Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
openanolis
dragonwell8_jdk
提交
b101cdf7
D
dragonwell8_jdk
项目概览
openanolis
/
dragonwell8_jdk
通知
4
Star
2
Fork
0
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
D
dragonwell8_jdk
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
b101cdf7
编写于
1月 05, 2016
作者:
A
asaha
浏览文件
操作
浏览文件
下载
差异文件
Merge
上级
4f84d32f
cb2c74ab
变更
29
隐藏空白更改
内联
并排
Showing
29 changed file
with
165 addition
and
102 deletion
+165
-102
.hgtags
.hgtags
+4
-0
src/share/classes/sun/security/ssl/ClientHandshaker.java
src/share/classes/sun/security/ssl/ClientHandshaker.java
+5
-5
src/share/classes/sun/security/ssl/HandshakeMessage.java
src/share/classes/sun/security/ssl/HandshakeMessage.java
+2
-2
src/share/classes/sun/security/ssl/Handshaker.java
src/share/classes/sun/security/ssl/Handshaker.java
+1
-1
src/share/classes/sun/security/ssl/ServerHandshaker.java
src/share/classes/sun/security/ssl/ServerHandshaker.java
+32
-5
src/share/classes/sun/security/ssl/SignatureAndHashAlgorithm.java
...e/classes/sun/security/ssl/SignatureAndHashAlgorithm.java
+34
-37
src/share/lib/security/java.security-aix
src/share/lib/security/java.security-aix
+1
-1
src/share/lib/security/java.security-linux
src/share/lib/security/java.security-linux
+1
-1
src/share/lib/security/java.security-macosx
src/share/lib/security/java.security-macosx
+1
-1
src/share/lib/security/java.security-solaris
src/share/lib/security/java.security-solaris
+1
-1
src/share/lib/security/java.security-windows
src/share/lib/security/java.security-windows
+1
-1
src/share/native/sun/font/layout/Features.cpp
src/share/native/sun/font/layout/Features.cpp
+4
-3
src/share/native/sun/font/layout/Lookups.cpp
src/share/native/sun/font/layout/Lookups.cpp
+2
-0
test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/MD2InTrustAnchor.java
...net/ssl/internal/ssl/SSLContextImpl/MD2InTrustAnchor.java
+5
-3
test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/TrustTrustedCert.java
...net/ssl/internal/ssl/SSLContextImpl/TrustTrustedCert.java
+5
-3
test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509KeyManager/PreferredKey.java
...sun/net/ssl/internal/ssl/X509KeyManager/PreferredKey.java
+5
-3
test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/BasicConstraints.java
...l/internal/ssl/X509TrustManagerImpl/BasicConstraints.java
+5
-3
test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/PKIXExtendedTM.java
...ssl/internal/ssl/X509TrustManagerImpl/PKIXExtendedTM.java
+5
-3
test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/SelfIssuedCert.java
...ssl/internal/ssl/X509TrustManagerImpl/SelfIssuedCert.java
+5
-3
test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/SunX509ExtendedTM.java
.../internal/ssl/X509TrustManagerImpl/SunX509ExtendedTM.java
+5
-3
test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsURLConnection/CriticalSubjectAltName.java
...ocol/https/HttpsURLConnection/CriticalSubjectAltName.java
+5
-3
test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketSNISensitive.java
...y/ssl/javax/net/ssl/ServerName/SSLSocketSNISensitive.java
+5
-3
test/sun/security/ssl/javax/net/ssl/TLSv11/EmptyCertificateAuthorities.java
...ssl/javax/net/ssl/TLSv11/EmptyCertificateAuthorities.java
+5
-3
test/sun/security/ssl/javax/net/ssl/TLSv12/ShortRSAKey512.java
...sun/security/ssl/javax/net/ssl/TLSv12/ShortRSAKey512.java
+3
-1
test/sun/security/ssl/javax/net/ssl/TLSv12/ShortRSAKeyGCM.java
...sun/security/ssl/javax/net/ssl/TLSv12/ShortRSAKeyGCM.java
+3
-1
test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/DNSIdentities.java
.../www/protocol/https/HttpsURLConnection/DNSIdentities.java
+5
-3
test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPAddressIPIdentities.java
...tocol/https/HttpsURLConnection/IPAddressIPIdentities.java
+5
-3
test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPIdentities.java
...t/www/protocol/https/HttpsURLConnection/IPIdentities.java
+5
-3
test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/Identities.java
...net/www/protocol/https/HttpsURLConnection/Identities.java
+5
-3
未找到文件。
.hgtags
浏览文件 @
b101cdf7
...
