source:
patches/gcc-4.3.3-branch_update-1.patch@
fe40bd7
Last change on this file since fe40bd7 was fe40bd7, checked in by , 16 years ago | |
---|---|
|
|
File size: 246.9 KB |
-
gcc/alias.c
Submitted By: Jim Gifford (jim at cross-lfs dot org) Date: 02-03-2009 Initial Package Version: 4.3.3 Origin: Upstream Upstream Status: Applied Description: This is a branch update for gcc-4.3.3, and should be rechecked periodically. diff -Naur gcc-4.3.3.orig/gcc/alias.c gcc-4.3.3/gcc/alias.c
old new 1508 1508 if (rtx_equal_p (x_base, y_base)) 1509 1509 return 1; 1510 1510 1511 /* The base addresses of the read and write are different expressions. 1512 If they are both symbols and they are not accessed via AND, there is 1513 no conflict. We can bring knowledge of object alignment into play 1514 here. For example, on alpha, "char a, b;" can alias one another, 1515 though "char a; long b;" cannot. */ 1511 /* The base addresses are different expressions. If they are not accessed 1512 via AND, there is no conflict. We can bring knowledge of object 1513 alignment into play here. For example, on alpha, "char a, b;" can 1514 alias one another, though "char a; long b;" cannot. AND addesses may 1515 implicitly alias surrounding objects; i.e. unaligned access in DImode 1516 via AND address can alias all surrounding object types except those 1517 with aligment 8 or higher. */ 1518 if (GET_CODE (x) == AND && GET_CODE (y) == AND) 1519 return 1; 1520 if (GET_CODE (x) == AND 1521 && (GET_CODE (XEXP (x, 1)) != CONST_INT 1522 || (int) GET_MODE_UNIT_SIZE (y_mode) < -INTVAL (XEXP (x, 1)))) 1523 return 1; 1524 if (GET_CODE (y) == AND 1525 && (GET_CODE (XEXP (y, 1)) != CONST_INT 1526 || (int) GET_MODE_UNIT_SIZE (x_mode) < -INTVAL (XEXP (y, 1)))) 1527 return 1; 1528 1529 /* Differing symbols not accessed via AND never alias. */ 1516 1530 if (GET_CODE (x_base) != ADDRESS && GET_CODE (y_base) != ADDRESS) 1517 { 1518 if (GET_CODE (x) == AND && GET_CODE (y) == AND) 1519 return 1; 1520 if (GET_CODE (x) == AND 1521 && (GET_CODE (XEXP (x, 1)) != CONST_INT 1522 || (int) GET_MODE_UNIT_SIZE (y_mode) < -INTVAL (XEXP (x, 1)))) 1523 return 1; 1524 if (GET_CODE (y) == AND 1525 && (GET_CODE (XEXP (y, 1)) != CONST_INT 1526 || (int) GET_MODE_UNIT_SIZE (x_mode) < -INTVAL (XEXP (y, 1)))) 1527 return 1; 1528 /* Differing symbols never alias. */ 1529 return 0; 1530 } 1531 return 0; 1531 1532 1532 1533 /* If one address is a stack reference there can be no alias: 1533 1534 stack references using different base registers do not alias, -
gcc/calls.c
diff -Naur gcc-4.3.3.orig/gcc/calls.c gcc-4.3.3/gcc/calls.c
old new 978 978 && targetm.calls.split_complex_arg (argtype)) 979 979 { 980 980 tree subtype = TREE_TYPE (argtype); 981 arg = save_expr (arg);982 981 args[j].tree_value = build1 (REALPART_EXPR, subtype, arg); 983 982 j += inc; 984 983 args[j].tree_value = build1 (IMAGPART_EXPR, subtype, arg); -
gcc/ChangeLog
diff -Naur gcc-4.3.3.orig/gcc/ChangeLog gcc-4.3.3/gcc/ChangeLog
old new 1 2009-02-02 Catherine Moore <clm@codesourcery.com> 2 3 * sde.h (SUBTARGET_ARM_SPEC): Don't assemble -fpic code as 4 -mabicalls. 5 6 2009-01-31 John David Anglin <dave.anglin@nrc-cnrc.gc.ca> 7 8 * config/pa/fptr.c: Revert license to GPL 2. 9 * config/pa/milli64.S: Likewise. 10 11 2009-01-30 Richard Guenther <rguenther@suse.de> 12 13 PR tree-optimization/39041 14 * tree-ssa-forwprop.c (forward_propagate_addr_expr_1): 15 Propagate variable indices only if the types match for this stmt. 16 17 2009-01-29 Uros Bizjak <ubizjak@gmail.com> 18 19 Backport from mainline: 20 2009-01-28 Uros Bizjak <ubizjak@gmail.com> 21 22 PR target/38988 23 * config/i386/i386.md (set_rip_rex64): Wrap operand 1 in label_ref. 24 (set_got_offset_rex64): Ditto. 25 26 2009-01-27 Uros Bizjak <ubizjak@gmail.com> 27 28 PR middle-end/38969 29 * calls.c (initialize_argument_information): Do not wrap complex 30 arguments in SAVE_EXPR. 31 32 2009-01-27 Steve Ellcey <sje@cup.hp.com> 33 34 PR middle-end/38615 35 * gimplify.c (gimplify_init_constructor): Fix promotion of const 36 variables to static. 37 * doc/invoke.texi (-fmerge-all-constants): Update description. 38 39 2009-01-27 Uros Bizjak <ubizjak@gmail.com> 40 41 Backport from mainline: 42 2009-01-13 Uros Bizjak <ubizjak@gmail.com> 43 44 * config/alpha/alpha.c (alpha_legitimate_address_p): Explicit 45 relocations of local symbols wider than UNITS_PER_WORD are not valid. 46 (alpha_legitimize_address): Do not split local symbols wider than 47 UNITS_PER_WORD into HIGH/LO_SUM parts. 48 49 2009-01-07 Uros Bizjak <ubizjak@gmail.com> 50 51 PR target/38706 52 * config/alpha/alpha.c (alpha_end_function): For TARGET_ABI_OSF, call 53 free_after_compilation when outputting a thunk. 54 (alpha_output_mi_thunk_osf): Assert that we are processing a thunk. 55 Do not call free_after_compilation here. 56 57 2008-12-22 Uros Bizjak <ubizjak@gmail.com> 58 59 * config/alpha/elf.h (ASM_OUTPUT_EXTERNAL): New macro. 60 61 2008-12-21 Uros Bizjak <ubizjak@gmail.com> 62 63 * config/alpha/alpha.c (alpha_pad_noreturn): New static function. 64 (alpha_reorg): Call alpha_pad_noreturn. 65 66 2008-12-08 Uros Bizjak <ubizjak@gmail.com> 67 68 * config/alpha/alpha.c (alpha_set_memflags): Process memory 69 references in full insn sequence. 70 71 2008-12-05 Uros Bizjak <ubizjak@gmail.com> 72 73 * config/alpha/alpha.c (alpha_fold_vector_minmax): Create 74 VIEW_CONVERT_EXPR to convert output to long_integer_type_node. 75 76 (alpha_emit_conditional_branch): Do not generate direct branch 77 for UNORDERED comparisons. 78 79 2008-01-26 Paolo Bonzini <bonzini@gnu.org> 80 81 PR tree-optimization/38932 82 * fold-const.c (fold_unary_ignore_overflow): New. 83 * tree.h (fold_unary_ignore_overflow): Declare. 84 * tree-ssa-ccp.c (ccp_fold): Use fold_unary_ignore_overflow. 85 * tree-ssa-sccvn.c (simplify_unary_expression): Likewise. 86 87 2009-01-25 Uros Bizjak <ubizjak@gmail.com> 88 89 Backport from mainline: 90 2009-01-22 Uros Bizjak <ubizjak@gmail.com> 91 92 PR target/38931 93 * config/i386/i386.md (*movsi_1): Use type "mmx" for alternative 2. 94 (*movdi_1_rex64): Use type "mmx" for alternative 5. 95 96 2009-01-21 Uros Bizjak <ubizjak@gmail.com> 97 98 PR rtl-optimization/38879 99 * alias.c (base_alias_check): Unaligned access via AND address can 100 alias all surrounding object types except those with sizes equal 101 or wider than the size of unaligned access. 102 103 2009-01-25 Richard Guenther <rguenther@suse.de> 104 105 Backport from mainline: 106 2008-12-02 Richard Guenther <rguenther@suse.de> 107 108 PR tree-optimization/38359 109 * fold-const.c (fold_binary): Fold -1 >> x to -1 only for 110 non-negative x. 111 112 2009-01-24 Eric Botcazou <ebotcazou@adacore.com> 113 114 * config/sparc/linux.h (DBX_REGISTER_NUMBER): Delete. 115 * config/sparc/linux64.h (DBX_REGISTER_NUMBER): Likewise. 116 * config/sparc/sysv4.h (DBX_REGISTER_NUMBER): Likewise. 117 118 2009-01-24 H.J. Lu <hongjiu.lu@intel.com> 119 120 PR target/38902 121 Backport from mainline: 122 2008-12-23 Jakub Jelinek <jakub@redhat.com> 123 124 * config/i386/i386.c (expand_movmem_via_rep_mov): Set MEM_SIZE 125 correctly. 126 (expand_setmem_via_rep_stos): Add ORIG_VALUE argument. If 127 ORIG_VALUE is const0_rtx and COUNT is constant, set MEM_SIZE 128 on DESTMEM. 129 (ix86_expand_setmem): Adjust callers. 130 131 2008-01-24 Richard Guenther <rguenther@suse.de> 132 133 * BASE-VER: Set to 4.3.4. 134 * DEV-PHASE: Set to prerelease. 135 1 136 2009-01-24 Release Manager 2 137 3 138 * GCC 4.3.3 released. … … 5 140 2009-01-20 Joseph Myers <joseph@codesourcery.com> 6 141 7 142 PR other/38758 8 * longlong.h: Update copyright years. Use soft-fp license 9 notice. 143 * longlong.h: Update copyright years. Use soft-fp license notice. 10 144 11 145 2009-01-19 Richard Guenther <rguenther@suse.de> 12 146 … … 41 175 42 176 2009-01-11 Matthias Klose <doko@ubuntu.com> 43 177 44 PR middle-end/38616, backport from mainline: 178 PR middle-end/38616 179 Backport from mainline: 45 180 2008-05-04 Uros Bizjak <ubizjak@gmail.com> 46 181 47 182 * config/i386/i386.md (*strmovsi_1): Simplify asm alternatives. … … 509 644 PR tree-optimization/37102 510 645 * tree-outof-ssa.c (remove_gimple_phi_args): Remove all the PHI args 511 646 from a node. Check to see if another PHI is dead. 512 (eliminate_useless_phis): Rename from eliminate_virtual_phis and remove513 re al PHIs which have no uses.647 (eliminate_useless_phis): Rename from eliminate_virtual_phis and 648 remove real PHIs which have no uses. 514 649 (rewrite_out_of_ssa): Call eliminate_useless_phis. 515 650 516 651 2008-10-08 Simon Martin <simartin@users.sourceforge.net> … … 986 1121 987 1122 (MFC_MIN_DMA_LIST_ELEMENTS): New define. 988 1123 (MFC_MAX_DMA_LIST_ELEMENTS): Likewise. 989 (MFC_MIN_DMA_LIST_SIZE): Redefine in terms of MFC_MIN_DMA_LIST_ELEMENTS. 990 (MFC_MAX_DMA_LIST_SIZE): Redefine in terms of MFC_MAX_DMA_LIST_ELEMENTS. 1124 (MFC_MIN_DMA_LIST_SIZE): Redefine in terms of 1125 MFC_MIN_DMA_LIST_ELEMENTS. 1126 (MFC_MAX_DMA_LIST_SIZE): Redefine in terms of 1127 MFC_MAX_DMA_LIST_ELEMENTS. 991 1128 992 1129 (MFC_START_ENABLE): Remove PPU-only define. 993 1130 (MFC_PUTS_CMD, MFC_PUTFS_CMD, MFC_PUTBS_CMD): Likewise. -
gcc/config/alpha/alpha.c
diff -Naur gcc-4.3.3.orig/gcc/config/alpha/alpha.c gcc-4.3.3/gcc/config/alpha/alpha.c
old new 1 1 /* Subroutines used for code generation on the DEC Alpha. 2 2 Copyright (C) 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 3 2002, 2003, 2004, 2005, 2006, 2007 Free Software Foundation, Inc. 3 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009 4 Free Software Foundation, Inc. 4 5 Contributed by Richard Kenner (kenner@vlsi1.ultra.nyu.edu) 5 6 6 7 This file is part of GCC. … … 863 864 } 864 865 } 865 866 866 /* If we're managing explicit relocations, LO_SUM is valid, as 867 are small data symbols. */ 868 else if (TARGET_EXPLICIT_RELOCS) 867 /* If we're managing explicit relocations, LO_SUM is valid, as are small 868 data symbols. Avoid explicit relocations in modes larger than word 869 mode since i.e. $LC0+8($1) can fold around +/- 32k offset. */ 870 else if (TARGET_EXPLICIT_RELOCS 871 && GET_MODE_SIZE (mode) <= UNITS_PER_WORD) 869 872 { 870 873 if (small_symbolic_operand (x, Pmode)) 871 874 return true; … … 915 918 to be legitimate. If we find one, return the new, valid address. */ 916 919 917 920 rtx 918 alpha_legitimize_address (rtx x, rtx scratch, 919 enum machine_mode mode ATTRIBUTE_UNUSED) 921 alpha_legitimize_address (rtx x, rtx scratch, enum machine_mode mode) 920 922 { 921 923 HOST_WIDE_INT addend; 922 924 … … 964 966 goto split_addend; 965 967 } 966 968 967 /* If this is a local symbol, split the address into HIGH/LO_SUM parts. */ 968 if (TARGET_EXPLICIT_RELOCS && symbolic_operand (x, Pmode)) 969 /* If this is a local symbol, split the address into HIGH/LO_SUM parts. 970 Avoid modes larger than word mode since i.e. $LC0+8($1) can fold 971 around +/- 32k offset. */ 972 if (TARGET_EXPLICIT_RELOCS 973 && GET_MODE_SIZE (mode) <= UNITS_PER_WORD 974 && symbolic_operand (x, Pmode)) 969 975 { 970 976 rtx r0, r16, eqv, tga, tp, insn, dest, seq; 971 977 … … 1602 1608 return -1; 1603 1609 } 1604 1610 1605 /* Given INSN, which is an INSN list or the PATTERN of a single insn 1606 generated to perform a memory operation, look for any MEMs in either 1611 /* Given SEQ, which is an INSN list, look for any MEMs in either 1607 1612 a SET_DEST or a SET_SRC and copy the in-struct, unchanging, and 1608 1613 volatile flags from REF into each of the MEMs found. If REF is not 1609 1614 a MEM, don't do anything. */ 1610 1615 1611 1616 void 1612 alpha_set_memflags (rtx insn, rtx ref)1617 alpha_set_memflags (rtx seq, rtx ref) 1613 1618 { 1614 rtx *base_ptr;1619 rtx insn; 1615 1620 1616 if ( GET_CODE (ref) != MEM)1621 if (!MEM_P (ref)) 1617 1622 return; 1618 1623 1619 1624 /* This is only called from alpha.md, after having had something … … 1626 1631 && !MEM_READONLY_P (ref)) 1627 1632 return; 1628 1633 1629 if (INSN_P(insn))1630 base_ptr = &PATTERN (insn);1631 else1632 base_ptr = &insn;1633 for_each_rtx (base_ptr, alpha_set_memflags_1, (void *) ref);1634 for (insn = seq; insn; insn = NEXT_INSN (insn)) 1635 if (INSN_P (insn)) 1636 for_each_rtx (&PATTERN (insn), alpha_set_memflags_1, (void *) ref); 1637 else 1638 gcc_unreachable (); 1634 1639 } 1635 1640 1636 1641 -
