-
Bug
-
Resolution: Fixed
-
P3
-
None
-
b01
-
solaris_11
Issue | Fix Version | Assignee | Priority | Status | Resolution | Resolved In Build |
---|---|---|---|---|---|---|
JDK-8263828 | 11.0.11-oracle | Dukebot | P3 | Resolved | Fixed | b09 |
JDK-8263500 | 8u301 | Prajwal Kumaraswamy | P3 | Resolved | Fixed | b01 |
JDK-8262850 | 8u291 | Prajwal Kumaraswamy | P4 | Resolved | Fixed | b09 |
JDK-8264250 | emb-8u291 | Prajwal Kumaraswamy | P3 | Resolved | Fixed | team |
Currently OracleUcrypto Provider calls NativeCipher.nativeFinal(id, encrypt, null, 0); to free up context memory at native level. That leads to a ucryptoEncryptFinal type solaris call with NULL/0 passed for output Len.
Solaris team have advised that ucrypto_free_context function be used instead. We'd have to investigate when this call became available on solaris.
Solaris team have advised that ucrypto_free_context function be used instead. We'd have to investigate when this call became available on solaris.
- backported by
-
JDK-8263500 Use ucrypto_free_context for clean operation in Solaris Ucrypto/pkcs11
-
- Resolved
-
-
JDK-8263828 Use ucrypto_free_context for clean operation in Solaris Ucrypto/pkcs11
-
- Resolved
-
-
JDK-8264250 Use ucrypto_free_context for clean operation in Solaris Ucrypto/pkcs11
-
- Resolved
-
-
JDK-8262850 Use ucrypto_free_context for clean operation in Solaris Ucrypto/pkcs11
-
- Resolved
-
- relates to
-
JDK-8260340 Solaris native memory leak in libucrypto for GCM based Ciphers
-
- Closed
-