...
@@ -510,6 +510,8 @@ e494e93d48f943229223d881a2928064a69cdf23 jdk8u71-b10
32226f73879f21f7a7bb024f4197c089b53a93c4 jdk8u71-b11
8181f8b6ef0d861f57547c89e52f258cb5583b77 jdk8u71-b12
23a6e0931277e7d4278605f55db2c81fcb3907b0 jdk8u71-b13
1ad1d1b46fef8bf88f36b8d0fae6b51df2de7fb2 jdk8u71-b14
06e7500086a69545a9f55bf5fec23969abe32c57 jdk8u71-b15
be5faa9c77042f202106c18f4e8ea211137b4a3b jdk8u72-b00
5ad1e9e8e8417f80c91d7e0f1f44cdf89b34ead3 jdk8u72-b01
ab0c1040414d038ccbcfcc8ceb1ccf2f44ead8e4 jdk8u72-b02
...
...
@@ -524,6 +526,8 @@ dcf7fd07b08b59e1802851d016d913c254221a44 jdk8u72-b10
d7cc3225f1050de03b236b92e12c547f21697013 jdk8u72-b11
8afb58c7312b45fe5237afb0292176b734934f60 jdk8u72-b12
d841d3fdae44f120883dab0a3a809a054cd0274b jdk8u72-b13
f6d24d424cd2af4d2612f7737d3d9a25f58b882d jdk8u72-b14
f3e86cc607260bae368b52d88d7bc8883ee767e3 jdk8u72-b15
39baa472e20c13c0eb1243eb5dce589e82f78143 jdk8u76-b00
6ea3aea950d19d803475b3f4d704a2942e71b302 jdk8u76-b01
4de4cffb5988cd68959ce4bbd14c6d4547078c91 jdk8u76-b02
src/share/classes/sun/security/ssl/ClientHandshaker.java
浏览文件 @
b101cdf7
...
...
@@ -269,7 +269,7 @@ final class ClientHandshaker extends Handshaker {
input
,
serverKey
,
clnt_random
.
random_bytes
,
svr_random
.
random_bytes
,
messageLen
,
localSupportedSignAlgs
,
protocolVersion
));
getLocalSupportedSignAlgs
()
,
protocolVersion
));
}
catch
(
GeneralSecurityException
e
)
{
throwSSLException
(
"Server key"
,
e
);
}
...
...
@@ -281,7 +281,7 @@ final class ClientHandshaker extends Handshaker {
this
.
serverKeyExchange
(
new
ECDH_ServerKeyExchange
(
input
,
serverKey
,
clnt_random
.
random_bytes
,
svr_random
.
random_bytes
,
localSupportedSignAlgs
,
protocolVersion
));
getLocalSupportedSignAlgs
()
,
protocolVersion
));
}
catch
(
GeneralSecurityException
e
)
{
throwSSLException
(
"Server key"
,
e
);
}
...
...
@@ -331,7 +331,7 @@ final class ClientHandshaker extends Handshaker {
Collection
<
SignatureAndHashAlgorithm
>
supportedPeerSignAlgs
=
SignatureAndHashAlgorithm
.
getSupportedAlgorithms
(
peerSignAlgs
);
algorithmConstraints
,
peerSignAlgs
);
if
(
supportedPeerSignAlgs
.
isEmpty
())
{
throw
new
SSLHandshakeException
(
"No supported signature and hash algorithm in common"
);
...
...
@@ -1094,8 +1094,8 @@ final class ClientHandshaker extends Handshaker {
if
(
protocolVersion
.
v
>=
ProtocolVersion
.
TLS12
.
v
)
{
preferableSignatureAlgorithm
=
SignatureAndHashAlgorithm
.
getPreferableAlgorithm
(
peerSupportedSignAlgs
,
signingKey
.
getAlgorithm
(),
signingKey
);
getPeerSupportedSignAlgs
(),
signingKey
.
getAlgorithm
(),
signingKey
);
if
(
preferableSignatureAlgorithm
==
null
)
{
throw
new
SSLHandshakeException
(
...
...
src/share/classes/sun/security/ssl/HandshakeMessage.java
浏览文件 @
b101cdf7
...
...
