Skip to content

Commit ac56823

Browse files
author
Sergey Nazarkin
committedJun 6, 2024
Merge tag 'jdk8u422-b03'
2 parents dc35aff + 012f59c commit ac56823

File tree

8 files changed

+211
-25
lines changed

8 files changed

+211
-25
lines changed
 

‎jdk/make/data/cacerts/globalsigne46

+20
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
Owner: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE
2+
Issuer: CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE
3+
Serial number: 11d2bbba336ed4bce62468c50d841d98e843
4+
Valid from: Wed Mar 20 00:00:00 GMT 2019 until: Tue Mar 20 00:00:00 GMT 2046
5+
Signature algorithm name: SHA384withECDSA
6+
Subject Public Key Algorithm: 384-bit EC (secp384r1) key
7+
Version: 3
8+
-----BEGIN CERTIFICATE-----
9+
MIICCzCCAZGgAwIBAgISEdK7ujNu1LzmJGjFDYQdmOhDMAoGCCqGSM49BAMDMEYx
10+
CzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRwwGgYDVQQD
11+
ExNHbG9iYWxTaWduIFJvb3QgRTQ2MB4XDTE5MDMyMDAwMDAwMFoXDTQ2MDMyMDAw
12+
MDAwMFowRjELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2Ex
13+
HDAaBgNVBAMTE0dsb2JhbFNpZ24gUm9vdCBFNDYwdjAQBgcqhkjOPQIBBgUrgQQA
14+
IgNiAAScDrHPt+ieUnd1NPqlRqetMhkytAepJ8qUuwzSChDH2omwlwxwEwkBjtjq
15+
R+q+soArzfwoDdusvKSGN+1wCAB16pMLey5SnCNoIwZD7JIvU4Tb+0cUB+hflGdd
16+
yXqBPCCjQjBAMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1Ud
17+
DgQWBBQxCpCPtsad0kRLgLWi5h+xEk8blTAKBggqhkjOPQQDAwNoADBlAjEA31SQ
18+
7Zvvi5QCkxeCmb6zniz2C5GMn0oUsfZkvLtoURMMA/cVi4RguYv/Uo7njLwcAjA8
19+
+RHUjE7AwWHCFUyqqx0LMV87HOIAl0Qx5v5zli/altP+CAezNIm8BZ/3Hobui3A=
20+
-----END CERTIFICATE-----

