/hg/release/icedtea7-2.6: Bump to 2.6.12.

classic Classic list List threaded Threaded
1 message Options
Reply | Threaded
Open this post in threaded view
|

/hg/release/icedtea7-2.6: Bump to 2.6.12.

andrew-127
changeset 484938987004 in /hg/release/icedtea7-2.6
details: http://icedtea.classpath.org/hg/release/icedtea7-2.6?cmd=changeset;node=484938987004
author: Andrew John Hughes <[hidden email]>
date: Tue Dec 05 19:25:17 2017 +0000

        Bump to 2.6.12.

        Upstream changes:
          - Bump to icedtea-2.6.12
          - PR3497: AArch64: Adapt to 8002074: Support for AES on SPARC
          - S6475361: Attempting to remove help menu from java.awt.MenuBar throws NullPointerException
          - S6637288: Add OCSP support to PKIX CertPathBuilder implementation
          - S6854712: Revocation checking enhancements (JEP-124)
          - S6904367: (coll) IdentityHashMap is resized before exceeding the expected maximum size
          - S7015157: String "Tabular Navigation" should be rephrased for avoiding mistranslation
          - S7115744: Do not call File::deleteOnExit in security tests
          - S7126011: ReverseBuilder.getMatchingCACerts may throws NPE
          - S7147336: clarification on warning of keytool -printcrl
          - S7162687: enhance KDC server availability detection
          - S7176627: CertPath/jep124/PreferCRL_SoftFail test fails (Could not determine revocation status)
          - S7195409: CertPath/CertPathValidatorTest/KeyParamsInheritanceTest fails with NullPointerException
          - S7196382: PKCS11 provider should support 2048-bit DH
          - S7197672: There are issues with shared data on windows
          - S7199939: DSA 576 and 640 bit keys fail when initializing for No precomputed parameters
          - S8002074: Support for AES on SPARC
          - S8005408: KeyStore API enhancements
          - S8006863: javadoc cleanup for 8005408
          - S8006946: PKCS12 test failure due to incorrect alias name
          - S8006951: Avoid storing duplicate PKCS12 attributes
          - S8006994: Cleanup PKCS12 tests to ensure streams get closed
          - S8007483: attributes are ignored when loading keys from a PKCS12 keystore
          - S8007967: Infinite loop can happen in sun.security.provider.certpath.SunCertPathBuilder.depthFirstSearchForward()
          - S8010112: NullPointerException in sun.security.provider.certpath.CertId()
          - S8012900: CICO ignores AAD in GCM mode (with refactoring from 6996769)
          - S8015571: OCSP validation fails if ocsp.responderCertSubjectName is set
          - S8016252: More defensive HashSet.readObject
          - S8025215: jdk8 l10n resource file translation update 4
          - S8026943: SQE test jce/Global/Cipher/SameBuffer failed
          - S8027575: b113 causing a lot of memory allocation and regression for wls_webapp_atomics
          - S8029659: Keytool, print key algorithm of certificate or key entry
          - S8029788: Certificate validation - java.lang.ClassCastException
          - S8031825: OCSP client can't find responder cert if it uses a different subject key id algorithm than responderID
          - S8033117: PPC64: Adapt to 8002074: Support for AES on SPARC
          - S8035623: [parfait] JNI exception pending in jdk/src/windows/native/sun/windows/awt_Font.cpp
          - S8035640: JNU_CHECK_EXCEPTION should support c++ JNI syntax
          - S8049312: AES/CICO test failed with on several modes
          - S8050374: More Signature tests
          - S8057810: New defaults for DSA keys in jarsigner and keytool
          - S8062552: Support keystore type detection for JKS and PKCS12 keystores
          - S8068427: Hashtable deserialization reconstitutes table with wrong capacity
          - S8068881: SIGBUS in C2 compiled method weblogic.wsee.jaxws.framework.jaxrpc.EnvironmentFactory$SimulatedWsdlDefinitions.<init>
          - S8075484: SocketInputStream.socketRead0 can hang even with soTimeout set
          - S8077670: sun/security/krb5/auto/MaxRetries.java may fail with BindException
          - S8078331: Upgrade JDK to use LittleCMS 2.7
          - S8079129: NullPointerException in PKCS#12 Keystore in PKCS12KeyStore.java
          - S8087144: sun/security/krb5/auto/MaxRetries.java fails with Retry count is -1 less
          - S8136534: Loading JKS keystore using non-null InputStream results in closed stream
          - S8149411: PKCS12KeyStore cannot extract AES Secret Keys
          - S8153146: sun/security/krb5/auto/MaxRetries.java failed with timeout
          - S8157561: Ship the unlimited policy files in JDK Updates
          - S8158517: Minor optimizations to ISO10126PADDING
          - S8164846: CertificateException missing cause of underlying exception
          - S8165543: Better window framing
          - S8165751: NPE hit with java.security.debug=provider
          - S8169026: Handle smartcard clean up better
          - S8169966: Larger AWT menus
          - S8170218: Improved Font Metrics
          - S8171252: Improve exception checking
          - S8171261: Stability fixes for lcms
          - S8171319: keytool should print out warnings when reading or generating cert/cert req using weak algorithms
          - S8173853: IllegalArgumentException in java.awt.image.ReplicateScaleFilter
          - S8174109: Better queuing priorities
          - S8174966: Unreferenced references
          - S8175940: More certificate subject checking
          - S8176536: Improved algorithm constraints checking
          - S8176751: Better URL connections
          - S8177569: keytool should not warn if signature algorithm used in cacerts is weak
          - S8178714: PKIX validator nameConstraints check failing after change 8175940
          - S8178794: Correct Kerberos ticket grants
          - S8179084: HotSpot VM fails to start when AggressiveHeap is set
          - S8179101: Improve algorithm constraints implementation
          - S8179423: 2 security tests started failing for JDK 1.6.0 u161 b05
          - S8179564: Missing @bug for tests added with JDK-8165367
          - S8179998: Clear certificate chain connections
          - S8180024: Improve construction of objects during deserialization
          - S8180711: Better invokespecial checks
          - S8181048: Refactor existing providers to refer to the same constants for default values for key length
          - S8181100: Better Base Exceptions
          - S8181323: Better timezone processing
          - S8181327: Better X processing
          - S8181370: Better keystore handling
          - S8181432: Better processing of unresolved permissions
          - S8181597: Process Proxy presentation
          - S8181612: More stable connection processing
          - S8181692: Update storage implementations
          - S8182879: Add warnings to keytool when using JKS and JCEKS
          - S8183028: Improve CMS header processing
          - S8184673: Fix compatibility issue in AlgorithmChecker for 3rd party JCE providers
          - S8184682: Upgrade compression library
          - S8184937: LCMS error 13: Couldn't link the profiles
          - S8185039: Incorrect GPL header causes RE script to miss swap to commercial header for licensee source bundle
          - S8185040: Incorrect GPL header causes RE script to miss swap to commercial header for licensee source bundle
          - S8185778: 8u151 L10n resource file update
          - S8185845: Add SecurityTools.java test library
          - S8186503: sun/security/tools/jarsigner/DefaultSigalg.java failed after backport to JDK 6/7/8
          - S8186533: 8u151 L10n resource file update md20
          - S8191137: keytool fails to format resource strings for keys for some languages after JDK-8171319
          - S8191840: Update localizations with positional arguments following JDK-8191137
          - S8191845: [TEST_BUG] Too many new-lines in backport of WeakAlg test

