/hg/icedtea8-forest/jdk: 5 new changesets

andrew at icedtea.classpath.org andrew at icedtea.classpath.org
Tue Jul 11 02:36:39 UTC 2017


changeset c05781ed8e5c in /hg/icedtea8-forest/jdk
details: http://icedtea.classpath.org/hg/icedtea8-forest/jdk?cmd=changeset;node=c05781ed8e5c
author: enevill
date: Tue May 16 18:18:18 2017 +0100

	8139303, PR3384: aarch32: add support for ARM aarch32
	Summary: Initial port of template interpreter to aarch32
	Reviewed-by: duke
	Contributed-by: nikolay at azulsystems.com


changeset 148a7d6c463a in /hg/icedtea8-forest/jdk
details: http://icedtea.classpath.org/hg/icedtea8-forest/jdk?cmd=changeset;node=148a7d6c463a
author: enevill
date: Tue May 16 18:19:43 2017 +0100

	8164652, PR3386: aarch32: C1 port
	Reviewed-by: enevill
	Contributed-by: Andrey Petushkov <andrey.petushkov at gmail.com>


changeset ca0c7b2783e0 in /hg/icedtea8-forest/jdk
details: http://icedtea.classpath.org/hg/icedtea8-forest/jdk?cmd=changeset;node=ca0c7b2783e0
author: stuefe
date: Mon Jun 19 11:52:01 2017 +0200

	8181419, PR3413, RH1463144: Race in jdwp invoker handling may lead to crashes or invalid results
	Reviewed-by: sspitsyn, sgehwolf, clanger


changeset c8bcda75cb18 in /hg/icedtea8-forest/jdk
details: http://icedtea.classpath.org/hg/icedtea8-forest/jdk?cmd=changeset;node=c8bcda75cb18
author: andrew
date: Wed Jul 05 00:00:56 2017 +0100

	PR3392, RH1273760: Support using RSAandMGF1 with the SHA hash algorithms in the PKCS11 provider


changeset 6d6e92da0364 in /hg/icedtea8-forest/jdk
details: http://icedtea.classpath.org/hg/icedtea8-forest/jdk?cmd=changeset;node=6d6e92da0364
author: andrew
date: Tue Jul 11 03:45:17 2017 +0100

	Added tag icedtea-3.5.0pre01 for changeset c8bcda75cb18


diffstat:

 .hgtags                                                            |   1 +
 make/CopyFiles.gmk                                                 |   8 +-
 make/lib/SoundLibraries.gmk                                        |   6 +-
 src/share/back/invoker.c                                           |  45 ++---
 src/share/classes/sun/security/pkcs11/P11Signature.java            |  77 ++++++++-
 src/share/classes/sun/security/pkcs11/SunPKCS11.java               |  10 +
 src/share/classes/sun/security/pkcs11/wrapper/CK_MECHANISM.java    |   4 +
 src/share/classes/sun/security/pkcs11/wrapper/PKCS11Constants.java |  10 +
 src/share/native/com/sun/media/sound/SoundDefs.h                   |   1 +
 src/solaris/bin/aarch32/jvm.cfg                                    |  34 ++++
 10 files changed, 157 insertions(+), 39 deletions(-)

diffs (407 lines):

diff -r 56990bf9a9c4 -r 6d6e92da0364 .hgtags
--- a/.hgtags	Tue May 16 18:03:40 2017 +0100
+++ b/.hgtags	Tue Jul 11 03:45:17 2017 +0100
@@ -729,3 +729,4 @@
 40d00399869d8a28cfecf360234f340e9e0ad3b1 jdk8u131-b09
 c0091a673d766ce2e76a945bab6de325fe78dd88 jdk8u131-b10
 cfc292a2c1c6af4e469e45cd896765e17f7d4c95 icedtea-3.4.0
+c8bcda75cb18b043ba95feb0cb74c34b6a678ac1 icedtea-3.5.0pre01
diff -r 56990bf9a9c4 -r 6d6e92da0364 make/CopyFiles.gmk
--- a/make/CopyFiles.gmk	Tue May 16 18:03:40 2017 +0100
+++ b/make/CopyFiles.gmk	Tue Jul 11 03:45:17 2017 +0100
@@ -307,9 +307,15 @@
   ifeq ($(CLIENT_AND_SERVER), true)
     COPY_JVM_CFG_FILE := true
   else
-    # For zero, the default jvm.cfg file is sufficient
+    # For zero, the default jvm.cfg file is sufficient.
     ifeq ($(JVM_VARIANT_ZERO), true)
       COPY_JVM_CFG_FILE := true
+    else
+      ifeq ($(OPENJDK_TARGET_CPU), aarch32)
+        ifeq ($(JVM_VARIANT_CORE), true)
+          COPY_JVM_CFG_FILE := true
+        endif
+      endif
     endif
   endif
 endif
diff -r 56990bf9a9c4 -r 6d6e92da0364 make/lib/SoundLibraries.gmk
--- a/make/lib/SoundLibraries.gmk	Tue May 16 18:03:40 2017 +0100
+++ b/make/lib/SoundLibraries.gmk	Tue Jul 11 03:45:17 2017 +0100
@@ -137,7 +137,7 @@
   endif
 
