[9] RFR: 8130875 Out of memory when using TLS_RSA_WITH_AES_128_GCM_SHA256

Valerie Peng valerie.peng at oracle.com
Wed Sep 2 20:45:34 UTC 2015

Can someone help review this java workaround for Solaris memory leak bug 
in Ucrypto library?
Essentially, the memory leak occurs when a null output buffer is 
specified when doing encryption/decryption.
So, the workaround in OracleUcrypto provider is to use non-null output 

Webrev: http://cr.openjdk.java.net/~valeriep/8130875/webrev.00/

The fix is verified by running a program for a while and observe the 
memory usage.

More information about the security-dev mailing list