        ChangeLog:

        2017-12-05  Andrew John Hughes  <[hidden email]>

                Bump to 2.6.12.
                * Makefile.am,
                (JDK_UPDATE_VERSION): Bump to 161.
                (CORBA_CHANGESET): Update to icedtea-2.6.12.
                (JAXP_CHANGESET): Likewise.
                (JAXWS_CHANGESET): Likewise.
                (JDK_CHANGESET): Likewise.
                (LANGTOOLS_CHANGESET): Likewise.
                (OPENJDK_CHANGESET): Likewise.
                (CORBA_SHA256SUM): Likewise.
                (JAXP_SHA256SUM): Likewise.
                (JAXWS_SHA256SUM): Likewise.
                (JDK_SHA256SUM): Likewise.
                (LANGTOOLS_SHA256SUM): Likewise.
                (OPENJDK_SHA256SUM): Likewise.
                (install-data-local): Install policy JAR files into new
                policy directories.
                * NEWS: Updated.
                * configure.ac: Bump to 2.6.12.
                * hotspot.map.in: Update to icedtea-2.6.12.
                * patches/boot/ecj-diamond.patch:
                Regenerated. Add new instances in
                com.sun.corba.se.impl.io.ObjectStreamClass,
                com.sun.xml.internal.ws.util.exception.JAXWSExceptionBase,
                java.io.ObjectStreamClass,
                java.security.cert.CertificateRevokedException,
                java.security.KeyStore, java.security.UnresolvedPermission,
                sun.security.pkcs.SignerInfo, sun.security.pkcs12.PKCS12KeyStore,
                sun.security.provider.certpath.AdjacencyList,
                sun.security.provider.certpath.Builder,
                sun.security.provider.certpath.CollectionCertStore,
                sun.security.provider.certpath.DistributionPointFetcher,
                sun.security.provider.certpath.ForwardBuilder,
                sun.security.provider.certpath.IndexedCollectionCertStore,
                sun.security.provider.certpath.OCSPResponse,
                sun.security.provider.certpath.PKIXCertPathValidator,
                sun.security.provider.certpath.PKIX,
                sun.security.provider.certpath.PKIXRevocationChecker,
                sun.security.provider.certpath.PolicyChecker,
                sun.security.provider.certpath.PolicyNodeImpl,
                sun.security.provider.certpath.ReverseBuilder,
                sun.security.provider.certpath.ReverseState,
                sun.security.provider.certpath.RevocationChecker,
                sun.security.provider.certpath.SunCertPathBuilder,
                sun.security.provider.certpath.X509CertPath,
                sun.security.tools.keytool.Main,
                sun.security.util.DisabledAlgorithmConstraints and
                sun.security.util.SignatureFileVerifier
                * patches/boot/ecj-multicatch.patch:
                Regenerated. Add new cases in
                com.sun.corba.se.impl.io.ObjectStreamClass,
                java.io.ObjectStreamClass,
                sun.security.provider.certpath.CertStoreHelper,
                sun.security.provider.certpath.DistributionPointFetcher,
                sun.security.provider.certpath.OCSP,
                sun.security.provider.certpath.OCSPResponse,
                sun.security.provider.certpath.PKIXCertPathValidator,
                sun.security.provider.certpath.RevocationChecker,
                sun.security.provider.certpath.SunCertPathBuilder,
                sun.security.provider.certpath.URICertStore and
                sun.security.provider.KeyStoreDelegator.
                * patches/boot/ecj-stringswitch.patch:
                Add new cases in
                sun.security.util.DisabledAlgorithmConstraints,
                sun.security.provider.certpath.CertStoreHelper and
                sun.security.provider.certpath.RevocationChecker.
                * patches/boot/ecj-trywithresources.patch:
                Add new cases in sun.security.krb5.KdcComm and
                sun.security.tools.keytool.Main.
                * patches/boot/ecj-underscored_literals.patch:
                Add new case in sun.net.ftp.impl.FtpClient.
                * remove-intree-libraries.sh.in:
                Remove ZLIB_VERSION and its use in the ZIP_SRC path,
                as the source tree path is now unversioned.


