/hg/icedtea6-hg: 3 new changesets
andrew at icedtea.classpath.org
andrew at icedtea.classpath.org
Mon Jan 19 17:53:05 UTC 2015
changeset 199332d3ed53 in /hg/icedtea6-hg
details: http://icedtea.classpath.org/hg/icedtea6-hg?cmd=changeset;node=199332d3ed53
author: Andrew John Hughes <gnu.andrew at redhat.com>
date: Wed Nov 12 23:58:13 2014 +0000
PR2083: Add support for building Zero on AArch64
2014-11-12 Andrew John Hughes <gnu.andrew at redhat.com>
* Makefile.am:
(ICEDTEA_PATCHES): Add new patch.
* NEWS: Updated.
* patches/pr2083-aarch64_zero.patch:
Add HotSpot support for building Zero on AArch64.
changeset d6a1b5eb846b in /hg/icedtea6-hg
details: http://icedtea.classpath.org/hg/icedtea6-hg?cmd=changeset;node=d6a1b5eb846b
author: Andrew John Hughes <gnu.andrew at redhat.com>
date: Wed Dec 24 18:48:30 2014 +0000
Merge
changeset ccfb83ff9e78 in /hg/icedtea6-hg
details: http://icedtea.classpath.org/hg/icedtea6-hg?cmd=changeset;node=ccfb83ff9e78
author: Andrew John Hughes <gnu.andrew at redhat.com>
date: Mon Jan 19 17:52:30 2015 +0000
Sync with upstream OpenJDK 6 repository.
Upstream changes:
- OJ43: Backport JAX_WS-945; Socket backlog may be limiting lwhs performance
- S6364329: jstat displays "invalid argument count" with usage
- S6507067: TimeZone country/area message error
- S6585666: Spanish language names not compliant with CLDR
- S6608572: Currency change for Malta and Cyprus
- S6610748: Dateformat - AM-PM indicator in Finnish appears to be from English
- S6627549: ISO 3166 code addition: Saint Barthelemy and Saint Martin
- S6645271: Wrong date format for Croatian (hr) locale
- S6646611: Incorrect spelling of month name in locale for Belarusian language ("be", "BY")
- S6647452: Remove obfuscation, framework and provider self-verification checking
- S6716626: Integrate contributed language and country names for NL
- S6786276: Locale.getISOCountries() still contains country code "CS"
- S6868106: Ukrainian currency has wrong format
- S6870908: reopen bug 4244752: month names in Estonian should be lowercase
- S6873931: New Turkish currency since 2009
- S6910489: Slovenia Locale, wrong firstDayOfWeek number
- S6914413: abbreviation name for November is not correct in be_BY
- S6916787: Ukrainian currency name needs to be fixed
- S6919624: minimalDaysInFirstWeek ressource for hungarian is wrong
- S6931564: Incorrect display name of Locale for south africa
- S6938454: 2 new testcases for bug: Unable to determine generic type in program that compiles under Java 6
- S6938454: Unable to determine generic type in program that compiles under Java 6
- S7019267: Currency Display Names are not localized into pt_BR.
- S7020583: Some currency names are missing in some locales
- S7020960: CurrencyNames_sr_RS.properties is missing.
- S7025837: fix plural currency display names in sr_Latn_(BA|ME|RS).properties
- S7028073: The currency symbol for Peru is wrong
- S7036905: [de] dem - the german mark display name is incorrect
- S7066203: Update currency data to the latest ISO 4217 standard
- S7077119: remove past transition dates from CurrencyData.properties file
- S7085757: Currency Data: ISO 4217 Amendment 152
- S7122142: (ann) Race condition between isAnnotationPresent and getAnnotations
- S7161796: PhaseStringOpts::fetch_static_field tries to fetch field from the Klass instead of the mirror
- S7171028: dots are missed in the datetime for Slovanian
- S7185456: (ann) Optimize Annotation handling in java/sun.reflect.* code for small number of annotations
- S7189611: Venezuela current Currency should be Bs.F.
