4MjQ5MDkyOkludGVy?= =?utf-8?q?nalError=3A_a_fault_occurred_in_a_recent_unsafe_memory_access_o?= =?utf-8?q?peration_in_compiled_Java_code?= In-Reply-To: <82b0f0e3-b782-00d5-a778-264fa1e64eda@oracle.com> References: <90fda75f-62f9-4d96-b434-6dc15a5537af.zhuoren.wz@alibaba-inc.com>, <82b0f0e3-b782-00d5-a778-264fa1e64eda@oracle.com> Message-ID: <05967ec2-ec8e-48f3-bd03-09d29dbcfbba.zhuoren.wz@alibaba-inc.com> Hi Patric, The original problem(https://bugs.openjdk.java.net/browse/JDK-8246051) is architecture specific. When running TestUnsafeUnalignedSwap.java on aarch64 platforms, JVM crashes without the fix because aarch64 does not support unaligned compare_and_swap. On X86 platforms the crash cannot be reproduced because X86 support unaligned compare_and_swap. Regards, Zhuoren ------------------------------------------------------------------ From:Patric Hedlin Sent At:2020 Sep. 2 (Wed.) 20:22 To:Sandler ; aarch64-port-dev ; hotspot-runtime-dev Cc:david.holmes ; rahul.v.raghavan Subject:Re: [16]RFR(S):8249092:InternalError: a fault occurred in a recent unsafe memory access operation in compiled Java code Hi Zhuoren, I don't actually know what behaviour to expect from the Unsafe atomics in this test-case but perhaps you could re-cap the original problem (addressed in JDK-8246051) since it seems to raise some questions. Did you have an example (real code) where this behaviour is essential? Best regards, Patric Hedlin (Including hotspot-runtime-dev at openjdk.java.net) On 2020-09-01 07:35, Wang Zhuo(Zhuoren) wrote: Hi, this is a fix for a test case. In -Xcomp mode, compiler/unsafe/TestUnsafeUnalignedSwap.java will fail because the catch misses the error due to async exception. This patch uses a loop to make sure the error can be caught. Also -Xcomp is added in test. BUG: https://bugs.openjdk.java.net/browse/JDK-8249092 Patch: http://cr.openjdk.java.net/~wzhuo/8249092/webrev.00/ Regards, Zhuoren From david.holmes at oracle.com Thu Sep 3 02:57:50 2020 From: david.holmes at oracle.com (David Holmes) Date: Thu, 3 Sep 2020 12:57:50 +1000 Subject: [aarch64-port-dev ] [16]RFR(S):8249092:InternalError: a fault occurred in a recent unsafe memory access operation in compiled Java code In-Reply-To: <05967ec2-ec8e-48f3-bd03-09d29dbcfbba.zhuoren.wz@alibaba-inc.com> References: <90fda75f-62f9-4d96-b434-6dc15a5537af.zhuoren.wz@alibaba-inc.com> <82b0f0e3-b782-00d5-a778-264fa1e64eda@oracle.com> <05967ec2-ec8e-48f3-bd03-09d29dbcfbba.zhuoren.wz@alibaba-inc.com> Message-ID: Hi, On 3/09/2020 12:07 pm, Wang Zhuo(Zhuoren) wrote: > Hi Patric, > The original problem(https://bugs.openjdk.java.net/browse/JDK-8246051) > is architecture?specific. When running TestUnsafeUnalignedSwap.java on > aarch64 platforms, JVM crashes without the fix because aarch64 does not > support unaligned compare_and_swap. On X86 platforms the crash cannot be > reproduced because X86 support unaligned compare_and_swap. Patric is asking about the original situation where an unaligned CAS was performed, which motivated the change made by JDK-8246051. The GuardUnsafeAccess mechanism (or more specifically the signal handling tricks underneath it) was not intended for general use, but was specifically created to deal with the case of page faults related to mapped ByteBuffers where we wanted application code using JDK exported APIs to get an InternalError when they did the wrong thing with their mapped files, instead of crashing. No part of the JDK should be calling Unsafe.compareAndSwap* with unaligned data - if it does that is a bug. If third-party code is using Unsafe directly then that is their problem and we do not try to make things easier for them. The use of GuardUnsafeAccess with the CAS primitives on some platforms can result in an infinite loop as the mechanism cannot be applied to arbitrary code sequences. Somewhat ironically Aarch64 is one platform that can suffer from this. Cheers, David ----- > > Regards, > Zhuoren > > ------------------------------------------------------------------ > From:Patric Hedlin > Sent At:2020 Sep. 2 (Wed.) 20:22 > To:Sandler ; aarch64-port-dev > ; hotspot-runtime-dev > > Cc:david.holmes ; rahul.v.raghavan > > Subject:Re: [16]RFR(S):8249092:InternalError: a fault occurred in a > recent unsafe memory access operation in compiled Java code > > Hi Zhuoren, > > I don't actually know what behaviour to expect from the Unsafe > atomics in this test-case but perhaps you could re-cap the original > problem (addressed in JDK-8246051) since it seems to raise some > questions. Did you have an example (real code) where this behaviour > is essential? > > Best regards, > Patric Hedlin > > (Including hotspot-runtime-dev at openjdk.java.net) > > > On 2020-09-01 07:35, Wang Zhuo(Zhuoren) wrote: > Hi, this is a fix for a test case. > In -Xcomp mode, compiler/unsafe/TestUnsafeUnalignedSwap.java will > fail because the catch misses the error due to async exception. > This patch uses a loop to make sure the error can be caught. Also > -Xcomp is added in test. > BUG: https://bugs.openjdk.java.net/browse/JDK-8249092 > Patch: http://cr.openjdk.java.net/~wzhuo/8249092/webrev.00/ > > > Regards, > Zhuoren > > From ningsheng.jian at arm.com Thu Sep 3 02:58:23 2020 From: ningsheng.jian at arm.com (Ningsheng Jian) Date: Thu, 3 Sep 2020 10:58:23 +0800 Subject: [aarch64-port-dev ] RFR(L): 8231441: AArch64: Initial SVE backend support In-Reply-To: References: <42fca25d-7172-b4f3-335b-92e2b05e8195@arm.com> <707df21c-849d-ac9d-0ab2-61a30d1354f9@arm.com> <2df4a73f-7e84-87f1-6b2f-1ed6b45bbc27@redhat.com> <8bc0d357-07e7-ae55-b7b2-23ec54ea3e6a@arm.com> <50271ba1-cc78-a325-aed5-2fc468084515@arm.com> <66a9812d-256d-d8ef-d435-3a18daa6bb1e@redhat.com> <39965f4d-af53-524c-36db-917509b2198f@arm.com> Message-ID: On 9/2/20 9:58 PM, Andrew Dinn wrote: > Hi Ningsheng, > > On 02/09/2020 07:40, Ningsheng Jian wrote: >> Thanks a lot for the reviews! I think I have addressed the review >> comments from Andrew, Vladimir and Erik. This is the new webrev: >> >> Full: >> http://cr.openjdk.java.net/~njian/8231441/webrev.05/ >> >> Incremental: >> http://cr.openjdk.java.net/~njian/8231441/webrev.05-vs-04/ >> >> Tests: >> Tested with jtreg hotspot_all_no_apps, jdk_core and langtools:tier1 on >> AArch64 systems with and without SVE as well as some x86_64 systems. >> Mach5 submit test also reported passed. >> >> Could you please help to take a look again? OK for jdk/jdk? > That looks good to me. > Thank you Andrew! Regards, Ningsheng From zhuoren.wz at alibaba-inc.com Thu Sep 3 03:49:06 2020 From: zhuoren.wz at alibaba-inc.com (=?UTF-8?B?V2FuZyBaaHVvKFpodW9yZW4p?=) Date: Thu, 03 Sep 2020 11:49:06 +0800 Subject: [aarch64-port-dev ] =?utf-8?b?WzE2XVJGUihTKTo4MjQ5MDkyOkludGVy?= =?utf-8?q?nalError=3A_a_fault_occurred_in_a_recent_unsafe_memory_access_o?= =?utf-8?q?peration_in_compiled_Java_code?= In-Reply-To: References: <90fda75f-62f9-4d96-b434-6dc15a5537af.zhuoren.wz@alibaba-inc.com> <82b0f0e3-b782-00d5-a778-264fa1e64eda@oracle.com> <05967ec2-ec8e-48f3-bd03-09d29dbcfbba.zhuoren.wz@alibaba-inc.com>, Message-ID: <2b2f0d07-c0b2-4e8b-ad2c-fd0046273851.zhuoren.wz@alibaba-inc.com> David, Thank you very much for the explanation. The original crash indeed happened in a third party code using Unsafe to handle unaligned data. So you mean that it is the third party code's bug, we should not fix it in JVM, right? Regards, Zhuoren ------------------------------------------------------------------ From:David Holmes Sent At:2020 Sep. 3 (Thu.) 10:58 To:Sandler ; Patric Hedlin ; aarch64-port-dev ; hotspot-runtime-dev Cc:rahul.v.raghavan Subject:Re: [16]RFR(S):8249092:InternalError: a fault occurred in a recent unsafe memory access operation in compiled Java code Hi, On 3/09/2020 12:07 pm, Wang Zhuo(Zhuoren) wrote: > Hi Patric, > The original problem(https://bugs.openjdk.java.net/browse/JDK-8246051) > is architecture specific. When running TestUnsafeUnalignedSwap.java on > aarch64 platforms, JVM crashes without the fix because aarch64 does not > support unaligned compare_and_swap. On X86 platforms the crash cannot be > reproduced because X86 support unaligned compare_and_swap. Patric is asking about the original situation where an unaligned CAS was performed, which motivated the change made by JDK-8246051. The GuardUnsafeAccess mechanism (or more specifically the signal handling tricks underneath it) was not intended for general use, but was specifically created to deal with the case of page faults related to mapped ByteBuffers where we wanted application code using JDK exported APIs to get an InternalError when they did the wrong thing with their mapped files, instead of crashing. No part of the JDK should be calling Unsafe.compareAndSwap* with unaligned data - if it does that is a bug. If third-party code is using Unsafe directly then that is their problem and we do not try to make things easier for them. The use of GuardUnsafeAccess with the CAS primitives on some platforms can result in an infinite loop as the mechanism cannot be applied to arbitrary code sequences. Somewhat ironically Aarch64 is one platform that can suffer from this. Cheers, David ----- > > Regards, > Zhuoren > > ------------------------------------------------------------------ > From:Patric Hedlin > Sent At:2020 Sep. 2 (Wed.) 20:22 > To:Sandler ; aarch64-port-dev > ; hotspot-runtime-dev > > Cc:david.holmes ; rahul.v.raghavan > > Subject:Re: [16]RFR(S):8249092:InternalError: a fault occurred in a > recent unsafe memory access operation in compiled Java code > > Hi Zhuoren, > > I don't actually know what behaviour to expect from the Unsafe > atomics in this test-case but perhaps you could re-cap the original > problem (addressed in JDK-8246051) since it seems to raise some > questions. Did you have an example (real code) where this behaviour > is essential? > > Best regards, > Patric Hedlin > > (Including hotspot-runtime-dev at openjdk.java.net) > > > On 2020-09-01 07:35, Wang Zhuo(Zhuoren) wrote: > Hi, this is a fix for a test case. > In -Xcomp mode, compiler/unsafe/TestUnsafeUnalignedSwap.java will > fail because the catch misses the error due to async exception. > This patch uses a loop to make sure the error can be caught. Also > -Xcomp is added in test. > BUG: https://bugs.openjdk.java.net/browse/JDK-8249092 > Patch: http://cr.openjdk.java.net/~wzhuo/8249092/webrev.00/ > > > Regards, > Zhuoren > > From david.holmes at oracle.com Thu Sep 3 04:11:46 2020 From: david.holmes at oracle.com (David Holmes) Date: Thu, 3 Sep 2020 14:11:46 +1000 Subject: [aarch64-port-dev ] [16]RFR(S):8249092:InternalError: a fault occurred in a recent unsafe memory access operation in compiled Java code In-Reply-To: <2b2f0d07-c0b2-4e8b-ad2c-fd0046273851.zhuoren.wz@alibaba-inc.com> References: <90fda75f-62f9-4d96-b434-6dc15a5537af.zhuoren.wz@alibaba-inc.com> <82b0f0e3-b782-00d5-a778-264fa1e64eda@oracle.com> <05967ec2-ec8e-48f3-bd03-09d29dbcfbba.zhuoren.wz@alibaba-inc.com> <2b2f0d07-c0b2-4e8b-ad2c-fd0046273851.zhuoren.wz@alibaba-inc.com> Message-ID: On 3/09/2020 1:49 pm, Wang Zhuo(Zhuoren) wrote: > David, Thank you very much for the explanation. > The original crash indeed happened in a third party code using Unsafe to > handle unaligned?data. > So you mean that it is the third party code's bug, we should not fix it > in JVM, right? Right. Unsafe is not a supported API and is by definition unsafe. If you use it and it crashes then you need to change your code. Cheers, David ----- > Regards, > Zhuoren > > ------------------------------------------------------------------ > From:David Holmes > Sent At:2020 Sep. 3 (Thu.) 10:58 > To:Sandler ; Patric Hedlin > ; aarch64-port-dev > ; hotspot-runtime-dev > > Cc:rahul.v.raghavan > Subject:Re: [16]RFR(S):8249092:InternalError: a fault occurred in a > recent unsafe memory access operation in compiled Java code > > Hi, > > On?3/09/2020?12:07?pm,?Wang?Zhuo(Zhuoren)?wrote: > >?Hi?Patric, > >?The?original?problem(https://bugs.openjdk.java.net/browse/JDK-8246051) > >?is?architecture?specific.?When?running?TestUnsafeUnalignedSwap.java?on > >?aarch64?platforms,?JVM?crashes?without?the?fix?because?aarch64?does?not > >?support?unaligned?compare_and_swap.?On?X86?platforms?the?crash?cannot?be > >?reproduced?because?X86?support?unaligned?compare_and_swap. > > Patric?is?asking?about?the?original?situation?where?an?unaligned?CAS?was > > performed,?which?motivated?the?change?made?by?JDK-8246051. > > The?GuardUnsafeAccess?mechanism?(or?more?specifically?the?signal > handling?tricks?underneath?it)?was?not?intended?for?general?use,?but?was > > specifically?created?to?deal?with?the?case?of?page?faults?related?to > mapped?ByteBuffers?where?we?wanted?application?code?using?JDK?exported > APIs?to?get?an?InternalError?when?they?did?the?wrong?thing?with?their > mapped?files,?instead?of?crashing.?No?part?of?the?JDK?should?be?calling > Unsafe.compareAndSwap*?with?unaligned?data?-?if?it?does?that?is?a?bug. > If?third-party?code?is?using?Unsafe?directly?then?that?is?their?problem > and?we?do?not?try?to?make?things?easier?for?them. > > The?use?of?GuardUnsafeAccess?with?the?CAS?primitives?on?some?platforms > can?result?in?an?infinite?loop?as?the?mechanism?cannot?be?applied?to > arbitrary?code?sequences.?Somewhat?ironically?Aarch64?is?one?platform > that?can?suffer?from?this. > > Cheers, > David > ----- > > > > >?Regards, > >?Zhuoren > > > >?????------------------------------------------------------------------ > >?????From:Patric?Hedlin? > >?????Sent?At:2020?Sep.?2?(Wed.)?20:22 > >?????To:Sandler?;?aarch64-port-dev > >?????;?hotspot-runtime-dev > >????? > >?????Cc:david.holmes?;?rahul.v.raghavan > >????? > >?????Subject:Re:?[16]RFR(S):8249092:InternalError:?a?fault?occurred?in?a > >?????recent?unsafe?memory?access?operation?in?compiled?Java?code > > > >?????Hi?Zhuoren, > > > >?????I?don't?actually?know?what?behaviour?to?expect?from?the?Unsafe > >?????atomics?in?this?test-case?but?perhaps?you?could?re-cap?the?original > >?????problem?(addressed?in?JDK-8246051)?since?it?seems?to?raise?some > >?????questions.?Did?you?have?an?example?(real?code)?where?this?behaviour > >?????is?essential? > > > >?????Best?regards, > >?????Patric?Hedlin > > > >?????(Including?hotspot-runtime-dev at openjdk.java.net) > > > > > >?????On?2020-09-01?07:35,?Wang?Zhuo(Zhuoren)?wrote: > >?????Hi,?this?is?a?fix?for?a?test?case. > >?????In?-Xcomp?mode,?compiler/unsafe/TestUnsafeUnalignedSwap.java?will > >?????fail?because?the?catch?misses?the?error?due?to?async?exception. > >?????This?patch?uses?a?loop?to?make?sure?the?error?can?be?caught.?Also > >?????-Xcomp?is?added?in?test. > >?????BUG:?https://bugs.openjdk.java.net/browse/JDK-8249092 > >?????Patch:?http://cr.openjdk.java.net/~wzhuo/8249092/webrev.00/ > > > > > >?????Regards, > >?????Zhuoren > > > > > From zhuoren.wz at alibaba-inc.com Thu Sep 3 05:52:29 2020 From: zhuoren.wz at alibaba-inc.com (=?UTF-8?B?V2FuZyBaaHVvKFpodW9yZW4p?=) Date: Thu, 03 Sep 2020 13:52:29 +0800 Subject: [aarch64-port-dev ] =?utf-8?b?WzE2XVJGUihTKTo4MjQ5MDkyOkludGVy?= =?utf-8?q?nalError=3A_a_fault_occurred_in_a_recent_unsafe_memory_access_o?= =?utf-8?q?peration_in_compiled_Java_code?= In-Reply-To: References: <90fda75f-62f9-4d96-b434-6dc15a5537af.zhuoren.wz@alibaba-inc.com> <82b0f0e3-b782-00d5-a778-264fa1e64eda@oracle.com> <05967ec2-ec8e-48f3-bd03-09d29dbcfbba.zhuoren.wz@alibaba-inc.com> <2b2f0d07-c0b2-4e8b-ad2c-fd0046273851.zhuoren.wz@alibaba-inc.com>, Message-ID: OK, thanks David. > The use of GuardUnsafeAccess with the CAS primitives on some platforms > can result in an infinite loop as the mechanism cannot be applied to > arbitrary code sequences. Do you have a test for this? If the patch for JDK-8246051 indeed causes such problem. I am considering to do reverting or some other modifications. Regards, Zhuoren ------------------------------------------------------------------ From:David Holmes Sent At:2020 Sep. 3 (Thu.) 12:12 To:Sandler ; Patric Hedlin ; aarch64-port-dev ; hotspot-runtime-dev Cc:rahul.v.raghavan Subject:Re: [16]RFR(S):8249092:InternalError: a fault occurred in a recent unsafe memory access operation in compiled Java code On 3/09/2020 1:49 pm, Wang Zhuo(Zhuoren) wrote: > David, Thank you very much for the explanation. > The original crash indeed happened in a third party code using Unsafe to > handle unaligned data. > So you mean that it is the third party code's bug, we should not fix it > in JVM, right? Right. Unsafe is not a supported API and is by definition unsafe. If you use it and it crashes then you need to change your code. Cheers, David ----- > Regards, > Zhuoren > > ------------------------------------------------------------------ > From:David Holmes > Sent At:2020 Sep. 3 (Thu.) 10:58 > To:Sandler ; Patric Hedlin > ; aarch64-port-dev > ; hotspot-runtime-dev > > Cc:rahul.v.raghavan > Subject:Re: [16]RFR(S):8249092:InternalError: a fault occurred in a > recent unsafe memory access operation in compiled Java code > > Hi, > > On 3/09/2020 12:07 pm, Wang Zhuo(Zhuoren) wrote: > > Hi Patric, > > The original problem(https://bugs.openjdk.java.net/browse/JDK-8246051) > > is architecture specific. When running TestUnsafeUnalignedSwap.java on > > aarch64 platforms, JVM crashes without the fix because aarch64 does not > > support unaligned compare_and_swap. On X86 platforms the crash cannot be > > reproduced because X86 support unaligned compare_and_swap. > > Patric is asking about the original situation where an unaligned CAS was > > performed, which motivated the change made by JDK-8246051. > > The GuardUnsafeAccess mechanism (or more specifically the signal > handling tricks underneath it) was not intended for general use, but was > > specifically created to deal with the case of page faults related to > mapped ByteBuffers where we wanted application code using JDK exported > APIs to get an InternalError when they did the wrong thing with their > mapped files, instead of crashing. No part of the JDK should be calling > Unsafe.compareAndSwap* with unaligned data - if it does that is a bug. > If third-party code is using Unsafe directly then that is their problem > and we do not try to make things easier for them. > > The use of GuardUnsafeAccess with the CAS primitives on some platforms > can result in an infinite loop as the mechanism cannot be applied to > arbitrary code sequences. Somewhat ironically Aarch64 is one platform > that can suffer from this. > > Cheers, > David > ----- > > > > > Regards, > > Zhuoren > > > > ------------------------------------------------------------------ > > From:Patric Hedlin > > Sent At:2020 Sep. 2 (Wed.) 20:22 > > To:Sandler ; aarch64-port-dev > > ; hotspot-runtime-dev > > > > Cc:david.holmes ; rahul.v.raghavan > > > > Subject:Re: [16]RFR(S):8249092:InternalError: a fault occurred in a > > recent unsafe memory access operation in compiled Java code > > > > Hi Zhuoren, > > > > I don't actually know what behaviour to expect from the Unsafe > > atomics in this test-case but perhaps you could re-cap the original > > problem (addressed in JDK-8246051) since it seems to raise some > > questions. Did you have an example (real code) where this behaviour > > is essential? > > > > Best regards, > > Patric Hedlin > > > > (Including hotspot-runtime-dev at openjdk.java.net) > > > > > > On 2020-09-01 07:35, Wang Zhuo(Zhuoren) wrote: > > Hi, this is a fix for a test case. > > In -Xcomp mode, compiler/unsafe/TestUnsafeUnalignedSwap.java will > > fail because the catch misses the error due to async exception. > > This patch uses a loop to make sure the error can be caught. Also > > -Xcomp is added in test. > > BUG: https://bugs.openjdk.java.net/browse/JDK-8249092 > > Patch: http://cr.openjdk.java.net/~wzhuo/8249092/webrev.00/ > > > > > > Regards, > > Zhuoren > > > > > From aph at redhat.com Thu Sep 3 08:34:58 2020 From: aph at redhat.com (Andrew Haley) Date: Thu, 3 Sep 2020 09:34:58 +0100 Subject: [aarch64-port-dev ] [16] RFR(S): 8251525: AARCH64: Faster Math.signum(fp) In-Reply-To: References: <4b0176e2-317b-8fa2-1409-0f77be3f41c3@redhat.com> <67e67230-cac7-d940-1cca-6ab4e8cba8d4@redhat.com> <9e792a33-4f90-8829-2f7b-158d07d3fd15@bell-sw.com> <0cca5c0c-9240-3a9f-98f0-519384ea69cb@bell-sw.com> <11530b87-8124-19ca-936b-16dec5994411@redhat.com> Message-ID: On 02/09/2020 18:40, Vladimir Ivanov wrote: > C2 doesn't rematerialize FP constants on AArch64 I think that's probably right, even though a few FP constants are cheap. Loads from L1 usually have a 4 (or 5) cycle latency, which can make spilling constants expensive around calls. We could be smarter about this. -- Andrew Haley (he/him) Java Platform Lead Engineer Red Hat UK Ltd. https://keybase.io/andrewhaley EAC8 43EB D3EF DB98 CC77 2FAD A5CD 6035 332F A671 From aph at redhat.com Thu Sep 3 08:41:32 2020 From: aph at redhat.com (Andrew Haley) Date: Thu, 3 Sep 2020 09:41:32 +0100 Subject: [aarch64-port-dev ] [16]RFR(S):8249092:InternalError: a fault occurred in a recent unsafe memory access operation in compiled Java code In-Reply-To: References: <90fda75f-62f9-4d96-b434-6dc15a5537af.zhuoren.wz@alibaba-inc.com> <82b0f0e3-b782-00d5-a778-264fa1e64eda@oracle.com> <05967ec2-ec8e-48f3-bd03-09d29dbcfbba.zhuoren.wz@alibaba-inc.com> <2b2f0d07-c0b2-4e8b-ad2c-fd0046273851.zhuoren.wz@alibaba-inc.com> Message-ID: <5845a59f-3790-906a-0ea4-fc0e862eb103@redhat.com> On 03/09/2020 05:11, David Holmes wrote: > On 3/09/2020 1:49 pm, Wang Zhuo(Zhuoren) wrote: >> David, Thank you very much for the explanation. >> The original crash indeed happened in a third party code using Unsafe to >> handle unaligned?data. >> So you mean that it is the third party code's bug, we should not fix it >> in JVM, right? > > Right. Unsafe is not a supported API and is by definition unsafe. If you > use it and it crashes then you need to change your code. I agree. I hindsight, I should probably not have approved 8246051. I'm happy that it should be backed out. -- Andrew Haley (he/him) Java Platform Lead Engineer Red Hat UK Ltd. https://keybase.io/andrewhaley EAC8 43EB D3EF DB98 CC77 2FAD A5CD 6035 332F A671 From dmitry.chuyko at bell-sw.com Thu Sep 3 12:03:48 2020 From: dmitry.chuyko at bell-sw.com (Dmitry Chuyko) Date: Thu, 3 Sep 2020 15:03:48 +0300 Subject: [aarch64-port-dev ] [16] RFR(S): 8251525: AARCH64: Faster Math.signum(fp) In-Reply-To: References: <4b0176e2-317b-8fa2-1409-0f77be3f41c3@redhat.com> <67e67230-cac7-d940-1cca-6ab4e8cba8d4@redhat.com> <9e792a33-4f90-8829-2f7b-158d07d3fd15@bell-sw.com> <0cca5c0c-9240-3a9f-98f0-519384ea69cb@bell-sw.com> <11530b87-8124-19ca-936b-16dec5994411@redhat.com> Message-ID: <8cb53861-1c52-2fcb-3e7e-558aa48373c8@bell-sw.com> I pushed the change for signum, and opened an RFE [1] for fp re-materialization on aarch64. We've made some experiments already. On N1 simply enabling it makes workloads like Lucene geo search ~0.7% faster, will get back with more data. I haven't made RFE for "Constants as TEMPs" but will be glad to participate. -Dmitry [1] https://bugs.openjdk.java.net/browse/JDK-8252760 On 9/3/20 11:34 AM, Andrew Haley wrote: > On 02/09/2020 18:40, Vladimir Ivanov wrote: >> C2 doesn't rematerialize FP constants on AArch64 > I think that's probably right, even though a few FP constants are > cheap. Loads from L1 usually have a 4 (or 5) cycle latency, which can > make spilling constants expensive around calls. We could be smarter > about this. > From aph at redhat.com Thu Sep 3 12:11:32 2020 From: aph at redhat.com (Andrew Haley) Date: Thu, 3 Sep 2020 13:11:32 +0100 Subject: [aarch64-port-dev ] [16] RFR(S): 8251525: AARCH64: Faster Math.signum(fp) In-Reply-To: <8cb53861-1c52-2fcb-3e7e-558aa48373c8@bell-sw.com> References: <4b0176e2-317b-8fa2-1409-0f77be3f41c3@redhat.com> <67e67230-cac7-d940-1cca-6ab4e8cba8d4@redhat.com> <9e792a33-4f90-8829-2f7b-158d07d3fd15@bell-sw.com> <0cca5c0c-9240-3a9f-98f0-519384ea69cb@bell-sw.com> <11530b87-8124-19ca-936b-16dec5994411@redhat.com> <8cb53861-1c52-2fcb-3e7e-558aa48373c8@bell-sw.com> Message-ID: <1641b820-529f-ee61-0871-fe12f41a8cbc@redhat.com> On 03/09/2020 13:03, Dmitry Chuyko wrote: > I pushed the change for signum, and opened an RFE [1] for fp > re-materialization on aarch64. We've made some experiments already. On > N1 simply enabling it makes workloads like Lucene geo search ~0.7% > faster, will get back with more data. Even though we have to push FP constants into the constant pool? Interesting. I guess there's less spilling gets done. It'd be interesting to see the difference in the code. -- Andrew Haley (he/him) Java Platform Lead Engineer Red Hat UK Ltd. https://keybase.io/andrewhaley EAC8 43EB D3EF DB98 CC77 2FAD A5CD 6035 332F A671 From paul.sandoz at oracle.com Thu Sep 3 19:20:10 2020 From: paul.sandoz at oracle.com (Paul Sandoz) Date: Thu, 3 Sep 2020 12:20:10 -0700 Subject: [aarch64-port-dev ] [16]RFR(S):8249092:InternalError: a fault occurred in a recent unsafe memory access operation in compiled Java code In-Reply-To: <5845a59f-3790-906a-0ea4-fc0e862eb103@redhat.com> References: <90fda75f-62f9-4d96-b434-6dc15a5537af.zhuoren.wz@alibaba-inc.com> <82b0f0e3-b782-00d5-a778-264fa1e64eda@oracle.com> <05967ec2-ec8e-48f3-bd03-09d29dbcfbba.zhuoren.wz@alibaba-inc.com> <2b2f0d07-c0b2-4e8b-ad2c-fd0046273851.zhuoren.wz@alibaba-inc.com> <5845a59f-3790-906a-0ea4-fc0e862eb103@redhat.com> Message-ID: <5F0E7A5C-6FC8-4DE2-8D2B-D7D4AEBB382A@oracle.com> I also agree, the fix should be backed out. VarHandles can be used as a replacement for Unsafe. If a VarHandle is used to access the contents of a byte[] or ByteBuffer [1] then only the set/get methods are supported for misaligned access, use of all other methods will throw an IllegalStateException. Paul. [1] https://docs.oracle.com/en/java/javase/14/docs/api/java.base/java/lang/invoke/MethodHandles.html#byteBufferViewVarHandle(java.lang.Class,java.nio.ByteOrder) > On Sep 3, 2020, at 1:41 AM, Andrew Haley wrote: > > On 03/09/2020 05:11, David Holmes wrote: >> On 3/09/2020 1:49 pm, Wang Zhuo(Zhuoren) wrote: >>> David, Thank you very much for the explanation. >>> The original crash indeed happened in a third party code using Unsafe to >>> handle unaligned data. >>> So you mean that it is the third party code's bug, we should not fix it >>> in JVM, right? >> >> Right. Unsafe is not a supported API and is by definition unsafe. If you >> use it and it crashes then you need to change your code. > > I agree. I hindsight, I should probably not have approved 8246051. I'm happy > that it should be backed out. > > -- > Andrew Haley (he/him) > Java Platform Lead Engineer > Red Hat UK Ltd. > https://keybase.io/andrewhaley > EAC8 43EB D3EF DB98 CC77 2FAD A5CD 6035 332F A671 > From vladimir.kozlov at oracle.com Thu Sep 3 19:56:44 2020 From: vladimir.kozlov at oracle.com (Vladimir Kozlov) Date: Thu, 3 Sep 2020 12:56:44 -0700 Subject: [aarch64-port-dev ] [16] RFR(S): 8251525: AARCH64: Faster Math.signum(fp) In-Reply-To: <8cb53861-1c52-2fcb-3e7e-558aa48373c8@bell-sw.com> References: <4b0176e2-317b-8fa2-1409-0f77be3f41c3@redhat.com> <67e67230-cac7-d940-1cca-6ab4e8cba8d4@redhat.com> <9e792a33-4f90-8829-2f7b-158d07d3fd15@bell-sw.com> <0cca5c0c-9240-3a9f-98f0-519384ea69cb@bell-sw.com> <11530b87-8124-19ca-936b-16dec5994411@redhat.com> <8cb53861-1c52-2fcb-3e7e-558aa48373c8@bell-sw.com> Message-ID: <586271e8-0b0e-cedf-8837-6df1cb95de31@oracle.com> Please, run changes through jdk/submit before push. Current fix caused tier1 failure: https://bugs.openjdk.java.net/browse/JDK-8252779 Thanks, Vladimir K PS: currently jdk/submit under planned maintenance until Sep 7 On 9/3/20 5:03 AM, Dmitry Chuyko wrote: > I pushed the change for signum, and opened an RFE [1] for fp re-materialization on aarch64. We've made some experiments > already. On N1 simply enabling it makes workloads like Lucene geo search ~0.7% faster, will get back with more data. > > I haven't made RFE for "Constants as TEMPs" but will be glad to participate. > > -Dmitry > > [1] https://bugs.openjdk.java.net/browse/JDK-8252760 > > On 9/3/20 11:34 AM, Andrew Haley wrote: >> On 02/09/2020 18:40, Vladimir Ivanov wrote: >>> C2 doesn't rematerialize FP constants on AArch64 >> I think that's probably right, even though a few FP constants are >> cheap. Loads from L1 usually have a 4 (or 5) cycle latency, which can >> make spilling constants expensive around calls. We could be smarter >> about this. >> From dmitry.chuyko at bell-sw.com Thu Sep 3 21:14:06 2020 From: dmitry.chuyko at bell-sw.com (Dmitry Chuyko) Date: Fri, 4 Sep 2020 00:14:06 +0300 Subject: [aarch64-port-dev ] [16] RFR(S): 8251525: AARCH64: Faster Math.signum(fp) In-Reply-To: <586271e8-0b0e-cedf-8837-6df1cb95de31@oracle.com> References: <4b0176e2-317b-8fa2-1409-0f77be3f41c3@redhat.com> <67e67230-cac7-d940-1cca-6ab4e8cba8d4@redhat.com> <9e792a33-4f90-8829-2f7b-158d07d3fd15@bell-sw.com> <0cca5c0c-9240-3a9f-98f0-519384ea69cb@bell-sw.com> <11530b87-8124-19ca-936b-16dec5994411@redhat.com> <8cb53861-1c52-2fcb-3e7e-558aa48373c8@bell-sw.com> <586271e8-0b0e-cedf-8837-6df1cb95de31@oracle.com> Message-ID: <5c983d58-a5ef-a672-96c0-51df4d6d2ba3@bell-sw.com> Sorry, I really should have used dev submit. Vladimir, thanks for immediate fix. It looks like the test was excluded in our CI for 16, will inspect that. -Dmitry On 9/3/20 10:56 PM, Vladimir Kozlov wrote: > Please, run changes through jdk/submit before push. Current fix caused > tier1 failure: > > https://bugs.openjdk.java.net/browse/JDK-8252779 > > Thanks, > Vladimir K > > PS: currently jdk/submit under planned maintenance until Sep 7 > > On 9/3/20 5:03 AM, Dmitry Chuyko wrote: >> I pushed the change for signum, and opened an RFE [1] for fp >> re-materialization on aarch64. We've made some experiments already. >> On N1 simply enabling it makes workloads like Lucene geo search ~0.7% >> faster, will get back with more data. >> >> I haven't made RFE for "Constants as TEMPs" but will be glad to >> participate. >> >> -Dmitry >> >> [1] https://bugs.openjdk.java.net/browse/JDK-8252760 >> >> On 9/3/20 11:34 AM, Andrew Haley wrote: >>> On 02/09/2020 18:40, Vladimir Ivanov wrote: >>>> C2 doesn't rematerialize FP constants on AArch64 >>> I think that's probably right, even though a few FP constants are >>> cheap. Loads from L1 usually have a 4 (or 5) cycle latency, which can >>> make spilling constants expensive around calls. We could be smarter >>> about this. >>> From zhuoren.wz at alibaba-inc.com Fri Sep 4 02:00:01 2020 From: zhuoren.wz at alibaba-inc.com (=?UTF-8?B?V2FuZyBaaHVvKFpodW9yZW4p?=) Date: Fri, 04 Sep 2020 10:00:01 +0800 Subject: [aarch64-port-dev ] =?utf-8?b?WzE2XVJGUihTKTo4MjQ5MDkyOkludGVy?= =?utf-8?q?nalError=3A_a_fault_occurred_in_a_recent_unsafe_memory_access_o?= =?utf-8?q?peration_in_compiled_Java_code?= In-Reply-To: <5F0E7A5C-6FC8-4DE2-8D2B-D7D4AEBB382A@oracle.com> References: <90fda75f-62f9-4d96-b434-6dc15a5537af.zhuoren.wz@alibaba-inc.com> <82b0f0e3-b782-00d5-a778-264fa1e64eda@oracle.com> <05967ec2-ec8e-48f3-bd03-09d29dbcfbba.zhuoren.wz@alibaba-inc.com> <2b2f0d07-c0b2-4e8b-ad2c-fd0046273851.zhuoren.wz@alibaba-inc.com> <5845a59f-3790-906a-0ea4-fc0e862eb103@redhat.com>, <5F0E7A5C-6FC8-4DE2-8D2B-D7D4AEBB382A@oracle.com> Message-ID: <1367ca1b-262e-4092-9222-0483efd3606d.zhuoren.wz@alibaba-inc.com> OK, thanks all. I am creating new bug and making patch to revert 8246051. Regards, Zhuoren ------------------------------------------------------------------ From:Paul Sandoz Sent At:2020 Sep. 4 (Fri.) 03:22 To:Andrew Haley Cc:David Holmes ; Sandler ; Patric Hedlin ; aarch64-port-dev ; hotspot-runtime-dev ; rahul.v.raghavan Subject:Re: [16]RFR(S):8249092:InternalError: a fault occurred in a recent unsafe memory access operation in compiled Java code I also agree, the fix should be backed out. VarHandles can be used as a replacement for Unsafe. If a VarHandle is used to access the contents of a byte[] or ByteBuffer [1] then only the set/get methods are supported for misaligned access, use of all other methods will throw an IllegalStateException. Paul. [1] https://docs.oracle.com/en/java/javase/14/docs/api/java.base/java/lang/invoke/MethodHandles.html#byteBufferViewVarHandle(java.lang.Class,java.nio.ByteOrder) On Sep 3, 2020, at 1:41 AM, Andrew Haley wrote: On 03/09/2020 05:11, David Holmes wrote: On 3/09/2020 1:49 pm, Wang Zhuo(Zhuoren) wrote: David, Thank you very much for the explanation. The original crash indeed happened in a third party code using Unsafe to handle unaligned data. So you mean that it is the third party code's bug, we should not fix it in JVM, right? Right. Unsafe is not a supported API and is by definition unsafe. If you use it and it crashes then you need to change your code. I agree. I hindsight, I should probably not have approved 8246051. I'm happy that it should be backed out. -- Andrew Haley (he/him) Java Platform Lead Engineer Red Hat UK Ltd. https://keybase.io/andrewhaley EAC8 43EB D3EF DB98 CC77 2FAD A5CD 6035 332F A671 From david.holmes at oracle.com Fri Sep 4 12:50:06 2020 From: david.holmes at oracle.com (David Holmes) Date: Fri, 4 Sep 2020 22:50:06 +1000 Subject: [aarch64-port-dev ] [16] RFR(S): 8251525: AARCH64: Faster Math.signum(fp) In-Reply-To: References: Message-ID: <37369ec2-1ad6-728a-c3f0-7426be7eb273@oracle.com> Hi Dmitry, This change included changes to shared code and should have been reviewed on the main hotspot mailings list from the start not just aarch64-port-dev. As Aarch64 is a mainline OpenJDK port it is questionable whether aarch64-port-dev should be used for any code reviews that relate to mainline. David ----- > Hello, > > Please review a faster version of Math.signum() for AArch64. > > Two new intrinsics (double and float) are introduced in general code, > with appropriate new nodes. New JTreg test is added to cover the > intrinsic case (enabled only for aarch64). > > AArch64 implementation uses FACGT (compare abslute fp values) and BSL > (fp bit selection) to avoid branches and moves to non-fp registers and back. > > Performance results show ~30% better time in the benchmark with a black > hole [1] on Cortex. E.g. on random numbers 4.8 ns/op --> 3.5 ns/op, > overhead is 2.9 ns/op. > > rfe: https://bugs.openjdk.java.net/browse/JDK-8251525 > webrev: http://cr.openjdk.java.net/~dchuyko/8251525/webrev.00/ > testing: jck, jtreg including new dedicated test > > -Dmitry > > [1] https://cr.openjdk.java.net/~dchuyko/8249198/DoubleSignum.java From dmitry.chuyko at bell-sw.com Fri Sep 4 17:07:43 2020 From: dmitry.chuyko at bell-sw.com (Dmitry Chuyko) Date: Fri, 4 Sep 2020 20:07:43 +0300 Subject: [aarch64-port-dev ] [16] RFR(S): 8251525: AARCH64: Faster Math.signum(fp) In-Reply-To: <37369ec2-1ad6-728a-c3f0-7426be7eb273@oracle.com> References: <37369ec2-1ad6-728a-c3f0-7426be7eb273@oracle.com> Message-ID: <0997ba03-605a-e5d4-5c74-1d5c94376079@bell-sw.com> Hi David, Technically the review went entirely on hotspot-compiler-dev from the start in August [1] until integrated in September [2]. However at some point [3] email subjects got extra aarch64 port mention which I agree may be confusing. For aarch64 part I got review from Andrew Haley. For shared code changes I got extra review from Vladimir Ivanov. I apologize again for the insufficient testing as there are issues with both jdk/submit and our internal CI. The test failed after the change is a common one. I had better to wait for dev-submit to restore and to run more tests locally. -Dmitry [1] http://mail.openjdk.java.net/pipermail/hotspot-compiler-dev/2020-August/039495.html [2] http://mail.openjdk.java.net/pipermail/hotspot-compiler-dev/2020-September/039863.html [3] http://mail.openjdk.java.net/pipermail/hotspot-compiler-dev/2020-August/039523.html On 9/4/20 3:50 PM, David Holmes wrote: > Hi Dmitry, > > This change included changes to shared code and should have been > reviewed on the main hotspot mailings list from the start not just > aarch64-port-dev. As Aarch64 is a mainline OpenJDK port it is > questionable whether aarch64-port-dev should be used for any code > reviews that relate to mainline. > > David > ----- > > ............ From david.holmes at oracle.com Sun Sep 6 13:09:48 2020 From: david.holmes at oracle.com (David Holmes) Date: Sun, 6 Sep 2020 23:09:48 +1000 Subject: [aarch64-port-dev ] [16] RFR(S): 8251525: AARCH64: Faster Math.signum(fp) In-Reply-To: <0997ba03-605a-e5d4-5c74-1d5c94376079@bell-sw.com> References: <37369ec2-1ad6-728a-c3f0-7426be7eb273@oracle.com> <0997ba03-605a-e5d4-5c74-1d5c94376079@bell-sw.com> Message-ID: Hi Dmitry, On 5/09/2020 3:07 am, Dmitry Chuyko wrote: > Hi David, > > Technically the review went entirely on hotspot-compiler-dev from the > start in August [1] until integrated in September [2]. However at some > point [3] email subjects got extra aarch64 port mention which I agree > may be confusing. Apologies. Yes I got confused by the different threads. Thanks, David > For aarch64 part I got review from Andrew Haley. > > For shared code changes I got extra review from Vladimir Ivanov. > > I apologize again for the insufficient testing as there are issues with > both jdk/submit and our internal CI. > > The test failed after the change is a common one. I had better to wait > for dev-submit to restore and to run more tests locally. > > -Dmitry > > [1] > http://mail.openjdk.java.net/pipermail/hotspot-compiler-dev/2020-August/039495.html > > > [2] > http://mail.openjdk.java.net/pipermail/hotspot-compiler-dev/2020-September/039863.html > > > [3] > http://mail.openjdk.java.net/pipermail/hotspot-compiler-dev/2020-August/039523.html > > > On 9/4/20 3:50 PM, David Holmes wrote: >> Hi Dmitry, >> >> This change included changes to shared code and should have been >> reviewed on the main hotspot mailings list from the start not just >> aarch64-port-dev. As Aarch64 is a mainline OpenJDK port it is >> questionable whether aarch64-port-dev should be used for any code >> reviews that relate to mainline. >> >> David >> ----- >> >> ............ From goetz.lindenmaier at sap.com Mon Sep 7 06:35:04 2020 From: goetz.lindenmaier at sap.com (Lindenmaier, Goetz) Date: Mon, 7 Sep 2020 06:35:04 +0000 Subject: [aarch64-port-dev ] Crashes on ppc/s390 after 8231441: AArch64: Initial SVE backend support Message-ID: Hi Since that change was pushed, the vm crashes in the build: To suppress the following error report, specify this argument # after -XX: or in .hotspotrc: SuppressErrorAt=/type.cpp:1022 # # A fatal error has been detected by the Java Runtime Environment: # # Internal Error (/usr/work/... /share/opto/type.cpp:1022), pid=28717, tid=28983 # assert(_type_info[base()].dual_type != Bad) failed: implement with v-call # # JRE version: OpenJDK Runtime Environment (16.0.0.1) (fastdebug build 16.0.0.1-internal+0-adhoc.openjdk.jdk) # Java VM: OpenJDK 64-Bit Server VM (fastdebug 16.0.0.1-internal+0-adhoc.openjdk.jdk, mixed mode, tiered, compressed oops, g1 gc, linux-ppc64) # Problematic frame: # V [libjvm.so+0x1bfe22c] Type::xdual() const+0xfc # # No core dump will be written. Core dumps have been disabled. To enable core dumping, try "ulimit -c unlimited" before starting Java again Do you have an ad-hoc idea of the problem? I locally backed out the change which fixed the issue. Best regards, Goetz. From Ningsheng.Jian at arm.com Mon Sep 7 06:50:36 2020 From: Ningsheng.Jian at arm.com (Ningsheng Jian) Date: Mon, 7 Sep 2020 06:50:36 +0000 Subject: [aarch64-port-dev ] Crashes on ppc/s390 after 8231441: AArch64: Initial SVE backend support In-Reply-To: References: Message-ID: Hi Goetz, I am sorry about that and thanks for helping to identify the issue. As I cannot reproduce this on x86 and AArch64, a quick guess is that I may have missed the code like: diff --git a/src/hotspot/share/opto/type.cpp b/src/hotspot/share/opto/type.cpp index 2f4047dfa8e..f7d2f5b2320 100644 --- a/src/hotspot/share/opto/type.cpp +++ b/src/hotspot/share/opto/type.cpp @@ -62,12 +62,14 @@ const Type::TypeInfo Type::_type_info[Type::lastype] = { { Bad, T_ARRAY, "array:", false, Node::NotAMachineReg, relocInfo::none }, // Array #if defined(PPC64) + { Bad, T_ILLEGAL, "vectora:", false, Op_VecA, relocInfo::none }, // VectorA. { Bad, T_ILLEGAL, "vectors:", false, 0, relocInfo::none }, // VectorS { Bad, T_ILLEGAL, "vectord:", false, Op_RegL, relocInfo::none }, // VectorD { Bad, T_ILLEGAL, "vectorx:", false, Op_VecX, relocInfo::none }, // VectorX { Bad, T_ILLEGAL, "vectory:", false, 0, relocInfo::none }, // VectorY { Bad, T_ILLEGAL, "vectorz:", false, 0, relocInfo::none }, // VectorZ #elif defined(S390) + { Bad, T_ILLEGAL, "vectora:", false, Op_VecA, relocInfo::none }, // VectorA. { Bad, T_ILLEGAL, "vectors:", false, 0, relocInfo::none }, // VectorS { Bad, T_ILLEGAL, "vectord:", false, Op_RegL, relocInfo::none }, // VectorD { Bad, T_ILLEGAL, "vectorx:", false, 0, relocInfo::none }, // VectorX Could you please help to have a try? Thanks, Ningsheng > -----Original Message----- > From: Lindenmaier, Goetz > Sent: Monday, September 7, 2020 2:35 PM > To: Ningsheng Jian ; Andrew Dinn ; > hotspot-compiler-dev at openjdk.java.net; build-dev at openjdk.java.net; Vladimir > Ivanov ; Erik ?sterlund > Cc: aarch64-port-dev at openjdk.java.net; Doerr, Martin > Subject: Crashes on ppc/s390 after 8231441: AArch64: Initial SVE backend support > > Hi > > Since that change was pushed, the vm crashes in the build: > > To suppress the following error report, specify this argument # after -XX: or > in .hotspotrc: SuppressErrorAt=/type.cpp:1022 # # A fatal error has been detected by > the Java Runtime Environment: > # > # Internal Error (/usr/work/... /share/opto/type.cpp:1022), pid=28717, tid=28983 # > assert(_type_info[base()].dual_type != Bad) failed: implement with v-call # # JRE > version: OpenJDK Runtime Environment (16.0.0.1) (fastdebug build 16.0.0.1- > internal+0-adhoc.openjdk.jdk) > # Java VM: OpenJDK 64-Bit Server VM (fastdebug 16.0.0.1-internal+0- > adhoc.openjdk.jdk, mixed mode, tiered, compressed oops, g1 gc, linux-ppc64) # > Problematic frame: > # V [libjvm.so+0x1bfe22c] Type::xdual() const+0xfc # # No core dump will be written. > Core dumps have been disabled. To enable core dumping, try "ulimit -c unlimited" > before starting Java again > > Do you have an ad-hoc idea of the problem? > > I locally backed out the change which fixed the issue. > > Best regards, > Goetz. From goetz.lindenmaier at sap.com Mon Sep 7 07:06:50 2020 From: goetz.lindenmaier at sap.com (Lindenmaier, Goetz) Date: Mon, 7 Sep 2020 07:06:50 +0000 Subject: [aarch64-port-dev ] Crashes on ppc/s390 after 8231441: AArch64: Initial SVE backend support In-Reply-To: References: Message-ID: HI, Thanks for the hint! Sounds good, I'll give it a try. ... I removed some emails to reduce traffic. Best regads, Goetz. -----Original Message----- From: Ningsheng Jian Sent: Montag, 7. September 2020 08:51 To: Lindenmaier, Goetz ; Andrew Dinn ; hotspot-compiler-dev at openjdk.java.net; build-dev at openjdk.java.net; Vladimir Ivanov ; Erik ?sterlund Cc: aarch64-port-dev at openjdk.java.net; Doerr, Martin Subject: RE: Crashes on ppc/s390 after 8231441: AArch64: Initial SVE backend support Hi Goetz, I am sorry about that and thanks for helping to identify the issue. As I cannot reproduce this on x86 and AArch64, a quick guess is that I may have missed the code like: diff --git a/src/hotspot/share/opto/type.cpp b/src/hotspot/share/opto/type.cpp index 2f4047dfa8e..f7d2f5b2320 100644 --- a/src/hotspot/share/opto/type.cpp +++ b/src/hotspot/share/opto/type.cpp @@ -62,12 +62,14 @@ const Type::TypeInfo Type::_type_info[Type::lastype] = { { Bad, T_ARRAY, "array:", false, Node::NotAMachineReg, relocInfo::none }, // Array #if defined(PPC64) + { Bad, T_ILLEGAL, "vectora:", false, Op_VecA, relocInfo::none }, // VectorA. { Bad, T_ILLEGAL, "vectors:", false, 0, relocInfo::none }, // VectorS { Bad, T_ILLEGAL, "vectord:", false, Op_RegL, relocInfo::none }, // VectorD { Bad, T_ILLEGAL, "vectorx:", false, Op_VecX, relocInfo::none }, // VectorX { Bad, T_ILLEGAL, "vectory:", false, 0, relocInfo::none }, // VectorY { Bad, T_ILLEGAL, "vectorz:", false, 0, relocInfo::none }, // VectorZ #elif defined(S390) + { Bad, T_ILLEGAL, "vectora:", false, Op_VecA, relocInfo::none }, // VectorA. { Bad, T_ILLEGAL, "vectors:", false, 0, relocInfo::none }, // VectorS { Bad, T_ILLEGAL, "vectord:", false, Op_RegL, relocInfo::none }, // VectorD { Bad, T_ILLEGAL, "vectorx:", false, 0, relocInfo::none }, // VectorX Could you please help to have a try? Thanks, Ningsheng > -----Original Message----- > From: Lindenmaier, Goetz > Sent: Monday, September 7, 2020 2:35 PM > To: Ningsheng Jian ; Andrew Dinn ; > hotspot-compiler-dev at openjdk.java.net; build-dev at openjdk.java.net; Vladimir > Ivanov ; Erik ?sterlund > Cc: aarch64-port-dev at openjdk.java.net; Doerr, Martin > Subject: Crashes on ppc/s390 after 8231441: AArch64: Initial SVE backend support > > Hi > > Since that change was pushed, the vm crashes in the build: > > To suppress the following error report, specify this argument # after -XX: or > in .hotspotrc: SuppressErrorAt=/type.cpp:1022 # # A fatal error has been detected by > the Java Runtime Environment: > # > # Internal Error (/usr/work/... /share/opto/type.cpp:1022), pid=28717, tid=28983 # > assert(_type_info[base()].dual_type != Bad) failed: implement with v-call # # JRE > version: OpenJDK Runtime Environment (16.0.0.1) (fastdebug build 16.0.0.1- > internal+0-adhoc.openjdk.jdk) > # Java VM: OpenJDK 64-Bit Server VM (fastdebug 16.0.0.1-internal+0- > adhoc.openjdk.jdk, mixed mode, tiered, compressed oops, g1 gc, linux-ppc64) # > Problematic frame: > # V [libjvm.so+0x1bfe22c] Type::xdual() const+0xfc # # No core dump will be written. > Core dumps have been disabled. To enable core dumping, try "ulimit -c unlimited" > before starting Java again > > Do you have an ad-hoc idea of the problem? > > I locally backed out the change which fixed the issue. > > Best regards, > Goetz. IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you. From gnu.andrew at redhat.com Mon Sep 7 07:29:46 2020 From: gnu.andrew at redhat.com (Andrew Hughes) Date: Mon, 7 Sep 2020 08:29:46 +0100 Subject: [aarch64-port-dev ] [RFR] [8u] 8u272-b06 Upstream Sync Message-ID: <20200907072946.GF1707023@stopbrexit> Webrevs: https://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/ Merge changesets: http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/corba/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/jaxp/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/jaxws/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/jdk/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/hotspot/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/langtools/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/nashorn/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/root/merge.changeset Changes in aarch64-shenandoah-jdk8u272-b06: - JDK-8064319: Need to enable -XX:+TraceExceptions in release builds - JDK-8080462: Update SunPKCS11 provider with PKCS11 v2.40 support - JDK-8144539: Update PKCS11 tests to run with security manager - JDK-8160768: Add capability to custom resolve host/domain names within the default JNDI LDAP provider - JDK-8161973: PKIXRevocationChecker.getSoftFailExceptions() not working - JDK-8165996: PKCS11 using NSS throws an error regarding secmod.db when NSS uses sqlite - JDK-8169925: PKCS #11 Cryptographic Token Interface license - JDK-8184762: ZapStackSegments should use optimized memset - JDK-8193234: When using -Xcheck:jni an internally allocated buffer can leak - JDK-8219919: RuntimeStub name lost with PrintFrameConverterAssembly - JDK-8220313: [TESTBUG] Update base image for Docker testing to OL 7.6 - JDK-8222079: Don't use memset to initialize fields decode_env constructor in disassembler.cpp - JDK-8225695: 32-bit build failures after JDK-8080462 (Update SunPKCS11 provider with PKCS11 v2.40 support) - JDK-8226575: OperatingSystemMXBean should be made container aware - JDK-8226809: Circular reference in printed stack trace is not correctly indented & ambiguous - JDK-8228835: Memory leak in PKCS11 provider when using AES GCM - JDK-8233621: Mismatch in jsse.enableMFLNExtension property name - JDK-8238898: Missing hash characters for header on license file - JDK-8243320: Add SSL root certificates to Oracle Root CA program - JDK-8244151: Update MUSCLE PC/SC-Lite headers to the latest release 1.8.26 - JDK-8245467: Remove 8u TLSv1.2 implementation files - JDK-8245468: Add TLSv1.3 implementation classes from 11.0.7 - JDK-8245469: Remove DTLS protocol implementation - JDK-8245470: Fix JDK8 compatibility issues - JDK-8245471: Revert JDK-8148188 - JDK-8245472: Backport JDK-8038893 to JDK8 - JDK-8245473: OCSP stapling support - JDK-8245474: Add TLS_KRB5 cipher suites support according to RFC-2712 - JDK-8245476: Disable TLSv1.3 protocol in the ClientHello message by default - JDK-8245477: Adjust TLS tests location - JDK-8245653: Remove 8u TLS tests - JDK-8245681: Add TLSv1.3 regression test from 11.0.7 - JDK-8251117: Cannot check P11Key size in P11Cipher and P11AEADCipher - JDK-8251120: [8u] HotSpot build assumes ENABLE_JFR is set to either true or false - JDK-8251341: Minimal Java specification change - JDK-8251478: Backport TLSv1.3 regression tests to JDK8u Main issues of note: None, clean merge. diffstat for root b/.hgtags | 1 + b/THIRD_PARTY_README | 40 +++++++++++++++++++++++++++++++++++++++- 2 files changed, 40 insertions(+), 1 deletion(-) diffstat for corba b/.hgtags | 1 + b/THIRD_PARTY_README | 40 +++++++++++++++++++++++++++++++++++++++- 2 files changed, 40 insertions(+), 1 deletion(-) diffstat for jaxp b/.hgtags | 1 + b/THIRD_PARTY_README | 40 +++++++++++++++++++++++++++++++++++++++- 2 files changed, 40 insertions(+), 1 deletion(-) diffstat for jaxws b/.hgtags | 1 + b/THIRD_PARTY_README | 40 +++++++++++++++++++++++++++++++++++++++- 2 files changed, 40 insertions(+), 1 deletion(-) diffstat for langtools b/.hgtags | 1 b/THIRD_PARTY_README | 40 +++++++++- b/src/share/classes/com/sun/tools/javac/resources/legacy.properties | 1 b/src/share/classes/com/sun/tools/javac/sym/CreateSymbols.java | 1 4 files changed, 42 insertions(+), 1 deletion(-) diffstat for nashorn b/.hgtags | 1 + b/THIRD_PARTY_README | 40 +++++++++++++++++++++++++++++++++++++++- 2 files changed, 40 insertions(+), 1 deletion(-) diffstat for jdk a/src/share/classes/sun/security/ssl/ALPNExtension.java | 168 a/src/share/classes/sun/security/ssl/Alerts.java | 223 a/src/share/classes/sun/security/ssl/AppInputStream.java | 155 a/src/share/classes/sun/security/ssl/AppOutputStream.java | 150 a/src/share/classes/sun/security/ssl/ByteBufferInputStream.java | 187 a/src/share/classes/sun/security/ssl/CipherBox.java | 1089 -- a/src/share/classes/sun/security/ssl/CipherSuiteList.java | 181 a/src/share/classes/sun/security/ssl/ClientHandshaker.java | 1812 ---- a/src/share/classes/sun/security/ssl/DHCrypt.java | 538 - a/src/share/classes/sun/security/ssl/Debug.java | 201 a/src/share/classes/sun/security/ssl/ECDHCrypt.java | 153 a/src/share/classes/sun/security/ssl/EllipticCurvesExtension.java | 388 - a/src/share/classes/sun/security/ssl/EllipticPointFormatsExtension.java | 104 a/src/share/classes/sun/security/ssl/EngineArgs.java | 238 a/src/share/classes/sun/security/ssl/EngineInputRecord.java | 428 - a/src/share/classes/sun/security/ssl/EngineOutputRecord.java | 331 a/src/share/classes/sun/security/ssl/EngineWriter.java | 244 a/src/share/classes/sun/security/ssl/ExtensionType.java | 112 a/src/share/classes/sun/security/ssl/HandshakeInStream.java | 232 a/src/share/classes/sun/security/ssl/HandshakeMessage.java | 2061 ----- a/src/share/classes/sun/security/ssl/HandshakeStateManager.java | 765 -- a/src/share/classes/sun/security/ssl/Handshaker.java | 1587 ---- a/src/share/classes/sun/security/ssl/HelloExtension.java | 46 a/src/share/classes/sun/security/ssl/HelloExtensions.java | 157 a/src/share/classes/sun/security/ssl/KerberosClientKeyExchange.java | 154 a/src/share/classes/sun/security/ssl/MAC.java | 168 a/src/share/classes/sun/security/ssl/ProtocolList.java | 154 a/src/share/classes/sun/security/ssl/RenegotiationInfoExtension.java | 115 a/src/share/classes/sun/security/ssl/ServerHandshaker.java | 2062 ----- a/src/share/classes/sun/security/ssl/SignatureAndHashAlgorithm.java | 441 - a/src/share/classes/sun/security/ssl/UnknownExtension.java | 60 a/src/share/classes/sun/security/ssl/krb5/KerberosClientKeyExchangeImpl.java | 463 - a/src/share/classes/sun/security/ssl/krb5/KerberosPreMasterSecret.java | 272 a/src/share/native/sun/security/pkcs11/wrapper/pkcs-11v2-20a3.h | 124 a/test/sun/security/ssl/SessionIdCollisionTest.java | 158 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/AppInputStream/ReadBlocksClose.java | 324 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/AppInputStream/ReadHandshake.java | 310 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/AppOutputStream/NoExceptionOnClose.java | 282 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/CipherSuite/SSL_NULL.java | 93 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ClientHandshaker/LengthCheckTest.java | 814 -- a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/DHKeyExchange/DHEKeySizing.java | 493 - a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/EngineArgs/DebugReportsOneExtraByte.sh | 81 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/GenSSLConfigs/main.java | 274 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/InputRecord/SSLSocketTimeoutNulls.java | 289 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/CustomizedDefaultProtocols.java | 244 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/DefaultEnabledProtocols.java | 243 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/MD2InTrustAnchor.java | 431 - a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/NoOldVersionContext.java | 244 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/TrustTrustedCert.java | 510 - a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/CloseEngineException.java | 283 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/CloseInboundException.java | 275 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/CloseStart.java | 123 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/EngineEnforceUseClientMode.java | 323 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/RehandshakeFinished.java | 523 - a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/SSLEngineBadBufferArrayAccess.java | 490 - a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/SSLEngineDeadlock.java | 411 - a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/AsyncSSLSocketClose.java | 125 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/CheckMethods.java | 143 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/ClientTimeout.java | 370 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/InvalidateServerSessionRenegotiate.java | 310 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/NoImpactServerRenego.java | 310 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/NonAutoClose.java | 377 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/RejectClientRenego.java | 323 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/SSLSocketImplThrowsWrongExceptions.java | 261 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/SetClientMode.java | 187 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ServerHandshaker/AnonCipherWithWantClientAuth.java | 272 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SocketCreation/SocketCreation.java | 511 - a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/BasicConstraints.java | 564 - a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/CertRequestOverflow.java | 402 - a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/ClientServer.java | 361 a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/SelfIssuedCert.java | 412 - a/test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/Distrust.java | 273 a/test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/OriginServer.java | 158 a/test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/ProxyAuthTest.java | 252 a/test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/ServerIdentityTest.java | 275 a/test/sun/security/ssl/etc/README | 94 a/test/sun/security/ssl/javax/net/ssl/ALPN/SSLEngineAlpnTest.java | 583 - a/test/sun/security/ssl/javax/net/ssl/FixingJavadocs/ComURLNulls.java | 110 a/test/sun/security/ssl/javax/net/ssl/FixingJavadocs/SSLSessionNulls.java | 290 a/test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/Arrays.java | 294 a/test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/CheckStatus.java | 729 - a/test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/ConnectionTest.java | 684 - a/test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/ExtendedKeyEngine.java | 274 a/test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/LargeBufs.java | 306 a/test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/NoAuthClientAuth.java | 399 - a/test/sun/security/ssl/javax/net/ssl/NewAPIs/SessionCacheSizeTests.java | 480 - a/test/sun/security/ssl/javax/net/ssl/NewAPIs/SessionTimeOutTests.java | 494 - a/test/sun/security/ssl/javax/net/ssl/NewAPIs/testEnabledProtocols.java | 343 a/test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketExplorerFailure.java | 383 - a/test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketSNISensitive.java | 577 - a/test/sun/security/ssl/javax/net/ssl/TLSv11/ExportableBlockCipher.java | 330 a/test/sun/security/ssl/javax/net/ssl/TLSv11/ExportableStreamCipher.java | 330 a/test/sun/security/ssl/javax/net/ssl/TLSv12/DisabledShortRSAKeys.java | 441 - a/test/sun/security/ssl/javax/net/ssl/TLSv12/ShortRSAKey512.java | 424 - a/test/sun/security/ssl/javax/net/ssl/TLSv12/ShortRSAKeyGCM.java | 447 - a/test/sun/security/ssl/sanity/ciphersuites/CheckCipherSuites.java | 247 a/test/sun/security/ssl/sanity/ciphersuites/CipherSuitesInOrder.java | 259 a/test/sun/security/ssl/sanity/interop/CipherTest.java | 591 - a/test/sun/security/ssl/sanity/interop/ClientJSSEServerJSSE.java | 59 a/test/sun/security/ssl/sanity/interop/JSSEClient.java | 94 a/test/sun/security/ssl/sanity/interop/JSSEServer.java | 94 a/test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/B6216082.java | 187 a/test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/ReadTimeout.java | 318 a/test/sun/security/ssl/sun/net/www/protocol/https/NewImpl/ComHTTPSConnection.java | 381 - a/test/sun/security/ssl/sun/net/www/protocol/https/NewImpl/ComHostnameVerifier.java | 350 a/test/sun/security/ssl/templates/SSLEngineTemplate.java | 380 - a/test/sun/security/ssl/templates/SSLSocketSSLEngineTemplate.java | 491 - a/test/sun/security/ssl/templates/SSLSocketTemplate.java | 311 b/.hgtags | 1 b/THIRD_PARTY_README | 40 b/make/data/cacerts/sslrooteccca | 23 b/make/data/cacerts/sslrootevrsaca | 41 b/make/data/cacerts/sslrootrsaca | 41 b/make/data/checkdeps/refs.allowed | 30 b/make/mapfiles/libj2pkcs11/mapfile-vers | 1 b/make/mapfiles/libmanagement/mapfile-vers | 12 b/src/aix/native/sun/management/AixOperatingSystem.c | 4 b/src/linux/classes/jdk/internal/platform/cgroupv1/Metrics.java | 26 b/src/linux/classes/jdk/internal/platform/cgroupv1/SubSystem.java | 25 b/src/share/classes/com/sun/jndi/ldap/DefaultLdapDnsProvider.java | 86 b/src/share/classes/com/sun/jndi/ldap/LdapCtxFactory.java | 113 b/src/share/classes/com/sun/jndi/ldap/LdapDnsProviderService.java | 111 b/src/share/classes/com/sun/jndi/ldap/ServiceLocator.java | 25 b/src/share/classes/com/sun/jndi/ldap/spi/LdapDnsProvider.java | 109 b/src/share/classes/com/sun/jndi/ldap/spi/LdapDnsProviderResult.java | 88 b/src/share/classes/com/sun/management/OperatingSystemMXBean.java | 8 b/src/share/classes/java/lang/Throwable.java | 2 b/src/share/classes/java/net/SocketPermission.java | 15 b/src/share/classes/java/security/MessageDigest.java | 15 b/src/share/classes/javax/net/ssl/ExtendedSSLSession.java | 4 b/src/share/classes/sun/net/RegisteredDomain.java | 36 b/src/share/classes/sun/security/pkcs11/P11AEADCipher.java | 752 + b/src/share/classes/sun/security/pkcs11/P11Cipher.java | 4 b/src/share/classes/sun/security/pkcs11/P11Digest.java | 14 b/src/share/classes/sun/security/pkcs11/P11PSSSignature.java | 701 + b/src/share/classes/sun/security/pkcs11/P11RSACipher.java | 8 b/src/share/classes/sun/security/pkcs11/Secmod.java | 22 b/src/share/classes/sun/security/pkcs11/SunPKCS11.java | 84 b/src/share/classes/sun/security/pkcs11/wrapper/CK_CCM_PARAMS.java | 83 b/src/share/classes/sun/security/pkcs11/wrapper/CK_GCM_PARAMS.java | 75 b/src/share/classes/sun/security/pkcs11/wrapper/CK_MECHANISM.java | 55 b/src/share/classes/sun/security/pkcs11/wrapper/CK_RSA_PKCS_PSS_PARAMS.java | 144 b/src/share/classes/sun/security/pkcs11/wrapper/Functions.java | 289 b/src/share/classes/sun/security/pkcs11/wrapper/PKCS11.java | 118 b/src/share/classes/sun/security/pkcs11/wrapper/PKCS11Constants.java | 792 +- b/src/share/classes/sun/security/pkcs11/wrapper/PKCS11Exception.java | 16 b/src/share/classes/sun/security/provider/certpath/OCSPNonceExtension.java | 179 b/src/share/classes/sun/security/provider/certpath/RevocationChecker.java | 13 b/src/share/classes/sun/security/ssl/Alert.java | 297 b/src/share/classes/sun/security/ssl/AlpnExtension.java | 517 + b/src/share/classes/sun/security/ssl/Authenticator.java | 437 - b/src/share/classes/sun/security/ssl/BaseSSLSocketImpl.java | 70 b/src/share/classes/sun/security/ssl/CertSignAlgsExtension.java | 347 b/src/share/classes/sun/security/ssl/CertStatusExtension.java | 1219 +++ b/src/share/classes/sun/security/ssl/CertificateMessage.java | 1380 +++ b/src/share/classes/sun/security/ssl/CertificateRequest.java | 951 ++ b/src/share/classes/sun/security/ssl/CertificateStatus.java | 369 b/src/share/classes/sun/security/ssl/CertificateVerify.java | 1180 +++ b/src/share/classes/sun/security/ssl/ChangeCipherSpec.java | 252 b/src/share/classes/sun/security/ssl/CipherSuite.java | 2509 ++---- b/src/share/classes/sun/security/ssl/CipherType.java | 37 b/src/share/classes/sun/security/ssl/Ciphertext.java | 55 b/src/share/classes/sun/security/ssl/ClientAuthType.java | 36 b/src/share/classes/sun/security/ssl/ClientHandshakeContext.java | 110 b/src/share/classes/sun/security/ssl/ClientHello.java | 1157 +++ b/src/share/classes/sun/security/ssl/ClientKeyExchange.java | 122 b/src/share/classes/sun/security/ssl/ConnectionContext.java | 34 b/src/share/classes/sun/security/ssl/ContentType.java | 73 b/src/share/classes/sun/security/ssl/CookieExtension.java | 315 b/src/share/classes/sun/security/ssl/DHClientKeyExchange.java | 333 b/src/share/classes/sun/security/ssl/DHKeyExchange.java | 534 + b/src/share/classes/sun/security/ssl/DHServerKeyExchange.java | 559 + b/src/share/classes/sun/security/ssl/ECDHClientKeyExchange.java | 522 + b/src/share/classes/sun/security/ssl/ECDHKeyExchange.java | 484 + b/src/share/classes/sun/security/ssl/ECDHServerKeyExchange.java | 563 + b/src/share/classes/sun/security/ssl/ECPointFormatsExtension.java | 300 b/src/share/classes/sun/security/ssl/EncryptedExtensions.java | 193 b/src/share/classes/sun/security/ssl/EphemeralKeyManager.java | 12 b/src/share/classes/sun/security/ssl/ExtendedMasterSecretExtension.java | 372 b/src/share/classes/sun/security/ssl/Finished.java | 1113 ++ b/src/share/classes/sun/security/ssl/HKDF.java | 186 b/src/share/classes/sun/security/ssl/HandshakeAbsence.java | 42 b/src/share/classes/sun/security/ssl/HandshakeConsumer.java | 35 b/src/share/classes/sun/security/ssl/HandshakeContext.java | 560 + b/src/share/classes/sun/security/ssl/HandshakeHash.java | 933 +- b/src/share/classes/sun/security/ssl/HandshakeOutStream.java | 197 b/src/share/classes/sun/security/ssl/HandshakeProducer.java | 38 b/src/share/classes/sun/security/ssl/HelloCookieManager.java | 215 b/src/share/classes/sun/security/ssl/HelloRequest.java | 217 b/src/share/classes/sun/security/ssl/InputRecord.java | 977 -- b/src/share/classes/sun/security/ssl/JsseJce.java | 64 b/src/share/classes/sun/security/ssl/KeyManagerFactoryImpl.java | 11 b/src/share/classes/sun/security/ssl/KeyShareExtension.java | 939 ++ b/src/share/classes/sun/security/ssl/KeyUpdate.java | 333 b/src/share/classes/sun/security/ssl/Krb5Helper.java | 11 b/src/share/classes/sun/security/ssl/Krb5Proxy.java | 1 b/src/share/classes/sun/security/ssl/KrbClientKeyExchange.java | 379 + b/src/share/classes/sun/security/ssl/KrbClientKeyExchangeHelper.java | 56 b/src/share/classes/sun/security/ssl/KrbKeyExchange.java | 257 b/src/share/classes/sun/security/ssl/MaxFragExtension.java | 609 + b/src/share/classes/sun/security/ssl/NewSessionTicket.java | 389 + b/src/share/classes/sun/security/ssl/OutputRecord.java | 844 +- b/src/share/classes/sun/security/ssl/Plaintext.java | 79 b/src/share/classes/sun/security/ssl/PostHandshakeContext.java | 109 b/src/share/classes/sun/security/ssl/PreSharedKeyExtension.java | 892 ++ b/src/share/classes/sun/security/ssl/PredefinedDHParameterSpecs.java | 314 b/src/share/classes/sun/security/ssl/ProtocolVersion.java | 444 - b/src/share/classes/sun/security/ssl/PskKeyExchangeModesExtension.java | 332 b/src/share/classes/sun/security/ssl/RSAClientKeyExchange.java | 474 - b/src/share/classes/sun/security/ssl/RSAKeyExchange.java | 313 b/src/share/classes/sun/security/ssl/RSAServerKeyExchange.java | 339 b/src/share/classes/sun/security/ssl/RSASignature.java | 118 b/src/share/classes/sun/security/ssl/RandomCookie.java | 126 b/src/share/classes/sun/security/ssl/Record.java | 234 b/src/share/classes/sun/security/ssl/RenegoInfoExtension.java | 554 + b/src/share/classes/sun/security/ssl/SSLAlgorithmConstraints.java | 148 b/src/share/classes/sun/security/ssl/SSLAlgorithmDecomposer.java | 128 b/src/share/classes/sun/security/ssl/SSLAuthentication.java | 31 b/src/share/classes/sun/security/ssl/SSLBasicKeyDerivation.java | 81 b/src/share/classes/sun/security/ssl/SSLCipher.java | 2363 ++++++ b/src/share/classes/sun/security/ssl/SSLConfiguration.java | 399 + b/src/share/classes/sun/security/ssl/SSLConsumer.java | 35 b/src/share/classes/sun/security/ssl/SSLContextImpl.java | 830 +- b/src/share/classes/sun/security/ssl/SSLCredentials.java | 29 b/src/share/classes/sun/security/ssl/SSLEngineImpl.java | 2642 +----- b/src/share/classes/sun/security/ssl/SSLEngineInputRecord.java | 411 + b/src/share/classes/sun/security/ssl/SSLEngineOutputRecord.java | 587 + b/src/share/classes/sun/security/ssl/SSLExtension.java | 705 + b/src/share/classes/sun/security/ssl/SSLExtensions.java | 389 + b/src/share/classes/sun/security/ssl/SSLHandshake.java | 547 + b/src/share/classes/sun/security/ssl/SSLHandshakeBinding.java | 47 b/src/share/classes/sun/security/ssl/SSLKeyAgreement.java | 32 b/src/share/classes/sun/security/ssl/SSLKeyAgreementGenerator.java | 33 b/src/share/classes/sun/security/ssl/SSLKeyDerivation.java | 35 b/src/share/classes/sun/security/ssl/SSLKeyDerivationGenerator.java | 34 b/src/share/classes/sun/security/ssl/SSLKeyExchange.java | 633 + b/src/share/classes/sun/security/ssl/SSLLogger.java | 594 + b/src/share/classes/sun/security/ssl/SSLMasterKeyDerivation.java | 145 b/src/share/classes/sun/security/ssl/SSLPossession.java | 32 b/src/share/classes/sun/security/ssl/SSLPossessionGenerator.java | 30 b/src/share/classes/sun/security/ssl/SSLProducer.java | 33 b/src/share/classes/sun/security/ssl/SSLRecord.java | 93 b/src/share/classes/sun/security/ssl/SSLSecretDerivation.java | 152 b/src/share/classes/sun/security/ssl/SSLServerSocketFactoryImpl.java | 37 b/src/share/classes/sun/security/ssl/SSLServerSocketImpl.java | 335 b/src/share/classes/sun/security/ssl/SSLSessionContextImpl.java | 52 b/src/share/classes/sun/security/ssl/SSLSessionImpl.java | 579 + b/src/share/classes/sun/security/ssl/SSLSocketFactoryImpl.java | 10 b/src/share/classes/sun/security/ssl/SSLSocketImpl.java | 3784 +++------- b/src/share/classes/sun/security/ssl/SSLSocketInputRecord.java | 466 + b/src/share/classes/sun/security/ssl/SSLSocketOutputRecord.java | 389 + b/src/share/classes/sun/security/ssl/SSLStringizer.java | 41 b/src/share/classes/sun/security/ssl/SSLTrafficKeyDerivation.java | 303 b/src/share/classes/sun/security/ssl/SSLTransport.java | 202 b/src/share/classes/sun/security/ssl/ServerHandshakeContext.java | 82 b/src/share/classes/sun/security/ssl/ServerHello.java | 1502 +++ b/src/share/classes/sun/security/ssl/ServerHelloDone.java | 187 b/src/share/classes/sun/security/ssl/ServerKeyExchange.java | 123 b/src/share/classes/sun/security/ssl/ServerNameExtension.java | 718 + b/src/share/classes/sun/security/ssl/SessionId.java | 108 b/src/share/classes/sun/security/ssl/SignatureAlgorithmsExtension.java | 576 + b/src/share/classes/sun/security/ssl/SignatureScheme.java | 529 + b/src/share/classes/sun/security/ssl/StatusResponseManager.java | 963 ++ b/src/share/classes/sun/security/ssl/SunJSSE.java | 8 b/src/share/classes/sun/security/ssl/SunX509KeyManagerImpl.java | 50 b/src/share/classes/sun/security/ssl/SupportedGroupsExtension.java | 1039 ++ b/src/share/classes/sun/security/ssl/SupportedVersionsExtension.java | 508 + b/src/share/classes/sun/security/ssl/TransportContext.java | 663 + b/src/share/classes/sun/security/ssl/TrustManagerFactoryImpl.java | 32 b/src/share/classes/sun/security/ssl/TrustStoreManager.java | 52 b/src/share/classes/sun/security/ssl/Utilities.java | 173 b/src/share/classes/sun/security/ssl/X509Authentication.java | 337 b/src/share/classes/sun/security/ssl/X509KeyManagerImpl.java | 144 b/src/share/classes/sun/security/ssl/X509TrustManagerImpl.java | 218 b/src/share/classes/sun/security/ssl/krb5/Krb5ProxyImpl.java | 2 b/src/share/classes/sun/security/ssl/krb5/KrbClientKeyExchangeHelperImpl.java | 466 + b/src/share/classes/sun/security/util/GCMParameters.java | 153 b/src/share/classes/sun/security/util/HostnameChecker.java | 94 b/src/share/classes/sun/security/util/MessageDigestSpi2.java | 44 b/src/share/classes/sun/security/util/RegisteredDomain.java | 93 b/src/share/classes/sun/security/util/SecurityConstants.java | 2 b/src/share/classes/sun/security/validator/PKIXValidator.java | 72 b/src/share/classes/sun/security/validator/SimpleValidator.java | 1 b/src/share/classes/sun/security/validator/Validator.java | 15 b/src/share/lib/security/java.security-aix | 36 b/src/share/lib/security/java.security-linux | 36 b/src/share/lib/security/java.security-macosx | 36 b/src/share/lib/security/java.security-solaris | 36 b/src/share/lib/security/java.security-windows | 36 b/src/share/native/sun/security/pkcs11/wrapper/p11_convert.c | 2020 ++--- b/src/share/native/sun/security/pkcs11/wrapper/p11_crypt.c | 162 b/src/share/native/sun/security/pkcs11/wrapper/p11_digest.c | 53 b/src/share/native/sun/security/pkcs11/wrapper/p11_general.c | 27 b/src/share/native/sun/security/pkcs11/wrapper/p11_keymgmt.c | 284 b/src/share/native/sun/security/pkcs11/wrapper/p11_mutex.c | 4 b/src/share/native/sun/security/pkcs11/wrapper/p11_sign.c | 225 b/src/share/native/sun/security/pkcs11/wrapper/p11_util.c | 304 b/src/share/native/sun/security/pkcs11/wrapper/pkcs11.h | 82 b/src/share/native/sun/security/pkcs11/wrapper/pkcs11f.h | 215 b/src/share/native/sun/security/pkcs11/wrapper/pkcs11t.h | 1992 +++-- b/src/share/native/sun/security/pkcs11/wrapper/pkcs11wrapper.h | 90 b/src/solaris/classes/sun/management/OperatingSystemImpl.java | 129 b/src/solaris/native/sun/management/LinuxOperatingSystem.c | 37 b/src/solaris/native/sun/management/MacosxOperatingSystem.c | 4 b/src/solaris/native/sun/management/OperatingSystemImpl.c | 26 b/src/solaris/native/sun/management/SolarisOperatingSystem.c | 4 b/src/solaris/native/sun/security/smartcardio/MUSCLE/pcsclite.h | 2 b/test/TEST.groups | 6 b/test/com/sun/jndi/ldap/LdapDnsProviderTest.java | 230 b/test/com/sun/jndi/ldap/dnsprovider/TestDnsProvider.java | 20 b/test/com/sun/security/auth/module/LdapLoginModule/CheckConfigs.policy | 1 b/test/java/security/cert/PKIXRevocationChecker/OcspUnauthorized.java | 12 b/test/java/security/testlibrary/CertificateBuilder.java | 539 + b/test/java/security/testlibrary/SimpleOCSPServer.java | 1581 ++++ b/test/javax/net/ssl/ALPN/SSLEngineAlpnTest.java | 585 + b/test/javax/net/ssl/ALPN/SSLServerSocketAlpnTest.java | 2 b/test/javax/net/ssl/ALPN/SSLSocketAlpnTest.java | 2 b/test/javax/net/ssl/FixingJavadocs/ComURLNulls.java | 121 b/test/javax/net/ssl/FixingJavadocs/ImplicitHandshake.java | 2 b/test/javax/net/ssl/FixingJavadocs/SSLSessionNulls.java | 98 b/test/javax/net/ssl/FixingJavadocs/SSLSocketInherit.java | 2 b/test/javax/net/ssl/HttpsURLConnection/GetResponseCode.java | 2 b/test/javax/net/ssl/SSLEngine/ArgCheck.java | 2 b/test/javax/net/ssl/SSLEngine/Arrays.java | 320 b/test/javax/net/ssl/SSLEngine/Basics.java | 2 b/test/javax/net/ssl/SSLEngine/CheckStatus.java | 714 + b/test/javax/net/ssl/SSLEngine/ConnectionTest.java | 685 + b/test/javax/net/ssl/SSLEngine/EngineCloseOnAlert.java | 374 b/test/javax/net/ssl/SSLEngine/ExtendedKeyEngine.java | 276 b/test/javax/net/ssl/SSLEngine/ExtendedKeySocket.java | 2 b/test/javax/net/ssl/SSLEngine/IllegalHandshakeMessage.java | 110 b/test/javax/net/ssl/SSLEngine/IllegalRecordVersion.java | 2 b/test/javax/net/ssl/SSLEngine/LargeBufs.java | 312 b/test/javax/net/ssl/SSLEngine/LargePacket.java | 2 