@@ -1557,7 +1557,7 @@ static final class CertificateVerify extends HandshakeMessage {
// the signature bytes
private
byte
[]
signature
;
// protocol version being established using this
ServerKeyExchange
message
// protocol version being established using this
CertificateVerify
message
ProtocolVersion
protocolVersion
;
// the preferable signature algorithm used by this CertificateVerify message
...
...
@@ -1610,7 +1610,7 @@ static final class CertificateVerify extends HandshakeMessage {
preferableSignatureAlgorithm
))
{
throw
new
SSLHandshakeException
(
"Unsupported SignatureAndHashAlgorithm in "
+
"
ServerKeyExchange
message"
);
"
CertificateVerify
message"
);
}
}
...
...
src/share/classes/sun/security/ssl/Handshaker.java
浏览文件 @
b101cdf7
...
...
@@ -89,7 +89,7 @@ abstract class Handshaker {
AlgorithmConstraints
algorithmConstraints
=
null
;
// Local supported signature and algorithms
Collection
<
SignatureAndHashAlgorithm
>
localSupportedSignAlgs
;
private
Collection
<
SignatureAndHashAlgorithm
>
localSupportedSignAlgs
;
// Peer supported signature and algorithms
Collection
<
SignatureAndHashAlgorithm
>
peerSupportedSignAlgs
;
...
...
src/share/classes/sun/security/ssl/ServerHandshaker.java
浏览文件 @
b101cdf7
...
...
@@ -291,7 +291,7 @@ final class ServerHandshaker extends Handshaker {
case
HandshakeMessage
.
ht_certificate_verify
:
this
.
clientCertificateVerify
(
new
CertificateVerify
(
input
,
localSupportedSignAlgs
,
protocolVersion
));
getLocalSupportedSignAlgs
()
,
protocolVersion
));
break
;
case
HandshakeMessage
.
ht_finished
:
...
...
@@ -700,11 +700,10 @@ final class ServerHandshaker extends Handshaker {
Collection
<
SignatureAndHashAlgorithm
>
supportedPeerSignAlgs
=
SignatureAndHashAlgorithm
.
getSupportedAlgorithms
(
peerSignAlgs
);
algorithmConstraints
,
peerSignAlgs
);
if
(
supportedPeerSignAlgs
.
isEmpty
())
{
throw
new
SSLHandshakeException
(
"No supported signature and hash algorithm "
+
"in common"
);
"No signature and hash algorithm in common"
);
}
setPeerSupportedSignAlgs
(
supportedPeerSignAlgs
);
...
...
@@ -1134,6 +1133,13 @@ final class ServerHandshaker extends Handshaker {
supportedSignAlgs
=
new
ArrayList
<
SignatureAndHashAlgorithm
>(
1
);
supportedSignAlgs
.
add
(
algorithm
);
supportedSignAlgs
=
SignatureAndHashAlgorithm
.
getSupportedAlgorithms
(
algorithmConstraints
,
supportedSignAlgs
);
// May be no default activated signature algorithm, but
// let the following process make the final decision.
}
// Sets the peer supported signature algorithm to use in KM
...
...
@@ -1178,6 +1184,11 @@ final class ServerHandshaker extends Handshaker {
SignatureAndHashAlgorithm
.
getPreferableAlgorithm
(
supportedSignAlgs
,
"RSA"
,
privateKey
);
if
(
preferableSignatureAlgorithm
==
null
)
{
if
((
debug
!=
null
)
&&
Debug
.
isOn
(
"handshake"
))
{
System
.
out
.
println
(
"No signature and hash algorithm for cipher "
+
suite
);
}
return
false
;
}
}
...
...
@@ -1196,6 +1207,11 @@ final class ServerHandshaker extends Handshaker {
SignatureAndHashAlgorithm
.
getPreferableAlgorithm
(
supportedSignAlgs
,
"RSA"
,
privateKey
);
if
(
preferableSignatureAlgorithm
==
null
)
{
if
((
debug
!=
null
)
&&
Debug
.
isOn
(
"handshake"
))
{
System
.
out
.
println
(
"No signature and hash algorithm for cipher "
+
suite
);
}
return
false
;
}
}
...
...
@@ -1211,6 +1227,11 @@ final class ServerHandshaker extends Handshaker {
SignatureAndHashAlgorithm
.
getPreferableAlgorithm
(
supportedSignAlgs
,
"DSA"
);
if
(
preferableSignatureAlgorithm
==
null
)
{
if
((
debug
!=
null
)
&&
Debug
.
isOn
(
"handshake"
))
{
System
.
out
.
println
(
"No signature and hash algorithm for cipher "
+
suite
);
}
return
false
;
}
}
...