‎jdk/make/data/cacerts/globalsignr46

+38
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
Owner: CN=GlobalSign Root R46, O=GlobalSign nv-sa, C=BE
2+
Issuer: CN=GlobalSign Root R46, O=GlobalSign nv-sa, C=BE
3+
Serial number: 11d2bbb9d723189e405f0a9d2dd0df2567d1
4+
Valid from: Wed Mar 20 00:00:00 GMT 2019 until: Tue Mar 20 00:00:00 GMT 2046
5+
Signature algorithm name: SHA384withRSA
6+
Subject Public Key Algorithm: 4096-bit RSA key
7+
Version: 3
8+
-----BEGIN CERTIFICATE-----
9+
MIIFWjCCA0KgAwIBAgISEdK7udcjGJ5AXwqdLdDfJWfRMA0GCSqGSIb3DQEBDAUA
10+
MEYxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRwwGgYD
11+
VQQDExNHbG9iYWxTaWduIFJvb3QgUjQ2MB4XDTE5MDMyMDAwMDAwMFoXDTQ2MDMy
12+
MDAwMDAwMFowRjELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYt
13+
c2ExHDAaBgNVBAMTE0dsb2JhbFNpZ24gUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEB
14+
AQUAA4ICDwAwggIKAoICAQCsrHQy6LNl5brtQyYdpokNRbopiLKkHWPd08EsCVeJ
15+
OaFV6Wc0dwxu5FUdUiXSE2te4R2pt32JMl8Nnp8semNgQB+msLZ4j5lUlghYruQG
16+
vGIFAha/r6gjA7aUD7xubMLL1aa7DOn2wQL7Id5m3RerdELv8HQvJfTqa1VbkNud
17+
316HCkD7rRlr+/fKYIje2sGP1q7Vf9Q8g+7XFkyDRTNrJ9CG0Bwta/OrffGFqfUo
18+
0q3v84RLHIf8E6M6cqJaESvWJ3En7YEtbWaBkoe0G1h6zD8K+kZPTXhc+CtI4wSE
19+
y132tGqzZfxCnlEmIyDLPRT5ge1lFgBPGmSXZgjPjHvjK8Cd+RTyG/FWaha/LIWF
20+
zXg4mutCagI0GIMXTpRW+LaCtfOW3T3zvn8gdz57GSNrLNRyc0NXfeD412lPFzYE
21+
+cCQYDdF3uYM2HSNrpyibXRdQr4G9dlkbgIQrImwTDsHTUB+JMWKmIJ5jqSngiCN
22+
I/onccnfxkF0oE32kRbcRoxfKWMxWXEM2G/CtjJ9++ZdU6Z+Ffy7dXxd7Pj2Fxzs
23+
x2sZy/N78CsHpdlseVR2bJ0cpm4O6XkMqCNqo98bMDGfsVR7/mrLZqrcZdCinkqa
24+
ByFrgY/bxFn63iLABJzjqls2k+g9vXqhnQt2sQvHnf3PmKgGwvgqo6GDoLclcqUC
25+
4wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNV
26+
HQ4EFgQUA1yrc4GHqMywptWU4jaWSf8FmSwwDQYJKoZIhvcNAQEMBQADggIBAHx4
27+
7PYCLLtbfpIrXTncvtgdokIzTfnvpCo7RGkerNlFo048p9gkUbJUHJNOxO97k4Vg
28+
JuoJSOD1u8fpaNK7ajFxzHmuEajwmf3lH7wvqMxX63bEIaZHU1VNaL8FpO7XJqti
29+
2kM3S+LGteWygxk6x9PbTZ4IevPuzz5i+6zoYMzRx6Fcg0XERczzF2sUyQQCPtIk
30+
pnnpHs6i58FZFZ8d4kuaPp92CC1r2LpXFNqD6v6MVenQTqnMdzGxRBF6XLE+0xRF
31+
FRhiJBPSy03OXIPBNvIQtQ6IbbjhVp+J3pZmOUdkLG5NrmJ7v2B0GbhWrJKsFjLt
32+
rWhV/pi60zTe9Mlhww6G9kuEYO4Ne7UyWHmRVSyBQ7N0H3qqJZ4d16GLuc1CLgSk
33+
ZoNNiTW2bKg2SnkheCLQQrzRQDGQob4Ez8pn7fXwgNNgyYMqIgXQBztSvwyeqiv5
34+
u+YfjyW6hY0XHgL+XVAEV8/+LbzvXMAaq7afJMbfc2hIkCwU9D9SGuTSyxTDYWnP
35+
4vkYxboznxSjBF25cfe1lNj2M8FawTSLfJvdkzrnE6JwYZ+vj+vYxXX4M2bUdGc6
36+
N3ec592kD3ZDZopD8p/7DEJ4Y9HiD2971KE9dJeFt0g5QdYg/NA6s/rob8SKunE3
37+
vouXsXgxT7PntgMTzlSdriVZzH81Xwj3QEUxeCp6
38+
-----END CERTIFICATE-----
+49
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
#
2+
# source: 34B003AF.RPMAP130
3+
# c->b only entries
4+
#
5+
815C 2015
6+
8160 FF5E
7+
8161 2225
8+
817C FF0D
9+
88A0 555E
10+
898B 7130
11+
89A8 9DD7
12+
8A9A 5699
13+
8BA0 4FE0
14+
8BEB 8EC0
15+
8C71 7E6B
16+
8C74 8346
17+
8CB2 9E7C
18+
8D8D 9EB4
19+
8DF2 6805
20+
8EC6 5C62
21+
8F4A 7E61
22+
8FD3 8523
23+
8FDD 91AC
24+
90E4 87EC
25+
917E 6414
26+
9189 7626
27+
91CB 9A52
28+
925C 7C1E
29+
92CD 6451
30+
9355 5861
31+
935E 985A
32+
9398 79B1
33+
93C0 7006
34+
9458 56CA
35+
948D 525D
36+
94AC 6F51
37+
94AE 91B1
38+
966A 9830
39+
96CB 9EB5
40+
9789 840A
41+
9858 881F
42+
9BA0 5C5B
43+
9DB7 6522
44+
9E94 688E
45+
E379 7E48
46+
E445 8141
47+
E8F6 9839
48+
FA55 FFE4
49+
FA59 F86F

