/hg/release/icedtea7-2.6: Bump to 2.6.12.
andrew at icedtea.classpath.org
andrew at icedtea.classpath.org
Tue Dec 5 20:14:12 UTC 2017
changeset 484938987004 in /hg/release/icedtea7-2.6
details: http://icedtea.classpath.org/hg/release/icedtea7-2.6?cmd=changeset;node=484938987004
author: Andrew John Hughes <gnu_andrew at member.fsf.org>
date: Tue Dec 05 19:25:17 2017 +0000
Bump to 2.6.12.
Upstream changes:
- Bump to icedtea-2.6.12
- PR3497: AArch64: Adapt to 8002074: Support for AES on SPARC
- S6475361: Attempting to remove help menu from java.awt.MenuBar throws NullPointerException
- S6637288: Add OCSP support to PKIX CertPathBuilder implementation
- S6854712: Revocation checking enhancements (JEP-124)
- S6904367: (coll) IdentityHashMap is resized before exceeding the expected maximum size
- S7015157: String "Tabular Navigation" should be rephrased for avoiding mistranslation
- S7115744: Do not call File::deleteOnExit in security tests
- S7126011: ReverseBuilder.getMatchingCACerts may throws NPE
- S7147336: clarification on warning of keytool -printcrl
- S7162687: enhance KDC server availability detection
- S7176627: CertPath/jep124/PreferCRL_SoftFail test fails (Could not determine revocation status)
- S7195409: CertPath/CertPathValidatorTest/KeyParamsInheritanceTest fails with NullPointerException
- S7196382: PKCS11 provider should support 2048-bit DH
- S7197672: There are issues with shared data on windows
- S7199939: DSA 576 and 640 bit keys fail when initializing for No precomputed parameters
- S8002074: Support for AES on SPARC
- S8005408: KeyStore API enhancements
- S8006863: javadoc cleanup for 8005408
- S8006946: PKCS12 test failure due to incorrect alias name
- S8006951: Avoid storing duplicate PKCS12 attributes
- S8006994: Cleanup PKCS12 tests to ensure streams get closed
- S8007483: attributes are ignored when loading keys from a PKCS12 keystore
- S8007967: Infinite loop can happen in sun.security.provider.certpath.SunCertPathBuilder.depthFirstSearchForward()
- S8010112: NullPointerException in sun.security.provider.certpath.CertId()
- S8012900: CICO ignores AAD in GCM mode (with refactoring from 6996769)
- S8015571: OCSP validation fails if ocsp.responderCertSubjectName is set
- S8016252: More defensive HashSet.readObject
- S8025215: jdk8 l10n resource file translation update 4
- S8026943: SQE test jce/Global/Cipher/SameBuffer failed
- S8027575: b113 causing a lot of memory allocation and regression for wls_webapp_atomics
- S8029659: Keytool, print key algorithm of certificate or key entry
- S8029788: Certificate validation - java.lang.ClassCastException
- S8031825: OCSP client can't find responder cert if it uses a different subject key id algorithm than responderID
- S8033117: PPC64: Adapt to 8002074: Support for AES on SPARC
- S8035623: [parfait] JNI exception pending in jdk/src/windows/native/sun/windows/awt_Font.cpp
- S8035640: JNU_CHECK_EXCEPTION should support c++ JNI syntax
- S8049312: AES/CICO test failed with on several modes
- S8050374: More Signature tests
- S8057810: New defaults for DSA keys in jarsigner and keytool
- S8062552: Support keystore type detection for JKS and PKCS12 keystores
- S8068427: Hashtable deserialization reconstitutes table with wrong capacity
- S8068881: SIGBUS in C2 compiled method weblogic.wsee.jaxws.framework.jaxrpc.EnvironmentFactory$SimulatedWsdlDefinitions.<init>
- S8075484: SocketInputStream.socketRead0 can hang even with soTimeout set
- S8077670: sun/security/krb5/auto/MaxRetries.java may fail with BindException
- S8078331: Upgrade JDK to use LittleCMS 2.7
- S8079129: NullPointerException in PKCS#12 Keystore in PKCS12KeyStore.java
- S8087144: sun/security/krb5/auto/MaxRetries.java fails with Retry count is -1 less
- S8136534: Loading JKS keystore using non-null InputStream results in closed stream
- S8149411: PKCS12KeyStore cannot extract AES Secret Keys
- S8153146: sun/security/krb5/auto/MaxRetries.java failed with timeout
- S8157561: Ship the unlimited policy files in JDK Updates
- S8158517: Minor optimizations to ISO10126PADDING
- S8164846: CertificateException missing cause of underlying exception
- S8165543: Better window framing
- S8165751: NPE hit with java.security.debug=provider
- S8169026: Handle smartcard clean up better
- S8169966: Larger AWT menus
- S8170218: Improved Font Metrics
- S8171252: Improve exception checking
- S8171261: Stability fixes for lcms
- S8171319: keytool should print out warnings when reading or generating cert/cert req using weak algorithms
- S8173853: IllegalArgumentException in java.awt.image.ReplicateScaleFilter
- S8174109: Better queuing priorities
- S8174966: Unreferenced references
- S8175940: More certificate subject checking
