[Bug 3497] [IcedTea7] AArch64: Adapt to 8002074: Support for AES on SPARC
bugzilla-daemon at icedtea.classpath.org
bugzilla-daemon at icedtea.classpath.org
Tue Dec 5 20:14:20 UTC 2017
https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3497
--- Comment #2 from hg commits <mercurial at icedtea.classpath.org> ---
details:
http://icedtea.classpath.org//hg/release/icedtea7-2.6?cmd=changeset;node=484938987004
author: Andrew John Hughes <gnu_andrew at member.fsf.org>
date: Tue Dec 05 19:25:17 2017 +0000
Bump to 2.6.12.
Upstream changes:
- Bump to icedtea-2.6.12
- PR3497: AArch64: Adapt to 8002074: Support for AES on SPARC
- S6475361: Attempting to remove help menu from java.awt.MenuBar throws
NullPointerException
- S6637288: Add OCSP support to PKIX CertPathBuilder implementation
- S6854712: Revocation checking enhancements (JEP-124)
- S6904367: (coll) IdentityHashMap is resized before exceeding the
expected maximum size
- S7015157: String "Tabular Navigation" should be rephrased for avoiding
mistranslation
- S7115744: Do not call File::deleteOnExit in security tests
- S7126011: ReverseBuilder.getMatchingCACerts may throws NPE
- S7147336: clarification on warning of keytool -printcrl
- S7162687: enhance KDC server availability detection
- S7176627: CertPath/jep124/PreferCRL_SoftFail test fails (Could not
determine revocation status)
- S7195409: CertPath/CertPathValidatorTest/KeyParamsInheritanceTest fails
with NullPointerException
- S7196382: PKCS11 provider should support 2048-bit DH
- S7197672: There are issues with shared data on windows
- S7199939: DSA 576 and 640 bit keys fail when initializing for No
precomputed parameters
- S8002074: Support for AES on SPARC
- S8005408: KeyStore API enhancements
- S8006863: javadoc cleanup for 8005408
- S8006946: PKCS12 test failure due to incorrect alias name
- S8006951: Avoid storing duplicate PKCS12 attributes
- S8006994: Cleanup PKCS12 tests to ensure streams get closed
- S8007483: attributes are ignored when loading keys from a PKCS12
keystore
- S8007967: Infinite loop can happen in
sun.security.provider.certpath.SunCertPathBuilder.depthFirstSearchForward()
- S8010112: NullPointerException in
sun.security.provider.certpath.CertId()
- S8012900: CICO ignores AAD in GCM mode (with refactoring from 6996769)
- S8015571: OCSP validation fails if ocsp.responderCertSubjectName is set
- S8016252: More defensive HashSet.readObject
- S8025215: jdk8 l10n resource file translation update 4
- S8026943: SQE test jce/Global/Cipher/SameBuffer failed
- S8027575: b113 causing a lot of memory allocation and regression for
wls_webapp_atomics
- S8029659: Keytool, print key algorithm of certificate or key entry
- S8029788: Certificate validation - java.lang.ClassCastException
- S8031825: OCSP client can't find responder cert if it uses a different
subject key id algorithm than responderID
- S8033117: PPC64: Adapt to 8002074: Support for AES on SPARC
- S8035623: [parfait] JNI exception pending in
jdk/src/windows/native/sun/windows/awt_Font.cpp
- S8035640: JNU_CHECK_EXCEPTION should support c++ JNI syntax
- S8049312: AES/CICO test failed with on several modes
- S8050374: More Signature tests
- S8057810: New defaults for DSA keys in jarsigner and keytool
- S8062552: Support keystore type detection for JKS and PKCS12 keystores
- S8068427: Hashtable deserialization reconstitutes table with wrong
capacity
- S8068881: SIGBUS in C2 compiled method
weblogic.wsee.jaxws.framework.jaxrpc.EnvironmentFactory$SimulatedWsdlDefinitions.<init>
- S8075484: SocketInputStream.socketRead0 can hang even with soTimeout
set
- S8077670: sun/security/krb5/auto/MaxRetries.java may fail with
BindException
- S8078331: Upgrade JDK to use LittleCMS 2.7
- S8079129: NullPointerException in PKCS#12 Keystore in
PKCS12KeyStore.java
- S8087144: sun/security/krb5/auto/MaxRetries.java fails with Retry count
is -1 less
- S8136534: Loading JKS keystore using non-null InputStream results in
closed stream
- S8149411: PKCS12KeyStore cannot extract AES Secret Keys
- S8153146: sun/security/krb5/auto/MaxRetries.java failed with timeout
- S8157561: Ship the unlimited policy files in JDK Updates
- S8158517: Minor optimizations to ISO10126PADDING
- S8164846: CertificateException missing cause of underlying exception
- S8165543: Better window framing
- S8165751: NPE hit with java.security.debug=provider
- S8169026: Handle smartcard clean up better
- S8169966: Larger AWT menus
- S8170218: Improved Font Metrics
- S8171252: Improve exception checking
- S8171261: Stability fixes for lcms
- S8171319: keytool should print out warnings when reading or generating
cert/cert req using weak algorithms
- S8173853: IllegalArgumentException in
java.awt.image.ReplicateScaleFilter
- S8174109: Better queuing priorities
- S8174966: Unreferenced references
- S8175940: More certificate subject checking
- S8176536: Improved algorithm constraints checking
- S8176751: Better URL connections
- S8177569: keytool should not warn if signature algorithm used in
cacerts is weak
- S8178714: PKIX validator nameConstraints check failing after change
8175940
- S8178794: Correct Kerberos ticket grants