...
@@ -1229,6 +1250,11 @@ final class ServerHandshaker extends Handshaker {
SignatureAndHashAlgorithm
.
getPreferableAlgorithm
(
supportedSignAlgs
,
"ECDSA"
);
if
(
preferableSignatureAlgorithm
==
null
)
{
if
((
debug
!=
null
)
&&
Debug
.
isOn
(
"handshake"
))
{
System
.
out
.
println
(
"No signature and hash algorithm for cipher "
+
suite
);
}
return
false
;
}
}
...
...
@@ -1274,7 +1300,8 @@ final class ServerHandshaker extends Handshaker {
break
;
default
:
// internal error, unknown key exchange
throw
new
RuntimeException
(
"Unrecognized cipherSuite: "
+
suite
);
throw
new
RuntimeException
(
"Unrecognized cipherSuite: "
+
suite
);
}
setCipherSuite
(
suite
);
...
...
src/share/classes/sun/security/ssl/SignatureAndHashAlgorithm.java
浏览文件 @
b101cdf7
/*
* Copyright (c) 2010, 201
3
, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2010, 201
5
, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -167,10 +167,13 @@ final class SignatureAndHashAlgorithm {
// Get supported algorithm collection from an untrusted collection
static
Collection
<
SignatureAndHashAlgorithm
>
getSupportedAlgorithms
(
AlgorithmConstraints
constraints
,
Collection
<
SignatureAndHashAlgorithm
>
algorithms
)
{
Collection
<
SignatureAndHashAlgorithm
>
supported
=
new
ArrayList
<>();
for
(
SignatureAndHashAlgorithm
sigAlg
:
algorithms
)
{
if
(
sigAlg
.
priority
<=
SUPPORTED_ALG_PRIORITY_MAX_NUM
)
{
if
(
sigAlg
.
priority
<=
SUPPORTED_ALG_PRIORITY_MAX_NUM
&&
constraints
.
permits
(
SIGNATURE_PRIMITIVE_SET
,
sigAlg
.
algorithm
,
null
))
{
supported
.
add
(
sigAlg
);
}
}
...
...
@@ -234,30 +237,42 @@ final class SignatureAndHashAlgorithm {
}
static
SignatureAndHashAlgorithm
getPreferableAlgorithm
(
Collection
<
SignatureAndHashAlgorithm
>
algorithms
,
String
expected
,
PrivateKey
signingKey
)
{
Collection
<
SignatureAndHashAlgorithm
>
algorithms
,
String
expected
,
PrivateKey
signingKey
)
{
if
(
expected
==
null
&&
!
algorithms
.
isEmpty
())
{
for
(
SignatureAndHashAlgorithm
sigAlg
:
algorithms
)
{
if
(
sigAlg
.
priority
<=
SUPPORTED_ALG_PRIORITY_MAX_NUM
)
{
return
sigAlg
;
int
maxDigestLength
=
getMaxDigestLength
(
signingKey
);
for
(
SignatureAndHashAlgorithm
algorithm
:
algorithms
)
{
int
signValue
=
algorithm
.
id
&
0xFF
;
if
((
expected
==
null
)
||
(
expected
.
equalsIgnoreCase
(
"rsa"
)
&&
signValue
==
SignatureAlgorithm
.
RSA
.
value
)
||
(
expected
.
equalsIgnoreCase
(
"dsa"
)
&&
signValue
==
SignatureAlgorithm
.
DSA
.
value
)
||
(
expected
.
equalsIgnoreCase
(
"ecdsa"
)
&&
signValue
==
SignatureAlgorithm
.
ECDSA
.
value
)
||
(
expected
.
equalsIgnoreCase
(
"ec"
)
&&
signValue
==
SignatureAlgorithm
.
ECDSA
.
value
))
{
if
(
algorithm
.
priority
<=
SUPPORTED_ALG_PRIORITY_MAX_NUM
&&
algorithm
.
hash
.
length
<=
maxDigestLength
)
{
return
algorithm
;
}
}
return
null
;
// no supported algorithm
}
if
(
expected
==
null
)
{
return
null
;
// no expected algorithm, no supported algorithm
}
return
null
;
}
/*
* Need to check RSA key length to match the length of hash value
*/
/*
* Need to check key length to match the length of hash value
*/
private
static
int
getMaxDigestLength
(
PrivateKey
signingKey
)
{
int
maxDigestLength
=
Integer
.
