/hg/icedtea8-forest/jdk: 5 new changesets
andrew at icedtea.classpath.org
andrew at icedtea.classpath.org
Tue Jul 11 02:36:39 UTC 2017
changeset c05781ed8e5c in /hg/icedtea8-forest/jdk
details: http://icedtea.classpath.org/hg/icedtea8-forest/jdk?cmd=changeset;node=c05781ed8e5c
author: enevill
date: Tue May 16 18:18:18 2017 +0100
8139303, PR3384: aarch32: add support for ARM aarch32
Summary: Initial port of template interpreter to aarch32
Reviewed-by: duke
Contributed-by: nikolay at azulsystems.com
changeset 148a7d6c463a in /hg/icedtea8-forest/jdk
details: http://icedtea.classpath.org/hg/icedtea8-forest/jdk?cmd=changeset;node=148a7d6c463a
author: enevill
date: Tue May 16 18:19:43 2017 +0100
8164652, PR3386: aarch32: C1 port
Reviewed-by: enevill
Contributed-by: Andrey Petushkov <andrey.petushkov at gmail.com>
changeset ca0c7b2783e0 in /hg/icedtea8-forest/jdk
details: http://icedtea.classpath.org/hg/icedtea8-forest/jdk?cmd=changeset;node=ca0c7b2783e0
author: stuefe
date: Mon Jun 19 11:52:01 2017 +0200
8181419, PR3413, RH1463144: Race in jdwp invoker handling may lead to crashes or invalid results
Reviewed-by: sspitsyn, sgehwolf, clanger
changeset c8bcda75cb18 in /hg/icedtea8-forest/jdk
details: http://icedtea.classpath.org/hg/icedtea8-forest/jdk?cmd=changeset;node=c8bcda75cb18
author: andrew
date: Wed Jul 05 00:00:56 2017 +0100
PR3392, RH1273760: Support using RSAandMGF1 with the SHA hash algorithms in the PKCS11 provider
changeset 6d6e92da0364 in /hg/icedtea8-forest/jdk
details: http://icedtea.classpath.org/hg/icedtea8-forest/jdk?cmd=changeset;node=6d6e92da0364
author: andrew
date: Tue Jul 11 03:45:17 2017 +0100
Added tag icedtea-3.5.0pre01 for changeset c8bcda75cb18
diffstat:
.hgtags | 1 +
make/CopyFiles.gmk | 8 +-
make/lib/SoundLibraries.gmk | 6 +-
src/share/back/invoker.c | 45 ++---
src/share/classes/sun/security/pkcs11/P11Signature.java | 77 ++++++++-
src/share/classes/sun/security/pkcs11/SunPKCS11.java | 10 +
src/share/classes/sun/security/pkcs11/wrapper/CK_MECHANISM.java | 4 +
src/share/classes/sun/security/pkcs11/wrapper/PKCS11Constants.java | 10 +
src/share/native/com/sun/media/sound/SoundDefs.h | 1 +
src/solaris/bin/aarch32/jvm.cfg | 34 ++++
10 files changed, 157 insertions(+), 39 deletions(-)
diffs (407 lines):
diff -r 56990bf9a9c4 -r 6d6e92da0364 .hgtags
--- a/.hgtags Tue May 16 18:03:40 2017 +0100
+++ b/.hgtags Tue Jul 11 03:45:17 2017 +0100
@@ -729,3 +729,4 @@
40d00399869d8a28cfecf360234f340e9e0ad3b1 jdk8u131-b09
c0091a673d766ce2e76a945bab6de325fe78dd88 jdk8u131-b10
cfc292a2c1c6af4e469e45cd896765e17f7d4c95 icedtea-3.4.0
+c8bcda75cb18b043ba95feb0cb74c34b6a678ac1 icedtea-3.5.0pre01
diff -r 56990bf9a9c4 -r 6d6e92da0364 make/CopyFiles.gmk
--- a/make/CopyFiles.gmk Tue May 16 18:03:40 2017 +0100
+++ b/make/CopyFiles.gmk Tue Jul 11 03:45:17 2017 +0100
@@ -307,9 +307,15 @@
ifeq ($(CLIENT_AND_SERVER), true)
COPY_JVM_CFG_FILE := true
else
- # For zero, the default jvm.cfg file is sufficient
+ # For zero, the default jvm.cfg file is sufficient.