gcc/config/alpha/elf.h
static rtx alpha_emit_set_const (rtx, enum machine_mode, HOST_WIDE_INT, @@ -2452,7 +2457,7 @@ if (alpha_compare.fp_p) { cmp_mode = DFmode; - if (flag_unsafe_math_optimizations) + if (flag_unsafe_math_optimizations && cmp_code != UNORDERED) { /* When we are not as concerned about non-finite values, and we are comparing against zero, we can branch directly. */ @@ -6794,7 +6799,7 @@ tree op0 = fold_convert (vtype, op[0]); tree op1 = fold_convert (vtype, op[1]); tree val = fold_build2 (code, vtype, op0, op1); - return fold_convert (long_integer_type_node, val); + return fold_build1 (VIEW_CONVERT_EXPR, long_integer_type_node, val); } static tree @@ -8242,6 +8247,11 @@ if (GET_CODE (insn) == CALL_INSN) output_asm_insn (get_insn_template (CODE_FOR_nop, NULL), NULL); +#if TARGET_ABI_OSF + if (current_function_is_thunk) + free_after_compilation (cfun); +#endif + #if TARGET_ABI_OPEN_VMS alpha_write_linkage (file, fnname, decl); #endif @@ -8281,6 +8291,8 @@ HOST_WIDE_INT hi, lo; rtx this, insn, funexp; + gcc_assert (current_function_is_thunk); + /* We always require a valid GP. */ emit_insn (gen_prologue_ldgp ()); emit_note (NOTE_INSN_PROLOGUE_END); @@ -9268,12 +9280,68 @@ i = next; } } + +/* Insert an unop between a noreturn function call and GP load. */ + +static void +alpha_pad_noreturn (void) +{ + rtx insn, next; + + for (insn = get_insns (); insn; insn = NEXT_INSN (insn)) + { + rtx pat; + + if (!CALL_P (insn) + || !find_reg_note (insn, REG_NORETURN, NULL_RTX)) + continue; + + next = next_active_insn (insn); + + if (next) + { + pat = PATTERN (next); + + if (GET_CODE (pat) == SET + && GET_CODE (SET_SRC (pat)) == UNSPEC_VOLATILE + && XINT (SET_SRC (pat), 1) == UNSPECV_LDGP1) + emit_insn_after (gen_unop (), insn); + } + } +} /* Machine dependent reorg pass. */ static void alpha_reorg (void) { + /* Workaround for a linker error that triggers when an + exception handler immediatelly follows a noreturn function. + + The instruction stream from an object file: + + 54: 00 40 5b 6b jsr ra,(t12),58 <__func+0x58> + 58: 00 00 ba 27 ldah gp,0(ra) + 5c: 00 00 bd 23 lda gp,0(gp) + 60: 00 00 7d a7 ldq t12,0(gp) + 64: 00 40 5b 6b jsr ra,(t12),68 <__func+0x68> + + was converted in the final link pass to: + + fdb24: a0 03 40 d3 bsr ra,fe9a8 <_called_func+0x8> + fdb28: 00 00 fe 2f unop + fdb2c: 00 00 fe 2f unop + fdb30: 30 82 7d a7 ldq t12,-32208(gp) + fdb34: 00 40 5b 6b jsr ra,(t12),fdb38 <__func+0x68> + + GP load instructions were wrongly cleared by the linker relaxation + pass. This workaround prevents removal of GP loads by inserting + an unop instruction between a noreturn function call and + exception handler prologue. */ + + if (current_function_has_exception_handlers ()) + alpha_pad_noreturn (); + if (alpha_tp != ALPHA_TP_PROG || flag_exceptions) alpha_handle_trap_shadows (); diff -Naur gcc-4.3.3.orig/gcc/config/alpha/elf.h gcc-4.3.3/gcc/config/alpha/elf.h
old new 423 423 #if defined(HAVE_LD_EH_FRAME_HDR) 424 424 #define LINK_EH_SPEC "%{!static:--eh-frame-hdr} " 425 425 #endif 426 427 /* A C statement (sans semicolon) to output to the stdio stream STREAM 428 any text necessary for declaring the name of an external symbol 429 named NAME which is referenced in this compilation but not defined. 430 It is needed to properly support non-default visibility. */ 431 432 #ifndef ASM_OUTPUT_EXTERNAL 433 #define ASM_OUTPUT_EXTERNAL(FILE, DECL, NAME) \ 434 default_elf_asm_output_external (FILE, DECL, NAME) 435 #endif -
gcc/config/i386/i386.c
diff -Naur gcc-4.3.3.orig/gcc/config/i386/i386.c gcc-4.3.3/gcc/config/i386/i386.c
old new 14773 14773 destexp = gen_rtx_PLUS (Pmode, destptr, countreg); 14774 14774 srcexp = gen_rtx_PLUS (Pmode, srcptr, countreg); 14775 14775 } 14776 if (CONST_INT_P (count)) 14777 { 14778 count = GEN_INT (INTVAL (count) 14779 & ~((HOST_WIDE_INT) GET_MODE_SIZE (mode) - 1)); 14780 destmem = shallow_copy_rtx (destmem); 14781 srcmem = shallow_copy_rtx (srcmem); 14782 set_mem_size (destmem, count); 14783 set_mem_size (srcmem, count); 14784 } 14785 else 14786 { 14787 if (MEM_SIZE (destmem)) 14788 set_mem_size (destmem, NULL_RTX); 14789 if (MEM_SIZE (srcmem)) 14790 set_mem_size (srcmem, NULL_RTX); 14791 } 14776 14792 emit_insn (gen_rep_mov (destptr, destmem, srcptr, srcmem, countreg, 14777 14793 destexp, srcexp)); 14778 14794 } … … 14781 14797 Arguments have same meaning as for previous function */ 14782 14798 static void 14783 14799 expand_setmem_via_rep_stos (rtx destmem, rtx destptr, rtx value, 14784 rtx count, 14785 enum machine_mode mode)14800 rtx count, enum machine_mode mode, 14801 rtx orig_value) 14786 14802 { 14787 14803 rtx destexp; 14788 14804 rtx countreg; … … 14799 14815 } 14800 14816 else 14801 14817 destexp = gen_rtx_PLUS (Pmode, destptr, countreg); 14818 if (orig_value == const0_rtx && CONST_INT_P (count)) 14819 { 14820 count = GEN_INT (INTVAL (count) 14821 & ~((HOST_WIDE_INT) GET_MODE_SIZE (mode) - 1)); 14822 destmem = shallow_copy_rtx (destmem); 14823 set_mem_size (destmem, count); 14824 } 14825 else if (MEM_SIZE (destmem)) 14826 set_mem_size (destmem, NULL_RTX); 14802 14827 emit_insn (gen_rep_stos (destptr, countreg, destmem, value, destexp)); 14803 14828 } 14804 14829 … … 15871 15896 break; 15872 15897 case rep_prefix_8_byte: 15873 15898 expand_setmem_via_rep_stos (dst, destreg, promoted_val, count_exp, 15874 DImode );15899 DImode, val_exp); 15875 15900 break; 15876 15901 case rep_prefix_4_byte: 15877 15902 expand_setmem_via_rep_stos (dst, destreg, promoted_val, count_exp, 15878 SImode );15903 SImode, val_exp); 15879 15904 break; 15880 15905 case rep_prefix_1_byte: 15881 15906 expand_setmem_via_rep_stos (dst, destreg, promoted_val, count_exp, 15882 QImode );15907 QImode, val_exp); 15883 15908 break; 15884 15909 } 15885 15910 /* Adjust properly the offset of src and dest memory for aliasing. */ -
gcc/config/i386/i386.md
diff -Naur gcc-4.3.3.orig/gcc/config/i386/i386.md gcc-4.3.3/gcc/config/i386/i386.md
old new 1397 1397 gcc_unreachable (); 1398 1398 } 1399 1399 1400 case TYPE_MMX ADD:1400 case TYPE_MMX: 1401 1401 return "pxor\t%0, %0"; 1402 1402 1403 1403 case TYPE_MMXMOV: … … 1415 1415 } 1416 1416 [(set (attr "type") 1417 1417 (cond [(eq_attr "alternative" "2") 1418 (const_string "mmx add")1418 (const_string "mmx") 1419 1419 (eq_attr "alternative" "3,4,5") 1420 1420 (const_string "mmxmov") 1421 1421 (eq_attr "alternative" "6") … … 2231 2231 return "movq\t{%1, %0|%0, %1}"; 2232 2232 2233 2233 case TYPE_SSELOG1: 2234 case TYPE_MMX ADD:2234 case TYPE_MMX: 2235 2235 return "pxor\t%0, %0"; 2236 2236 2237 2237 case TYPE_MULTI: … … 2252 2252 } 2253 2253 [(set (attr "type") 2254 2254 (cond [(eq_attr "alternative" "5") 2255 (const_string "mmx add")2255 (const_string "mmx") 2256 2256 (eq_attr "alternative" "6,7,8,9,10") 2257 2257 (const_string "mmxmov") 2258 2258 (eq_attr "alternative" "11") … … 15001 15001 15002 15002 (define_insn "set_rip_rex64" 15003 15003 [(set (match_operand:DI 0 "register_operand" "=r") 15004 (unspec:DI [( match_operand:DI 1 "" "")] UNSPEC_SET_RIP))]15004 (unspec:DI [(label_ref (match_operand 1 "" ""))] UNSPEC_SET_RIP))] 15005 15005 "TARGET_64BIT" 15006 15006 "lea{q}\t{%l1(%%rip), %0|%0, %l1[rip]}" 15007 15007 [(set_attr "type" "lea") … … 15009 15009 15010 15010 (define_insn "set_got_offset_rex64" 15011 15011 [(set (match_operand:DI 0 "register_operand" "=r") 15012 (unspec:DI [(match_operand:DI 1 "" "")] UNSPEC_SET_GOT_OFFSET))] 15012 (unspec:DI 15013 [(label_ref (match_operand 1 "" ""))] 15014 UNSPEC_SET_GOT_OFFSET))] 15013 15015 "TARGET_64BIT" 15014 15016 "movabs{q}\t{$_GLOBAL_OFFSET_TABLE_-%l1, %0|%0, OFFSET FLAT:_GLOBAL_OFFSET_TABLE_-%l1}" 15015 15017 [(set_attr "type" "imov") -
gcc/config/mips/sde.h
diff -Naur gcc-4.3.3.orig/gcc/config/mips/sde.h gcc-4.3.3/gcc/config/mips/sde.h
old new 56 56 #undef SUBTARGET_ASM_SPEC 57 57 #define SUBTARGET_ASM_SPEC "\ 58 58 %{!mips1:--trap} \ 59 %{fPIC|fpic|fPIE|fpie:%{!mips16*:-KPIC}} \60 59 %{mips16:-no-mips16}" 61 60 62 61 #undef LINK_SPEC -
gcc/config/pa/fptr.c
diff -Naur gcc-4.3.3.orig/gcc/config/pa/fptr.c gcc-4.3.3/gcc/config/pa/fptr.c
old new 6 6 7 7 GCC is free software; you can redistribute it and/or modify it under 8 8 the terms of the GNU General Public License as published by the Free 9 Software Foundation; either version 3, or (at your option) any later9 Software Foundation; either version 2, or (at your option) any later 10 10 version. 11 11 12 12 In addition to the permissions in the GNU General Public License, the … … 24 24 for more details. 25 25 26 26 You should have received a copy of the GNU General Public License 27 along with GCC; see the file COPYING3. If not see 28 <http://www.gnu.org/licenses/>. */ 27 along with GCC; see the file COPYING. If not, write to the Free 28 Software Foundation, 51 Franklin Street, Fifth Floor, Boston, MA 29 02110-1301, USA. */ 29 30 30 31 /* WARNING: The code is this function depends on internal and undocumented 31 32 details of the GNU linker and dynamic loader as implemented for parisc -
gcc/config/pa/milli64.S
diff -Naur gcc-4.3.3.orig/gcc/config/pa/milli64.S gcc-4.3.3/gcc/config/pa/milli64.S
old new 8 8 9 9 GCC is free software; you can redistribute it and/or modify it under 10 10 the terms of the GNU General Public License as published by the Free 11 Software Foundation; either version 3, or (at your option) any later11 Software Foundation; either version 2, or (at your option) any later 12 12 version. 13 13 14 14 In addition to the permissions in the GNU General Public License, the … … 26 26 for more details. 27 27 28 28 You should have received a copy of the GNU General Public License 29 along with GCC; see the file COPYING3. If not see 30 <http://www.gnu.org/licenses/>. */ 29 along with GCC; see the file COPYING. If not, write to the Free 30 Software Foundation, 51 Franklin Street, Fifth Floor, Boston, MA 31 02110-1301, USA. */ 31 32 32 33 #ifdef pa64 33 34 .level 2.0w -
gcc/config/sparc/linux64.h
diff -Naur gcc-4.3.3.orig/gcc/config/sparc/linux64.h gcc-4.3.3/gcc/config/sparc/linux64.h
old new 285 285 %{mlittle-endian:-EL} \ 286 286 %(asm_cpu) %(asm_arch) %(asm_relax)" 287 287 288 /* Same as sparc.h */289 #undef DBX_REGISTER_NUMBER290 #define DBX_REGISTER_NUMBER(REGNO) (REGNO)291 292 288 #undef ASM_OUTPUT_ALIGNED_LOCAL 293 289 #define ASM_OUTPUT_ALIGNED_LOCAL(FILE, NAME, SIZE, ALIGN) \ 294 290 do { \ -