   ifeq ($(OPENJDK_TARGET_CPU), ppc64)
-       LIBJSOUND_CFLAGS += -DX_ARCH=X_PPC64
+    LIBJSOUND_CFLAGS += -DX_ARCH=X_PPC64
   endif
 
   ifeq ($(OPENJDK_TARGET_CPU), alpha)
@@ -179,6 +179,10 @@
   ifeq ($(OPENJDK_TARGET_CPU), aarch64)
        LIBJSOUND_CFLAGS += -DX_ARCH=X_AARCH64
   endif
+
+  ifeq ($(OPENJDK_TARGET_CPU), aarch32)
+    LIBJSOUND_CFLAGS += -DX_ARCH=X_AARCH32
+  endif
 endif
 
 LIBJSOUND_CFLAGS += -DEXTRA_SOUND_JNI_LIBS='"$(EXTRA_SOUND_JNI_LIBS)"'
diff -r 56990bf9a9c4 -r 6d6e92da0364 src/share/back/invoker.c
--- a/src/share/back/invoker.c	Tue May 16 18:03:40 2017 +0100
+++ b/src/share/back/invoker.c	Tue Jul 11 03:45:17 2017 +0100
@@ -212,30 +212,6 @@
 }
 
 /*
- * Delete saved global references - if any - for:
- * - a potentially thrown Exception
- * - a returned refernce/array value
- * See invoker_doInvoke() and invoke* methods where global references
- * are being saved.
- */
-static void
-deletePotentiallySavedGlobalRefs(JNIEnv *env, InvokeRequest *request)
-{
-    /* Delete potentially saved return value */
-    if ((request->invokeType == INVOKE_CONSTRUCTOR) ||
-        (returnTypeTag(request->methodSignature) == JDWP_TAG(OBJECT)) ||
-        (returnTypeTag(request->methodSignature) == JDWP_TAG(ARRAY))) {
-        if (request->returnValue.l != NULL) {
-            tossGlobalRef(env, &(request->returnValue.l));
-        }
-    }
-    /* Delete potentially saved exception */
-    if (request->exception != NULL) {
-        tossGlobalRef(env, &(request->exception));
-    }
-}
-
-/*
  * Delete global argument references from the request which got put there before a
  * invoke request was carried out. See fillInvokeRequest().
  */
@@ -744,6 +720,7 @@
     jint id;
     InvokeRequest *request;
     jboolean detached;
+    jboolean mustReleaseReturnValue = JNI_FALSE;
 
     JDI_ASSERT(thread);
 
@@ -787,6 +764,13 @@
         id = request->id;
         exc = request->exception;
         returnValue = request->returnValue;
+
+        /* Release return value and exception references, but delay the release
+         * until after the return packet was sent. */
+        mustReleaseReturnValue = request->invokeType == INVOKE_CONSTRUCTOR ||
+           returnTypeTag(request->methodSignature) == JDWP_TAG(OBJECT) ||
+           returnTypeTag(request->methodSignature) == JDWP_TAG(ARRAY);
+
     }
 
     /*
@@ -801,6 +785,12 @@
      */
     deleteGlobalArgumentRefs(env, request);
 
+    /* From now on, do not access the request structure anymore
+     * for this request id, because once we give up the invokerLock it may
+     * be immediately reused by a new invoke request.
+     */
+    request = NULL;
+
     /*
      * Give up the lock before I/O operation
      */
@@ -821,7 +811,12 @@
      */
     eventHandler_lock(); // for proper lock order
     debugMonitorEnter(invokerLock);
-    deletePotentiallySavedGlobalRefs(env, request);
+    if (mustReleaseReturnValue && returnValue.l != NULL) {
+        tossGlobalRef(env, &returnValue.l);
+    }
+    if (exc != NULL) {
+        tossGlobalRef(env, &exc);
+    }
     debugMonitorExit(invokerLock);
     eventHandler_unlock();
 }
diff -r 56990bf9a9c4 -r 6d6e92da0364 src/share/classes/sun/security/pkcs11/P11Signature.java
--- a/src/share/classes/sun/security/pkcs11/P11Signature.java	Tue May 16 18:03:40 2017 +0100
+++ b/src/share/classes/sun/security/pkcs11/P11Signature.java	Tue Jul 11 03:45:17 2017 +0100
@@ -87,8 +87,8 @@
     // name of the key algorithm, currently either RSA or DSA
     private final String keyAlgorithm;
 