ifeq ($(JVM_VARIANT_ZERO), true)
COPY_JVM_CFG_FILE := true
+ else
+ ifeq ($(OPENJDK_TARGET_CPU), aarch32)
+ ifeq ($(JVM_VARIANT_CORE), true)
+ COPY_JVM_CFG_FILE := true
+ endif
+ endif
endif
endif
endif
diff -r 56990bf9a9c4 -r 6d6e92da0364 make/lib/SoundLibraries.gmk
--- a/make/lib/SoundLibraries.gmk Tue May 16 18:03:40 2017 +0100
+++ b/make/lib/SoundLibraries.gmk Tue Jul 11 03:45:17 2017 +0100
@@ -137,7 +137,7 @@
endif
ifeq ($(OPENJDK_TARGET_CPU), ppc64)
- LIBJSOUND_CFLAGS += -DX_ARCH=X_PPC64
+ LIBJSOUND_CFLAGS += -DX_ARCH=X_PPC64
endif
ifeq ($(OPENJDK_TARGET_CPU), alpha)
@@ -179,6 +179,10 @@
ifeq ($(OPENJDK_TARGET_CPU), aarch64)
LIBJSOUND_CFLAGS += -DX_ARCH=X_AARCH64
endif
+
+ ifeq ($(OPENJDK_TARGET_CPU), aarch32)
+ LIBJSOUND_CFLAGS += -DX_ARCH=X_AARCH32
+ endif
endif
LIBJSOUND_CFLAGS += -DEXTRA_SOUND_JNI_LIBS='"$(EXTRA_SOUND_JNI_LIBS)"'
diff -r 56990bf9a9c4 -r 6d6e92da0364 src/share/back/invoker.c
--- a/src/share/back/invoker.c Tue May 16 18:03:40 2017 +0100
+++ b/src/share/back/invoker.c Tue Jul 11 03:45:17 2017 +0100
@@ -212,30 +212,6 @@
}
/*
- * Delete saved global references - if any - for:
- * - a potentially thrown Exception
- * - a returned refernce/array value
- * See invoker_doInvoke() and invoke* methods where global references
- * are being saved.
- */
-static void
-deletePotentiallySavedGlobalRefs(JNIEnv *env, InvokeRequest *request)
-{
- /* Delete potentially saved return value */
- if ((request->invokeType == INVOKE_CONSTRUCTOR) ||
- (returnTypeTag(request->methodSignature) == JDWP_TAG(OBJECT)) ||
- (returnTypeTag(request->methodSignature) == JDWP_TAG(ARRAY))) {
- if (request->returnValue.l != NULL) {
- tossGlobalRef(env, &(request->returnValue.l));
- }
- }
- /* Delete potentially saved exception */
- if (request->exception != NULL) {
- tossGlobalRef(env, &(request->exception));
- }
-}
-
-/*
* Delete global argument references from the request which got put there before a
* invoke request was carried out. See fillInvokeRequest().
*/
@@ -744,6 +720,7 @@
jint id;
InvokeRequest *request;
jboolean detached;
+ jboolean mustReleaseReturnValue = JNI_FALSE;
JDI_ASSERT(thread);
@@ -787,6 +764,13 @@
id = request->id;
exc = request->exception;
returnValue = request->returnValue;
+
+ /* Release return value and exception references, but delay the release
+ * until after the return packet was sent. */
+ mustReleaseReturnValue = request->invokeType == INVOKE_CONSTRUCTOR ||
+ returnTypeTag(request->methodSignature) == JDWP_TAG(OBJECT) ||
+ returnTypeTag(request->methodSignature) == JDWP_TAG(ARRAY);
+
}
/*
@@ -801,6 +785,12 @@
*/
deleteGlobalArgumentRefs(env, request);
+ /* From now on, do not access the request structure anymore
+ * for this request id, because once we give up the invokerLock it may
+ * be immediately reused by a new invoke request.
