/hg/icedtea8-forest/jdk: 4 new changesets

andrew at icedtea.classpath.org andrew at icedtea.classpath.org
Fri May 27 02:27:59 UTC 2016


changeset 13411144d46b in /hg/icedtea8-forest/jdk
details: http://icedtea.classpath.org/hg/icedtea8-forest/jdk?cmd=changeset;node=13411144d46b
author: dsamersoff
date: Wed Jun 18 03:29:58 2014 -0700

	8044762, PR2960: com/sun/jdi/OptionTest.java test time out
	Summary: gdata could be NULL in debugInit_exit
	Reviewed-by: dcubed


changeset f4c9545cd8a5 in /hg/icedtea8-forest/jdk
details: http://icedtea.classpath.org/hg/icedtea8-forest/jdk?cmd=changeset;node=f4c9545cd8a5
author: dsamersoff
date: Thu Aug 28 05:20:02 2014 -0700

	8049226, PR2960: com/sun/jdi/OptionTest.java test times out again
	Summary: Don't call jni_FatalError if transport initialization fails
	Reviewed-by: sspitsyn, sla


changeset 0be28a33e12d in /hg/icedtea8-forest/jdk
details: http://icedtea.classpath.org/hg/icedtea8-forest/jdk?cmd=changeset;node=0be28a33e12d
author: omajid
date: Tue Dec 29 10:40:43 2015 -0500

	6961123, PR2972: setWMClass fails to null-terminate WM_CLASS string
	Reviewed-by: serb


changeset 794541fbbdc3 in /hg/icedtea8-forest/jdk
details: http://icedtea.classpath.org/hg/icedtea8-forest/jdk?cmd=changeset;node=794541fbbdc3
author: andrew
date: Fri May 27 03:28:35 2016 +0100

	PR2974: PKCS#10 certificate requests now use CRLF line endings rather than system line endings
	Summary: Add -systemlineendings option to keytool to allow system line endings to be used again.


diffstat:

 src/share/back/debugInit.c                                  |  64 +++++++-----
 src/share/back/log_messages.c                               |   2 +-
 src/share/back/log_messages.h                               |   2 +-
 src/share/classes/sun/security/pkcs10/PKCS10.java           |  40 +++++++-
 src/share/classes/sun/security/tools/keytool/Main.java      |   9 +-
 src/share/classes/sun/security/tools/keytool/Resources.java |   2 +
 src/solaris/classes/sun/awt/X11/XBaseWindow.java            |   2 +-
 7 files changed, 86 insertions(+), 35 deletions(-)

diffs (263 lines):

diff -r 10c9f8461c29 -r 794541fbbdc3 src/share/back/debugInit.c
--- a/src/share/back/debugInit.c	Fri May 20 19:42:05 2016 +0100
+++ b/src/share/back/debugInit.c	Fri May 27 03:28:35 2016 +0100
@@ -1013,7 +1013,7 @@
 atexit_finish_logging(void)
 {
     /* Normal exit(0) (not _exit()) may only reach here */
-    finish_logging(0);  /* Only first call matters */
+    finish_logging();  /* Only first call matters */
 }
 
 static jboolean
@@ -1301,39 +1301,49 @@
 void
 debugInit_exit(jvmtiError error, const char *msg)
 {
-    int exit_code = 0;
+    enum exit_codes { EXIT_NO_ERRORS = 0, EXIT_JVMTI_ERROR = 1, EXIT_TRANSPORT_ERROR = 2 };
 
-    /* Pick an error code */
-    if ( error != JVMTI_ERROR_NONE ) {
-        exit_code = 1;
-        if ( docoredump ) {
-            finish_logging(exit_code);
-            abort();
+    // Prepare to exit. Log error and finish logging
+    LOG_MISC(("Exiting with error %s(%d): %s", jvmtiErrorText(error), error,
+                                               ((msg == NULL) ? "" : msg)));
+
+    // coredump requested by command line. Keep JVMTI data dirty
+    if (error != JVMTI_ERROR_NONE && docoredump) {
+        LOG_MISC(("Dumping core as requested by command line"));
+        finish_logging();
+        abort();
+    }
+
+    finish_logging();
+
+    // Cleanup the JVMTI if we have one
+    if (gdata != NULL) {
+        gdata->vmDead = JNI_TRUE;
+        if (gdata->jvmti != NULL) {
+            // Dispose of jvmti (gdata->jvmti becomes NULL)
+            disposeEnvironment(gdata->jvmti);
         }
     }
-    if ( msg==NULL ) {
-        msg = "";
+
+    // We are here with no errors. Kill entire process and exit with zero exit code
+    if (error == JVMTI_ERROR_NONE) {
+        forceExit(EXIT_NO_ERRORS);
+        return;
     }
 