gcc/config/sparc/linux.h
diff -Naur gcc-4.3.3.orig/gcc/config/sparc/linux.h gcc-4.3.3/gcc/config/sparc/linux.h
old new 148 148 "%{V} %{v:%{!V:-V}} %{!Qn:-Qy} %{n} %{T} %{Ym,*} %{Wa,*:%*} -s \ 149 149 %{fpic|fPIC|fpie|fPIE:-K PIC} %(asm_cpu) %(asm_relax)" 150 150 151 /* Same as sparc.h */152 #undef DBX_REGISTER_NUMBER153 #define DBX_REGISTER_NUMBER(REGNO) (REGNO)154 155 151 #undef ASM_OUTPUT_ALIGNED_LOCAL 156 152 #define ASM_OUTPUT_ALIGNED_LOCAL(FILE, NAME, SIZE, ALIGN) \ 157 153 do { \ -
gcc/config/sparc/sysv4.h
diff -Naur gcc-4.3.3.orig/gcc/config/sparc/sysv4.h gcc-4.3.3/gcc/config/sparc/sysv4.h
old new 93 93 fprintf (FILE, "\n"); \ 94 94 } while (0) 95 95 96 /* Define how the SPARC registers should be numbered for Dwarf output.97 The numbering provided here should be compatible with the native98 svr4 SDB debugger in the SPARC/svr4 reference port. The numbering99 is as follows:100 101 Assembly name gcc internal regno Dwarf regno102 ----------------------------------------------------------103 g0-g7 0-7 0-7104 o0-o7 8-15 8-15105 l0-l7 16-23 16-23106 i0-i7 24-31 24-31107 f0-f31 32-63 40-71108 */109 110 #define DBX_REGISTER_NUMBER(REGNO) ((REGNO) < 32 ? (REGNO) : (REGNO) + 8)111 112 96 /* A set of symbol definitions for assembly pseudo-ops which will 113 97 get us switched to various sections of interest. These are used 114 98 in all places where we simply want to switch to a section, and -
gcc/cp/ChangeLog
diff -Naur gcc-4.3.3.orig/gcc/cp/ChangeLog gcc-4.3.3/gcc/cp/ChangeLog
old new 1 2009-02-03 Paolo Bonzini <bonzini@gnu.org> 2 3 PR c++/36897 4 * pt.c (convert_nontype_argument_function): Expect expr to be an 5 ADDR_EXPR. 6 7 PR c++/37314 8 * typeck.c (merge_types): Call resolve_typename_type if only 9 one type is a typename. 10 11 2009-02-02 Jason Merrill <jason@redhat.com> 12 13 PR c++/39054 14 * parser.c (cp_parser_unqualified_id): Don't wrap error_mark_node 15 in BIT_NOT_EXPR. 16 17 2009-01-26 Jason Merrill <jason@redhat.com> 18 19 PR c++/23287 20 * parser.c (cp_parser_unqualified_id): In a template, 21 accept ~identifier. 22 * typeck.c (lookup_destructor): Handle IDENTIFIER_NODE. 23 1 24 2009-01-24 Release Manager 2 25 3 26 * GCC 4.3.3 released. -
gcc/cp/parser.c
diff -Naur gcc-4.3.3.orig/gcc/cp/parser.c gcc-4.3.3/gcc/cp/parser.c
old new 3791 3791 parser->scope = NULL_TREE; 3792 3792 parser->object_scope = NULL_TREE; 3793 3793 parser->qualifying_scope = NULL_TREE; 3794 if (processing_template_decl) 3795 cp_parser_parse_tentatively (parser); 3794 3796 type_decl 3795 3797 = cp_parser_class_name (parser, 3796 3798 /*typename_keyword_p=*/false, … … 3799 3801 /*check_dependency=*/false, 3800 3802 /*class_head_p=*/false, 3801 3803 declarator_p); 3804 if (processing_template_decl 3805 && ! cp_parser_parse_definitely (parser)) 3806 { 3807 /* We couldn't find a type with this name, so just accept 3808 it and check for a match at instantiation time. */ 3809 type_decl = cp_parser_identifier (parser); 3810 if (type_decl != error_mark_node) 3811 type_decl = build_nt (BIT_NOT_EXPR, type_decl); 3812 return type_decl; 3813 } 3802 3814 } 3803 3815 /* If an error occurred, assume that the name of the 3804 3816 destructor is the same as the name of the qualifying -
gcc/cp/pt.c
diff -Naur gcc-4.3.3.orig/gcc/cp/pt.c gcc-4.3.3/gcc/cp/pt.c
old new 4555 4555 expr = convert_nontype_argument_function (type, expr); 4556 4556 if (!expr || expr == error_mark_node) 4557 4557 return expr; 4558 4559 if (TREE_CODE (expr) != ADDR_EXPR) 4560 { 4561 error ("%qE is not a valid template argument for type %qT", expr, type); 4562 error ("it must be the address of a function with external linkage"); 4563 return NULL_TREE; 4564 } 4558 4565 } 4559 4566 /* [temp.arg.nontype]/5, bullet 5 4560 4567 -
gcc/cp/typeck.c
diff -Naur gcc-4.3.3.orig/gcc/cp/typeck.c gcc-4.3.3/gcc/cp/typeck.c
old new 608 608 609 609 code1 = TREE_CODE (t1); 610 610 code2 = TREE_CODE (t2); 611 if (code1 != code2) 612 { 613 gcc_assert (code1 == TYPENAME_TYPE || code2 == TYPENAME_TYPE); 614 if (code1 == TYPENAME_TYPE) 615 { 616 t1 = resolve_typename_type (t1, /*only_current_p=*/true); 617 code1 = TREE_CODE (t1); 618 } 619 else 620 { 621 t2 = resolve_typename_type (t2, /*only_current_p=*/true); 622 code2 = TREE_CODE (t2); 623 } 624 } 611 625 612 626 switch (code1) 613 627 { … … 2034 2048 return result; 2035 2049 } 2036 2050 2037 /* Return the destructor denoted by OBJECT.SCOPE:: ~DTOR_NAME, or, if2038 SCOPE is NULL, by OBJECT. ~DTOR_NAME. */2051 /* Return the destructor denoted by OBJECT.SCOPE::DTOR_NAME, or, if 2052 SCOPE is NULL, by OBJECT.DTOR_NAME, where DTOR_NAME is ~type. */ 2039 2053 2040 2054 static tree 2041 2055 lookup_destructor (tree object, tree scope, tree dtor_name) … … 2050 2064 scope, dtor_type); 2051 2065 return error_mark_node; 2052 2066 } 2053 if (!DERIVED_FROM_P (dtor_type, TYPE_MAIN_VARIANT (object_type))) 2067 if (TREE_CODE (dtor_type) == IDENTIFIER_NODE) 2068 { 2069 /* In a template, names we can't find a match for are still accepted 2070 destructor names, and we check them here. */ 2071 if (check_dtor_name (object_type, dtor_type)) 2072 dtor_type = object_type; 2073 else 2074 { 2075 error ("object type %qT does not match destructor name ~%qT", 2076 object_type, dtor_type); 2077 return error_mark_node; 2078 } 2079 2080 } 2081 else if (!DERIVED_FROM_P (dtor_type, TYPE_MAIN_VARIANT (object_type))) 2054 2082 { 2055 2083 error ("the type being destroyed is %qT, but the destructor refers to %qT", 2056 2084 TYPE_MAIN_VARIANT (object_type), dtor_type); -
gcc/doc/invoke.texi
diff -Naur gcc-4.3.3.orig/gcc/doc/invoke.texi gcc-4.3.3/gcc/doc/invoke.texi
old new 5406 5406 This option implies @option{-fmerge-constants}. In addition to 5407 5407 @option{-fmerge-constants} this considers e.g.@: even constant initialized 5408 5408 arrays or initialized constant variables with integral or floating point 5409 types. Languages like C or C++ require each non-automatic variable to 5410 have distinct location, so using this option will result in non-conforming 5409 types. Languages like C or C++ require each variable, including multiple 5410 instances of the same variable in recursive calls, to have distinct locations, 5411 so using this option will result in non-conforming 5411 5412 behavior. 5412 5413 5413 5414 @item -fmodulo-sched -
gcc/fold-const.c
diff -Naur gcc-4.3.3.orig/gcc/fold-const.c gcc-4.3.3/gcc/fold-const.c
old new 8519 8519 } /* switch (code) */ 8520 8520 } 8521 8521 8522 8523 /* If the operation was a conversion do _not_ mark a resulting constant 8524 with TREE_OVERFLOW if the original constant was not. These conversions 8525 have implementation defined behavior and retaining the TREE_OVERFLOW 8526 flag here would confuse later passes such as VRP. */ 8527 tree 8528 fold_unary_ignore_overflow (enum tree_code code, tree type, tree op0) 8529 { 8530 tree res = fold_unary (code, type, op0); 8531 if (res 8532 && TREE_CODE (res) == INTEGER_CST 8533 && TREE_CODE (op0) == INTEGER_CST 8534 && (code == NOP_EXPR || code == CONVERT_EXPR)) 8535 TREE_OVERFLOW (res) = TREE_OVERFLOW (op0); 8536 8537 return res; 8538 } 8539 8522 8540 /* Fold a binary expression of code CODE and type TYPE with operands 8523 8541 OP0 and OP1, containing either a MIN-MAX or a MAX-MIN combination. 8524 8542 Return the folded expression if folding is successful. Otherwise, … … 11673 11691 11674 11692 case RSHIFT_EXPR: 11675 11693 /* Optimize -1 >> x for arithmetic right shifts. */ 11676 if (integer_all_onesp (arg0) && !TYPE_UNSIGNED (type)) 11694 if (integer_all_onesp (arg0) && !TYPE_UNSIGNED (type) 11695 && tree_expr_nonnegative_p (arg1)) 11677 11696 return omit_one_operand (type, arg0, arg1); 11678 11697 /* ... fall through ... */ 11679 11698 -
gcc/fortran/ChangeLog
diff -Naur gcc-4.3.3.orig/gcc/fortran/ChangeLog gcc-4.3.3/gcc/fortran/ChangeLog
old new 1 2009-01-26 Paul Thomas <pault@gcc.gnu.org> 2 3 PR fortran/38907 4 Backport from trunk 5 * resolve.c (check_host_association): Remove the matching to 6 correct an incorrect host association and use manipulation of 7 the expression instead. 8 9 2009-01-26 Mikael Morin <mikael.morin@tele2.fr> 10 11 PR fortran/38859 12 Backport from trunk 13 * simplify.c (simplify_bound): Don't use array specification 14 if variable or component has subsequent references. 15 16 2009-01-26 Paul Thomas <pault@gcc.gnu.org> 17 18 PR fortran/38657 19 Backport from trunk. 20 * module.c (write_common_0): Add argument 'this_module' and 21 check that non-use associated common blocks are written first. 22 (write_common): Call write_common_0 twice, once with true and 23 then with false. 24 25 2009-01-24 Thomas Koenig <tkoenig@gcc.gnu.org> 26 27 PR fortran/38672 28 Backport from trunk. 29 * resolve.c (resolve_symbol): Check for the 30 presence of derived->ns->proc_name before 31 accessing derived->ns->proc_name->attr.flavor . 32 1 33 2009-01-24 Release Manager 2 34 3 35 * GCC 4.3.3 released. -
gcc/fortran/module.c
diff -Naur gcc-4.3.3.orig/gcc/fortran/module.c gcc-4.3.3/gcc/fortran/module.c
old new 3992 3992 /* Write a common block to the module -- recursive helper function. */ 3993 3993 3994 3994 static void 3995 write_common_0 (gfc_symtree *st )3995 write_common_0 (gfc_symtree *st, bool this_module) 3996 3996 { 3997 3997 gfc_common_head *p; 3998 3998 const char * name; … … 4004 4004 if (st == NULL) 4005 4005 return; 4006 4006 4007 write_common_0 (st->left );4007 write_common_0 (st->left, this_module); 4008 4008 4009 4009 /* We will write out the binding label, or the name if no label given. */ 4010 4010 name = st->n.common->name; … … 4023 4023 w = (c < 0) ? w->left : w->right; 4024 4024 } 4025 4025 4026 /* Give priority to commons that are not use associated. */ 4027 if (this_module && p->use_assoc) 4028 write_me = false; 4029 4026 4030 if (write_me) 4027 4031 { 4028 4032 /* Write the common to the module. */ … … 4043 4047 4044 4048 /* Record that we have written this common. */ 4045 4049 w = gfc_getmem (sizeof (struct written_common)); 4046 w->name = name;4047 4050 w->label = label; 4051 w->name = name; 4048 4052 gfc_insert_bbt (&written_commons, w, compare_written_commons); 4049 4053 } 4050 4054 4051 write_common_0 (st->right );4055 write_common_0 (st->right, this_module); 4052 4056 } 4053 4057 4054 4058 … … 4059 4063 write_common (gfc_symtree *st) 4060 4064 { 4061 4065 written_commons = NULL; 4062 write_common_0 (st); 4066 write_common_0 (st, true); 4067 write_common_0 (st, false); 4063 4068 free_written_common (written_commons); 4064 4069 written_commons = NULL; 4065 4070 } -
gcc/fortran/resolve.c
diff -Naur gcc-4.3.3.orig/gcc/fortran/resolve.c gcc-4.3.3/gcc/fortran/resolve.c