+ */
+ request = NULL;
+
/*
* Give up the lock before I/O operation
*/
@@ -821,7 +811,12 @@
*/
eventHandler_lock(); // for proper lock order
debugMonitorEnter(invokerLock);
- deletePotentiallySavedGlobalRefs(env, request);
+ if (mustReleaseReturnValue && returnValue.l != NULL) {
+ tossGlobalRef(env, &returnValue.l);
+ }
+ if (exc != NULL) {
+ tossGlobalRef(env, &exc);
+ }
debugMonitorExit(invokerLock);
eventHandler_unlock();
}
diff -r 56990bf9a9c4 -r 6d6e92da0364 src/share/classes/sun/security/pkcs11/P11Signature.java
--- a/src/share/classes/sun/security/pkcs11/P11Signature.java Tue May 16 18:03:40 2017 +0100
+++ b/src/share/classes/sun/security/pkcs11/P11Signature.java Tue Jul 11 03:45:17 2017 +0100
@@ -87,8 +87,8 @@
// name of the key algorithm, currently either RSA or DSA
private final String keyAlgorithm;
- // mechanism id
- private final long mechanism;
+ // mechanism
+ private final CK_MECHANISM mechanism;
// digest algorithm OID, if we encode RSA signature ourselves
private final ObjectIdentifier digestOID;
@@ -138,11 +138,62 @@
super();
this.token = token;
this.algorithm = algorithm;
- this.mechanism = mechanism;
+ CK_MECHANISM ckMechanism = new CK_MECHANISM(mechanism);
+ final CK_RSA_PKCS_PSS_PARAMS mechParams;
byte[] buffer = null;
ObjectIdentifier digestOID = null;
MessageDigest md = null;
switch ((int)mechanism) {
+ case (int)CKM_SHA1_RSA_PKCS_PSS:
+ mechParams = new CK_RSA_PKCS_PSS_PARAMS();
+ mechParams.hashAlg = CKM_SHA_1;
+ mechParams.mgf = CKG_MGF1_SHA1;
+ mechParams.sLen = 20;
+ ckMechanism = new CK_MECHANISM(mechanism, mechParams);
+ this.keyAlgorithm = "RSA";
+ this.type = T_UPDATE;
+ buffer = new byte[1];
+ break;
+ case (int)CKM_SHA224_RSA_PKCS_PSS:
+ mechParams = new CK_RSA_PKCS_PSS_PARAMS();
+ mechParams.hashAlg = CKM_SHA224;
+ mechParams.mgf = CKG_MGF1_SHA224;
+ mechParams.sLen = 28;
+ ckMechanism = new CK_MECHANISM(mechanism, mechParams);
+ this.keyAlgorithm = "RSA";
+ this.type = T_UPDATE;
+ buffer = new byte[1];
+ break;
+ case (int)CKM_SHA256_RSA_PKCS_PSS:
+ mechParams = new CK_RSA_PKCS_PSS_PARAMS();
+ mechParams.hashAlg = CKM_SHA256;
+ mechParams.mgf = CKG_MGF1_SHA256;
+ mechParams.sLen = 32;
+ ckMechanism = new CK_MECHANISM(mechanism, mechParams);
+ this.keyAlgorithm = "RSA";
+ this.type = T_UPDATE;
+ buffer = new byte[1];
+ break;
+ case (int)CKM_SHA384_RSA_PKCS_PSS:
+ mechParams = new CK_RSA_PKCS_PSS_PARAMS();
+ mechParams.hashAlg = CKM_SHA384;
+ mechParams.mgf = CKG_MGF1_SHA384;
+ mechParams.sLen = 48;
+ ckMechanism = new CK_MECHANISM(mechanism, mechParams);
+ this.keyAlgorithm = "RSA";
+ this.type = T_UPDATE;
+ buffer = new byte[1];
+ break;
+ case (int)CKM_SHA512_RSA_PKCS_PSS:
+ mechParams = new CK_RSA_PKCS_PSS_PARAMS();
+ mechParams.hashAlg = CKM_SHA512;
+ mechParams.mgf = CKG_MGF1_SHA512;
+ mechParams.sLen = 64;
+ ckMechanism = new CK_MECHANISM(mechanism, mechParams);
+ this.keyAlgorithm = "RSA";
+ this.type = T_UPDATE;
+ buffer = new byte[1];
+ break;
case (int)CKM_MD2_RSA_PKCS:
case (int)CKM_MD5_RSA_PKCS:
case (int)CKM_SHA1_RSA_PKCS:
@@ -232,6 +283,7 @@
default:
throw new ProviderException("Unknown mechanism: " + mechanism);
}
+ this.mechanism = ckMechanism;
this.buffer = buffer;
this.digestOID = digestOID;
this.md = md;
@@ -309,10 +361,10 @@
}
if (mode == M_SIGN) {
token.p11.C_SignInit(session.id(),
- new CK_MECHANISM(mechanism), p11Key.keyID);
+ mechanism, p11Key.keyID);
} else {
token.p11.C_VerifyInit(session.id(),
- new CK_MECHANISM(mechanism), p11Key.keyID);
+ mechanism, p11Key.keyID);
}
initialized = true;
} catch (PKCS11Exception e) {
@@ -330,7 +382,7 @@
throws InvalidKeyException {
CK_MECHANISM_INFO mechInfo = null;
try {
- mechInfo = token.getMechanismInfo(mechanism);
+ mechInfo = token.getMechanismInfo(mechanism.mechanism);
} catch (PKCS11Exception e) {
// should not happen, ignore for now.