- S8176536: Improved algorithm constraints checking
- S8176751: Better URL connections
- S8177569: keytool should not warn if signature algorithm used in cacerts is weak
- S8178714: PKIX validator nameConstraints check failing after change 8175940
- S8178794: Correct Kerberos ticket grants
- S8179084: HotSpot VM fails to start when AggressiveHeap is set
- S8179101: Improve algorithm constraints implementation
- S8179423: 2 security tests started failing for JDK 1.6.0 u161 b05
- S8179564: Missing @bug for tests added with JDK-8165367
- S8179998: Clear certificate chain connections
- S8180024: Improve construction of objects during deserialization
- S8180711: Better invokespecial checks
- S8181048: Refactor existing providers to refer to the same constants for default values for key length
- S8181100: Better Base Exceptions
- S8181323: Better timezone processing
- S8181327: Better X processing
- S8181370: Better keystore handling
- S8181432: Better processing of unresolved permissions
- S8181597: Process Proxy presentation
- S8181612: More stable connection processing
- S8181692: Update storage implementations
- S8182879: Add warnings to keytool when using JKS and JCEKS
- S8183028: Improve CMS header processing
- S8184673: Fix compatibility issue in AlgorithmChecker for 3rd party JCE providers
- S8184682: Upgrade compression library
- S8184937: LCMS error 13: Couldn't link the profiles
- S8185039: Incorrect GPL header causes RE script to miss swap to commercial header for licensee source bundle
- S8185040: Incorrect GPL header causes RE script to miss swap to commercial header for licensee source bundle
- S8185778: 8u151 L10n resource file update
- S8185845: Add SecurityTools.java test library
- S8186503: sun/security/tools/jarsigner/DefaultSigalg.java failed after backport to JDK 6/7/8
- S8186533: 8u151 L10n resource file update md20
- S8191137: keytool fails to format resource strings for keys for some languages after JDK-8171319
- S8191840: Update localizations with positional arguments following JDK-8191137
- S8191845: [TEST_BUG] Too many new-lines in backport of WeakAlg test
ChangeLog:
2017-12-05 Andrew John Hughes <gnu_andrew at member.fsf.org>
Bump to 2.6.12.
* Makefile.am,
(JDK_UPDATE_VERSION): Bump to 161.
(CORBA_CHANGESET): Update to icedtea-2.6.12.
(JAXP_CHANGESET): Likewise.
(JAXWS_CHANGESET): Likewise.
(JDK_CHANGESET): Likewise.
(LANGTOOLS_CHANGESET): Likewise.
(OPENJDK_CHANGESET): Likewise.
(CORBA_SHA256SUM): Likewise.
(JAXP_SHA256SUM): Likewise.
(JAXWS_SHA256SUM): Likewise.
(JDK_SHA256SUM): Likewise.
(LANGTOOLS_SHA256SUM): Likewise.
(OPENJDK_SHA256SUM): Likewise.
(install-data-local): Install policy JAR files into new
policy directories.
* NEWS: Updated.
* configure.ac: Bump to 2.6.12.
* hotspot.map.in: Update to icedtea-2.6.12.
* patches/boot/ecj-diamond.patch:
Regenerated. Add new instances in
com.sun.corba.se.impl.io.ObjectStreamClass,
com.sun.xml.internal.ws.util.exception.JAXWSExceptionBase,
java.io.ObjectStreamClass,
java.security.cert.CertificateRevokedException,
java.security.KeyStore, java.security.UnresolvedPermission,
sun.security.pkcs.SignerInfo, sun.security.pkcs12.PKCS12KeyStore,
sun.security.provider.certpath.AdjacencyList,
sun.security.provider.certpath.Builder,
sun.security.provider.certpath.CollectionCertStore,
sun.security.provider.certpath.DistributionPointFetcher,
sun.security.provider.certpath.ForwardBuilder,
sun.security.provider.certpath.IndexedCollectionCertStore,
sun.security.provider.certpath.OCSPResponse,
sun.security.provider.certpath.PKIXCertPathValidator,
sun.security.provider.certpath.PKIX,
sun.security.provider.certpath.PKIXRevocationChecker,
sun.security.provider.certpath.PolicyChecker,
sun.security.provider.certpath.PolicyNodeImpl,
sun.security.provider.certpath.ReverseBuilder,
sun.security.provider.certpath.ReverseState,
sun.security.provider.certpath.RevocationChecker,
sun.security.provider.certpath.SunCertPathBuilder,
sun.security.provider.certpath.X509CertPath,
sun.security.tools.keytool.Main,
sun.security.util.DisabledAlgorithmConstraints and
sun.security.util.SignatureFileVerifier
* patches/boot/ecj-multicatch.patch:
Regenerated. Add new cases in
com.sun.corba.se.impl.io.ObjectStreamClass,
java.io.ObjectStreamClass,
sun.security.provider.certpath.CertStoreHelper,
sun.security.provider.certpath.DistributionPointFetcher,
sun.security.provider.certpath.OCSP,
sun.security.provider.certpath.OCSPResponse,
sun.security.provider.certpath.PKIXCertPathValidator,
sun.security.provider.certpath.RevocationChecker,
sun.security.provider.certpath.SunCertPathBuilder,
sun.security.provider.certpath.URICertStore and
sun.security.provider.KeyStoreDelegator.