- S7195759: ISO 4217 Amendment 154
- S7201205: Add Makefile configuration option to build with unlimited crypto in OpenJDK.
- S8005232: (JEP-149) Class Instance size reduction
- S8006748: getISO3Country() returns wrong value
- S8013836: getFirstDayOfWeek reports wrong day for pt-BR locale
- S8021121: ISO 4217 Amendment Number 156
- S8022721: TEST_BUG: AnnotationTypeDeadlockTest.java throws java.lang.IllegalStateException: unexpected condition
- S8027695: There should be a space before % sign in Swedish locale
- S8055222: Currency update needed for ISO 4217 Amendment #159
2015-01-19 Andrew John Hughes <gnu.andrew at member.fsf.org>
* patches/clean-crypto.patch: Removed; replaced by
inclusion of UNLIMITED_CRYPTO=true solution upstream.
* patches/openjdk/7122142-annotation_race_condition.patch,
* patches/openjdk/7161796-wrong_fetch_in_fetch_static_field.patch:
Remove patches included upstream.
* Makefile.am:
(ICEDTEA_PATCHES): Remove above patches.
(ICEDTEA_ENV): Set UNLIMITED_CRYPTO=true.
* NEWS: Updated.
* patches/openjdk/4963723-implement_sha-224.patch:
Regenerated following backport of 6647452 upstream.
* patches/openjdk/7044060-support_nsa_suite_b.patch:
Likewise.
* patches/openjdk/7106773-512_bits_rsa.patch: Likewise.
* patches/openjdk/8006935-long_keys_in_hmac_prf.patch: Likewise.
* patches/openjdk/p11cipher-4898461-support_ecb_and_cbc.patch:
Likewise.
* patches/openjdk/p11cipher-6604496-support_ckm_aes_ctr.patch:
Likewise.
2015-01-05 Andrew John Hughes <gnu.andrew at member.fsf.org>
* patches/ecj/pr64174.patch: Drop the Lithuanian
changeover date now, as it's in the past.
2014-12-04 Andrew John Hughes <gnu.andrew at member.fsf.org>
* Makefile.am:
(ICEDTEA_ECJ_PATCHES): Add workaround for bug
in parsing end-of-year dates (Classpath PR64174).
* acinclude.m4:
(IT_PR64174_CHECK): Detect if the boot JDK suffers
from PR64174 and apply the patch if so.
* configure.ac: Call IT_PR64174_CHECK.
* patches/ecj/pr64174.patch: Drop the Latvian
Euro changeover date, which is in the past anyway,
and move Lithuania's two hours forward so it enters
2015 and avoids the bug.
diffstat:
ChangeLog | 54 +
Makefile.am | 17 +-
NEWS | 49 +-
acinclude.m4 | 46 +
configure.ac | 3 +
patches/clean-crypto.patch | 1099 -----
patches/ecj/pr64174.patch | 21 +
patches/openjdk/4963723-implement_sha-224.patch | 289 +-
patches/openjdk/7044060-support_nsa_suite_b.patch | 125 +-
patches/openjdk/7106773-512_bits_rsa.patch | 2 +-
patches/openjdk/7122142-annotation_race_condition.patch | 1955 ----------
patches/openjdk/7161796-wrong_fetch_in_fetch_static_field.patch | 40 -
patches/openjdk/8006935-long_keys_in_hmac_prf.patch | 2 +-
patches/openjdk/p11cipher-4898461-support_ecb_and_cbc.patch | 7 -
patches/openjdk/p11cipher-6604496-support_ckm_aes_ctr.patch | 2 +-
patches/pr2083-aarch64_zero.patch | 88 +
16 files changed, 466 insertions(+), 3333 deletions(-)
diffs (truncated from 4703 to 500 lines):
diff -r cd81722f010d -r ccfb83ff9e78 ChangeLog
--- a/ChangeLog Fri Oct 24 02:51:29 2014 +0100
+++ b/ChangeLog Mon Jan 19 17:52:30 2015 +0000
@@ -1,3 +1,57 @@
+2015-01-19 Andrew John Hughes <gnu.andrew at member.fsf.org>
+
+ * patches/clean-crypto.patch: Removed; replaced by
+ inclusion of UNLIMITED_CRYPTO=true solution upstream.