-    // mechanism id
-    private final long mechanism;
+    // mechanism
+    private final CK_MECHANISM mechanism;
 
     // digest algorithm OID, if we encode RSA signature ourselves
     private final ObjectIdentifier digestOID;
@@ -138,11 +138,62 @@
         super();
         this.token = token;
         this.algorithm = algorithm;
-        this.mechanism = mechanism;
+        CK_MECHANISM ckMechanism = new CK_MECHANISM(mechanism);
+        final CK_RSA_PKCS_PSS_PARAMS mechParams;
         byte[] buffer = null;
         ObjectIdentifier digestOID = null;
         MessageDigest md = null;
         switch ((int)mechanism) {
+        case (int)CKM_SHA1_RSA_PKCS_PSS:
+            mechParams = new CK_RSA_PKCS_PSS_PARAMS();
+            mechParams.hashAlg = CKM_SHA_1;
+            mechParams.mgf = CKG_MGF1_SHA1;
+            mechParams.sLen = 20;
+            ckMechanism = new CK_MECHANISM(mechanism, mechParams);
+            this.keyAlgorithm = "RSA";
+            this.type = T_UPDATE;
+            buffer = new byte[1];
+            break;
+        case (int)CKM_SHA224_RSA_PKCS_PSS:
+            mechParams = new CK_RSA_PKCS_PSS_PARAMS();
+            mechParams.hashAlg = CKM_SHA224;
+            mechParams.mgf = CKG_MGF1_SHA224;
+            mechParams.sLen = 28;
+            ckMechanism = new CK_MECHANISM(mechanism, mechParams);
+            this.keyAlgorithm = "RSA";
+            this.type = T_UPDATE;
+            buffer = new byte[1];
+            break;
+        case (int)CKM_SHA256_RSA_PKCS_PSS:
+            mechParams = new CK_RSA_PKCS_PSS_PARAMS();
+            mechParams.hashAlg = CKM_SHA256;
+            mechParams.mgf = CKG_MGF1_SHA256;
+            mechParams.sLen = 32;
+            ckMechanism = new CK_MECHANISM(mechanism, mechParams);
+            this.keyAlgorithm = "RSA";
+            this.type = T_UPDATE;
+            buffer = new byte[1];
+            break;
+        case (int)CKM_SHA384_RSA_PKCS_PSS:
+            mechParams = new CK_RSA_PKCS_PSS_PARAMS();
+            mechParams.hashAlg = CKM_SHA384;
+            mechParams.mgf = CKG_MGF1_SHA384;
+            mechParams.sLen = 48;
+            ckMechanism = new CK_MECHANISM(mechanism, mechParams);
+            this.keyAlgorithm = "RSA";
+            this.type = T_UPDATE;
+            buffer = new byte[1];
+            break;
+        case (int)CKM_SHA512_RSA_PKCS_PSS:
+            mechParams = new CK_RSA_PKCS_PSS_PARAMS();
+            mechParams.hashAlg = CKM_SHA512;
+            mechParams.mgf = CKG_MGF1_SHA512;
+            mechParams.sLen = 64;
+            ckMechanism = new CK_MECHANISM(mechanism, mechParams);
+            this.keyAlgorithm = "RSA";
+            this.type = T_UPDATE;
+            buffer = new byte[1];
+            break;
         case (int)CKM_MD2_RSA_PKCS:
         case (int)CKM_MD5_RSA_PKCS:
         case (int)CKM_SHA1_RSA_PKCS:
@@ -232,6 +283,7 @@
         default:
             throw new ProviderException("Unknown mechanism: " + mechanism);
         }
+        this.mechanism = ckMechanism;
         this.buffer = buffer;
         this.digestOID = digestOID;
         this.md = md;
@@ -309,10 +361,10 @@
             }
             if (mode == M_SIGN) {
                 token.p11.C_SignInit(session.id(),
-                        new CK_MECHANISM(mechanism), p11Key.keyID);
+                        mechanism, p11Key.keyID);
             } else {
                 token.p11.C_VerifyInit(session.id(),
-                        new CK_MECHANISM(mechanism), p11Key.keyID);
+                        mechanism, p11Key.keyID);
             }
             initialized = true;
         } catch (PKCS11Exception e) {
@@ -330,7 +382,7 @@
         throws InvalidKeyException {
         CK_MECHANISM_INFO mechInfo = null;
         try {
-            mechInfo = token.getMechanismInfo(mechanism);