* patches/boot/ecj-stringswitch.patch:
Add new cases in
sun.security.util.DisabledAlgorithmConstraints,
sun.security.provider.certpath.CertStoreHelper and
sun.security.provider.certpath.RevocationChecker.
* patches/boot/ecj-trywithresources.patch:
Add new cases in sun.security.krb5.KdcComm and
sun.security.tools.keytool.Main.
* patches/boot/ecj-underscored_literals.patch:
Add new case in sun.net.ftp.impl.FtpClient.
* remove-intree-libraries.sh.in:
Remove ZLIB_VERSION and its use in the ZIP_SRC path,
as the source tree path is now unversioned.
diffstat:
ChangeLog | 77 +
Makefile.am | 35 +-
NEWS | 102 +-
configure.ac | 2 +-
hotspot.map.in | 2 +-
patches/boot/ecj-diamond.patch | 2653 +++++++++++++++++---------
patches/boot/ecj-multicatch.patch | 1230 +++++++----
patches/boot/ecj-stringswitch.patch | 185 +-
patches/boot/ecj-trywithresources.patch | 52 +
patches/boot/ecj-underscored_literals.patch | 13 +
remove-intree-libraries.sh.in | 3 +-
11 files changed, 2881 insertions(+), 1473 deletions(-)
diffs (truncated from 8218 to 500 lines):
diff -r 3e43308fe36f -r 484938987004 ChangeLog
--- a/ChangeLog Thu Nov 23 19:56:36 2017 +0000
+++ b/ChangeLog Tue Dec 05 19:25:17 2017 +0000
@@ -1,3 +1,80 @@
+2017-12-05 Andrew John Hughes <gnu_andrew at member.fsf.org>
+
+ Bump to 2.6.12.
+ * Makefile.am,
+ (JDK_UPDATE_VERSION): Bump to 161.
+ (CORBA_CHANGESET): Update to icedtea-2.6.12.
+ (JAXP_CHANGESET): Likewise.
+ (JAXWS_CHANGESET): Likewise.
+ (JDK_CHANGESET): Likewise.
+ (LANGTOOLS_CHANGESET): Likewise.
+ (OPENJDK_CHANGESET): Likewise.
+ (CORBA_SHA256SUM): Likewise.
+ (JAXP_SHA256SUM): Likewise.
+ (JAXWS_SHA256SUM): Likewise.
+ (JDK_SHA256SUM): Likewise.
+ (LANGTOOLS_SHA256SUM): Likewise.
+ (OPENJDK_SHA256SUM): Likewise.
+ (install-data-local): Install policy JAR files into new
+ policy directories.
+ * NEWS: Updated.
+ * configure.ac: Bump to 2.6.12.
+ * hotspot.map.in: Update to icedtea-2.6.12.
