Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
openanolis
dragonwell8_jdk
提交
c68d43d0
D
dragonwell8_jdk
项目概览
openanolis
/
dragonwell8_jdk
通知
4
Star
2
Fork
0
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
D
dragonwell8_jdk
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
c68d43d0
编写于
5月 13, 2017
作者:
I
igerasim
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
8179998: Clear certificate chain connections
Reviewed-by: mullan, ahgross, rhalade, igerasim
上级
0c3f34c3
变更
7
显示空白变更内容
内联
并排
Showing
7 changed file
with
42 addition
and
36 deletion
+42
-36
src/share/classes/sun/security/pkcs/SignerInfo.java
src/share/classes/sun/security/pkcs/SignerInfo.java
+6
-0
src/share/classes/sun/security/provider/certpath/SunCertPathBuilder.java
...es/sun/security/provider/certpath/SunCertPathBuilder.java
+1
-1
src/share/lib/security/java.security-aix
src/share/lib/security/java.security-aix
+7
-7
src/share/lib/security/java.security-linux
src/share/lib/security/java.security-linux
+7
-7
src/share/lib/security/java.security-macosx
src/share/lib/security/java.security-macosx
+7
-7
src/share/lib/security/java.security-solaris
src/share/lib/security/java.security-solaris
+7
-7
src/share/lib/security/java.security-windows
src/share/lib/security/java.security-windows
+7
-7
未找到文件。
src/share/classes/sun/security/pkcs/SignerInfo.java
浏览文件 @
c68d43d0
...
...
@@ -323,6 +323,12 @@ public class SignerInfo implements DerEncoder {
data
=
content
.
getContentBytes
();
}
Timestamp
timestamp
=
null
;
try
{
timestamp
=
getTimestamp
();
}
catch
(
Exception
ignore
)
{
}
ConstraintsParameters
cparams
=
new
ConstraintsParameters
(
timestamp
);
String
digestAlgname
=
getDigestAlgorithmId
().
getName
();
...
...
src/share/classes/sun/security/provider/certpath/SunCertPathBuilder.java
浏览文件 @
c68d43d0
...
...
@@ -344,7 +344,7 @@ public final class SunCertPathBuilder extends CertPathBuilderSpi {
// add the algorithm checker
checkers
.
add
(
new
AlgorithmChecker
(
builder
.
trustAnchor
,
buildParams
.
date
(),
null
));
buildParams
.
date
(),
buildParams
.
variant
()
));
BasicChecker
basicChecker
=
null
;
if
(
nextState
.
keyParamsNeeded
())
{
...
...
src/share/lib/security/java.security-aix
浏览文件 @
c68d43d0
...
...
@@ -488,21 +488,21 @@ krb5.kdc.bad.policy = tryLast
# jdkCA
# This constraint prohibits the specified algorithm only if the
# algorithm is used in a certificate chain that terminates at a marked
# trust anchor in the
lib/security/cacerts keystore. If the jdkCA
# constraint is not set, then all chains using the
specified algorithm
# trust anchor in the
lib/security/cacerts keystore. If the jdkCA
# constraint is not set, then all chains using the
specified algorithm
# are restricted. jdkCA may only be used once in a DisabledAlgorithm
# expression.
# Example:
To apply this constraint to SHA-1 certificates, include
# the following:
"SHA1 jdkCA"
# Example:
To apply this constraint to SHA-1 certificates, include
# the following:
"SHA1 jdkCA"
#
# DenyAfterConstraint:
# denyAfter YYYY-MM-DD
# This constraint prohibits a certificate with the specified algorithm
# from being used after the date regardless of the certificate's
# validity.
JAR files that are signed and timestamped before the
# validity.
JAR files that are signed and timestamped before the
# constraint date with certificates containing the disabled algorithm
# will not be restricted.
The date is processed in the UTC timezone.
# This
constraint can only be used once in a DisabledAlgorithm
# will not be restricted.
The date is processed in the UTC timezone.
# This
constraint can only be used once in a DisabledAlgorithm
# expression.
# Example: To deny usage of RSA 2048 bit certificates after Feb 3 2020,
# use the following: "RSA keySize == 2048 & denyAfter 2020-02-03"
...
...
src/share/lib/security/java.security-linux
浏览文件 @
c68d43d0
...
...
@@ -488,21 +488,21 @@ krb5.kdc.bad.policy = tryLast
# jdkCA
# This constraint prohibits the specified algorithm only if the
# algorithm is used in a certificate chain that terminates at a marked
# trust anchor in the
lib/security/cacerts keystore. If the jdkCA
# constraint is not set, then all chains using the
specified algorithm
# trust anchor in the
lib/security/cacerts keystore. If the jdkCA
# constraint is not set, then all chains using the
specified algorithm
# are restricted. jdkCA may only be used once in a DisabledAlgorithm
# expression.
# Example:
To apply this constraint to SHA-1 certificates, include
# the following:
"SHA1 jdkCA"
# Example:
To apply this constraint to SHA-1 certificates, include
# the following:
"SHA1 jdkCA"
#
# DenyAfterConstraint:
# denyAfter YYYY-MM-DD
# This constraint prohibits a certificate with the specified algorithm
# from being used after the date regardless of the certificate's
# validity.
JAR files that are signed and timestamped before the
# validity.
JAR files that are signed and timestamped before the
# constraint date with certificates containing the disabled algorithm
# will not be restricted.
The date is processed in the UTC timezone.
