Skip to content

Commit 984b029

Browse files
committed
Merge branch 'master' into backport-krk-98f40e45-master
2 parents a9d2191 + 8fd9a73 commit 984b029

File tree

5 files changed

+34
-3
lines changed

5 files changed

+34
-3
lines changed

src/hotspot/cpu/x86/stubGenerator_x86_64.hpp

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -393,6 +393,8 @@ class StubGenerator: public StubCodeGenerator {
393393
XMMRegister xmm5, XMMRegister xmm6, XMMRegister xmm7, XMMRegister xmm8);
394394
void ghash_last_8_avx2(Register subkeyHtbl);
395395

396+
void check_key_offset(Register key, int offset, int load_size);
397+
396398
// Load key and shuffle operation
397399
void ev_load_key(XMMRegister xmmdst, Register key, int offset, XMMRegister xmm_shuf_mask);
398400
void ev_load_key(XMMRegister xmmdst, Register key, int offset, Register rscratch);

src/hotspot/cpu/x86/stubGenerator_x86_64_aes.cpp

Lines changed: 19 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1759,25 +1759,43 @@ void StubGenerator::roundDeclast(XMMRegister xmm_reg) {
17591759
__ vaesdeclast(xmm8, xmm8, xmm_reg, Assembler::AVX_512bit);
17601760
}
17611761

1762+
// Check incoming byte offset against the int[] len. key is the pointer to the int[0].
1763+
// This check happens often, so it is important for it to be very compact.
1764+
void StubGenerator::check_key_offset(Register key, int offset, int load_size) {
1765+
#ifdef ASSERT
1766+
Address key_length(key, arrayOopDesc::length_offset_in_bytes() - arrayOopDesc::base_offset_in_bytes(T_INT));
1767+
assert((offset + load_size) % 4 == 0, "Alignment is good: %d + %d", offset, load_size);
1768+
int end_offset = (offset + load_size) / 4;
1769+
Label L_good;
1770+
__ cmpl(key_length, end_offset);
1771+
__ jccb(Assembler::greaterEqual, L_good);
1772+
__ hlt();
1773+
__ bind(L_good);
1774+
#endif
1775+
}
17621776

17631777
// Utility routine for loading a 128-bit key word in little endian format
17641778
void StubGenerator::load_key(XMMRegister xmmdst, Register key, int offset, XMMRegister xmm_shuf_mask) {
1779+
check_key_offset(key, offset, 16);
17651780
__ movdqu(xmmdst, Address(key, offset));
17661781
__ pshufb(xmmdst, xmm_shuf_mask);
17671782
}
17681783

17691784
void StubGenerator::load_key(XMMRegister xmmdst, Register key, int offset, Register rscratch) {
1785+
check_key_offset(key, offset, 16);
17701786
__ movdqu(xmmdst, Address(key, offset));
17711787
__ pshufb(xmmdst, ExternalAddress(key_shuffle_mask_addr()), rscratch);
17721788
}
17731789

17741790
void StubGenerator::ev_load_key(XMMRegister xmmdst, Register key, int offset, XMMRegister xmm_shuf_mask) {
1791+
check_key_offset(key, offset, 16);
17751792
__ movdqu(xmmdst, Address(key, offset));
17761793
__ pshufb(xmmdst, xmm_shuf_mask);
17771794
__ evshufi64x2(xmmdst, xmmdst, xmmdst, 0x0, Assembler::AVX_512bit);
17781795
}
17791796

17801797
void StubGenerator::ev_load_key(XMMRegister xmmdst, Register key, int offset, Register rscratch) {
1798+
check_key_offset(key, offset, 16);
17811799
__ movdqu(xmmdst, Address(key, offset));
17821800
__ pshufb(xmmdst, ExternalAddress(key_shuffle_mask_addr()), rscratch);
17831801
__ evshufi64x2(xmmdst, xmmdst, xmmdst, 0x0, Assembler::AVX_512bit);
@@ -3205,12 +3223,12 @@ void StubGenerator::ghash16_encrypt_parallel16_avx512(Register in, Register out,
32053223