+ * patches/openjdk/7122142-annotation_race_condition.patch,
+ * patches/openjdk/7161796-wrong_fetch_in_fetch_static_field.patch:
+ Remove patches included upstream.
+ * Makefile.am:
+ (ICEDTEA_PATCHES): Remove above patches.
+ (ICEDTEA_ENV): Set UNLIMITED_CRYPTO=true.
+ * NEWS: Updated.
+ * patches/openjdk/4963723-implement_sha-224.patch:
+ Regenerated following backport of 6647452 upstream.
+ * patches/openjdk/7044060-support_nsa_suite_b.patch:
+ Likewise.
+ * patches/openjdk/7106773-512_bits_rsa.patch: Likewise.
+ * patches/openjdk/8006935-long_keys_in_hmac_prf.patch: Likewise.
+ * patches/openjdk/p11cipher-4898461-support_ecb_and_cbc.patch:
+ Likewise.
+ * patches/openjdk/p11cipher-6604496-support_ckm_aes_ctr.patch:
+ Likewise.
+
+2015-01-05 Andrew John Hughes <gnu.andrew at member.fsf.org>
+
+ * patches/ecj/pr64174.patch: Drop the Lithuanian
+ changeover date now, as it's in the past.
+
+2014-12-04 Andrew John Hughes <gnu.andrew at member.fsf.org>
+
+ * Makefile.am:
+ (ICEDTEA_ECJ_PATCHES): Add workaround for bug
+ in parsing end-of-year dates (Classpath PR64174).
+ * acinclude.m4:
+ (IT_PR64174_CHECK): Detect if the boot JDK suffers
+ from PR64174 and apply the patch if so.
+ * configure.ac: Call IT_PR64174_CHECK.
+ * patches/ecj/pr64174.patch: Drop the Latvian
+ Euro changeover date, which is in the past anyway,
+ and move Lithuania's two hours forward so it enters
+ 2015 and avoids the bug.
+
+2014-11-12 Andrew John Hughes <gnu.andrew at redhat.com>
+
+ * Makefile.am:
+ (ICEDTEA_PATCHES): Add new patch.
+ * NEWS: Updated.
+ * patches/pr2083-aarch64_zero.patch:
+ Add HotSpot support for building Zero on AArch64.
+
+2014-10-24 Andrew John Hughes <gnu.andrew at redhat.com>
+
+ * Makefile.am:
+ (OPENJDK_VERSION): Bump to next release, b34.
+
2014-10-23 Andrew John Hughes <gnu.andrew at redhat.com>
* Makefile.am:
diff -r cd81722f010d -r ccfb83ff9e78 Makefile.am
--- a/Makefile.am Fri Oct 24 02:51:29 2014 +0100
+++ b/Makefile.am Mon Jan 19 17:52:30 2015 +0000
@@ -2,7 +2,7 @@
OPENJDK_DATE = 14_oct_2014
OPENJDK_SHA256SUM = cabc35587a90fa81edd8ba8537c0454348c37456de27e407bbb66d52031a1293
-OPENJDK_VERSION = b33
+OPENJDK_VERSION = b34
OPENJDK_URL = https://java.net/downloads/openjdk6/
CACAO_VERSION = 68fe50ac34ec
@@ -345,7 +345,6 @@
patches/nomotif-mtoolkit.patch \
patches/alt-jar.patch \
patches/jdk-use-ssize_t.patch \
- patches/clean-crypto.patch \
patches/arch.patch \
patches/lc_ctype.patch \
patches/xjc.patch \
@@ -625,9 +624,8 @@
patches/openjdk/7106773-512_bits_rsa.patch \
patches/pr1904-icedtea_and_distro_versioning.patch \
patches/openjdk/8017173-xml_cipher_rsa_oaep_cant_be_instantiated.patch \
- patches/openjdk/7122142-annotation_race_condition.patch \
- patches/openjdk/7161796-wrong_fetch_in_fetch_static_field.patch \
- patches/openjdk/8000897-use_corresponding_digest_length.patch
+ patches/openjdk/8000897-use_corresponding_digest_length.patch \
+ patches/pr2083-aarch64_zero.patch
if WITH_RHINO
ICEDTEA_PATCHES += \
@@ -747,6 +745,12 @@
ICEDTEA_ECJ_PATCHES += patches/ecj/no-test_gamma.patch
endif
+# If date parsing bug is present, drop Lithuania and Latvia EUR transition
+# dates as they are already in the past anyway.
