[Bug 3497] New: [IcedTea7] AArch64: Adapt to 8002074: Support for AES on SPARC

classic Classic list List threaded Threaded
4 messages Options
Reply | Threaded
Open this post in threaded view
|

[Bug 3497] New: [IcedTea7] AArch64: Adapt to 8002074: Support for AES on SPARC

bugzilla-daemon
Bug ID 3497
Summary [IcedTea7] AArch64: Adapt to 8002074: Support for AES on SPARC
Product IcedTea
Version 7-hg
Hardware aarch64
OS All
Status NEW
Severity normal
Priority P5
Component IcedTea
Assignee gnu.andrew@redhat.com
Reporter gnu.andrew@redhat.com
CC unassigned@icedtea.classpath.org

OpenJDK 7 u161 includes a backport of 8002074. As a result, the AArch64 port
needs to implement Matcher::pass_original_key_for_aes.

Linking launcher...
cc  -Xlinker -O1 -Wl,--hash-style=both  -Xlinker -z -Xlinker noexecstack 
-Xlinker -export-dynamic  -L `pwd` -o gamma launcher/java_md.o
launcher/wildcard.o launcher/java.o launcher/jli_util.o -ljvm -lm -ldl
-lpthread
/builddir/build/BUILD/java-1.7.0-openjdk-1.7.0.161-2.6.12.1.el7.aarch64/openjdk/build/linux-aarch64/hotspot/outputdir/linux_aarch64_compiler2/product/libjvm.so:
undefined reference to `Matcher::pass_original_key_for_aes()'
collect2: error: ld returned 1 exit status
make[6]: *** [gamma] Error 1


You are receiving this mail because:
  • You are on the CC list for the bug.
Reply | Threaded
Open this post in threaded view
|

[Bug 3497] [IcedTea7] AArch64: Adapt to 8002074: Support for AES on SPARC

bugzilla-daemon
[hidden email] changed bug 3497
What Removed Added
Status NEW ASSIGNED
Target Milestone --- 2.6.12


You are receiving this mail because:
  • You are on the CC list for the bug.
Reply | Threaded
Open this post in threaded view
|

[Bug 3497] [IcedTea7] AArch64: Adapt to 8002074: Support for AES on SPARC

bugzilla-daemon
In reply to this post by bugzilla-daemon

Comment # 1 on bug 3497 from [hidden email]
details:
http://icedtea.classpath.org//hg/release/icedtea7-forest-2.6/hotspot?cmd=changeset;node=bccc53c13c22
author: andrew
date: Tue Nov 28 03:52:13 2017 +0000

    PR3497: AArch64: Adapt to 8002074: Support for AES on SPARC


You are receiving this mail because:
  • You are on the CC list for the bug.
Reply | Threaded
Open this post in threaded view
|

[Bug 3497] [IcedTea7] AArch64: Adapt to 8002074: Support for AES on SPARC

bugzilla-daemon
In reply to this post by bugzilla-daemon

Comment # 2 on bug 3497 from [hidden email]
details:
http://icedtea.classpath.org//hg/release/icedtea7-2.6?cmd=changeset;node=484938987004
author: Andrew John Hughes <[hidden email]>
date: Tue Dec 05 19:25:17 2017 +0000

    Bump to 2.6.12.