32063224
//AES round 9
32073225
roundEncode(AESKEY2, B00_03, B04_07, B08_11, B12_15);
3208-
ev_load_key(AESKEY2, key, 11 * 16, rbx);
32093226
//AES rounds up to 11 (AES192) or 13 (AES256)
32103227
//AES128 is done
32113228
__ cmpl(NROUNDS, 52);
32123229
__ jcc(Assembler::less, last_aes_rnd);
32133230
__ bind(aes_192);
3231+
ev_load_key(AESKEY2, key, 11 * 16, rbx);
32143232
roundEncode(AESKEY1, B00_03, B04_07, B08_11, B12_15);
32153233
ev_load_key(AESKEY1, key, 12 * 16, rbx);
32163234
roundEncode(AESKEY2, B00_03, B04_07, B08_11, B12_15);

src/jdk.jpackage/macosx/classes/jdk/jpackage/internal/SigningIdentityBuilder.java

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,14 +113,16 @@ private SigningIdentity validatedSigningIdentity() throws ConfigException {
113113

114114
final var signingIdentityNames = certificateSelector.signingIdentities();
115115

116+
// Look up for the exact match.
116117
var matchingCertificates = mappedCertficates.stream().filter(e -> {
117118
return signingIdentityNames.contains(e.getKey());
118119
}).map(Map.Entry::getValue).toList();
119120

120121
if (matchingCertificates.isEmpty()) {
122+
// No exact matches found, look up for substrings.
121123
matchingCertificates = mappedCertficates.stream().filter(e -> {
122124
return signingIdentityNames.stream().anyMatch(filter -> {
123-
return filter.startsWith(e.getKey());
125+
return e.getKey().startsWith(filter);
124126
});
125127
}).map(Map.Entry::getValue).toList();
126128
}

test/jdk/tools/jpackage/macosx/MacSignTest.java

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -160,6 +160,7 @@ public static void testMultipleCertificates(PackageType type, SignOption... opti
160160

161161
@Test
162162
@ParameterSupplier
163+
@ParameterSupplier("testSelectSigningIdentity_JDK_8371094")
163164
public static void testSelectSigningIdentity(String signingKeyUserName, CertificateRequest certRequest) {
164165

165166
final var keychain = SigningBase.StandardKeychain.MAIN.spec().keychain();
@@ -187,6 +188,12 @@ public static Collection<Object[]> testSelectSigningIdentity() {
187188
}).toList();
188189
}
189190

191+
public static Collection<Object[]> testSelectSigningIdentity_JDK_8371094() {
192+
return List.<Object[]>of(new Object[] {
193+
"ACME Technologies Limited", SigningBase.StandardCertificateRequest.CODESIGN_ACME_TECH_LTD.spec()
194+
});
195+
}
196+
190197
enum SignOption {
191198
EXPIRED_SIGNING_KEY_USER_NAME("--mac-signing-key-user-name", SigningBase.StandardCertificateRequest.CODESIGN_EXPIRED.spec(), true, false),
192199
EXPIRED_SIGNING_KEY_USER_NAME_PKG("--mac-signing-key-user-name", SigningBase.StandardCertificateRequest.PKG_EXPIRED.spec(), true, false),

test/jdk/tools/jpackage/macosx/base/SigningBase.java

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,7 @@ public class SigningBase {
6868
public enum StandardCertificateRequest {
6969
CODESIGN(cert().userName(DEV_NAMES[CertIndex.ASCII_INDEX.value()])),
7070
CODESIGN_COPY(cert().days(100).userName(DEV_NAMES[CertIndex.ASCII_INDEX.value()])),
71+
CODESIGN_ACME_TECH_LTD(cert().days(100).userName("ACME Technologies Limited (ABC12345)")),
7172
PKG(cert().type(CertificateType.INSTALLER).userName(DEV_NAMES[CertIndex.ASCII_INDEX.value()])),
7273
PKG_COPY(cert().type(CertificateType.INSTALLER).days(100).userName(DEV_NAMES[CertIndex.ASCII_INDEX.value()])),
7374
CODESIGN_UNICODE(cert().userName(DEV_NAMES[CertIndex.UNICODE_INDEX.value()])),
@@ -95,7 +96,8 @@ public enum StandardKeychain {
9596
StandardCertificateRequest.CODESIGN,
9697
StandardCertificateRequest.PKG,
9798
StandardCertificateRequest.CODESIGN_UNICODE,
98-
StandardCertificateRequest.PKG_UNICODE),
99+
StandardCertificateRequest.PKG_UNICODE,
100+
StandardCertificateRequest.CODESIGN_ACME_TECH_LTD),
99101
EXPIRED("jpackagerTest-expired.keychain",
100102
StandardCertificateRequest.CODESIGN,
101103
StandardCertificateRequest.PKG,

0 commit comments

Comments
 (0)