}
@@ -341,7 +393,7 @@
int minKeySize = (int) mechInfo.ulMinKeySize;
int maxKeySize = (int) mechInfo.ulMaxKeySize;
// need to override the MAX keysize for SHA1withDSA
- if (md != null && mechanism == CKM_DSA && maxKeySize > 1024) {
+ if (md != null && mechanism.mechanism == CKM_DSA && maxKeySize > 1024) {
maxKeySize = 1024;
}
int keySize = 0;
@@ -395,7 +447,8 @@
} else if (algorithm.equals("SHA512withRSA")) {
encodedLength = 83;
} else {
- throw new ProviderException("Unknown signature algo: " + algorithm);
+ encodedLength = 0;
+ //throw new ProviderException("Unknown signature algo: " + algorithm);
}
if (encodedLength > maxDataSize) {
throw new InvalidKeyException
@@ -556,7 +609,7 @@
if (type == T_DIGEST) {
digest = md.digest();
} else { // T_RAW
- if (mechanism == CKM_DSA) {
+ if (mechanism.mechanism == CKM_DSA) {
if (bytesProcessed != buffer.length) {
throw new SignatureException
("Data for RawDSA must be exactly 20 bytes long");
@@ -576,7 +629,7 @@
signature = token.p11.C_Sign(session.id(), digest);
} else { // RSA
byte[] data = encodeSignature(digest);
- if (mechanism == CKM_RSA_X_509) {
+ if (mechanism.mechanism == CKM_RSA_X_509) {
data = pkcs1Pad(data);
}
signature = token.p11.C_Sign(session.id(), data);
@@ -611,7 +664,7 @@
if (type == T_DIGEST) {
digest = md.digest();
} else { // T_RAW
- if (mechanism == CKM_DSA) {
+ if (mechanism.mechanism == CKM_DSA) {
if (bytesProcessed != buffer.length) {
throw new SignatureException
("Data for RawDSA must be exactly 20 bytes long");
@@ -631,7 +684,7 @@
token.p11.C_Verify(session.id(), digest, signature);
} else { // RSA
byte[] data = encodeSignature(digest);
- if (mechanism == CKM_RSA_X_509) {
+ if (mechanism.mechanism == CKM_RSA_X_509) {
data = pkcs1Pad(data);
}
token.p11.C_Verify(session.id(), data, signature);
diff -r 56990bf9a9c4 -r 6d6e92da0364 src/share/classes/sun/security/pkcs11/SunPKCS11.java
--- a/src/share/classes/sun/security/pkcs11/SunPKCS11.java Tue May 16 18:03:40 2017 +0100
+++ b/src/share/classes/sun/security/pkcs11/SunPKCS11.java Tue Jul 11 03:45:17 2017 +0100
@@ -730,6 +730,16 @@
d(SIG, "SHA512withRSA", P11Signature,
s("1.2.840.113549.1.1.13", "OID.1.2.840.113549.1.1.13"),
m(CKM_SHA512_RSA_PKCS, CKM_RSA_PKCS, CKM_RSA_X_509));
+ d(SIG, "SHA1withRSAandMGF1", P11Signature,
+ m(CKM_SHA1_RSA_PKCS_PSS));
+ d(SIG, "SHA224withRSAandMGF1", P11Signature,
+ m(CKM_SHA224_RSA_PKCS_PSS));
+ d(SIG, "SHA256withRSAandMGF1", P11Signature,
+ m(CKM_SHA256_RSA_PKCS_PSS));
+ d(SIG, "SHA384withRSAandMGF1", P11Signature,
+ m(CKM_SHA384_RSA_PKCS_PSS));
+ d(SIG, "SHA512withRSAandMGF1", P11Signature,
+ m(CKM_SHA512_RSA_PKCS_PSS));
/*
* TLS 1.2 uses a different hash algorithm than 1.0/1.1 for the
diff -r 56990bf9a9c4 -r 6d6e92da0364 src/share/classes/sun/security/pkcs11/wrapper/CK_MECHANISM.java
--- a/src/share/classes/sun/security/pkcs11/wrapper/CK_MECHANISM.java Tue May 16 18:03:40 2017 +0100
+++ b/src/share/classes/sun/security/pkcs11/wrapper/CK_MECHANISM.java Tue Jul 11 03:45:17 2017 +0100
@@ -112,6 +112,10 @@
init(mechanism, params);
}
+ public CK_MECHANISM(long mechanism, CK_RSA_PKCS_PSS_PARAMS params) {
+ init(mechanism, params);
+ }
+
public CK_MECHANISM(long mechanism, CK_SSL3_KEY_MAT_PARAMS params) {
init(mechanism, params);
}
diff -r 56990bf9a9c4 -r 6d6e92da0364 src/share/classes/sun/security/pkcs11/wrapper/PKCS11Constants.java