+if CP64174
+ICEDTEA_ECJ_PATCHES += patches/ecj/pr64174.patch
+endif
+
ICEDTEA_ECJ_PATCHES += $(DISTRIBUTION_ECJ_PATCHES)
# OpenJDK build environment.
@@ -821,7 +825,8 @@
STATIC_CXX="false" \
BUILD_GCC=gcc$(GCC_SUFFIX) \
BUILD_CXX=g++$(GCC_SUFFIX) \
- COMPILER_WARNINGS_FATAL="$(WERROR_STATUS)"
+ COMPILER_WARNINGS_FATAL="$(WERROR_STATUS)" \
+ UNLIMITED_CRYPTO="true"
if ENABLE_CACAO
ICEDTEA_ENV += \
diff -r cd81722f010d -r ccfb83ff9e78 NEWS
--- a/NEWS Fri Oct 24 02:51:29 2014 +0100
+++ b/NEWS Mon Jan 19 17:52:30 2015 +0000
@@ -14,20 +14,65 @@
New in release 1.14.0 (201X-XX-XX):
+* Import of OpenJDK6 b34
+ - OJ43: Backport JAX_WS-945; Socket backlog may be limiting lwhs performance
+ - S6364329: jstat displays "invalid argument count" with usage
+ - S6507067: TimeZone country/area message error
+ - S6585666: Spanish language names not compliant with CLDR
+ - S6608572: Currency change for Malta and Cyprus
+ - S6610748: Dateformat - AM-PM indicator in Finnish appears to be from English
+ - S6627549: ISO 3166 code addition: Saint Barthelemy and Saint Martin
+ - S6645271: Wrong date format for Croatian (hr) locale
+ - S6646611: Incorrect spelling of month name in locale for Belarusian language ("be", "BY")
+ - S6647452: Remove obfuscation, framework and provider self-verification checking
+ - S6716626: Integrate contributed language and country names for NL
+ - S6786276: Locale.getISOCountries() still contains country code "CS"
+ - S6868106: Ukrainian currency has wrong format
+ - S6870908: reopen bug 4244752: month names in Estonian should be lowercase
+ - S6873931: New Turkish currency since 2009
+ - S6910489: Slovenia Locale, wrong firstDayOfWeek number
+ - S6914413: abbreviation name for November is not correct in be_BY
+ - S6916787: Ukrainian currency name needs to be fixed
+ - S6919624: minimalDaysInFirstWeek ressource for hungarian is wrong
+ - S6931564: Incorrect display name of Locale for south africa
+ - S6938454: 2 new testcases for bug: Unable to determine generic type in program that compiles under Java 6
+ - S6938454: Unable to determine generic type in program that compiles under Java 6
+ - S7019267: Currency Display Names are not localized into pt_BR.
+ - S7020583: Some currency names are missing in some locales
+ - S7020960: CurrencyNames_sr_RS.properties is missing.