+ * patches/boot/ecj-diamond.patch:
+ Regenerated. Add new instances in
+ com.sun.corba.se.impl.io.ObjectStreamClass,
+ com.sun.xml.internal.ws.util.exception.JAXWSExceptionBase,
+ java.io.ObjectStreamClass,
+ java.security.cert.CertificateRevokedException,
+ java.security.KeyStore, java.security.UnresolvedPermission,
+ sun.security.pkcs.SignerInfo, sun.security.pkcs12.PKCS12KeyStore,
+ sun.security.provider.certpath.AdjacencyList,
+ sun.security.provider.certpath.Builder,
+ sun.security.provider.certpath.CollectionCertStore,
+ sun.security.provider.certpath.DistributionPointFetcher,
+ sun.security.provider.certpath.ForwardBuilder,
+ sun.security.provider.certpath.IndexedCollectionCertStore,
+ sun.security.provider.certpath.OCSPResponse,
+ sun.security.provider.certpath.PKIXCertPathValidator,
+ sun.security.provider.certpath.PKIX,
+ sun.security.provider.certpath.PKIXRevocationChecker,
+ sun.security.provider.certpath.PolicyChecker,
+ sun.security.provider.certpath.PolicyNodeImpl,
+ sun.security.provider.certpath.ReverseBuilder,
+ sun.security.provider.certpath.ReverseState,
+ sun.security.provider.certpath.RevocationChecker,
+ sun.security.provider.certpath.SunCertPathBuilder,
+ sun.security.provider.certpath.X509CertPath,
+ sun.security.tools.keytool.Main,
+ sun.security.util.DisabledAlgorithmConstraints and
+ sun.security.util.SignatureFileVerifier
+ * patches/boot/ecj-multicatch.patch:
+ Regenerated. Add new cases in
+ com.sun.corba.se.impl.io.ObjectStreamClass,
+ java.io.ObjectStreamClass,
+ sun.security.provider.certpath.CertStoreHelper,
+ sun.security.provider.certpath.DistributionPointFetcher,
+ sun.security.provider.certpath.OCSP,
+ sun.security.provider.certpath.OCSPResponse,
+ sun.security.provider.certpath.PKIXCertPathValidator,
+ sun.security.provider.certpath.RevocationChecker,
+ sun.security.provider.certpath.SunCertPathBuilder,
+ sun.security.provider.certpath.URICertStore and
+ sun.security.provider.KeyStoreDelegator.
+ * patches/boot/ecj-stringswitch.patch:
+ Add new cases in
+ sun.security.util.DisabledAlgorithmConstraints,
+ sun.security.provider.certpath.CertStoreHelper and
+ sun.security.provider.certpath.RevocationChecker.
+ * patches/boot/ecj-trywithresources.patch:
+ Add new cases in sun.security.krb5.KdcComm and
+ sun.security.tools.keytool.Main.
+ * patches/boot/ecj-underscored_literals.patch:
+ Add new case in sun.net.ftp.impl.FtpClient.
+ * remove-intree-libraries.sh.in:
+ Remove ZLIB_VERSION and its use in the ZIP_SRC path,
+ as the source tree path is now unversioned.
+
2017-10-16 Andrew John Hughes <gnu_andrew at member.fsf.org>
PR3470: Hotspot object_alloc tapset uses HeapWordSize incorrectly
diff -r 3e43308fe36f -r 484938987004 Makefile.am
--- a/Makefile.am Thu Nov 23 19:56:36 2017 +0000
+++ b/Makefile.am Tue Dec 05 19:25:17 2017 +0000
@@ -1,22 +1,22 @@
# Dependencies
-JDK_UPDATE_VERSION = 151
+JDK_UPDATE_VERSION = 161
BUILD_VERSION = b01
COMBINED_VERSION = $(JDK_UPDATE_VERSION)-$(BUILD_VERSION)
-CORBA_CHANGESET = a7f8705b50f5
-JAXP_CHANGESET = 968b46df5f0e
-JAXWS_CHANGESET = 3e70a6a17fa9
-JDK_CHANGESET = 8563ea7f9be7
-LANGTOOLS_CHANGESET = e24f25323b84
-OPENJDK_CHANGESET = f53c56dda663
-
-CORBA_SHA256SUM = 5a21448c8bb7c13acacd92423fce72ea88cbb20f1828ded35a2a113b5be3280c
-JAXP_SHA256SUM = 73a0e3fa08d5ea944d7a59f153648a78a1f7f5da19d0c0a5f7cf4012658e2041
-JAXWS_SHA256SUM = e5a17d7d1a991a23d64b80f5fabb4000cf8eed9bb744eeba6ae4c0f6d767c4a6
-JDK_SHA256SUM = 79a61166781e0f27477879d3ea90350b45f47a4360a8325ba814b976864ef88d
-LANGTOOLS_SHA256SUM = e37c671c765de82c19b94fd43b738dbd4d4a7ba23e18903037ba670cc1f85792
-OPENJDK_SHA256SUM = 05d0ea6a60a442eec7bff798840248fd113ab1ad6b89c91bc52e1695ab2d156d
+CORBA_CHANGESET = e759d9a6a7b2
+JAXP_CHANGESET = 1981a623381f
+JAXWS_CHANGESET = 40c37fd3e5cb
+JDK_CHANGESET = a499de02da5a
+LANGTOOLS_CHANGESET = b87dbe0db6aa
+OPENJDK_CHANGESET = 7d977b31457d
+
+CORBA_SHA256SUM = 1e433c3ff7c640c2dd1a0288af7b39531052ed09ee24ab8515bc16ea1db21bde