old new 4189 4189 /* Checks to see that the correct symbol has been host associated. 4190 4190 The only situation where this arises is that in which a twice 4191 4191 contained function is parsed after the host association is made. 4192 Therefore, on detecting this, the line is rematched, having got 4193 rid of the existing references and actual_arg_list. */ 4192 Therefore, on detecting this, change the symbol in the expression 4193 and convert the array reference into an actual arglist if the old 4194 symbol is a variable. */ 4194 4195 static bool 4195 4196 check_host_association (gfc_expr *e) 4196 4197 { 4197 4198 gfc_symbol *sym, *old_sym; 4198 locus temp_locus; 4199 gfc_expr *expr; 4199 gfc_symtree *st; 4200 4200 int n; 4201 gfc_ref *ref; 4202 gfc_actual_arglist *arg, *tail; 4201 4203 bool retval = e->expr_type == EXPR_FUNCTION; 4202 4204 4203 4205 /* If the expression is the result of substitution in … … 4213 4215 if (gfc_current_ns->parent 4214 4216 && old_sym->ns != gfc_current_ns) 4215 4217 { 4218 /* Use the 'USE' name so that renamed module symbols are 4219 correctly handled. */ 4216 4220 gfc_find_symbol (e->symtree->name, gfc_current_ns, 1, &sym); 4221 4217 4222 if (sym && old_sym != sym 4218 4223 && sym->ts.type == old_sym->ts.type 4219 4224 && sym->attr.flavor == FL_PROCEDURE 4220 4225 && sym->attr.contained) 4221 4226 { 4222 temp_locus = gfc_current_locus; 4223 gfc_current_locus = e->where; 4224 4225 gfc_buffer_error (1); 4226 4227 gfc_free_ref_list (e->ref); 4228 e->ref = NULL; 4229 4230 if (retval) 4231 { 4232 gfc_free_actual_arglist (e->value.function.actual); 4233 e->value.function.actual = NULL; 4234 } 4235 4227 /* Clear the shape, since it might not be valid. */ 4236 4228 if (e->shape != NULL) 4237 4229 { 4238 4230 for (n = 0; n < e->rank; n++) … … 4241 4233 gfc_free (e->shape); 4242 4234 } 4243 4235 4244 /* TODO - Replace this gfc_match_rvalue with a straight replacement of 4245 actual arglists for function to function substitutions and with a 4246 conversion of the reference list to an actual arglist in the case of 4247 a variable to function replacement. This should be quite easy since 4248 only integers and vectors can be involved. */ 4249 gfc_match_rvalue (&expr); 4250 gfc_clear_error (); 4251 gfc_buffer_error (0); 4236 /* Give the symbol a symtree in the right place! */ 4237 gfc_get_sym_tree (sym->name, gfc_current_ns, &st); 4238 st->n.sym = sym; 4239 4240 if (old_sym->attr.flavor == FL_PROCEDURE) 4241 { 4242 /* Original was function so point to the new symbol, since 4243 the actual argument list is already attached to the 4244 expression. */ 4245 e->value.function.esym = NULL; 4246 e->symtree = st; 4247 } 4248 else 4249 { 4250 /* Original was variable so convert array references into 4251 an actual arglist. This does not need any checking now 4252 since gfc_resolve_function will take care of it. */ 4253 e->value.function.actual = NULL; 4254 e->expr_type = EXPR_FUNCTION; 4255 e->symtree = st; 4256 4257 /* Ambiguity will not arise if the array reference is not 4258 the last reference. */ 4259 for (ref = e->ref; ref; ref = ref->next) 4260 if (ref->type == REF_ARRAY && ref->next == NULL) 4261 break; 4252 4262 4253 gcc_assert (expr && sym == expr->symtree->n.sym);4263 gcc_assert (ref->type == REF_ARRAY); 4254 4264 4255 *e = *expr; 4256 gfc_free (expr); 4257 sym->refs++; 4265 /* Grab the start expressions from the array ref and 4266 copy them into actual arguments. */ 4267 for (n = 0; n < ref->u.ar.dimen; n++) 4268 { 4269 arg = gfc_get_actual_arglist (); 4270 arg->expr = gfc_copy_expr (ref->u.ar.start[n]); 4271 if (e->value.function.actual == NULL) 4272 tail = e->value.function.actual = arg; 4273 else 4274 { 4275 tail->next = arg; 4276 tail = arg; 4277 } 4278 } 4258 4279 4259 gfc_current_locus = temp_locus; 4280 /* Dump the reference list and set the rank. */ 4281 gfc_free_ref_list (e->ref); 4282 e->ref = NULL; 4283 e->rank = sym->as ? sym->as->rank : 0; 4284 } 4285 4286 gfc_resolve_expr (e); 4287 sym->refs++; 4260 4288 } 4261 4289 } 4262 4290 /* This might have changed! */ … … 8116 8144 module function and is not PRIVATE. */ 8117 8145 if (sym->ts.type == BT_DERIVED 8118 8146 && sym->ts.derived->attr.use_assoc 8147 && sym->ns->proc_name 8119 8148 && sym->ns->proc_name->attr.flavor == FL_MODULE) 8120 8149 { 8121 8150 gfc_symbol *ds; -
gcc/fortran/simplify.c
diff -Naur gcc-4.3.3.orig/gcc/fortran/simplify.c gcc-4.3.3/gcc/fortran/simplify.c
old new 2104 2104 case AR_FULL: 2105 2105 /* We're done because 'as' has already been set in the 2106 2106 previous iteration. */ 2107 goto done; 2107 if (!ref->next) 2108 goto done; 2109 2110 /* Fall through. */ 2108 2111 2109 2112 case AR_SECTION: 2110 2113 case AR_UNKNOWN: -
gcc/gimplify.c
diff -Naur gcc-4.3.3.orig/gcc/gimplify.c gcc-4.3.3/gcc/gimplify.c
old new 3206 3206 if (valid_const_initializer 3207 3207 && num_nonzero_elements > 1 3208 3208 && TREE_READONLY (object) 3209 && TREE_CODE (object) == VAR_DECL) 3209 && TREE_CODE (object) == VAR_DECL 3210 && (flag_merge_constants >= 2 || !TREE_ADDRESSABLE (object))) 3210 3211 { 3211 3212 if (notify_temp_creation) 3212 3213 return GS_ERROR; -
gcc/testsuite/ChangeLog
diff -Naur gcc-4.3.3.orig/gcc/testsuite/ChangeLog gcc-4.3.3/gcc/testsuite/ChangeLog
old new 1 2009-02-03 Paolo Bonzini <bonzini@gnu.org> 2 3 PR c++/36897 4 * g++.dg/template/func2.C: New test. 5 6 PR c++/37314 7 * g++.dg/template/typename15.C: New. 8 * g++.dg/template/typename16.C: New. 9 10 2009-02-02 Jason Merrill <jason@redhat.com> 11 12 PR c++/39054 13 * g++.dg/parse/dtor14.C: New test. 14 15 2009-01-30 H.J. Lu <hongjiu.lu@intel.com> 16 17 Backport from mainline: 18 2009-01-14 Jakub Jelinek <jakub@redhat.com> 19 20 PR rtl-optimization/38245 21 * gcc.dg/pr38245-3.c: New test. 22 * gcc.dg/pr38245-3.h: New file. 23 * gcc.dg/pr38245-4.c: New file. 24 * gcc.dg/pr38364.c: New test. 25 26 2009-01-30 Richard Guenther <rguenther@suse.de> 27 28 PR tree-optimization/39041 29 * gcc.c-torture/compile/pr39041.c: New testcase. 30 31 2009-01-30 H.J. Lu <hongjiu.lu@intel.com> 32 33 Backport from mainline: 34 2009-01-16 Jakub Jelinek <jakub@redhat.com> 35 36 PR tree-optimization/38789 37 * gcc.c-torture/compile/pr38789.c: New test. 38 39 2009-01-30 H.J. Lu <hongjiu.lu@intel.com> 40 41 Backport from mainline: 42 2009-01-27 Richard Guenther <rguenther@suse.de> 43 44 PR tree-optimization/38503 45 * g++.dg/warn/Wstrict-aliasing-bogus-placement-new.C: New testcase. 46 47 2009-01-26 Richard Guenther <rguenther@suse.de> 48 49 PR tree-optimization/38745 50 * g++.dg/torture/pr38745.C: New testcase. 51 52 2009-01-26 Richard Guenther <rguenther@suse.de> 53 54 PR middle-end/38851 55 * g++.dg/warn/Wuninitialized-1.C: New testcase. 56 57 2009-01-20 Andrew Pinski <andrew_pinski@playstation.sony.com> 58 Richard Guenther <rguenther@suse.de> 59 60 PR tree-optimization/38747 61 PR tree-optimization/38748 62 * gcc.dg/tree-ssa/struct-aliasing-1.c: New test. 63 * gcc.c-torture/execute/struct-aliasing-1.c: Likewise. 64 65 2009-01-29 H.J. Lu <hongjiu.lu@intel.com> 66 67 Backport from mainline: 68 2009-01-28 Richard Guenther <rguenther@suse.de> 69 70 PR middle-end/38908 71 * g++.dg/warn/Wuninitialized-2.C: New testcase. 72 73 2009-01-27 Daniel Kraft <d@domob.eu> 74 75 PR fortran/38883 76 * gfortran.dg/mvbits_6.f90: New test. 77 * gfortran.dg/mvbits_7.f90: New test. 78 * gfortran.dg/mvbits_8.f90: New test. 79 80 2009-01-21 Daniel Kraft <d@domob.eu> 81 82 PR fortran/38887 83 * gfortran.dg/mvbits_5.f90: New test. 84 85 2009-01-29 H.J. Lu <hongjiu.lu@intel.com> 86 87 Backport from mainline: 88 2009-01-29 Steve Ellcey <sje@cup.hp.com> 89 90 PR middle-end/38857 91 * gcc.c-torture/compile/pr38857.c: New test. 92 93 2009-01-28 Richard Guenther <rguenther@suse.de> 94 95 PR tree-optimization/38926 96 * gcc.c-torture/compile/pr38926.c: New testcase. 97 98 2009-01-29 Uros Bizjak <ubizjak@gmail.com> 99 100 Backport from mainline: 101 2009-01-28 Uros Bizjak <ubizjak@gmail.com> 102 103 PR target/38988 104 * gcc.target/i386/pr38988.c: New test. 105 106 2009-01-27 Uros Bizjak <ubizjak@gmail.com> 107 108 PR middle-end/38969 109 * gcc.c-torture/execute/pr38969.c: New test. 110 111 2009-01-27 Steve Ellcey <sje@cup.hp.com> 112 113 PR middle-end/38615 114 * gcc.dg/pr38615.c: New test. 115 116 2009-01-27 Uros Bizjak <ubizjak@gmail.com> 117 118 Backport from mainline: 119 2009-01-07 Uros Bizjak <ubizjak@gmail.com> 120 121 PR target/38706 122 * g++.dg/other/pr38706.C: New test. 123 124 2009-01-26 Jason Merrill <jason@redhat.com> 125 126 PR c++/23287 127 * g++.dg/template/dtor5.C: New test. 128 129 2009-01-26 H.J. Lu <hongjiu.lu@intel.com> 130 131 Backport from mainline: 132 2008-07-17 H.J. Lu <hongjiu.lu@intel.com> 133 134 PR testsuite/36443 135 * objc.dg/gnu-encoding/gnu-encoding.exp: Temporarily unset 136 GCC_EXEC_PREFIX from environment when running $HOSTCC. 137 138 2008-01-26 Paolo Bonzini <bonzini@gnu.org> 139 140 PR tree-optimization/38932 141 * gcc.dg/pr38932.c: New. 142 143 2009-01-26 Paul Thomas <pault@gcc.gnu.org> 144 145 PR fortran/38907 146 Backport from trunk 147 * gfortran.dg/host_assoc_function_7.f90: New test. 148 149 2009-01-26 Mikael Morin <mikael.morin@tele2.fr> 150 151 PR fortran/38859 152 Backport from trunk 153 * gfortran.dg/bound_5.f90: New test. 154 155 2009-01-26 Paul Thomas <pault@gcc.gnu.org> 156 157 PR fortran/38657 158 Backport from trunk. 159 * gfortran.dg/module_commons_3.f90: Reapply. 160 161 2009-01-25 Uros Bizjak <ubizjak@gmail.com> 162 163 Backport from mainline: 164 2009-01-22 Uros Bizjak <ubizjak@gmail.com> 165 166 PR target/38931 167 * gcc.target/i386/pr38931.c: New test. 168 169 2009-01-25 Richard Guenther <rguenther@suse.de> 170 171 Backport from mainline: 172 2008-12-02 Richard Guenther <rguenther@suse.de> 173 174 PR tree-optimization/38359 175 * gcc.c-torture/compile/pr38359.c: New testcase. 176 * gcc.c-torture/execute/shiftopt-1.c: Adjust. 177 178 2009-01-24 Thomas Koenig <tkoenig@gcc.gnu.org> 179 180 PR fortran/38672 181 Backport from trunk. 182 * gfortran.dg/host_assoc_blockdata_1.f90: New test. 183 * gfortran.dg/host_assoc_blockdata_2.f90: New test. 184 185 2009-01-24 H.J. Lu <hongjiu.lu@intel.com> 186 187 Backport from mainline: 188 2009-01-20 Kees Cook <kees@ubuntu.com> 189 H.J. Lu <hongjiu.lu@intel.com> 190 191 PR target/38902 192 * gcc.dg/pr38902.c: New. 193 194 2009-01-24 H.J. Lu <hongjiu.lu@intel.com> 195 196 Backport from mainline: 197 2008-01-20 Paolo Bonzini <bonzini@gnu.org> 198 199 PR target/38868 200 * gfortran.dg/pr38868.f: New testcase. 201 1 202 2009-01-24 Release Manager 2 203 3 204 * GCC 4.3.3 released. … … 89 290 90 291 Backport from mainline: 91 292 2008-12-29 Dorit Nuzman <dorit@il.ibm.com> 92 293 Ira Rosen <irar@il.ibm.com> 93 294 94 295 PR tree-optimization/38529 95 296 * gcc.dg/vect/pr38529.c: New test. … … 426 627 427 628 2008-11-14 Paul Thomas <pault@gcc.gnu.org> 428 629 429 430 630 PR fortran/37836 631 * gfortran.dg/minmaxval_1.f90: New test. 431 632 432 633 2008-11-13 Jason Merrill <jason@redhat.com> 433 634 -
gcc/testsuite/gcc.c-torture/compile/pr38359.c
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gcc.c-torture/compile/pr38359.c gcc-4.3.3/gcc/testsuite/gcc.c-torture/compile/pr38359.c
old new 1 unsigned _ov_64_seek_lap (_Bool x1, _Bool x2, _Bool x3) 2 { 3 unsigned ltmp_3978_7__PHI_TEMPORARY; 4 signed ltmp_4011_7; 5 6 if (!x1 || !x2) 7 while (1) ; 8 9 if (x3) 10 ltmp_3978_7__PHI_TEMPORARY = 0xffffff7e; 11 else 12 ltmp_3978_7__PHI_TEMPORARY = 1; 13 14 ltmp_4011_7 = -1; 15 return ltmp_4011_7 >> ltmp_3978_7__PHI_TEMPORARY; 16 } 17 -
gcc/testsuite/gcc.c-torture/compile/pr38789.c
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gcc.c-torture/compile/pr38789.c gcc-4.3.3/gcc/testsuite/gcc.c-torture/compile/pr38789.c
old new 1 /* PR tree-optimization/38789 */ 2 3 void 4 baz (int v) 5 { 6 unsigned a = (v == 1) ? 1 : 2; 7 8 if (__builtin_constant_p (a)) 9 asm volatile ("# constant %0" :: "i" (a)); 10 else 11 asm volatile ("# register %0" :: "r" (a)); 12 13 a = 6; 14 if (__builtin_constant_p (a)) 15 asm volatile ("# constant %0" :: "i" (a)); 16 else 17 asm volatile ("# register %0" :: "r" (a)); 18 } -