‎jdk/test/ProblemList.txt

-5
Original file line numberDiff line numberDiff line change
@@ -390,9 +390,4 @@ sample/chatserver/ChatTest.java 8178912 generic-all
390390

391391
############################################################################
392392
security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java#certignarootca 8331883 generic-all
393-
security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java#globalsigneccrootcar4 8328825 generic-all
394-
security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java#gtsrootcar1 8328825 generic-all
395-
security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java#gtsrootcar2 8328825 generic-all
396-
security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java#gtsrootecccar3 8328825 generic-all
397-
security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java#gtsrootecccar4 8328825 generic-all
398393
security/infra/java/security/cert/CertPathValidator/certification/LuxTrustCA.java 8314509 generic-all

‎jdk/test/java/beans/XMLEncoder/Test4625418.java

+4-4
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 2006, 2016, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 2006, 2020, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -23,7 +23,7 @@
2323

2424
/*
2525
* @test
26-
* @bug 4625418
26+
* @bug 4625418 8239965
2727
* @summary Tests XML <a href="http://download.java.net/jdk6/docs/technotes/guides/intl/encoding.doc.html">encoding</a>
2828
* @author Sergey Malenkov
2929
* @run main/timeout=360 Test4625418
@@ -126,7 +126,7 @@ public final class Test4625418 implements ExceptionListener {
126126
//"Cp939",
127127
//"Cp942",
128128
//"Cp942C",
129-
"Cp943",
129+
//"Cp943",
130130
//"Cp943C",
131131
"Cp948",
132132
"Cp949",
@@ -307,7 +307,7 @@ public final class Test4625418 implements ExceptionListener {
307307
//"x-IBM939",
308308
//"x-IBM942",
309309
//"x-IBM942C",
310-
"x-IBM943",
310+
//"x-IBM943",
311311
//"x-IBM943C",
312312
"x-IBM948",
313313
"x-IBM949",

‎jdk/test/security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java

+32-10
Original file line numberDiff line numberDiff line change
@@ -207,8 +207,7 @@
207207
* @summary Interoperability tests with Google's GlobalSign R4 and GTS Root certificates
208208
* @library /test/lib
209209
* @build jtreg.SkippedException ValidatePathWithURL CAInterop
210-
* @run main/othervm -Djava.security.debug=certpath,ocsp CAInterop globalsigneccrootcar4 OCSP
211-
* @run main/othervm -Djava.security.debug=certpath CAInterop globalsigneccrootcar4 CRL
210+
* @run main/othervm -Djava.security.debug=certpath,ocsp CAInterop globalsigneccrootcar4 DEFAULT
212211
*/
213212

214213
/*
@@ -217,8 +216,7 @@
217216
* @summary Interoperability tests with Google's GlobalSign R4 and GTS Root certificates
218217
* @library /test/lib
219218
* @build jtreg.SkippedException ValidatePathWithURL CAInterop
220-
* @run main/othervm -Djava.security.debug=certpath,ocsp CAInterop gtsrootcar1 OCSP
221-
* @run main/othervm -Djava.security.debug=certpath CAInterop gtsrootcar1 CRL
219+
* @run main/othervm -Djava.security.debug=certpath,ocsp CAInterop gtsrootcar1 DEFAULT
222220
*/
223221