+            mechInfo = token.getMechanismInfo(mechanism.mechanism);
         } catch (PKCS11Exception e) {
             // should not happen, ignore for now.
         }
@@ -341,7 +393,7 @@
         int minKeySize = (int) mechInfo.ulMinKeySize;
         int maxKeySize = (int) mechInfo.ulMaxKeySize;
         // need to override the MAX keysize for SHA1withDSA
-        if (md != null && mechanism == CKM_DSA && maxKeySize > 1024) {
+        if (md != null && mechanism.mechanism == CKM_DSA && maxKeySize > 1024) {
                maxKeySize = 1024;
         }
         int keySize = 0;
@@ -395,7 +447,8 @@
         } else if (algorithm.equals("SHA512withRSA")) {
             encodedLength = 83;
         } else {
-            throw new ProviderException("Unknown signature algo: " + algorithm);
+            encodedLength = 0;
+            //throw new ProviderException("Unknown signature algo: " + algorithm);
         }
         if (encodedLength > maxDataSize) {
             throw new InvalidKeyException
@@ -556,7 +609,7 @@
                 if (type == T_DIGEST) {
                     digest = md.digest();
                 } else { // T_RAW
-                    if (mechanism == CKM_DSA) {
+                    if (mechanism.mechanism == CKM_DSA) {
                         if (bytesProcessed != buffer.length) {
                             throw new SignatureException
                             ("Data for RawDSA must be exactly 20 bytes long");
@@ -576,7 +629,7 @@
                     signature = token.p11.C_Sign(session.id(), digest);
                 } else { // RSA
                     byte[] data = encodeSignature(digest);
-                    if (mechanism == CKM_RSA_X_509) {
+                    if (mechanism.mechanism == CKM_RSA_X_509) {
                         data = pkcs1Pad(data);
                     }
                     signature = token.p11.C_Sign(session.id(), data);
@@ -611,7 +664,7 @@
                 if (type == T_DIGEST) {
                     digest = md.digest();
                 } else { // T_RAW
-                    if (mechanism == CKM_DSA) {
+                    if (mechanism.mechanism == CKM_DSA) {
                         if (bytesProcessed != buffer.length) {
                             throw new SignatureException
                             ("Data for RawDSA must be exactly 20 bytes long");
@@ -631,7 +684,7 @@
                     token.p11.C_Verify(session.id(), digest, signature);
                 } else { // RSA
                     byte[] data = encodeSignature(digest);
-                    if (mechanism == CKM_RSA_X_509) {
+                    if (mechanism.mechanism == CKM_RSA_X_509) {
                         data = pkcs1Pad(data);
                     }
                     token.p11.C_Verify(session.id(), data, signature);
diff -r 56990bf9a9c4 -r 6d6e92da0364 src/share/classes/sun/security/pkcs11/SunPKCS11.java
--- a/src/share/classes/sun/security/pkcs11/SunPKCS11.java	Tue May 16 18:03:40 2017 +0100
+++ b/src/share/classes/sun/security/pkcs11/SunPKCS11.java	Tue Jul 11 03:45:17 2017 +0100
@@ -730,6 +730,16 @@
         d(SIG, "SHA512withRSA", P11Signature,
                 s("1.2.840.113549.1.1.13", "OID.1.2.840.113549.1.1.13"),
                 m(CKM_SHA512_RSA_PKCS, CKM_RSA_PKCS, CKM_RSA_X_509));
+        d(SIG, "SHA1withRSAandMGF1", P11Signature,
+                m(CKM_SHA1_RSA_PKCS_PSS));
+        d(SIG, "SHA224withRSAandMGF1", P11Signature,
+                m(CKM_SHA224_RSA_PKCS_PSS));
+        d(SIG, "SHA256withRSAandMGF1", P11Signature,
+                m(CKM_SHA256_RSA_PKCS_PSS));
+        d(SIG, "SHA384withRSAandMGF1", P11Signature,
+                m(CKM_SHA384_RSA_PKCS_PSS));
+        d(SIG, "SHA512withRSAandMGF1", P11Signature,
+                m(CKM_SHA512_RSA_PKCS_PSS));
 