gcc/testsuite/gcc.c-torture/compile/pr38857.c
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gcc.c-torture/compile/pr38857.c gcc-4.3.3/gcc/testsuite/gcc.c-torture/compile/pr38857.c
old new 1 static const int vs_total_ac_bits = 2680; 2 typedef struct EncBlockInfo { 3 short mb[64]; 4 unsigned char next[64]; 5 } EncBlockInfo; 6 inline void dv_guess_qnos(EncBlockInfo* blks, int* qnos) { 7 int size[5]; 8 int j, k, a, prev; 9 EncBlockInfo* b; 10 for(a=2; a==2 || vs_total_ac_bits < size[0]; a+=a){ 11 for (j=0; j<6*5; j++, b++) { 12 for (k= b->next[prev]; k<64; k= b->next[k]) { 13 if(b->mb[k] < a && b->mb[k] > -a){ 14 b->next[prev] = b->next[k]; 15 } 16 else{ 17 prev = k; 18 } 19 } 20 } 21 } 22 } -
gcc/testsuite/gcc.c-torture/compile/pr38926.c
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gcc.c-torture/compile/pr38926.c gcc-4.3.3/gcc/testsuite/gcc.c-torture/compile/pr38926.c
old new 1 static inline int foo (unsigned _si1) 2 { 3 if (_si1 != 0) 4 if (_si1 > 2147483647) 5 return 1; 6 return 0; 7 } 8 9 static inline unsigned bar (unsigned _left, int _right) 10 { 11 return (unsigned) _right >= 8 ? 1 : _left >> _right; 12 } 13 14 unsigned g_2; 15 unsigned g_67; 16 volatile unsigned g_162; 17 18 static inline int func_62 (unsigned p_63) 19 { 20 p_63 = g_2 & g_67; 21 if (g_2) 22 ; 23 else if (p_63) 24 return 1; 25 g_67 = bar (p_63, g_2); 26 return 0; 27 } 28 29 unsigned baz (void) 30 { 31 if (g_2) 32 for (; g_2 <= -16; g_2 = foo (g_2)) 33 { 34 for (; g_162; g_162) 35 func_62 (func_62 (0)); 36 if (g_67) 37 break; 38 } 39 return g_2; 40 } 41 -
gcc/testsuite/gcc.c-torture/compile/pr39041.c
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gcc.c-torture/compile/pr39041.c gcc-4.3.3/gcc/testsuite/gcc.c-torture/compile/pr39041.c
old new 1 int test_bit(int nr, void *addr) 2 { 3 int *a = (int *)addr; 4 int mask; 5 a += nr; 6 mask = 1 << nr; 7 return mask & *a; 8 } 9 struct { 10 struct { 11 int disabled; 12 } *data[1]; 13 } trace; 14 struct { 15 unsigned bits[1]; 16 } cpumask; 17 void inc(int *); 18 void dec(int *); 19 int foo(void) 20 { 21 int cpu; 22 for (cpu = 0; cpu < 1; cpu++) { 23 if (test_bit(cpu, cpumask.bits)) 24 inc(&trace.data[cpu]->disabled); 25 if (!test_bit(cpu, cpumask.bits)) 26 dec(&trace.data[cpu]->disabled); 27 } 28 } -
gcc/testsuite/gcc.c-torture/execute/pr38969.c
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gcc.c-torture/execute/pr38969.c gcc-4.3.3/gcc/testsuite/gcc.c-torture/execute/pr38969.c
old new 1 __complex__ float 2 __attribute__ ((noinline)) foo (__complex__ float x) 3 { 4 return x; 5 } 6 7 __complex__ float 8 __attribute__ ((noinline)) bar (__complex__ float x) 9 { 10 return foo (x); 11 } 12 13 int main() 14 { 15 __complex__ float a, b; 16 __real__ a = 9; 17 __imag__ a = 42; 18 19 b = bar (a); 20 21 if (a != b) 22 abort (); 23 24 return 0; 25 } -
gcc/testsuite/gcc.c-torture/execute/shiftopt-1.c
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gcc.c-torture/execute/shiftopt-1.c gcc-4.3.3/gcc/testsuite/gcc.c-torture/execute/shiftopt-1.c
old new 43 43 44 44 if (0 >> x != 0) 45 45 link_error (); 46 47 if (-1 >> x != -1)48 link_error ();49 50 if (~0 >> x != ~0)51 link_error ();52 46 } 53 47 54 48 int -
gcc/testsuite/gcc.c-torture/execute/struct-aliasing-1.c
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gcc.c-torture/execute/struct-aliasing-1.c gcc-4.3.3/gcc/testsuite/gcc.c-torture/execute/struct-aliasing-1.c
old new 1 struct S { float f; }; 2 int __attribute__((noinline)) 3 foo (int *r, struct S *p) 4 { 5 int *q = (int *)&p->f; 6 int i = *q; 7 *r = 0; 8 return i + *q; 9 } 10 extern void abort (void); 11 int main() 12 { 13 int i = 1; 14 if (foo (&i, (struct S *)&i) != 1) 15 abort (); 16 return (0); 17 } -
gcc/testsuite/gcc.dg/pr38245-3.c
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gcc.dg/pr38245-3.c gcc-4.3.3/gcc/testsuite/gcc.dg/pr38245-3.c
old new 1 /* PR rtl-optimization/38245 */ 2 /* { dg-do run } */ 3 /* { dg-additional-sources "pr38245-4.c" } */ 4 /* { dg-options "-O2" } */ 5 6 #include "pr38245-3.h" 7 8 extern void abort (void); 9 10 struct A { int i, j; union { short s[4]; long long l; }; char pad[512]; } a; 11 int globv = 6; 12 13 void __attribute__((noinline)) 14 f1 (void) 15 { 16 a.s[2] = b1 (6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 17 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21); 18 a.l = 6; 19 } 20 21 void __attribute__((noinline)) 22 f2 (void) 23 { 24 a.s[2] = b2 (6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 25 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21); 26 a.l = 6; 27 } 28 29 void __attribute__((noinline)) 30 f3 (void) 31 { 32 struct B b = { 30, 31, { 32, 33 } }; 33 a.s[2] = b3 (6, 7, 8, 9, 10, 11, 12, b, 14, b, 16, b, 18, 19, 20, 21, 34 6, b, 8, b, 10, 11, 12, 13, 14, b, 16, b, 18, 19, 20, 21); 35 a.l = 6; 36 } 37 38 void __attribute__((noinline)) 39 f4 (void) 40 { 41 struct B b = { 30, 31, { 32, 33 } }; 42 a.s[2] = b4 (6, 7, 8, 9, 10, 11, 12, b, 14, b, 16, b, 18, 19, 20, 21, 43 6, b, 8, b, 10, 11, 12, 13, 14, b, 16, b, 18, 19, 20, 21); 44 a.l = 6; 45 } 46 47 void __attribute__((noinline)) 48 f5 (void) 49 { 50 a.s[2] = b5 (6.0, 7, 8, 9, 10, 11, 21.0, 22.0, 23.0); 51 a.l = 6; 52 } 53 54 void __attribute__((noinline)) 55 f6 (void) 56 { 57 a.s[2] = b6 (6.0, 7, 8, 9, 10, 11, 21.0, 22.0, 23.0); 58 a.l = 6; 59 } 60 61 void __attribute__((noinline)) 62 f7 (void) 63 { 64 a.s[2] = b7 (6, 7); 65 a.l = 6; 66 } 67 68 void __attribute__((noinline)) 69 f8 (void) 70 { 71 a.s[2] = b8 (6, 7); 72 a.l = 6; 73 } 74 75 void __attribute__((noinline)) 76 f9 (void) 77 { 78 a.s[2] = b9 (6, 7, 8, 9, 10, 11, 12); 79 a.l = 6; 80 } 81 82 void __attribute__((noinline)) 83 f10 (void) 84 { 85 a.s[2] = b10 (6, 7, 8, 9, 10, 11, 12); 86 a.l = 6; 87 } 88 89 int 90 main (void) 91 { 92 char buf[256]; 93 int i; 94 for (i = 0; i < (int) sizeof buf; i++) 95 buf[i] = i; 96 asm volatile ("" : : "r" (buf) : "memory"); 97 f1 (); 98 f2 (); 99 f3 (); 100 f4 (); 101 f5 (); 102 f6 (); 103 f7 (); 104 f8 (); 105 f9 (); 106 f10 (); 107 asm volatile ("" : : "r" (buf) : "memory"); 108 for (i = 0; i < (int) sizeof buf; i++) 109 if (buf[i] != (char) i) 110 abort (); 111 return 0; 112 } -
gcc/testsuite/gcc.dg/pr38245-3.h
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gcc.dg/pr38245-3.h gcc-4.3.3/gcc/testsuite/gcc.dg/pr38245-3.h
old new 1 /* PR rtl-optimization/38245 */ 2 3 struct B { long a, b; char p[32]; }; 4 extern int globv; 5 6 extern int b1 (long long, long, long, long, long, long, long, long, 7 long long, long, long, long, long, long, long, long, 8 long long, long, long, long, long, long, long, long, 9 long long, long, long, long, long, long, long, long) 10 __attribute__((pure, noinline)); 11 extern int b2 (long long, long, long, long, long, long, long, long, 12 long long, long, long, long, long, long, long, long, 13 long long, long, long, long, long, long, long, long, 14 long long, long, long, long, long, long, long, long) 15 __attribute__((const, noinline)); 16 extern int b3 (long long, long, long, long, long, long, long, struct B, 17 long long, struct B, long, struct B, long, long, long, long, 18 long long, struct B, long, struct B, long, long, long, long, 19 long long, struct B, long, struct B, long, long, long, long) 20 __attribute__((pure, noinline)); 21 extern int b4 (long long, long, long, long, long, long, long, struct B, 22 long long, struct B, long, struct B, long, long, long, long, 23 long long, struct B, long, struct B, long, long, long, long, 24 long long, struct B, long, struct B, long, long, long, long) 25 __attribute__((const, noinline)); 26 extern int b5 () __attribute__((pure, noinline)); 27 extern int b6 () __attribute__((const, noinline)); 28 extern int b7 (int, int) 29 __attribute__((pure, noinline)); 30 extern int b8 (int, int) 31 __attribute__((const, noinline)); 32 extern int b9 (int, int, int, int, int, int, int) 33 __attribute__((pure, noinline)); 34 extern int b10 (int, int, int, int, int, int, int) 35 __attribute__((const, noinline)); -
gcc/testsuite/gcc.dg/pr38245-4.c
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gcc.dg/pr38245-4.c gcc-4.3.3/gcc/testsuite/gcc.dg/pr38245-4.c
old new 1 /* PR rtl-optimization/38245 */ 2 /* { dg-do compile } */ 3 /* { dg-options "" } */ 4 5 #include "pr38245-3.h" 6 7 int 8 b1 (long long a1, long a2, long a3, long a4, 9 long a5, long a6, long a7, long a8, 10 long long a9, long a10, long a11, long a12, 11 long a13, long a14, long a15, long a16, 12 long long a17, long a18, long a19, long a20, 13 long a21, long a22, long a23, long a24, 14 long long a25, long a26, long a27, long a28, 15 long a29, long a30, long a31, long a32) 16 { 17 return a1 + a2 + a3 + a4 + a5 + a6 + a7 + a8 + a9 + a10 18 + a11 + a12 + a13 + a14 + a15 + a16 + a17 + a18 + a19 + a20 19 + a21 + a22 + a23 + a24 + a25 + a26 + a27 + a28 + a29 + a30 20 + a31 + a32 + globv; 21 } 22 23 int 24 b2 (long long a1, long a2, long a3, long a4, 25 long a5, long a6, long a7, long a8, 26 long long a9, long a10, long a11, long a12, 27 long a13, long a14, long a15, long a16, 28 long long a17, long a18, long a19, long a20, 29 long a21, long a22, long a23, long a24, 30 long long a25, long a26, long a27, long a28, 31 long a29, long a30, long a31, long a32) 32 { 33 return a1 + a2 + a3 + a4 + a5 + a6 + a7 + a8 + a9 + a10 34 + a11 + a12 + a13 + a14 + a15 + a16 + a17 + a18 + a19 + a20 35 + a21 + a22 + a23 + a24 + a25 + a26 + a27 + a28 + a29 + a30 36 + a31 + a32; 37 } 38 39 int 40 b3 (long long a1, long a2, long a3, long a4, 41 long a5, long a6, long a7, struct B a8, 42 long long a9, struct B a10, long a11, struct B a12, 43 long a13, long a14, long a15, long a16, 44 long long a17, struct B a18, long a19, struct B a20, 45 long a21, long a22, long a23, long a24, 46 long long a25, struct B a26, long a27, struct B a28, 47 long a29, long a30, long a31, long a32) 48 { 49 return a1 + a2 + a3 + a4 + a5 + a6 + a7 + a8.a + a9 + a10.a 50 + a11 + a12.a + a13 + a14 + a15 + a16 + a17 + a18.a + a19 + a20.a 51 + a21 + a22 + a23 + a24 + a25 + a26.a + a27 + a28.a + a29 + a30 52 + a31 + a32 + globv; 53 } 54 55 int 56 b4 (long long a1, long a2, long a3, long a4, 57 long a5, long a6, long a7, struct B a8, 58 long long a9, struct B a10, long a11, struct B a12, 59 long a13, long a14, long a15, long a16, 60 long long a17, struct B a18, long a19, struct B a20, 61 long a21, long a22, long a23, long a24, 62 long long a25, struct B a26, long a27, struct B a28, 63 long a29, long a30, long a31, long a32) 64 { 65 return a1 + a2 + a3 + a4 + a5 + a6 + a7 + a8.a + a9 + a10.a 66 + a11 + a12.a + a13 + a14 + a15 + a16 + a17 + a18.a + a19 + a20.a 67 + a21 + a22 + a23 + a24 + a25 + a26.a + a27 + a28.a + a29 + a30 68 + a31 + a32; 69 } 70 71 int 72 b5 (double a1, int a2, int a3, int a4, int a5, int a6, double a7, 73 double a8, double a9) 74 { 75 return a1 + a2 + a3 + a4 + a5 + a6 + a7 + a8 + a9 + globv; 76 } 77 78 int 79 b6 (double a1, int a2, int a3, int a4, int a5, int a6, double a7, 80 double a8, double a9) 81 { 82 return a1 + a2 + a3 + a4 + a5 + a6 + a7 + a8 + a9; 83 } 84 85 int 86 b7 (int a1, int a2) 87 { 88 return a1 + a2 + globv; 89 } 90 91 int 92 b8 (int a1, int a2) 93 { 94 return a1 + a2; 95 } 96 97 int 98 b9 (int a1, int a2, int a3, int a4, int a5, int a6, int a7) 99 { 100 return a1 + a2 + a3 + a4 + a5 + a6 + a7 + globv; 101 } 102 103 int 104 b10 (int a1, int a2, int a3, int a4, int a5, int a6, int a7) 105 { 106 return a1 + a2 + a3 + a4 + a5 + a6 + a7; 107 } -