- S8179084: HotSpot VM fails to start when AggressiveHeap is set
- S8179101: Improve algorithm constraints implementation
- S8179423: 2 security tests started failing for JDK 1.6.0 u161 b05
- S8179564: Missing @bug for tests added with JDK-8165367
- S8179998: Clear certificate chain connections
- S8180024: Improve construction of objects during deserialization
- S8180711: Better invokespecial checks
- S8181048: Refactor existing providers to refer to the same constants
for default values for key length
- S8181100: Better Base Exceptions
- S8181323: Better timezone processing
- S8181327: Better X processing
- S8181370: Better keystore handling
- S8181432: Better processing of unresolved permissions
- S8181597: Process Proxy presentation
- S8181612: More stable connection processing
- S8181692: Update storage implementations
- S8182879: Add warnings to keytool when using JKS and JCEKS
- S8183028: Improve CMS header processing
- S8184673: Fix compatibility issue in AlgorithmChecker for 3rd party JCE
providers
- S8184682: Upgrade compression library
- S8184937: LCMS error 13: Couldn't link the profiles
- S8185039: Incorrect GPL header causes RE script to miss swap to
commercial header for licensee source bundle
- S8185040: Incorrect GPL header causes RE script to miss swap to
commercial header for licensee source bundle
- S8185778: 8u151 L10n resource file update
- S8185845: Add SecurityTools.java test library
- S8186503: sun/security/tools/jarsigner/DefaultSigalg.java failed after
backport to JDK 6/7/8
- S8186533: 8u151 L10n resource file update md20
- S8191137: keytool fails to format resource strings for keys for some
languages after JDK-8171319
- S8191840: Update localizations with positional arguments following
JDK-8191137
- S8191845: [TEST_BUG] Too many new-lines in backport of WeakAlg test
ChangeLog:
2017-12-05 Andrew John Hughes <gnu_andrew at member.fsf.org>
Bump to 2.6.12.
* Makefile.am,
(JDK_UPDATE_VERSION): Bump to 161.
(CORBA_CHANGESET): Update to icedtea-2.6.12.
(JAXP_CHANGESET): Likewise.
(JAXWS_CHANGESET): Likewise.
(JDK_CHANGESET): Likewise.
(LANGTOOLS_CHANGESET): Likewise.
(OPENJDK_CHANGESET): Likewise.
(CORBA_SHA256SUM): Likewise.
(JAXP_SHA256SUM): Likewise.
(JAXWS_SHA256SUM): Likewise.
(JDK_SHA256SUM): Likewise.
(LANGTOOLS_SHA256SUM): Likewise.
(OPENJDK_SHA256SUM): Likewise.
(install-data-local): Install policy JAR files into new
policy directories.
* NEWS: Updated.
* configure.ac: Bump to 2.6.12.
* hotspot.map.in: Update to icedtea-2.6.12.
* patches/boot/ecj-diamond.patch:
Regenerated. Add new instances in
com.sun.corba.se.impl.io.ObjectStreamClass,
com.sun.xml.internal.ws.util.exception.JAXWSExceptionBase,
java.io.ObjectStreamClass,
java.security.cert.CertificateRevokedException,
java.security.KeyStore, java.security.UnresolvedPermission,
sun.security.pkcs.SignerInfo, sun.security.pkcs12.PKCS12KeyStore,
sun.security.provider.certpath.AdjacencyList,
sun.security.provider.certpath.Builder,
sun.security.provider.certpath.CollectionCertStore,
sun.security.provider.certpath.DistributionPointFetcher,
sun.security.provider.certpath.ForwardBuilder,
sun.security.provider.certpath.IndexedCollectionCertStore,
sun.security.provider.certpath.OCSPResponse,
sun.security.provider.certpath.PKIXCertPathValidator,
sun.security.provider.certpath.PKIX,
sun.security.provider.certpath.PKIXRevocationChecker,
sun.security.provider.certpath.PolicyChecker,
sun.security.provider.certpath.PolicyNodeImpl,
sun.security.provider.certpath.ReverseBuilder,
sun.security.provider.certpath.ReverseState,
sun.security.provider.certpath.RevocationChecker,
sun.security.provider.certpath.SunCertPathBuilder,
sun.security.provider.certpath.X509CertPath,
sun.security.tools.keytool.Main,
sun.security.util.DisabledAlgorithmConstraints and
sun.security.util.SignatureFileVerifier
* patches/boot/ecj-multicatch.patch:
Regenerated. Add new cases in
com.sun.corba.se.impl.io.ObjectStreamClass,
java.io.ObjectStreamClass,
sun.security.provider.certpath.CertStoreHelper,
sun.security.provider.certpath.DistributionPointFetcher,
sun.security.provider.certpath.OCSP,
sun.security.provider.certpath.OCSPResponse,
sun.security.provider.certpath.PKIXCertPathValidator,
sun.security.provider.certpath.RevocationChecker,
sun.security.provider.certpath.SunCertPathBuilder,
sun.security.provider.certpath.URICertStore and
sun.security.provider.KeyStoreDelegator.
* patches/boot/ecj-stringswitch.patch:
Add new cases in
sun.security.util.DisabledAlgorithmConstraints,
sun.security.provider.certpath.CertStoreHelper and
sun.security.provider.certpath.RevocationChecker.
* patches/boot/ecj-trywithresources.patch:
Add new cases in sun.security.krb5.KdcComm and
sun.security.tools.keytool.Main.
* patches/boot/ecj-underscored_literals.patch:
Add new case in sun.net.ftp.impl.FtpClient.
* remove-intree-libraries.sh.in:
Remove ZLIB_VERSION and its use in the ZIP_SRC path,
as the source tree path is now unversioned.
--
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.openjdk.java.net/pipermail/distro-pkg-dev/attachments/20171205/553852e0/attachment.html>
More information about the distro-pkg-dev
mailing list