MAX_VALUE
;
// only need to check RSA algorithm at present.
if
(
signingKey
!=
null
&&
"rsa"
.
equalsIgnoreCase
(
signingKey
.
getAlgorithm
())
&&
expected
.
equalsIgnoreCase
(
"rsa"
))
{
"rsa"
.
equalsIgnoreCase
(
signingKey
.
getAlgorithm
()))
{
/*
* RSA keys of 512 bits have been shown to be practically
* breakable, it does not make much sense to use the strong
...
...
@@ -285,25 +300,7 @@ final class SignatureAndHashAlgorithm {
// preferable hash algorithm.
}
for
(
SignatureAndHashAlgorithm
algorithm
:
algorithms
)
{
int
signValue
=
algorithm
.
id
&
0xFF
;
if
(
expected
.
equalsIgnoreCase
(
"rsa"
)
&&
signValue
==
SignatureAlgorithm
.
RSA
.
value
)
{
if
(
algorithm
.
hash
.
length
<=
maxDigestLength
)
{
return
algorithm
;
}
}
else
if
(
(
expected
.
equalsIgnoreCase
(
"dsa"
)
&&
signValue
==
SignatureAlgorithm
.
DSA
.
value
)
||
(
expected
.
equalsIgnoreCase
(
"ecdsa"
)
&&
signValue
==
SignatureAlgorithm
.
ECDSA
.
value
)
||
(
expected
.
equalsIgnoreCase
(
"ec"
)
&&
signValue
==
SignatureAlgorithm
.
ECDSA
.
value
))
{
return
algorithm
;
}
}
return
null
;
return
maxDigestLength
;
}
static
enum
HashAlgorithm
{
...
...
src/share/lib/security/java.security-aix
浏览文件 @
b101cdf7
...
...
@@ -509,7 +509,7 @@ jdk.certpath.disabledAlgorithms=MD2, MD5, RSA keySize < 1024
#
# Example:
# jdk.tls.disabledAlgorithms=MD5, SSLv3, DSA, RSA keySize < 2048
jdk.tls.disabledAlgorithms=SSLv3, RC4, DH keySize < 768
jdk.tls.disabledAlgorithms=SSLv3, RC4,
MD5withRSA,
DH keySize < 768
# Legacy algorithms for Secure Socket Layer/Transport Layer Security (SSL/TLS)
# processing in JSSE implementation.
...
...
src/share/lib/security/java.security-linux
浏览文件 @
b101cdf7
...
...
@@ -509,7 +509,7 @@ jdk.certpath.disabledAlgorithms=MD2, MD5, RSA keySize < 1024
#
# Example:
# jdk.tls.disabledAlgorithms=MD5, SSLv3, DSA, RSA keySize < 2048
jdk.tls.disabledAlgorithms=SSLv3, RC4, DH keySize < 768
jdk.tls.disabledAlgorithms=SSLv3, RC4,
MD5withRSA,
DH keySize < 768
# Legacy algorithms for Secure Socket Layer/Transport Layer Security (SSL/TLS)
# processing in JSSE implementation.
...
...
src/share/lib/security/java.security-macosx
浏览文件 @
b101cdf7
...
...
@@ -512,7 +512,7 @@ jdk.certpath.disabledAlgorithms=MD2, MD5, RSA keySize < 1024
#
# Example:
# jdk.tls.disabledAlgorithms=MD5, SSLv3, DSA, RSA keySize < 2048
jdk.tls.disabledAlgorithms=SSLv3, RC4, DH keySize < 768
jdk.tls.disabledAlgorithms=SSLv3, RC4,
MD5withRSA,
DH keySize < 768
# Legacy algorithms for Secure Socket Layer/Transport Layer Security (SSL/TLS)
# processing in JSSE implementation.
...
...
src/share/lib/security/java.security-solaris
浏览文件 @
b101cdf7
...
...
@@ -511,7 +511,7 @@ jdk.certpath.disabledAlgorithms=MD2, MD5, RSA keySize < 1024
#
# Example:
# jdk.tls.disabledAlgorithms=MD5, SSLv3, DSA, RSA keySize < 2048
jdk.tls.disabledAlgorithms=SSLv3, RC4, DH keySize < 768
jdk.tls.disabledAlgorithms=SSLv3, RC4,
MD5withRSA,
DH keySize < 768
# Legacy algorithms for Secure Socket Layer/Transport Layer Security (SSL/TLS)
# processing in JSSE implementation.
...