gcc/testsuite/gcc.dg/pr38364.c
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gcc.dg/pr38364.c gcc-4.3.3/gcc/testsuite/gcc.dg/pr38364.c
old new 1 /* PR middle-end/38364 */ 2 /* { dg-do run } */ 3 /* { dg-options "-O2 -ftrapv" } */ 4 5 extern void abort (void); 6 7 static inline short 8 f1 (short x, short y) 9 { 10 if (x > 0) 11 { 12 if (y > 0) 13 { 14 if (x > __SHRT_MAX__ / y) 15 return x; 16 } 17 else if (y < (-__SHRT_MAX__ - 1) / x) 18 return x; 19 } 20 else 21 { 22 if (y > 0) 23 { 24 if (x < (-__SHRT_MAX__ - 1) / y) 25 return x; 26 } 27 else if (x != 0 && y < __SHRT_MAX__ / x) 28 return x; 29 } 30 return x * y; 31 } 32 33 static inline signed char 34 f2 (signed char x, signed char y) 35 { 36 if (((x ^ y) & (((x ^ ((x ^ y) & (1 << (__CHAR_BIT__ - 1)))) - y) ^ y)) < 0) 37 return x; 38 return x - y; 39 } 40 41 unsigned int v; 42 43 int 44 f3 (int x, unsigned int y) 45 { 46 f1 (1, 1); 47 return 1; 48 } 49 50 int 51 f4 (unsigned short x) 52 { 53 v = x; 54 return 1; 55 } 56 57 int 58 f5 (int x) 59 { 60 if (f2 (x, 1)) 61 f1 (1, f4 (1)); 62 return x; 63 } 64 65 int 66 f6 (unsigned int x) 67 { 68 f4 (x < (1 != f5 (0))); 69 return x; 70 } 71 72 int 73 main (void) 74 { 75 f6 (1); 76 if (v != 0) 77 abort (); 78 return 0; 79 } -
gcc/testsuite/gcc.dg/pr38615.c
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gcc.dg/pr38615.c gcc-4.3.3/gcc/testsuite/gcc.dg/pr38615.c
old new 1 /* { dg-do run } */ 2 3 int t; 4 extern void abort (void); 5 6 int f(int t, const int *a) 7 { 8 const int b[] = { 1, 2, 3}; 9 if (!t) 10 return f(1, b); 11 return b == a; 12 } 13 14 int main(void) 15 { 16 if (f(0, 0)) 17 abort (); 18 return 0; 19 } -
gcc/testsuite/gcc.dg/pr38902.c
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gcc.dg/pr38902.c gcc-4.3.3/gcc/testsuite/gcc.dg/pr38902.c
old new 1 /* PR target/38902 */ 2 /* { dg-do run } */ 3 /* { dg-options "-O2 -fstack-protector" } */ 4 /* { dg-require-effective-target fstack_protector } */ 5 6 #ifdef DEBUG 7 #include <stdio.h> 8 #define debug(format, args...) printf (format , ## args) 9 #else 10 extern int sprintf (char *, const char *, ...); 11 #define debug(format, args...) 12 #endif 13 14 extern void abort (void); 15 16 /* 17 18 Copyright (C) 2009 Canonical, Ltd. 19 Author: Kees Cook <kees@ubuntu.com> 20 License: GPLv3 21 22 http://gcc.gnu.org/bugzilla/show_bug.cgi?id=38616 23 https://bugs.launchpad.net/ubuntu/+source/gcc-4.3/+bug/316019 24 http://gcc.gnu.org/bugzilla/show_bug.cgi?id=38902 25 26 gcc -O2 -fstack-protector truncate.c -o truncate 27 28 Broken: 29 30 Only the first operation fails, so create a new function for each test. 31 Source must be local (literal or stack) 32 33 __builtin_memmove 34 __builtin_memcpy 35 __builtin_strcpy (optimized to __builtin_memcpy?) 36 sprintf (direct) (optmized to __builtin_strcpy?) 37 sprintf (via %s) (optmized to __builtin_strcpy?) 38 39 OK: 40 __builtin_strcat 41 sprintf (complex format) 42 43 */ 44 45 char *heap = "1234567890abcdefghijklmnopqrstuvwxyz"; 46 47 int failed = 0; 48 49 #define CHECK(count, a...) \ 50 void test##count (void) \ 51 { \ 52 char *local = "1234567890abcdefghijklmnopqrstuvwxyz"; \ 53 char buffer[1024]=""; \ 54 a; \ 55 if (__builtin_strcmp(buffer, heap) == 0) { \ 56 debug("Okay(%d):\n\t%s\n", count, # a); \ 57 } \ 58 else { \ 59 debug("Failed(%d):\n\t%s\n", count, # a); \ 60 failed++; \ 61 } \ 62 } 63 64 65 CHECK( 0, __builtin_memcpy (buffer, "1234567890abcdefghijklmnopqrstuvwxyz", __builtin_strlen("1234567890abcdefghijklmnopqrstuvwxyz")+1); ); 66 CHECK( 1, __builtin_memcpy (buffer, local, __builtin_strlen(local)+1); ); 67 CHECK( 2, __builtin_memcpy (buffer, heap, __builtin_strlen(heap)+1); ); 68 69 CHECK( 3, __builtin_memmove (buffer, "1234567890abcdefghijklmnopqrstuvwxyz", __builtin_strlen("1234567890abcdefghijklmnopqrstuvwxyz")+1); ); 70 CHECK( 4, __builtin_memmove (buffer, local, __builtin_strlen(local)+1); ); 71 CHECK( 5, __builtin_memmove (buffer, heap, __builtin_strlen(heap)+1); ); 72 73 CHECK( 6, __builtin_strcpy (buffer, "1234567890abcdefghijklmnopqrstuvwxyz"); ); 74 CHECK( 7, __builtin_strcpy (buffer, local); ); 75 CHECK( 8, __builtin_strcpy (buffer, heap); ); 76 77 CHECK( 9, sprintf (buffer, "1234567890abcdefghijklmnopqrstuvwxyz"); ); 78 CHECK(10, sprintf (buffer, local); ); 79 CHECK(11, sprintf (buffer, heap); ); 80 81 CHECK(12, sprintf (buffer, "%s", "1234567890abcdefghijklmnopqrstuvwxyz"); ); 82 CHECK(13, sprintf (buffer, "%s", local); ); 83 CHECK(14, sprintf (buffer, "%s", heap); ); 84 85 CHECK(15, __builtin_strcat (buffer, "1234567890abcdefghijklmnopqrstuvwxyz"); ); 86 CHECK(16, __builtin_strcat (buffer, local); ); 87 CHECK(17, __builtin_strcat (buffer, heap); ); 88 89 void mongoose(void) 90 { 91 char buffer[1024]=""; 92 sprintf (buffer, "%s", "1234567890abcdefghijklmnopqrstuvwxyz");; 93 if (__builtin_strcmp(buffer, heap) == 0) { 94 debug("Okay(%d):\n\t%s\n", -1, "sprintf (buffer, \"%s\", \"1234567890abcdefghijklmnopqrstuvwxyz\");"); 95 } 96 else { 97 debug("Failed(%d):\n\t%s\n", -1, "sprintf (buffer, \"%s\", \"1234567890abcdefghijklmnopqrstuvwxyz\");"); 98 failed++; 99 } 100 } 101 102 int main (int argc, char *argv[]) 103 { 104 test0(); 105 test1(); 106 test2(); 107 test3(); 108 test4(); 109 test5(); 110 test6(); 111 test7(); 112 test8(); 113 test9(); 114 test10(); 115 test11(); 116 117 // wtf, why are these different?! 118 test12(); 119 mongoose(); 120 121 test13(); 122 test14(); 123 test15(); 124 test16(); 125 test17(); 126 127 if (failed) 128 abort (); 129 130 return 0; 131 } -
gcc/testsuite/gcc.dg/pr38932.c
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gcc.dg/pr38932.c gcc-4.3.3/gcc/testsuite/gcc.dg/pr38932.c
old new 1 /* { dg-do compile } */ 2 /* { dg-options "-O2" } */ 3 4 /* This variable needed only to exercise FRE instead of CCP. */ 5 unsigned char g; 6 7 extern void abort(); 8 9 void f (long long int p) 10 { 11 g = 255; 12 if (p >= (-9223372036854775807LL - 1) - (signed char) g) 13 p = 1; 14 15 if (p) 16 abort (); 17 } 18 19 -
gcc/testsuite/gcc.dg/tree-ssa/struct-aliasing-1.c
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gcc.dg/tree-ssa/struct-aliasing-1.c gcc-4.3.3/gcc/testsuite/gcc.dg/tree-ssa/struct-aliasing-1.c
old new 1 /* { dg-do "compile" } */ 2 /* { dg-options "-O2 -fdump-tree-fre" } */ 3 4 struct S { float f; }; 5 int __attribute__((noinline)) 6 foo (float *r, struct S *p) 7 { 8 int *q = (int *)&p->f; 9 int i = *q; 10 *r = 0.0; 11 return i + *q; 12 } 13 14 /* { dg-final { scan-tree-dump-times "\\\*q" 1 "fre" } } */ 15 /* { dg-final { cleanup-tree-dump "fre" } } */ -
gcc/testsuite/gcc.target/i386/pr38931.c
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gcc.target/i386/pr38931.c gcc-4.3.3/gcc/testsuite/gcc.target/i386/pr38931.c
old new 1 /* { dg-do compile } */ 2 /* { dg-options "-O2 -msse" } */ 3 4 typedef int __m64 __attribute__ ((__vector_size__ (8))); 5 6 extern __m64 foo () ; 7 8 void bar (const int input_bpl, const unsigned char *input, 9 unsigned char *output, unsigned long x1) 10 { 11 unsigned char *pix_end_ptr = output + x1 * 4; 12 __m64 m_original = { 0, 0 }; 13 __m64 m_base_addr = __builtin_ia32_vec_init_v2si (0, input_bpl); 14 __m64 m_addr = __builtin_ia32_paddd (m_original, m_base_addr); 15 __m64 *a0 = (__m64 *) input; 16 17 for (; output < pix_end_ptr; output += 4) 18 { 19 a0 = (__m64 *) (input + __builtin_ia32_vec_ext_v2si (m_addr, 0)); 20 m_addr = foo (); 21 __builtin_prefetch (a0, 0); 22 } 23 } -
gcc/testsuite/gcc.target/i386/pr38988.c
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gcc.target/i386/pr38988.c gcc-4.3.3/gcc/testsuite/gcc.target/i386/pr38988.c
old new 1 /* { dg-do compile } */ 2 /* { dg-require-effective-target lp64 } */ 3 /* { dg-require-effective-target fpic } */ 4 /* { dg-options "-O2 -fpic -mcmodel=large" } */ 5 6 typedef long unsigned int size_t; 7 typedef void (*func_ptr) (void); 8 9 static func_ptr __DTOR_LIST__[1] = { (func_ptr) (-1) }; 10 11 void 12 __do_global_dtors_aux (void) 13 { 14 extern func_ptr __DTOR_END__[]; 15 size_t dtor_idx = 0; 16 const size_t max_idx = __DTOR_END__ - __DTOR_LIST__ - 1; 17 func_ptr f; 18 19 while (dtor_idx < max_idx) 20 { 21 f = __DTOR_LIST__[++dtor_idx]; 22 f (); 23 } 24 } -
gcc/testsuite/g++.dg/other/pr38706.C
diff -Naur gcc-4.3.3.orig/gcc/testsuite/g++.dg/other/pr38706.C gcc-4.3.3/gcc/testsuite/g++.dg/other/pr38706.C
old new 1 // PR target/38706 2 // { dg-do compile } 3 // { dg-options "-O2" } 4 5 class ios_base 6 { 7 public: 8 virtual ~ios_base (); 9 10 }; 11 12 class istrstream:virtual public ios_base 13 { 14 public: 15 virtual ~istrstream (); 16 17 }; 18 19 istrstream::~istrstream () {} -
gcc/testsuite/g++.dg/parse/dtor14.C
diff -Naur gcc-4.3.3.orig/gcc/testsuite/g++.dg/parse/dtor14.C gcc-4.3.3/gcc/testsuite/g++.dg/parse/dtor14.C
old new 1 // PR c++/39054 2 3 struct A {}; 4 5 template<typename> void foo() 6 { 7 A().~int(); // { dg-error "expected" } 8 } -
gcc/testsuite/g++.dg/template/dtor5.C
diff -Naur gcc-4.3.3.orig/gcc/testsuite/g++.dg/template/dtor5.C gcc-4.3.3/gcc/testsuite/g++.dg/template/dtor5.C
old new 1 // PR c++/23287 2 3 template <class T> struct A 4 { 5 int i; 6 ~A(); 7 }; 8 9 template <class T> void f(A<T> *ap) { 10 ap->~A(); 11 } 12 13 template <class T> void g(A<T> *ap) { 14 ap->~B(); // { dg-error "destructor name" } 15 } 16 17 int main() 18 { 19 f(new A<int>); 20 g(new A<int>); 21 } -
gcc/testsuite/g++.dg/template/func2.C
diff -Naur gcc-4.3.3.orig/gcc/testsuite/g++.dg/template/func2.C gcc-4.3.3/gcc/testsuite/g++.dg/template/func2.C
old new 1 // { dg-do compile } 2 3 typedef void (*fptr)(); 4 fptr zeroptr = 0; 5 template<typename T, fptr F> struct foo { }; 6 template<typename T> struct foo<T,zeroptr> { }; 7 // { dg-error "not a valid template argument" "not valid" { target *-*-* } 6 } 8 // { dg-error "must be the address" "must be the address " { target *-*-* } 6 } 9 10 // The rest is needed to trigger the ICE in 4.0 to 4.3: 11 void f() { } 12 foo<int,&f> m_foo; -
gcc/testsuite/g++.dg/template/typename15.C
diff -Naur gcc-4.3.3.orig/gcc/testsuite/g++.dg/template/typename15.C gcc-4.3.3/gcc/testsuite/g++.dg/template/typename15.C
old new 1 // PR37314 ice-on-valid-code, from w.doeringer 2 template <typename T> 3 class Cdeque { 4 typedef T *pointer; 5 class iterator { 6 typedef typename Cdeque<T>::pointer pointer; 7 pointer operator->(); 8 }; 9 }; 10 template <typename T> T* Cdeque<T>::iterator::operator->() { } 11 12 -
gcc/testsuite/g++.dg/template/typename16.C
diff -Naur gcc-4.3.3.orig/gcc/testsuite/g++.dg/template/typename16.C gcc-4.3.3/gcc/testsuite/g++.dg/template/typename16.C
old new 1 // PR37314 rejects-valid, from w.doeringer 2 template <typename T> 3 struct A { 4 typedef __PTRDIFF_TYPE__ difference_type; 5 struct B { 6 typedef typename A<T>::difference_type difference_type; 7 difference_type operator-(B const&) const; 8 T t; 9 }; 10 }; 11 // 12 13 template <typename T> 14 typename A<T>::B::difference_type A<T>::B::operator-(B const&) const { 15 return -1; 16 } 17 18 // 19 int main() { 20 A<int>::B i; 21 ++i.t; 22 return 0; 23 } 24 25 -
gcc/testsuite/g++.dg/torture/pr38745.C
diff -Naur gcc-4.3.3.orig/gcc/testsuite/g++.dg/torture/pr38745.C gcc-4.3.3/gcc/testsuite/g++.dg/torture/pr38745.C