# This
constraint can only be used once in a DisabledAlgorithm
# will not be restricted.
The date is processed in the UTC timezone.
# This
constraint can only be used once in a DisabledAlgorithm
# expression.
# Example: To deny usage of RSA 2048 bit certificates after Feb 3 2020,
# use the following: "RSA keySize == 2048 & denyAfter 2020-02-03"
...
...
src/share/lib/security/java.security-macosx
浏览文件 @
c68d43d0
...
...
@@ -491,21 +491,21 @@ krb5.kdc.bad.policy = tryLast
# jdkCA
# This constraint prohibits the specified algorithm only if the
# algorithm is used in a certificate chain that terminates at a marked
# trust anchor in the
lib/security/cacerts keystore. If the jdkCA
# constraint is not set, then all chains using the
specified algorithm
# trust anchor in the
lib/security/cacerts keystore. If the jdkCA
# constraint is not set, then all chains using the
specified algorithm
# are restricted. jdkCA may only be used once in a DisabledAlgorithm
# expression.
# Example:
To apply this constraint to SHA-1 certificates, include
# the following:
"SHA1 jdkCA"
# Example:
To apply this constraint to SHA-1 certificates, include
# the following:
"SHA1 jdkCA"
#
# DenyAfterConstraint:
# denyAfter YYYY-MM-DD
# This constraint prohibits a certificate with the specified algorithm
# from being used after the date regardless of the certificate's
# validity.
JAR files that are signed and timestamped before the
# validity.
JAR files that are signed and timestamped before the
# constraint date with certificates containing the disabled algorithm
# will not be restricted.
The date is processed in the UTC timezone.
# This
constraint can only be used once in a DisabledAlgorithm
# will not be restricted.
The date is processed in the UTC timezone.
# This
constraint can only be used once in a DisabledAlgorithm
# expression.
# Example: To deny usage of RSA 2048 bit certificates after Feb 3 2020,
# use the following: "RSA keySize == 2048 & denyAfter 2020-02-03"
...
...
src/share/lib/security/java.security-solaris
浏览文件 @
c68d43d0
...
...
@@ -490,21 +490,21 @@ krb5.kdc.bad.policy = tryLast
# jdkCA
# This constraint prohibits the specified algorithm only if the
# algorithm is used in a certificate chain that terminates at a marked
# trust anchor in the
lib/security/cacerts keystore. If the jdkCA
# constraint is not set, then all chains using the
specified algorithm
# trust anchor in the
lib/security/cacerts keystore. If the jdkCA
# constraint is not set, then all chains using the
specified algorithm
# are restricted. jdkCA may only be used once in a DisabledAlgorithm
# expression.
# Example:
To apply this constraint to SHA-1 certificates, include
# the following:
"SHA1 jdkCA"
# Example:
To apply this constraint to SHA-1 certificates, include
# the following:
"SHA1 jdkCA"
#
# DenyAfterConstraint:
# denyAfter YYYY-MM-DD
# This constraint prohibits a certificate with the specified algorithm
# from being used after the date regardless of the certificate's
# validity.
JAR files that are signed and timestamped before the
# validity.
JAR files that are signed and timestamped before the
# constraint date with certificates containing the disabled algorithm
# will not be restricted.
The date is processed in the UTC timezone.
# This
constraint can only be used once in a DisabledAlgorithm
# will not be restricted.
The date is processed in the UTC timezone.
# This
constraint can only be used once in a DisabledAlgorithm
# expression.
# Example: To deny usage of RSA 2048 bit certificates after Feb 3 2020,
# use the following: "RSA keySize == 2048 & denyAfter 2020-02-03"
...
...
src/share/lib/security/java.security-windows
浏览文件 @
c68d43d0
...
...
@@ -491,21 +491,21 @@ krb5.kdc.bad.policy = tryLast
# jdkCA
# This constraint prohibits the specified algorithm only if the
# algorithm is used in a certificate chain that terminates at a marked
# trust anchor in the
lib/security/cacerts keystore. If the jdkCA
# constraint is not set, then all chains using the
specified algorithm
# trust anchor in the
lib/security/cacerts keystore. If the jdkCA
# constraint is not set, then all chains using the
specified algorithm
# are restricted. jdkCA may only be used once in a DisabledAlgorithm
# expression.
# Example:
To apply this constraint to SHA-1 certificates, include
# the following:
"SHA1 jdkCA"
# Example:
To apply this constraint to SHA-1 certificates, include
# the following:
"SHA1 jdkCA"
#
# DenyAfterConstraint:
# denyAfter YYYY-MM-DD
# This constraint prohibits a certificate with the specified algorithm
# from being used after the date regardless of the certificate's
# validity.
JAR files that are signed and timestamped before the
# validity.
JAR files that are signed and timestamped before the
# constraint date with certificates containing the disabled algorithm
# will not be restricted.
The date is processed in the UTC timezone.
# This
constraint can only be used once in a DisabledAlgorithm
# will not be restricted.
The date is processed in the UTC timezone.
# This
constraint can only be used once in a DisabledAlgorithm
# expression.
# Example: To deny usage of RSA 2048 bit certificates after Feb 3 2020,
# use the following: "RSA keySize == 2048 & denyAfter 2020-02-03"
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录