b/test/javax/net/ssl/SSLEngine/NoAuthClientAuth.java | 423 + b/test/javax/net/ssl/SSLEngine/SSLEngineService.java | 2 b/test/javax/net/ssl/SSLEngine/TestAllSuites.java | 2 b/test/javax/net/ssl/SSLParameters/UseCipherSuitesOrder.java | 2 b/test/javax/net/ssl/SSLSession/CheckMyTrustedKeystore.java | 2 b/test/javax/net/ssl/SSLSession/HttpsURLConnectionLocalCertificateChain.java | 2 b/test/javax/net/ssl/SSLSession/JSSERenegotiate.java | 2 b/test/javax/net/ssl/SSLSession/RenegotiateTLS13.java | 292 b/test/javax/net/ssl/SSLSession/ResumeTLS13withSNI.java | 586 + b/test/javax/net/ssl/SSLSession/SSLCtxAccessToSessCtx.java | 2 b/test/javax/net/ssl/SSLSession/SessionCacheSizeTests.java | 497 + b/test/javax/net/ssl/SSLSession/SessionTimeOutTests.java | 510 + b/test/javax/net/ssl/SSLSession/TestEnabledProtocols.java | 283 b/test/javax/net/ssl/SSLSocket/InputStreamClosure.java | 81 b/test/javax/net/ssl/SSLSocket/OutputStreamClosure.java | 81 b/test/javax/net/ssl/SSLSocket/Tls13PacketSize.java | 100 b/test/javax/net/ssl/ServerName/BestEffortOnLazyConnected.java | 2 b/test/javax/net/ssl/ServerName/SSLEngineExplorer.java | 4 b/test/javax/net/ssl/ServerName/SSLEngineExplorerMatchedSNI.java | 4 b/test/javax/net/ssl/ServerName/SSLEngineExplorerUnmatchedSNI.java | 4 b/test/javax/net/ssl/ServerName/SSLEngineExplorerWithCli.java | 4 b/test/javax/net/ssl/ServerName/SSLEngineExplorerWithSrv.java | 4 b/test/javax/net/ssl/ServerName/SSLSocketConsistentSNI.java | 2 b/test/javax/net/ssl/ServerName/SSLSocketExplorer.java | 4 b/test/javax/net/ssl/ServerName/SSLSocketExplorerFailure.java | 387 + b/test/javax/net/ssl/ServerName/SSLSocketExplorerMatchedSNI.java | 4 b/test/javax/net/ssl/ServerName/SSLSocketExplorerUnmatchedSNI.java | 4 b/test/javax/net/ssl/ServerName/SSLSocketExplorerWithCliSNI.java | 4 b/test/javax/net/ssl/ServerName/SSLSocketExplorerWithSrvSNI.java | 4 b/test/javax/net/ssl/ServerName/SSLSocketInconsistentSNI.java | 2 b/test/javax/net/ssl/ServerName/SSLSocketSNISensitive.java | 578 + b/test/javax/net/ssl/Stapling/HttpsUrlConnClient.java | 853 ++ b/test/javax/net/ssl/Stapling/SSLEngineWithStapling.java | 696 + b/test/javax/net/ssl/Stapling/SSLSocketWithStapling.java | 1299 +++ b/test/javax/net/ssl/Stapling/StapleEnableProps.java | 843 ++ b/test/javax/net/ssl/TLS/CipherTestUtils.java | 161 b/test/javax/net/ssl/TLS/JSSEClient.java | 84 b/test/javax/net/ssl/TLS/JSSEServer.java | 51 b/test/javax/net/ssl/TLS/TLSClientPropertyTest.java | 27 b/test/javax/net/ssl/TLS/TLSDataExchangeTest.java | 43 b/test/javax/net/ssl/TLS/TLSEnginesClosureTest.java | 42 b/test/javax/net/ssl/TLS/TLSHandshakeTest.java | 42 b/test/javax/net/ssl/TLS/TLSMFLNTest.java | 44 b/test/javax/net/ssl/TLS/TLSNotEnabledRC4Test.java | 39 b/test/javax/net/ssl/TLS/TLSRehandshakeTest.java | 43 b/test/javax/net/ssl/TLS/TLSRehandshakeWithCipherChangeTest.java | 43 b/test/javax/net/ssl/TLS/TLSRehandshakeWithDataExTest.java | 45 b/test/javax/net/ssl/TLS/TLSUnsupportedCiphersTest.java | 40 b/test/javax/net/ssl/TLS/TestJSSE.java | 202 b/test/javax/net/ssl/TLS/TestJSSEClientDefaultProtocol.java | 65 b/test/javax/net/ssl/TLS/TestJSSEClientProtocol.java | 76 b/test/javax/net/ssl/TLS/TestJSSENoCommonProtocols.java | 36 b/test/javax/net/ssl/TLS/TestJSSEServerProtocol.java | 61 b/test/javax/net/ssl/TLSCommon/BufferOverflowUnderflowTest.java | 135 b/test/javax/net/ssl/TLSCommon/CipherSuite.java | 244 b/test/javax/net/ssl/TLSCommon/ConcurrentClientAccessTest.java | 390 + b/test/javax/net/ssl/TLSCommon/DataExchangeTest.java | 55 b/test/javax/net/ssl/TLSCommon/EnginesClosureTest.java | 63 b/test/javax/net/ssl/TLSCommon/HandshakeTest.java | 52 b/test/javax/net/ssl/TLSCommon/KeyAlgorithm.java | 39 b/test/javax/net/ssl/TLSCommon/KeyExAlgorithm.java | 44 b/test/javax/net/ssl/TLSCommon/MFLNTest.java | 63 b/test/javax/net/ssl/TLSCommon/NotEnabledRC4Test.java | 54 b/test/javax/net/ssl/TLSCommon/Protocol.java | 54 b/test/javax/net/ssl/TLSCommon/RehandshakeTest.java | 58 b/test/javax/net/ssl/TLSCommon/RehandshakeWithCipherChangeTest.java | 73 b/test/javax/net/ssl/TLSCommon/RehandshakeWithDataExTest.java | 74 b/test/javax/net/ssl/TLSCommon/SSLEngineTestCase.java | 1212 +++ b/test/javax/net/ssl/TLSCommon/TLSTest.java | 1245 +++ b/test/javax/net/ssl/TLSCommon/TestSessionLocalPrincipal.java | 344 b/test/javax/net/ssl/TLSCommon/UnsupportedCiphersTest.java | 55 b/test/javax/net/ssl/TLSCommon/jaas.conf | 17 b/test/javax/net/ssl/TLSv1/TLSDataExchangeTest.java | 43 b/test/javax/net/ssl/TLSv1/TLSEnginesClosureTest.java | 42 b/test/javax/net/ssl/TLSv1/TLSHandshakeTest.java | 42 b/test/javax/net/ssl/TLSv1/TLSMFLNTest.java | 44 b/test/javax/net/ssl/TLSv1/TLSNotEnabledRC4Test.java | 39 b/test/javax/net/ssl/TLSv1/TLSRehandshakeTest.java | 43 b/test/javax/net/ssl/TLSv1/TLSRehandshakeWithCipherChangeTest.java | 43 b/test/javax/net/ssl/TLSv1/TLSRehandshakeWithDataExTest.java | 45 b/test/javax/net/ssl/TLSv1/TLSUnsupportedCiphersTest.java | 40 b/test/javax/net/ssl/TLSv11/EmptyCertificateAuthorities.java | 2 b/test/javax/net/ssl/TLSv11/ExportableBlockCipher.java | 337 b/test/javax/net/ssl/TLSv11/ExportableStreamCipher.java | 337 b/test/javax/net/ssl/TLSv11/GenericBlockCipher.java | 2 b/test/javax/net/ssl/TLSv11/GenericStreamCipher.java | 2 b/test/javax/net/ssl/TLSv11/TLSDataExchangeTest.java | 43 b/test/javax/net/ssl/TLSv11/TLSEnginesClosureTest.java | 42 b/test/javax/net/ssl/TLSv11/TLSHandshakeTest.java | 42 b/test/javax/net/ssl/TLSv11/TLSMFLNTest.java | 44 b/test/javax/net/ssl/TLSv11/TLSNotEnabledRC4Test.java | 39 b/test/javax/net/ssl/TLSv11/TLSRehandshakeTest.java | 43 b/test/javax/net/ssl/TLSv11/TLSRehandshakeWithCipherChangeTest.java | 43 b/test/javax/net/ssl/TLSv11/TLSRehandshakeWithDataExTest.java | 45 b/test/javax/net/ssl/TLSv11/TLSUnsupportedCiphersTest.java | 40 b/test/javax/net/ssl/TLSv12/DisabledShortDSAKeys.java | 8 b/test/javax/net/ssl/TLSv12/DisabledShortRSAKeys.java | 261 b/test/javax/net/ssl/TLSv12/ProtocolFilter.java | 2 b/test/javax/net/ssl/TLSv12/ShortRSAKey512.java | 420 + b/test/javax/net/ssl/TLSv12/ShortRSAKeyGCM.java | 446 + b/test/javax/net/ssl/TLSv12/SignatureAlgorithms.java | 5 b/test/javax/net/ssl/TLSv12/TLSEnginesClosureTest.java | 45 b/test/javax/net/ssl/ciphersuites/DisabledAlgorithms.java | 19 b/test/javax/net/ssl/ciphersuites/ECCurvesconstraints.java | 28 b/test/javax/net/ssl/compatibility/Cert.java | 413 + b/test/javax/net/ssl/compatibility/Client.java | 206 b/test/javax/net/ssl/compatibility/ClientHelloProcessing.java | 781 ++ b/test/javax/net/ssl/compatibility/Compatibility.java | 357 b/test/javax/net/ssl/compatibility/JdkInfo.java | 95 b/test/javax/net/ssl/compatibility/JdkRelease.java | 61 b/test/javax/net/ssl/compatibility/JdkUtils.java | 115 b/test/javax/net/ssl/compatibility/ProcessUtils.java | 59 b/test/javax/net/ssl/compatibility/README | 130 b/test/javax/net/ssl/compatibility/Server.java | 174 b/test/javax/net/ssl/compatibility/Status.java | 30 b/test/javax/net/ssl/compatibility/TestCase.java | 64 b/test/javax/net/ssl/compatibility/UseCase.java | 205 b/test/javax/net/ssl/compatibility/Utils.java | 270 b/test/javax/net/ssl/compatibility/java.security | 2 b/test/javax/net/ssl/etc/README | 116 b/test/javax/net/ssl/interop/ClientHelloBufferUnderflowException.java | 84 b/test/javax/net/ssl/interop/ClientHelloChromeInterOp.java | 74 b/test/javax/net/ssl/interop/ClientHelloInterOp.java | 432 + b/test/javax/net/ssl/sanity/CacertsExplorer.java | 72 b/test/javax/net/ssl/sanity/ciphersuites/CheckCipherSuites.java | 253 b/test/javax/net/ssl/sanity/ciphersuites/CipherSuitesInOrder.java | 264 b/test/javax/net/ssl/sanity/interop/CipherTest.java | 461 + b/test/javax/net/ssl/sanity/interop/ClientJSSEServerJSSE.java | 59 b/test/javax/net/ssl/sanity/interop/JSSEClient.java | 99 b/test/javax/net/ssl/sanity/interop/JSSEServer.java | 100 b/test/javax/net/ssl/templates/SSLContextTemplate.java | 518 + b/test/javax/net/ssl/templates/SSLEngineTemplate.java | 428 + b/test/javax/net/ssl/templates/SSLSocketSSLEngineTemplate.java | 532 + b/test/javax/net/ssl/templates/SSLSocketTemplate.java | 432 - b/test/jdk/internal/platform/docker/Dockerfile-BasicTest | 2 b/test/security/infra/java/security/cert/CertPathValidator/certification/SSLCA.java | 489 + b/test/sun/net/www/http/HttpClient/B8025710.java | 2 b/test/sun/net/www/protocol/https/ChunkedOutputStream.java | 10 b/test/sun/net/www/protocol/https/HttpsClient/ProxyAuthTest.java | 250 b/test/sun/net/www/protocol/https/HttpsClient/ServerIdentityTest.java | 132 b/test/sun/net/www/protocol/https/HttpsURLConnection/B6216082.java | 192 b/test/sun/net/www/protocol/https/HttpsURLConnection/CloseKeepAliveCached.java | 2 b/test/sun/net/www/protocol/https/HttpsURLConnection/CookieHandlerTest.java | 2 b/test/sun/net/www/protocol/https/HttpsURLConnection/CookieHttpsClientTest.java | 2 b/test/sun/net/www/protocol/https/HttpsURLConnection/DNSIdentities.java | 2 b/test/sun/net/www/protocol/https/HttpsURLConnection/HttpsCreateSockTest.java | 2 b/test/sun/net/www/protocol/https/HttpsURLConnection/HttpsPost.java | 2 b/test/sun/net/www/protocol/https/HttpsURLConnection/HttpsSocketFacTest.java | 2 b/test/sun/net/www/protocol/https/HttpsURLConnection/IPAddressDNSIdentities.java | 2 b/test/sun/net/www/protocol/https/HttpsURLConnection/IPAddressIPIdentities.java | 2 b/test/sun/net/www/protocol/https/HttpsURLConnection/IPIdentities.java | 2 b/test/sun/net/www/protocol/https/HttpsURLConnection/Identities.java | 2 b/test/sun/net/www/protocol/https/HttpsURLConnection/ImpactOnSNI.java | 2 b/test/sun/net/www/protocol/https/HttpsURLConnection/PostThruProxy.java | 2 b/test/sun/net/www/protocol/https/HttpsURLConnection/PostThruProxyWithAuth.java | 2 b/test/sun/net/www/protocol/https/HttpsURLConnection/ReadTimeout.java | 347 b/test/sun/net/www/protocol/https/HttpsURLConnection/Redirect.java | 2 b/test/sun/net/www/protocol/https/HttpsURLConnection/RetryHttps.java | 2 b/test/sun/net/www/protocol/https/NewImpl/ComHTTPSConnection.java | 391 + b/test/sun/net/www/protocol/https/NewImpl/ComHostnameVerifier.java | 360 b/test/sun/net/www/protocol/https/NewImpl/JavaxHTTPSConnection.java | 2 b/test/sun/security/lib/cacerts/VerifyCACerts.java | 12 b/test/sun/security/pkcs11/Cipher/ReinitCipher.java | 17 b/test/sun/security/pkcs11/Cipher/Test4512704.java | 76 b/test/sun/security/pkcs11/Cipher/TestCICOWithGCM.java | 109 b/test/sun/security/pkcs11/Cipher/TestCICOWithGCMAndAAD.java | 122 b/test/sun/security/pkcs11/Cipher/TestGCMKeyAndIvCheck.java | 197 b/test/sun/security/pkcs11/Cipher/TestKATForGCM.java | 322 b/test/sun/security/pkcs11/Cipher/TestPKCS5PaddingError.java | 26 b/test/sun/security/pkcs11/Cipher/TestRSACipher.java | 24 b/test/sun/security/pkcs11/Cipher/TestRSACipherWrap.java | 22 b/test/sun/security/pkcs11/Cipher/TestRawRSACipher.java | 19 b/test/sun/security/pkcs11/Cipher/TestSymmCiphers.java | 24 b/test/sun/security/pkcs11/Cipher/TestSymmCiphersNoPad.java | 28 b/test/sun/security/pkcs11/KeyAgreement/TestDH.java | 20 b/test/sun/security/pkcs11/KeyAgreement/TestInterop.java | 21 b/test/sun/security/pkcs11/KeyAgreement/TestShort.java | 21 b/test/sun/security/pkcs11/KeyGenerator/DESParity.java | 22 b/test/sun/security/pkcs11/KeyGenerator/TestKeyGenerator.java | 18 b/test/sun/security/pkcs11/KeyPairGenerator/TestDH2048.java | 15 b/test/sun/security/pkcs11/Mac/MacKAT.java | 7 b/test/sun/security/pkcs11/Mac/MacSameTest.java | 7 b/test/sun/security/pkcs11/Mac/ReinitMac.java | 17 b/test/sun/security/pkcs11/MessageDigest/ByteBuffers.java | 61 b/test/sun/security/pkcs11/MessageDigest/DigestKAT.java | 21 b/test/sun/security/pkcs11/MessageDigest/ReinitDigest.java | 14 b/test/sun/security/pkcs11/MessageDigest/TestCloning.java | 14 b/test/sun/security/pkcs11/PKCS11Test.java | 150 b/test/sun/security/pkcs11/Secmod/AddPrivateKey.java | 32 b/test/sun/security/pkcs11/Secmod/AddTrustedCert.java | 28 b/test/sun/security/pkcs11/Secmod/Crypto.java | 15 b/test/sun/security/pkcs11/Secmod/GetPrivateKey.java | 25 b/test/sun/security/pkcs11/Secmod/JksSetPrivateKey.java | 39 b/test/sun/security/pkcs11/Secmod/LoadKeystore.java | 10 b/test/sun/security/pkcs11/Secmod/README-SQLITE | 8 b/test/sun/security/pkcs11/Secmod/TestNssDbSqlite.java | 127 b/test/sun/security/pkcs11/Secmod/TrustAnchors.java | 25 b/test/sun/security/pkcs11/Secmod/nss-sqlite.cfg | 13 b/test/sun/security/pkcs11/Secmod/policy | 6 b/test/sun/security/pkcs11/SecmodTest.java | 23 b/test/sun/security/pkcs11/SecureRandom/Basic.java | 16 b/test/sun/security/pkcs11/Signature/ByteBuffers.java | 17 b/test/sun/security/pkcs11/Signature/InitAgainPSS.java | 87 b/test/sun/security/pkcs11/Signature/KeyAndParamCheckForPSS.java | 132 b/test/sun/security/pkcs11/Signature/SigInteropPSS.java | 121 b/test/sun/security/pkcs11/Signature/SignatureTestPSS.java | 147 b/test/sun/security/pkcs11/Signature/TestDSA.java | 25 b/test/sun/security/pkcs11/Signature/TestDSA2.java | 93 b/test/sun/security/pkcs11/Signature/TestDSAKeyLength.java | 18 b/test/sun/security/pkcs11/Signature/TestRSAKeyLength.java | 18 b/test/sun/security/pkcs11/ec/ReadCertificates.java | 54 b/test/sun/security/pkcs11/ec/ReadPKCS12.java | 83 b/test/sun/security/pkcs11/ec/TestCurves.java | 32 b/test/sun/security/pkcs11/ec/TestECDH.java | 30 b/test/sun/security/pkcs11/ec/TestECDH2.java | 40 b/test/sun/security/pkcs11/ec/TestECDSA.java | 32 b/test/sun/security/pkcs11/ec/TestECDSA2.java | 37 b/test/sun/security/pkcs11/ec/TestECGenSpec.java | 21 b/test/sun/security/pkcs11/ec/TestKeyFactory.java | 26 b/test/sun/security/pkcs11/ec/policy | 7 b/test/sun/security/pkcs11/fips/ClientJSSEServerJSSE.java | 2 b/test/sun/security/pkcs11/fips/TrustManagerTest.java | 37 b/test/sun/security/pkcs11/fips/TrustManagerTest.policy | 3 b/test/sun/security/pkcs11/policy | 3 b/test/sun/security/pkcs11/rsa/KeyWrap.java | 30 b/test/sun/security/pkcs11/rsa/TestCACerts.java | 33 b/test/sun/security/pkcs11/rsa/TestCACerts.policy | 7 b/test/sun/security/pkcs11/rsa/TestKeyFactory.java | 19 b/test/sun/security/pkcs11/rsa/TestKeyPairGenerator.java | 23 b/test/sun/security/pkcs11/rsa/TestKeyPairGenerator.policy | 4 b/test/sun/security/pkcs11/rsa/TestSignatures.java | 41 b/test/sun/security/pkcs11/rsa/rsakeys.ks.policy | 4 b/test/sun/security/pkcs11/sslecc/CipherTest.java | 196 b/test/sun/security/pkcs11/sslecc/ClientJSSEServerJSSE.java | 31 b/test/sun/security/pkcs11/sslecc/JSSEClient.java | 41 b/test/sun/security/pkcs11/sslecc/JSSEServer.java | 56 b/test/sun/security/pkcs11/sslecc/policy | 9 b/test/sun/security/pkcs11/tls/TestKeyMaterial.java | 216 b/test/sun/security/pkcs11/tls/TestLeadingZeroesP11.java | 22 b/test/sun/security/pkcs11/tls/TestMasterSecret.java | 165 b/test/sun/security/pkcs11/tls/TestMasterSecret.policy | 8 b/test/sun/security/pkcs11/tls/TestPRF.java | 164 b/test/sun/security/pkcs11/tls/TestPremaster.java | 11 b/test/sun/security/pkcs11/tls/policy | 5 b/test/sun/security/provider/X509Factory/BadPem.java | 2 b/test/sun/security/provider/X509Factory/BigCRL.java | 2 b/test/sun/security/provider/certpath/Extensions/OCSPNonceExtensionTests.java | 366 b/test/sun/security/provider/certpath/ResponderId/ResponderIdTests.java | 419 + b/test/sun/security/ssl/AppInputStream/ReadBlocksClose.java | 327 b/test/sun/security/ssl/AppInputStream/ReadHandshake.java | 317 b/test/sun/security/ssl/AppInputStream/ReadZeroBytes.java | 2 b/test/sun/security/ssl/AppInputStream/RemoveMarkReset.java | 2 b/test/sun/security/ssl/AppOutputStream/NoExceptionOnClose.java | 284 b/test/sun/security/ssl/CertPathRestrictions/JSSEServer.java | 4 b/test/sun/security/ssl/CertPathRestrictions/TLSRestrictions.java | 21 b/test/sun/security/ssl/CipherSuite/SSL_NULL.java | 96 b/test/sun/security/ssl/ClientHandshaker/CipherSuiteOrder.java | 2 b/test/sun/security/ssl/ClientHandshaker/LengthCheckTest.java | 817 ++ b/test/sun/security/ssl/DHKeyExchange/DHEKeySizing.java | 503 + b/test/sun/security/ssl/DHKeyExchange/LegacyDHEKeyExchange.java | 8 b/test/sun/security/ssl/DHKeyExchange/UseStrongDHSizes.java | 111 b/test/sun/security/ssl/EngineArgs/DebugReportsOneExtraByte.java | 2 b/test/sun/security/ssl/EngineArgs/DebugReportsOneExtraByte.sh | 81 b/test/sun/security/ssl/GenSSLConfigs/main.java | 275 b/test/sun/security/ssl/HandshakeOutStream/NullCerts.java | 3 b/test/sun/security/ssl/InputRecord/ClientHelloRead.java | 2 b/test/sun/security/ssl/InputRecord/SSLSocketTimeoutNulls.java | 291 b/test/sun/security/ssl/ProtocolVersion/HttpsProtocols.java | 2 b/test/sun/security/ssl/SSLContextImpl/BadKSProvider.java | 2 b/test/sun/security/ssl/SSLContextImpl/BadTSProvider.java | 2 b/test/sun/security/ssl/SSLContextImpl/CustomizedCipherSuites.java | 2 b/test/sun/security/ssl/SSLContextImpl/CustomizedDefaultProtocols.java | 272 b/test/sun/security/ssl/SSLContextImpl/CustomizedServerDefaultProtocols.java | 289 b/test/sun/security/ssl/SSLContextImpl/DefaultEnabledProtocols.java | 271 b/test/sun/security/ssl/SSLContextImpl/GoodProvider.java | 2 b/test/sun/security/ssl/SSLContextImpl/MD2InTrustAnchor.java | 331 b/test/sun/security/ssl/SSLContextImpl/NoOldVersionContext.java | 273 b/test/sun/security/ssl/SSLContextImpl/TrustTrustedCert.java | 327 b/test/sun/security/ssl/SSLEngineImpl/CloseEngineException.java | 294 b/test/sun/security/ssl/SSLEngineImpl/CloseStart.java | 124 b/test/sun/security/ssl/SSLEngineImpl/DelegatedTaskWrongException.java | 2 b/test/sun/security/ssl/SSLEngineImpl/EmptyExtensionData.java | 2 b/test/sun/security/ssl/SSLEngineImpl/EngineEnforceUseClientMode.java | 321 b/test/sun/security/ssl/SSLEngineImpl/RehandshakeFinished.java | 523 + b/test/sun/security/ssl/SSLEngineImpl/SSLEngineBadBufferArrayAccess.java | 616 + b/test/sun/security/ssl/SSLEngineImpl/SSLEngineDeadlock.java | 412 + b/test/sun/security/ssl/SSLEngineImpl/SSLEngineFailedALPN.java | 449 + b/test/sun/security/ssl/SSLEngineImpl/SSLEngineKeyLimit.java | 482 + b/test/sun/security/ssl/SSLEngineImpl/TLS13BeginHandshake.java | 193 b/test/sun/security/ssl/SSLSessionImpl/HashCodeMissing.java | 2 b/test/sun/security/ssl/SSLSessionImpl/ResumeChecksClient.java | 346 b/test/sun/security/ssl/SSLSessionImpl/ResumeChecksServer.java | 307 b/test/sun/security/ssl/SSLSocketImpl/AsyncSSLSocketClose.java | 139 b/test/sun/security/ssl/SSLSocketImpl/CheckMethods.java | 142 b/test/sun/security/ssl/SSLSocketImpl/ClientModeClientAuth.java | 2 b/test/sun/security/ssl/SSLSocketImpl/ClientTimeout.java | 371 b/test/sun/security/ssl/SSLSocketImpl/CloseSocketException.java | 2 b/test/sun/security/ssl/SSLSocketImpl/InvalidateServerSessionRenegotiate.java | 325 b/test/sun/security/ssl/SSLSocketImpl/LargePacketAfterHandshakeTest.java | 183 b/test/sun/security/ssl/SSLSocketImpl/NewSocketMethods.java | 2 b/test/sun/security/ssl/SSLSocketImpl/NoImpactServerRenego.java | 326 b/test/sun/security/ssl/SSLSocketImpl/NonAutoClose.java | 380 + b/test/sun/security/ssl/SSLSocketImpl/NotifyHandshakeTest.java | 2 b/test/sun/security/ssl/SSLSocketImpl/RejectClientRenego.java | 340 b/test/sun/security/ssl/SSLSocketImpl/ReuseAddr.java | 2 b/test/sun/security/ssl/SSLSocketImpl/ReverseNameLookup.java | 2 b/test/sun/security/ssl/SSLSocketImpl/SSLExceptionForIOIssue.java | 162 b/test/sun/security/ssl/SSLSocketImpl/SSLSocketCloseHang.java | 2 b/test/sun/security/ssl/SSLSocketImpl/SSLSocketImplThrowsWrongExceptions.java | 315 b/test/sun/security/ssl/SSLSocketImpl/SSLSocketKeyLimit.java | 302 b/test/sun/security/ssl/SSLSocketImpl/ServerRenegoWithTwoVersions.java | 329 b/test/sun/security/ssl/SSLSocketImpl/ServerTimeout.java | 2 b/test/sun/security/ssl/SSLSocketImpl/SetClientMode.java | 189 b/test/sun/security/ssl/SSLSocketImpl/UnconnectedSocketWrongExceptions.java | 2 b/test/sun/security/ssl/ServerHandshaker/AnonCipherWithWantClientAuth.java | 87 b/test/sun/security/ssl/ServerHandshaker/GetPeerHost.java | 2 b/test/sun/security/ssl/ServerHandshaker/GetPeerHostClient.java | 1 b/test/sun/security/ssl/ServerHandshaker/GetPeerHostServer.java | 2 b/test/sun/security/ssl/ServerHandshaker/HelloExtensionsTest.java | 2 b/test/sun/security/ssl/SignatureScheme/Tls13NamedGroups.java | 188 b/test/sun/security/ssl/SocketCreation/SocketCreation.java | 511 + b/test/sun/security/ssl/Stapling/StatusResponseManager.sh | 100 b/test/sun/security/ssl/Stapling/java.base/sun/security/ssl/StatusResponseManagerTests.java | 492 + b/test/sun/security/ssl/X509KeyManager/PreferredKey.java | 2 b/test/sun/security/ssl/X509KeyManager/SelectOneKeyOutOfMany.java | 2 b/test/sun/security/ssl/X509TrustManagerImpl/BasicConstraints.java | 565 + b/test/sun/security/ssl/X509TrustManagerImpl/CertRequestOverflow.java | 417 + b/test/sun/security/ssl/X509TrustManagerImpl/CheckNullEntity.java | 2 b/test/sun/security/ssl/X509TrustManagerImpl/ClientServer.java | 364 b/test/sun/security/ssl/X509TrustManagerImpl/SelfIssuedCert.java | 413 + b/test/sun/security/ssl/X509TrustManagerImpl/Symantec/Distrust.java | 269 b/test/sun/security/ssl/X509TrustManagerImpl/X509ExtendedTMEnabled.java | 2 b/test/sun/security/ssl/internal/TestRun.sh | 93 b/test/sun/security/ssl/internal/java.base/sun/security/ssl/TestHkdf.java | 260 b/test/sun/security/ssl/spi/ProviderInit.java | 2 b/test/sun/security/tools/keytool/PrintSSL.java | 2 670 files changed, 101443 insertions(+), 55250 deletions(-) diffstat for hotspot b/.hgtags | 1 b/THIRD_PARTY_README | 41 +++++++++ b/make/aix/makefiles/buildtree.make | 2 b/make/aix/makefiles/vm.make | 2 b/make/bsd/makefiles/buildtree.make | 2 b/make/bsd/makefiles/vm.make | 2 b/make/linux/makefiles/buildtree.make | 2 b/make/linux/makefiles/vm.make | 2 b/make/solaris/makefiles/buildtree.make | 2 b/make/solaris/makefiles/vm.make | 2 b/src/share/vm/compiler/disassembler.cpp | 28 +++--- b/src/share/vm/opto/output.cpp | 2 b/src/share/vm/prims/jniCheck.cpp | 9 -- b/src/share/vm/runtime/globals.hpp | 2 b/src/share/vm/utilities/globalDefinitions.hpp | 1 b/src/share/vm/utilities/stack.inline.hpp | 7 - b/test/runtime/CommandLine/TraceExceptionsTest.java | 5 - b/test/runtime/containers/docker/CheckOperatingSystemMXBean.java | 43 ++++++++++ b/test/runtime/containers/docker/Dockerfile-BasicTest | 2 b/test/runtime/containers/docker/TestCPUAwareness.java | 29 ++++++ b/test/runtime/containers/docker/TestMemoryAwareness.java | 34 +++++++ 21 files changed, 181 insertions(+), 39 deletions(-) Successfully built on x86, x86_64, s390 (Zero), s390x (Zero), ppc (Zero), ppc64, ppc64le, aarch32 (Zero) & aarch64. Ok to push? Thanks, -- Andrew :) Senior Free Java Software Engineer OpenJDK Package Owner Red Hat, Inc. (http://www.redhat.com) PGP Key: ed25519/0xCFDA0F9B35964222 (hkp://keys.gnupg.net) Fingerprint = 5132 579D D154 0ED2 3E04 C5A0 CFDA 0F9B 3596 4222 From shade at redhat.com Mon Sep 7 07:58:55 2020 From: shade at redhat.com (Aleksey Shipilev) Date: Mon, 7 Sep 2020 09:58:55 +0200 Subject: [aarch64-port-dev ] [RFR] [8u] 8u272-b06 Upstream Sync In-Reply-To: <20200907072946.GF1707023@stopbrexit> References: <20200907072946.GF1707023@stopbrexit> Message-ID: <360e6306-c213-ce94-7241-f841b81ffdcc@redhat.com> On 9/7/20 9:29 AM, Andrew Hughes wrote: > Webrevs: https://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/ > > Merge changesets: > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/corba/merge.changeset > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/jaxp/merge.changeset > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/jaxws/merge.changeset Look trivially good. > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/jdk/merge.changeset Looks like TLS 1.3 integration. Seems fine. > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/hotspot/merge.changeset Looks good. > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/langtools/merge.changeset Looks good. > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/nashorn/merge.changeset > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/root/merge.changeset Look good. > Ok to push? Yes. -- Thanks, -Aleksey From goetz.lindenmaier at sap.com Mon Sep 7 09:46:00 2020 From: goetz.lindenmaier at sap.com (Lindenmaier, Goetz) Date: Mon, 7 Sep 2020 09:46:00 +0000 Subject: [aarch64-port-dev ] Crashes on ppc/s390 after 8231441: AArch64: Initial SVE backend support In-Reply-To: References: Message-ID: Hi Ningsheng, I also opened an issue for this: https://bugs.openjdk.java.net/browse/JDK-8252846 So far, your proposed fix helps, I now put it into our testing queue. I would already have posted the webrev, but I guess I need to do it with skara ... where I first have to look at the new tooling. Best regards Goetz. -----Original Message----- From: Lindenmaier, Goetz Sent: Montag, 7. September 2020 09:07 To: Ningsheng Jian ; hotspot-compiler-dev at openjdk.java.net Cc: aarch64-port-dev at openjdk.java.net Subject: RE: Crashes on ppc/s390 after 8231441: AArch64: Initial SVE backend support HI, Thanks for the hint! Sounds good, I'll give it a try. ... I removed some emails to reduce traffic. Best regads, Goetz. -----Original Message----- From: Ningsheng Jian Sent: Montag, 7. September 2020 08:51 To: Lindenmaier, Goetz ; Andrew Dinn ; hotspot-compiler-dev at openjdk.java.net; build-dev at openjdk.java.net; Vladimir Ivanov ; Erik ?sterlund Cc: aarch64-port-dev at openjdk.java.net; Doerr, Martin Subject: RE: Crashes on ppc/s390 after 8231441: AArch64: Initial SVE backend support Hi Goetz, I am sorry about that and thanks for helping to identify the issue. As I cannot reproduce this on x86 and AArch64, a quick guess is that I may have missed the code like: diff --git a/src/hotspot/share/opto/type.cpp b/src/hotspot/share/opto/type.cpp index 2f4047dfa8e..f7d2f5b2320 100644 --- a/src/hotspot/share/opto/type.cpp +++ b/src/hotspot/share/opto/type.cpp @@ -62,12 +62,14 @@ const Type::TypeInfo Type::_type_info[Type::lastype] = { { Bad, T_ARRAY, "array:", false, Node::NotAMachineReg, relocInfo::none }, // Array #if defined(PPC64) + { Bad, T_ILLEGAL, "vectora:", false, Op_VecA, relocInfo::none }, // VectorA. { Bad, T_ILLEGAL, "vectors:", false, 0, relocInfo::none }, // VectorS { Bad, T_ILLEGAL, "vectord:", false, Op_RegL, relocInfo::none }, // VectorD { Bad, T_ILLEGAL, "vectorx:", false, Op_VecX, relocInfo::none }, // VectorX { Bad, T_ILLEGAL, "vectory:", false, 0, relocInfo::none }, // VectorY { Bad, T_ILLEGAL, "vectorz:", false, 0, relocInfo::none }, // VectorZ #elif defined(S390) + { Bad, T_ILLEGAL, "vectora:", false, Op_VecA, relocInfo::none }, // VectorA. { Bad, T_ILLEGAL, "vectors:", false, 0, relocInfo::none }, // VectorS { Bad, T_ILLEGAL, "vectord:", false, Op_RegL, relocInfo::none }, // VectorD { Bad, T_ILLEGAL, "vectorx:", false, 0, relocInfo::none }, // VectorX Could you please help to have a try? Thanks, Ningsheng > -----Original Message----- > From: Lindenmaier, Goetz > Sent: Monday, September 7, 2020 2:35 PM > To: Ningsheng Jian ; Andrew Dinn ; > hotspot-compiler-dev at openjdk.java.net; build-dev at openjdk.java.net; Vladimir > Ivanov ; Erik ?sterlund > Cc: aarch64-port-dev at openjdk.java.net; Doerr, Martin > Subject: Crashes on ppc/s390 after 8231441: AArch64: Initial SVE backend support > > Hi > > Since that change was pushed, the vm crashes in the build: > > To suppress the following error report, specify this argument # after -XX: or > in .hotspotrc: SuppressErrorAt=/type.cpp:1022 # # A fatal error has been detected by > the Java Runtime Environment: > # > # Internal Error (/usr/work/... /share/opto/type.cpp:1022), pid=28717, tid=28983 # > assert(_type_info[base()].dual_type != Bad) failed: implement with v-call # # JRE > version: OpenJDK Runtime Environment (16.0.0.1) (fastdebug build 16.0.0.1- > internal+0-adhoc.openjdk.jdk) > # Java VM: OpenJDK 64-Bit Server VM (fastdebug 16.0.0.1-internal+0- > adhoc.openjdk.jdk, mixed mode, tiered, compressed oops, g1 gc, linux-ppc64) # > Problematic frame: > # V [libjvm.so+0x1bfe22c] Type::xdual() const+0xfc # # No core dump will be written. > Core dumps have been disabled. To enable core dumping, try "ulimit -c unlimited" > before starting Java again > > Do you have an ad-hoc idea of the problem? > > I locally backed out the change which fixed the issue. > > Best regards, > Goetz. IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you. From Ningsheng.Jian at arm.com Mon Sep 7 10:13:51 2020 From: Ningsheng.Jian at arm.com (Ningsheng Jian) Date: Mon, 7 Sep 2020 10:13:51 +0000 Subject: [aarch64-port-dev ] Crashes on ppc/s390 after 8231441: AArch64: Initial SVE backend support In-Reply-To: References: , Message-ID: Hi Goetz, Thanks for taking care of this. I will mark https://bugs.openjdk.java.net/browse/JDK-8252855 as duplicate. Thanks, Ningsheng ________________________________ From: Lindenmaier, Goetz Sent: Monday, September 7, 2020 5:46 PM To: Ningsheng Jian ; hotspot-compiler-dev at openjdk.java.net Cc: aarch64-port-dev at openjdk.java.net Subject: RE: Crashes on ppc/s390 after 8231441: AArch64: Initial SVE backend support Hi Ningsheng, I also opened an issue for this: https://bugs.openjdk.java.net/browse/JDK-8252846 So far, your proposed fix helps, I now put it into our testing queue. I would already have posted the webrev, but I guess I need to do it with skara ... where I first have to look at the new tooling. Best regards Goetz. -----Original Message----- From: Lindenmaier, Goetz Sent: Montag, 7. September 2020 09:07 To: Ningsheng Jian ; hotspot-compiler-dev at openjdk.java.net Cc: aarch64-port-dev at openjdk.java.net Subject: RE: Crashes on ppc/s390 after 8231441: AArch64: Initial SVE backend support HI, Thanks for the hint! Sounds good, I'll give it a try. ... I removed some emails to reduce traffic. Best regads, Goetz. -----Original Message----- From: Ningsheng Jian Sent: Montag, 7. September 2020 08:51 To: Lindenmaier, Goetz ; Andrew Dinn ; hotspot-compiler-dev at openjdk.java.net; build-dev at openjdk.java.net; Vladimir Ivanov ; Erik ?sterlund Cc: aarch64-port-dev at openjdk.java.net; Doerr, Martin Subject: RE: Crashes on ppc/s390 after 8231441: AArch64: Initial SVE backend support Hi Goetz, I am sorry about that and thanks for helping to identify the issue. As I cannot reproduce this on x86 and AArch64, a quick guess is that I may have missed the code like: diff --git a/src/hotspot/share/opto/type.cpp b/src/hotspot/share/opto/type.cpp index 2f4047dfa8e..f7d2f5b2320 100644 --- a/src/hotspot/share/opto/type.cpp +++ b/src/hotspot/share/opto/type.cpp @@ -62,12 +62,14 @@ const Type::TypeInfo Type::_type_info[Type::lastype] = { { Bad, T_ARRAY, "array:", false, Node::NotAMachineReg, relocInfo::none }, // Array #if defined(PPC64) + { Bad, T_ILLEGAL, "vectora:", false, Op_VecA, relocInfo::none }, // VectorA. { Bad, T_ILLEGAL, "vectors:", false, 0, relocInfo::none }, // VectorS { Bad, T_ILLEGAL, "vectord:", false, Op_RegL, relocInfo::none }, // VectorD { Bad, T_ILLEGAL, "vectorx:", false, Op_VecX, relocInfo::none }, // VectorX { Bad, T_ILLEGAL, "vectory:", false, 0, relocInfo::none }, // VectorY { Bad, T_ILLEGAL, "vectorz:", false, 0, relocInfo::none }, // VectorZ #elif defined(S390) + { Bad, T_ILLEGAL, "vectora:", false, Op_VecA, relocInfo::none }, // VectorA. { Bad, T_ILLEGAL, "vectors:", false, 0, relocInfo::none }, // VectorS { Bad, T_ILLEGAL, "vectord:", false, Op_RegL, relocInfo::none }, // VectorD { Bad, T_ILLEGAL, "vectorx:", false, 0, relocInfo::none }, // VectorX Could you please help to have a try? Thanks, Ningsheng > -----Original Message----- > From: Lindenmaier, Goetz > Sent: Monday, September 7, 2020 2:35 PM > To: Ningsheng Jian ; Andrew Dinn ; > hotspot-compiler-dev at openjdk.java.net; build-dev at openjdk.java.net; Vladimir > Ivanov ; Erik ?sterlund > Cc: aarch64-port-dev at openjdk.java.net; Doerr, Martin > Subject: Crashes on ppc/s390 after 8231441: AArch64: Initial SVE backend support > > Hi > > Since that change was pushed, the vm crashes in the build: > > To suppress the following error report, specify this argument # after -XX: or > in .hotspotrc: SuppressErrorAt=/type.cpp:1022 # # A fatal error has been detected by > the Java Runtime Environment: > # > # Internal Error (/usr/work/... /share/opto/type.cpp:1022), pid=28717, tid=28983 # > assert(_type_info[base()].dual_type != Bad) failed: implement with v-call # # JRE > version: OpenJDK Runtime Environment (16.0.0.1) (fastdebug build 16.0.0.1- > internal+0-adhoc.openjdk.jdk) > # Java VM: OpenJDK 64-Bit Server VM (fastdebug 16.0.0.1-internal+0- > adhoc.openjdk.jdk, mixed mode, tiered, compressed oops, g1 gc, linux-ppc64) # > Problematic frame: > # V [libjvm.so+0x1bfe22c] Type::xdual() const+0xfc # # No core dump will be written. > Core dumps have been disabled. To enable core dumping, try "ulimit -c unlimited" > before starting Java again > > Do you have an ad-hoc idea of the problem? > > I locally backed out the change which fixed the issue. > > Best regards, > Goetz. IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you. From zhuoren.wz at alibaba-inc.com Mon Sep 7 11:49:35 2020 From: zhuoren.wz at alibaba-inc.com (=?UTF-8?B?V2FuZyBaaHVvKFpodW9yZW4p?=) Date: Mon, 07 Sep 2020 19:49:35 +0800 Subject: [aarch64-port-dev ] =?utf-8?b?WzE2XVtSRlJdW3NdOjgyNTI4MzU6UmV2?= =?utf-8?q?ert_fix_for_JDK-8246051?