224222
/*
@@ -227,8 +225,7 @@
227225
* @summary Interoperability tests with Google's GlobalSign R4 and GTS Root certificates
228226
* @library /test/lib
229227
* @build jtreg.SkippedException ValidatePathWithURL CAInterop
230-
* @run main/othervm -Djava.security.debug=certpath,ocsp CAInterop gtsrootcar2 OCSP
231-
* @run main/othervm -Djava.security.debug=certpath CAInterop gtsrootcar2 CRL
228+
* @run main/othervm -Djava.security.debug=certpath,ocsp CAInterop gtsrootcar2 DEFAULT
232229
*/
233230

234231
/*
@@ -237,8 +234,7 @@
237234
* @summary Interoperability tests with Google's GlobalSign R4 and GTS Root certificates
238235
* @library /test/lib
239236
* @build jtreg.SkippedException ValidatePathWithURL CAInterop
240-
* @run main/othervm -Djava.security.debug=certpath,ocsp CAInterop gtsrootecccar3 OCSP
241-
* @run main/othervm -Djava.security.debug=certpath CAInterop gtsrootecccar3 CRL
237+
* @run main/othervm -Djava.security.debug=certpath,ocsp CAInterop gtsrootecccar3 DEFAULT
242238
*/
243239

244240
/*
@@ -247,8 +243,7 @@
247243
* @summary Interoperability tests with Google's GlobalSign R4 and GTS Root certificates
248244
* @library /test/lib
249245
* @build jtreg.SkippedException ValidatePathWithURL CAInterop
250-
* @run main/othervm -Djava.security.debug=certpath,ocsp CAInterop gtsrootecccar4 OCSP
251-
* @run main/othervm -Djava.security.debug=certpath CAInterop gtsrootecccar4 CRL
246+
* @run main/othervm -Djava.security.debug=certpath,ocsp CAInterop gtsrootecccar4 DEFAULT
252247
*/
253248

254249
/*
@@ -469,6 +464,26 @@
469464
* @run main/othervm -Djava.security.debug=certpath,ocsp CAInterop certainlyroote1 DEFAULT
470465
*/
471466

467+
/*
468+
* @test id=globalsignr46
469+
* @bug 8316138
470+
* @summary Interoperability tests with GlobalSign Root R46
471+
* @library /test/lib
472+
* @build jtreg.SkippedException ValidatePathWithURL CAInterop
473+
* @run main/othervm -Djava.security.debug=certpath,ocsp CAInterop globalsignr46 OCSP
474+
* @run main/othervm -Djava.security.debug=certpath CAInterop globalsignr46 CRL
475+
*/
476+
477+
/*
478+
* @test id=globalsigne46
479+
* @bug 8316138
480+
* @summary Interoperability tests with GlobalSign Root E46
481+
* @library /test/lib
482+
* @build jtreg.SkippedException ValidatePathWithURL CAInterop
483+
* @run main/othervm -Djava.security.debug=certpath,ocsp CAInterop globalsigne46 OCSP
484+
* @run main/othervm -Djava.security.debug=certpath CAInterop globalsigne46 CRL
485+
*/
486+
472487
/**
473488
* Collection of certificate validation tests for interoperability with external CAs
474489
*/
@@ -638,6 +653,13 @@ private CATestURLs getTestURLs(String alias) {
638653
return new CATestURLs("https://valid.root-e1.certainly.com",
639654
"https://revoked.root-e1.certainly.com");
640655

656+
case "globalsignr46":
657+
return new CATestURLs("https://valid.r46.roots.globalsign.com",
658+
"https://revoked.r46.roots.globalsign.com");
659+
case "globalsigne46":
660+
return new CATestURLs("https://valid.e46.roots.globalsign.com",
661+
"https://revoked.e46.roots.globalsign.com");
662+
641663
default: throw new RuntimeException("No test setup found for: " + alias);
642664
}
643665
}

‎jdk/test/sun/nio/cs/TestIBMBugs.java

+61-3
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 2008, 2013, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 2008, 2020, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -22,13 +22,13 @@
2222
*/
2323