         /*
          * TLS 1.2 uses a different hash algorithm than 1.0/1.1 for the
diff -r 56990bf9a9c4 -r 6d6e92da0364 src/share/classes/sun/security/pkcs11/wrapper/CK_MECHANISM.java
--- a/src/share/classes/sun/security/pkcs11/wrapper/CK_MECHANISM.java	Tue May 16 18:03:40 2017 +0100
+++ b/src/share/classes/sun/security/pkcs11/wrapper/CK_MECHANISM.java	Tue Jul 11 03:45:17 2017 +0100
@@ -112,6 +112,10 @@
         init(mechanism, params);
     }
 
+    public CK_MECHANISM(long mechanism, CK_RSA_PKCS_PSS_PARAMS params) {
+        init(mechanism, params);
+    }
+
     public CK_MECHANISM(long mechanism, CK_SSL3_KEY_MAT_PARAMS params) {
         init(mechanism, params);
     }
diff -r 56990bf9a9c4 -r 6d6e92da0364 src/share/classes/sun/security/pkcs11/wrapper/PKCS11Constants.java
--- a/src/share/classes/sun/security/pkcs11/wrapper/PKCS11Constants.java	Tue May 16 18:03:40 2017 +0100
+++ b/src/share/classes/sun/security/pkcs11/wrapper/PKCS11Constants.java	Tue Jul 11 03:45:17 2017 +0100
@@ -458,6 +458,12 @@
     public static final long  CKM_SHA384_RSA_PKCS            = 0x00000041L;
     public static final long  CKM_SHA512_RSA_PKCS            = 0x00000042L;
 
+    // v2.30
+    public static final long  CKM_SHA256_RSA_PKCS_PSS        = 0x00000043L;
+    public static final long  CKM_SHA384_RSA_PKCS_PSS        = 0x00000044L;
+    public static final long  CKM_SHA512_RSA_PKCS_PSS        = 0x00000045L;
+
+
     public static final long  CKM_RC2_KEY_GEN                = 0x00000100L;
     public static final long  CKM_RC2_ECB                    = 0x00000101L;
     public static final long  CKM_RC2_CBC                    = 0x00000102L;
@@ -911,6 +917,10 @@
 
     /* The following MGFs are defined */
     public static final long  CKG_MGF1_SHA1       =  0x00000001L;
+    public static final long  CKG_MGF1_SHA256     =  0x00000002L;
+    public static final long  CKG_MGF1_SHA384     =  0x00000003L;
+    public static final long  CKG_MGF1_SHA512     =  0x00000004L;
+
     // new for v2.20 amendment 3
     public static final long  CKG_MGF1_SHA224     = 0x00000005L;
 
diff -r 56990bf9a9c4 -r 6d6e92da0364 src/share/native/com/sun/media/sound/SoundDefs.h
--- a/src/share/native/com/sun/media/sound/SoundDefs.h	Tue May 16 18:03:40 2017 +0100
+++ b/src/share/native/com/sun/media/sound/SoundDefs.h	Tue Jul 11 03:45:17 2017 +0100
@@ -53,6 +53,7 @@
 #define X_SH            16
 #define X_AARCH64       17
 #define X_PPC64LE       18
+#define X_AARCH32       19
 
 // **********************************
 // Make sure you set X_PLATFORM and X_ARCH defines correctly.
diff -r 56990bf9a9c4 -r 6d6e92da0364 src/solaris/bin/aarch32/jvm.cfg
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/src/solaris/bin/aarch32/jvm.cfg	Tue Jul 11 03:45:17 2017 +0100
@@ -0,0 +1,34 @@
+# Copyright (c) 2015, 2015, Oracle and/or its affiliates. All rights reserved.
+# DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
+#
+# This code is free software; you can redistribute it and/or modify it
+# under the terms of the GNU General Public License version 2 only, as
+# published by the Free Software Foundation.  Oracle designates this
+# particular file as subject to the "Classpath" exception as provided
+# by Oracle in the LICENSE file that accompanied this code.
+#
+# This code is distributed in the hope that it will be useful, but WITHOUT
+# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
+# FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
+# version 2 for more details (a copy is included in the LICENSE file that
+# accompanied this code).
+#
+# You should have received a copy of the GNU General Public License version
+# 2 along with this work; if not, write to the Free Software Foundation,
+# Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+# Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
+# or visit www.oracle.com if you need additional information or have any
+# questions.
+#
+# List of JVMs that can be used as an option to java, javac, etc.
+# Order is important -- first in this list is the default JVM.
+# NOTE that this both this file and its format are UNSUPPORTED and
+# WILL GO AWAY in a future release.
+#
+# You may also select a JVM in an arbitrary location with the
+# "-XXaltjvm=<jvm_dir>" option, but that too is unsupported
+# and may not be available in a future release.
+#
+-server KNOWN
+-client IGNORE


More information about the distro-pkg-dev mailing list