+JAXP_SHA256SUM = 859719afde1e29fcd1349d78050873c3da159e6bd8f9041d6742395ba9d19548
+JAXWS_SHA256SUM = 2fb7fb74c19a0c870a17edcebeeca4bb82113209b36d98864ec29e398e6c4d27
+JDK_SHA256SUM = e77af4a7f719887df7664d1470041d7b7c7bc40cb808e1f5ac5c7b8efe370961
+LANGTOOLS_SHA256SUM = 0cdb357aa069b37a4a5a4ab5afb24474f1d3e441702aa26352a446c69c67315a
+OPENJDK_SHA256SUM = 82e25192b2062f2974af06c434b995dcc185ae93cd78fb057cd1be169d1d0e97
DROP_URL = http://icedtea.classpath.org/download/drops
@@ -3324,8 +3324,11 @@
$(DESTDIR)${prefix}/jre/lib/security
$(INSTALL_DATA) $(BUILD_SDK_DIR)/jre/lib/security/blacklisted.certs \
$(DESTDIR)${prefix}/jre/lib/security
- for files in $(BUILD_SDK_DIR)/jre/lib/security/*.jar; do \
- $(call install_file,$${files},$(DESTDIR)${prefix}/jre/lib/security,$(INSTALL_DATA)) ; \
+ for policies in limited unlimited; do \
+ ${mkinstalldirs} $(DESTDIR)${prefix}/jre/lib/security/policy/$${policies} ; \
+ for files in $(BUILD_SDK_DIR)/jre/lib/security/policy/$${policies}/*.jar; do \
+ $(call install_file,$${files},$(DESTDIR)${prefix}/jre/lib/security/policy/$${policies},$(INSTALL_DATA)); \
+ done ; \
done
for items in $(BUILD_SDK_DIR)/jre/lib/zi/*; do \
cp -RP $${items} $(DESTDIR)${prefix}/jre/lib/zi ; \
diff -r 3e43308fe36f -r 484938987004 NEWS
--- a/NEWS Thu Nov 23 19:56:36 2017 +0000
+++ b/NEWS Tue Dec 05 19:25:17 2017 +0000
@@ -14,8 +14,107 @@
New in release 2.6.12 (2017-10-XX):
+* Security fixes
+ - S8165543: Better window framing
+ - S8169026, CVE-2017-10274: Handle smartcard clean up better
+ - S8169966: Larger AWT menus
+ - S8170218: Improved Font Metrics
+ - S8171252: Improve exception checking
+ - S8171261: Stability fixes for lcms
+ - S8174109, CVE-2017-10281: Better queuing priorities
+ - S8174966, CVE-2017-10285: Unreferenced references
+ - S8175940: More certificate subject checking
+ - S8176751, CVE-2017-10295: Better URL connections
+ - S8178794, CVE-2017-10388: Correct Kerberos ticket grants
+ - S8179101, CVE-2017-10193: Improve algorithm constraints implementation
+ - S8179998, CVE-2017-10198: Clear certificate chain connections
+ - S8180024: Improve construction of objects during deserialization
+ - S8180711, CVE-2017-10346: Better invokespecial checks
+ - S8181100, CVE-2017-10350: Better Base Exceptions
+ - S8181323, CVE-2017-10347: Better timezone processing
+ - S8181327, CVE-2017-10349: Better X processing
+ - S8181370, CVE-2017-10345: Better keystore handling
+ - S8181432, CVE-2017-10348: Better processing of unresolved permissions
+ - S8181597, CVE-2017-10357: Process Proxy presentation
+ - S8181612, CVE-2017-10355: More stable connection processing
+ - S8181692, CVE-2017-10356: Update storage implementations
+ - S8183028, CVE-2016-10165: Improve CMS header processing
+ - S8184682, CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843: Upgrade compression library
+* Import of OpenJDK 7 u161 build 0
+ - S6475361: Attempting to remove help menu from java.awt.MenuBar throws NullPointerException
+ - S6637288: Add OCSP support to PKIX CertPathBuilder implementation
+ - S6854712: Revocation checking enhancements (JEP-124)
+ - S6904367: (coll) IdentityHashMap is resized before exceeding the expected maximum size
+ - S7015157: String "Tabular Navigation" should be rephrased for avoiding mistranslation
+ - S7115744: Do not call File::deleteOnExit in security tests
+ - S7126011: ReverseBuilder.getMatchingCACerts may throws NPE
+ - S7147336: clarification on warning of keytool -printcrl
+ - S7162687: enhance KDC server availability detection
+ - S7176627: CertPath/jep124/PreferCRL_SoftFail test fails (Could not determine revocation status)
+ - S7195409: CertPath/CertPathValidatorTest/KeyParamsInheritanceTest fails with NullPointerException
+ - S7196382: PKCS11 provider should support 2048-bit DH
+ - S7197672: There are issues with shared data on windows
+ - S7199939: DSA 576 and 640 bit keys fail when initializing for No precomputed parameters