2424
/* @test
25-
@bug 6371437 6371422 6371416 6371619 5058184 6371431 6639450 6569191 6577466
26-
@summary Check if the problems reported in above bugs have been fixed
25+
@bug 6371437 6371422 6371416 6371619 5058184 6371431 6639450 6569191 6577466 8235834
2726
*/
2827

2928
import java.io.*;
3029
import java.nio.*;
3130
import java.nio.charset.*;
31+
import java.util.Arrays;
3232

3333
public class TestIBMBugs {
3434

@@ -172,6 +172,63 @@ private static void bug6577466 () throws Exception {
172172
}
173173
}
174174

175+
// Following test data is for 8235834
176+
private static final byte[] byteIBM943c2b = new byte[] {
177+
(byte)0x81, (byte)0x5C, (byte)0x81, (byte)0x60,
178+
(byte)0x81, (byte)0x61, (byte)0x81, (byte)0x7C,
179+
(byte)0x88, (byte)0xA0, (byte)0x89, (byte)0x8B,
180+
(byte)0x89, (byte)0xA8, (byte)0x8A, (byte)0x9A,
181+
(byte)0x8B, (byte)0xA0, (byte)0x8B, (byte)0xEB,
182+
(byte)0x8C, (byte)0x71, (byte)0x8C, (byte)0x74,
183+
(byte)0x8C, (byte)0xB2, (byte)0x8D, (byte)0x8D,
184+
(byte)0x8D, (byte)0xF2, (byte)0x8E, (byte)0xC6,
185+
(byte)0x8F, (byte)0x4A, (byte)0x8F, (byte)0xD3,
186+
(byte)0x8F, (byte)0xDD, (byte)0x90, (byte)0xE4,
187+
(byte)0x91, (byte)0x7E, (byte)0x91, (byte)0x89,
188+
(byte)0x91, (byte)0xCB, (byte)0x92, (byte)0x5C,
189+
(byte)0x92, (byte)0xCD, (byte)0x93, (byte)0x55,
190+
(byte)0x93, (byte)0x5E, (byte)0x93, (byte)0x98,
191+
(byte)0x93, (byte)0xC0, (byte)0x94, (byte)0x58,
192+
(byte)0x94, (byte)0x8D, (byte)0x94, (byte)0xAC,
193+
(byte)0x94, (byte)0xAE, (byte)0x96, (byte)0x6A,
194+
(byte)0x96, (byte)0xCB, (byte)0x97, (byte)0x89,
195+
(byte)0x98, (byte)0x58, (byte)0x9B, (byte)0xA0,
196+
(byte)0x9D, (byte)0xB7, (byte)0x9E, (byte)0x94,
197+
(byte)0xE3, (byte)0x79, (byte)0xE4, (byte)0x45,
198+
(byte)0xE8, (byte)0xF6, (byte)0xFA, (byte)0x55,
199+
(byte)0xFA, (byte)0x59,
200+
};
201+
202+
private static final String strIBM943c2b1 =
203+
"\u2015\uFF5E\u2225\uFF0D\u555E\u7130\u9DD7\u5699" +
204+
"\u4FE0\u8EC0\u7E6B\u8346\u9E7C\u9EB4\u6805\u5C62" +
205+
"\u7E61\u8523\u91AC\u87EC\u6414\u7626\u9A52\u7C1E" +
206+
"\u6451\u5861\u985A\u79B1\u7006\u56CA\u525D\u6F51" +
207+
"\u91B1\u9830\u9EB5\u840A\u881F\u5C5B\u6522\u688E" +
208+
"\u7E48\u8141\u9839\uFFE4\uF86F";
209+
210+
private static final String strIBM943c2b2 =
211+
"\u2014\u301C\u2016\u2212\u5516\u7114\u9D0E\u565B" +
212+
"\u4FA0\u8EAF\u7E4B\u834A\u9E78\u9EB9\u67F5\u5C61" +
213+
"\u7E4D\u848B\u91A4\u8749\u63BB\u75E9\u9A28\u7BAA" +
214+
"\u63B4\u586B\u985B\u7977\u6D9C\u56A2\u5265\u6E8C" +
215+
"\u9197\u982C\u9EBA\u83B1\u874B\u5C4F\u6505\u688D" +
216+
"\u7E66\u80FC\u983D\u00A6\u2116";
217+
218+
private static void bug8235834 () throws Exception {
219+
// 8235834 affects IBM-943 and IBM-943C encoder.
220+
// The decoded results of the corresponding characters of IBM-943
221+
// and IBM-943C is the same.
222+
for (String csName : new String[] {"x-IBM943", "x-IBM943C"}) {
223+
Charset cs = Charset.forName(csName);
224+
if (!Arrays.equals(byteIBM943c2b, strIBM943c2b1.getBytes(cs))) {
225+
throw new Exception(csName+" failed to encode");
226+
}
227+
if (!strIBM943c2b2.equals(new String(byteIBM943c2b, cs))) {
228+
throw new Exception(csName+" failed to round-trip conversion");
229+
}
230+
}
231+
}
175232
public static void main (String[] args) throws Exception {
176233
bug6577466();
177234
// need to be tested before any other IBM949C test case
@@ -182,5 +239,6 @@ public static void main (String[] args) throws Exception {
182239
bug6371619();
183240
bug6371431();
184241
bug6569191();
242+
bug8235834();
185243
}
186244
}