= Message-ID: <743d73d5-36cc-4a1e-bc13-96bb27c8ab8e.zhuoren.wz@alibaba-inc.com> As discussed before, this patch is to revert JDK-8246051(SIGBUS by unaligned Unsafe compare_and_swap). Please review. JDK bug: https://bugs.openjdk.java.net/browse/JDK-8252835 Patch: http://cr.openjdk.java.net/~wzhuo/8252835/webrev.00/ Regards, Zhuoren From david.holmes at oracle.com Mon Sep 7 13:29:17 2020 From: david.holmes at oracle.com (David Holmes) Date: Mon, 7 Sep 2020 23:29:17 +1000 Subject: [aarch64-port-dev ] [16][RFR][s]:8252835:Revert fix for JDK-8246051 In-Reply-To: <743d73d5-36cc-4a1e-bc13-96bb27c8ab8e.zhuoren.wz@alibaba-inc.com> References: <743d73d5-36cc-4a1e-bc13-96bb27c8ab8e.zhuoren.wz@alibaba-inc.com> Message-ID: <989bb8a4-f33a-5a10-5b65-d9684e79a2e2@oracle.com> Hi Zhuoren, This needs to be done as a Pull Request (PR) now that we have transitoned to git/gitbub. Thanks, David On 7/09/2020 9:49 pm, Wang Zhuo(Zhuoren) wrote: > As discussed before, this patch is to revert > JDK-8246051(SIGBUS?by?unaligned?Unsafe?compare_and_swap). Please review. > JDK bug: https://bugs.openjdk.java.net/browse/JDK-8252835 > Patch: http://cr.openjdk.java.net/~wzhuo/8252835/webrev.00/ > > > Regards, > Zhuoren > From gnu.andrew at redhat.com Tue Sep 8 03:23:32 2020 From: gnu.andrew at redhat.com (gnu.andrew at redhat.com) Date: Tue, 08 Sep 2020 03:23:32 +0000 Subject: [aarch64-port-dev ] hg: aarch64-port/jdk8u-shenandoah: 6 new changesets Message-ID: <202009080323.0883NWnf017509@aojmv0008.oracle.com> Changeset: a586cbf3ac28 Author: zgu Date: 2020-08-25 11:04 -0400 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/rev/a586cbf3ac28 8244151: Update MUSCLE PC/SC-Lite headers to the latest release 1.8.26 Summary: Updated from 1.8.24 to 1.8.26 Reviewed-by: xuelei ! THIRD_PARTY_README Changeset: 10882ac79a93 Author: andrew Date: 2020-08-28 07:33 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/rev/10882ac79a93 Merge Changeset: e68b51b4e55a Author: mbalao Date: 2020-08-27 21:00 -0300 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/rev/e68b51b4e55a 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support Summary: Added support for GCM, PSS, and other mechanisms Reviewed-by: andrew ! THIRD_PARTY_README Changeset: fec6ed779ae6 Author: andrew Date: 2020-08-31 07:09 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/rev/fec6ed779ae6 Added tag jdk8u272-b06 for changeset e68b51b4e55a ! .hgtags Changeset: 7d4d156c1b31 Author: andrew Date: 2020-09-03 06:16 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/rev/7d4d156c1b31 Merge jdk8u272-b06 ! .hgtags ! THIRD_PARTY_README Changeset: 5d22a8fde6fa Author: andrew Date: 2020-09-03 06:17 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/rev/5d22a8fde6fa Added tag aarch64-shenandoah-jdk8u272-b06 for changeset 7d4d156c1b31 ! .hgtags From gnu.andrew at redhat.com Tue Sep 8 03:23:57 2020 From: gnu.andrew at redhat.com (gnu.andrew at redhat.com) Date: Tue, 08 Sep 2020 03:23:57 +0000 Subject: [aarch64-port-dev ] hg: aarch64-port/jdk8u-shenandoah/jaxws: 6 new changesets Message-ID: <202009080323.0883Nvpf017775@aojmv0008.oracle.com> Changeset: 5b2828785fb2 Author: valeriep Date: 2020-05-11 18:49 +0000 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jaxws/rev/5b2828785fb2 8244151: Update MUSCLE PC/SC-Lite headers to the latest release 1.8.26 Summary: Updated from 1.8.24 to 1.8.26 Reviewed-by: xuelei ! THIRD_PARTY_README Changeset: dbacfab58781 Author: andrew Date: 2020-08-28 07:33 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jaxws/rev/dbacfab58781 Merge Changeset: eb8412f04a3e Author: mbalao Date: 2020-08-27 21:00 -0300 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jaxws/rev/eb8412f04a3e 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support Summary: Added support for GCM, PSS, and other mechanisms Reviewed-by: andrew ! THIRD_PARTY_README Changeset: 52516d7a2504 Author: andrew Date: 2020-08-31 07:09 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jaxws/rev/52516d7a2504 Added tag jdk8u272-b06 for changeset eb8412f04a3e ! .hgtags Changeset: ce19b565f3ef Author: andrew Date: 2020-09-03 06:16 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jaxws/rev/ce19b565f3ef Merge jdk8u272-b06 ! .hgtags ! THIRD_PARTY_README Changeset: f95ea4bcaca2 Author: andrew Date: 2020-09-03 06:17 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jaxws/rev/f95ea4bcaca2 Added tag aarch64-shenandoah-jdk8u272-b06 for changeset ce19b565f3ef ! .hgtags From gnu.andrew at redhat.com Tue Sep 8 03:24:32 2020 From: gnu.andrew at redhat.com (gnu.andrew at redhat.com) Date: Tue, 08 Sep 2020 03:24:32 +0000 Subject: [aarch64-port-dev ] hg: aarch64-port/jdk8u-shenandoah/jdk: 34 new changesets Message-ID: <202009080324.0883OXkM018133@aojmv0008.oracle.com> Changeset: 61638f2cadb9 Author: valeriep Date: 2020-05-11 18:49 +0000 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/61638f2cadb9 8244151: Update MUSCLE PC/SC-Lite headers to the latest release 1.8.26 Summary: Updated from 1.8.24 to 1.8.26 Reviewed-by: xuelei ! THIRD_PARTY_README ! src/solaris/native/sun/security/smartcardio/MUSCLE/pcsclite.h Changeset: 4c96e2f298dc Author: andrew Date: 2020-08-26 03:54 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/4c96e2f298dc 8144539: Update PKCS11 tests to run with security manager Reviewed-by: mbalao ! test/sun/security/pkcs11/Cipher/ReinitCipher.java ! test/sun/security/pkcs11/Cipher/TestPKCS5PaddingError.java ! test/sun/security/pkcs11/Cipher/TestRSACipher.java ! test/sun/security/pkcs11/Cipher/TestRSACipherWrap.java ! test/sun/security/pkcs11/Cipher/TestRawRSACipher.java ! test/sun/security/pkcs11/Cipher/TestSymmCiphers.java ! test/sun/security/pkcs11/Cipher/TestSymmCiphersNoPad.java ! test/sun/security/pkcs11/KeyAgreement/TestDH.java ! test/sun/security/pkcs11/KeyAgreement/TestInterop.java ! test/sun/security/pkcs11/KeyAgreement/TestShort.java ! test/sun/security/pkcs11/KeyGenerator/DESParity.java ! test/sun/security/pkcs11/KeyGenerator/TestKeyGenerator.java ! test/sun/security/pkcs11/KeyPairGenerator/TestDH2048.java ! test/sun/security/pkcs11/Mac/MacKAT.java ! test/sun/security/pkcs11/Mac/MacSameTest.java ! test/sun/security/pkcs11/Mac/ReinitMac.java ! test/sun/security/pkcs11/MessageDigest/ByteBuffers.java ! test/sun/security/pkcs11/MessageDigest/DigestKAT.java ! test/sun/security/pkcs11/MessageDigest/ReinitDigest.java ! test/sun/security/pkcs11/MessageDigest/TestCloning.java ! test/sun/security/pkcs11/PKCS11Test.java ! test/sun/security/pkcs11/Secmod/AddPrivateKey.java ! test/sun/security/pkcs11/Secmod/AddTrustedCert.java ! test/sun/security/pkcs11/Secmod/Crypto.java ! test/sun/security/pkcs11/Secmod/GetPrivateKey.java ! test/sun/security/pkcs11/Secmod/JksSetPrivateKey.java ! test/sun/security/pkcs11/Secmod/LoadKeystore.java ! test/sun/security/pkcs11/Secmod/TrustAnchors.java + test/sun/security/pkcs11/Secmod/policy ! test/sun/security/pkcs11/SecureRandom/Basic.java ! test/sun/security/pkcs11/Signature/ByteBuffers.java ! test/sun/security/pkcs11/Signature/TestDSA.java ! test/sun/security/pkcs11/Signature/TestDSAKeyLength.java ! test/sun/security/pkcs11/Signature/TestRSAKeyLength.java ! test/sun/security/pkcs11/ec/ReadCertificates.java ! test/sun/security/pkcs11/ec/ReadPKCS12.java ! test/sun/security/pkcs11/ec/TestCurves.java ! test/sun/security/pkcs11/ec/TestECDH.java ! test/sun/security/pkcs11/ec/TestECDH2.java ! test/sun/security/pkcs11/ec/TestECDSA.java ! test/sun/security/pkcs11/ec/TestECDSA2.java ! test/sun/security/pkcs11/ec/TestECGenSpec.java ! test/sun/security/pkcs11/ec/TestKeyFactory.java + test/sun/security/pkcs11/ec/policy ! test/sun/security/pkcs11/fips/TrustManagerTest.java + test/sun/security/pkcs11/fips/TrustManagerTest.policy + test/sun/security/pkcs11/policy ! test/sun/security/pkcs11/rsa/KeyWrap.java ! test/sun/security/pkcs11/rsa/TestCACerts.java + test/sun/security/pkcs11/rsa/TestCACerts.policy ! test/sun/security/pkcs11/rsa/TestKeyFactory.java ! test/sun/security/pkcs11/rsa/TestKeyPairGenerator.java + test/sun/security/pkcs11/rsa/TestKeyPairGenerator.policy ! test/sun/security/pkcs11/rsa/TestSignatures.java + test/sun/security/pkcs11/rsa/rsakeys.ks.policy ! test/sun/security/pkcs11/sslecc/CipherTest.java + test/sun/security/pkcs11/sslecc/policy ! test/sun/security/pkcs11/tls/TestKeyMaterial.java ! test/sun/security/pkcs11/tls/TestLeadingZeroesP11.java ! test/sun/security/pkcs11/tls/TestMasterSecret.java + test/sun/security/pkcs11/tls/TestMasterSecret.policy ! test/sun/security/pkcs11/tls/TestPRF.java ! test/sun/security/pkcs11/tls/TestPremaster.java + test/sun/security/pkcs11/tls/policy Changeset: f88390a07754 Author: andrew Date: 2020-08-27 06:13 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/f88390a07754 Merge Changeset: 26c1140d2613 Author: sgehwolf Date: 2020-07-03 15:09 +0200 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/26c1140d2613 8226575: OperatingSystemMXBean should be made container aware Reviewed-by: andrew ! make/mapfiles/libmanagement/mapfile-vers ! src/aix/native/sun/management/AixOperatingSystem.c ! src/linux/classes/jdk/internal/platform/cgroupv1/Metrics.java ! src/linux/classes/jdk/internal/platform/cgroupv1/SubSystem.java ! src/share/classes/com/sun/management/OperatingSystemMXBean.java ! src/solaris/classes/sun/management/OperatingSystemImpl.java ! src/solaris/native/sun/management/LinuxOperatingSystem.c ! src/solaris/native/sun/management/MacosxOperatingSystem.c ! src/solaris/native/sun/management/OperatingSystemImpl.c ! src/solaris/native/sun/management/SolarisOperatingSystem.c Changeset: b52035c5f3fa Author: mseledtsov Date: 2019-03-08 11:08 -0800 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/b52035c5f3fa 8220313: [TESTBUG] Update base image for Docker testing to OL 7.6 Summary: Updated the OL version in Dockerfile in FROM field Reviewed-by: dcubed ! test/jdk/internal/platform/docker/Dockerfile-BasicTest Changeset: 060a9636fe44 Author: andrew Date: 2020-08-28 07:33 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/060a9636fe44 Merge Changeset: ef41e0d32c15 Author: darcy Date: 2019-06-28 18:51 -0700 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/ef41e0d32c15 8226809: Circular reference in printed stack trace is not correctly indented & ambiguous Reviewed-by: bpb ! src/share/classes/java/lang/Throwable.java Changeset: 47092994d86b Author: rhalade Date: 2020-08-03 11:35 -0700 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/47092994d86b 8243320: Add SSL root certificates to Oracle Root CA program Reviewed-by: mullan + make/data/cacerts/sslrooteccca + make/data/cacerts/sslrootevrsaca + make/data/cacerts/sslrootrsaca + test/security/infra/java/security/cert/CertPathValidator/certification/SSLCA.java ! test/sun/security/lib/cacerts/VerifyCACerts.java Changeset: 2dd87e7b528f Author: valeriep Date: 2020-02-28 15:09 -0300 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/2dd87e7b528f 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support 8169925: PKCS #11 Cryptographic Token Interface license 8238898: Missing hash characters for header on license file Summary: Added support for GCM, PSS, and other mechanisms Reviewed-by: jnimeh, phh, andrew ! THIRD_PARTY_README ! make/mapfiles/libj2pkcs11/mapfile-vers + src/share/classes/sun/security/pkcs11/P11AEADCipher.java + src/share/classes/sun/security/pkcs11/P11PSSSignature.java ! src/share/classes/sun/security/pkcs11/P11RSACipher.java ! src/share/classes/sun/security/pkcs11/SunPKCS11.java + src/share/classes/sun/security/pkcs11/wrapper/CK_CCM_PARAMS.java + src/share/classes/sun/security/pkcs11/wrapper/CK_GCM_PARAMS.java ! src/share/classes/sun/security/pkcs11/wrapper/CK_MECHANISM.java ! src/share/classes/sun/security/pkcs11/wrapper/CK_RSA_PKCS_PSS_PARAMS.java ! src/share/classes/sun/security/pkcs11/wrapper/Functions.java ! src/share/classes/sun/security/pkcs11/wrapper/PKCS11.java ! src/share/classes/sun/security/pkcs11/wrapper/PKCS11Constants.java ! src/share/classes/sun/security/pkcs11/wrapper/PKCS11Exception.java + src/share/classes/sun/security/util/GCMParameters.java ! src/share/native/sun/security/pkcs11/wrapper/p11_convert.c ! src/share/native/sun/security/pkcs11/wrapper/p11_crypt.c ! src/share/native/sun/security/pkcs11/wrapper/p11_digest.c ! src/share/native/sun/security/pkcs11/wrapper/p11_general.c ! src/share/native/sun/security/pkcs11/wrapper/p11_keymgmt.c ! src/share/native/sun/security/pkcs11/wrapper/p11_mutex.c ! src/share/native/sun/security/pkcs11/wrapper/p11_sign.c ! src/share/native/sun/security/pkcs11/wrapper/p11_util.c - src/share/native/sun/security/pkcs11/wrapper/pkcs-11v2-20a3.h ! src/share/native/sun/security/pkcs11/wrapper/pkcs11.h ! src/share/native/sun/security/pkcs11/wrapper/pkcs11f.h ! src/share/native/sun/security/pkcs11/wrapper/pkcs11t.h ! src/share/native/sun/security/pkcs11/wrapper/pkcs11wrapper.h + test/sun/security/pkcs11/Cipher/Test4512704.java + test/sun/security/pkcs11/Cipher/TestCICOWithGCM.java + test/sun/security/pkcs11/Cipher/TestCICOWithGCMAndAAD.java + test/sun/security/pkcs11/Cipher/TestGCMKeyAndIvCheck.java + test/sun/security/pkcs11/Cipher/TestKATForGCM.java ! test/sun/security/pkcs11/MessageDigest/ByteBuffers.java + test/sun/security/pkcs11/Signature/InitAgainPSS.java + test/sun/security/pkcs11/Signature/KeyAndParamCheckForPSS.java + test/sun/security/pkcs11/Signature/SigInteropPSS.java + test/sun/security/pkcs11/Signature/SignatureTestPSS.java + test/sun/security/pkcs11/Signature/TestDSA2.java Changeset: 58fad4aebb4c Author: shade Date: 2019-06-14 10:02 +0200 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/58fad4aebb4c 8225695: 32-bit build failures after JDK-8080462 (Update SunPKCS11 provider with PKCS11 v2.40 support) Reviewed-by: alanb ! src/share/native/sun/security/pkcs11/wrapper/p11_general.c ! src/share/native/sun/security/pkcs11/wrapper/p11_sign.c Changeset: d6cec711198e Author: weijun Date: 2017-12-13 01:29 +0800 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/d6cec711198e 8165996: PKCS11 using NSS throws an error regarding secmod.db when NSS uses sqlite Reviewed-by: weijun, andrew Contributed-by: Martin Balao ! src/share/classes/sun/security/pkcs11/Secmod.java + test/sun/security/pkcs11/Secmod/README-SQLITE + test/sun/security/pkcs11/Secmod/TestNssDbSqlite.java + test/sun/security/pkcs11/Secmod/cert9.db + test/sun/security/pkcs11/Secmod/key4.db + test/sun/security/pkcs11/Secmod/nss-sqlite.cfg ! test/sun/security/pkcs11/SecmodTest.java Changeset: 5f94741b3fc7 Author: mbalao Date: 2020-08-04 17:19 -0300 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/5f94741b3fc7 8251117: Cannot check P11Key size in P11Cipher and P11AEADCipher Reviewed-by: valeriep Contributed-by: zzambers at redhat.com ! src/share/classes/sun/security/pkcs11/P11AEADCipher.java ! src/share/classes/sun/security/pkcs11/P11Cipher.java Changeset: 7aaaf8998988 Author: robm Date: 2018-11-12 08:33 -0800 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/7aaaf8998988 8160768: Add capability to custom resolve host/domain names within the default JNDI LDAP provider Reviewed-by: alanb, dfuchs, chegar, mchung, vtewari + src/share/classes/com/sun/jndi/ldap/DefaultLdapDnsProvider.java ! src/share/classes/com/sun/jndi/ldap/LdapCtxFactory.java + src/share/classes/com/sun/jndi/ldap/LdapDnsProviderService.java ! src/share/classes/com/sun/jndi/ldap/ServiceLocator.java + src/share/classes/com/sun/jndi/ldap/spi/LdapDnsProvider.java + src/share/classes/com/sun/jndi/ldap/spi/LdapDnsProviderResult.java + test/com/sun/jndi/ldap/LdapDnsProviderTest.java + test/com/sun/jndi/ldap/dnsprovider/TestDnsProvider.java ! test/com/sun/security/auth/module/LdapLoginModule/CheckConfigs.policy Changeset: 7747b41df314 Author: valeriep Date: 2019-08-14 01:40 +0000 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/7747b41df314 8228835: Memory leak in PKCS11 provider when using AES GCM Summary: updated freeCKMechanismPtr to free mechanism-specific memories Reviewed-by: jnimeh, andrew ! src/share/native/sun/security/pkcs11/wrapper/p11_convert.c ! src/share/native/sun/security/pkcs11/wrapper/p11_keymgmt.c ! src/share/native/sun/security/pkcs11/wrapper/p11_util.c ! src/share/native/sun/security/pkcs11/wrapper/pkcs11wrapper.h Changeset: 17ce8aaff4bd Author: abakhtin Date: 2020-05-20 17:28 +0300 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/17ce8aaff4bd 8245467: Remove 8u TLSv1.2 implementation files Reviewed-by: mbalao - src/share/classes/sun/security/ssl/ALPNExtension.java - src/share/classes/sun/security/ssl/Alerts.java - src/share/classes/sun/security/ssl/AppInputStream.java - src/share/classes/sun/security/ssl/AppOutputStream.java - src/share/classes/sun/security/ssl/Authenticator.java - src/share/classes/sun/security/ssl/BaseSSLSocketImpl.java - src/share/classes/sun/security/ssl/ByteBufferInputStream.java - src/share/classes/sun/security/ssl/CipherBox.java - src/share/classes/sun/security/ssl/CipherSuite.java - src/share/classes/sun/security/ssl/CipherSuiteList.java - src/share/classes/sun/security/ssl/ClientHandshaker.java - src/share/classes/sun/security/ssl/DHClientKeyExchange.java - src/share/classes/sun/security/ssl/DHCrypt.java - src/share/classes/sun/security/ssl/Debug.java - src/share/classes/sun/security/ssl/ECDHClientKeyExchange.java - src/share/classes/sun/security/ssl/ECDHCrypt.java - src/share/classes/sun/security/ssl/EllipticCurvesExtension.java - src/share/classes/sun/security/ssl/EllipticPointFormatsExtension.java - src/share/classes/sun/security/ssl/EngineArgs.java - src/share/classes/sun/security/ssl/EngineInputRecord.java - src/share/classes/sun/security/ssl/EngineOutputRecord.java - src/share/classes/sun/security/ssl/EngineWriter.java - src/share/classes/sun/security/ssl/EphemeralKeyManager.java - src/share/classes/sun/security/ssl/ExtendedMasterSecretExtension.java - src/share/classes/sun/security/ssl/ExtensionType.java - src/share/classes/sun/security/ssl/HandshakeHash.java - src/share/classes/sun/security/ssl/HandshakeInStream.java - src/share/classes/sun/security/ssl/HandshakeMessage.java - src/share/classes/sun/security/ssl/HandshakeOutStream.java - src/share/classes/sun/security/ssl/HandshakeStateManager.java - src/share/classes/sun/security/ssl/Handshaker.java - src/share/classes/sun/security/ssl/HelloExtension.java - src/share/classes/sun/security/ssl/HelloExtensions.java - src/share/classes/sun/security/ssl/InputRecord.java - src/share/classes/sun/security/ssl/JsseJce.java - src/share/classes/sun/security/ssl/KeyManagerFactoryImpl.java - src/share/classes/sun/security/ssl/MAC.java - src/share/classes/sun/security/ssl/OutputRecord.java - src/share/classes/sun/security/ssl/ProtocolList.java - src/share/classes/sun/security/ssl/ProtocolVersion.java - src/share/classes/sun/security/ssl/RSAClientKeyExchange.java - src/share/classes/sun/security/ssl/RSASignature.java - src/share/classes/sun/security/ssl/RandomCookie.java - src/share/classes/sun/security/ssl/Record.java - src/share/classes/sun/security/ssl/RenegotiationInfoExtension.java - src/share/classes/sun/security/ssl/SSLAlgorithmConstraints.java - src/share/classes/sun/security/ssl/SSLAlgorithmDecomposer.java - src/share/classes/sun/security/ssl/SSLContextImpl.java - src/share/classes/sun/security/ssl/SSLEngineImpl.java - src/share/classes/sun/security/ssl/SSLServerSocketFactoryImpl.java - src/share/classes/sun/security/ssl/SSLServerSocketImpl.java - src/share/classes/sun/security/ssl/SSLSessionContextImpl.java - src/share/classes/sun/security/ssl/SSLSessionImpl.java - src/share/classes/sun/security/ssl/SSLSocketFactoryImpl.java - src/share/classes/sun/security/ssl/SSLSocketImpl.java - src/share/classes/sun/security/ssl/ServerHandshaker.java - src/share/classes/sun/security/ssl/ServerNameExtension.java - src/share/classes/sun/security/ssl/SessionId.java - src/share/classes/sun/security/ssl/SignatureAlgorithmsExtension.java - src/share/classes/sun/security/ssl/SignatureAndHashAlgorithm.java - src/share/classes/sun/security/ssl/SunX509KeyManagerImpl.java - src/share/classes/sun/security/ssl/TrustManagerFactoryImpl.java - src/share/classes/sun/security/ssl/TrustStoreManager.java - src/share/classes/sun/security/ssl/UnknownExtension.java - src/share/classes/sun/security/ssl/Utilities.java - src/share/classes/sun/security/ssl/X509KeyManagerImpl.java - src/share/classes/sun/security/ssl/X509TrustManagerImpl.java Changeset: d0b56fcd1708 Author: abakhtin Date: 2020-08-25 08:31 +0300 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/d0b56fcd1708 8245468: Add TLSv1.3 implementation classes from 11.0.7 Reviewed-by: mbalao + src/share/classes/sun/security/ssl/Alert.java + src/share/classes/sun/security/ssl/AlpnExtension.java + src/share/classes/sun/security/ssl/Authenticator.java + src/share/classes/sun/security/ssl/BaseSSLSocketImpl.java + src/share/classes/sun/security/ssl/CertSignAlgsExtension.java + src/share/classes/sun/security/ssl/CertStatusExtension.java + src/share/classes/sun/security/ssl/CertificateMessage.java + src/share/classes/sun/security/ssl/CertificateRequest.java + src/share/classes/sun/security/ssl/CertificateStatus.java + src/share/classes/sun/security/ssl/CertificateVerify.java + src/share/classes/sun/security/ssl/ChangeCipherSpec.java + src/share/classes/sun/security/ssl/CipherSuite.java + src/share/classes/sun/security/ssl/CipherType.java + src/share/classes/sun/security/ssl/Ciphertext.java + src/share/classes/sun/security/ssl/ClientAuthType.java + src/share/classes/sun/security/ssl/ClientHandshakeContext.java + src/share/classes/sun/security/ssl/ClientHello.java + src/share/classes/sun/security/ssl/ClientKeyExchange.java + src/share/classes/sun/security/ssl/ConnectionContext.java + src/share/classes/sun/security/ssl/ContentType.java + src/share/classes/sun/security/ssl/CookieExtension.java + src/share/classes/sun/security/ssl/DHClientKeyExchange.java + src/share/classes/sun/security/ssl/DHKeyExchange.java + src/share/classes/sun/security/ssl/DHServerKeyExchange.java + src/share/classes/sun/security/ssl/DTLSInputRecord.java + src/share/classes/sun/security/ssl/DTLSOutputRecord.java + src/share/classes/sun/security/ssl/DTLSRecord.java + src/share/classes/sun/security/ssl/ECDHClientKeyExchange.java + src/share/classes/sun/security/ssl/ECDHKeyExchange.java + src/share/classes/sun/security/ssl/ECDHServerKeyExchange.java + src/share/classes/sun/security/ssl/ECPointFormatsExtension.java + src/share/classes/sun/security/ssl/EncryptedExtensions.java + src/share/classes/sun/security/ssl/EphemeralKeyManager.java + src/share/classes/sun/security/ssl/ExtendedMasterSecretExtension.java + src/share/classes/sun/security/ssl/Finished.java + src/share/classes/sun/security/ssl/HKDF.java + src/share/classes/sun/security/ssl/HandshakeAbsence.java + src/share/classes/sun/security/ssl/HandshakeConsumer.java + src/share/classes/sun/security/ssl/HandshakeContext.java + src/share/classes/sun/security/ssl/HandshakeHash.java + src/share/classes/sun/security/ssl/HandshakeOutStream.java + src/share/classes/sun/security/ssl/HandshakeProducer.java + src/share/classes/sun/security/ssl/HelloCookieManager.java + src/share/classes/sun/security/ssl/HelloRequest.java + src/share/classes/sun/security/ssl/HelloVerifyRequest.java + src/share/classes/sun/security/ssl/InputRecord.java + src/share/classes/sun/security/ssl/JsseJce.java + src/share/classes/sun/security/ssl/KeyManagerFactoryImpl.java + src/share/classes/sun/security/ssl/KeyShareExtension.java + src/share/classes/sun/security/ssl/KeyUpdate.java + src/share/classes/sun/security/ssl/MaxFragExtension.java + src/share/classes/sun/security/ssl/NewSessionTicket.java + src/share/classes/sun/security/ssl/OutputRecord.java + src/share/classes/sun/security/ssl/Plaintext.java + src/share/classes/sun/security/ssl/PostHandshakeContext.java + src/share/classes/sun/security/ssl/PreSharedKeyExtension.java + src/share/classes/sun/security/ssl/PredefinedDHParameterSpecs.java + src/share/classes/sun/security/ssl/ProtocolVersion.java + src/share/classes/sun/security/ssl/PskKeyExchangeModesExtension.java + src/share/classes/sun/security/ssl/RSAClientKeyExchange.java + src/share/classes/sun/security/ssl/RSAKeyExchange.java + src/share/classes/sun/security/ssl/RSAServerKeyExchange.java + src/share/classes/sun/security/ssl/RSASignature.java + src/share/classes/sun/security/ssl/RandomCookie.java + src/share/classes/sun/security/ssl/Record.java + src/share/classes/sun/security/ssl/RenegoInfoExtension.java + src/share/classes/sun/security/ssl/SSLAlgorithmConstraints.java + src/share/classes/sun/security/ssl/SSLAlgorithmDecomposer.java + src/share/classes/sun/security/ssl/SSLAuthentication.java + src/share/classes/sun/security/ssl/SSLBasicKeyDerivation.java + src/share/classes/sun/security/ssl/SSLCipher.java + src/share/classes/sun/security/ssl/SSLConfiguration.java + src/share/classes/sun/security/ssl/SSLConsumer.java + src/share/classes/sun/security/ssl/SSLContextImpl.java + src/share/classes/sun/security/ssl/SSLCredentials.java + src/share/classes/sun/security/ssl/SSLEngineImpl.java + src/share/classes/sun/security/ssl/SSLEngineInputRecord.java + src/share/classes/sun/security/ssl/SSLEngineOutputRecord.java + src/share/classes/sun/security/ssl/SSLExtension.java + src/share/classes/sun/security/ssl/SSLExtensions.java + src/share/classes/sun/security/ssl/SSLHandshake.java + src/share/classes/sun/security/ssl/SSLHandshakeBinding.java + src/share/classes/sun/security/ssl/SSLKeyAgreement.java + src/share/classes/sun/security/ssl/SSLKeyAgreementGenerator.java + src/share/classes/sun/security/ssl/SSLKeyDerivation.java + src/share/classes/sun/security/ssl/SSLKeyDerivationGenerator.java + src/share/classes/sun/security/ssl/SSLKeyExchange.java + src/share/classes/sun/security/ssl/SSLLogger.java + src/share/classes/sun/security/ssl/SSLMasterKeyDerivation.java + src/share/classes/sun/security/ssl/SSLPossession.java + src/share/classes/sun/security/ssl/SSLPossessionGenerator.java + src/share/classes/sun/security/ssl/SSLProducer.java + src/share/classes/sun/security/ssl/SSLRecord.java + src/share/classes/sun/security/ssl/SSLSecretDerivation.java + src/share/classes/sun/security/ssl/SSLServerSocketFactoryImpl.java + src/share/classes/sun/security/ssl/SSLServerSocketImpl.java + src/share/classes/sun/security/ssl/SSLSessionContextImpl.java + src/share/classes/sun/security/ssl/SSLSessionImpl.java + src/share/classes/sun/security/ssl/SSLSocketFactoryImpl.java + src/share/classes/sun/security/ssl/SSLSocketImpl.java + src/share/classes/sun/security/ssl/SSLSocketInputRecord.java + src/share/classes/sun/security/ssl/SSLSocketOutputRecord.java + src/share/classes/sun/security/ssl/SSLStringizer.java + src/share/classes/sun/security/ssl/SSLTrafficKeyDerivation.java + src/share/classes/sun/security/ssl/SSLTransport.java + src/share/classes/sun/security/ssl/ServerHandshakeContext.java + src/share/classes/sun/security/ssl/ServerHello.java + src/share/classes/sun/security/ssl/ServerHelloDone.java + src/share/classes/sun/security/ssl/ServerKeyExchange.java + src/share/classes/sun/security/ssl/ServerNameExtension.java + src/share/classes/sun/security/ssl/SessionId.java + src/share/classes/sun/security/ssl/SignatureAlgorithmsExtension.java + src/share/classes/sun/security/ssl/SignatureScheme.java + src/share/classes/sun/security/ssl/StatusResponseManager.java ! src/share/classes/sun/security/ssl/SunJSSE.java + src/share/classes/sun/security/ssl/SunX509KeyManagerImpl.java + src/share/classes/sun/security/ssl/SupportedGroupsExtension.java + src/share/classes/sun/security/ssl/SupportedVersionsExtension.java + src/share/classes/sun/security/ssl/TransportContext.java + src/share/classes/sun/security/ssl/TrustManagerFactoryImpl.java + src/share/classes/sun/security/ssl/TrustStoreManager.java + src/share/classes/sun/security/ssl/Utilities.java + src/share/classes/sun/security/ssl/X509Authentication.java + src/share/classes/sun/security/ssl/X509KeyManagerImpl.java + src/share/classes/sun/security/ssl/X509TrustManagerImpl.java ! src/share/lib/security/java.security-aix ! src/share/lib/security/java.security-linux ! src/share/lib/security/java.security-macosx ! src/share/lib/security/java.security-solaris ! src/share/lib/security/java.security-windows Changeset: 646e29e5330b Author: abakhtin Date: 2020-08-25 08:35 +0300 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/646e29e5330b 8245469: Remove DTLS protocol implementation Reviewed-by: mbalao ! src/share/classes/sun/security/ssl/Alert.java ! src/share/classes/sun/security/ssl/Authenticator.java ! src/share/classes/sun/security/ssl/CipherSuite.java ! src/share/classes/sun/security/ssl/CipherType.java ! src/share/classes/sun/security/ssl/ClientHello.java ! src/share/classes/sun/security/ssl/ConnectionContext.java ! src/share/classes/sun/security/ssl/ContentType.java - src/share/classes/sun/security/ssl/DTLSInputRecord.java - src/share/classes/sun/security/ssl/DTLSOutputRecord.java - src/share/classes/sun/security/ssl/DTLSRecord.java ! src/share/classes/sun/security/ssl/Finished.java ! src/share/classes/sun/security/ssl/HandshakeHash.java ! src/share/classes/sun/security/ssl/HelloCookieManager.java - src/share/classes/sun/security/ssl/HelloVerifyRequest.java ! src/share/classes/sun/security/ssl/InputRecord.java ! src/share/classes/sun/security/ssl/MaxFragExtension.java ! src/share/classes/sun/security/ssl/OutputRecord.java ! src/share/classes/sun/security/ssl/ProtocolVersion.java ! src/share/classes/sun/security/ssl/RSAClientKeyExchange.java ! src/share/classes/sun/security/ssl/Record.java ! src/share/classes/sun/security/ssl/SSLCipher.java ! src/share/classes/sun/security/ssl/SSLConfiguration.java ! src/share/classes/sun/security/ssl/SSLContextImpl.java ! src/share/classes/sun/security/ssl/SSLEngineImpl.java ! src/share/classes/sun/security/ssl/SSLEngineInputRecord.java ! src/share/classes/sun/security/ssl/SSLExtensions.java ! src/share/classes/sun/security/ssl/SSLHandshake.java ! src/share/classes/sun/security/ssl/SSLKeyExchange.java ! src/share/classes/sun/security/ssl/SSLMasterKeyDerivation.java ! src/share/classes/sun/security/ssl/SSLSessionImpl.java ! src/share/classes/sun/security/ssl/SSLSocketInputRecord.java ! src/share/classes/sun/security/ssl/SSLTrafficKeyDerivation.java ! src/share/classes/sun/security/ssl/SSLTransport.java ! src/share/classes/sun/security/ssl/ServerHello.java ! src/share/classes/sun/security/ssl/StatusResponseManager.java ! src/share/classes/sun/security/ssl/TransportContext.java Changeset: a73004866eec Author: abakhtin Date: 2020-08-25 08:39 +0300 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/a73004866eec 8245470: Fix JDK8 compatibility issues Reviewed-by: mbalao ! src/share/classes/java/security/MessageDigest.java ! src/share/classes/sun/security/pkcs11/P11Digest.java ! src/share/classes/sun/security/ssl/BaseSSLSocketImpl.java ! src/share/classes/sun/security/ssl/CertSignAlgsExtension.java ! src/share/classes/sun/security/ssl/CertStatusExtension.java ! src/share/classes/sun/security/ssl/CertificateVerify.java ! src/share/classes/sun/security/ssl/CookieExtension.java ! src/share/classes/sun/security/ssl/DHClientKeyExchange.java ! src/share/classes/sun/security/ssl/DHServerKeyExchange.java ! src/share/classes/sun/security/ssl/ECDHClientKeyExchange.java ! src/share/classes/sun/security/ssl/ECDHServerKeyExchange.java ! src/share/classes/sun/security/ssl/Finished.java ! src/share/classes/sun/security/ssl/HandshakeContext.java ! src/share/classes/sun/security/ssl/KeyShareExtension.java ! src/share/classes/sun/security/ssl/PredefinedDHParameterSpecs.java ! src/share/classes/sun/security/ssl/RSAClientKeyExchange.java ! src/share/classes/sun/security/ssl/RSAServerKeyExchange.java ! src/share/classes/sun/security/ssl/RandomCookie.java ! src/share/classes/sun/security/ssl/RenegoInfoExtension.java ! src/share/classes/sun/security/ssl/SSLCipher.java ! src/share/classes/sun/security/ssl/SSLEngineInputRecord.java ! src/share/classes/sun/security/ssl/SSLExtension.java ! src/share/classes/sun/security/ssl/SSLExtensions.java ! src/share/classes/sun/security/ssl/SSLLogger.java ! src/share/classes/sun/security/ssl/SSLSessionContextImpl.java ! src/share/classes/sun/security/ssl/SSLSocketImpl.java ! src/share/classes/sun/security/ssl/SSLSocketInputRecord.java ! src/share/classes/sun/security/ssl/SignatureAlgorithmsExtension.java ! src/share/classes/sun/security/ssl/SunJSSE.java ! src/share/classes/sun/security/ssl/TransportContext.java ! src/share/classes/sun/security/ssl/Utilities.java + src/share/classes/sun/security/util/MessageDigestSpi2.java ! src/share/classes/sun/security/util/SecurityConstants.java Changeset: 90d302484147 Author: abakhtin Date: 2020-08-25 08:41 +0300 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/90d302484147 8245471: Revert JDK-8148188 Reviewed-by: mbalao ! src/share/classes/sun/security/ssl/Finished.java Changeset: b58fdaa80b5a Author: abakhtin Date: 2020-08-25 09:23 +0300 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/b58fdaa80b5a 8245472: Backport JDK-8038893 to JDK8 Reviewed-by: mbalao ! src/share/classes/java/net/SocketPermission.java ! src/share/classes/sun/net/RegisteredDomain.java ! src/share/classes/sun/security/util/HostnameChecker.java + src/share/classes/sun/security/util/RegisteredDomain.java Changeset: 896bbc5499ff Author: abakhtin Date: 2020-08-25 08:30 -0700 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/896bbc5499ff 8245473: OCSP stapling support Reviewed-by: mbalao + src/share/classes/sun/security/provider/certpath/OCSPNonceExtension.java ! src/share/classes/sun/security/ssl/SSLContextImpl.java ! src/share/classes/sun/security/ssl/SSLSessionImpl.java ! src/share/classes/sun/security/ssl/X509TrustManagerImpl.java ! src/share/classes/sun/security/validator/PKIXValidator.java ! src/share/classes/sun/security/validator/SimpleValidator.java ! src/share/classes/sun/security/validator/Validator.java Changeset: 80cdee1da353 Author: mbalao Date: 2020-08-25 15:48 -0300 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/80cdee1da353 8245474: Add TLS_KRB5 cipher suites support according to RFC-2712 Reviewed-by: aph Contributed-by: Alexey Bakhtin , Martin Balao ! make/data/checkdeps/refs.allowed ! src/share/classes/sun/security/ssl/CipherSuite.java ! src/share/classes/sun/security/ssl/ClientHello.java ! src/share/classes/sun/security/ssl/JsseJce.java - src/share/classes/sun/security/ssl/KerberosClientKeyExchange.java ! src/share/classes/sun/security/ssl/Krb5Helper.java ! src/share/classes/sun/security/ssl/Krb5Proxy.java + src/share/classes/sun/security/ssl/KrbClientKeyExchange.java + src/share/classes/sun/security/ssl/KrbClientKeyExchangeHelper.java + src/share/classes/sun/security/ssl/KrbKeyExchange.java ! src/share/classes/sun/security/ssl/SSLKeyExchange.java ! src/share/classes/sun/security/ssl/SSLSessionImpl.java ! src/share/classes/sun/security/ssl/ServerHello.java - src/share/classes/sun/security/ssl/krb5/KerberosClientKeyExchangeImpl.java - src/share/classes/sun/security/ssl/krb5/KerberosPreMasterSecret.java ! src/share/classes/sun/security/ssl/krb5/Krb5ProxyImpl.java + src/share/classes/sun/security/ssl/krb5/KrbClientKeyExchangeHelperImpl.java Changeset: ad16e2ef963c Author: abakhtin Date: 2020-08-25 17:53 +0300 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/ad16e2ef963c 8245476: Disable TLSv1.3 protocol in the ClientHello message by default Reviewed-by: mbalao ! src/share/classes/sun/security/ssl/SSLContextImpl.java Changeset: 3ec03c289ff2 Author: abakhtin Date: 2020-08-25 16:27 -0300 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/3ec03c289ff2 8245477: Adjust TLS tests location Reviewed-by: mbalao ! test/TEST.groups + test/com/sun/net/ssl/SSLSecurity/ComKeyManagerFactoryImpl.java + test/com/sun/net/ssl/SSLSecurity/ComSSLContextImpl.java + test/com/sun/net/ssl/SSLSecurity/ComTrustManagerFactoryImpl.java + test/com/sun/net/ssl/SSLSecurity/JavaxKeyManagerFactoryImpl.java + test/com/sun/net/ssl/SSLSecurity/JavaxSSLContextImpl.java + test/com/sun/net/ssl/SSLSecurity/JavaxTrustManagerFactoryImpl.java + test/com/sun/net/ssl/SSLSecurity/ProviderTest.java + test/com/sun/net/ssl/SSLSecurity/TruncateArray.java + test/javax/net/ssl/ALPN/MyX509ExtendedKeyManager.java + test/javax/net/ssl/ALPN/SSLEngineAlpnTest.java + test/javax/net/ssl/ALPN/SSLServerSocketAlpnTest.java + test/javax/net/ssl/ALPN/SSLSocketAlpnTest.java + test/javax/net/ssl/Fix5070632.java + test/javax/net/ssl/FixingJavadocs/ComURLNulls.java + test/javax/net/ssl/FixingJavadocs/ImplicitHandshake.java + test/javax/net/ssl/FixingJavadocs/JavaxURLNulls.java + test/javax/net/ssl/FixingJavadocs/KMTMGetNothing.java + test/javax/net/ssl/FixingJavadocs/SSLSessionNulls.java + test/javax/net/ssl/FixingJavadocs/SSLSocketInherit.java + test/javax/net/ssl/GetInstance.java + test/javax/net/ssl/HttpsURLConnection/CriticalSubjectAltName.java + test/javax/net/ssl/HttpsURLConnection/DelayDefaultContextLoading.java + test/javax/net/ssl/HttpsURLConnection/GetResponseCode.java + test/javax/net/ssl/HttpsURLConnection/crisubn.jks + test/javax/net/ssl/HttpsURLConnection/trusted.jks + test/javax/net/ssl/README + test/javax/net/ssl/SSLEngine/AcceptLargeFragments.java + test/javax/net/ssl/SSLEngine/ArgCheck.java + test/javax/net/ssl/SSLEngine/Arrays.java + test/javax/net/ssl/SSLEngine/Basics.java + test/javax/net/ssl/SSLEngine/CheckStatus.java + test/javax/net/ssl/SSLEngine/ConnectionTest.java + test/javax/net/ssl/SSLEngine/ExtendedKeyEngine.java + test/javax/net/ssl/SSLEngine/ExtendedKeySocket.java + test/javax/net/ssl/SSLEngine/LargeBufs.java + test/javax/net/ssl/SSLEngine/LargePacket.java + test/javax/net/ssl/SSLEngine/MyX509ExtendedKeyManager.java + test/javax/net/ssl/SSLEngine/MyX509KeyManager.java + test/javax/net/ssl/SSLEngine/NoAuthClientAuth.java + test/javax/net/ssl/SSLEngine/SSLEngineResultArgs.java + test/javax/net/ssl/SSLEngine/SSLEngineService.java + test/javax/net/ssl/SSLEngine/TestAllSuites.java + test/javax/net/ssl/SSLEngineResult/Deserialize.java + test/javax/net/ssl/SSLParameters/UseCipherSuitesOrder.java + test/javax/net/ssl/SSLServerSocket/DefaultSSLServSocketFac.java + test/javax/net/ssl/SSLSession/CheckMyTrustedKeystore.java + test/javax/net/ssl/SSLSession/HttpsURLConnectionLocalCertificateChain.java + test/javax/net/ssl/SSLSession/JSSERenegotiate.java + test/javax/net/ssl/SSLSession/KeyManagerTrustManager.java + test/javax/net/ssl/SSLSession/SSLCtxAccessToSessCtx.java + test/javax/net/ssl/SSLSession/SessionCacheSizeTests.java + test/javax/net/ssl/SSLSession/SessionTimeOutTests.java + test/javax/net/ssl/SSLSession/testEnabledProtocols.java ! test/javax/net/ssl/ServerName/BestEffortOnLazyConnected.java + test/javax/net/ssl/ServerName/IllegalSNIName.java + test/javax/net/ssl/ServerName/SSLEngineExplorer.java + test/javax/net/ssl/ServerName/SSLEngineExplorerMatchedSNI.java + test/javax/net/ssl/ServerName/SSLEngineExplorerUnmatchedSNI.java + test/javax/net/ssl/ServerName/SSLEngineExplorerWithCli.java + test/javax/net/ssl/ServerName/SSLEngineExplorerWithSrv.java + test/javax/net/ssl/ServerName/SSLSocketConsistentSNI.java + test/javax/net/ssl/ServerName/SSLSocketExplorer.java + test/javax/net/ssl/ServerName/SSLSocketExplorerFailure.java + test/javax/net/ssl/ServerName/SSLSocketExplorerMatchedSNI.java + test/javax/net/ssl/ServerName/SSLSocketExplorerUnmatchedSNI.java + test/javax/net/ssl/ServerName/SSLSocketExplorerWithCliSNI.java + test/javax/net/ssl/ServerName/SSLSocketExplorerWithSrvSNI.java + test/javax/net/ssl/ServerName/SSLSocketInconsistentSNI.java + test/javax/net/ssl/ServerName/SSLSocketSNISensitive.java + test/javax/net/ssl/TLSv11/EmptyCertificateAuthorities.java + test/javax/net/ssl/TLSv11/ExportableBlockCipher.java + test/javax/net/ssl/TLSv11/ExportableStreamCipher.java + test/javax/net/ssl/TLSv11/GenericBlockCipher.java + test/javax/net/ssl/TLSv11/GenericStreamCipher.java + test/javax/net/ssl/TLSv12/DisabledShortRSAKeys.java ! test/javax/net/ssl/TLSv12/ProtocolFilter.java + test/javax/net/ssl/TLSv12/ShortRSAKey512.java + test/javax/net/ssl/TLSv12/ShortRSAKeyGCM.java ! test/javax/net/ssl/ciphersuites/DisabledAlgorithms.java + test/javax/net/ssl/etc/README + test/javax/net/ssl/etc/keystore + test/javax/net/ssl/etc/truststore + test/javax/net/ssl/etc/unknown_keystore + test/javax/net/ssl/sanity/ciphersuites/CheckCipherSuites.java + test/javax/net/ssl/sanity/ciphersuites/CipherSuitesInOrder.java + test/javax/net/ssl/sanity/ciphersuites/NoKerberos.java + test/javax/net/ssl/sanity/interop/CipherTest.java + test/javax/net/ssl/sanity/interop/ClientJSSEServerJSSE.java + test/javax/net/ssl/sanity/interop/JSSEClient.java + test/javax/net/ssl/sanity/interop/JSSEServer.java + test/javax/net/ssl/sanity/pluggability/CheckSSLContextExport.java + test/javax/net/ssl/sanity/pluggability/CheckSockFacExport1.java + test/javax/net/ssl/sanity/pluggability/CheckSockFacExport2.java + test/javax/net/ssl/sanity/pluggability/CipherSuites.java + test/javax/net/ssl/sanity/pluggability/MySSLContextImpl.java + test/javax/net/ssl/sanity/pluggability/MySSLEngineImpl.java + test/javax/net/ssl/sanity/pluggability/MySSLServerSocketFacImpl.java + test/javax/net/ssl/sanity/pluggability/MySSLSocketFacImpl.java + test/javax/net/ssl/templates/SSLCapabilities.java + test/javax/net/ssl/templates/SSLEngineTemplate.java + test/javax/net/ssl/templates/SSLExplorer.java + test/javax/net/ssl/templates/SSLSocketSSLEngineTemplate.java ! test/sun/net/www/http/HttpClient/B8025710.java + test/sun/net/www/protocol/https/AbstractCallback.java + test/sun/net/www/protocol/https/ChunkedOutputStream.java + test/sun/net/www/protocol/https/ClosedChannelList.java + test/sun/net/www/protocol/https/HttpCallback.java + test/sun/net/www/protocol/https/HttpTransaction.java + test/sun/net/www/protocol/https/HttpsClient/MyKeyManager.java + test/sun/net/www/protocol/https/HttpsClient/OriginServer.java + test/sun/net/www/protocol/https/HttpsClient/ProxyAuthTest.java + test/sun/net/www/protocol/https/HttpsClient/ProxyTunnelServer.java + test/sun/net/www/protocol/https/HttpsClient/ServerIdentityTest.java + test/sun/net/www/protocol/https/HttpsClient/dnsstore + test/sun/net/www/protocol/https/HttpsClient/ipstore + test/sun/net/www/protocol/https/HttpsURLConnection/B6216082.java + test/sun/net/www/protocol/https/HttpsURLConnection/B6226610.java + test/sun/net/www/protocol/https/HttpsURLConnection/CheckMethods.java + test/sun/net/www/protocol/https/HttpsURLConnection/CloseKeepAliveCached.java + test/sun/net/www/protocol/https/HttpsURLConnection/CookieHandlerTest.java + test/sun/net/www/protocol/https/HttpsURLConnection/CookieHttpsClientTest.java + test/sun/net/www/protocol/https/HttpsURLConnection/DNSIdentities.java + test/sun/net/www/protocol/https/HttpsURLConnection/HttpsCreateSockTest.java + test/sun/net/www/protocol/https/HttpsURLConnection/HttpsPost.java + test/sun/net/www/protocol/https/HttpsURLConnection/HttpsProxyStackOverflow.java + test/sun/net/www/protocol/https/HttpsURLConnection/HttpsSocketFacTest.java + test/sun/net/www/protocol/https/HttpsURLConnection/IPAddressDNSIdentities.java + test/sun/net/www/protocol/https/HttpsURLConnection/IPAddressIPIdentities.java + test/sun/net/www/protocol/https/HttpsURLConnection/IPIdentities.java + test/sun/net/www/protocol/https/HttpsURLConnection/Identities.java ! test/sun/net/www/protocol/https/HttpsURLConnection/ImpactOnSNI.java + test/sun/net/www/protocol/https/HttpsURLConnection/OriginServer.java + test/sun/net/www/protocol/https/HttpsURLConnection/PostThruProxy.java + test/sun/net/www/protocol/https/HttpsURLConnection/PostThruProxyWithAuth.java + test/sun/net/www/protocol/https/HttpsURLConnection/ProxyTunnelServer.java + test/sun/net/www/protocol/https/HttpsURLConnection/ReadTimeout.java + test/sun/net/www/protocol/https/HttpsURLConnection/Redirect.java + test/sun/net/www/protocol/https/HttpsURLConnection/RetryHttps.java + test/sun/net/www/protocol/https/HttpsURLConnection/TunnelProxy.java + test/sun/net/www/protocol/https/NewImpl/ComHTTPSConnection.java + test/sun/net/www/protocol/https/NewImpl/ComHostnameVerifier.java + test/sun/net/www/protocol/https/NewImpl/JavaxHTTPSConnection.java + test/sun/net/www/protocol/https/NewImpl/JavaxHostnameVerifier.java + test/sun/net/www/protocol/https/TestHttpsServer.java ! test/sun/security/provider/X509Factory/BadPem.java ! test/sun/security/provider/X509Factory/BigCRL.java + test/sun/security/ssl/AppInputStream/ReadBlocksClose.java + test/sun/security/ssl/AppInputStream/ReadHandshake.java + test/sun/security/ssl/AppInputStream/ReadZeroBytes.java + test/sun/security/ssl/AppInputStream/RemoveMarkReset.java + test/sun/security/ssl/AppOutputStream/NoExceptionOnClose.java + test/sun/security/ssl/CipherSuite/SSL_NULL.java + test/sun/security/ssl/ClientHandshaker/CipherSuiteOrder.java + test/sun/security/ssl/ClientHandshaker/LengthCheckTest.java + test/sun/security/ssl/ClientHandshaker/RSAExport.java + test/sun/security/ssl/DHKeyExchange/DHEKeySizing.java ! test/sun/security/ssl/DHKeyExchange/LegacyDHEKeyExchange.java + test/sun/security/ssl/EngineArgs/DebugReportsOneExtraByte.java + test/sun/security/ssl/EngineArgs/DebugReportsOneExtraByte.sh + test/sun/security/ssl/GenSSLConfigs/ClientThread.java + test/sun/security/ssl/GenSSLConfigs/Handler.java + test/sun/security/ssl/GenSSLConfigs/ServerHandler.java + test/sun/security/ssl/GenSSLConfigs/ServerThread.java + test/sun/security/ssl/GenSSLConfigs/TestThread.java + test/sun/security/ssl/GenSSLConfigs/Traffic.java + test/sun/security/ssl/GenSSLConfigs/main.java + test/sun/security/ssl/HandshakeOutStream/NullCerts.java + test/sun/security/ssl/InputRecord/ClientHelloRead.java + test/sun/security/ssl/InputRecord/OriginServer.java + test/sun/security/ssl/InputRecord/ProxyTunnelServer.java + test/sun/security/ssl/InputRecord/SSLSocketTimeoutNulls.java + test/sun/security/ssl/ProtocolVersion/HttpsProtocols.java - test/sun/security/ssl/README + test/sun/security/ssl/SSLContextImpl/BadKSProvider.java + test/sun/security/ssl/SSLContextImpl/BadTSProvider.java + test/sun/security/ssl/SSLContextImpl/CustomizedDefaultProtocols.java + test/sun/security/ssl/SSLContextImpl/DefaultEnabledProtocols.java - test/sun/security/ssl/SSLContextImpl/DefautlCacheSize.java + test/sun/security/ssl/SSLContextImpl/GoodProvider.java + test/sun/security/ssl/SSLContextImpl/IllegalProtocolProperty.java + test/sun/security/ssl/SSLContextImpl/MD2InTrustAnchor.java + test/sun/security/ssl/SSLContextImpl/NoOldVersionContext.java + test/sun/security/ssl/SSLContextImpl/NullGetAcceptedIssuers.java + test/sun/security/ssl/SSLContextImpl/SSLContextVersion.java + test/sun/security/ssl/SSLContextImpl/TrustTrustedCert.java + test/sun/security/ssl/SSLEngineImpl/CloseEngineException.java + test/sun/security/ssl/SSLEngineImpl/CloseInboundException.java + test/sun/security/ssl/SSLEngineImpl/CloseStart.java + test/sun/security/ssl/SSLEngineImpl/DelegatedTaskWrongException.java + test/sun/security/ssl/SSLEngineImpl/EmptyExtensionData.java + test/sun/security/ssl/SSLEngineImpl/EngineEnforceUseClientMode.java + test/sun/security/ssl/SSLEngineImpl/RehandshakeFinished.java + test/sun/security/ssl/SSLEngineImpl/SSLEngineBadBufferArrayAccess.java + test/sun/security/ssl/SSLEngineImpl/SSLEngineDeadlock.java + test/sun/security/ssl/SSLSessionContextImpl/DefautlCacheSize.java + test/sun/security/ssl/SSLSessionContextImpl/Timeout.java + test/sun/security/ssl/SSLSessionImpl/HashCodeMissing.java + test/sun/security/ssl/SSLSocketImpl/AsyncSSLSocketClose.java + test/sun/security/ssl/SSLSocketImpl/CheckMethods.java + test/sun/security/ssl/SSLSocketImpl/ClientModeClientAuth.java + test/sun/security/ssl/SSLSocketImpl/ClientTimeout.java + test/sun/security/ssl/SSLSocketImpl/CloseSocket.java + test/sun/security/ssl/SSLSocketImpl/CloseSocketException.java + test/sun/security/ssl/SSLSocketImpl/InvalidateServerSessionRenegotiate.java + test/sun/security/ssl/SSLSocketImpl/LoopbackSSLSocket.java + test/sun/security/ssl/SSLSocketImpl/NewSocketMethods.java + test/sun/security/ssl/SSLSocketImpl/NoImpactServerRenego.java + test/sun/security/ssl/SSLSocketImpl/NonAutoClose.java + test/sun/security/ssl/SSLSocketImpl/NotifyHandshakeTest.java + test/sun/security/ssl/SSLSocketImpl/NotifyHandshakeTest.policy + test/sun/security/ssl/SSLSocketImpl/NotifyHandshakeTest.sh + test/sun/security/ssl/SSLSocketImpl/NotifyHandshakeTestHeyYou.java + test/sun/security/ssl/SSLSocketImpl/RejectClientRenego.java + test/sun/security/ssl/SSLSocketImpl/ReuseAddr.java + test/sun/security/ssl/SSLSocketImpl/ReverseNameLookup.java ! test/sun/security/ssl/SSLSocketImpl/SSLSocketCloseHang.java + test/sun/security/ssl/SSLSocketImpl/SSLSocketImplThrowsWrongExceptions.java + test/sun/security/ssl/SSLSocketImpl/ServerTimeout.java + test/sun/security/ssl/SSLSocketImpl/SetClientMode.java + test/sun/security/ssl/SSLSocketImpl/UnconnectedSocketWrongExceptions.java + test/sun/security/ssl/ServerHandshaker/AnonCipherWithWantClientAuth.java + test/sun/security/ssl/ServerHandshaker/GetPeerHost.java + test/sun/security/ssl/ServerHandshaker/GetPeerHostClient.java + test/sun/security/ssl/ServerHandshaker/GetPeerHostServer.java ! test/sun/security/ssl/ServerHandshaker/HelloExtensionsTest.java + test/sun/security/ssl/SocketCreation/SocketCreation.java + test/sun/security/ssl/X509KeyManager/NullCases.java + test/sun/security/ssl/X509KeyManager/PreferredKey.java + test/sun/security/ssl/X509KeyManager/SelectOneKeyOutOfMany.java + test/sun/security/ssl/X509TrustManagerImpl/BasicConstraints.java + test/sun/security/ssl/X509TrustManagerImpl/CertRequestOverflow.java + test/sun/security/ssl/X509TrustManagerImpl/CheckNullEntity.java + test/sun/security/ssl/X509TrustManagerImpl/ClientServer.java + test/sun/security/ssl/X509TrustManagerImpl/ComodoHacker.java + test/sun/security/ssl/X509TrustManagerImpl/PKIXExtendedTM.java + test/sun/security/ssl/X509TrustManagerImpl/SelfIssuedCert.java + test/sun/security/ssl/X509TrustManagerImpl/SunX509ExtendedTM.java + test/sun/security/ssl/X509TrustManagerImpl/Symantec/Distrust.java + test/sun/security/ssl/X509TrustManagerImpl/Symantec/appleistca2g1-chain.pem + test/sun/security/ssl/X509TrustManagerImpl/Symantec/appleistca8g1-chain.pem + test/sun/security/ssl/X509TrustManagerImpl/Symantec/geotrustglobalca-chain.pem + test/sun/security/ssl/X509TrustManagerImpl/Symantec/geotrustprimarycag2-chain.pem + test/sun/security/ssl/X509TrustManagerImpl/Symantec/geotrustprimarycag3-chain.pem + test/sun/security/ssl/X509TrustManagerImpl/Symantec/geotrustuniversalca-chain.pem + test/sun/security/ssl/X509TrustManagerImpl/Symantec/thawteprimaryrootca-chain.pem + test/sun/security/ssl/X509TrustManagerImpl/Symantec/thawteprimaryrootcag2-chain.pem + test/sun/security/ssl/X509TrustManagerImpl/Symantec/thawteprimaryrootcag3-chain.pem + test/sun/security/ssl/X509TrustManagerImpl/Symantec/verisignclass3g3ca-chain.pem + test/sun/security/ssl/X509TrustManagerImpl/Symantec/verisignclass3g4ca-chain.pem + test/sun/security/ssl/X509TrustManagerImpl/Symantec/verisignclass3g5ca-chain.pem + test/sun/security/ssl/X509TrustManagerImpl/Symantec/verisignclass3g5ca-codesigning-chain.pem + test/sun/security/ssl/X509TrustManagerImpl/Symantec/verisignuniversalrootca-chain.pem + test/sun/security/ssl/X509TrustManagerImpl/X509ExtendedTMEnabled.java - test/sun/security/ssl/com/sun/net/ssl/SSLSecurity/ComKeyManagerFactoryImpl.java - test/sun/security/ssl/com/sun/net/ssl/SSLSecurity/ComSSLContextImpl.java - test/sun/security/ssl/com/sun/net/ssl/SSLSecurity/ComTrustManagerFactoryImpl.java - test/sun/security/ssl/com/sun/net/ssl/SSLSecurity/JavaxKeyManagerFactoryImpl.java - test/sun/security/ssl/com/sun/net/ssl/SSLSecurity/JavaxSSLContextImpl.java - test/sun/security/ssl/com/sun/net/ssl/SSLSecurity/JavaxTrustManagerFactoryImpl.java - test/sun/security/ssl/com/sun/net/ssl/SSLSecurity/ProviderTest.java - test/sun/security/ssl/com/sun/net/ssl/SSLSecurity/TruncateArray.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/AppInputStream/ReadBlocksClose.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/AppInputStream/ReadHandshake.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/AppInputStream/ReadZeroBytes.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/AppInputStream/RemoveMarkReset.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/AppOutputStream/NoExceptionOnClose.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/CipherSuite/SSL_NULL.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ClientHandshaker/CipherSuiteOrder.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ClientHandshaker/LengthCheckTest.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ClientHandshaker/RSAExport.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/DHKeyExchange/DHEKeySizing.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/EngineArgs/DebugReportsOneExtraByte.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/EngineArgs/DebugReportsOneExtraByte.sh - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/GenSSLConfigs/ClientThread.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/GenSSLConfigs/Handler.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/GenSSLConfigs/ServerHandler.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/GenSSLConfigs/ServerThread.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/GenSSLConfigs/TestThread.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/GenSSLConfigs/Traffic.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/GenSSLConfigs/main.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/HandshakeOutStream/NullCerts.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/InputRecord/ClientHelloRead.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/InputRecord/OriginServer.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/InputRecord/ProxyTunnelServer.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/InputRecord/SSLSocketTimeoutNulls.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ProtocolVersion/HttpsProtocols.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/BadKSProvider.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/BadTSProvider.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/CustomizedDefaultProtocols.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/DefaultEnabledProtocols.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/GoodProvider.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/IllegalProtocolProperty.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/MD2InTrustAnchor.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/NoOldVersionContext.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/NullGetAcceptedIssuers.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/SSLContextVersion.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/TrustTrustedCert.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/CloseEngineException.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/CloseInboundException.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/CloseStart.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/DelegatedTaskWrongException.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/EmptyExtensionData.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/EngineEnforceUseClientMode.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/RehandshakeFinished.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/SSLEngineBadBufferArrayAccess.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/SSLEngineDeadlock.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSessionContextImpl/Timeout.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSessionImpl/HashCodeMissing.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/AsyncSSLSocketClose.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/CheckMethods.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/ClientModeClientAuth.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/ClientTimeout.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/CloseSocket.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/CloseSocketException.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/InvalidateServerSessionRenegotiate.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/LoopbackSSLSocket.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/NewSocketMethods.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/NoImpactServerRenego.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/NonAutoClose.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/NotifyHandshakeTest.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/NotifyHandshakeTest.policy - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/NotifyHandshakeTest.sh - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/NotifyHandshakeTestHeyYou.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/RejectClientRenego.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/ReuseAddr.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/ReverseNameLookup.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/SSLSocketImplThrowsWrongExceptions.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/ServerTimeout.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/SetClientMode.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/UnconnectedSocketWrongExceptions.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ServerHandshaker/AnonCipherWithWantClientAuth.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ServerHandshaker/GetPeerHost.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ServerHandshaker/GetPeerHostClient.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ServerHandshaker/GetPeerHostServer.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SocketCreation/SocketCreation.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509KeyManager/NullCases.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509KeyManager/PreferredKey.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509KeyManager/SelectOneKeyOutOfMany.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/BasicConstraints.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/CertRequestOverflow.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/CheckNullEntity.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/ClientServer.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/ComodoHacker.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/PKIXExtendedTM.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/SelfIssuedCert.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/SunX509ExtendedTM.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/Distrust.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/appleistca2g1-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/appleistca8g1-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/geotrustglobalca-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/geotrustprimarycag2-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/geotrustprimarycag3-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/geotrustuniversalca-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/thawteprimaryrootca-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/thawteprimaryrootcag2-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/thawteprimaryrootcag3-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/verisignclass3g3ca-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/verisignclass3g4ca-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/verisignclass3g5ca-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/verisignclass3g5ca-codesigning-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/verisignuniversalrootca-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/X509ExtendedTMEnabled.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/rsa/BrokenRSAPrivateCrtKey.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/spi/ProviderInit.java - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/MyKeyManager.java - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/OriginServer.java - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/ProxyAuthTest.java - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/ProxyTunnelServer.java - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/ServerIdentityTest.java - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/dnsstore - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/ipstore - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsURLConnection/CriticalSubjectAltName.java - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsURLConnection/GetResponseCode.java - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsURLConnection/crisubn.jks - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsURLConnection/trusted.jks - test/sun/security/ssl/etc/README - test/sun/security/ssl/etc/keystore - test/sun/security/ssl/etc/truststore - test/sun/security/ssl/etc/unknown_keystore - test/sun/security/ssl/javax/net/ssl/ALPN/MyX509ExtendedKeyManager.java - test/sun/security/ssl/javax/net/ssl/ALPN/SSLEngineAlpnTest.java - test/sun/security/ssl/javax/net/ssl/ALPN/SSLServerSocketAlpnTest.java - test/sun/security/ssl/javax/net/ssl/ALPN/SSLSocketAlpnTest.java - test/sun/security/ssl/javax/net/ssl/Fix5070632.java - test/sun/security/ssl/javax/net/ssl/FixingJavadocs/ComURLNulls.java - test/sun/security/ssl/javax/net/ssl/FixingJavadocs/ImplicitHandshake.java - test/sun/security/ssl/javax/net/ssl/FixingJavadocs/JavaxURLNulls.java - test/sun/security/ssl/javax/net/ssl/FixingJavadocs/KMTMGetNothing.java - test/sun/security/ssl/javax/net/ssl/FixingJavadocs/SSLSessionNulls.java - test/sun/security/ssl/javax/net/ssl/FixingJavadocs/SSLSocketInherit.java - test/sun/security/ssl/javax/net/ssl/GetInstance.java - test/sun/security/ssl/javax/net/ssl/HttpsURLConnection/DelayDefaultContextLoading.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/CheckMyTrustedKeystore.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/HttpsURLConnectionLocalCertificateChain.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/JSSERenegotiate.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/KeyManagerTrustManager.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLCtxAccessToSessCtx.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/AcceptLargeFragments.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/ArgCheck.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/Arrays.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/Basics.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/CheckStatus.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/ConnectionTest.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/ExtendedKeyEngine.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/ExtendedKeySocket.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/LargeBufs.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/LargePacket.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/MyX509ExtendedKeyManager.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/MyX509KeyManager.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/NoAuthClientAuth.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/SSLEngineResultArgs.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/SSLEngineService.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/TestAllSuites.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngineResult/Deserialize.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SessionCacheSizeTests.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SessionTimeOutTests.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/testEnabledProtocols.java - test/sun/security/ssl/javax/net/ssl/SSLParameters/UseCipherSuitesOrder.java - test/sun/security/ssl/javax/net/ssl/SSLServerSocket/DefaultSSLServSocketFac.java - test/sun/security/ssl/javax/net/ssl/ServerName/IllegalSNIName.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLEngineExplorer.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLEngineExplorerMatchedSNI.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLEngineExplorerUnmatchedSNI.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLEngineExplorerWithCli.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLEngineExplorerWithSrv.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketConsistentSNI.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketExplorer.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketExplorerFailure.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketExplorerMatchedSNI.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketExplorerUnmatchedSNI.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketExplorerWithCliSNI.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketExplorerWithSrvSNI.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketInconsistentSNI.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketSNISensitive.java - test/sun/security/ssl/javax/net/ssl/TLSv11/EmptyCertificateAuthorities.java - test/sun/security/ssl/javax/net/ssl/TLSv11/ExportableBlockCipher.java - test/sun/security/ssl/javax/net/ssl/TLSv11/ExportableStreamCipher.java - test/sun/security/ssl/javax/net/ssl/TLSv11/GenericBlockCipher.java - test/sun/security/ssl/javax/net/ssl/TLSv11/GenericStreamCipher.java - test/sun/security/ssl/javax/net/ssl/TLSv12/DisabledShortRSAKeys.java - test/sun/security/ssl/javax/net/ssl/TLSv12/ShortRSAKey512.java - test/sun/security/ssl/javax/net/ssl/TLSv12/ShortRSAKeyGCM.java + test/sun/security/ssl/rsa/BrokenRSAPrivateCrtKey.java - test/sun/security/ssl/sanity/ciphersuites/CheckCipherSuites.java - test/sun/security/ssl/sanity/ciphersuites/CipherSuitesInOrder.java - test/sun/security/ssl/sanity/ciphersuites/NoKerberos.java - test/sun/security/ssl/sanity/interop/CipherTest.java - test/sun/security/ssl/sanity/interop/ClientJSSEServerJSSE.java - test/sun/security/ssl/sanity/interop/JSSEClient.java - test/sun/security/ssl/sanity/interop/JSSEServer.java - test/sun/security/ssl/sanity/pluggability/CheckSSLContextExport.java - test/sun/security/ssl/sanity/pluggability/CheckSockFacExport1.java - test/sun/security/ssl/sanity/pluggability/CheckSockFacExport2.java - test/sun/security/ssl/sanity/pluggability/CipherSuites.java - test/sun/security/ssl/sanity/pluggability/MySSLContextImpl.java - test/sun/security/ssl/sanity/pluggability/MySSLEngineImpl.java - test/sun/security/ssl/sanity/pluggability/MySSLServerSocketFacImpl.java - test/sun/security/ssl/sanity/pluggability/MySSLSocketFacImpl.java + test/sun/security/ssl/spi/ProviderInit.java - test/sun/security/ssl/sun/net/www/http/ChunkedOutputStream/Test.java - test/sun/security/ssl/sun/net/www/httpstest/AbstractCallback.java - test/sun/security/ssl/sun/net/www/httpstest/ClosedChannelList.java - test/sun/security/ssl/sun/net/www/httpstest/HttpCallback.java - test/sun/security/ssl/sun/net/www/httpstest/HttpTransaction.java - test/sun/security/ssl/sun/net/www/httpstest/TestHttpsServer.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/B6216082.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/B6226610.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/CheckMethods.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/CloseKeepAliveCached.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/CookieHandlerTest.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/CookieHttpsClientTest.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/DNSIdentities.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/HttpsCreateSockTest.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/HttpsPost.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/HttpsProxyStackOverflow.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/HttpsSocketFacTest.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPAddressDNSIdentities.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPAddressIPIdentities.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPIdentities.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/Identities.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/OriginServer.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/PostThruProxy.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/PostThruProxyWithAuth.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/ProxyTunnelServer.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/ReadTimeout.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/Redirect.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/RetryHttps.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/TunnelProxy.java - test/sun/security/ssl/sun/net/www/protocol/https/NewImpl/ComHTTPSConnection.java - test/sun/security/ssl/sun/net/www/protocol/https/NewImpl/ComHostnameVerifier.java - test/sun/security/ssl/sun/net/www/protocol/https/NewImpl/JavaxHTTPSConnection.java - test/sun/security/ssl/sun/net/www/protocol/https/NewImpl/JavaxHostnameVerifier.java - test/sun/security/ssl/templates/SSLCapabilities.java - test/sun/security/ssl/templates/SSLEngineTemplate.java - test/sun/security/ssl/templates/SSLExplorer.java - test/sun/security/ssl/templates/SSLSocketSSLEngineTemplate.java ! test/sun/security/ssl/templates/SSLSocketTemplate.java ! test/sun/security/tools/keytool/PrintSSL.java Changeset: 6c6e8ab540a1 Author: abakhtin Date: 2020-08-25 18:03 +0300 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/6c6e8ab540a1 8245653: Remove 8u TLS tests Reviewed-by: mbalao - test/javax/net/ssl/ALPN/SSLEngineAlpnTest.java - test/javax/net/ssl/FixingJavadocs/ComURLNulls.java - test/javax/net/ssl/FixingJavadocs/SSLSessionNulls.java - test/javax/net/ssl/SSLEngine/Arrays.java - test/javax/net/ssl/SSLEngine/CheckStatus.java - test/javax/net/ssl/SSLEngine/ConnectionTest.java - test/javax/net/ssl/SSLEngine/ExtendedKeyEngine.java - test/javax/net/ssl/SSLEngine/IllegalRecordVersion.java - test/javax/net/ssl/SSLEngine/LargeBufs.java - test/javax/net/ssl/SSLEngine/NoAuthClientAuth.java - test/javax/net/ssl/SSLSession/SessionCacheSizeTests.java - test/javax/net/ssl/SSLSession/SessionTimeOutTests.java - test/javax/net/ssl/SSLSession/testEnabledProtocols.java - test/javax/net/ssl/ServerName/SSLSocketExplorerFailure.java - test/javax/net/ssl/ServerName/SSLSocketSNISensitive.java - test/javax/net/ssl/TLS/CipherTestUtils.java - test/javax/net/ssl/TLS/JSSEClient.java - test/javax/net/ssl/TLS/JSSEServer.java - test/javax/net/ssl/TLS/TLSClientPropertyTest.java - test/javax/net/ssl/TLS/TestJSSE.java - test/javax/net/ssl/TLSv11/ExportableBlockCipher.java - test/javax/net/ssl/TLSv11/ExportableStreamCipher.java - test/javax/net/ssl/TLSv12/DisabledShortDSAKeys.java - test/javax/net/ssl/TLSv12/DisabledShortRSAKeys.java - test/javax/net/ssl/TLSv12/ShortRSAKey512.java - test/javax/net/ssl/TLSv12/ShortRSAKeyGCM.java - test/javax/net/ssl/TLSv12/SignatureAlgorithms.java - test/javax/net/ssl/ciphersuites/DisabledAlgorithms.java - test/javax/net/ssl/ciphersuites/ECCurvesconstraints.java - test/javax/net/ssl/etc/README - test/javax/net/ssl/etc/keystore - test/javax/net/ssl/etc/truststore - test/javax/net/ssl/sanity/ciphersuites/CheckCipherSuites.java - test/javax/net/ssl/sanity/ciphersuites/CipherSuitesInOrder.java - test/javax/net/ssl/sanity/interop/CipherTest.java - test/javax/net/ssl/sanity/interop/ClientJSSEServerJSSE.java - test/javax/net/ssl/sanity/interop/JSSEClient.java - test/javax/net/ssl/sanity/interop/JSSEServer.java - test/javax/net/ssl/templates/SSLEngineTemplate.java - test/javax/net/ssl/templates/SSLSocketSSLEngineTemplate.java - test/javax/net/ssl/templates/SSLSocketTemplate.java - test/sun/net/www/protocol/https/HttpsClient/OriginServer.java - test/sun/net/www/protocol/https/HttpsClient/ProxyAuthTest.java - test/sun/net/www/protocol/https/HttpsClient/ServerIdentityTest.java - test/sun/net/www/protocol/https/HttpsURLConnection/B6216082.java ! test/sun/net/www/protocol/https/HttpsURLConnection/DNSIdentities.java ! test/sun/net/www/protocol/https/HttpsURLConnection/IPAddressDNSIdentities.java ! test/sun/net/www/protocol/https/HttpsURLConnection/IPAddressIPIdentities.java ! test/sun/net/www/protocol/https/HttpsURLConnection/IPIdentities.java ! test/sun/net/www/protocol/https/HttpsURLConnection/Identities.java - test/sun/net/www/protocol/https/HttpsURLConnection/ReadTimeout.java - test/sun/net/www/protocol/https/NewImpl/ComHTTPSConnection.java - test/sun/net/www/protocol/https/NewImpl/ComHostnameVerifier.java - test/sun/security/pkcs11/sslecc/CipherTest.java - test/sun/security/pkcs11/sslecc/ClientJSSEServerJSSE.java - test/sun/security/pkcs11/sslecc/JSSEClient.java - test/sun/security/pkcs11/sslecc/JSSEServer.java - test/sun/security/ssl/AppInputStream/ReadBlocksClose.java - test/sun/security/ssl/AppInputStream/ReadHandshake.java - test/sun/security/ssl/AppOutputStream/NoExceptionOnClose.java - test/sun/security/ssl/CertPathRestrictions/JSSEServer.java - test/sun/security/ssl/CertPathRestrictions/TLSRestrictions.java - test/sun/security/ssl/CipherSuite/SSL_NULL.java - test/sun/security/ssl/ClientHandshaker/LengthCheckTest.java - test/sun/security/ssl/DHKeyExchange/DHEKeySizing.java - test/sun/security/ssl/DHKeyExchange/LegacyDHEKeyExchange.java - test/sun/security/ssl/EngineArgs/DebugReportsOneExtraByte.sh - test/sun/security/ssl/GenSSLConfigs/main.java ! test/sun/security/ssl/HandshakeOutStream/NullCerts.java - test/sun/security/ssl/InputRecord/SSLSocketTimeoutNulls.java ! test/sun/security/ssl/SSLContextImpl/CustomizedCipherSuites.java - test/sun/security/ssl/SSLContextImpl/CustomizedDefaultProtocols.java - test/sun/security/ssl/SSLContextImpl/DefaultEnabledProtocols.java - test/sun/security/ssl/SSLContextImpl/MD2InTrustAnchor.java - test/sun/security/ssl/SSLContextImpl/NoOldVersionContext.java - test/sun/security/ssl/SSLContextImpl/TrustTrustedCert.java - test/sun/security/ssl/SSLEngineImpl/CloseEngineException.java - test/sun/security/ssl/SSLEngineImpl/CloseInboundException.java - test/sun/security/ssl/SSLEngineImpl/CloseStart.java - test/sun/security/ssl/SSLEngineImpl/EngineEnforceUseClientMode.java - test/sun/security/ssl/SSLEngineImpl/RehandshakeFinished.java - test/sun/security/ssl/SSLEngineImpl/SSLEngineBadBufferArrayAccess.java - test/sun/security/ssl/SSLEngineImpl/SSLEngineDeadlock.java - test/sun/security/ssl/SSLSocketImpl/AsyncSSLSocketClose.java - test/sun/security/ssl/SSLSocketImpl/CheckMethods.java - test/sun/security/ssl/SSLSocketImpl/ClientTimeout.java - test/sun/security/ssl/SSLSocketImpl/InvalidateServerSessionRenegotiate.java - test/sun/security/ssl/SSLSocketImpl/NoImpactServerRenego.java - test/sun/security/ssl/SSLSocketImpl/NonAutoClose.java - test/sun/security/ssl/SSLSocketImpl/RejectClientRenego.java - test/sun/security/ssl/SSLSocketImpl/SSLSocketImplThrowsWrongExceptions.java - test/sun/security/ssl/SSLSocketImpl/SetClientMode.java - test/sun/security/ssl/ServerHandshaker/AnonCipherWithWantClientAuth.java ! test/sun/security/ssl/ServerHandshaker/GetPeerHostClient.java - test/sun/security/ssl/SessionIdCollisionTest.java - test/sun/security/ssl/SocketCreation/SocketCreation.java - test/sun/security/ssl/X509TrustManagerImpl/BasicConstraints.java - test/sun/security/ssl/X509TrustManagerImpl/CertRequestOverflow.java - test/sun/security/ssl/X509TrustManagerImpl/ClientServer.java - test/sun/security/ssl/X509TrustManagerImpl/SelfIssuedCert.java - test/sun/security/ssl/X509TrustManagerImpl/Symantec/Distrust.java - test/sun/security/ssl/templates/SSLSocketTemplate.java Changeset: a39036fa30bb Author: abakhtin Date: 2020-08-25 18:12 +0300 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/a39036fa30bb 8245681: Add TLSv1.3 regression test from 11.0.7 Reviewed-by: mbalao + test/java/security/testlibrary/CertificateBuilder.java + test/java/security/testlibrary/SimpleOCSPServer.java + test/javax/net/ssl/ALPN/SSLEngineAlpnTest.java + test/javax/net/ssl/FixingJavadocs/ComURLNulls.java + test/javax/net/ssl/FixingJavadocs/SSLSessionNulls.java + test/javax/net/ssl/SSLEngine/Arrays.java + test/javax/net/ssl/SSLEngine/CheckStatus.java + test/javax/net/ssl/SSLEngine/ConnectionTest.java + test/javax/net/ssl/SSLEngine/EngineCloseOnAlert.java + test/javax/net/ssl/SSLEngine/ExtendedKeyEngine.java + test/javax/net/ssl/SSLEngine/IllegalHandshakeMessage.java + test/javax/net/ssl/SSLEngine/IllegalRecordVersion.java + test/javax/net/ssl/SSLEngine/LargeBufs.java + test/javax/net/ssl/SSLEngine/NoAuthClientAuth.java + test/javax/net/ssl/SSLSession/RenegotiateTLS13.java + test/javax/net/ssl/SSLSession/ResumeTLS13withSNI.java + test/javax/net/ssl/SSLSession/SessionCacheSizeTests.java + test/javax/net/ssl/SSLSession/SessionTimeOutTests.java + test/javax/net/ssl/SSLSession/TestEnabledProtocols.java + test/javax/net/ssl/SSLSocket/InputStreamClosure.java + test/javax/net/ssl/SSLSocket/OutputStreamClosure.java + test/javax/net/ssl/SSLSocket/Tls13PacketSize.java + test/javax/net/ssl/ServerName/SSLSocketExplorerFailure.java + test/javax/net/ssl/ServerName/SSLSocketSNISensitive.java + test/javax/net/ssl/Stapling/HttpsUrlConnClient.java + test/javax/net/ssl/Stapling/SSLEngineWithStapling.java + test/javax/net/ssl/Stapling/SSLSocketWithStapling.java + test/javax/net/ssl/Stapling/StapleEnableProps.java + test/javax/net/ssl/TLS/CipherTestUtils.java + test/javax/net/ssl/TLS/JSSEClient.java + test/javax/net/ssl/TLS/JSSEServer.java + test/javax/net/ssl/TLS/TLSClientPropertyTest.java + test/javax/net/ssl/TLS/TLSDataExchangeTest.java + test/javax/net/ssl/TLS/TLSEnginesClosureTest.java + test/javax/net/ssl/TLS/TLSHandshakeTest.java + test/javax/net/ssl/TLS/TLSMFLNTest.java + test/javax/net/ssl/TLS/TLSNotEnabledRC4Test.java + test/javax/net/ssl/TLS/TLSRehandshakeTest.java + test/javax/net/ssl/TLS/TLSRehandshakeWithCipherChangeTest.java + test/javax/net/ssl/TLS/TLSRehandshakeWithDataExTest.java + test/javax/net/ssl/TLS/TLSUnsupportedCiphersTest.java + test/javax/net/ssl/TLS/TestJSSE.java + test/javax/net/ssl/TLS/TestJSSEClientDefaultProtocol.java + test/javax/net/ssl/TLS/TestJSSEClientProtocol.java + test/javax/net/ssl/TLS/TestJSSENoCommonProtocols.java + test/javax/net/ssl/TLS/TestJSSEServerProtocol.java + test/javax/net/ssl/TLSCommon/BufferOverflowUnderflowTest.java + test/javax/net/ssl/TLSCommon/CipherSuite.java + test/javax/net/ssl/TLSCommon/ConcurrentClientAccessTest.java + test/javax/net/ssl/TLSCommon/DataExchangeTest.java + test/javax/net/ssl/TLSCommon/EnginesClosureTest.java + test/javax/net/ssl/TLSCommon/HandshakeTest.java + test/javax/net/ssl/TLSCommon/KeyAlgorithm.java + test/javax/net/ssl/TLSCommon/KeyExAlgorithm.java + test/javax/net/ssl/TLSCommon/MFLNTest.java + test/javax/net/ssl/TLSCommon/NotEnabledRC4Test.java + test/javax/net/ssl/TLSCommon/Protocol.java + test/javax/net/ssl/TLSCommon/RehandshakeTest.java + test/javax/net/ssl/TLSCommon/RehandshakeWithCipherChangeTest.java + test/javax/net/ssl/TLSCommon/RehandshakeWithDataExTest.java + test/javax/net/ssl/TLSCommon/SSLEngineTestCase.java + test/javax/net/ssl/TLSCommon/TLSTest.java + test/javax/net/ssl/TLSCommon/TestSessionLocalPrincipal.java + test/javax/net/ssl/TLSCommon/UnsupportedCiphersTest.java + test/javax/net/ssl/TLSCommon/jaas.conf + test/javax/net/ssl/TLSv1/TLSDataExchangeTest.java + test/javax/net/ssl/TLSv1/TLSEnginesClosureTest.java + test/javax/net/ssl/TLSv1/TLSHandshakeTest.java + test/javax/net/ssl/TLSv1/TLSMFLNTest.java + test/javax/net/ssl/TLSv1/TLSNotEnabledRC4Test.java + test/javax/net/ssl/TLSv1/TLSRehandshakeTest.java + test/javax/net/ssl/TLSv1/TLSRehandshakeWithCipherChangeTest.java + test/javax/net/ssl/TLSv1/TLSRehandshakeWithDataExTest.java + test/javax/net/ssl/TLSv1/TLSUnsupportedCiphersTest.java + test/javax/net/ssl/TLSv11/ExportableBlockCipher.java + test/javax/net/ssl/TLSv11/ExportableStreamCipher.java + test/javax/net/ssl/TLSv11/TLSDataExchangeTest.java + test/javax/net/ssl/TLSv11/TLSEnginesClosureTest.java + test/javax/net/ssl/TLSv11/TLSHandshakeTest.java + test/javax/net/ssl/TLSv11/TLSMFLNTest.java + test/javax/net/ssl/TLSv11/TLSNotEnabledRC4Test.java + test/javax/net/ssl/TLSv11/TLSRehandshakeTest.java + test/javax/net/ssl/TLSv11/TLSRehandshakeWithCipherChangeTest.java + test/javax/net/ssl/TLSv11/TLSRehandshakeWithDataExTest.java + test/javax/net/ssl/TLSv11/TLSUnsupportedCiphersTest.java + test/javax/net/ssl/TLSv12/DisabledShortDSAKeys.java + test/javax/net/ssl/TLSv12/DisabledShortRSAKeys.java + test/javax/net/ssl/TLSv12/ShortRSAKey512.java + test/javax/net/ssl/TLSv12/ShortRSAKeyGCM.java + test/javax/net/ssl/TLSv12/SignatureAlgorithms.java + test/javax/net/ssl/TLSv12/TLSEnginesClosureTest.java + test/javax/net/ssl/ciphersuites/DisabledAlgorithms.java + test/javax/net/ssl/ciphersuites/ECCurvesconstraints.java + test/javax/net/ssl/compatibility/Cert.java + test/javax/net/ssl/compatibility/Client.java + test/javax/net/ssl/compatibility/ClientHelloProcessing.java + test/javax/net/ssl/compatibility/Compatibility.java + test/javax/net/ssl/compatibility/JdkInfo.java + test/javax/net/ssl/compatibility/JdkRelease.java + test/javax/net/ssl/compatibility/JdkUtils.java + test/javax/net/ssl/compatibility/ProcessUtils.java + test/javax/net/ssl/compatibility/README + test/javax/net/ssl/compatibility/Server.java + test/javax/net/ssl/compatibility/Status.java + test/javax/net/ssl/compatibility/TestCase.java + test/javax/net/ssl/compatibility/UseCase.java + test/javax/net/ssl/compatibility/Utils.java + test/javax/net/ssl/compatibility/java.security + test/javax/net/ssl/etc/README + test/javax/net/ssl/etc/keystore + test/javax/net/ssl/etc/truststore + test/javax/net/ssl/interop/ClientHelloBufferUnderflowException.java + test/javax/net/ssl/interop/ClientHelloChromeInterOp.java + test/javax/net/ssl/interop/ClientHelloInterOp.java + test/javax/net/ssl/sanity/CacertsExplorer.java + test/javax/net/ssl/sanity/ciphersuites/CheckCipherSuites.java + test/javax/net/ssl/sanity/ciphersuites/CipherSuitesInOrder.java + test/javax/net/ssl/sanity/interop/CipherTest.java + test/javax/net/ssl/sanity/interop/ClientJSSEServerJSSE.java + test/javax/net/ssl/sanity/interop/JSSEClient.java + test/javax/net/ssl/sanity/interop/JSSEServer.java + test/javax/net/ssl/templates/SSLContextTemplate.java + test/javax/net/ssl/templates/SSLEngineTemplate.java + test/javax/net/ssl/templates/SSLSocketSSLEngineTemplate.java + test/javax/net/ssl/templates/SSLSocketTemplate.java + test/sun/net/www/protocol/https/HttpsClient/ProxyAuthTest.java + test/sun/net/www/protocol/https/HttpsClient/ServerIdentityTest.java + test/sun/net/www/protocol/https/HttpsURLConnection/B6216082.java + test/sun/net/www/protocol/https/HttpsURLConnection/ReadTimeout.java + test/sun/net/www/protocol/https/NewImpl/ComHTTPSConnection.java + test/sun/net/www/protocol/https/NewImpl/ComHostnameVerifier.java + test/sun/security/pkcs11/sslecc/CipherTest.java + test/sun/security/pkcs11/sslecc/ClientJSSEServerJSSE.java + test/sun/security/pkcs11/sslecc/JSSEClient.java + test/sun/security/pkcs11/sslecc/JSSEServer.java + test/sun/security/pkcs11/sslecc/policy + test/sun/security/provider/certpath/Extensions/OCSPNonceExtensionTests.java + test/sun/security/provider/certpath/ResponderId/ResponderIdTests.java + test/sun/security/ssl/AppInputStream/ReadBlocksClose.java + test/sun/security/ssl/AppInputStream/ReadHandshake.java + test/sun/security/ssl/AppOutputStream/NoExceptionOnClose.java + test/sun/security/ssl/CertPathRestrictions/JSSEServer.java + test/sun/security/ssl/CertPathRestrictions/TLSRestrictions.java + test/sun/security/ssl/CipherSuite/SSL_NULL.java + test/sun/security/ssl/ClientHandshaker/LengthCheckTest.java + test/sun/security/ssl/DHKeyExchange/DHEKeySizing.java + test/sun/security/ssl/DHKeyExchange/LegacyDHEKeyExchange.java + test/sun/security/ssl/DHKeyExchange/UseStrongDHSizes.java + test/sun/security/ssl/EngineArgs/DebugReportsOneExtraByte.sh + test/sun/security/ssl/GenSSLConfigs/main.java + test/sun/security/ssl/InputRecord/SSLSocketTimeoutNulls.java + test/sun/security/ssl/SSLContextImpl/CustomizedDefaultProtocols.java + test/sun/security/ssl/SSLContextImpl/CustomizedServerDefaultProtocols.java + test/sun/security/ssl/SSLContextImpl/DefaultEnabledProtocols.java + test/sun/security/ssl/SSLContextImpl/MD2InTrustAnchor.java + test/sun/security/ssl/SSLContextImpl/NoOldVersionContext.java + test/sun/security/ssl/SSLContextImpl/TrustTrustedCert.java + test/sun/security/ssl/SSLEngineImpl/CloseEngineException.java + test/sun/security/ssl/SSLEngineImpl/CloseStart.java + test/sun/security/ssl/SSLEngineImpl/EngineEnforceUseClientMode.java + test/sun/security/ssl/SSLEngineImpl/RehandshakeFinished.java + test/sun/security/ssl/SSLEngineImpl/SSLEngineBadBufferArrayAccess.java + test/sun/security/ssl/SSLEngineImpl/SSLEngineDeadlock.java + test/sun/security/ssl/SSLEngineImpl/SSLEngineFailedALPN.java + test/sun/security/ssl/SSLEngineImpl/SSLEngineKeyLimit.java + test/sun/security/ssl/SSLEngineImpl/TLS13BeginHandshake.java + test/sun/security/ssl/SSLSessionImpl/ResumeChecksClient.java + test/sun/security/ssl/SSLSessionImpl/ResumeChecksServer.java + test/sun/security/ssl/SSLSocketImpl/AsyncSSLSocketClose.java + test/sun/security/ssl/SSLSocketImpl/CheckMethods.java + test/sun/security/ssl/SSLSocketImpl/ClientTimeout.java + test/sun/security/ssl/SSLSocketImpl/InvalidateServerSessionRenegotiate.java + test/sun/security/ssl/SSLSocketImpl/LargePacketAfterHandshakeTest.java + test/sun/security/ssl/SSLSocketImpl/NoImpactServerRenego.java + test/sun/security/ssl/SSLSocketImpl/NonAutoClose.java + test/sun/security/ssl/SSLSocketImpl/RejectClientRenego.java + test/sun/security/ssl/SSLSocketImpl/SSLExceptionForIOIssue.java + test/sun/security/ssl/SSLSocketImpl/SSLSocketImplThrowsWrongExceptions.java + test/sun/security/ssl/SSLSocketImpl/SSLSocketKeyLimit.java + test/sun/security/ssl/SSLSocketImpl/ServerRenegoWithTwoVersions.java + test/sun/security/ssl/SSLSocketImpl/SetClientMode.java + test/sun/security/ssl/ServerHandshaker/AnonCipherWithWantClientAuth.java + test/sun/security/ssl/SignatureScheme/Tls13NamedGroups.java + test/sun/security/ssl/SocketCreation/SocketCreation.java + test/sun/security/ssl/Stapling/StatusResponseManager.java + test/sun/security/ssl/Stapling/java.base/sun/security/ssl/StatusResponseManagerTests.java + test/sun/security/ssl/X509TrustManagerImpl/BasicConstraints.java + test/sun/security/ssl/X509TrustManagerImpl/CertRequestOverflow.java + test/sun/security/ssl/X509TrustManagerImpl/ClientServer.java + test/sun/security/ssl/X509TrustManagerImpl/SelfIssuedCert.java + test/sun/security/ssl/X509TrustManagerImpl/Symantec/Distrust.java + test/sun/security/ssl/internal/TestRun.java + test/sun/security/ssl/internal/java.base/sun/security/ssl/TestHkdf.java Changeset: e329505b1e6a Author: mullan Date: 2017-04-06 16:21 -0400 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/e329505b1e6a 8161973: PKIXRevocationChecker.getSoftFailExceptions() not working Reviewed-by: xuelei, mbalao ! src/share/classes/sun/security/provider/certpath/RevocationChecker.java ! test/java/security/cert/PKIXRevocationChecker/OcspUnauthorized.java Changeset: cf50798dd5a5 Author: abakhtin Date: 2020-08-25 18:29 +0300 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/cf50798dd5a5 8251341: Minimal Java specification change Reviewed-by: mbalao ! src/share/classes/javax/net/ssl/ExtendedSSLSession.java Changeset: 0846e98f2db9 Author: xuelei Date: 2019-11-08 18:35 -0800 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/0846e98f2db9 8233621: Mismatch in jsse.enableMFLNExtension property name Reviewed-by: mullan ! src/share/classes/sun/security/ssl/SSLExtension.java Changeset: ed0d638da09f Author: abakhtin Date: 2020-08-27 23:21 +0300 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/ed0d638da09f 8251478: Backport TLSv1.3 regression tests to JDK8u Reviewed-by: mbalao ! test/javax/net/ssl/FixingJavadocs/ComURLNulls.java ! test/javax/net/ssl/FixingJavadocs/SSLSessionNulls.java ! test/javax/net/ssl/SSLSession/RenegotiateTLS13.java ! test/javax/net/ssl/SSLSession/ResumeTLS13withSNI.java ! test/javax/net/ssl/SSLSocket/InputStreamClosure.java ! test/javax/net/ssl/SSLSocket/OutputStreamClosure.java ! test/javax/net/ssl/SSLSocket/Tls13PacketSize.java ! test/javax/net/ssl/Stapling/HttpsUrlConnClient.java ! test/javax/net/ssl/Stapling/SSLEngineWithStapling.java ! test/javax/net/ssl/Stapling/SSLSocketWithStapling.java ! test/javax/net/ssl/Stapling/StapleEnableProps.java ! test/javax/net/ssl/TLS/TLSClientPropertyTest.java ! test/javax/net/ssl/TLS/TLSDataExchangeTest.java ! test/javax/net/ssl/TLS/TLSEnginesClosureTest.java ! test/javax/net/ssl/TLS/TLSHandshakeTest.java ! test/javax/net/ssl/TLS/TLSMFLNTest.java ! test/javax/net/ssl/TLS/TLSNotEnabledRC4Test.java ! test/javax/net/ssl/TLS/TLSRehandshakeTest.java ! test/javax/net/ssl/TLS/TLSRehandshakeWithCipherChangeTest.java ! test/javax/net/ssl/TLS/TLSRehandshakeWithDataExTest.java ! test/javax/net/ssl/TLS/TLSUnsupportedCiphersTest.java ! test/javax/net/ssl/TLS/TestJSSEClientDefaultProtocol.java ! test/javax/net/ssl/TLS/TestJSSEClientProtocol.java ! test/javax/net/ssl/TLS/TestJSSENoCommonProtocols.java ! test/javax/net/ssl/TLS/TestJSSEServerProtocol.java ! test/javax/net/ssl/TLSCommon/Protocol.java ! test/javax/net/ssl/TLSCommon/RehandshakeWithCipherChangeTest.java ! test/javax/net/ssl/TLSCommon/RehandshakeWithDataExTest.java ! test/javax/net/ssl/TLSCommon/SSLEngineTestCase.java ! test/javax/net/ssl/TLSv1/TLSDataExchangeTest.java ! test/javax/net/ssl/TLSv1/TLSEnginesClosureTest.java ! test/javax/net/ssl/TLSv1/TLSHandshakeTest.java ! test/javax/net/ssl/TLSv1/TLSMFLNTest.java ! test/javax/net/ssl/TLSv1/TLSNotEnabledRC4Test.java ! test/javax/net/ssl/TLSv1/TLSRehandshakeTest.java ! test/javax/net/ssl/TLSv1/TLSRehandshakeWithCipherChangeTest.java ! test/javax/net/ssl/TLSv1/TLSRehandshakeWithDataExTest.java ! test/javax/net/ssl/TLSv1/TLSUnsupportedCiphersTest.java ! test/javax/net/ssl/TLSv11/ExportableBlockCipher.java ! test/javax/net/ssl/TLSv11/ExportableStreamCipher.java ! test/javax/net/ssl/TLSv11/TLSDataExchangeTest.java ! test/javax/net/ssl/TLSv11/TLSEnginesClosureTest.java ! test/javax/net/ssl/TLSv11/TLSHandshakeTest.java ! test/javax/net/ssl/TLSv11/TLSMFLNTest.java ! test/javax/net/ssl/TLSv11/TLSNotEnabledRC4Test.java ! test/javax/net/ssl/TLSv11/TLSRehandshakeTest.java ! test/javax/net/ssl/TLSv11/TLSRehandshakeWithCipherChangeTest.java ! test/javax/net/ssl/TLSv11/TLSRehandshakeWithDataExTest.java ! test/javax/net/ssl/TLSv11/TLSUnsupportedCiphersTest.java ! test/javax/net/ssl/TLSv12/TLSEnginesClosureTest.java ! test/javax/net/ssl/ciphersuites/DisabledAlgorithms.java ! test/javax/net/ssl/ciphersuites/ECCurvesconstraints.java ! test/javax/net/ssl/interop/ClientHelloBufferUnderflowException.java ! test/javax/net/ssl/interop/ClientHelloChromeInterOp.java ! test/javax/net/ssl/sanity/ciphersuites/CheckCipherSuites.java ! test/javax/net/ssl/templates/SSLContextTemplate.java ! test/javax/net/ssl/templates/SSLSocketTemplate.java ! test/sun/net/www/protocol/https/HttpsClient/ProxyAuthTest.java ! test/sun/net/www/protocol/https/HttpsURLConnection/B6216082.java ! test/sun/net/www/protocol/https/NewImpl/ComHTTPSConnection.java ! test/sun/net/www/protocol/https/NewImpl/ComHostnameVerifier.java ! test/sun/security/pkcs11/fips/ClientJSSEServerJSSE.java ! test/sun/security/pkcs11/sslecc/ClientJSSEServerJSSE.java ! test/sun/security/provider/certpath/Extensions/OCSPNonceExtensionTests.java ! test/sun/security/provider/certpath/ResponderId/ResponderIdTests.java ! test/sun/security/ssl/CertPathRestrictions/TLSRestrictions.java ! test/sun/security/ssl/ClientHandshaker/LengthCheckTest.java ! test/sun/security/ssl/DHKeyExchange/UseStrongDHSizes.java ! test/sun/security/ssl/SSLContextImpl/CustomizedServerDefaultProtocols.java ! test/sun/security/ssl/SSLContextImpl/DefaultEnabledProtocols.java ! test/sun/security/ssl/SSLEngineImpl/SSLEngineKeyLimit.java ! test/sun/security/ssl/SSLEngineImpl/TLS13BeginHandshake.java ! test/sun/security/ssl/SSLSessionImpl/ResumeChecksClient.java ! test/sun/security/ssl/SSLSessionImpl/ResumeChecksServer.java ! test/sun/security/ssl/SSLSocketImpl/SSLSocketKeyLimit.java ! test/sun/security/ssl/ServerHandshaker/AnonCipherWithWantClientAuth.java - test/sun/security/ssl/Stapling/StatusResponseManager.java + test/sun/security/ssl/Stapling/StatusResponseManager.sh ! test/sun/security/ssl/X509TrustManagerImpl/ClientServer.java ! test/sun/security/ssl/X509TrustManagerImpl/Symantec/Distrust.java - test/sun/security/ssl/internal/TestRun.java + test/sun/security/ssl/internal/TestRun.sh Changeset: 4546aa3faf37 Author: andrew Date: 2020-08-31 06:57 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/4546aa3faf37 Merge - src/share/classes/sun/security/ssl/ALPNExtension.java - src/share/classes/sun/security/ssl/Alerts.java - src/share/classes/sun/security/ssl/AppInputStream.java - src/share/classes/sun/security/ssl/AppOutputStream.java ! src/share/classes/sun/security/ssl/Authenticator.java ! src/share/classes/sun/security/ssl/BaseSSLSocketImpl.java - src/share/classes/sun/security/ssl/ByteBufferInputStream.java - src/share/classes/sun/security/ssl/CipherBox.java ! src/share/classes/sun/security/ssl/CipherSuite.java - src/share/classes/sun/security/ssl/CipherSuiteList.java - src/share/classes/sun/security/ssl/ClientHandshaker.java ! src/share/classes/sun/security/ssl/DHClientKeyExchange.java - src/share/classes/sun/security/ssl/DHCrypt.java - src/share/classes/sun/security/ssl/Debug.java ! src/share/classes/sun/security/ssl/ECDHClientKeyExchange.java - src/share/classes/sun/security/ssl/ECDHCrypt.java - src/share/classes/sun/security/ssl/EllipticCurvesExtension.java - src/share/classes/sun/security/ssl/EllipticPointFormatsExtension.java - src/share/classes/sun/security/ssl/EngineArgs.java - src/share/classes/sun/security/ssl/EngineInputRecord.java - src/share/classes/sun/security/ssl/EngineOutputRecord.java - src/share/classes/sun/security/ssl/EngineWriter.java ! src/share/classes/sun/security/ssl/EphemeralKeyManager.java ! src/share/classes/sun/security/ssl/ExtendedMasterSecretExtension.java - src/share/classes/sun/security/ssl/ExtensionType.java ! src/share/classes/sun/security/ssl/HandshakeHash.java - src/share/classes/sun/security/ssl/HandshakeInStream.java - src/share/classes/sun/security/ssl/HandshakeMessage.java ! src/share/classes/sun/security/ssl/HandshakeOutStream.java - src/share/classes/sun/security/ssl/HandshakeStateManager.java - src/share/classes/sun/security/ssl/Handshaker.java - src/share/classes/sun/security/ssl/HelloExtension.java - src/share/classes/sun/security/ssl/HelloExtensions.java ! src/share/classes/sun/security/ssl/InputRecord.java ! src/share/classes/sun/security/ssl/JsseJce.java - src/share/classes/sun/security/ssl/KerberosClientKeyExchange.java ! src/share/classes/sun/security/ssl/KeyManagerFactoryImpl.java - src/share/classes/sun/security/ssl/MAC.java ! src/share/classes/sun/security/ssl/OutputRecord.java - src/share/classes/sun/security/ssl/ProtocolList.java ! src/share/classes/sun/security/ssl/ProtocolVersion.java ! src/share/classes/sun/security/ssl/RSAClientKeyExchange.java ! src/share/classes/sun/security/ssl/RSASignature.java ! src/share/classes/sun/security/ssl/RandomCookie.java ! src/share/classes/sun/security/ssl/Record.java - src/share/classes/sun/security/ssl/RenegotiationInfoExtension.java ! src/share/classes/sun/security/ssl/SSLAlgorithmConstraints.java ! src/share/classes/sun/security/ssl/SSLAlgorithmDecomposer.java ! src/share/classes/sun/security/ssl/SSLContextImpl.java ! src/share/classes/sun/security/ssl/SSLEngineImpl.java ! src/share/classes/sun/security/ssl/SSLServerSocketFactoryImpl.java ! src/share/classes/sun/security/ssl/SSLServerSocketImpl.java ! src/share/classes/sun/security/ssl/SSLSessionContextImpl.java ! src/share/classes/sun/security/ssl/SSLSessionImpl.java ! src/share/classes/sun/security/ssl/SSLSocketFactoryImpl.java ! src/share/classes/sun/security/ssl/SSLSocketImpl.java - src/share/classes/sun/security/ssl/ServerHandshaker.java ! src/share/classes/sun/security/ssl/ServerNameExtension.java ! src/share/classes/sun/security/ssl/SessionId.java ! src/share/classes/sun/security/ssl/SignatureAlgorithmsExtension.java - src/share/classes/sun/security/ssl/SignatureAndHashAlgorithm.java ! src/share/classes/sun/security/ssl/SunX509KeyManagerImpl.java ! src/share/classes/sun/security/ssl/TrustManagerFactoryImpl.java ! src/share/classes/sun/security/ssl/TrustStoreManager.java - src/share/classes/sun/security/ssl/UnknownExtension.java ! src/share/classes/sun/security/ssl/Utilities.java ! src/share/classes/sun/security/ssl/X509KeyManagerImpl.java ! src/share/classes/sun/security/ssl/X509TrustManagerImpl.java - src/share/classes/sun/security/ssl/krb5/KerberosClientKeyExchangeImpl.java - src/share/classes/sun/security/ssl/krb5/KerberosPreMasterSecret.java ! test/javax/net/ssl/SSLEngine/IllegalRecordVersion.java ! test/javax/net/ssl/TLS/CipherTestUtils.java ! test/javax/net/ssl/TLS/JSSEClient.java ! test/javax/net/ssl/TLS/JSSEServer.java ! test/javax/net/ssl/TLS/TLSClientPropertyTest.java ! test/javax/net/ssl/TLS/TestJSSE.java ! test/javax/net/ssl/TLSv12/DisabledShortDSAKeys.java ! test/javax/net/ssl/TLSv12/SignatureAlgorithms.java ! test/javax/net/ssl/ciphersuites/DisabledAlgorithms.java ! test/javax/net/ssl/ciphersuites/ECCurvesconstraints.java ! test/javax/net/ssl/templates/SSLSocketTemplate.java ! test/sun/security/pkcs11/sslecc/CipherTest.java ! test/sun/security/pkcs11/sslecc/ClientJSSEServerJSSE.java ! test/sun/security/pkcs11/sslecc/JSSEClient.java ! test/sun/security/pkcs11/sslecc/JSSEServer.java ! test/sun/security/ssl/CertPathRestrictions/JSSEServer.java ! test/sun/security/ssl/CertPathRestrictions/TLSRestrictions.java ! test/sun/security/ssl/DHKeyExchange/LegacyDHEKeyExchange.java - test/sun/security/ssl/README - test/sun/security/ssl/SSLContextImpl/DefautlCacheSize.java - test/sun/security/ssl/SessionIdCollisionTest.java - test/sun/security/ssl/com/sun/net/ssl/SSLSecurity/ComKeyManagerFactoryImpl.java - test/sun/security/ssl/com/sun/net/ssl/SSLSecurity/ComSSLContextImpl.java - test/sun/security/ssl/com/sun/net/ssl/SSLSecurity/ComTrustManagerFactoryImpl.java - test/sun/security/ssl/com/sun/net/ssl/SSLSecurity/JavaxKeyManagerFactoryImpl.java - test/sun/security/ssl/com/sun/net/ssl/SSLSecurity/JavaxSSLContextImpl.java - test/sun/security/ssl/com/sun/net/ssl/SSLSecurity/JavaxTrustManagerFactoryImpl.java - test/sun/security/ssl/com/sun/net/ssl/SSLSecurity/ProviderTest.java - test/sun/security/ssl/com/sun/net/ssl/SSLSecurity/TruncateArray.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/AppInputStream/ReadBlocksClose.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/AppInputStream/ReadHandshake.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/AppInputStream/ReadZeroBytes.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/AppInputStream/RemoveMarkReset.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/AppOutputStream/NoExceptionOnClose.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/CipherSuite/SSL_NULL.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ClientHandshaker/CipherSuiteOrder.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ClientHandshaker/LengthCheckTest.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ClientHandshaker/RSAExport.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/DHKeyExchange/DHEKeySizing.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/EngineArgs/DebugReportsOneExtraByte.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/EngineArgs/DebugReportsOneExtraByte.sh - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/GenSSLConfigs/ClientThread.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/GenSSLConfigs/Handler.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/GenSSLConfigs/ServerHandler.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/GenSSLConfigs/ServerThread.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/GenSSLConfigs/TestThread.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/GenSSLConfigs/Traffic.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/GenSSLConfigs/main.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/HandshakeOutStream/NullCerts.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/InputRecord/ClientHelloRead.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/InputRecord/OriginServer.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/InputRecord/ProxyTunnelServer.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/InputRecord/SSLSocketTimeoutNulls.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ProtocolVersion/HttpsProtocols.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/BadKSProvider.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/BadTSProvider.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/CustomizedDefaultProtocols.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/DefaultEnabledProtocols.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/GoodProvider.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/IllegalProtocolProperty.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/MD2InTrustAnchor.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/NoOldVersionContext.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/NullGetAcceptedIssuers.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/SSLContextVersion.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/TrustTrustedCert.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/CloseEngineException.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/CloseInboundException.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/CloseStart.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/DelegatedTaskWrongException.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/EmptyExtensionData.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/EngineEnforceUseClientMode.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/RehandshakeFinished.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/SSLEngineBadBufferArrayAccess.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/SSLEngineDeadlock.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSessionContextImpl/Timeout.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSessionImpl/HashCodeMissing.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/AsyncSSLSocketClose.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/CheckMethods.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/ClientModeClientAuth.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/ClientTimeout.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/CloseSocket.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/CloseSocketException.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/InvalidateServerSessionRenegotiate.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/LoopbackSSLSocket.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/NewSocketMethods.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/NoImpactServerRenego.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/NonAutoClose.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/NotifyHandshakeTest.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/NotifyHandshakeTest.policy - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/NotifyHandshakeTest.sh - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/NotifyHandshakeTestHeyYou.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/RejectClientRenego.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/ReuseAddr.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/ReverseNameLookup.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/SSLSocketImplThrowsWrongExceptions.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/ServerTimeout.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/SetClientMode.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/UnconnectedSocketWrongExceptions.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ServerHandshaker/AnonCipherWithWantClientAuth.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ServerHandshaker/GetPeerHost.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ServerHandshaker/GetPeerHostClient.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ServerHandshaker/GetPeerHostServer.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SocketCreation/SocketCreation.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509KeyManager/NullCases.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509KeyManager/PreferredKey.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509KeyManager/SelectOneKeyOutOfMany.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/BasicConstraints.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/CertRequestOverflow.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/CheckNullEntity.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/ClientServer.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/ComodoHacker.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/PKIXExtendedTM.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/SelfIssuedCert.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/SunX509ExtendedTM.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/Distrust.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/appleistca2g1-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/appleistca8g1-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/geotrustglobalca-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/geotrustprimarycag2-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/geotrustprimarycag3-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/geotrustuniversalca-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/thawteprimaryrootca-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/thawteprimaryrootcag2-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/thawteprimaryrootcag3-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/verisignclass3g3ca-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/verisignclass3g4ca-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/verisignclass3g5ca-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/verisignclass3g5ca-codesigning-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/verisignuniversalrootca-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/X509ExtendedTMEnabled.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/rsa/BrokenRSAPrivateCrtKey.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/spi/ProviderInit.java - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/MyKeyManager.java - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/OriginServer.java - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/ProxyAuthTest.java - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/ProxyTunnelServer.java - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/ServerIdentityTest.java - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/dnsstore - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/ipstore - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsURLConnection/CriticalSubjectAltName.java - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsURLConnection/GetResponseCode.java - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsURLConnection/crisubn.jks - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsURLConnection/trusted.jks - test/sun/security/ssl/etc/README - test/sun/security/ssl/etc/keystore - test/sun/security/ssl/etc/truststore - test/sun/security/ssl/etc/unknown_keystore - test/sun/security/ssl/javax/net/ssl/ALPN/MyX509ExtendedKeyManager.java - test/sun/security/ssl/javax/net/ssl/ALPN/SSLEngineAlpnTest.java - test/sun/security/ssl/javax/net/ssl/ALPN/SSLServerSocketAlpnTest.java - test/sun/security/ssl/javax/net/ssl/ALPN/SSLSocketAlpnTest.java - test/sun/security/ssl/javax/net/ssl/Fix5070632.java - test/sun/security/ssl/javax/net/ssl/FixingJavadocs/ComURLNulls.java - test/sun/security/ssl/javax/net/ssl/FixingJavadocs/ImplicitHandshake.java - test/sun/security/ssl/javax/net/ssl/FixingJavadocs/JavaxURLNulls.java - test/sun/security/ssl/javax/net/ssl/FixingJavadocs/KMTMGetNothing.java - test/sun/security/ssl/javax/net/ssl/FixingJavadocs/SSLSessionNulls.java - test/sun/security/ssl/javax/net/ssl/FixingJavadocs/SSLSocketInherit.java - test/sun/security/ssl/javax/net/ssl/GetInstance.java - test/sun/security/ssl/javax/net/ssl/HttpsURLConnection/DelayDefaultContextLoading.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/CheckMyTrustedKeystore.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/HttpsURLConnectionLocalCertificateChain.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/JSSERenegotiate.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/KeyManagerTrustManager.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLCtxAccessToSessCtx.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/AcceptLargeFragments.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/ArgCheck.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/Arrays.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/Basics.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/CheckStatus.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/ConnectionTest.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/ExtendedKeyEngine.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/ExtendedKeySocket.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/LargeBufs.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/LargePacket.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/MyX509ExtendedKeyManager.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/MyX509KeyManager.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/NoAuthClientAuth.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/SSLEngineResultArgs.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/SSLEngineService.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/TestAllSuites.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngineResult/Deserialize.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SessionCacheSizeTests.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SessionTimeOutTests.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/testEnabledProtocols.java - test/sun/security/ssl/javax/net/ssl/SSLParameters/UseCipherSuitesOrder.java - test/sun/security/ssl/javax/net/ssl/SSLServerSocket/DefaultSSLServSocketFac.java - test/sun/security/ssl/javax/net/ssl/ServerName/IllegalSNIName.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLEngineExplorer.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLEngineExplorerMatchedSNI.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLEngineExplorerUnmatchedSNI.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLEngineExplorerWithCli.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLEngineExplorerWithSrv.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketConsistentSNI.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketExplorer.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketExplorerFailure.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketExplorerMatchedSNI.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketExplorerUnmatchedSNI.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketExplorerWithCliSNI.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketExplorerWithSrvSNI.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketInconsistentSNI.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketSNISensitive.java - test/sun/security/ssl/javax/net/ssl/TLSv11/EmptyCertificateAuthorities.java - test/sun/security/ssl/javax/net/ssl/TLSv11/ExportableBlockCipher.java - test/sun/security/ssl/javax/net/ssl/TLSv11/ExportableStreamCipher.java - test/sun/security/ssl/javax/net/ssl/TLSv11/GenericBlockCipher.java - test/sun/security/ssl/javax/net/ssl/TLSv11/GenericStreamCipher.java - test/sun/security/ssl/javax/net/ssl/TLSv12/DisabledShortRSAKeys.java - test/sun/security/ssl/javax/net/ssl/TLSv12/ShortRSAKey512.java - test/sun/security/ssl/javax/net/ssl/TLSv12/ShortRSAKeyGCM.java - test/sun/security/ssl/sanity/ciphersuites/CheckCipherSuites.java - test/sun/security/ssl/sanity/ciphersuites/CipherSuitesInOrder.java - test/sun/security/ssl/sanity/ciphersuites/NoKerberos.java - test/sun/security/ssl/sanity/interop/CipherTest.java - test/sun/security/ssl/sanity/interop/ClientJSSEServerJSSE.java - test/sun/security/ssl/sanity/interop/JSSEClient.java - test/sun/security/ssl/sanity/interop/JSSEServer.java - test/sun/security/ssl/sanity/pluggability/CheckSSLContextExport.java - test/sun/security/ssl/sanity/pluggability/CheckSockFacExport1.java - test/sun/security/ssl/sanity/pluggability/CheckSockFacExport2.java - test/sun/security/ssl/sanity/pluggability/CipherSuites.java - test/sun/security/ssl/sanity/pluggability/MySSLContextImpl.java - test/sun/security/ssl/sanity/pluggability/MySSLEngineImpl.java - test/sun/security/ssl/sanity/pluggability/MySSLServerSocketFacImpl.java - test/sun/security/ssl/sanity/pluggability/MySSLSocketFacImpl.java - test/sun/security/ssl/sun/net/www/http/ChunkedOutputStream/Test.java - test/sun/security/ssl/sun/net/www/httpstest/AbstractCallback.java - test/sun/security/ssl/sun/net/www/httpstest/ClosedChannelList.java - test/sun/security/ssl/sun/net/www/httpstest/HttpCallback.java - test/sun/security/ssl/sun/net/www/httpstest/HttpTransaction.java - test/sun/security/ssl/sun/net/www/httpstest/TestHttpsServer.