+ - S7025837: fix plural currency display names in sr_Latn_(BA|ME|RS).properties
+ - S7028073: The currency symbol for Peru is wrong
+ - S7036905: [de] dem - the german mark display name is incorrect
+ - S7066203: Update currency data to the latest ISO 4217 standard
+ - S7077119: remove past transition dates from CurrencyData.properties file
+ - S7085757: Currency Data: ISO 4217 Amendment 152
+ - S7122142, RH1151372: (ann) Race condition between isAnnotationPresent and getAnnotations
+ - S7161796, RH1151372: PhaseStringOpts::fetch_static_field tries to fetch field from the Klass instead of the mirror
+ - S7171028: dots are missed in the datetime for Slovanian
+ - S7185456: (ann) Optimize Annotation handling in java/sun.reflect.* code for small number of annotations
+ - S7189611: Venezuela current Currency should be Bs.F.
+ - S7195759: ISO 4217 Amendment 154
+ - S7201205: Add Makefile configuration option to build with unlimited crypto in OpenJDK.
+ - S8005232: (JEP-149) Class Instance size reduction
+ - S8006748: getISO3Country() returns wrong value
+ - S8013836: getFirstDayOfWeek reports wrong day for pt-BR locale
+ - S8021121: ISO 4217 Amendment Number 156
+ - S8022721: TEST_BUG: AnnotationTypeDeadlockTest.java throws java.lang.IllegalStateException: unexpected condition
+ - S8027695: There should be a space before % sign in Swedish locale
+ - S8055222: Currency update needed for ISO 4217 Amendment #159
* Backports
- S6611637: NullPointerException in sun.font.GlyphLayout$EngineRecord.init
- S6727719: Performance of TextLayout.getBounds()
- S6745225: Memory leak while drawing Attributed String
- S6904962: GlyphVector.getVisualBounds should not be affected by leading or trailing white space.
- - S7122142, RH1151372: (ann) Race condition between isAnnotationPresent and getAnnotations
- S7151089: PS NUMA: NUMA allocator should not attempt to free pages when using SHM large pages
- - S7161796, RH1151372: PhaseStringOpts::fetch_static_field tries to fetch field from the Klass instead of the mirror
- S8000897, RH1155012: VM crash in CompileBroker
- S8013057: Detect mmap() commit failures in Linux and Solaris os::commit_memory() impls and call vm_exit_out_of_memory()
- S8026887: Make issues due to failed large pages allocations easier to debug
* Bug fixes
- PR1886: IcedTea does not checksum supplied tarballs
- PR2033: patches/ecj/jaxws-getdtdtype.patch no longer applies since removal of JAXWS drop
+ - PR2083: Add support for building Zero on AArch64
New in release 1.13.5 (2014-10-14):
diff -r cd81722f010d -r ccfb83ff9e78 acinclude.m4
--- a/acinclude.m4 Fri Oct 24 02:51:29 2014 +0100
+++ b/acinclude.m4 Mon Jan 19 17:52:30 2015 +0000
@@ -2317,3 +2317,49 @@
AC_MSG_RESULT([$enable_werror])
AM_CONDITIONAL([ENABLE_WERROR], test x"${enable_werror}" = "xyes")
])
+
+AC_DEFUN_ONCE([IT_PR64174_CHECK],[
+AC_REQUIRE([IT_CHECK_JAVA_AND_JAVAC_WORK])
+AC_CACHE_CHECK([if java.text.SimpleDateFormat exhibits Classpath bug 64174], it_cv_cp64174, [
+ CLASS=Test.java
+ BYTECODE=$(echo $CLASS|sed 's#\.java##')
+ mkdir tmp.$$
+ cd tmp.$$
+ cat << \EOF > $CLASS
+[/* [#]line __oline__ "configure" */
+import java.text.ParseException;
+import java.text.SimpleDateFormat;
+import java.util.Calendar;
+import java.util.Locale;
+import java.util.TimeZone;
+
+public class Test
+{
+ public static void main(String[] args)
+ throws ParseException
+ {
+ SimpleDateFormat format;
+
+ format = new SimpleDateFormat("yyyy-MM-dd-HH-mm-ss", Locale.US);
+ format.setTimeZone(TimeZone.getTimeZone("GMT"));
+ format.setLenient(false);
+ System.out.println(format.parse("2014-12-31-22-00-00"));
+ }
+}]
+EOF
+ if $JAVAC -cp . $JAVACFLAGS -source 5 -target 5 $CLASS >&AS_MESSAGE_LOG_FD 2>&1; then
+ if $JAVA -classpath . $BYTECODE >&AS_MESSAGE_LOG_FD 2>&1; then
+ it_cv_cp64174=no;
+ else
+ it_cv_cp64174=yes;
+ fi
+ else
+ it_cv_cp64174=yes;
+ fi
+ rm -f $CLASS *.class
+ cd ..