old new 1 /* { dg-do compile } */ 2 3 union u_u16 4 { 5 unsigned short v; 6 struct 7 { 8 unsigned char lo8, hi8; 9 } __attribute__ ((__may_alias__)) u; 10 } __attribute__ ((__may_alias__)); 11 union u_u32 12 { 13 unsigned int v; 14 struct 15 { 16 u_u16 lo16, hi16; 17 } u; 18 } __attribute__ ((__may_alias__)); 19 union u_u64 20 { 21 struct 22 { 23 u_u32 lo32, hi32; 24 } u; 25 }; 26 struct Record 27 { 28 }; 29 long long 30 UnpackFullKey (Record & rec, const char *&p) 31 { 32 long long c64 = 0; 33 (*(u_u16 *) & (*(u_u32 *) & ( *(u_u64*)&c64).u.lo32.v).u.lo16.v).u.hi8 = 1; 34 return c64; 35 } 36 -
gcc/testsuite/g++.dg/warn/Wstrict-aliasing-bogus-placement-new.C
diff -Naur gcc-4.3.3.orig/gcc/testsuite/g++.dg/warn/Wstrict-aliasing-bogus-placement-new.C gcc-4.3.3/gcc/testsuite/g++.dg/warn/Wstrict-aliasing-bogus-placement-new.C
old new 1 /* { dg-do compile } */ 2 /* { dg-options "-O2 -Wstrict-aliasing" } */ 3 4 inline void *operator new (__SIZE_TYPE__, void *__p) throw() { return __p; } 5 6 struct Y { 7 Y() {} 8 int i; 9 }; 10 11 struct X { 12 X() {} 13 void construct(const Y& y) 14 { 15 new (&m_data[0]) Y(y); 16 } 17 bool initialized; 18 char m_data[sizeof (Y)]; 19 }; 20 21 void bar(const X&); 22 void foo(Y& y) 23 { 24 X x; 25 x.construct(y); 26 x.initialized = true; 27 bar(x); 28 } 29 -
gcc/testsuite/g++.dg/warn/Wuninitialized-1.C
diff -Naur gcc-4.3.3.orig/gcc/testsuite/g++.dg/warn/Wuninitialized-1.C gcc-4.3.3/gcc/testsuite/g++.dg/warn/Wuninitialized-1.C
old new 1 /* { dg-options "-O2 -Wuninitialized" } */ 2 3 struct Empty { Empty() {} }; /* { dg-bogus "uninitialized" } */ 4 struct Other { 5 Other(const Empty& e_) : e(e_) {} 6 Empty e; 7 }; 8 void bar(Other&); 9 void foo() 10 { 11 Empty e; 12 Other o(e); 13 bar(o); 14 } 15 -
gcc/testsuite/g++.dg/warn/Wuninitialized-2.C
diff -Naur gcc-4.3.3.orig/gcc/testsuite/g++.dg/warn/Wuninitialized-2.C gcc-4.3.3/gcc/testsuite/g++.dg/warn/Wuninitialized-2.C
old new 1 /* { dg-do compile } */ 2 /* { dg-options "-O -Wuninitialized" } */ 3 4 struct S8 { template<typename T> S8(T) { } }; 5 6 template<typename T> struct S10; 7 template<typename T> struct S10<T()> { typedef T S12; typedef S8 S1(); }; 8 9 template<typename T> struct S3 { }; 10 template<typename T> struct S11 { S11(S3<T>); }; 11 12 struct S2 13 { 14 template<typename T> operator S11<T>() { return S11<T>(S5<T>()); } 15 template<typename T> struct S5:public S3<T> 16 { 17 virtual typename S10<T>::S12 S13() { 18 return 0; 19 } 20 }; 21 }; 22 23 template<typename T> S11<T> S6(S3<T>) { return S11<T>(S3<T>()); } 24 template<typename S12> struct S7 { typedef S12 S15(); }; 25 26 struct S4 27 { 28 template<typename T> operator S11<T>() 29 { 30 struct S14:public S3<T> 31 { 32 S14(S2 x):S11_(x) { } 33 S11<typename S7<typename S10<T>::S12>::S15> S11_; 34 }; 35 return S6(S14(S11_)); 36 } 37 S2 S11_; 38 }; 39 40 struct S9 41 { 42 template<typename F> operator S11<F>() { return S11<F>(S14<F>(S11_)); } 43 template<typename F> struct S14:public S3<F> 44 { 45 S14(S4 x):S11_(x) { } 46 S11<typename S10<F>::S1> S11_; 47 }; 48 S4 S11_; 49 }; 50 51 void S15(S11<void()>); 52 void S16() { S9 x; S15(x); } 53 -
gcc/testsuite/gfortran.dg/bounds_5.f90
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gfortran.dg/bounds_5.f90 gcc-4.3.3/gcc/testsuite/gfortran.dg/bounds_5.f90
old new 1 ! { dg-do run } 2 ! 3 ! PR fortran/38859 4 ! Wrong bounds simplification 5 ! 6 ! Contributed by Dick Hendrickson <dick.hendrickson@gmail.com> 7 8 type x 9 integer I 10 end type x 11 type (x) A(0:5, 2:8) 12 integer ida(2) 13 14 ida = lbound(a) 15 if (any(ida /= (/0,2/))) call abort 16 17 ida = lbound(a%i) 18 if (any(ida /= (/1,1/))) call abort 19 20 ida = ubound(a) 21 if (any(ida /= (/5,8/))) call abort 22 23 ida = ubound(a%i) 24 if (any(ida /= (/6,7/))) call abort 25 26 end -
gcc/testsuite/gfortran.dg/host_assoc_blockdata_1.f90
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gfortran.dg/host_assoc_blockdata_1.f90 gcc-4.3.3/gcc/testsuite/gfortran.dg/host_assoc_blockdata_1.f90
old new 1 ! { dg-do compile } 2 ! PR 38672 - this used to ICE. 3 MODULE globals 4 TYPE :: type1 5 integer :: x 6 END TYPE type1 7 TYPE (type1) :: pdm_bps 8 END module globals 9 BLOCK DATA 10 use globals 11 END BLOCK DATA -
gcc/testsuite/gfortran.dg/host_assoc_blockdata_2.f90
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gfortran.dg/host_assoc_blockdata_2.f90 gcc-4.3.3/gcc/testsuite/gfortran.dg/host_assoc_blockdata_2.f90
old new 1 ! { dg-do compile } 2 MODULE globals 3 TYPE :: type1 4 sequence 5 integer :: x 6 END TYPE type1 7 TYPE (type1) :: pdm_bps 8 common /co/ pdm_bps 9 END module globals 10 BLOCK DATA 11 use globals 12 END BLOCK DATA 13 14 program main 15 use globals 16 common /co/ pdm_bps ! { dg-error "already in a COMMON block" } 17 end program main -
gcc/testsuite/gfortran.dg/host_assoc_function_7.f90
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gfortran.dg/host_assoc_function_7.f90 gcc-4.3.3/gcc/testsuite/gfortran.dg/host_assoc_function_7.f90
old new 1 ! { dg-do run } 2 ! Tests the fix for PR38907, in which any expressions, including unary plus, 3 ! in front of the call to S_REAL_SUM_I (marked) would throw the mechanism 4 ! for correcting invalid host association. 5 ! 6 ! Contributed by Dick Hendrickson <dick.hendrickson@gmail.com> 7 ! 8 module sa0054_stuff 9 REAL :: S_REAL_SUM_2(10) = [(REAL (I), I = 1, 10)] 10 contains 11 ELEMENTAL FUNCTION S_REAL_SUM_I (A) 12 REAL :: S_REAL_SUM_I 13 REAL, INTENT(IN) :: A 14 X = 1.0 15 S_REAL_SUM_I = X 16 END FUNCTION S_REAL_SUM_I 17 SUBROUTINE SA0054 (RDA) 18 REAL RDA(:) 19 RDA = + S_REAL_SUM_I (RDA) ! Reported problem => ICE 20 RDA = RDA + S_REAL_SUM_2 (INT (RDA)) ! Also failed 21 CONTAINS 22 ELEMENTAL FUNCTION S_REAL_SUM_I (A) 23 REAL :: S_REAL_SUM_I 24 REAL, INTENT(IN) :: A 25 S_REAL_SUM_I = 2.0 * A 26 END FUNCTION S_REAL_SUM_I 27 ELEMENTAL FUNCTION S_REAL_SUM_2 (A) 28 REAL :: S_REAL_SUM_2 29 INTEGER, INTENT(IN) :: A 30 S_REAL_SUM_2 = 2.0 * A 31 END FUNCTION S_REAL_SUM_2 32 END SUBROUTINE 33 end module sa0054_stuff 34 35 use sa0054_stuff 36 REAL :: RDA(10) = [(REAL(I), I = 1, 10)] 37 call SA0054 (RDA) 38 IF (ANY (INT (RDA) .ne. [(6 * I, I = 1, 10)])) print *, rda 39 END 40 41 ! { dg-final { cleanup-modules "sa0054_stuff" } } -
gcc/testsuite/gfortran.dg/module_commons_3.f90
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gfortran.dg/module_commons_3.f90 gcc-4.3.3/gcc/testsuite/gfortran.dg/module_commons_3.f90
old new 1 ! { dg-do run } 2 ! 3 ! PR fortran/38657, in which the mixture of PRIVATE and 4 ! COMMON in TEST4, would mess up the association with 5 ! TESTCHAR in TEST2. 6 ! 7 ! Contributed by Paul Thomas <pault@gcc.gnu.org> 8 ! From a report in clf by Chris Bradley. 9 ! 10 MODULE TEST4 11 PRIVATE 12 CHARACTER(LEN=80) :: T1 = & 13 "Mary had a little lamb, Its fleece was white as snow;" 14 CHARACTER(LEN=80) :: T2 = & 15 "And everywhere that Mary went, The lamb was sure to go." 16 CHARACTER(LEN=80) :: TESTCHAR 17 COMMON /TESTCOMMON1/ TESTCHAR 18 PUBLIC T1, T2, FOOBAR 19 CONTAINS 20 subroutine FOOBAR (CHECK) 21 CHARACTER(LEN=80) :: CHECK 22 IF (TESTCHAR .NE. CHECK) CALL ABORT 23 end subroutine 24 END MODULE TEST4 25 26 MODULE TEST3 27 CHARACTER(LEN=80) :: TESTCHAR 28 COMMON /TESTCOMMON1/ TESTCHAR 29 END MODULE TEST3 30 31 MODULE TEST2 32 use TEST4 33 USE TEST3, chr => testchar 34 PRIVATE 35 CHARACTER(LEN=80) :: TESTCHAR 36 COMMON /TESTCOMMON1/ TESTCHAR 37 PUBLIC TESTCHAR, FOO, BAR, CHR, T1, T2, FOOBAR 38 contains 39 subroutine FOO 40 TESTCHAR = T1 41 end subroutine 42 subroutine BAR (CHECK) 43 CHARACTER(LEN=80) :: CHECK 44 IF (TESTCHAR .NE. CHECK) CALL ABORT 45 IF (CHR .NE. CHECK) CALL ABORT 46 end subroutine 47 END MODULE TEST2 48 49 PROGRAM TEST1 50 USE TEST2 51 call FOO 52 call BAR (T1) 53 TESTCHAR = T2 54 call BAR (T2) 55 CALL FOOBAR (T2) 56 END PROGRAM TEST1 57 ! { dg-final { cleanup-modules "TEST2 TEST3 TEST4" } } -
gcc/testsuite/gfortran.dg/mvbits_5.f90
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gfortran.dg/mvbits_5.f90 gcc-4.3.3/gcc/testsuite/gfortran.dg/mvbits_5.f90
old new 1 ! { dg-do run } 2 3 ! PR fortran/38887 4 ! This aborted at runtime for the runtime zero-sized array arguments. 5 6 ! Contributed by Dick Hendrickson <dick.hendrickson@gmail.com> 7 8 program try_ya0013 9 integer ida(9) 10 call ya0013(ida,1,5,6) 11 end program 12 13 SUBROUTINE YA0013(IDA,nf1,nf5,nf6) 14 INTEGER IDA(9) 15 IDA = 1 16 CALL MVBITS(IDA(NF5:NF1), 0, 1, IDA(NF6:NF1),2) 17 END SUBROUTINE -
gcc/testsuite/gfortran.dg/mvbits_6.f90
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gfortran.dg/mvbits_6.f90 gcc-4.3.3/gcc/testsuite/gfortran.dg/mvbits_6.f90
old new 1 ! { dg-do compile } 2 3 ! PR fortran/38883 4 ! This ICE'd because the temporary-creation in the MVBITS call was wrong. 5 ! This is the original test from the PR, the complicated version. 6 7 ! Contributed by Dick Hendrickson <dick.hendrickson@gmail.com> 8 9 module yg0009_stuff 10 11 type unseq 12 integer I 13 end type 14 15 contains 16 17 SUBROUTINE YG0009(TDA2L,NF4,NF3,NF1,MF1,MF4,MF3) 18 TYPE(UNSEQ) TDA2L(NF4,NF3) 19 20 CALL MVBITS (TDA2L(NF4:NF1:MF1,NF1:NF3)%I,2, & 21 4, TDA2L(-MF4:-MF1:-NF1,-MF1:-MF3)%I, 3) 22 23 END SUBROUTINE 24 25 end module yg0009_stuff 26 27 program try_yg0009 28 use yg0009_stuff 29 type(unseq) tda2l(4,3) 30 31 call yg0009(tda2l,4,3,1,-1,-4,-3) 32 33 end -
gcc/testsuite/gfortran.dg/mvbits_7.f90
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gfortran.dg/mvbits_7.f90 gcc-4.3.3/gcc/testsuite/gfortran.dg/mvbits_7.f90
old new 1 ! { dg-do run } 2 3 ! PR fortran/38883 4 ! This ICE'd because the temporary-creation in the MVBITS call was wrong. 5 6 ! Contributed by Paul Richard Thomas <paul.richard.thomas@gmail.com> 7 8 type t 9 integer :: I 10 character(9) :: chr 11 end type 12 type(t) :: x(4,3) 13 type(t) :: y(4,3) 14 x = reshape ([((t (i*j, "a"),i = 1,4), j=1,3)], [4,3]) 15 call foo (x) 16 y = reshape ([((t (i*j*2, "a"),i = 1,4), j=1,3)], [4,3]) 17 call bar(y, 4, 3, 1, -1, -4, -3) 18 if (any (x%i .ne. y%i)) call abort 19 contains 20 SUBROUTINE foo (x) 21 TYPE(t) x(4, 3) ! No dependency at all 22 CALL MVBITS (x%i, 0, 6, x%i, 8) 23 x%i = x%i * 2 24 END SUBROUTINE 25 SUBROUTINE bar (x, NF4, NF3, NF1, MF1, MF4, MF3) 26 TYPE(t) x(NF4, NF3) ! Dependency through variable indices 27 CALL MVBITS (x(NF4:NF1:MF1, NF1:NF3)%i, 1, & 28 6, x(-MF4:-MF1:-NF1, -MF1:-MF3)%i, 9) 29 END SUBROUTINE 30 end -
gcc/testsuite/gfortran.dg/mvbits_8.f90
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gfortran.dg/mvbits_8.f90 gcc-4.3.3/gcc/testsuite/gfortran.dg/mvbits_8.f90
old new 1 ! { dg-do run } 2 3 ! PR fortran/38883 4 ! This ICE'd because the temporary-creation in the MVBITS call was wrong. 5 6 PROGRAM main 7 IMPLICIT NONE 8 9 TYPE inner 10 INTEGER :: i 11 INTEGER :: j 12 END TYPE inner 13 14 TYPE outer 15 TYPE(inner) :: comp(2) 16 END TYPE outer 17 18 TYPE(outer) :: var 19 20 var%comp%i = (/ 1, 2 /) 21 var%comp%j = (/ 3, 4 /) 22 23 CALL foobar (var, 1, 2) 24 25 IF (ANY (var%comp%i /= (/ 1, 2 /))) CALL abort () 26 IF (ANY (var%comp%j /= (/ 3, 4 /))) CALL abort () 27 28 CONTAINS 29 30 SUBROUTINE foobar (x, lower, upper) 31 TYPE(outer), INTENT(INOUT) :: x 32 INTEGER, INTENT(IN) :: lower, upper 33 CALL MVBITS (x%comp%i, 1, 2, x%comp(lower:upper)%i, 1) 34 END SUBROUTINE foobar 35 36 END PROGRAM main -