-    LOG_MISC(("Exiting with error %s(%d): %s", jvmtiErrorText(error), error, msg));
-
-    gdata->vmDead = JNI_TRUE;
-
-    /* Let's try and cleanup the JVMTI, if we even have one */
-    if ( gdata->jvmti != NULL ) {
-        /* Dispose of jvmti (gdata->jvmti becomes NULL) */
-        disposeEnvironment(gdata->jvmti);
+    // No transport initilized.
+    // As we don't have any details here exiting with separate exit code
+    if (error == AGENT_ERROR_TRANSPORT_INIT) {
+        forceExit(EXIT_TRANSPORT_ERROR);
+        return;
     }
 
-    /* Finish up logging. We reach here if JDWP is doing the exiting. */
-    finish_logging(exit_code);  /* Only first call matters */
+    // We have JVMTI error. Call hotspot jni_FatalError handler
+    jniFatalError(NULL, msg, error, EXIT_JVMTI_ERROR);
 
-    /* Let's give the JNI a FatalError if non-exit 0, which is historic way */
-    if ( exit_code != 0 ) {
-        JNIEnv *env = NULL;
-        jniFatalError(env, msg, error, exit_code);
-    }
+    // hotspot calls os:abort() so we should never reach code below,
+    // but guard against possible hotspot changes
 
-    /* Last chance to die, this kills the entire process. */
-    forceExit(exit_code);
+    // Last chance to die, this kills the entire process.
+    forceExit(EXIT_JVMTI_ERROR);
 }
diff -r 10c9f8461c29 -r 794541fbbdc3 src/share/back/log_messages.c
--- a/src/share/back/log_messages.c	Fri May 20 19:42:05 2016 +0100
+++ b/src/share/back/log_messages.c	Fri May 27 03:28:35 2016 +0100
@@ -230,7 +230,7 @@
 
 /* Finish up logging, flush output to the logfile. */
 void
-finish_logging(int exit_code)
+finish_logging()
 {
 #ifdef JDWP_LOGGING
     MUTEX_LOCK(my_mutex);
diff -r 10c9f8461c29 -r 794541fbbdc3 src/share/back/log_messages.h
--- a/src/share/back/log_messages.h	Fri May 20 19:42:05 2016 +0100
+++ b/src/share/back/log_messages.h	Fri May 27 03:28:35 2016 +0100
@@ -29,7 +29,7 @@
 /* LOG: Must be called like:  LOG_category(("anything")) or LOG_category((format,args)) */
 
 void setup_logging(const char *, unsigned);
-void finish_logging(int);
+void finish_logging();
 
 #define LOG_NULL ((void)0)
 
diff -r 10c9f8461c29 -r 794541fbbdc3 src/share/classes/sun/security/pkcs10/PKCS10.java
--- a/src/share/classes/sun/security/pkcs10/PKCS10.java	Fri May 20 19:42:05 2016 +0100
+++ b/src/share/classes/sun/security/pkcs10/PKCS10.java	Fri May 27 03:28:35 2016 +0100
@@ -30,6 +30,7 @@
 import java.io.IOException;
 import java.math.BigInteger;
 
+import java.security.AccessController;
 import java.security.cert.CertificateException;
 import java.security.NoSuchAlgorithmException;
 import java.security.InvalidKeyException;
@@ -39,6 +40,7 @@
 
 import java.util.Base64;
 
+import sun.security.action.GetPropertyAction;
 import sun.security.util.*;
 import sun.security.x509.AlgorithmId;
 import sun.security.x509.X509Key;
@@ -76,6 +78,14 @@
  * @author Hemma Prafullchandra
  */
 public class PKCS10 {
+
+    private static final byte[] sysLineEndings;
+
+    static {
+        sysLineEndings =
+	    AccessController.doPrivileged(new GetPropertyAction("line.separator")).getBytes();
+    }
+
     /**
      * Constructs an unsigned PKCS #10 certificate request.  Before this
      * request may be used, it must be encoded and signed.  Then it
@@ -286,13 +296,39 @@
      */
     public void print(PrintStream out)
     throws IOException, SignatureException {
+        print(out, false);
+    }
+
+    /**
+     * Prints an E-Mailable version of the certificate request on the print
+     * stream passed.  The format is a common base64 encoded one, supported
+     * by most Certificate Authorities because Netscape web servers have
+     * used this for some time.  Some certificate authorities expect some
+     * more information, in particular contact information for the web
+     * server administrator.
+     *
+     * @param out the print stream where the certificate request
+     *  will be printed.
+     * @param systemLineEndings true if the request should be terminated
+     *  using the system line endings.
+     * @exception IOException when an output operation failed
+     * @exception SignatureException when the certificate request was
+     *  not yet signed.
+     */
+    public void print(PrintStream out, boolean systemLineEndings)
+    throws IOException, SignatureException {
+        byte[] lineEndings;
+
         if (encoded == null)
             throw new SignatureException("Cert request was not signed");
 