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/B6216082.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/B6226610.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/CheckMethods.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/CloseKeepAliveCached.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/CookieHandlerTest.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/CookieHttpsClientTest.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/DNSIdentities.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/HttpsCreateSockTest.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/HttpsPost.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/HttpsProxyStackOverflow.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/HttpsSocketFacTest.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPAddressDNSIdentities.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPAddressIPIdentities.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPIdentities.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/Identities.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/OriginServer.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/PostThruProxy.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/PostThruProxyWithAuth.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/ProxyTunnelServer.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/ReadTimeout.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/Redirect.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/RetryHttps.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/TunnelProxy.java - test/sun/security/ssl/sun/net/www/protocol/https/NewImpl/ComHTTPSConnection.java - test/sun/security/ssl/sun/net/www/protocol/https/NewImpl/ComHostnameVerifier.java - test/sun/security/ssl/sun/net/www/protocol/https/NewImpl/JavaxHTTPSConnection.java - test/sun/security/ssl/sun/net/www/protocol/https/NewImpl/JavaxHostnameVerifier.java - test/sun/security/ssl/templates/SSLCapabilities.java - test/sun/security/ssl/templates/SSLEngineTemplate.java - test/sun/security/ssl/templates/SSLExplorer.java - test/sun/security/ssl/templates/SSLSocketSSLEngineTemplate.java - test/sun/security/ssl/templates/SSLSocketTemplate.java Changeset: e78cf577654b Author: andrew Date: 2020-08-31 07:09 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/e78cf577654b Added tag jdk8u272-b06 for changeset 4546aa3faf37 ! .hgtags Changeset: bd54de1112bf Author: andrew Date: 2020-09-03 06:16 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/bd54de1112bf Merge jdk8u272-b06 ! .hgtags ! THIRD_PARTY_README ! make/mapfiles/libmanagement/mapfile-vers ! src/share/classes/com/sun/jndi/ldap/LdapCtxFactory.java ! src/share/classes/com/sun/management/OperatingSystemMXBean.java ! src/share/classes/java/net/SocketPermission.java ! src/share/classes/java/security/MessageDigest.java ! src/share/classes/sun/security/pkcs11/Secmod.java ! src/share/classes/sun/security/pkcs11/SunPKCS11.java ! src/share/classes/sun/security/pkcs11/wrapper/PKCS11.java ! src/share/classes/sun/security/provider/certpath/RevocationChecker.java - src/share/classes/sun/security/ssl/ALPNExtension.java - src/share/classes/sun/security/ssl/Alerts.java - src/share/classes/sun/security/ssl/AppInputStream.java - src/share/classes/sun/security/ssl/AppOutputStream.java - src/share/classes/sun/security/ssl/ByteBufferInputStream.java - src/share/classes/sun/security/ssl/CipherBox.java - src/share/classes/sun/security/ssl/CipherSuiteList.java - src/share/classes/sun/security/ssl/ClientHandshaker.java - src/share/classes/sun/security/ssl/DHCrypt.java - src/share/classes/sun/security/ssl/Debug.java - src/share/classes/sun/security/ssl/ECDHCrypt.java - src/share/classes/sun/security/ssl/EllipticCurvesExtension.java - src/share/classes/sun/security/ssl/EllipticPointFormatsExtension.java - src/share/classes/sun/security/ssl/EngineArgs.java - src/share/classes/sun/security/ssl/EngineInputRecord.java - src/share/classes/sun/security/ssl/EngineOutputRecord.java - src/share/classes/sun/security/ssl/EngineWriter.java - src/share/classes/sun/security/ssl/ExtensionType.java - src/share/classes/sun/security/ssl/HandshakeInStream.java - src/share/classes/sun/security/ssl/HandshakeMessage.java ! src/share/classes/sun/security/ssl/HandshakeOutStream.java - src/share/classes/sun/security/ssl/HandshakeStateManager.java - src/share/classes/sun/security/ssl/Handshaker.java - src/share/classes/sun/security/ssl/HelloExtension.java - src/share/classes/sun/security/ssl/HelloExtensions.java ! src/share/classes/sun/security/ssl/JsseJce.java - src/share/classes/sun/security/ssl/KerberosClientKeyExchange.java - src/share/classes/sun/security/ssl/MAC.java - src/share/classes/sun/security/ssl/ProtocolList.java ! src/share/classes/sun/security/ssl/RSASignature.java ! src/share/classes/sun/security/ssl/Record.java - src/share/classes/sun/security/ssl/RenegotiationInfoExtension.java ! src/share/classes/sun/security/ssl/SSLContextImpl.java ! src/share/classes/sun/security/ssl/SSLEngineImpl.java ! src/share/classes/sun/security/ssl/SSLSocketImpl.java - src/share/classes/sun/security/ssl/ServerHandshaker.java - src/share/classes/sun/security/ssl/SignatureAndHashAlgorithm.java ! src/share/classes/sun/security/ssl/SunJSSE.java ! src/share/classes/sun/security/ssl/SunX509KeyManagerImpl.java - src/share/classes/sun/security/ssl/UnknownExtension.java ! src/share/classes/sun/security/ssl/X509KeyManagerImpl.java - src/share/classes/sun/security/ssl/krb5/KerberosClientKeyExchangeImpl.java - src/share/classes/sun/security/ssl/krb5/KerberosPreMasterSecret.java ! src/share/classes/sun/security/util/HostnameChecker.java ! src/share/classes/sun/security/validator/Validator.java ! src/share/lib/security/java.security-aix ! src/share/lib/security/java.security-linux ! src/share/lib/security/java.security-macosx ! src/share/lib/security/java.security-solaris ! src/share/lib/security/java.security-windows ! src/share/native/sun/security/pkcs11/wrapper/p11_util.c - src/share/native/sun/security/pkcs11/wrapper/pkcs-11v2-20a3.h ! src/solaris/native/sun/security/smartcardio/MUSCLE/pcsclite.h ! test/TEST.groups ! test/sun/security/pkcs11/ec/TestECGenSpec.java ! test/sun/security/pkcs11/ec/TestKeyFactory.java - test/sun/security/ssl/README - test/sun/security/ssl/SSLContextImpl/DefautlCacheSize.java - test/sun/security/ssl/SessionIdCollisionTest.java - test/sun/security/ssl/com/sun/net/ssl/SSLSecurity/ComKeyManagerFactoryImpl.java - test/sun/security/ssl/com/sun/net/ssl/SSLSecurity/ComSSLContextImpl.java - test/sun/security/ssl/com/sun/net/ssl/SSLSecurity/ComTrustManagerFactoryImpl.java - test/sun/security/ssl/com/sun/net/ssl/SSLSecurity/JavaxKeyManagerFactoryImpl.java - test/sun/security/ssl/com/sun/net/ssl/SSLSecurity/JavaxSSLContextImpl.java - test/sun/security/ssl/com/sun/net/ssl/SSLSecurity/JavaxTrustManagerFactoryImpl.java - test/sun/security/ssl/com/sun/net/ssl/SSLSecurity/ProviderTest.java - test/sun/security/ssl/com/sun/net/ssl/SSLSecurity/TruncateArray.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/AppInputStream/ReadBlocksClose.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/AppInputStream/ReadHandshake.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/AppInputStream/ReadZeroBytes.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/AppInputStream/RemoveMarkReset.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/AppOutputStream/NoExceptionOnClose.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/CipherSuite/SSL_NULL.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ClientHandshaker/CipherSuiteOrder.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ClientHandshaker/LengthCheckTest.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ClientHandshaker/RSAExport.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/DHKeyExchange/DHEKeySizing.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/EngineArgs/DebugReportsOneExtraByte.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/EngineArgs/DebugReportsOneExtraByte.sh - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/GenSSLConfigs/ClientThread.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/GenSSLConfigs/Handler.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/GenSSLConfigs/ServerHandler.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/GenSSLConfigs/ServerThread.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/GenSSLConfigs/TestThread.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/GenSSLConfigs/Traffic.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/GenSSLConfigs/main.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/HandshakeOutStream/NullCerts.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/InputRecord/ClientHelloRead.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/InputRecord/OriginServer.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/InputRecord/ProxyTunnelServer.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/InputRecord/SSLSocketTimeoutNulls.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ProtocolVersion/HttpsProtocols.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/BadKSProvider.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/BadTSProvider.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/CustomizedDefaultProtocols.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/DefaultEnabledProtocols.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/GoodProvider.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/IllegalProtocolProperty.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/MD2InTrustAnchor.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/NoOldVersionContext.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/NullGetAcceptedIssuers.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/SSLContextVersion.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/TrustTrustedCert.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/CloseEngineException.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/CloseInboundException.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/CloseStart.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/DelegatedTaskWrongException.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/EmptyExtensionData.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/EngineEnforceUseClientMode.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/RehandshakeFinished.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/SSLEngineBadBufferArrayAccess.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLEngineImpl/SSLEngineDeadlock.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSessionContextImpl/Timeout.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSessionImpl/HashCodeMissing.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/AsyncSSLSocketClose.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/CheckMethods.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/ClientModeClientAuth.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/ClientTimeout.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/CloseSocket.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/CloseSocketException.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/InvalidateServerSessionRenegotiate.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/LoopbackSSLSocket.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/NewSocketMethods.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/NoImpactServerRenego.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/NonAutoClose.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/NotifyHandshakeTest.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/NotifyHandshakeTest.policy - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/NotifyHandshakeTest.sh - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/NotifyHandshakeTestHeyYou.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/RejectClientRenego.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/ReuseAddr.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/ReverseNameLookup.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/SSLSocketImplThrowsWrongExceptions.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/ServerTimeout.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/SetClientMode.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLSocketImpl/UnconnectedSocketWrongExceptions.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ServerHandshaker/AnonCipherWithWantClientAuth.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ServerHandshaker/GetPeerHost.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ServerHandshaker/GetPeerHostClient.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/ServerHandshaker/GetPeerHostServer.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SocketCreation/SocketCreation.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509KeyManager/NullCases.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509KeyManager/PreferredKey.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509KeyManager/SelectOneKeyOutOfMany.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/BasicConstraints.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/CertRequestOverflow.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/CheckNullEntity.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/ClientServer.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/ComodoHacker.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/PKIXExtendedTM.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/SelfIssuedCert.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/SunX509ExtendedTM.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/Distrust.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/appleistca2g1-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/appleistca8g1-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/geotrustglobalca-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/geotrustprimarycag2-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/geotrustprimarycag3-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/geotrustuniversalca-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/thawteprimaryrootca-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/thawteprimaryrootcag2-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/thawteprimaryrootcag3-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/verisignclass3g3ca-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/verisignclass3g4ca-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/verisignclass3g5ca-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/verisignclass3g5ca-codesigning-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/Symantec/verisignuniversalrootca-chain.pem - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/X509ExtendedTMEnabled.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/rsa/BrokenRSAPrivateCrtKey.java - test/sun/security/ssl/com/sun/net/ssl/internal/ssl/spi/ProviderInit.java - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/MyKeyManager.java - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/OriginServer.java - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/ProxyAuthTest.java - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/ProxyTunnelServer.java - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/ServerIdentityTest.java - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/dnsstore - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsClient/ipstore - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsURLConnection/CriticalSubjectAltName.java - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsURLConnection/GetResponseCode.java - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsURLConnection/crisubn.jks - test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsURLConnection/trusted.jks - test/sun/security/ssl/etc/README - test/sun/security/ssl/etc/keystore - test/sun/security/ssl/etc/truststore - test/sun/security/ssl/etc/unknown_keystore - test/sun/security/ssl/javax/net/ssl/ALPN/MyX509ExtendedKeyManager.java - test/sun/security/ssl/javax/net/ssl/ALPN/SSLEngineAlpnTest.java - test/sun/security/ssl/javax/net/ssl/ALPN/SSLServerSocketAlpnTest.java - test/sun/security/ssl/javax/net/ssl/ALPN/SSLSocketAlpnTest.java - test/sun/security/ssl/javax/net/ssl/Fix5070632.java - test/sun/security/ssl/javax/net/ssl/FixingJavadocs/ComURLNulls.java - test/sun/security/ssl/javax/net/ssl/FixingJavadocs/ImplicitHandshake.java - test/sun/security/ssl/javax/net/ssl/FixingJavadocs/JavaxURLNulls.java - test/sun/security/ssl/javax/net/ssl/FixingJavadocs/KMTMGetNothing.java - test/sun/security/ssl/javax/net/ssl/FixingJavadocs/SSLSessionNulls.java - test/sun/security/ssl/javax/net/ssl/FixingJavadocs/SSLSocketInherit.java - test/sun/security/ssl/javax/net/ssl/GetInstance.java - test/sun/security/ssl/javax/net/ssl/HttpsURLConnection/DelayDefaultContextLoading.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/CheckMyTrustedKeystore.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/HttpsURLConnectionLocalCertificateChain.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/JSSERenegotiate.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/KeyManagerTrustManager.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLCtxAccessToSessCtx.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/AcceptLargeFragments.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/ArgCheck.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/Arrays.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/Basics.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/CheckStatus.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/ConnectionTest.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/ExtendedKeyEngine.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/ExtendedKeySocket.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/LargeBufs.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/LargePacket.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/MyX509ExtendedKeyManager.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/MyX509KeyManager.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/NoAuthClientAuth.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/SSLEngineResultArgs.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/SSLEngineService.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngine/TestAllSuites.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SSLEngineResult/Deserialize.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SessionCacheSizeTests.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/SessionTimeOutTests.java - test/sun/security/ssl/javax/net/ssl/NewAPIs/testEnabledProtocols.java - test/sun/security/ssl/javax/net/ssl/SSLParameters/UseCipherSuitesOrder.java - test/sun/security/ssl/javax/net/ssl/SSLServerSocket/DefaultSSLServSocketFac.java - test/sun/security/ssl/javax/net/ssl/ServerName/IllegalSNIName.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLEngineExplorer.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLEngineExplorerMatchedSNI.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLEngineExplorerUnmatchedSNI.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLEngineExplorerWithCli.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLEngineExplorerWithSrv.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketConsistentSNI.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketExplorer.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketExplorerFailure.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketExplorerMatchedSNI.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketExplorerUnmatchedSNI.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketExplorerWithCliSNI.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketExplorerWithSrvSNI.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketInconsistentSNI.java - test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketSNISensitive.java - test/sun/security/ssl/javax/net/ssl/TLSv11/EmptyCertificateAuthorities.java - test/sun/security/ssl/javax/net/ssl/TLSv11/ExportableBlockCipher.java - test/sun/security/ssl/javax/net/ssl/TLSv11/ExportableStreamCipher.java - test/sun/security/ssl/javax/net/ssl/TLSv11/GenericBlockCipher.java - test/sun/security/ssl/javax/net/ssl/TLSv11/GenericStreamCipher.java - test/sun/security/ssl/javax/net/ssl/TLSv12/DisabledShortRSAKeys.java - test/sun/security/ssl/javax/net/ssl/TLSv12/ShortRSAKey512.java - test/sun/security/ssl/javax/net/ssl/TLSv12/ShortRSAKeyGCM.java - test/sun/security/ssl/sanity/ciphersuites/CheckCipherSuites.java - test/sun/security/ssl/sanity/ciphersuites/CipherSuitesInOrder.java - test/sun/security/ssl/sanity/ciphersuites/NoKerberos.java - test/sun/security/ssl/sanity/interop/CipherTest.java - test/sun/security/ssl/sanity/interop/ClientJSSEServerJSSE.java - test/sun/security/ssl/sanity/interop/JSSEClient.java - test/sun/security/ssl/sanity/interop/JSSEServer.java - test/sun/security/ssl/sanity/pluggability/CheckSSLContextExport.java - test/sun/security/ssl/sanity/pluggability/CheckSockFacExport1.java - test/sun/security/ssl/sanity/pluggability/CheckSockFacExport2.java - test/sun/security/ssl/sanity/pluggability/CipherSuites.java - test/sun/security/ssl/sanity/pluggability/MySSLContextImpl.java - test/sun/security/ssl/sanity/pluggability/MySSLEngineImpl.java - test/sun/security/ssl/sanity/pluggability/MySSLServerSocketFacImpl.java - test/sun/security/ssl/sanity/pluggability/MySSLSocketFacImpl.java - test/sun/security/ssl/sun/net/www/http/ChunkedOutputStream/Test.java - test/sun/security/ssl/sun/net/www/httpstest/AbstractCallback.java - test/sun/security/ssl/sun/net/www/httpstest/ClosedChannelList.java - test/sun/security/ssl/sun/net/www/httpstest/HttpCallback.java - test/sun/security/ssl/sun/net/www/httpstest/HttpTransaction.java - test/sun/security/ssl/sun/net/www/httpstest/TestHttpsServer.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/B6216082.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/B6226610.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/CheckMethods.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/CloseKeepAliveCached.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/CookieHandlerTest.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/CookieHttpsClientTest.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/DNSIdentities.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/HttpsCreateSockTest.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/HttpsPost.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/HttpsProxyStackOverflow.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/HttpsSocketFacTest.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPAddressDNSIdentities.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPAddressIPIdentities.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPIdentities.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/Identities.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/OriginServer.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/PostThruProxy.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/PostThruProxyWithAuth.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/ProxyTunnelServer.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/ReadTimeout.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/Redirect.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/RetryHttps.java - test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/TunnelProxy.java - test/sun/security/ssl/sun/net/www/protocol/https/NewImpl/ComHTTPSConnection.java - test/sun/security/ssl/sun/net/www/protocol/https/NewImpl/ComHostnameVerifier.java - test/sun/security/ssl/sun/net/www/protocol/https/NewImpl/JavaxHTTPSConnection.java - test/sun/security/ssl/sun/net/www/protocol/https/NewImpl/JavaxHostnameVerifier.java - test/sun/security/ssl/templates/SSLCapabilities.java - test/sun/security/ssl/templates/SSLEngineTemplate.java - test/sun/security/ssl/templates/SSLExplorer.java - test/sun/security/ssl/templates/SSLSocketSSLEngineTemplate.java - test/sun/security/ssl/templates/SSLSocketTemplate.java Changeset: 854f27e9f844 Author: andrew Date: 2020-09-03 06:17 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/854f27e9f844 Added tag aarch64-shenandoah-jdk8u272-b06 for changeset bd54de1112bf ! .hgtags From gnu.andrew at redhat.com Tue Sep 8 14:11:13 2020 From: gnu.andrew at redhat.com (Andrew Hughes) Date: Tue, 8 Sep 2020 15:11:13 +0100 Subject: [aarch64-port-dev ] [RFR] [8u] 8u272-b06 Upstream Sync In-Reply-To: <360e6306-c213-ce94-7241-f841b81ffdcc@redhat.com> References: <20200907072946.GF1707023@stopbrexit> <360e6306-c213-ce94-7241-f841b81ffdcc@redhat.com> Message-ID: <20200908141113.GA1846517@stopbrexit> On 09:58 Mon 07 Sep , Aleksey Shipilev wrote: > On 9/7/20 9:29 AM, Andrew Hughes wrote: > > Webrevs: https://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/ > > > > Merge changesets: > > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/corba/merge.changeset > > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/jaxp/merge.changeset > > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/jaxws/merge.changeset > > Look trivially good. > > > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/jdk/merge.changeset > > Looks like TLS 1.3 integration. Seems fine. > > > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/hotspot/merge.changeset > > Looks good. > > > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/langtools/merge.changeset > > Looks good. > > > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/nashorn/merge.changeset > > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b06/root/merge.changeset > > Look good. > > > Ok to push? > > Yes. > > -- > Thanks, > -Aleksey > Thanks, pushed. -- Andrew :) Senior Free Java Software Engineer OpenJDK Package Owner Red Hat, Inc. (http://www.redhat.com) PGP Key: ed25519/0xCFDA0F9B35964222 (hkp://keys.gnupg.net) Fingerprint = 5132 579D D154 0ED2 3E04 C5A0 CFDA 0F9B 3596 4222 From akozlov at azul.com Tue Sep 8 18:36:14 2020 From: akozlov at azul.com (Anton Kozlov) Date: Tue, 8 Sep 2020 21:36:14 +0300 Subject: [aarch64-port-dev ] 8248238: Implementation of JEP: Windows AArch64 Support In-Reply-To: References: <3834f328-d31f-0111-6ed3-afbe3fe3d9f7@redhat.com> Message-ID: <72a22b1b-2670-014d-8964-d08b0158fa46@azul.com> Hello Bernhard, All, On 26.08.2020 14:52, Bernhard Urban-Forster wrote: > On 25/08/2020 11:44, Andrew Haley wrote: >> Looks OK. It would be nice if you could get rid of some of the #ifndef >> _WIN64 stuff in common code by moving queries like icache_line_size() >> into os-specific files, but you may do that later. > > I agree, there are still a few opportunities to make it cleaner. I'll take care of it. How far have you gone with CPU feature and cache size detection? I have some time I can spend some time cleaning vm_version for aarch64, which I think leaks too much Linux details into the common CPU code. 1. The linux part of feature detection should probably go to os_cpu/xxx/vm_version_xxx.cpp. 2. CPU features detection stub [1] for some reason takes 550 bytes (and is allocated permanently in the code cache), constructs a frame, and probably can be replaced with just inline assembly at least for Linux. 3. dcpop feature is taken from /proc/cpuinfo[2], although it is also there in HWCAP[3]. 4. I'm a bit concerned about Feature_Flags[4] implicitly mirrors of Linux HWCAP. I think some code (e.g assert) should provide a hint about mapping. For example, HWCAP_ATOMIC implicitly mapped to CPU_LSE. As a note, Feature_Flags had also leaked into Graal, which should also be considered. ... I'm asking to avoid duplicating efforts. If you have done some significant work for vm_version that you're not ready to share yet, then OK, there is no rush. Otherwise, I can try to do something with these and anything else that may jump out after some work. In that case, the success criteria will be a better separation of common and Linux code, which should also simplify the Windows-aarch64 patch. Thanks, Anton [1] https://github.com/openjdk/jdk/blob/master/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp#L110 [2] https://github.com/openjdk/jdk/blob/master/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp#L211 [3] https://elixir.bootlin.com/linux/latest/source/arch/arm64/include/uapi/asm/hwcap.h#L39 [4] https://github.com/openjdk/jdk/blob/master/src/hotspot/cpu/aarch64/vm_version_aarch64.hpp#L91 From luhenry at microsoft.com Tue Sep 8 19:09:18 2020 From: luhenry at microsoft.com (Ludovic Henry) Date: Tue, 8 Sep 2020 19:09:18 +0000 Subject: [aarch64-port-dev ] 8248238: Implementation of JEP: Windows AArch64 Support In-Reply-To: <72a22b1b-2670-014d-8964-d08b0158fa46@azul.com> References: <3834f328-d31f-0111-6ed3-afbe3fe3d9f7@redhat.com> <72a22b1b-2670-014d-8964-d08b0158fa46@azul.com> Message-ID: Hi Anton, You can find the diff at https://gist.github.com/luhenry/d981f5fe7e9f1a1ad8cd3292b5e75cc4 (we are in the process of upstreaming it). > 1. The linux part of feature detection should probably go to os_cpu/xxx/vm_version_xxx.cpp. It probably should indeed. I'd do the work for the macOS-AArch64 port, and I would adapt the windows-AArch64 port whichever lands first. > 2. CPU features detection stub [1] for some reason takes 550 bytes (and is allocated permanently in the code cache), constructs a frame, and probably can be replaced with just inline assembly at least for Linux. I agree, especially since `ctr_el0` is not even accessible on Windows. I'm happy to go for inline assembly or a dedicated assembly file. We need to keep it in `os_cpu` (especially for inline assembly) as it will need to be different for Windows at least (even for macOS, since the compiler is different and some platform specifics quirks). > 3. dcpop feature is taken from /proc/cpuinfo[2], although it is also there in HWCAP[3]. There is no equivalent of /proc/cpuinfo on Windows, and we can only rely on `IsProcessorFeaturePresent`. I would make sure to keep that check in `os_cpu` for the same reason as above. > 4. I'm a bit concerned about Feature_Flags[4] implicitly mirrors of Linux HWCAP. I think some code (e.g assert) should provide a hint about mapping. For example, HWCAP_ATOMIC implicitly mapped to CPU_LSE. As a note, Feature_Flags had also leaked into Graal, which should also be considered. In the case of Feature_Falgs, I would not implicitly define Feature_Flags with HWCAP_*, so I would make sure that `_features` is not simply assigned with the result of `getauxval`. I would also do the mapping HWCAP -> Feature_Flags in the Linux-AArch64 specific code, so that HWCAP doesn't have to leak into the Windows or macOS codebase. > I'm asking to avoid duplicating efforts. If you have done some significant work for vm_version that you're not ready to share yet, then OK, there is no rush. Otherwise, I can try to do something with these and anything else that may jump out after some work. In that case, the success criteria will be a better separation of common and Linux code, which should also simplify the Windows-aarch64 patch. All our Windows-AArch64 changes have been made public (through upstreaming it directly to jdk/jdk or by publishing webrevs), and we have no major work in progress, other than getting the current patches to land. I would be very happy to follow along what you're doing on a public repository, and contribute whatever we can. As we discussed offline last week, we are working on our end to publish what we have so far. Thank you, Ludovic From terje at kvernes.no Tue Sep 1 10:14:20 2020 From: terje at kvernes.no (Terje Kvernes) Date: Tue, 1 Sep 2020 12:14:20 +0200 Subject: [aarch64-port-dev ] A binary download for aarch64. In-Reply-To: <67f690617c2940ecc0c3c1afaecc569ace814ade.camel@redhat.com> References: <17F1A584-2B04-49AF-B846-F76F56D48B59@kvernes.no> <67f690617c2940ecc0c3c1afaecc569ace814ade.camel@redhat.com> Message-ID: <2652663F-272E-490F-AA87-7E4C5D0FD6BE@kvernes.no> > On 1 Sep 2020, at 10:49, Severin Gehwolf wrote: > > On Mon, 2020-08-31 at 20:15 +0200, Terje Kvernes wrote: >> Dear all, >> >> I am currently working on expanding EasyBuilds[1] support for ARM in the HPC space. One of the hurdles I have come across is that EasyBuild on both x86_64 and POWER install OpenJDK as a binary. On x86_64 this is done by fetching and installing https://download.java.net/java/GA/jdk11/9/GPL/openjdk-11.0.2_linux-x64_bin.tar.gz ;, linked from https://jdk.java.net/archive/ ;. >> >> Now, I have been unable to find a similar service for aarch64, and I was hoping I had simply missed something. Is there such a binary available for aarch64? >> > > We provide JDK 11 aarch64 vanilla OpenJDK builds here: > https://adoptopenjdk.net/upstream.html?variant=openjdk11&ga=ga > > That's the closest equivalent (for OpenJDK 11u) to what Oracle does > with jdk.java.net for more recent JDKs. > > Unfortunately, there are no vanilla OpenJDK 8u binaries for Aarch64 as > the port landed in mainline JDK with the release of JDK 9. So any > downstream builders would have to build from the aarch64-port 8u tree. > There are a variety of downstream builds of OpenJDK 8u aarch64 which > would suit your needs. For example the ones from AdoptOpenJDK (or > Eclipse Adoptium) here: > https://adoptopenjdk.net/releases.html?variant=openjdk8&jvmVariant=hotspot > > Note the two links are not the same. The former are upstream builds, > the latter is a downstream curation of OpenJDK. Depending on what you > need both might work. Thank you so much for this. I will test both options and see what we end up using. Thank you again! -- Terje Kvernes From sean.mullan at oracle.com Tue Sep 8 16:15:56 2020 From: sean.mullan at oracle.com (Sean Mullan) Date: Tue, 8 Sep 2020 12:15:56 -0400 Subject: [aarch64-port-dev ] RFR: 8252204: AArch64: Implement SHA3 accelerator/intrinsic In-Reply-To: <95965aeb-9d97-3b27-e684-967b6155eb34@redhat.com> References: <1729f1b1-056d-76c9-c820-d38bd6c1235d@redhat.com> <95965aeb-9d97-3b27-e684-967b6155eb34@redhat.com> Message-ID: Since this change affects security code, please make sure you add security-dev at openjdk.java.net on any followup code reviews. Thanks, Sean On 9/1/20 10:44 AM, Andrew Haley wrote: > On 01/09/2020 11:53, Yangfei (Felix) wrote: >> Sure, I am happy if the original author of the assembly code or someone else from Linaro could help here. >> I wasn't aware there was such an requirement here given that assembly code is licensed under GPL. > > There sure is. All code must be contributed by its owner and put on the > cr.openjdk site. Especially GPL code. > >> Should we separate the patch into two parts: changes for the shared code part and the aarch64 port-specific changes? > > I think not. > From aph at redhat.com Wed Sep 9 08:27:14 2020 From: aph at redhat.com (Andrew Haley) Date: Wed, 9 Sep 2020 09:27:14 +0100 Subject: [aarch64-port-dev ] 8248238: Implementation of JEP: Windows AArch64 Support In-Reply-To: References: <3834f328-d31f-0111-6ed3-afbe3fe3d9f7@redhat.com> <72a22b1b-2670-014d-8964-d08b0158fa46@azul.com> Message-ID: On 08/09/2020 20:09, Ludovic Henry wrote: > All our Windows-AArch64 changes have been made public (through upstreaming it directly to jdk/jdk or by publishing webrevs), and we have no major work in progress, other than getting the current patches to land. To land where? aarch64/windows or jdk/jdk? If you're actually ready for mainline, it'll be time to prepare the integrated patch for import. -- Andrew Haley (he/him) Java Platform Lead Engineer Red Hat UK Ltd. https://keybase.io/andrewhaley EAC8 43EB D3EF DB98 CC77 2FAD A5CD 6035 332F A671 From mark.reinhold at oracle.com Thu Sep 10 23:20:21 2020 From: mark.reinhold at oracle.com (mark.reinhold at oracle.com) Date: Thu, 10 Sep 2020 16:20:21 -0700 Subject: [aarch64-port-dev ] Result: New aarch64-port Committer: Ludovic Henry In-Reply-To: <675814bf-7124-b5a6-5c6b-b1511268b894@redhat.com> References: <497c1ded-92cc-ac37-843d-9b68fdc4f7c3@redhat.com> <675814bf-7124-b5a6-5c6b-b1511268b894@redhat.com> Message-ID: <20200910162021.573929174@eggemoggin.niobe.net> 2020/8/24 7:30:08 -0700, aph at redhat.com: > Voting for Ludovic Henry [1] is now closed. > > Yes: 3 > Veto: 0 > Abstain: 0 > > According to the Bylaws definition of Lazy Consensus, this is > sufficient to approve the nomination. So recorded. - Mark From akozlov at azul.com Fri Sep 11 11:12:52 2020 From: akozlov at azul.com (Anton Kozlov) Date: Fri, 11 Sep 2020 