--- a/src/share/classes/sun/security/pkcs11/wrapper/PKCS11Constants.java Tue May 16 18:03:40 2017 +0100
+++ b/src/share/classes/sun/security/pkcs11/wrapper/PKCS11Constants.java Tue Jul 11 03:45:17 2017 +0100
@@ -458,6 +458,12 @@
public static final long CKM_SHA384_RSA_PKCS = 0x00000041L;
public static final long CKM_SHA512_RSA_PKCS = 0x00000042L;
+ // v2.30
+ public static final long CKM_SHA256_RSA_PKCS_PSS = 0x00000043L;
+ public static final long CKM_SHA384_RSA_PKCS_PSS = 0x00000044L;
+ public static final long CKM_SHA512_RSA_PKCS_PSS = 0x00000045L;
+
+
public static final long CKM_RC2_KEY_GEN = 0x00000100L;
public static final long CKM_RC2_ECB = 0x00000101L;
public static final long CKM_RC2_CBC = 0x00000102L;
@@ -911,6 +917,10 @@
/* The following MGFs are defined */
public static final long CKG_MGF1_SHA1 = 0x00000001L;
+ public static final long CKG_MGF1_SHA256 = 0x00000002L;
+ public static final long CKG_MGF1_SHA384 = 0x00000003L;
+ public static final long CKG_MGF1_SHA512 = 0x00000004L;
+
// new for v2.20 amendment 3
public static final long CKG_MGF1_SHA224 = 0x00000005L;
diff -r 56990bf9a9c4 -r 6d6e92da0364 src/share/native/com/sun/media/sound/SoundDefs.h
--- a/src/share/native/com/sun/media/sound/SoundDefs.h Tue May 16 18:03:40 2017 +0100
+++ b/src/share/native/com/sun/media/sound/SoundDefs.h Tue Jul 11 03:45:17 2017 +0100
@@ -53,6 +53,7 @@
#define X_SH 16
#define X_AARCH64 17
#define X_PPC64LE 18
+#define X_AARCH32 19
// **********************************
// Make sure you set X_PLATFORM and X_ARCH defines correctly.
diff -r 56990bf9a9c4 -r 6d6e92da0364 src/solaris/bin/aarch32/jvm.cfg
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/src/solaris/bin/aarch32/jvm.cfg Tue Jul 11 03:45:17 2017 +0100
@@ -0,0 +1,34 @@
+# Copyright (c) 2015, 2015, Oracle and/or its affiliates. All rights reserved.
+# DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
+#
+# This code is free software; you can redistribute it and/or modify it
+# under the terms of the GNU General Public License version 2 only, as
+# published by the Free Software Foundation. Oracle designates this
+# particular file as subject to the "Classpath" exception as provided
+# by Oracle in the LICENSE file that accompanied this code.
+#
+# This code is distributed in the hope that it will be useful, but WITHOUT
+# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
+# FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
+# version 2 for more details (a copy is included in the LICENSE file that
+# accompanied this code).
+#
+# You should have received a copy of the GNU General Public License version
+# 2 along with this work; if not, write to the Free Software Foundation,
+# Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+#
+# Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
+# or visit www.oracle.com if you need additional information or have any
+# questions.
+#
+# List of JVMs that can be used as an option to java, javac, etc.
+# Order is important -- first in this list is the default JVM.
+# NOTE that this both this file and its format are UNSUPPORTED and
+# WILL GO AWAY in a future release.
+#
+# You may also select a JVM in an arbitrary location with the
+# "-XXaltjvm=<jvm_dir>" option, but that too is unsupported
+# and may not be available in a future release.
+#
+-server KNOWN
+-client IGNORE
More information about the distro-pkg-dev
mailing list