...
src/share/lib/security/java.security-windows
浏览文件 @
b101cdf7
...
...
@@ -512,7 +512,7 @@ jdk.certpath.disabledAlgorithms=MD2, MD5, RSA keySize < 1024
#
# Example:
# jdk.tls.disabledAlgorithms=MD5, SSLv3, DSA, RSA keySize < 2048
jdk.tls.disabledAlgorithms=SSLv3, RC4, DH keySize < 768
jdk.tls.disabledAlgorithms=SSLv3, RC4,
MD5withRSA,
DH keySize < 768
# Legacy algorithms for Secure Socket Layer/Transport Layer Security (SSL/TLS)
# processing in JSSE implementation.
...
...
src/share/native/sun/font/layout/Features.cpp
浏览文件 @
b101cdf7
...
...
@@ -43,9 +43,10 @@ LEReferenceTo<FeatureTable> FeatureListTable::getFeatureTable(const LETableRefer
LEReferenceToArrayOf
<
FeatureRecord
>
featureRecordArrayRef
(
base
,
success
,
featureRecordArray
,
SWAPW
(
featureCount
));
if
(
featureIndex
>=
SWAPW
(
featureCount
)
||
LE_FAILURE
(
success
))
{
return
LEReferenceTo
<
FeatureTable
>
();
}
if
(
featureIndex
>=
SWAPW
(
featureCount
)
||
LE_FAILURE
(
success
))
{
success
=
LE_INDEX_OUT_OF_BOUNDS_ERROR
;
return
LEReferenceTo
<
FeatureTable
>
();
}
Offset
featureTableOffset
=
featureRecordArray
[
featureIndex
].
featureTableOffset
;
...
...
src/share/native/sun/font/layout/Lookups.cpp
浏览文件 @
b101cdf7
...
...
@@ -42,6 +42,7 @@ const LEReferenceTo<LookupTable> LookupListTable::getLookupTable(const LEReferen
LEReferenceToArrayOf
<
Offset
>
lookupTableOffsetArrayRef
(
base
,
success
,
(
const
Offset
*
)
&
lookupTableOffsetArray
,
SWAPW
(
lookupCount
));
if
(
LE_FAILURE
(
success
)
||
lookupTableIndex
>
lookupTableOffsetArrayRef
.
getCount
())
{
success
=
LE_INDEX_OUT_OF_BOUNDS_ERROR
;
return
LEReferenceTo
<
LookupTable
>
();
}
else
{
return
LEReferenceTo
<
LookupTable
>
(
base
,
success
,
SWAPW
(
lookupTableOffsetArrayRef
.
getObject
(
lookupTableIndex
,
success
)));
...
...
@@ -53,6 +54,7 @@ const LEReferenceTo<LookupSubtable> LookupTable::getLookupSubtable(const LERefer
LEReferenceToArrayOf
<
Offset
>
subTableOffsetArrayRef
(
base
,
success
,
(
const
Offset
*
)
&
subTableOffsetArray
,
SWAPW
(
subTableCount
));
if
(
LE_FAILURE
(
success
)
||
subtableIndex
>
subTableOffsetArrayRef
.
getCount
())
{
success
=
LE_INDEX_OUT_OF_BOUNDS_ERROR
;
return
LEReferenceTo
<
LookupSubtable
>
();
}
else
{
return
LEReferenceTo
<
LookupSubtable
>
(
base
,
success
,
SWAPW
(
subTableOffsetArrayRef
.
getObject
(
subtableIndex
,
success
)));
...
...
test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/MD2InTrustAnchor.java
浏览文件 @
b101cdf7
/*
* Copyright (c) 2011, 201
4
, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2011, 201
5
, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -287,8 +287,10 @@ public class MD2InTrustAnchor {
public
static
void
main
(
String
[]
args
)
throws
Exception
{
// MD5 is used in this test case, don't disable MD5 algorithm.
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.tls.disabledAlgorithms"
,
"SSLv3, RC4, DH keySize < 768"
);
if
(
debug
)
System
.
setProperty
(
"javax.net.debug"
,
"all"
);
...
...
test/sun/security/ssl/com/sun/net/ssl/internal/ssl/SSLContextImpl/TrustTrustedCert.java
浏览文件 @
b101cdf7
/*
* Copyright (c) 2011, 201
4
, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2011, 201
5
, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -339,8 +339,10 @@ public class TrustTrustedCert {
public
static
void
main
(
String
[]
args
)
throws
Exception
{
// MD5 is used in this test case, don't disable MD5 algorithm.
