/hg/icedtea7-forest/jdk: 2 new changesets
andrew at icedtea.classpath.org
andrew at icedtea.classpath.org
Tue Jul 7 15:36:42 UTC 2015
changeset 67d5d1b652e7 in /hg/icedtea7-forest/jdk
details: http://icedtea.classpath.org/hg/icedtea7-forest/jdk?cmd=changeset;node=67d5d1b652e7
author: andrew
date: Tue Jul 07 16:05:01 2015 +0100
S8081315, PR2405: Avoid giflib interlacing workaround with giflib 5.0.0 on
Summary: Sync with version of splashscreen_gif.c in OpenJDK 8 post-8081315.
changeset 38e2f5918816 in /hg/icedtea7-forest/jdk
details: http://icedtea.classpath.org/hg/icedtea7-forest/jdk?cmd=changeset;node=38e2f5918816
author: andrew
date: Tue Jul 07 16:11:07 2015 +0100
8039921, PR2421: SHA1WithDSA with key > 1024 bits not working
Summary: Removed the key size limits for all SHAXXXWithDSA signatures
Reviewed-by: weijun
diffstat:
src/share/classes/sun/security/provider/DSA.java | 22 +--------------
src/share/native/sun/awt/splashscreen/splashscreen_gif.c | 24 ++++++---------
test/sun/security/provider/DSA/TestDSA2.java | 4 +-
3 files changed, 13 insertions(+), 37 deletions(-)
diffs (140 lines):
diff -r 660aa5687b95 -r 38e2f5918816 src/share/classes/sun/security/provider/DSA.java
--- a/src/share/classes/sun/security/provider/DSA.java Wed Jul 01 18:36:33 2015 +0100
+++ b/src/share/classes/sun/security/provider/DSA.java Tue Jul 07 16:11:07 2015 +0100
@@ -1,5 +1,5 @@
/*
- * Copyright (c) 1996, 2012, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1996, 2015, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
@@ -117,7 +117,6 @@
if (params == null) {
throw new InvalidKeyException("DSA private key lacks parameters");
}
- checkKey(params);
this.params = params;
this.presetX = priv.getX();
@@ -149,7 +148,6 @@
if (params == null) {
throw new InvalidKeyException("DSA public key lacks parameters");
}
- checkKey(params);
this.params = params;
this.presetY = pub.getY();
@@ -291,16 +289,6 @@
return null;
}
- protected void checkKey(DSAParams params) throws InvalidKeyException {
- // FIPS186-3 states in sec4.2 that a hash function which provides
- // a lower security strength than the (L, N) pair ordinarily should
- // not be used.
- int valueN = params.getQ().bitLength();
- if (valueN > md.getDigestLength()*8) {
- throw new InvalidKeyException("Key is too strong for this signature algorithm");
- }
- }
-
private BigInteger generateR(BigInteger p, BigInteger q, BigInteger g,
BigInteger k) {
BigInteger temp = g.modPow(k, p);
@@ -480,14 +468,6 @@
}
}
- @Override
- protected void checkKey(DSAParams params) throws InvalidKeyException {
- int valueL = params.getP().bitLength();
- if (valueL > 1024) {
- throw new InvalidKeyException("Key is too long for this algorithm");
- }
- }
-
/*
* Please read bug report 4044247 for an alternative, faster,
* NON-FIPS approved method to generate K
diff -r 660aa5687b95 -r 38e2f5918816 src/share/native/sun/awt/splashscreen/splashscreen_gif.c
--- a/src/share/native/sun/awt/splashscreen/splashscreen_gif.c Wed Jul 01 18:36:33 2015 +0100
+++ b/src/share/native/sun/awt/splashscreen/splashscreen_gif.c Tue Jul 07 16:11:07 2015 +0100
@@ -1,5 +1,5 @@
/*
- * Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 2005, 2013, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
@@ -213,16 +213,16 @@
byte_t *pSrc = image->RasterBits;
ImageFormat srcFormat;
ImageRect srcRect, dstRect;
- int pass, npass;
+ int pass = 4, npass = 5;
+#if GIFLIB_MAJOR < 5
+ /* Interlaced gif support is broken in giflib < 5
+ so we need to work around this */
if (desc->Interlace) {
pass = 0;
npass = 4;
}
- else {
- pass = 4;
- npass = 5;
- }
+#endif
srcFormat.colorMap = colorMapBuf;
srcFormat.depthBytes = 1;
@@ -311,8 +311,9 @@
free(pOldBitmapBits);
#if GIFLIB_MAJOR > 5 || (GIFLIB_MAJOR == 5 && GIFLIB_MINOR >= 1)
- if (DGifCloseFile(gif, NULL) == GIF_ERROR)
+ if (DGifCloseFile(gif, NULL) == GIF_ERROR) {
return 0;
+ }
#else
DGifCloseFile(gif);
#endif
@@ -324,17 +325,12 @@
SplashDecodeGifStream(Splash * splash, SplashStream * stream)
{
#if GIFLIB_MAJOR >= 5
- int error = 0;
- GifFileType *gif = DGifOpen((void *) stream, SplashStreamGifInputFunc, &error);
-
- if (error)
- return 0;
+ GifFileType *gif = DGifOpen((void *) stream, SplashStreamGifInputFunc, NULL);
#else
GifFileType *gif = DGifOpen((void *) stream, SplashStreamGifInputFunc);
+#endif
if (!gif)
return 0;
-#endif
-
return SplashDecodeGif(splash, gif);
}
diff -r 660aa5687b95 -r 38e2f5918816 test/sun/security/provider/DSA/TestDSA2.java
--- a/test/sun/security/provider/DSA/TestDSA2.java Wed Jul 01 18:36:33 2015 +0100
+++ b/test/sun/security/provider/DSA/TestDSA2.java Tue Jul 07 16:11:07 2015 +0100
@@ -1,5 +1,5 @@
/*
- * Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 2012, 2015, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
@@ -50,7 +50,7 @@
public static void main(String[] args) throws Exception {
boolean[] expectedToPass = { true, true, true };
test(1024, expectedToPass);
- boolean[] expectedToPass2 = { false, true, true };
+ boolean[] expectedToPass2 = { true, true, true };
test(2048, expectedToPass2);
}
More information about the distro-pkg-dev
mailing list