diffstat:

 ChangeLog                                   |    77 +
 Makefile.am                                 |    35 +-
 NEWS                                        |   102 +-
 configure.ac                                |     2 +-
 hotspot.map.in                              |     2 +-
 patches/boot/ecj-diamond.patch              |  2653 +++++++++++++++++---------
 patches/boot/ecj-multicatch.patch           |  1230 +++++++----
 patches/boot/ecj-stringswitch.patch         |   185 +-
 patches/boot/ecj-trywithresources.patch     |    52 +
 patches/boot/ecj-underscored_literals.patch |    13 +
 remove-intree-libraries.sh.in               |     3 +-
 11 files changed, 2881 insertions(+), 1473 deletions(-)

diffs (truncated from 8218 to 500 lines):

diff -r 3e43308fe36f -r 484938987004 ChangeLog
--- a/ChangeLog Thu Nov 23 19:56:36 2017 +0000
+++ b/ChangeLog Tue Dec 05 19:25:17 2017 +0000
@@ -1,3 +1,80 @@
+2017-12-05  Andrew John Hughes  <[hidden email]>
+
+ Bump to 2.6.12.
+ * Makefile.am,
+ (JDK_UPDATE_VERSION): Bump to 161.
+ (CORBA_CHANGESET): Update to icedtea-2.6.12.
+ (JAXP_CHANGESET): Likewise.
+ (JAXWS_CHANGESET): Likewise.
+ (JDK_CHANGESET): Likewise.
+ (LANGTOOLS_CHANGESET): Likewise.
+ (OPENJDK_CHANGESET): Likewise.
+ (CORBA_SHA256SUM): Likewise.
+ (JAXP_SHA256SUM): Likewise.
+ (JAXWS_SHA256SUM): Likewise.
+ (JDK_SHA256SUM): Likewise.
+ (LANGTOOLS_SHA256SUM): Likewise.
+ (OPENJDK_SHA256SUM): Likewise.
+ (install-data-local): Install policy JAR files into new
+ policy directories.
+ * NEWS: Updated.
+ * configure.ac: Bump to 2.6.12.
+ * hotspot.map.in: Update to icedtea-2.6.12.
+ * patches/boot/ecj-diamond.patch:
+ Regenerated. Add new instances in
+ com.sun.corba.se.impl.io.ObjectStreamClass,
+ com.sun.xml.internal.ws.util.exception.JAXWSExceptionBase,
+ java.io.ObjectStreamClass,
+ java.security.cert.CertificateRevokedException,
+ java.security.KeyStore, java.security.UnresolvedPermission,
+ sun.security.pkcs.SignerInfo, sun.security.pkcs12.PKCS12KeyStore,
+ sun.security.provider.certpath.AdjacencyList,
+ sun.security.provider.certpath.Builder,
+ sun.security.provider.certpath.CollectionCertStore,
+ sun.security.provider.certpath.DistributionPointFetcher,
+ sun.security.provider.certpath.ForwardBuilder,
+ sun.security.provider.certpath.IndexedCollectionCertStore,
+ sun.security.provider.certpath.OCSPResponse,
+ sun.security.provider.certpath.PKIXCertPathValidator,
+ sun.security.provider.certpath.PKIX,
+ sun.security.provider.certpath.PKIXRevocationChecker,
+ sun.security.provider.certpath.PolicyChecker,
+ sun.security.provider.certpath.PolicyNodeImpl,
+ sun.security.provider.certpath.ReverseBuilder,
+ sun.security.provider.certpath.ReverseState,
+ sun.security.provider.certpath.RevocationChecker,
+ sun.security.provider.certpath.SunCertPathBuilder,
+ sun.security.provider.certpath.X509CertPath,
+ sun.security.tools.keytool.Main,
+ sun.security.util.DisabledAlgorithmConstraints and
+ sun.security.util.SignatureFileVerifier