‎jdk/test/sun/security/lib/cacerts/VerifyCACerts.java

+7-3
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@
2929
* 8223499 8225392 8232019 8234245 8233223 8225068 8225069 8243321 8243320
3030
* 8243559 8225072 8258630 8259312 8256421 8225081 8225082 8225083 8245654
3131
* 8305975 8304760 8307134 8295894 8314960 8317373 8317374 8318759 8319187
32-
* 8321408
32+
* 8321408 8316138
3333
* @summary Check root CA entries in cacerts file
3434
*/
3535
import java.io.ByteArrayInputStream;
@@ -55,12 +55,12 @@ public class VerifyCACerts {
5555
+ File.separator + "security" + File.separator + "cacerts";
5656

5757
// The numbers of certs now.
58-
private static final int COUNT = 108;
58+
private static final int COUNT = 110;
5959

6060
// SHA-256 of cacerts, can be generated with
6161
// shasum -a 256 cacerts | sed -e 's/../&:/g' | tr '[:lower:]' '[:upper:]' | cut -c1-95
6262
private static final String CHECKSUM
63-
= "81:D4:84:F6:92:78:A4:82:25:06:DC:42:25:C9:5D:6C:63:E4:99:CE:BC:ED:66:B3:8C:BA:E6:BA:6B:34:0F:01";
63+
= "C1:68:B4:AC:51:BF:B5:C6:FD:20:69:17:E1:AF:E4:5B:01:9B:AA:3F:C3:9A:80:A8:51:53:74:2C:A2:04:B0:FF";
6464

6565
// map of cert alias to SHA-256 fingerprint
6666
@SuppressWarnings("serial")
@@ -283,6 +283,10 @@ public class VerifyCACerts {
283283
"77:B8:2C:D8:64:4C:43:05:F7:AC:C5:CB:15:6B:45:67:50:04:03:3D:51:C6:0C:62:02:A8:E0:C3:34:67:D3:A0");
284284
put("certainlyroote1 [jdk]",
285285
"B4:58:5F:22:E4:AC:75:6A:4E:86:12:A1:36:1C:5D:9D:03:1A:93:FD:84:FE:BB:77:8F:A3:06:8B:0F:C4:2D:C2");
286+
put("globalsignr46 [jdk]",
287+
"4F:A3:12:6D:8D:3A:11:D1:C4:85:5A:4F:80:7C:BA:D6:CF:91:9D:3A:5A:88:B0:3B:EA:2C:63:72:D9:3C:40:C9");
288+
put("globalsigne46 [jdk]",
289+
"CB:B9:C4:4D:84:B8:04:3E:10:50:EA:31:A6:9F:51:49:55:D7:BF:D2:E2:C6:B4:93:01:01:9A:D6:1D:9F:50:58");
286290
}
287291
};
288292

0 commit comments

Comments
 (0)
Please sign in to comment.