+        if (systemLineEndings)
+            lineEndings = sysLineEndings;
+        else
+            lineEndings = new byte[] {'\r', '\n'}; // CRLF
 
-        byte[] CRLF = new byte[] {'\r', '\n'};
         out.println("-----BEGIN NEW CERTIFICATE REQUEST-----");
-        out.println(Base64.getMimeEncoder(64, CRLF).encodeToString(encoded));
+        out.println(Base64.getMimeEncoder(64, lineEndings).encodeToString(encoded));
         out.println("-----END NEW CERTIFICATE REQUEST-----");
     }
 
diff -r 10c9f8461c29 -r 794541fbbdc3 src/share/classes/sun/security/tools/keytool/Main.java
--- a/src/share/classes/sun/security/tools/keytool/Main.java	Fri May 20 19:42:05 2016 +0100
+++ b/src/share/classes/sun/security/tools/keytool/Main.java	Fri May 27 03:28:35 2016 +0100
@@ -117,6 +117,7 @@
     private String infilename = null;
     private String outfilename = null;
     private String srcksfname = null;
+    private boolean systemLineEndings = false;
 
     // User-specified providers are added before any command is called.
     // However, they are not removed before the end of the main() method.
@@ -163,7 +164,7 @@
         CERTREQ("Generates.a.certificate.request",
             ALIAS, SIGALG, FILEOUT, KEYPASS, KEYSTORE, DNAME,
             STOREPASS, STORETYPE, PROVIDERNAME, PROVIDERCLASS,
-            PROVIDERARG, PROVIDERPATH, V, PROTECTED),
+            PROVIDERARG, PROVIDERPATH, SYSTEMLINEENDINGS, V, PROTECTED),
         CHANGEALIAS("Changes.an.entry.s.alias",
             ALIAS, DESTALIAS, KEYPASS, KEYSTORE, STOREPASS,
             STORETYPE, PROVIDERNAME, PROVIDERCLASS, PROVIDERARG,
@@ -296,6 +297,7 @@
         STARTDATE("startdate", "<startdate>", "certificate.validity.start.date.time"),
         STOREPASS("storepass", "<arg>", "keystore.password"),
         STORETYPE("storetype", "<storetype>", "keystore.type"),
+        SYSTEMLINEENDINGS("systemlineendings", null, "system.line.endings"),
         TRUSTCACERTS("trustcacerts", null, "trust.certificates.from.cacerts"),
         V("v", null, "verbose.output"),
         VALIDITY("validity", "<valDays>", "validity.number.of.days");
@@ -537,6 +539,8 @@
                 protectedPath = true;
             } else if (collator.compare(flags, "-srcprotected") == 0) {
                 srcprotectedPath = true;
+            } else if (collator.compare(flags, "-systemlineendings") == 0) {
+                systemLineEndings = true;
             } else  {
                 System.err.println(rb.getString("Illegal.option.") + flags);
                 tinyHelp();
@@ -1335,7 +1339,7 @@
 
         // Sign the request and base-64 encode it
         request.encodeAndSign(subject, signature);
-        request.print(out);
+        request.print(out, systemLineEndings);
     }
 
     /**
@@ -4191,4 +4195,3 @@
         return new Pair<>(a,b);
     }
 }
-
diff -r 10c9f8461c29 -r 794541fbbdc3 src/share/classes/sun/security/tools/keytool/Resources.java
--- a/src/share/classes/sun/security/tools/keytool/Resources.java	Fri May 20 19:42:05 2016 +0100
+++ b/src/share/classes/sun/security/tools/keytool/Resources.java	Fri May 27 03:28:35 2016 +0100
@@ -168,6 +168,8 @@
                 "keystore password"}, //-storepass
         {"keystore.type",
                 "keystore type"}, //-storetype
+	{"system.line.endings",
+	        "use system line endings rather than CRLF to terminate output"}, //-systemlineendings
         {"trust.certificates.from.cacerts",
                 "trust certificates from cacerts"}, //-trustcacerts
         {"verbose.output",
diff -r 10c9f8461c29 -r 794541fbbdc3 src/solaris/classes/sun/awt/X11/XBaseWindow.java
--- a/src/solaris/classes/sun/awt/X11/XBaseWindow.java	Fri May 20 19:42:05 2016 +0100
+++ b/src/solaris/classes/sun/awt/X11/XBaseWindow.java	Fri May 27 03:28:35 2016 +0100
@@ -673,7 +673,7 @@
         XToolkit.awtLock();
         try {
             XAtom xa = XAtom.get(XAtom.XA_WM_CLASS);
-            xa.setProperty8(getWindow(), cl[0] + '\0' + cl[1]);
+            xa.setProperty8(getWindow(), cl[0] + '\0' + cl[1] + '\0');
         } finally {
             XToolkit.awtUnlock();
         }


More information about the distro-pkg-dev mailing list