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.tls.disabledAlgorithms"
,
"SSLv3, RC4, DH keySize < 768"
);
if
(
debug
)
System
.
setProperty
(
"javax.net.debug"
,
"all"
);
...
...
test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509KeyManager/PreferredKey.java
浏览文件 @
b101cdf7
/*
* Copyright (c) 2005, 201
4
, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2005, 201
5
, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -57,8 +57,10 @@ public class PreferredKey {
public
static
void
main
(
String
[]
args
)
throws
Exception
{
// MD5 is used in this test case, don't disable MD5 algorithm.
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.tls.disabledAlgorithms"
,
"SSLv3, RC4, DH keySize < 768"
);
KeyStore
ks
;
KeyManagerFactory
kmf
;
...
...
test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/BasicConstraints.java
浏览文件 @
b101cdf7
/*
* Copyright (c) 2012, 201
4
, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2012, 201
5
, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -458,8 +458,10 @@ public class BasicConstraints {
public
static
void
main
(
String
args
[])
throws
Exception
{
// MD5 is used in this test case, don't disable MD5 algorithm.
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.tls.disabledAlgorithms"
,
"SSLv3, RC4, DH keySize < 768"
);
if
(
debug
)
System
.
setProperty
(
"javax.net.debug"
,
"all"
);
...
...
test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/PKIXExtendedTM.java
浏览文件 @
b101cdf7
/*
* Copyright (c) 2010, 201
4
, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2010, 201
5
, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -794,8 +794,10 @@ public class PKIXExtendedTM {
public
static
void
main
(
String
args
[])
throws
Exception
{
// MD5 is used in this test case, don't disable MD5 algorithm.
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.tls.disabledAlgorithms"
,
"SSLv3, RC4, DH keySize < 768"
);
if
(
debug
)
System
.
setProperty
(
"javax.net.debug"
,
"all"
);
...
...
test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/SelfIssuedCert.java
浏览文件 @
b101cdf7
/*
* Copyright (c) 2009, 201
4
, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2009, 201
5
, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -306,8 +306,10 @@ public class SelfIssuedCert {
public
static
void
main
(
String
args
[])
throws
Exception
{
// MD5 is used in this test case, don't disable MD5 algorithm.
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.tls.disabledAlgorithms"
,
"SSLv3, RC4, DH keySize < 768"
);
if
(
debug
)
System
.
setProperty
(
"javax.net.debug"
,
"all"
);
...
...
test/sun/security/ssl/com/sun/net/ssl/internal/ssl/X509TrustManagerImpl/SunX509ExtendedTM.java
浏览文件 @
b101cdf7
/*
* Copyright (c) 2010, 201
4
, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2010, 201
5
, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -796,8 +796,10 @@ public class SunX509ExtendedTM {
public
static
void
main
(
String
args
[])
throws
Exception
{
// MD5 is used in this test case, don't disable MD5 algorithm.
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.tls.disabledAlgorithms"
,
"SSLv3, RC4, DH keySize < 768"
);
if
(
debug
)
System
.
setProperty
(
"javax.net.debug"
,
"all"
);
...
...
test/sun/security/ssl/com/sun/net/ssl/internal/www/protocol/https/HttpsURLConnection/CriticalSubjectAltName.java
浏览文件 @
b101cdf7
/*
* Copyright (c) 2001, 201
4
, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2001, 201
5
, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -159,8 +159,10 @@ public class CriticalSubjectAltName implements HostnameVerifier {
public
static
void
main
(
String
[]
args
)
throws
Exception
{
// MD5 is used in this test case, don't disable MD5 algorithm.
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.tls.disabledAlgorithms"
,
"SSLv3, RC4, DH keySize < 768"
);
String
keyFilename
=
System
.
getProperty
(
"test.src"
,
"./"
)
+
"/"
+
pathToStores
+
...
...
test/sun/security/ssl/javax/net/ssl/ServerName/SSLSocketSNISensitive.java
浏览文件 @
b101cdf7
/*
* Copyright (c) 2012, 201
4
, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2012, 201
5
, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -433,8 +433,10 @@ public class SSLSocketSNISensitive {
public
static
void
main
(
String
[]
args
)
throws
Exception
{
// MD5 is used in this test case, don't disable MD5 algorithm.