    Upstream changes:
      - Bump to icedtea-2.6.12
      - PR3497: AArch64: Adapt to 8002074: Support for AES on SPARC
      - S6475361: Attempting to remove help menu from java.awt.MenuBar throws
NullPointerException
      - S6637288: Add OCSP support to PKIX CertPathBuilder implementation
      - S6854712: Revocation checking enhancements (JEP-124)
      - S6904367: (coll) IdentityHashMap is resized before exceeding the
expected maximum size
      - S7015157: String "Tabular Navigation" should be rephrased for avoiding
mistranslation
      - S7115744: Do not call File::deleteOnExit in security tests
      - S7126011: ReverseBuilder.getMatchingCACerts may throws NPE
      - S7147336: clarification on warning of keytool -printcrl
      - S7162687: enhance KDC server availability detection
      - S7176627: CertPath/jep124/PreferCRL_SoftFail test fails (Could not
determine revocation status)
      - S7195409: CertPath/CertPathValidatorTest/KeyParamsInheritanceTest fails
with NullPointerException
      - S7196382: PKCS11 provider should support 2048-bit DH
      - S7197672: There are issues with shared data on windows
      - S7199939: DSA 576 and 640 bit keys fail when initializing for No
precomputed parameters
      - S8002074: Support for AES on SPARC
      - S8005408: KeyStore API enhancements
      - S8006863: javadoc cleanup for 8005408
      - S8006946: PKCS12 test failure due to incorrect alias name
      - S8006951: Avoid storing duplicate PKCS12 attributes
      - S8006994: Cleanup PKCS12 tests to ensure streams get closed
      - S8007483: attributes are ignored when loading keys from a PKCS12
keystore
      - S8007967: Infinite loop can happen in
sun.security.provider.certpath.SunCertPathBuilder.depthFirstSearchForward()
      - S8010112: NullPointerException in
sun.security.provider.certpath.CertId()
      - S8012900: CICO ignores AAD in GCM mode (with refactoring from 6996769)
      - S8015571: OCSP validation fails if ocsp.responderCertSubjectName is set
      - S8016252: More defensive HashSet.readObject
      - S8025215: jdk8 l10n resource file translation update 4
      - S8026943: SQE test jce/Global/Cipher/SameBuffer failed
      - S8027575: b113 causing a lot of memory allocation and regression for
wls_webapp_atomics
      - S8029659: Keytool, print key algorithm of certificate or key entry
      - S8029788: Certificate validation - java.lang.ClassCastException
      - S8031825: OCSP client can't find responder cert if it uses a different
subject key id algorithm than responderID
      - S8033117: PPC64: Adapt to 8002074: Support for AES on SPARC
      - S8035623: [parfait] JNI exception pending in
jdk/src/windows/native/sun/windows/awt_Font.cpp
      - S8035640: JNU_CHECK_EXCEPTION should support c++ JNI syntax
      - S8049312: AES/CICO test failed with on several modes
      - S8050374: More Signature tests
      - S8057810: New defaults for DSA keys in jarsigner and keytool
      - S8062552: Support keystore type detection for JKS and PKCS12 keystores
      - S8068427: Hashtable deserialization reconstitutes table with wrong
capacity
      - S8068881: SIGBUS in C2 compiled method
weblogic.wsee.jaxws.framework.jaxrpc.EnvironmentFactory$SimulatedWsdlDefinitions.<init>
      - S8075484: SocketInputStream.socketRead0 can hang even with soTimeout
set
      - S8077670: sun/security/krb5/auto/MaxRetries.java may fail with
BindException
      - S8078331: Upgrade JDK to use LittleCMS 2.7
      - S8079129: NullPointerException in PKCS#12 Keystore in
PKCS12KeyStore.java
      - S8087144: sun/security/krb5/auto/MaxRetries.java fails with Retry count
is -1 less
      - S8136534: Loading JKS keystore using non-null InputStream results in
closed stream
      - S8149411: PKCS12KeyStore cannot extract AES Secret Keys
      - S8153146: sun/security/krb5/auto/MaxRetries.java failed with timeout
      - S8157561: Ship the unlimited policy files in JDK Updates
      - S8158517: Minor optimizations to ISO10126PADDING
      - S8164846: CertificateException missing cause of underlying exception
      - S8165543: Better window framing
      - S8165751: NPE hit with java.security.debug=provider
      - S8169026: Handle smartcard clean up better
      - S8169966: Larger AWT menus
      - S8170218: Improved Font Metrics
      - S8171252: Improve exception checking
      - S8171261: Stability fixes for lcms
      - S8171319: keytool should print out warnings when reading or generating
cert/cert req using weak algorithms
      - S8173853: IllegalArgumentException in
java.awt.image.ReplicateScaleFilter
      - S8174109: Better queuing priorities
      - S8174966: Unreferenced references
      - S8175940: More certificate subject checking
      - S8176536: Improved algorithm constraints checking
      - S8176751: Better URL connections
      - S8177569: keytool should not warn if signature algorithm used in
cacerts is weak
      - S8178714: PKIX validator nameConstraints check failing after change
8175940
      - S8178794: Correct Kerberos ticket grants
      - S8179084: HotSpot VM fails to start when AggressiveHeap is set
      - S8179101: Improve algorithm constraints implementation
      - S8179423: 2 security tests started failing for JDK 1.6.0 u161 b05
      - S8179564: Missing @bug for tests added with JDK-8165367
      - S8179998: Clear certificate chain connections
      - S8180024: Improve construction of objects during deserialization
      - S8180711: Better invokespecial checks
      - S8181048: Refactor existing providers to refer to the same constants
for default values for key length
      - S8181100: Better Base Exceptions
      - S8181323: Better timezone processing
      - S8181327: Better X processing
      - S8181370: Better keystore handling
      - S8181432: Better processing of unresolved permissions
      - S8181597: Process Proxy presentation
      - S8181612: More stable connection processing
      - S8181692: Update storage implementations
      - S8182879: Add warnings to keytool when using JKS and JCEKS
      - S8183028: Improve CMS header processing
      - S8184673: Fix compatibility issue in AlgorithmChecker for 3rd party JCE
providers
      - S8184682: Upgrade compression library
      - S8184937: LCMS error 13: Couldn't link the profiles
      - S8185039: Incorrect GPL header causes RE script to miss swap to
commercial header for licensee source bundle
      - S8185040: Incorrect GPL header causes RE script to miss swap to
commercial header for licensee source bundle
      - S8185778: 8u151 L10n resource file update
      - S8185845: Add SecurityTools.java test library
      - S8186503: sun/security/tools/jarsigner/DefaultSigalg.java failed after
backport to JDK 6/7/8
      - S8186533: 8u151 L10n resource file update md20
      - S8191137: keytool fails to format resource strings for keys for some
languages after JDK-8171319
      - S8191840: Update localizations with positional arguments following
JDK-8191137
      - S8191845: [TEST_BUG] Too many new-lines in backport of WeakAlg test