+ * patches/boot/ecj-multicatch.patch:
+ Regenerated. Add new cases in
+ com.sun.corba.se.impl.io.ObjectStreamClass,
+ java.io.ObjectStreamClass,
+ sun.security.provider.certpath.CertStoreHelper,
+ sun.security.provider.certpath.DistributionPointFetcher,
+ sun.security.provider.certpath.OCSP,
+ sun.security.provider.certpath.OCSPResponse,
+ sun.security.provider.certpath.PKIXCertPathValidator,
+ sun.security.provider.certpath.RevocationChecker,
+ sun.security.provider.certpath.SunCertPathBuilder,
+ sun.security.provider.certpath.URICertStore and
+ sun.security.provider.KeyStoreDelegator.
+ * patches/boot/ecj-stringswitch.patch:
+ Add new cases in
+ sun.security.util.DisabledAlgorithmConstraints,
+ sun.security.provider.certpath.CertStoreHelper and
+ sun.security.provider.certpath.RevocationChecker.
+ * patches/boot/ecj-trywithresources.patch:
+ Add new cases in sun.security.krb5.KdcComm and
+ sun.security.tools.keytool.Main.
+ * patches/boot/ecj-underscored_literals.patch:
+ Add new case in sun.net.ftp.impl.FtpClient.
+ * remove-intree-libraries.sh.in:
+ Remove ZLIB_VERSION and its use in the ZIP_SRC path,
+ as the source tree path is now unversioned.
+
 2017-10-16  Andrew John Hughes  <[hidden email]>
 
  PR3470: Hotspot object_alloc tapset uses HeapWordSize incorrectly
diff -r 3e43308fe36f -r 484938987004 Makefile.am
--- a/Makefile.am Thu Nov 23 19:56:36 2017 +0000
+++ b/Makefile.am Tue Dec 05 19:25:17 2017 +0000
@@ -1,22 +1,22 @@
 # Dependencies
 
-JDK_UPDATE_VERSION = 151
+JDK_UPDATE_VERSION = 161
 BUILD_VERSION = b01
 COMBINED_VERSION = $(JDK_UPDATE_VERSION)-$(BUILD_VERSION)
 
-CORBA_CHANGESET = a7f8705b50f5
-JAXP_CHANGESET = 968b46df5f0e
-JAXWS_CHANGESET = 3e70a6a17fa9
-JDK_CHANGESET = 8563ea7f9be7
-LANGTOOLS_CHANGESET = e24f25323b84
-OPENJDK_CHANGESET = f53c56dda663
-
-CORBA_SHA256SUM = 5a21448c8bb7c13acacd92423fce72ea88cbb20f1828ded35a2a113b5be3280c
-JAXP_SHA256SUM = 73a0e3fa08d5ea944d7a59f153648a78a1f7f5da19d0c0a5f7cf4012658e2041
-JAXWS_SHA256SUM = e5a17d7d1a991a23d64b80f5fabb4000cf8eed9bb744eeba6ae4c0f6d767c4a6
-JDK_SHA256SUM = 79a61166781e0f27477879d3ea90350b45f47a4360a8325ba814b976864ef88d
-LANGTOOLS_SHA256SUM = e37c671c765de82c19b94fd43b738dbd4d4a7ba23e18903037ba670cc1f85792
-OPENJDK_SHA256SUM = 05d0ea6a60a442eec7bff798840248fd113ab1ad6b89c91bc52e1695ab2d156d
+CORBA_CHANGESET = e759d9a6a7b2
+JAXP_CHANGESET = 1981a623381f
+JAXWS_CHANGESET = 40c37fd3e5cb
+JDK_CHANGESET = a499de02da5a
+LANGTOOLS_CHANGESET = b87dbe0db6aa
+OPENJDK_CHANGESET = 7d977b31457d
+
+CORBA_SHA256SUM = 1e433c3ff7c640c2dd1a0288af7b39531052ed09ee24ab8515bc16ea1db21bde
+JAXP_SHA256SUM = 859719afde1e29fcd1349d78050873c3da159e6bd8f9041d6742395ba9d19548
+JAXWS_SHA256SUM = 2fb7fb74c19a0c870a17edcebeeca4bb82113209b36d98864ec29e398e6c4d27
+JDK_SHA256SUM = e77af4a7f719887df7664d1470041d7b7c7bc40cb808e1f5ac5c7b8efe370961
+LANGTOOLS_SHA256SUM = 0cdb357aa069b37a4a5a4ab5afb24474f1d3e441702aa26352a446c69c67315a
+OPENJDK_SHA256SUM = 82e25192b2062f2974af06c434b995dcc185ae93cd78fb057cd1be169d1d0e97
 
