Skip to main content

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [List Home]
[golo-dev] JDK 16 Early Access build 26 is now available

Hi Julien,

OpenJDK 16 Early Access build 26 is now available at http://jdk.java.net/16
  • Schedule: JDK 16 Rampdown Phase One Starts on 2020/12/10 [1]
  • Features [1]: Most recent Integrations:
    • Integrated JEP 389: Foreign Linker API (Incubator) with this release.
      • JEP 389 introduces an API that offers statically-typed, pure-Java access to native code.
      • This API, together with the JEP 383, will considerably simplify the otherwise error-prone process of binding to a native library.
  • Release Notes [2]
  • Changes in recent builds that maybe of interest:
    • Build 26
      • JDK-8202343: Disable TLS 1.0 and 1.1
      • JDK-8251317: Support for CLDR version 38
      • JDK-8212879: Make JVMTI TagMap table concurrent
      • JDK-8236926: Concurrently uncommit memory in G1
      • JDK-8243559: Removed Root Certificates with 1024-bit Keys
      • JDK-8253459: Argument index of zero or unrepresentable by int throws IllegalFormatException
      • JDK-8256643: Terminally deprecate ThreadGroup stop, destroy, isDestroyed, setDaemon and isDaemon
    • Build 25
      • JDK-8247781: Day period support added to java.time formats
      • JDK-8202471: (ann) Cannot read type annotations on generic receiver type's type variables [Reported by ByteBuddy]
      • JDK-8255947: [macos] Signed macOS jpackage app doesn't filter spurious '-psn' argument [Reported by JOSM]
      • JDK-8256063: Module::getPackages returns the set of package names in this module

Project Lanai Early-Access: EA 7 Build 16-lanai+3-278 (2020/11/17)

The Java Cryptographic Roadmap has been updated [3]:

  • Distrust TLS 1.0 and TLS 1.1 by default
    • TLS protocol versions 1.0 and 1.1 are no longer considered secure and have been superseded by more secure and modern versions (TLS 1.2 and 1.3). This change has been integrated with JDK 16 Early Access build 26.
  • Upgrade of default algorithms used to encrypt PKCS12 keystores
    • The new algorithms are based on AES-256 and SHA-256 and are stronger than the old algorithms which were based on RC2, DESede, and SHA-1.This change is already included in JDK 16 Early Access build 23.
RgdsRory

[1] https://openjdk.java.net/projects/jdk/16/
[2] https://jdk.java.net/16/release-notes
[3] https://www.java.com/en/jre-jdk-cryptoroadmap.html
-- 
Rgds, Rory O'Donnell
Quality Engineering Manager
Oracle EMEA, Dublin, Ireland

Back to the top