+ rmdir tmp.$$
+ ])
+AM_CONDITIONAL([CP64174], test x"${it_cv_cp64174}" = "xyes")
+AC_PROVIDE([$0])dnl
+])
diff -r cd81722f010d -r ccfb83ff9e78 configure.ac
--- a/configure.ac Fri Oct 24 02:51:29 2014 +0100
+++ b/configure.ac Mon Jan 19 17:52:30 2015 +0000
@@ -167,6 +167,9 @@
IT_CHECK_FOR_CONSTRUCTOR([JAVA_SQL_EXCEPTION_REASON_STATE_THROWABLE],[java.sql.SQLException],[String.class,String.class,Throwable.class],["Something went wrong","",new Throwable()])
IT_CHECK_FOR_CONSTRUCTOR([JAVA_SQL_EXCEPTION_REASON_STATE_CODE_THROWABLE],[java.sql.SQLException],[String.class,String.class,Integer.TYPE,Throwable.class],["Something went wrong","",666,new Throwable()])
+dnl Check whether the JDK can parse the dates used in the currency file
+IT_PR64174_CHECK
+
# Use xvfb-run if found to run gui tests (check-jdk).
AC_CHECK_PROG(XVFB_RUN_CMD, xvfb-run, [xvfb-run -a -e xvfb-errors], [])
AC_SUBST(XVFB_RUN_CMD)
diff -r cd81722f010d -r ccfb83ff9e78 patches/clean-crypto.patch
--- a/patches/clean-crypto.patch Fri Oct 24 02:51:29 2014 +0100
+++ /dev/null Thu Jan 01 00:00:00 1970 +0000
@@ -1,1099 +0,0 @@
-diff -Nru openjdk.orig/jdk/make/javax/crypto/Makefile openjdk/jdk/make/javax/crypto/Makefile
---- openjdk.orig/jdk/make/javax/crypto/Makefile 2010-05-26 09:32:35.000000000 +0100
-+++ openjdk/jdk/make/javax/crypto/Makefile 2010-05-26 13:53:03.000000000 +0100
-@@ -155,7 +155,8 @@
- #
-
- ifdef OPENJDK
--all: build-jar install-jar build-policy install-limited
-+# We don't need any policy files.
-+all: build-jar install-jar
- else # OPENJDK
- ifeq ($(strip $(FILES_java)),)
- all:
-diff -Nru openjdk.orig/jdk/src/share/classes/javax/crypto/Cipher.java openjdk/jdk/src/share/classes/javax/crypto/Cipher.java
---- openjdk.orig/jdk/src/share/classes/javax/crypto/Cipher.java 2010-05-26 09:32:39.000000000 +0100
-+++ openjdk/jdk/src/share/classes/javax/crypto/Cipher.java 2010-05-26 13:53:03.000000000 +0100
-@@ -144,12 +144,6 @@
- // The transformation
- private String transformation;
-
-- // Crypto permission representing the maximum allowable cryptographic
-- // strength that this Cipher object can be used for. (The cryptographic
-- // strength is a function of the keysize and algorithm parameters encoded
-- // in the crypto permission.)