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.tls.disabledAlgorithms"
,
"SSLv3, RC4, DH keySize < 768"
);
if
(
debug
)
System
.
setProperty
(
"javax.net.debug"
,
"all"
);
...
...
test/sun/security/ssl/javax/net/ssl/TLSv11/EmptyCertificateAuthorities.java
浏览文件 @
b101cdf7
/*
* Copyright (c) 2010, 201
4
, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2010, 201
5
, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -230,8 +230,10 @@ public class EmptyCertificateAuthorities {
public
static
void
main
(
String
[]
args
)
throws
Exception
{
// MD5 is used in this test case, don't disable MD5 algorithm.
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.tls.disabledAlgorithms"
,
"SSLv3, RC4, DH keySize < 768"
);
String
keyFilename
=
System
.
getProperty
(
"test.src"
,
"."
)
+
"/"
+
pathToStores
+
...
...
test/sun/security/ssl/javax/net/ssl/TLSv12/ShortRSAKey512.java
浏览文件 @
b101cdf7
/*
* Copyright (c) 2012, 201
3
, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2012, 201
5
, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -282,6 +282,8 @@ public class ShortRSAKey512 {
// reset the security property to make sure that the algorithms
// and keys used in this test are not disabled.
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2"
);
Security
.
setProperty
(
"jdk.tls.disabledAlgorithms"
,
"SSLv3, RC4, DH keySize < 768"
);
if
(
debug
)
System
.
setProperty
(
"javax.net.debug"
,
"all"
);
...
...
test/sun/security/ssl/javax/net/ssl/TLSv12/ShortRSAKeyGCM.java
浏览文件 @
b101cdf7
/*
* Copyright (c) 2012, 201
3
, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2012, 201
5
, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -304,6 +304,8 @@ public class ShortRSAKeyGCM {
// reset the security property to make sure that the algorithms
// and keys used in this test are not disabled.
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2"
);
Security
.
setProperty
(
"jdk.tls.disabledAlgorithms"
,
"SSLv3, RC4, DH keySize < 768"
);
if
(
debug
)
{
System
.
setProperty
(
"javax.net.debug"
,
"all"
);
...
...
test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/DNSIdentities.java
浏览文件 @
b101cdf7
/*
* Copyright (c) 2010, 201
4
, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2010, 201
5
, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -747,8 +747,10 @@ public class DNSIdentities {
public
static
void
main
(
String
args
[])
throws
Exception
{
// MD5 is used in this test case, don't disable MD5 algorithm.
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.tls.disabledAlgorithms"
,
"SSLv3, RC4, DH keySize < 768"
);
if
(
debug
)
System
.
setProperty
(
"javax.net.debug"
,
"all"
);
...
...
test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPAddressIPIdentities.java
浏览文件 @
b101cdf7
/*
* Copyright (c) 2010, 201
4
, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2010, 201
5
, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -748,8 +748,10 @@ public class IPAddressIPIdentities {
public
static
void
main
(
String
args
[])
throws
Exception
{
// MD5 is used in this test case, don't disable MD5 algorithm.
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.tls.disabledAlgorithms"
,
"SSLv3, RC4, DH keySize < 768"
);
if
(
debug
)
System
.
setProperty
(
"javax.net.debug"
,
"all"
);
...
...
test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/IPIdentities.java
浏览文件 @
b101cdf7
/*
* Copyright (c) 2010, 201
4
, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2010, 201
5
, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -747,8 +747,10 @@ public class IPIdentities {
public
static
void
main
(
String
args
[])
throws
Exception
{
// MD5 is used in this test case, don't disable MD5 algorithm.
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.tls.disabledAlgorithms"
,
"SSLv3, RC4, DH keySize < 768"
);
if
(
debug
)
System
.
setProperty
(
"javax.net.debug"
,
"all"
);
...
...
test/sun/security/ssl/sun/net/www/protocol/https/HttpsURLConnection/Identities.java
浏览文件 @
b101cdf7
/*
* Copyright (c) 2010, 201
4
, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2010, 201
5
, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -747,8 +747,10 @@ public class Identities {
public
static
void
main
(
String
args
[])
throws
Exception
{
// MD5 is used in this test case, don't disable MD5 algorithm.
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.certpath.disabledAlgorithms"
,
"MD2, RSA keySize < 1024"
);
Security
.
setProperty
(
"jdk.tls.disabledAlgorithms"
,
"SSLv3, RC4, DH keySize < 768"
);
if
(
debug
)
System
.
setProperty
(
"javax.net.debug"
,
"all"
);
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录