+ - S8002074: Support for AES on SPARC
+ - S8005408: KeyStore API enhancements
+ - S8006863: javadoc cleanup for 8005408
+ - S8006946: PKCS12 test failure due to incorrect alias name
+ - S8006951: Avoid storing duplicate PKCS12 attributes
+ - S8006994: Cleanup PKCS12 tests to ensure streams get closed
+ - S8007483: attributes are ignored when loading keys from a PKCS12 keystore
+ - S8007967: Infinite loop can happen in sun.security.provider.certpath.SunCertPathBuilder.depthFirstSearchForward()
+ - S8010112: NullPointerException in sun.security.provider.certpath.CertId()
+ - S8012900: CICO ignores AAD in GCM mode (with refactoring from 6996769)
+ - S8015571: OCSP validation fails if ocsp.responderCertSubjectName is set
+ - S8016252: More defensive HashSet.readObject
+ - S8025215: jdk8 l10n resource file translation update 4
+ - S8026943: SQE test jce/Global/Cipher/SameBuffer failed
+ - S8027575: b113 causing a lot of memory allocation and regression for wls_webapp_atomics
+ - S8029659: Keytool, print key algorithm of certificate or key entry
+ - S8029788: Certificate validation - java.lang.ClassCastException
+ - S8031825: OCSP client can't find responder cert if it uses a different subject key id algorithm than responderID
+ - S8033117: PPC64: Adapt to 8002074: Support for AES on SPARC
+ - S8035623: [parfait] JNI exception pending in jdk/src/windows/native/sun/windows/awt_Font.cpp
+ - S8049312: AES/CICO test failed with on several modes
+ - S8050374: More Signature tests
+ - S8057810: New defaults for DSA keys in jarsigner and keytool
+ - S8062552: Support keystore type detection for JKS and PKCS12 keystores
+ - S8068427: Hashtable deserialization reconstitutes table with wrong capacity
+ - S8068881: SIGBUS in C2 compiled method weblogic.wsee.jaxws.framework.jaxrpc.EnvironmentFactory$SimulatedWsdlDefinitions.<init>
+ - S8075484, PR3474, RH1490713: SocketInputStream.socketRead0 can hang even with soTimeout set
+ - S8077670: sun/security/krb5/auto/MaxRetries.java may fail with BindException
+ - S8079129: NullPointerException in PKCS#12 Keystore in PKCS12KeyStore.java
+ - S8087144: sun/security/krb5/auto/MaxRetries.java fails with Retry count is -1 less
+ - S8136534: Loading JKS keystore using non-null InputStream results in closed stream
+ - S8149411: PKCS12KeyStore cannot extract AES Secret Keys
+ - S8153146: sun/security/krb5/auto/MaxRetries.java failed with timeout
+ - S8157561: Ship the unlimited policy files in JDK Updates
+ - S8158517: Minor optimizations to ISO10126PADDING
+ - S8164846: CertificateException missing cause of underlying exception
+ - S8165751: NPE hit with java.security.debug=provider
+ - S8171319: keytool should print out warnings when reading or generating cert/cert req using weak algorithms
+ - S8173853: IllegalArgumentException in java.awt.image.ReplicateScaleFilter
+ - S8176536: Improved algorithm constraints checking
+ - S8177569: keytool should not warn if signature algorithm used in cacerts is weak
+ - S8178714: PKIX validator nameConstraints check failing after change 8175940
+ - S8179423: 2 security tests started failing for JDK 1.6.0 u161 b05
+ - S8179564: Missing @bug for tests added with JDK-8165367
+ - S8181048: Refactor existing providers to refer to the same constants for default values for key length
+ - S8182879: Add warnings to keytool when using JKS and JCEKS
+ - S8184673: Fix compatibility issue in AlgorithmChecker for 3rd party JCE providers
+ - S8184937: LCMS error 13: Couldn't link the profiles
+ - S8185039: Incorrect GPL header causes RE script to miss swap to commercial header for licensee source bundle
+ - S8185040: Incorrect GPL header causes RE script to miss swap to commercial header for licensee source bundle
+ - S8185778: 8u151 L10n resource file update
+ - S8185845: Add SecurityTools.java test library
+ - S8186503: sun/security/tools/jarsigner/DefaultSigalg.java failed after backport to JDK 6/7/8
+ - S8186533: 8u151 L10n resource file update md20