 DROP_URL = http://icedtea.classpath.org/download/drops
 
@@ -3324,8 +3324,11 @@
   $(DESTDIR)${prefix}/jre/lib/security
  $(INSTALL_DATA) $(BUILD_SDK_DIR)/jre/lib/security/blacklisted.certs \
   $(DESTDIR)${prefix}/jre/lib/security
- for files in $(BUILD_SDK_DIR)/jre/lib/security/*.jar; do \
-  $(call install_file,$${files},$(DESTDIR)${prefix}/jre/lib/security,$(INSTALL_DATA)) ; \
+ for policies in limited unlimited; do \
+  ${mkinstalldirs} $(DESTDIR)${prefix}/jre/lib/security/policy/$${policies} ; \
+  for files in $(BUILD_SDK_DIR)/jre/lib/security/policy/$${policies}/*.jar; do \
+    $(call install_file,$${files},$(DESTDIR)${prefix}/jre/lib/security/policy/$${policies},$(INSTALL_DATA)); \
+  done ; \
  done
  for items in $(BUILD_SDK_DIR)/jre/lib/zi/*; do \
   cp -RP $${items} $(DESTDIR)${prefix}/jre/lib/zi ; \
diff -r 3e43308fe36f -r 484938987004 NEWS
--- a/NEWS Thu Nov 23 19:56:36 2017 +0000
+++ b/NEWS Tue Dec 05 19:25:17 2017 +0000
@@ -14,8 +14,107 @@
 
 New in release 2.6.12 (2017-10-XX):
 
