/hg/icedtea7-forest/jdk: 2 new changesets

andrew at icedtea.classpath.org andrew at icedtea.classpath.org
Tue Jul 7 15:36:42 UTC 2015


changeset 67d5d1b652e7 in /hg/icedtea7-forest/jdk
details: http://icedtea.classpath.org/hg/icedtea7-forest/jdk?cmd=changeset;node=67d5d1b652e7
author: andrew
date: Tue Jul 07 16:05:01 2015 +0100

	S8081315, PR2405: Avoid giflib interlacing workaround with giflib 5.0.0 on
	Summary: Sync with version of splashscreen_gif.c in OpenJDK 8 post-8081315.


changeset 38e2f5918816 in /hg/icedtea7-forest/jdk
details: http://icedtea.classpath.org/hg/icedtea7-forest/jdk?cmd=changeset;node=38e2f5918816
author: andrew
date: Tue Jul 07 16:11:07 2015 +0100

	8039921, PR2421: SHA1WithDSA with key > 1024 bits not working
	Summary: Removed the key size limits for all SHAXXXWithDSA signatures
	Reviewed-by: weijun


diffstat:

 src/share/classes/sun/security/provider/DSA.java         |  22 +--------------
 src/share/native/sun/awt/splashscreen/splashscreen_gif.c |  24 ++++++---------
 test/sun/security/provider/DSA/TestDSA2.java             |   4 +-
 3 files changed, 13 insertions(+), 37 deletions(-)

diffs (140 lines):

diff -r 660aa5687b95 -r 38e2f5918816 src/share/classes/sun/security/provider/DSA.java
--- a/src/share/classes/sun/security/provider/DSA.java	Wed Jul 01 18:36:33 2015 +0100
+++ b/src/share/classes/sun/security/provider/DSA.java	Tue Jul 07 16:11:07 2015 +0100
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 1996, 2012, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1996, 2015, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -117,7 +117,6 @@
         if (params == null) {
             throw new InvalidKeyException("DSA private key lacks parameters");
         }
-        checkKey(params);
 
         this.params = params;
         this.presetX = priv.getX();
@@ -149,7 +148,6 @@
         if (params == null) {
             throw new InvalidKeyException("DSA public key lacks parameters");
         }
-        checkKey(params);
 
         this.params = params;
         this.presetY = pub.getY();
@@ -291,16 +289,6 @@
         return null;
     }
 
-    protected void checkKey(DSAParams params) throws InvalidKeyException {
-        // FIPS186-3 states in sec4.2 that a hash function which provides
-        // a lower security strength than the (L, N) pair ordinarily should
-        // not be used.
-        int valueN = params.getQ().bitLength();
-        if (valueN > md.getDigestLength()*8) {
-            throw new InvalidKeyException("Key is too strong for this signature algorithm");
-        }
-    }
-
     private BigInteger generateR(BigInteger p, BigInteger q, BigInteger g,
                          BigInteger k) {
         BigInteger temp = g.modPow(k, p);
@@ -480,14 +468,6 @@
            }
         }
 
-        @Override
-        protected void checkKey(DSAParams params) throws InvalidKeyException {
-            int valueL = params.getP().bitLength();
-            if (valueL > 1024) {
-                throw new InvalidKeyException("Key is too long for this algorithm");
-            }
-        }
-
         /*
          * Please read bug report 4044247 for an alternative, faster,
          * NON-FIPS approved method to generate K
diff -r 660aa5687b95 -r 38e2f5918816 src/share/native/sun/awt/splashscreen/splashscreen_gif.c
--- a/src/share/native/sun/awt/splashscreen/splashscreen_gif.c	Wed Jul 01 18:36:33 2015 +0100
+++ b/src/share/native/sun/awt/splashscreen/splashscreen_gif.c	Tue Jul 07 16:11:07 2015 +0100
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2005, 2010, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 2005, 2013, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -213,16 +213,16 @@
             byte_t *pSrc = image->RasterBits;
             ImageFormat srcFormat;
             ImageRect srcRect, dstRect;
-            int pass, npass;
+            int pass = 4, npass = 5;
 
+#if GIFLIB_MAJOR < 5
+            /* Interlaced gif support is broken in giflib < 5
+               so we need to work around this */
             if (desc->Interlace) {
                 pass = 0;
                 npass = 4;
             }
-            else {
-                pass = 4;
-                npass = 5;
-            }
+#endif
 
             srcFormat.colorMap = colorMapBuf;
             srcFormat.depthBytes = 1;
@@ -311,8 +311,9 @@
     free(pOldBitmapBits);
 
 #if GIFLIB_MAJOR > 5 || (GIFLIB_MAJOR == 5 && GIFLIB_MINOR >= 1)
-    if (DGifCloseFile(gif, NULL) == GIF_ERROR)
+    if (DGifCloseFile(gif, NULL) == GIF_ERROR) {
         return 0;
+    }
 #else
     DGifCloseFile(gif);
 #endif
@@ -324,17 +325,12 @@
 SplashDecodeGifStream(Splash * splash, SplashStream * stream)
 {
 #if GIFLIB_MAJOR >= 5
-    int error = 0;
-    GifFileType *gif = DGifOpen((void *) stream, SplashStreamGifInputFunc, &error);
-
-    if (error)
-	return 0;
+    GifFileType *gif = DGifOpen((void *) stream, SplashStreamGifInputFunc, NULL);
 #else
     GifFileType *gif = DGifOpen((void *) stream, SplashStreamGifInputFunc);
+#endif
 
     if (!gif)
         return 0;
-#endif
-
     return SplashDecodeGif(splash, gif);
 }
diff -r 660aa5687b95 -r 38e2f5918816 test/sun/security/provider/DSA/TestDSA2.java
--- a/test/sun/security/provider/DSA/TestDSA2.java	Wed Jul 01 18:36:33 2015 +0100
+++ b/test/sun/security/provider/DSA/TestDSA2.java	Tue Jul 07 16:11:07 2015 +0100
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 2012, 2015, Oracle and/or its affiliates. All rights reserved.
  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
  *
  * This code is free software; you can redistribute it and/or modify it
@@ -50,7 +50,7 @@
     public static void main(String[] args) throws Exception {
         boolean[] expectedToPass = { true, true, true };
         test(1024, expectedToPass);
-        boolean[] expectedToPass2 = { false, true, true };
+        boolean[] expectedToPass2 = { true, true, true };
         test(2048, expectedToPass2);
     }
 


More information about the distro-pkg-dev mailing list