-- private CryptoPermission cryptoPerm;
--
- // The exemption mechanism that needs to be enforced
- private ExemptionMechanism exmech;
-
-@@ -190,16 +184,9 @@
- protected Cipher(CipherSpi cipherSpi,
- Provider provider,
- String transformation) {
-- // See bug 4341369 & 4334690 for more info.
-- // If the caller is trusted, then okey.
-- // Otherwise throw a NullPointerException.
-- if (!JceSecurityManager.INSTANCE.isCallerTrusted()) {
-- throw new NullPointerException();
-- }
- this.spi = cipherSpi;
- this.provider = provider;
- this.transformation = transformation;
-- this.cryptoPerm = CryptoAllPermission.INSTANCE;
- this.lock = null;
- }
-
-@@ -212,7 +199,6 @@
- Cipher(CipherSpi cipherSpi, String transformation) {
- this.spi = cipherSpi;
- this.transformation = transformation;
-- this.cryptoPerm = CryptoAllPermission.INSTANCE;
- this.lock = null;
- }
-
-@@ -442,9 +428,6 @@
- Exception failure = null;
- while (t.hasNext()) {
- Service s = (Service)t.next();
-- if (JceSecurity.canUseProvider(s.getProvider()) == false) {
-- continue;
-- }
- Transform tr = getTransform(s, transforms);
- if (tr == null) {
- // should never happen
-@@ -570,7 +553,6 @@
- }
- Exception failure = null;
- List transforms = getTransforms(transformation);
-- boolean providerChecked = false;
- String paddingError = null;
- for (Iterator t = transforms.iterator(); t.hasNext();) {
- Transform tr = (Transform)t.next();
-@@ -578,19 +560,6 @@
- if (s == null) {
- continue;
- }
-- if (providerChecked == false) {
-- // for compatibility, first do the lookup and then verify
-- // the provider. this makes the difference between a NSAE
-- // and a SecurityException if the
-- // provider does not support the algorithm.
-- Exception ve = JceSecurity.getVerificationResult(provider);
-- if (ve != null) {
-- String msg = "JCE cannot authenticate the provider "
-- + provider.getName();
-- throw new SecurityException(msg, ve);
-- }
-- providerChecked = true;
-- }
- if (tr.supportsMode(s) == S_NO) {
- continue;
- }
-@@ -603,7 +572,6 @@
- tr.setModePadding(spi);
- Cipher cipher = new Cipher(spi, transformation);
- cipher.provider = s.getProvider();
-- cipher.initCryptoPermission();
- return cipher;
- } catch (Exception e) {
- failure = e;
-@@ -622,22 +590,6 @@
- ("No such algorithm: " + transformation, failure);
- }
-
-- // If the requested crypto service is export-controlled,
-- // determine the maximum allowable keysize.
-- private void initCryptoPermission() throws NoSuchAlgorithmException {
-- if (JceSecurity.isRestricted() == false) {
-- cryptoPerm = CryptoAllPermission.INSTANCE;
-- exmech = null;
-- return;
-- }
-- cryptoPerm = getConfiguredPermission(transformation);
-- // Instantiate the exemption mechanism (if required)
-- String exmechName = cryptoPerm.getExemptionMechanism();
-- if (exmechName != null) {
-- exmech = ExemptionMechanism.getInstance(exmechName);
-- }
-- }
--
- // max number of debug warnings to print from chooseFirstProvider()
- private static int warnCount = 10;
-
-@@ -679,9 +631,6 @@
- s = (Service)serviceIterator.next();
- thisSpi = null;
- }
-- if (JceSecurity.canUseProvider(s.getProvider()) == false) {
-- continue;
-- }
- Transform tr = getTransform(s, transforms);
- if (tr == null) {
- // should never happen
-@@ -699,7 +648,6 @@
- thisSpi = (CipherSpi)obj;
- }
- tr.setModePadding(thisSpi);
