Set PKGVERSION to 1.4.2.6.1 to distinguish it from the p6 patch. Also, add the updated cacert file and some ns plugin related patches (currently unused) from the FreeBSD port. changes: 2004-07-21 Wednesday 17:58 glewis * j2se/src/share/native/java/io/io_util.h: . At least on FreeBSD, O_SYNC and O_DSYNC aren't both defined (for FreeBSD 4.x neither are defined and for FreeBSD 5.x O_DSYNC isn't defined). This caused them to be defined to some bogus values. In particular, O_SYNC would be defined as 0x800, which is O_EXCL (at least on FreeBSD 4.x). The result being that the RandomAccessFile class would fail to open an existing file if you specified "s" as part of the mode. Fix this by defining O_SYNC and O_DSYNC to O_FSYNC on BSD if they aren't defined. This shouldn't hurt Net or Open. 2004-07-08 Thursday 20:21 glewis * j2se/src/share/native/sun/awt/font/fontmanager/fontobjects/fontObject.cpp: . In the ReadChunk() function, change an assert() to be a "test for a condition and return NULL". Take account of the NULL in the appropriate place (which is somewhat worrisome in itself since ReadChunk() has always had the possibility of returning NULL). This makes loading a font file a little more resilient to specially crafted font data which can be used, for example, by an applet to crash the browser plugin by triggering the assert(). Such an applet was mentioned on Bugtraq: http://www.securityfocus.com/archive/1/367331/2004-06-26/2004-07-02/0 and can be found at http://www.illegalaccess.org/cms/?q=node/view/9 This change stops the browser plugin from crashing. However, I'm somewhat unfamiliar with this part of the code though, so any review would be appreciated. . While I'm here, fix some warnings regarding types in debugging printf's. 2004-07-08 Thursday 20:10 glewis * j2se/src/share/native/java/lang/fdlibm/src/k_tan.c: . Merge in a fix recently added to FreeBSD's math library (taken from fdlibm-5.3): "Merge a bugfix from FDLIBM 5.3 to ensure that the error in tan() is always less than 1 ulp." I've not yet run this through the compatibility test suite, so this change may be backed out if the suite relies on the broken behaviour. 2004-07-08 Thursday 20:09 glewis * j2se/src/share/native/java/lang/fdlibm/src/e_pow.c: . Merge in a fix recently added to FreeBSD's math library (taken from fdlibm-5.3): "Fixed the sign of the result in some overflow and underflow cases (ones where the exponent is an odd integer and the base is negative)." I've not yet run this through the compatibility test suite, so this change may be backed out if the suite relies on the broken behaviour. 2004-07-08 Thursday 20:04 glewis * deploy/src/javaws/src/solaris/native/system_md.c: . The implementation of sysTempnam() formerly just called tempnam(), which, on FreeBSD at least, would provoke warnings about security. So, on *BSD, implement sysTempnam() using mkstemp(3). 2004-04-03 Saturday 05:54 glewis * j2se/src/solaris/native/java/net/NetworkInterface.c: . Don't leak a file descriptor in the IPv6 case. Submitted by: Pavlin Radoslavov <pavlin@icir.org>
23 lines
1.3 KiB
Text
23 lines
1.3 KiB
Text
$NetBSD: distinfo,v 1.5 2004/08/31 21:26:35 marc Exp $
|
|
|
|
SHA1 (j2sdk-1_4_2-src-scsl.zip) = a48f7df999e27a23071e259bd11f2eac18d99d3c
|
|
Size (j2sdk-1_4_2-src-scsl.zip) = 49269919 bytes
|
|
SHA1 (j2sdk-1_4_2-bin-scsl.zip) = 6d304be453abf477c793005d6f5b12ebc9e7be57
|
|
Size (j2sdk-1_4_2-bin-scsl.zip) = 2513462 bytes
|
|
SHA1 (bsd-jdk14-patches-current.tar.gz) = 6253110129d4a0195cc8f47ddc1b5c7fdf186f8e
|
|
Size (bsd-jdk14-patches-current.tar.gz) = 1580574 bytes
|
|
SHA1 (jce_policy-1_4_2.zip) = ea17b649ebcaaf4246e9dd28dbc77926176c64ee
|
|
Size (jce_policy-1_4_2.zip) = 12195 bytes
|
|
SHA1 (patch-aa) = 4ac7b8d528a3ec0e22539a3d0db5b2a232ffd215
|
|
SHA1 (patch-ab) = 41301b1cdce2162450cfc40faaf7e8ab7b5e02b9
|
|
SHA1 (patch-ac) = 02ec598f435e43cc4c1436626ff1c73f51b774c2
|
|
SHA1 (patch-ad) = 4c5efda18a391ba465cb0f2a73ca7f5648b5fc96
|
|
SHA1 (patch-af) = b80610cfa7cd6aac29275ae8d2c05ae035efdd63
|
|
SHA1 (patch-ag) = c7cc1ff360eff3e3049124745b2b38ef9aa7d552
|
|
SHA1 (patch-aj) = 118507738f4d3fef0203721c6834131dadc6a3d3
|
|
SHA1 (patch-ak) = bf52d0531381ffc360f14f758788a587f5c32bbb
|
|
SHA1 (patch-al) = 5719028ccc4266e8c10fdd7a97899599b1d25b59
|
|
SHA1 (patch-am) = 16828c818b3a7838a86c9f964174a4ac0cac737c
|
|
SHA1 (patch-an) = 7cd2385781bcc98c7d2c55153e81f07db4df8f36
|
|
SHA1 (patch-ao) = a42f5584b7931bd4db39653e941b51e8117940b7
|
|
SHA1 (patch-ap) = 93b27830f9a095785f1b918cbda194bb6d49bede
|