+* Security fixes
+  - S8165543: Better window framing
+  - S8169026, CVE-2017-10274: Handle smartcard clean up better
+  - S8169966: Larger AWT menus
+  - S8170218: Improved Font Metrics
+  - S8171252: Improve exception checking
+  - S8171261: Stability fixes for lcms
+  - S8174109, CVE-2017-10281: Better queuing priorities
+  - S8174966, CVE-2017-10285: Unreferenced references
+  - S8175940: More certificate subject checking
+  - S8176751, CVE-2017-10295: Better URL connections
+  - S8178794, CVE-2017-10388: Correct Kerberos ticket grants
+  - S8179101, CVE-2017-10193: Improve algorithm constraints implementation
+  - S8179998, CVE-2017-10198: Clear certificate chain connections
+  - S8180024: Improve construction of objects during deserialization
+  - S8180711, CVE-2017-10346: Better invokespecial checks
+  - S8181100, CVE-2017-10350: Better Base Exceptions
+  - S8181323, CVE-2017-10347: Better timezone processing
+  - S8181327, CVE-2017-10349: Better X processing
+  - S8181370, CVE-2017-10345: Better keystore handling
+  - S8181432, CVE-2017-10348: Better processing of unresolved permissions
+  - S8181597, CVE-2017-10357: Process Proxy presentation
+  - S8181612, CVE-2017-10355: More stable connection processing
+  - S8181692, CVE-2017-10356: Update storage implementations
+  - S8183028, CVE-2016-10165: Improve CMS header processing
+  - S8184682, CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843: Upgrade compression library
+* Import of OpenJDK 7 u161 build 0
+  - S6475361: Attempting to remove help menu from java.awt.MenuBar throws NullPointerException
+  - S6637288: Add OCSP support to PKIX CertPathBuilder implementation
+  - S6854712: Revocation checking enhancements (JEP-124)
+  - S6904367: (coll) IdentityHashMap is resized before exceeding the expected maximum size
+  - S7015157: String "Tabular Navigation" should be rephrased for avoiding mistranslation
+  - S7115744: Do not call File::deleteOnExit in security tests
+  - S7126011: ReverseBuilder.getMatchingCACerts may throws NPE
+  - S7147336: clarification on warning of keytool -printcrl
+  - S7162687: enhance KDC server availability detection
+  - S7176627: CertPath/jep124/PreferCRL_SoftFail test fails (Could not determine revocation status)
+  - S7195409: CertPath/CertPathValidatorTest/KeyParamsInheritanceTest fails with NullPointerException
+  - S7196382: PKCS11 provider should support 2048-bit DH
+  - S7197672: There are issues with shared data on windows
+  - S7199939: DSA 576 and 640 bit keys fail when initializing for No precomputed parameters
+  - S8002074: Support for AES on SPARC
+  - S8005408: KeyStore API enhancements
+  - S8006863: javadoc cleanup for 8005408
+  - S8006946: PKCS12 test failure due to incorrect alias name
+  - S8006951: Avoid storing duplicate PKCS12 attributes
+  - S8006994: Cleanup PKCS12 tests to ensure streams get closed
+  - S8007483: attributes are ignored when loading keys from a PKCS12 keystore
+  - S8007967: Infinite loop can happen in sun.security.provider.certpath.SunCertPathBuilder.depthFirstSearchForward()
+  - S8010112: NullPointerException in sun.security.provider.certpath.CertId()
+  - S8012900: CICO ignores AAD in GCM mode (with refactoring from 6996769)
+  - S8015571: OCSP validation fails if ocsp.responderCertSubjectName is set
+  - S8016252: More defensive HashSet.readObject
+  - S8025215: jdk8 l10n resource file translation update 4
+  - S8026943: SQE test jce/Global/Cipher/SameBuffer failed
+  - S8027575: b113 causing a lot of memory allocation and regression for wls_webapp_atomics
+  - S8029659: Keytool, print key algorithm of certificate or key entry
+  - S8029788: Certificate validation - java.lang.ClassCastException
+  - S8031825: OCSP client can't find responder cert if it uses a different subject key id algorithm than responderID
+  - S8033117: PPC64: Adapt to 8002074: Support for AES on SPARC
+  - S8035623: [parfait] JNI exception pending in jdk/src/windows/native/sun/windows/awt_Font.cpp
+  - S8049312: AES/CICO test failed with on several modes
+  - S8050374: More Signature tests
+  - S8057810: New defaults for DSA keys in jarsigner and keytool
+  - S8062552: Support keystore type detection for JKS and PKCS12 keystores
+  - S8068427: Hashtable deserialization reconstitutes table with wrong capacity
+  - S8068881: SIGBUS in C2 compiled method weblogic.wsee.jaxws.framework.jaxrpc.EnvironmentFactory$SimulatedWsdlDefinitions.<init>
+  - S8075484, PR3474, RH1490713: SocketInputStream.socketRead0 can hang even with soTimeout set
+  - S8077670: sun/security/krb5/auto/MaxRetries.java may fail with BindException
+  - S8079129: NullPointerException in PKCS#12 Keystore in PKCS12KeyStore.java
+  - S8087144: sun/security/krb5/auto/MaxRetries.java fails with Retry count is -1 less
+  - S8136534: Loading JKS keystore using non-null InputStream results in closed stream
+  - S8149411: PKCS12KeyStore cannot extract AES Secret Keys
+  - S8153146: sun/security/krb5/auto/MaxRetries.java failed with timeout
+  - S8157561: Ship the unlimited policy files in JDK Updates
+  - S8158517: Minor optimizations to ISO10126PADDING
+  - S8164846: CertificateException missing cause of underlying exception
+  - S8165751: NPE hit with java.security.debug=provider
+  - S8171319: keytool should print out warnings when reading or generating cert/cert req using weak algorithms
+  - S8173853: IllegalArgumentException in java.awt.image.ReplicateScaleFilter
+  - S8176536: Improved algorithm constraints checking
+  - S8177569: keytool should not warn if signature algorithm used in cacerts is weak
+  - S8178714: PKIX validator nameConstraints check failing after change 8175940
+  - S8179423: 2 security tests started failing for JDK 1.6.0 u161 b05
+  - S8179564: Missing @bug for tests added with JDK-8165367
+  - S8181048: Refactor existing providers to refer to the same constants for default values for key length
+  - S8182879: Add warnings to keytool when using JKS and JCEKS
+  - S8184673: Fix compatibility issue in AlgorithmChecker for 3rd party JCE providers
+  - S8184937: LCMS error 13: Couldn't link the profiles
+  - S8185039: Incorrect GPL header causes RE script to miss swap to commercial header for licensee source bundle
+  - S8185040: Incorrect GPL header causes RE script to miss swap to commercial header for licensee source bundle
+  - S8185778: 8u151 L10n resource file update
+  - S8185845: Add SecurityTools.java test library
+  - S8186503: sun/security/tools/jarsigner/DefaultSigalg.java failed after backport to JDK 6/7/8
+  - S8186533: 8u151 L10n resource file update md20
+  - S8191137: keytool fails to format resource strings for keys for some languages after JDK-8171319
+  - S8191840: Update localizations with positional arguments following JDK-8191137
+  - S8191845: [TEST_BUG] Too many new-lines in backport of WeakAlg test
+* Import of OpenJDK 7 u151 build 1
+  - S8035640: JNU_CHECK_EXCEPTION should support c++ JNI syntax
 * Backports
-  - S8075484, PR3474, RH1490713: SocketInputStream.socketRead0 can hang even with soTimeout set
   - S8138745, PR3465, RH1484399: Implement ExitOnOutOfMemory and CrashOnOutOfMemory in HotSpot
   - S8185164, PR3433: GetOwnedMonitorInfo() returns incorrect owned monitor
   - S8188030, PR3460, RH1484079: AWT java apps fail to start when some minimal fonts are present
@@ -24,6 +123,7 @@
   - PR3480, RH1486025: ECC and NSS JVM crash
 * AArch64 port
   - S8145438, PR3443, RH1482244: Guarantee failures since 8144028: Use AArch64 bit-test instructions in C2
+  - PR3497: AArch64: Adapt to 8002074: Support for AES on SPARC
 