-- initCryptoPermission();
- spi = thisSpi;
- provider = s.getProvider();
- // not needed any more
-@@ -731,19 +679,15 @@
- InvalidAlgorithmParameterException {
- switch (type) {
- case I_KEY:
-- checkCryptoPerm(thisSpi, key);
- thisSpi.engineInit(opmode, key, random);
- break;
- case I_PARAMSPEC:
-- checkCryptoPerm(thisSpi, key, paramSpec);
- thisSpi.engineInit(opmode, key, paramSpec, random);
- break;
- case I_PARAMS:
-- checkCryptoPerm(thisSpi, key, params);
- thisSpi.engineInit(opmode, key, params, random);
- break;
- case I_CERT:
-- checkCryptoPerm(thisSpi, key);
- thisSpi.engineInit(opmode, key, random);
- break;
- default:
-@@ -777,9 +721,6 @@
- if (s.supportsParameter(key) == false) {
- continue;
- }
-- if (JceSecurity.canUseProvider(s.getProvider()) == false) {
-- continue;
-- }
- Transform tr = getTransform(s, transforms);
- if (tr == null) {
- // should never happen
-@@ -793,7 +734,6 @@
- thisSpi = (CipherSpi)s.newInstance(null);
- }
- tr.setModePadding(thisSpi);
-- initCryptoPermission();
- implInit(thisSpi, initType, opmode, key, paramSpec,
- params, random);
- provider = s.getProvider();
-@@ -939,107 +879,6 @@
- return exmech;
- }
-
-- //
-- // Crypto permission check code below
-- //
-- private void checkCryptoPerm(CipherSpi checkSpi, Key key)
-- throws InvalidKeyException {
-- if (cryptoPerm == CryptoAllPermission.INSTANCE) {
-- return;
-- }
-- // Check if key size and default parameters are within legal limits
-- AlgorithmParameterSpec params;
-- try {
-- params = getAlgorithmParameterSpec(checkSpi.engineGetParameters());
-- } catch (InvalidParameterSpecException ipse) {
-- throw new InvalidKeyException
-- ("Unsupported default algorithm parameters");
-- }
-- if (!passCryptoPermCheck(checkSpi, key, params)) {
-- throw new InvalidKeyException(
-- "Illegal key size or default parameters");
-- }
-- }
--
-- private void checkCryptoPerm(CipherSpi checkSpi, Key key,
-- AlgorithmParameterSpec params) throws InvalidKeyException,
-- InvalidAlgorithmParameterException {
-- if (cryptoPerm == CryptoAllPermission.INSTANCE) {
-- return;
-- }
-- // Determine keysize and check if it is within legal limits
-- if (!passCryptoPermCheck(checkSpi, key, null)) {
-- throw new InvalidKeyException("Illegal key size");
-- }
-- if ((params != null) && (!passCryptoPermCheck(checkSpi, key, params))) {
-- throw new InvalidAlgorithmParameterException("Illegal parameters");
-- }
-- }
--
-- private void checkCryptoPerm(CipherSpi checkSpi, Key key,
-- AlgorithmParameters params)
-- throws InvalidKeyException, InvalidAlgorithmParameterException {
-- if (cryptoPerm == CryptoAllPermission.INSTANCE) {
-- return;
-- }
-- // Convert the specified parameters into specs and then delegate.
-- AlgorithmParameterSpec pSpec;
-- try {
-- pSpec = getAlgorithmParameterSpec(params);
-- } catch (InvalidParameterSpecException ipse) {
-- throw new InvalidAlgorithmParameterException
-- ("Failed to retrieve algorithm parameter specification");
-- }
-- checkCryptoPerm(checkSpi, key, pSpec);
-- }
--
-- private boolean passCryptoPermCheck(CipherSpi checkSpi, Key key,
-- AlgorithmParameterSpec params)
-- throws InvalidKeyException {
-- String em = cryptoPerm.getExemptionMechanism();
-- int keySize = checkSpi.engineGetKeySize(key);
-- // Use the "algorithm" component of the cipher
More information about the distro-pkg-dev
mailing list