+ - S8191137: keytool fails to format resource strings for keys for some languages after JDK-8171319
+ - S8191840: Update localizations with positional arguments following JDK-8191137
+ - S8191845: [TEST_BUG] Too many new-lines in backport of WeakAlg test
+* Import of OpenJDK 7 u151 build 1
+ - S8035640: JNU_CHECK_EXCEPTION should support c++ JNI syntax
* Backports
- - S8075484, PR3474, RH1490713: SocketInputStream.socketRead0 can hang even with soTimeout set
- S8138745, PR3465, RH1484399: Implement ExitOnOutOfMemory and CrashOnOutOfMemory in HotSpot
- S8185164, PR3433: GetOwnedMonitorInfo() returns incorrect owned monitor
- S8188030, PR3460, RH1484079: AWT java apps fail to start when some minimal fonts are present
@@ -24,6 +123,7 @@
- PR3480, RH1486025: ECC and NSS JVM crash
* AArch64 port
- S8145438, PR3443, RH1482244: Guarantee failures since 8144028: Use AArch64 bit-test instructions in C2
+ - PR3497: AArch64: Adapt to 8002074: Support for AES on SPARC
New in release 2.6.11 (2017-08-08):
diff -r 3e43308fe36f -r 484938987004 configure.ac
--- a/configure.ac Thu Nov 23 19:56:36 2017 +0000
+++ b/configure.ac Tue Dec 05 19:25:17 2017 +0000
@@ -1,4 +1,4 @@
-AC_INIT([icedtea], [2.6.12pre01], [distro-pkg-dev at openjdk.java.net])
+AC_INIT([icedtea], [2.6.12], [distro-pkg-dev at openjdk.java.net])
AM_INIT_AUTOMAKE([1.9 tar-pax foreign])
AM_MAINTAINER_MODE([enable])
AC_CONFIG_FILES([Makefile])
diff -r 3e43308fe36f -r 484938987004 hotspot.map.in
--- a/hotspot.map.in Thu Nov 23 19:56:36 2017 +0000
+++ b/hotspot.map.in Tue Dec 05 19:25:17 2017 +0000
@@ -1,2 +1,2 @@
# version type(drop/hg) url changeset sha256sum
-default drop http://icedtea.classpath.org/download/drops/icedtea7/@ICEDTEA_RELEASE@ 9777e52ab513 f5d5fbba6a8109aaa7d76a000293e3537c2228a2a9a4a5a1e8d0ebe145e39a84
+default drop http://icedtea.classpath.org/download/drops/icedtea7/@ICEDTEA_RELEASE@ 7fe1098f101e dd3d1441d0b20ae2c45211cb9d296537e24a47a9048c34e6568e8fba201684cb
diff -r 3e43308fe36f -r 484938987004 patches/boot/ecj-diamond.patch
--- a/patches/boot/ecj-diamond.patch Thu Nov 23 19:56:36 2017 +0000
+++ b/patches/boot/ecj-diamond.patch Tue Dec 05 19:25:17 2017 +0000
@@ -1,6 +1,6 @@
diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java
---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java 2017-08-03 23:28:06.555896022 +0100
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java 2017-12-02 04:30:06.060323180 +0000
@@ -58,7 +58,7 @@
private CorbaConnection conn;
@@ -10,9 +10,30 @@
public static synchronized void cleanCache( ORB orb ) {
synchronized (iorMapLock) {
+diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/ObjectStreamClass.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/ObjectStreamClass.java
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/ObjectStreamClass.java 2017-12-02 04:48:58.225985027 +0000
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/ObjectStreamClass.java 2017-12-02 04:49:49.017161985 +0000
+@@ -481,7 +481,7 @@
+ while (cls != fnscl) {
+ ProtectionDomain pd = cls.getProtectionDomain();
+ if (pd != null) {
+- if (pds == null) pds = new HashSet<>();
++ if (pds == null) pds = new HashSet<ProtectionDomain>();
+ pds.add(pd);
+ }
+ cls = cls.getSuperclass();
+@@ -489,7 +489,7 @@
+ // that's not supposed to happen
+ // make a ProtectionDomain with no permission.
+ // should we throw instead?
+- if (pds == null) pds = new HashSet<>();
++ if (pds == null) pds = new HashSet<ProtectionDomain>();
+ else pds.clear();
+ pds.add(noPermissionsDomain());
+ break;
diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java
---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java 2017-08-03 23:28:06.555896022 +0100
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java 2017-12-02 04:30:06.064323116 +0000
@@ -50,7 +50,7 @@
*/
private class HookPutFields extends ObjectOutputStream.PutField
@@ -23,8 +44,8 @@
/**
* Put the value of the named boolean field into the persistent field.
diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java
---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java 2017-08-03 23:28:06.555896022 +0100
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java 2017-12-02 04:30:06.064323116 +0000
@@ -1315,7 +1315,7 @@
protected void shutdownServants(boolean wait_for_completion) {
Set<ObjectAdapterFactory> oaset;
@@ -35,8 +56,8 @@
for (ObjectAdapterFactory oaf : oaset)
diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java
---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java 2017-08-03 23:28:06.555896022 +0100
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java 2017-12-02 04:30:06.064323116 +0000
@@ -108,7 +108,7 @@
private ThreadGroup threadGroup;
@@ -56,8 +77,8 @@
for (WorkerThread wt : copy) {
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java 2017-08-03 23:28:06.555896022 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java 2017-12-02 04:30:06.064323116 +0000
@@ -192,7 +192,7 @@
NodeSet dist = new NodeSet();
dist.setShouldCacheNodes(true);
@@ -68,8 +89,8 @@
for (int i = 0; i < nl.getLength(); i++)
{
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java 2017-08-03 23:28:06.555896022 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java 2017-12-02 04:30:06.064323116 +0000
@@ -220,7 +220,7 @@
public Map<String, Object> getEnvironmentHash()
{
@@ -188,8 +209,8 @@
jarVersions.put(new Long(440237), "xalan.jar from xalan-j_1_2");
jarVersions.put(new Long(436094), "xalan.jar from xalan-j_1_2_1");
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java 2017-08-03 23:28:06.555896022 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java 2017-12-02 04:30:06.064323116 +0000
@@ -51,7 +51,7 @@
/**
* Legal conversions between internal types.
@@ -200,8 +221,8 @@
static {
// Possible type conversions between internal types
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java 2017-08-03 23:28:06.555896022 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java 2017-12-02 04:30:06.064323116 +0000
@@ -139,7 +139,7 @@
private boolean _isStatic = false;
@@ -225,8 +246,8 @@
// Possible conversions between Java and internal types
java2Internal.put(Boolean.TYPE, Type.Boolean);
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java 2017-08-03 23:28:06.555896022 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java 2017-12-02 04:30:06.064323116 +0000
@@ -107,7 +107,7 @@
// Check if we have any declared namespaces
@@ -273,8 +294,8 @@
SyntaxTreeNode n = _attributeElements.get(k);
if (n instanceof LiteralAttribute) {
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java 2017-08-03 23:28:06.559895959 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java 2017-12-02 04:30:06.064323116 +0000
@@ -129,22 +129,22 @@
/**
* A mapping between templates and test sequences.
@@ -327,8 +348,8 @@
_rootPattern = null;
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java 2017-08-03 23:28:06.559895959 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java 2017-12-02 04:30:06.064323116 +0000
@@ -107,11 +107,11 @@
}
@@ -365,8 +386,8 @@
_prefixMapping.put(prefix, uri);
}
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java 2017-08-03 23:28:06.559895959 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java 2017-12-02 04:30:06.064323116 +0000
@@ -122,7 +122,7 @@
/**
* Mapping between mode names and Mode instances.
@@ -395,8 +416,8 @@
/**
* A reference to the SourceLoader set by the user (a URIResolver
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java 2017-08-03 23:28:06.559895959 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java 2017-12-02 04:30:06.064323116 +0000
@@ -38,8 +38,8 @@
final class SymbolTable {
@@ -479,8 +500,8 @@
// Register the namespace URI
Integer refcnt = _excludedURI.get(uri);
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java 2017-08-03 23:28:06.559895959 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java 2017-12-02 04:30:06.064323116 +0000
@@ -70,7 +70,7 @@
protected SyntaxTreeNode _parent; // Parent node
private Stylesheet _stylesheet; // Stylesheet ancestor node
@@ -509,8 +530,8 @@
locals.add(varOrParamName);
}
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java 2017-08-03 23:28:06.559895959 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java 2017-12-02 04:30:06.064323116 +0000
@@ -127,7 +127,7 @@
* times. Note that patterns whose kernels are "*", "node()"
* and "@*" can between shared by test sequences.
@@ -521,8 +542,8 @@
public MethodGenerator(int access_flags, Type return_type,
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java 2017-08-03 23:28:06.559895959 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java 2017-12-02 04:30:06.064323116 +0000
@@ -37,7 +37,7 @@
public final class MultiHashtable<K,V> {
static final long serialVersionUID = -6151608290510033572L;
@@ -542,8 +563,8 @@
}
set.add(value);
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java 2017-08-03 23:28:06.559895959 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java 2017-12-02 04:30:06.064323116 +0000
@@ -170,7 +170,7 @@
_parser = new Parser(this, useServicesMechanism);
_featureManager = featureManager;
@@ -572,8 +593,8 @@
_parser.init();
//_variableSerial = 1;
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java 2017-08-03 23:28:06.559895959 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java 2017-12-02 04:30:06.064323116 +0000
@@ -169,7 +169,7 @@
_count = 0;
_current = 0;
@@ -584,8 +605,8 @@
try {
diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DOMWSFilter.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DOMWSFilter.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DOMWSFilter.java 2017-08-03 17:03:27.000000000 +0100
More information about the distro-pkg-dev
mailing list