 New in release 2.6.11 (2017-08-08):
 
diff -r 3e43308fe36f -r 484938987004 configure.ac
--- a/configure.ac Thu Nov 23 19:56:36 2017 +0000
+++ b/configure.ac Tue Dec 05 19:25:17 2017 +0000
@@ -1,4 +1,4 @@
-AC_INIT([icedtea], [2.6.12pre01], [[hidden email]])
+AC_INIT([icedtea], [2.6.12], [[hidden email]])
 AM_INIT_AUTOMAKE([1.9 tar-pax foreign])
 AM_MAINTAINER_MODE([enable])
 AC_CONFIG_FILES([Makefile])
diff -r 3e43308fe36f -r 484938987004 hotspot.map.in
--- a/hotspot.map.in Thu Nov 23 19:56:36 2017 +0000
+++ b/hotspot.map.in Tue Dec 05 19:25:17 2017 +0000
@@ -1,2 +1,2 @@
 # version type(drop/hg) url changeset sha256sum
-default drop http://icedtea.classpath.org/download/drops/icedtea7/@ICEDTEA_RELEASE@ 9777e52ab513 f5d5fbba6a8109aaa7d76a000293e3537c2228a2a9a4a5a1e8d0ebe145e39a84
+default drop http://icedtea.classpath.org/download/drops/icedtea7/@ICEDTEA_RELEASE@ 7fe1098f101e dd3d1441d0b20ae2c45211cb9d296537e24a47a9048c34e6568e8fba201684cb
diff -r 3e43308fe36f -r 484938987004 patches/boot/ecj-diamond.patch
--- a/patches/boot/ecj-diamond.patch Thu Nov 23 19:56:36 2017 +0000
+++ b/patches/boot/ecj-diamond.patch Tue Dec 05 19:25:17 2017 +0000
@@ -1,6 +1,6 @@
 diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java
---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java 2017-08-03 23:28:06.555896022 +0100
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java 2017-12-02 04:30:06.060323180 +0000
 @@ -58,7 +58,7 @@
      private CorbaConnection conn;
 
@@ -10,9 +10,30 @@
 
      public static synchronized void cleanCache( ORB orb ) {
          synchronized (iorMapLock) {
+diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/ObjectStreamClass.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/ObjectStreamClass.java
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/ObjectStreamClass.java 2017-12-02 04:48:58.225985027 +0000
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/ObjectStreamClass.java 2017-12-02 04:49:49.017161985 +0000
+@@ -481,7 +481,7 @@
+             while (cls != fnscl) {
+                 ProtectionDomain pd = cls.getProtectionDomain();
+                 if (pd != null) {
+-                    if (pds == null) pds = new HashSet<>();
++                    if (pds == null) pds = new HashSet<ProtectionDomain>();
+                     pds.add(pd);
+                 }
+                 cls = cls.getSuperclass();
+@@ -489,7 +489,7 @@
+                     // that's not supposed to happen
+                     // make a ProtectionDomain with no permission.
+                     // should we throw instead?
+-                    if (pds == null) pds = new HashSet<>();
++                    if (pds == null) pds = new HashSet<ProtectionDomain>();
+                     else pds.clear();
+                     pds.add(noPermissionsDomain());
+                     break;
 diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java
---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java 2017-08-03 23:28:06.555896022 +0100
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java 2017-12-02 04:30:06.064323116 +0000
 @@ -50,7 +50,7 @@
       */
      private class HookPutFields extends ObjectOutputStream.PutField
@@ -23,8 +44,8 @@
          /**
           * Put the value of the named boolean field into the persistent field.
 diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java
---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java 2017-08-03 23:28:06.555896022 +0100
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java 2017-12-02 04:30:06.064323116 +0000
 @@ -1315,7 +1315,7 @@
      protected void shutdownServants(boolean wait_for_completion) {
          Set<ObjectAdapterFactory> oaset;
@@ -35,8 +56,8 @@
 
          for (ObjectAdapterFactory oaf : oaset)
 diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java
---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java 2017-08-03 23:28:06.555896022 +0100
+--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java 2017-12-02 04:30:06.064323116 +0000
 @@ -108,7 +108,7 @@
      private ThreadGroup threadGroup;
 