    ChangeLog:

    2017-12-05  Andrew John Hughes  <[hidden email]>

        Bump to 2.6.12.
        * Makefile.am,
        (JDK_UPDATE_VERSION): Bump to 161.
        (CORBA_CHANGESET): Update to icedtea-2.6.12.
        (JAXP_CHANGESET): Likewise.
        (JAXWS_CHANGESET): Likewise.
        (JDK_CHANGESET): Likewise.
        (LANGTOOLS_CHANGESET): Likewise.
        (OPENJDK_CHANGESET): Likewise.
        (CORBA_SHA256SUM): Likewise.
        (JAXP_SHA256SUM): Likewise.
        (JAXWS_SHA256SUM): Likewise.
        (JDK_SHA256SUM): Likewise.
        (LANGTOOLS_SHA256SUM): Likewise.
        (OPENJDK_SHA256SUM): Likewise.
        (install-data-local): Install policy JAR files into new
        policy directories.
        * NEWS: Updated.
        * configure.ac: Bump to 2.6.12.
        * hotspot.map.in: Update to icedtea-2.6.12.
        * patches/boot/ecj-diamond.patch:
        Regenerated. Add new instances in
        com.sun.corba.se.impl.io.ObjectStreamClass,
        com.sun.xml.internal.ws.util.exception.JAXWSExceptionBase,
        java.io.ObjectStreamClass,
        java.security.cert.CertificateRevokedException,
        java.security.KeyStore, java.security.UnresolvedPermission,
        sun.security.pkcs.SignerInfo, sun.security.pkcs12.PKCS12KeyStore,
        sun.security.provider.certpath.AdjacencyList,
        sun.security.provider.certpath.Builder,
        sun.security.provider.certpath.CollectionCertStore,
        sun.security.provider.certpath.DistributionPointFetcher,
        sun.security.provider.certpath.ForwardBuilder,
        sun.security.provider.certpath.IndexedCollectionCertStore,
        sun.security.provider.certpath.OCSPResponse,
        sun.security.provider.certpath.PKIXCertPathValidator,
        sun.security.provider.certpath.PKIX,
        sun.security.provider.certpath.PKIXRevocationChecker,
        sun.security.provider.certpath.PolicyChecker,
        sun.security.provider.certpath.PolicyNodeImpl,
        sun.security.provider.certpath.ReverseBuilder,
        sun.security.provider.certpath.ReverseState,
        sun.security.provider.certpath.RevocationChecker,
        sun.security.provider.certpath.SunCertPathBuilder,
        sun.security.provider.certpath.X509CertPath,
        sun.security.tools.keytool.Main,
        sun.security.util.DisabledAlgorithmConstraints and
        sun.security.util.SignatureFileVerifier
        * patches/boot/ecj-multicatch.patch:
        Regenerated. Add new cases in
        com.sun.corba.se.impl.io.ObjectStreamClass,
        java.io.ObjectStreamClass,
        sun.security.provider.certpath.CertStoreHelper,
        sun.security.provider.certpath.DistributionPointFetcher,
        sun.security.provider.certpath.OCSP,
        sun.security.provider.certpath.OCSPResponse,
        sun.security.provider.certpath.PKIXCertPathValidator,
        sun.security.provider.certpath.RevocationChecker,
        sun.security.provider.certpath.SunCertPathBuilder,
        sun.security.provider.certpath.URICertStore and
        sun.security.provider.KeyStoreDelegator.
        * patches/boot/ecj-stringswitch.patch:
        Add new cases in
        sun.security.util.DisabledAlgorithmConstraints,
        sun.security.provider.certpath.CertStoreHelper and
        sun.security.provider.certpath.RevocationChecker.
        * patches/boot/ecj-trywithresources.patch:
        Add new cases in sun.security.krb5.KdcComm and
        sun.security.tools.keytool.Main.
        * patches/boot/ecj-underscored_literals.patch:
        Add new case in sun.net.ftp.impl.FtpClient.
        * remove-intree-libraries.sh.in:
        Remove ZLIB_VERSION and its use in the ZIP_SRC path,
        as the source tree path is now unversioned.


You are receiving this mail because:
  • You are on the CC list for the bug.