14:12:52 +0300 Subject: [aarch64-port-dev ] 8248238: Implementation of JEP: Windows AArch64 Support In-Reply-To: References: <3834f328-d31f-0111-6ed3-afbe3fe3d9f7@redhat.com> <72a22b1b-2670-014d-8964-d08b0158fa46@azul.com> Message-ID: The cleanup in cpu/aarch64/vm_version may be considered as a work in general or a work toward landing patches, depends on the terminology :) Since we've are on par in understanding, I've created JDK-8253015 and drafted a patch[1] consisting mostly of what we have discussed. Would it be OK if I make a formal review request (now PR) for integration? I mean, it will create some burden for you if you have made steps in this direction as well. After the patch the common and linux code do not use code generation. But it is still possible in os-specific code, like [2]. It returns memory to the code cache, but as far as I can see the block ends up in a free-list, creating small fragmentation. So I would stick to a static code if possible or would use a buffer on a stack if it has execute permission. I hope changes for windows-aarch64 on top of [1] will be straightforward. But unfortunately, I don't have a setup to test that. So I hope to get your review, now or after the possible PR. Thanks, Anton [1] https://github.com/openjdk/jdk/compare/master..AntonKozlov:8253015#diff-914c0b9083f9d7ee2d08f5dbd3c54ebe [2] https://github.com/AntonKozlov/jdk/compare/8253015..8253015-codegen On 08.09.2020 22:09, Ludovic Henry wrote: > Hi Anton, > > You can find the diff at https://gist.github.com/luhenry/d981f5fe7e9f1a1ad8cd3292b5e75cc4 (we are in the process of upstreaming it). > >> 1. The linux part of feature detection should probably go to os_cpu/xxx/vm_version_xxx.cpp. > > It probably should indeed. I'd do the work for the macOS-AArch64 port, and I would adapt the windows-AArch64 port whichever lands first. > >> 2. CPU features detection stub [1] for some reason takes 550 bytes (and is allocated permanently in the code cache), constructs a frame, and probably can be replaced with just inline assembly at least for Linux. > > I agree, especially since `ctr_el0` is not even accessible on Windows. I'm happy to go for inline assembly or a dedicated assembly file. We need to keep it in `os_cpu` (especially for inline assembly) as it will need to be different for Windows at least (even for macOS, since the compiler is different and some platform specifics quirks). > >> 3. dcpop feature is taken from /proc/cpuinfo[2], although it is also there in HWCAP[3]. > > There is no equivalent of /proc/cpuinfo on Windows, and we can only rely on `IsProcessorFeaturePresent`. I would make sure to keep that check in `os_cpu` for the same reason as above. > >> 4. I'm a bit concerned about Feature_Flags[4] implicitly mirrors of Linux HWCAP. I think some code (e.g assert) should provide a hint about mapping. For example, HWCAP_ATOMIC implicitly mapped to CPU_LSE. As a note, Feature_Flags had also leaked into Graal, which should also be considered. > > In the case of Feature_Falgs, I would not implicitly define Feature_Flags with HWCAP_*, so I would make sure that `_features` is not simply assigned with the result of `getauxval`. I would also do the mapping HWCAP -> Feature_Flags in the Linux-AArch64 specific code, so that HWCAP doesn't have to leak into the Windows or macOS codebase. > >> I'm asking to avoid duplicating efforts. If you have done some significant work for vm_version that you're not ready to share yet, then OK, there is no rush. Otherwise, I can try to do something with these and anything else that may jump out after some work. In that case, the success criteria will be a better separation of common and Linux code, which should also simplify the Windows-aarch64 patch. > > All our Windows-AArch64 changes have been made public (through upstreaming it directly to jdk/jdk or by publishing webrevs), and we have no major work in progress, other than getting the current patches to land. > > I would be very happy to follow along what you're doing on a public repository, and contribute whatever we can. As we discussed offline last week, we are working on our end to publish what we have so far. > > Thank you, > Ludovic > From aph at redhat.com Fri Sep 11 15:35:35 2020 From: aph at redhat.com (Andrew Haley) Date: Fri, 11 Sep 2020 16:35:35 +0100 Subject: [aarch64-port-dev ] 8248238: Implementation of JEP: Windows AArch64 Support In-Reply-To: References: <3834f328-d31f-0111-6ed3-afbe3fe3d9f7@redhat.com> <72a22b1b-2670-014d-8964-d08b0158fa46@azul.com> Message-ID: On 11/09/2020 12:12, Anton Kozlov wrote: > Since we've are on par in understanding, I've created JDK-8253015 and drafted a > patch[1] consisting mostly of what we have discussed. Would it be OK if I make > a formal review request (now PR) for integration? I mean, it will create some > burden for you if you have made steps in this direction as well. What is the Matcher::stack_direction() code in this patch for? > [1] https://github.com/openjdk/jdk/compare/master..AntonKozlov:8253015#diff-914c0b9083f9d7ee2d08f5dbd3c54ebe > [2] https://github.com/AntonKozlov/jdk/compare/8253015..8253015-codegen -- Andrew Haley (he/him) Java Platform Lead Engineer Red Hat UK Ltd. https://keybase.io/andrewhaley EAC8 43EB D3EF DB98 CC77 2FAD A5CD 6035 332F A671 From akozlov at azul.com Fri Sep 11 15:44:28 2020 From: akozlov at azul.com (Anton Kozlov) Date: Fri, 11 Sep 2020 18:44:28 +0300 Subject: [aarch64-port-dev ] 8248238: Implementation of JEP: Windows AArch64 Support In-Reply-To: References: <3834f328-d31f-0111-6ed3-afbe3fe3d9f7@redhat.com> <72a22b1b-2670-014d-8964-d08b0158fa46@azul.com> Message-ID: <2d74e89c-ae37-6862-b898-6872e56828cc@azul.com> On 11.09.2020 18:35, Andrew Haley wrote: > On 11/09/2020 12:12, Anton Kozlov wrote: >> Since we've are on par in understanding, I've created JDK-8253015 and drafted a >> patch[1] consisting mostly of what we have discussed. Would it be OK if I make >> a formal review request (now PR) for integration? I mean, it will create some >> burden for you if you have made steps in this direction as well. > > What is the Matcher::stack_direction() code in this patch for? Sorry, wrong urls. Correct ones: [1] https://github.com/openjdk/jdk/compare/master...AntonKozlov:8253015 [2] https://github.com/AntonKozlov/jdk/compare/8253015...8253015-codegen ".." generates a plain diff (that was correct at the moment of writing, but after that master have updated). "..." is changes on my branch only. I'll send a proper RFR (PR) once Ludovic or Bernhard confirm I'll not wreck their work. Thanks, Anton From luhenry at microsoft.com Mon Sep 14 16:31:38 2020 From: luhenry at microsoft.com (Ludovic Henry) Date: Mon, 14 Sep 2020 16:31:38 +0000 Subject: [aarch64-port-dev ] 8248238: Implementation of JEP: Windows AArch64 Support In-Reply-To: <2d74e89c-ae37-6862-b898-6872e56828cc@azul.com> References: <3834f328-d31f-0111-6ed3-afbe3fe3d9f7@redhat.com> <72a22b1b-2670-014d-8964-d08b0158fa46@azul.com> <2d74e89c-ae37-6862-b898-6872e56828cc@azul.com> Message-ID: Hi, > https://github.com/openjdk/jdk/compare/master...AntonKozlov:8253015 I confirm that this works with Windows-AArch64 with minimum changes. And I'm also much happier with this approach than with the "all in vm_version_aarch64.cpp" that we have taken so far. I am not a reviewer but I approve this change. Thank you, Ludovic From akozlov at azul.com Mon Sep 14 20:00:07 2020 From: akozlov at azul.com (Anton Kozlov) Date: Mon, 14 Sep 2020 23:00:07 +0300 Subject: [aarch64-port-dev ] 8248238: Implementation of JEP: Windows AArch64 Support In-Reply-To: References: <3834f328-d31f-0111-6ed3-afbe3fe3d9f7@redhat.com> <72a22b1b-2670-014d-8964-d08b0158fa46@azul.com> <2d74e89c-ae37-6862-b898-6872e56828cc@azul.com> Message-ID: <59e1c6fd-667b-e220-8a4f-2699079b0830@azul.com> On 14.09.2020 19:31, Ludovic Henry wrote: > I confirm that this works with Windows-AArch64 with minimum changes. And I'm also much happier with this approach than with the "all in vm_version_aarch64.cpp" that we have taken so far. > > I am not a reviewer but I approve this change. Thanks for looking. I've sent RFR as PR #154. -- Anton From gnu.andrew at redhat.com Wed Sep 16 00:38:34 2020 From: gnu.andrew at redhat.com (Andrew Hughes) Date: Wed, 16 Sep 2020 01:38:34 +0100 Subject: [aarch64-port-dev ] [RFR] [8u] 8u272-b07 Upstream Sync Message-ID: <20200916003834.GA202867@stopbrexit> Webrevs: https://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/ Merge changesets: http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/corba/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/jaxp/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/jaxws/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/jdk/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/hotspot/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/langtools/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/nashorn/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/root/merge.changeset Changes in aarch64-shenandoah-jdk8u272-b07: - JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ Main issues of note: None, clean merge (no HotSpot changes). diffstat for root b/.hgtags | 1 + 1 file changed, 1 insertion(+) diffstat for corba b/.hgtags | 1 + 1 file changed, 1 insertion(+) diffstat for jaxp b/.hgtags | 1 + 1 file changed, 1 insertion(+) diffstat for jaxws b/.hgtags | 1 + 1 file changed, 1 insertion(+) diffstat for langtools b/.hgtags | 1 + 1 file changed, 1 insertion(+) diffstat for nashorn b/.hgtags | 1 + 1 file changed, 1 insertion(+) diffstat for jdk b/.hgtags | 1 b/src/share/classes/sun/security/krb5/KrbKdcRep.java | 14 +++--- b/test/sun/security/krb5/auto/AlwaysEncPaReq.java | 40 +++++++++++++++++++ b/test/sun/security/krb5/auto/KDC.java | 5 +- 4 files changed, 53 insertions(+), 7 deletions(-) diffstat for hotspot b/.hgtags | 1 + 1 file changed, 1 insertion(+) Successfully built on x86, x86_64, s390 (Zero), s390x (Zero), ppc (Zero), ppc64, ppc64le, aarch32 (Zero) & aarch64. Ok to push? Thanks, -- Andrew :) Senior Free Java Software Engineer OpenJDK Package Owner Red Hat, Inc. (http://www.redhat.com) PGP Key: ed25519/0xCFDA0F9B35964222 (hkp://keys.gnupg.net) Fingerprint = 5132 579D D154 0ED2 3E04 C5A0 CFDA 0F9B 3596 4222 From shade at redhat.com Wed Sep 16 07:04:07 2020 From: shade at redhat.com (Aleksey Shipilev) Date: Wed, 16 Sep 2020 09:04:07 +0200 Subject: [aarch64-port-dev ] [RFR] [8u] 8u272-b07 Upstream Sync In-Reply-To: <20200916003834.GA202867@stopbrexit> References: <20200916003834.GA202867@stopbrexit> Message-ID: <538fd32d-8ff9-2f75-db55-75bcefcfb02d@redhat.com> On 9/16/20 2:38 AM, Andrew Hughes wrote: > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/corba/merge.changeset > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/jaxp/merge.changeset > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/jaxws/merge.changeset Look trivially good. > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/jdk/merge.changeset Looks good. > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/hotspot/merge.changeset > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/langtools/merge.changeset > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/nashorn/merge.changeset > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/root/merge.changeset Look trivially good. > Ok to push? Yes. -- Thanks, -Aleksey From gnu.andrew at redhat.com Wed Sep 16 16:32:55 2020 From: gnu.andrew at redhat.com (Andrew Hughes) Date: Wed, 16 Sep 2020 17:32:55 +0100 Subject: [aarch64-port-dev ] [RFR] [8u] 8u272-b07 Upstream Sync In-Reply-To: <538fd32d-8ff9-2f75-db55-75bcefcfb02d@redhat.com> References: <20200916003834.GA202867@stopbrexit> <538fd32d-8ff9-2f75-db55-75bcefcfb02d@redhat.com> Message-ID: <20200916163255.GH258227@stopbrexit> On 09:04 Wed 16 Sep , Aleksey Shipilev wrote: > On 9/16/20 2:38 AM, Andrew Hughes wrote: > > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/corba/merge.changeset > > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/jaxp/merge.changeset > > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/jaxws/merge.changeset > > Look trivially good. > > > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/jdk/merge.changeset > > Looks good. > > > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/hotspot/merge.changeset > > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/langtools/merge.changeset > > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/nashorn/merge.changeset > > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b07/root/merge.changeset > > Look trivially good. > > > Ok to push? > > Yes. > > -- > Thanks, > -Aleksey > Thanks. Pushed. -- Andrew :) Senior Free Java Software Engineer OpenJDK Package Owner Red Hat, Inc. (http://www.redhat.com) PGP Key: ed25519/0xCFDA0F9B35964222 (hkp://keys.gnupg.net) Fingerprint = 5132 579D D154 0ED2 3E04 C5A0 CFDA 0F9B 3596 4222 From gnu.andrew at redhat.com Wed Sep 16 16:31:59 2020 From: gnu.andrew at redhat.com (gnu.andrew at redhat.com) Date: Wed, 16 Sep 2020 16:31:59 +0000 Subject: [aarch64-port-dev ] hg: aarch64-port/jdk8u-shenandoah: 3 new changesets Message-ID: <202009161632.08GGW0sv009391@aojmv0008.oracle.com> Changeset: 34c6baf21464 Author: andrew Date: 2020-09-07 06:30 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/rev/34c6baf21464 Added tag jdk8u272-b07 for changeset fec6ed779ae6 ! .hgtags Changeset: 8a48b3a99bdd Author: andrew Date: 2020-09-08 13:39 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/rev/8a48b3a99bdd Merge jdk8u272-b07 ! .hgtags Changeset: 075307eeae3e Author: andrew Date: 2020-09-08 13:42 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/rev/075307eeae3e Added tag aarch64-shenandoah-jdk8u272-b07 for changeset 8a48b3a99bdd ! .hgtags From gnu.andrew at redhat.com Wed Sep 16 16:34:21 2020 From: gnu.andrew at redhat.com (gnu.andrew at redhat.com) Date: Wed, 16 Sep 2020 16:34:21 +0000 Subject: [aarch64-port-dev ] hg: aarch64-port/jdk8u-shenandoah/hotspot: 3 new changesets Message-ID: <202009161634.08GGYLLE010652@aojmv0008.oracle.com> Changeset: 4ad2d6087d73 Author: andrew Date: 2020-09-07 06:30 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/hotspot/rev/4ad2d6087d73 Added tag jdk8u272-b07 for changeset 4689eaf1a5c9 ! .hgtags Changeset: 356107716c07 Author: andrew Date: 2020-09-08 13:39 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/hotspot/rev/356107716c07 Merge jdk8u272-b07 ! .hgtags Changeset: d7158ff46b9a Author: andrew Date: 2020-09-08 13:42 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/hotspot/rev/d7158ff46b9a Added tag aarch64-shenandoah-jdk8u272-b07 for changeset 356107716c07 ! .hgtags From gnu.andrew at redhat.com Wed Sep 16 16:34:49 2020 From: gnu.andrew at redhat.com (gnu.andrew at redhat.com) Date: Wed, 16 Sep 2020 16:34:49 +0000 Subject: [aarch64-port-dev ] hg: aarch64-port/jdk8u-shenandoah/jdk: 4 new changesets Message-ID: <202009161634.08GGYoCW010949@aojmv0008.oracle.com> Changeset: d8bd882cfd2a Author: mbalao Date: 2020-05-31 10:13 +0800 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/d8bd882cfd2a 8246193: Possible NPE in ENC-PA-REP search in AS-REQ Reviewed-by: zgu, andrew ! src/share/classes/sun/security/krb5/KrbKdcRep.java + test/sun/security/krb5/auto/AlwaysEncPaReq.java ! test/sun/security/krb5/auto/KDC.java Changeset: ebfae7ddcfc1 Author: andrew Date: 2020-09-07 06:30 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/ebfae7ddcfc1 Added tag jdk8u272-b07 for changeset d8bd882cfd2a ! .hgtags Changeset: 8e05a97cbee8 Author: andrew Date: 2020-09-08 13:39 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/8e05a97cbee8 Merge jdk8u272-b07 ! .hgtags Changeset: ae57d89ed3bd Author: andrew Date: 2020-09-08 13:42 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/ae57d89ed3bd Added tag aarch64-shenandoah-jdk8u272-b07 for changeset 8e05a97cbee8 ! .hgtags From gnu.andrew at redhat.com Wed Sep 16 16:46:00 2020 From: gnu.andrew at redhat.com (gnu.andrew at redhat.com) Date: Wed, 16 Sep 2020 16:46:00 +0000 Subject: [aarch64-port-dev ] hg: aarch64-port/jdk8u-shenandoah/nashorn: 3 new changesets Message-ID: <202009161646.08GGk0wu017069@aojmv0008.oracle.com> Changeset: 7b821bf9d092 Author: andrew Date: 2020-09-07 06:30 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/nashorn/rev/7b821bf9d092 Added tag jdk8u272-b07 for changeset 7ee1ab38e286 ! .hgtags Changeset: 6681b05a8e70 Author: andrew Date: 2020-09-08 13:39 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/nashorn/rev/6681b05a8e70 Merge jdk8u272-b07 ! .hgtags Changeset: 0f67cc90bb44 Author: andrew Date: 2020-09-08 13:42 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/nashorn/rev/0f67cc90bb44 Added tag aarch64-shenandoah-jdk8u272-b07 for changeset 6681b05a8e70 ! .hgtags From felix.yang at huawei.com Thu Sep 17 06:40:56 2020 From: felix.yang at huawei.com (Yangfei (Felix)) Date: Thu, 17 Sep 2020 06:40:56 +0000 Subject: [aarch64-port-dev ] RFR: 8252204: AArch64: Implement SHA3 accelerator/intrinsic In-Reply-To: References: <1729f1b1-056d-76c9-c820-d38bd6c1235d@redhat.com> <95965aeb-9d97-3b27-e684-967b6155eb34@redhat.com> Message-ID: Hi all, > -----Original Message----- > From: Sean Mullan [mailto:sean.mullan at oracle.com] > Sent: Wednesday, September 9, 2020 12:16 AM > To: Andrew Haley ; Yangfei (Felix) > ; hotspot-compiler-dev at openjdk.java.net; core- > libs-dev at openjdk.java.net > Cc: aarch64-port-dev at openjdk.java.net; Stuart Monteith > > Subject: Re: [aarch64-port-dev ] RFR: 8252204: AArch64: Implement SHA3 > accelerator/intrinsic > > Since this change affects security code, please make sure you add security- > dev at openjdk.java.net on any followup code reviews. Thanks for reminding that. I have just switched to github and created a PR for this issue: https://github.com/openjdk/jdk/pull/207 Let's switch to this PR for the followup code reviews. I see security and hotspot labels was automatically added by the bots. I also added labels for core-libs and hotspot-compiler. > > On 9/1/20 10:44 AM, Andrew Haley wrote: > > On 01/09/2020 11:53, Yangfei (Felix) wrote: > >> Sure, I am happy if the original author of the assembly code or someone > else from Linaro could help here. > >> I wasn't aware there was such an requirement here given that assembly > code is licensed under GPL. > > > > There sure is. All code must be contributed by its owner and put on > > the cr.openjdk site. Especially GPL code. I have added ard.biesheuvel at linaro.org to Contributed-by: in the git commit msg. And the newly created PR was Acked-by: Ard Biesheuvel ard.biesheuvel at linaro.org Hope this addresses Andrew's concern. Best regards, Felix From ping.1.developer at gmail.com Thu Sep 17 02:22:33 2020 From: ping.1.developer at gmail.com (Pinguino Jefe) Date: Wed, 16 Sep 2020 21:22:33 -0500 Subject: [aarch64-port-dev ] Interested in Using JDK on ARM 64 Message-ID: Hello, Although I found your repository, I am a bit clueless when it comes to installing it on my ARM Lenovo Yoga C630 with Windows 10. My main purpose is to use it with Android Studio if possible. Could you please direct me to a step-by-step on how to install it? Thanks, Gavin From aph at redhat.com Thu Sep 17 08:47:07 2020 From: aph at redhat.com (Andrew Haley) Date: Thu, 17 Sep 2020 09:47:07 +0100 Subject: [aarch64-port-dev ] Interested in Using JDK on ARM 64 In-Reply-To: References: Message-ID: On 17/09/2020 03:22, Pinguino Jefe wrote: > Although I found your repository, I am a bit clueless when it comes to > installing it on my ARM Lenovo Yoga C630 with Windows 10. My main purpose > is to use it with Android Studio if possible. Could you please direct me > to a step-by-step on how to install it? Congratulations! You are the very first person ever to ask for this. Microsoft people, can I ask you please to make a binary build of OpenJDK available? You have an Alpha tester. :-) -- Andrew Haley (he/him) Java Platform Lead Engineer Red Hat UK Ltd. https://keybase.io/andrewhaley EAC8 43EB D3EF DB98 CC77 2FAD A5CD 6035 332F A671 From Pengfei.Li at arm.com Thu Sep 17 10:10:30 2020 From: Pengfei.Li at arm.com (Pengfei Li) Date: Thu, 17 Sep 2020 10:10:30 +0000 Subject: [aarch64-port-dev ] Interested in Using JDK on ARM 64 In-Reply-To: References: Message-ID: Hi Gavin, > Hello, > > Although I found your repository, I am a bit clueless when it comes to > installing it on my ARM Lenovo Yoga C630 with Windows 10. My main > purpose is to use it with Android Studio if possible. Could you please direct > me to a step-by-step on how to install it? For now, you may install the x86_32 JDK for use on Arm Windows 10 laptops. It runs with emulation but works quite well. Please note that x86_64 application doesn't work on AArch64 Windows. Only 32bit works. Thanks, Pengfei From beurba at microsoft.com Thu Sep 17 12:54:13 2020 From: beurba at microsoft.com (Bernhard Urban-Forster) Date: Thu, 17 Sep 2020 12:54:13 +0000 Subject: [aarch64-port-dev ] Interested in Using JDK on ARM 64 In-Reply-To: References: Message-ID: Hey Gavin, the port to Windows ARM64 is work in progress, but here you can find some early builds: https://github.com/microsoft/openjdk-aarch64/releases Let us know how it is working out for you, -Bernhard ________________________________________ From: aarch64-port-dev on behalf of Pinguino Jefe Sent: Thursday, September 17, 2020 04:22 To: aarch64-port-dev at openjdk.java.net Subject: [aarch64-port-dev ] Interested in Using JDK on ARM 64 Hello, Although I found your repository, I am a bit clueless when it comes to installing it on my ARM Lenovo Yoga C630 with Windows 10. My main purpose is to use it with Android Studio if possible. Could you please direct me to a step-by-step on how to install it? Thanks, Gavin From gnu.andrew at redhat.com Fri Sep 18 03:45:19 2020 From: gnu.andrew at redhat.com (Andrew Hughes) Date: Fri, 18 Sep 2020 04:45:19 +0100 Subject: [aarch64-port-dev ] [RFR] [8u] 8u272-b08 Upstream Sync Message-ID: <20200918034519.GA331493@stopbrexit> Webrevs: https://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/ Merge changesets: http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/corba/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/jaxp/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/jaxws/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/jdk/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/hotspot/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/langtools/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/nashorn/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/root/merge.changeset Changes in aarch64-shenandoah-jdk8u272-b08: - JDK-8062947: Fix exception message to correctly represent LDAP connection failure - JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed due to timeout on DeadServerNoTimeoutTest is incorrect - JDK-8252573: 8u: Windows build failed after 8222079 backport Main issues of note: None, clean merge (only one minor one line HotSpot change). diffstat for root b/.hgtags | 1 + 1 file changed, 1 insertion(+) diffstat for corba b/.hgtags | 1 + 1 file changed, 1 insertion(+) diffstat for jaxp b/.hgtags | 1 + 1 file changed, 1 insertion(+) diffstat for jaxws b/.hgtags | 1 + 1 file changed, 1 insertion(+) diffstat for langtools b/.hgtags | 1 + 1 file changed, 1 insertion(+) diffstat for nashorn b/.hgtags | 1 + 1 file changed, 1 insertion(+) diffstat for jdk b/.hgtags | 1 b/src/share/classes/com/sun/jndi/ldap/Connection.java | 65 b/src/share/classes/com/sun/jndi/ldap/DefaultLdapDnsProvider.java | 4 b/src/share/classes/com/sun/jndi/ldap/LdapDnsProviderService.java | 25 b/src/share/classes/com/sun/jndi/ldap/LdapRequest.java | 27 b/test/com/sun/jndi/ldap/LdapTimeoutTest.java | 778 +++++----- b/test/com/sun/jndi/ldap/NamingExceptionMessageTest.java | 165 ++ b/test/com/sun/jndi/ldap/lib/BaseLdapServer.java | 27 8 files changed, 669 insertions(+), 423 deletions(-) diffstat for hotspot b/.hgtags | 1 + b/src/share/vm/compiler/disassembler.cpp | 1 - 2 files changed, 1 insertion(+), 1 deletion(-) Successfully built on x86, x86_64, s390x (Zero), ppc64le, aarch32 (Zero) & aarch64 [0]. Ok to push? [0] https://koji.fedoraproject.org/koji/buildinfo?buildID=1612280 Thanks, -- Andrew :) Senior Free Java Software Engineer OpenJDK Package Owner Red Hat, Inc. (http://www.redhat.com) PGP Key: ed25519/0xCFDA0F9B35964222 (hkp://keys.gnupg.net) Fingerprint = 5132 579D D154 0ED2 3E04 C5A0 CFDA 0F9B 3596 4222 From shade at redhat.com Fri Sep 18 07:49:20 2020 From: shade at redhat.com (Aleksey Shipilev) Date: Fri, 18 Sep 2020 09:49:20 +0200 Subject: [aarch64-port-dev ] [RFR] [8u] 8u272-b08 Upstream Sync In-Reply-To: <20200918034519.GA331493@stopbrexit> References: <20200918034519.GA331493@stopbrexit> Message-ID: <34aa845e-be4a-9f56-63b2-620a683bfbf4@redhat.com> On 9/18/20 5:45 AM, Andrew Hughes wrote: > Webrevs: https://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/ > > Merge changesets: > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/corba/merge.changeset > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/jaxp/merge.changeset > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/jaxws/merge.changeset Look trivially good. > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/jdk/merge.changeset Looks good. > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/hotspot/merge.changeset > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/langtools/merge.changeset > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/nashorn/merge.changeset > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/root/merge.changeset Look trivially good. > Ok to push? Yes. -- Thanks, -Aleksey From gnu.andrew at redhat.com Fri Sep 18 15:46:36 2020 From: gnu.andrew at redhat.com (Andrew Hughes) Date: Fri, 18 Sep 2020 16:46:36 +0100 Subject: [aarch64-port-dev ] [RFR] [8u] 8u272-b08 Upstream Sync In-Reply-To: <34aa845e-be4a-9f56-63b2-620a683bfbf4@redhat.com> References: <20200918034519.GA331493@stopbrexit> <34aa845e-be4a-9f56-63b2-620a683bfbf4@redhat.com> Message-ID: <20200918154636.GA371187@stopbrexit> On 09:49 Fri 18 Sep , Aleksey Shipilev wrote: > On 9/18/20 5:45 AM, Andrew Hughes wrote: > > Webrevs: https://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/ > > > > Merge changesets: > > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/corba/merge.changeset > > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/jaxp/merge.changeset > > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/jaxws/merge.changeset > > Look trivially good. > > > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/jdk/merge.changeset > > Looks good. > > > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/hotspot/merge.changeset > > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/langtools/merge.changeset > > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/nashorn/merge.changeset > > http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b08/root/merge.changeset > > Look trivially good. > > > Ok to push? > > Yes. > > -- > Thanks, > -Aleksey > Thanks. Pushed. -- Andrew :) Senior Free Java Software Engineer OpenJDK Package Owner Red Hat, Inc. (http://www.redhat.com) PGP Key: ed25519/0xCFDA0F9B35964222 (hkp://keys.gnupg.net) Fingerprint = 5132 579D D154 0ED2 3E04 C5A0 CFDA 0F9B 3596 4222 From gnu.andrew at redhat.com Fri Sep 18 15:46:25 2020 From: gnu.andrew at redhat.com (gnu.andrew at redhat.com) Date: Fri, 18 Sep 2020 15:46:25 +0000 Subject: [aarch64-port-dev ] hg: aarch64-port/jdk8u-shenandoah: 3 new changesets Message-ID: <202009181546.08IFkPaW012712@aojmv0008.oracle.com> Changeset: 7f60c2d9823e Author: andrew Date: 2020-09-14 16:42 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/rev/7f60c2d9823e Added tag jdk8u272-b08 for changeset 34c6baf21464 ! .hgtags Changeset: ea6b293b309b Author: andrew Date: 2020-09-16 03:31 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/rev/ea6b293b309b Merge jdk8u272-b08 ! .hgtags Changeset: 2ebc0ea01258 Author: andrew Date: 2020-09-16 03:34 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/rev/2ebc0ea01258 Added tag aarch64-shenandoah-jdk8u272-b08 for changeset ea6b293b309b ! .hgtags From gnu.andrew at redhat.com Fri Sep 18 15:46:53 2020 From: gnu.andrew at redhat.com (gnu.andrew at redhat.com) Date: Fri, 18 Sep 2020 15:46:53 +0000 Subject: [aarch64-port-dev ] hg: aarch64-port/jdk8u-shenandoah/langtools: 3 new changesets Message-ID: <202009181546.08IFkrbR013678@aojmv0008.oracle.com> Changeset: acab1eb3dc4c Author: andrew Date: 2020-09-14 16:42 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/langtools/rev/acab1eb3dc4c Added tag jdk8u272-b08 for changeset 462446582ece ! .hgtags Changeset: 924ffebbf3e9 Author: andrew Date: 2020-09-16 03:31 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/langtools/rev/924ffebbf3e9 Merge jdk8u272-b08 ! .hgtags Changeset: a53e0a7f8b2a Author: andrew Date: 2020-09-16 03:34 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/langtools/rev/a53e0a7f8b2a Added tag aarch64-shenandoah-jdk8u272-b08 for changeset 924ffebbf3e9 ! .hgtags From gnu.andrew at redhat.com Fri Sep 18 15:47:09 2020 From: gnu.andrew at redhat.com (gnu.andrew at redhat.com) Date: Fri, 18 Sep 2020 15:47:09 +0000 Subject: [aarch64-port-dev ] hg: aarch64-port/jdk8u-shenandoah/jdk: 5 new changesets Message-ID: <202009181547.08IFl9RR013936@aojmv0008.oracle.com> Changeset: 9deaed6c4a0f Author: zgu Date: 2020-09-09 14:18 -0400 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/9deaed6c4a0f 8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed due to timeout on DeadServerNoTimeoutTest is incorrect Reviewed-by: dfuchs, martin, robm ! src/share/classes/com/sun/jndi/ldap/DefaultLdapDnsProvider.java ! src/share/classes/com/sun/jndi/ldap/LdapDnsProviderService.java ! test/com/sun/jndi/ldap/LdapTimeoutTest.java ! test/com/sun/jndi/ldap/lib/BaseLdapServer.java Changeset: ab2e99db6702 Author: zgu Date: 2020-09-09 14:19 -0400 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/ab2e99db6702 8062947: Fix exception message to correctly represent LDAP connection failure Reviewed-by: dfuchs, xyin, vtewari ! src/share/classes/com/sun/jndi/ldap/Connection.java ! src/share/classes/com/sun/jndi/ldap/LdapRequest.java + test/com/sun/jndi/ldap/NamingExceptionMessageTest.java Changeset: 63dd5b7d50eb Author: andrew Date: 2020-09-14 16:42 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/63dd5b7d50eb Added tag jdk8u272-b08 for changeset ab2e99db6702 ! .hgtags Changeset: ce694a8afb58 Author: andrew Date: 2020-09-16 03:31 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/ce694a8afb58 Merge jdk8u272-b08 ! .hgtags ! src/share/classes/com/sun/jndi/ldap/Connection.java Changeset: 0632eeee979a Author: andrew Date: 2020-09-16 03:34 +0100 URL: https://hg.openjdk.java.net/aarch64-port/jdk8u-shenandoah/jdk/rev/0632eeee979a Added tag aarch64-shenandoah-jdk8u272-b08 for changeset ce694a8afb58 ! .hgtags From zhuoren.wz at alibaba-inc.com Tue Sep 22 12:07:16 2020 From: zhuoren.wz at alibaba-inc.com (=?UTF-8?B?V2FuZyBaaHVvKFpodW9yZW4p?=) Date: Tue, 22 Sep 2020 20:07:16 +0800 Subject: [aarch64-port-dev ] =?utf-8?b?WzE2XVtSRlJdW3NdOjgyNTI4MzU6UmV2?= =?utf-8?q?ert_fix_for_JDK-8246051?= In-Reply-To: <989bb8a4-f33a-5a10-5b65-d9684e79a2e2@oracle.com> References: <743d73d5-36cc-4a1e-bc13-96bb27c8ab8e.zhuoren.wz@alibaba-inc.com>, <989bb8a4-f33a-5a10-5b65-d9684e79a2e2@oracle.com> Message-ID: PR : https://github.com/openjdk/jdk/pull/297 Please have a look. Regards, Zhuoren ------------------------------------------------------------------ From:David Holmes Sent At:2020 Sep. 7 (Mon.) 21:33 To:Sandler ; Andrew Haley ; Paul Sandoz ; Patric Hedlin ; aarch64-port-dev ; hotspot-runtime-dev at openjdk.java.net Subject:Re: [16][RFR][s]:8252835:Revert fix for JDK-8246051 Hi Zhuoren, This needs to be done as a Pull Request (PR) now that we have transitoned to git/gitbub. Thanks, David On 7/09/2020 9:49 pm, Wang Zhuo(Zhuoren) wrote: > As discussed before, this patch is to revert > JDK-8246051(SIGBUS by unaligned Unsafe compare_and_swap). Please review. > JDK bug: https://bugs.openjdk.java.net/browse/JDK-8252835 > Patch: http://cr.openjdk.java.net/~wzhuo/8252835/webrev.00/ > > > Regards, > Zhuoren > From mark.reinhold at oracle.com Fri Sep 25 21:23:31 2020 From: mark.reinhold at oracle.com (mark.reinhold at oracle.com) Date: Fri, 25 Sep 2020 14:23:31 -0700 (PDT) Subject: [aarch64-port-dev ] New candidate JEP: 391: macOS/AArch64 Port Message-ID: <20200925212331.6F9A53C3231@eggemoggin.niobe.net> https://openjdk.java.net/jeps/391 - Mark From gnu.andrew at redhat.com Tue Sep 29 00:26:03 2020 From: gnu.andrew at redhat.com (Andrew Hughes) Date: Tue, 29 Sep 2020 01:26:03 +0100 Subject: [aarch64-port-dev ] [RFR] [8u] 8u272-b09 Upstream Sync Message-ID: <20200929002603.GD198906@stopbrexit> Webrevs: https://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b09/ Merge changesets: http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b09/corba/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b09/jaxp/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b09/jaxws/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b09/jdk/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b09/hotspot/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b09/langtools/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b09/nashorn/merge.changeset http://cr.openjdk.java.net/~andrew/shenandoah-8/u272-b09/root/merge.changeset Changes in aarch64-shenandoah-jdk8u272-b09: - JDK-8252886: [TESTBUG] sun/security/ec/TestEC.java : Compilation failed Main issues of note: None, clean merge (no HotSpot changes). diffstat for root b/.hgtags | 1 + 1 file changed, 1 insertion(+) diffstat for corba b/.hgtags | 1 + 1 file changed, 1 insertion(+) diffstat for jaxp b/.hgtags | 1 + 1 file changed, 1 insertion(+) diffstat for jaxws b/.hgtags | 1 + 1 file changed, 1 insertion(+) diffstat for langtools b/.hgtags | 1 + 1 file changed, 1 insertion(+) diffstat for nashorn b/.hgtags | 1 + 1 file changed, 1 insertion(+) diffstat for jdk b/.hgtags | 1 + b/test/sun/security/ec/TestEC.java | 1 + 2 files changed, 2 insertions(+) diffstat for hotspot b/.hgtags | 1 + 1 file changed, 1 insertion(+) Successfully built on x86, x86_64, s390x (Zero), ppc64le, aarch32 (Zero) & aarch64 [0]. Ok to push? [0] https://koji.fedoraproject.org/koji/buildinfo?buildID=1616531 Thanks, -- Andrew :) Senior Free Java Software Engineer OpenJDK Package Owner Red Hat, Inc. (http://www.redhat.com) PGP Key: ed25519/0xCFDA0F9B35964222 (hkp://keys.gnupg.net) Fingerprint = 5132 579D D154 0ED2 3E04 C5A0 CFDA 0F9B 3596 4222 From akozlov at azul.com Wed Sep 30 17:34:01 2020 From: akozlov at azul.com (Anton Kozlov) Date: Wed, 30 Sep 2020 20:34:01 +0300 Subject: [aarch64-port-dev ] macOS/Aarch64 workflow Message-ID: <52bb6ef7-f2bc-9bff-2a5a-8d1b1134b945@azul.com> Hi all, Since the JEP for macOS/AArch64[1] became Candidate, we can work on the port under the OpenJDK roof. That is, sharing and discussing changes that eventually will be integrated as parts of the JEP implementation. I know there are multiple parties willing to contribute, and this is great! To understand what should be done and what somebody has done, I have started filling in JDK-8253795: Implementation of JEP 391: macOS/AArch64 Port[2]. I propose to use subtasks to track changes that constitute the port, and use related links for other changes, like fixes for bugs earlier unnoticed, related enhancements,... These lists are not complete yet. So far, for me it does _not_ look like the implementation will span for a large number of commits. But anyway we need a way to effectively collaborate on code. The chosen way should also ensure that the involved party has signed the OCA. We can use jdk-sandbox[3], which serves exactly this need (apparently it has been moved to git[4] after openjdk/jdk as well). But you have to be a JDK Project Committer to use the sandbox. It looks like another option for non-Committers is to use draft Pull Requests on GitHub to openjdk/jdk repo, which would be the same as using cr.openjdk.java.net. Then others could pull changes from openjdk/jdk/pull/..., after ensuring the Skara bot have verified the OCA status of the PR. There are other options, like a project or a repo under an existing project. Let's discuss them. Thanks, Anton [1] https://openjdk.java.net/jeps/391 [2] https://bugs.openjdk.java.net/browse/JDK-8253795 [3] https://cr.openjdk.java.net/~chegar/docs/sandbox.html [4] https://github.com/openjdk/jdk-sandbox On 26.09.2020 00:23, mark.reinhold at oracle.com wrote: > https://openjdk.java.net/jeps/391