@@ -56,8 +77,8 @@
 
          for (WorkerThread wt : copy) {
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java 2017-08-03 23:28:06.555896022 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java 2017-12-02 04:30:06.064323116 +0000
 @@ -192,7 +192,7 @@
      NodeSet dist = new NodeSet();
      dist.setShouldCacheNodes(true);
@@ -68,8 +89,8 @@
      for (int i = 0; i < nl.getLength(); i++)
      {
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java 2017-08-03 23:28:06.555896022 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java 2017-12-02 04:30:06.064323116 +0000
 @@ -220,7 +220,7 @@
    public Map<String, Object> getEnvironmentHash()
    {
@@ -188,8 +209,8 @@
      jarVersions.put(new Long(440237), "xalan.jar from xalan-j_1_2");
      jarVersions.put(new Long(436094), "xalan.jar from xalan-j_1_2_1");
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java 2017-08-03 23:28:06.555896022 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java 2017-12-02 04:30:06.064323116 +0000
 @@ -51,7 +51,7 @@
      /**
       * Legal conversions between internal types.
@@ -200,8 +221,8 @@
      static {
          // Possible type conversions between internal types
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java 2017-08-03 23:28:06.555896022 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java 2017-12-02 04:30:06.064323116 +0000
 @@ -139,7 +139,7 @@
      private boolean       _isStatic = false;
 
@@ -225,8 +246,8 @@
          // Possible conversions between Java and internal types
          java2Internal.put(Boolean.TYPE, Type.Boolean);
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java 2017-08-03 23:28:06.555896022 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java 2017-12-02 04:30:06.064323116 +0000
 @@ -107,7 +107,7 @@
 
          // Check if we have any declared namespaces
@@ -273,8 +294,8 @@
                               SyntaxTreeNode n = _attributeElements.get(k);
                               if (n instanceof LiteralAttribute) {
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java 2017-08-03 23:28:06.559895959 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java 2017-12-02 04:30:06.064323116 +0000
 @@ -129,22 +129,22 @@
      /**
       * A mapping between templates and test sequences.
@@ -327,8 +348,8 @@
          _rootPattern = null;
 
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java 2017-08-03 23:28:06.559895959 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java 2017-12-02 04:30:06.064323116 +0000
 @@ -107,11 +107,11 @@
      }
 
@@ -365,8 +386,8 @@
          _prefixMapping.put(prefix, uri);
      }
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java 2017-08-03 23:28:06.559895959 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java 2017-12-02 04:30:06.064323116 +0000
 @@ -122,7 +122,7 @@
      /**
       * Mapping between mode names and Mode instances.
@@ -395,8 +416,8 @@
      /**
       * A reference to the SourceLoader set by the user (a URIResolver
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java 2017-08-03 23:28:06.559895959 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java 2017-12-02 04:30:06.064323116 +0000
 @@ -38,8 +38,8 @@
  final class SymbolTable {
 
@@ -479,8 +500,8 @@
          // Register the namespace URI
          Integer refcnt = _excludedURI.get(uri);
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java 2017-08-03 23:28:06.559895959 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java 2017-12-02 04:30:06.064323116 +0000
 @@ -70,7 +70,7 @@
      protected SyntaxTreeNode _parent;          // Parent node
      private Stylesheet       _stylesheet;      // Stylesheet ancestor node
@@ -509,8 +530,8 @@
                  locals.add(varOrParamName);
              }
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java 2017-08-03 23:28:06.559895959 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java 2017-12-02 04:30:06.064323116 +0000
 @@ -127,7 +127,7 @@
                   * times. Note that patterns whose kernels are "*", "node()"
                   * and "@*" can between shared by test sequences.
@@ -521,8 +542,8 @@
 
      public MethodGenerator(int access_flags, Type return_type,
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java 2017-08-03 23:28:06.559895959 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java 2017-12-02 04:30:06.064323116 +0000
 @@ -37,7 +37,7 @@
  public final class MultiHashtable<K,V> {
      static final long serialVersionUID = -6151608290510033572L;
@@ -542,8 +563,8 @@
              }
              set.add(value);
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java 2017-08-03 23:28:06.559895959 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java 2017-12-02 04:30:06.064323116 +0000
 @@ -170,7 +170,7 @@
          _parser = new Parser(this, useServicesMechanism);
          _featureManager = featureManager;
@@ -572,8 +593,8 @@
          _parser.init();
          //_variableSerial     = 1;
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java 2017-08-03 17:03:27.000000000 +0100
-+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java 2017-08-03 23:28:06.559895959 +0100
+--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java 2017-11-30 03:00:25.000000000 +0000
++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java 2017-12-02 04:30:06.064323116 +0000
 @@ -169,7 +169,7 @@
          _count = 0;
          _current = 0;
@@ -584,8 +605,8 @@
 
          try {
 diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DOMWSFilter.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DOMWSFilter.java
---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DOMWSFilter.java 2017-08-03 17:03:27.000000000 +0100