gcc/testsuite/gfortran.dg/pr38868.f
diff -Naur gcc-4.3.3.orig/gcc/testsuite/gfortran.dg/pr38868.f gcc-4.3.3/gcc/testsuite/gfortran.dg/pr38868.f
old new 1 ! { dg-do compile } 2 ! { dg-options "-O2 -fdump-rtl-expand" } 3 PROGRAM testcase 4 IMPLICIT NONE 5 6 CHARACTER*4 ANER(18) 7 CHARACTER*80 LINE 8 aner = '' 9 ANER(1)='A ' 10 ANER(2)=' ' 11 LINE=' ' 12 LINE(78:80)='xyz' 13 WRITE(*,'(A82)') "'"//LINE//"'" 14 END 15 16 ! { dg-final { scan-rtl-dump-times "line\\\+80" 0 "expand" } } 17 ! { dg-final { cleanup-rtl-dump "expand" } } */ -
gcc/testsuite/objc.dg/gnu-encoding/gnu-encoding.exp
diff -Naur gcc-4.3.3.orig/gcc/testsuite/objc.dg/gnu-encoding/gnu-encoding.exp gcc-4.3.3/gcc/testsuite/objc.dg/gnu-encoding/gnu-encoding.exp
old new 37 37 set generator_src "$generator_src $srcdir/$subdir/generate-random.c" 38 38 set generator_src "$generator_src $srcdir/$subdir/generate-random_r.c" 39 39 set generator_cmd "-o $generator $generator_src" 40 # Temporarily unset GCC_EXEC_PREFIX from environment, as that might 41 # confuse the $HOSTCC. 42 set orig_gcc_exec_prefix_saved 0 43 if [info exists env(GCC_EXEC_PREFIX)] { 44 set orig_gcc_exec_prefix "$env(GCC_EXEC_PREFIX)" 45 set orig_gcc_exec_prefix_saved 1 46 unsetenv GCC_EXEC_PREFIX 47 } 40 48 set status [remote_exec host "$HOSTCC $HOSTCFLAGS $generator_cmd"] 41 49 set status [lindex $status 0] 50 if { $orig_gcc_exec_prefix_saved } { 51 set orig_gcc_exec_prefix_saved 0 52 setenv GCC_EXEC_PREFIX "$orig_gcc_exec_prefix" 53 } 42 54 if { $status == 0 } then { 43 55 file delete -force $tstobjdir 44 56 file mkdir $tstobjdir -
gcc/tree.h
diff -Naur gcc-4.3.3.orig/gcc/tree.h gcc-4.3.3/gcc/tree.h
old new 4753 4753 4754 4754 extern tree fold (tree); 4755 4755 extern tree fold_unary (enum tree_code, tree, tree); 4756 extern tree fold_unary_ignore_overflow (enum tree_code, tree, tree); 4756 4757 extern tree fold_binary (enum tree_code, tree, tree, tree); 4757 4758 extern tree fold_ternary (enum tree_code, tree, tree, tree, tree); 4758 4759 extern tree fold_build1_stat (enum tree_code, tree, tree MEM_STAT_DECL); -
gcc/tree-ssa-ccp.c
diff -Naur gcc-4.3.3.orig/gcc/tree-ssa-ccp.c gcc-4.3.3/gcc/tree-ssa-ccp.c
old new 938 938 if ((code == NOP_EXPR || code == CONVERT_EXPR) 939 939 && useless_type_conversion_p (TREE_TYPE (rhs), TREE_TYPE (op0))) 940 940 return op0; 941 return fold_unary (code, TREE_TYPE (rhs), op0);941 return fold_unary_ignore_overflow (code, TREE_TYPE (rhs), op0); 942 942 } 943 943 944 944 /* Binary and comparison operators. We know one or both of the -
gcc/tree-ssa-forwprop.c
diff -Naur gcc-4.3.3.orig/gcc/tree-ssa-forwprop.c gcc-4.3.3/gcc/tree-ssa-forwprop.c
old new 677 677 array elements, then the result is converted into the proper 678 678 type for the arithmetic. */ 679 679 if (TREE_CODE (TREE_OPERAND (rhs, 1)) == SSA_NAME 680 && useless_type_conversion_p (TREE_TYPE (name), TREE_TYPE (def_rhs)) 680 681 /* Avoid problems with IVopts creating PLUS_EXPRs with a 681 682 different type than their operands. */ 682 683 && useless_type_conversion_p (TREE_TYPE (rhs), TREE_TYPE (name))) -
gcc/tree-ssa-sccvn.c
diff -Naur gcc-4.3.3.orig/gcc/tree-ssa-sccvn.c gcc-4.3.3/gcc/tree-ssa-sccvn.c
old new 1507 1507 if (op0 == TREE_OPERAND (rhs, 0)) 1508 1508 return rhs; 1509 1509 1510 result = fold_unary (TREE_CODE (rhs), TREE_TYPE (rhs), op0);1510 result = fold_unary_ignore_overflow (TREE_CODE (rhs), TREE_TYPE (rhs), op0); 1511 1511 if (result) 1512 1512 { 1513 1513 STRIP_USELESS_TYPE_CONVERSION (result); -
libjava/classpath/doc/cp-tools.info
diff -Naur gcc-4.3.3.orig/libjava/classpath/doc/cp-tools.info gcc-4.3.3/libjava/classpath/doc/cp-tools.info
old new 1 This is cp-tools.info, produced by makeinfo version 4.12 from2 /abuild/rguenther/tmp/gcc-4.3.3/gcc-4.3.3/libjava/classpath/doc/cp-tools.texinfo.3 4 This file documents the Tools included in a standard distribution of5 the GNU Classpath project deliverables.6 7 Copyright (C) 2006, 2007 Free Software Foundation, Inc.8 9 INFO-DIR-SECTION GNU Libraries10 START-INFO-DIR-ENTRY11 * Classpath Tools: (cp-tools). GNU Classpath Tools Guide12 END-INFO-DIR-ENTRY13 14 15 File: cp-tools.info, Node: Top, Next: Applet Tools, Prev: (dir), Up: (dir)16 17 GNU Classpath Tools Guide18 *************************19 20 This document contains important information you need to know in order21 to use the tools included in the GNU Classpath project deliverables.22 23 The Tools aim at providing a free replacement, similar in their24 behavior, to their counter-parts found in the Reference Implementation25 (RI) of the Java Software Development Kit (SDK).26 27 * Menu:28 29 * Applet Tools:: Work with applets30 * Security Tools:: Work securely with Java applications31 * Other Tools:: Other tools in classpath32 * I18N Issues:: How to add support for non-English languages33 34 --- The Detailed Node Listing ---35 36 Applet Tools37 38 * appletviewer Tool:: Load applets39 * gcjwebplugin:: Load applets in a web browser40 41 Security Tools42 43 * jarsigner Tool:: Sign and verify .JAR files44 * keytool Tool:: Manage private keys and public certificates45 46 jarsigner Tool47 48 * Common jarsigner Options:: Options used when signing or verifying a file49 * Signing Options:: Options only used when signing a .JAR file50 * Verification Options:: Options only used when verifying a .JAR file51 52 keytool Tool53 54 * Getting Help:: How to get help with keytool commands55 * Common keytool Options:: Options used in more than one command56 * Distinguished Names:: X.500 Distinguished Names used in certificates57 * Add/Update Commands:: Commands for adding data to a Key Store58 * Export Commands:: Commands for exporting data from a Key Store59 * Display Commands:: Commands for displaying data in a Key Store60 * Management Commands:: Commands for managing a Key Store61 62 Add/Update Commands63 64 * Command -genkey:: Generate private key and self-signed certificate65 * Command -import:: Import certificates and certificate replies66 * Command -selfcert:: Generate self-signed certificate67 * Command -cacert:: Import a CA Trusted Certificate68 * Command -identitydb:: Import JDK-1 style identities69 70 Export Commands71 72 * Command -certreq:: Generate Certificate Signing Requests (CSR)73 * Command -export:: Export a certificate in a Key Store74 75 Display Commands76 77 * Command -list:: Display information about one or all Aliases78 * Command -printcert:: Print a certificate or a certificate fingerprint79 80 Management Commands81 82 * Command -keyclone:: Clone a Key Entry in a Key Store83 * Command -storepasswd:: Change the password protecting a Key Store84 * Command -keypasswd:: Change the password protecting a Key Entry85 * Command -delete:: Remove an entry in a Key Store86 87 Other Tools88 89 * jar Tool:: Archive tool for Java archives90 * javah Tool:: A java header compiler91 * gcjh Tool:: A java header compiler (old version)92 * native2ascii Tool:: An encoding converter93 * orbd Tool:: An object request broker daemon94 * serialver Tool:: A serial version command95 * rmid Tool:: RMI activation daemon96 * rmiregistry Tool:: Remote object registry97 * tnameserv Tool:: Naming service98 99 I18N Issues100 101 * Language Resources:: Where resources are located102 * Message Formats:: How messages are internationalized103 104 105 File: cp-tools.info, Node: Applet Tools, Next: Security Tools, Prev: Top, Up: Top106 107 1 Applet Tools108 **************109 110 Two Applet Tools are available with GNU Classpath: appletviewer and111 gcjwebplugin.112 113 To avoid conflicts with other implementations, the appletviewer114 executable is called "gappletviewer".115 116 * Menu:117 118 * appletviewer Tool:: Load applets119 * gcjwebplugin:: Load applets in a web browser120 121 If while using these tools you think you found a bug, then please122 report it at classpath-bugs123 (http://www.gnu.org/software/classpath/bugs.html).124 125 126 File: cp-tools.info, Node: appletviewer Tool, Next: gcjwebplugin, Prev: Applet Tools, Up: Applet Tools127 128 1.1 The `appletviewer' Tool129 ===========================130 131 SYNOPSIS132 133 appletviewer [OPTION]... URL...134 appletviewer [OPTION]... `-code' CODE135 appletviewer [OPTION]... `-plugin' INPUT,OUTPUT136 137 DESCRIPTION The `appletviewer' tool loads and runs an applet.138 139 Use the first form to test applets specified by tag. The URL should140 resolve to an HTML document from which the `appletviewer' will extract141 applet tags. The APPLET, EMBED and OBJECT tags are supported. If a142 given document contains multiple applet tags, all the applets will be143 loaded, with each applet appearing in its own window. Likewise, when144 multiple URLs are specified, each applet tag instance is given its own145 window. If a given document contains no recognized tags the146 `appletviewer' does nothing.147 148 appletviewer http://www.gnu.org/software/classpath/149 150 Use the second form to test an applet in development. This form151 allows applet tag attributes to be supplied on the command line. Only152 one applet may be specified using the `-code' option. The `-code'153 option overrides the URL form - any URLs specified will be ignored.154 155 appletviewer -code Test.class -param datafile,data.txt156 157 `gcjwebplugin' uses the third form to communicate with the158 `appletviewer' through named pipes.159 160 URL OPTIONS161 `-debug'162 This option is not yet implemented but is provided for163 compatibility.164 165 `-encoding CHARSET'166 Use this option to specify an alternate character encoding for the167 specified HTML page.168 169 170 APPLET TAG OPTIONS171 `-code CODE'172 Use the `-code' option to specify the value of the applet tag CODE173 attribute.174 175 `-codebase CODEBASE'176 Use the `-codebase' option to specify the value of the applet tag177 CODEBASE attribute.178 179 `-archive ARCHIVE'180 Use the `-archive' option to specify the value of the applet tag181 ARCHIVE attribute.182 183 `-width WIDTH'184 Use the `-width' option to specify the value of the applet tag185 WIDTH attribute.186 187 `-height HEIGHT'188 Use the `-height' option to specify the value of the applet tag189 HEIGHT attribute.190 191 `-param NAME,VALUE'192 Use the `-param' option to specify values for the NAME and VALUE193 attributes of an applet PARAM tag.194 195 196 PLUGIN OPTION197 `-plugin INPUT,OUTPUT'198 `gcjwebplugin' uses the `-plugin' option to specify the named pipe199 the `appletviewer' should use for receiving commands (INPUT) and200 the one it should use for sending commands to `gcjwebplugin'201 (OUTPUT).202 203 204 DEBUGGING OPTION205 `-verbose'206 Use the `-verbose' option to have the `appletviewer' print207 debugging messages.208 209 210 STANDARD OPTIONS211 212 `-help'213 Use the `-help' option to have the `appletviewer' print a usage214 message, then exit.215 216 `-version'217 Use the `-version' option to have the `appletviewer' print its218 version, then exit.219 220 `-JOPTION'221 Use the `-J' option to pass OPTION to the virtual machine that222 will run the `appletviewer'. Unlike other options, there must not223 be a space between the `-J' and OPTION.224 225 226 227 File: cp-tools.info, Node: gcjwebplugin, Prev: appletviewer Tool, Up: Applet Tools228 229 1.2 The `gcjwebplugin' Tool230 ===========================231 232 `gcjwebplugin' is a plugin that adds applet support to web browsers.233 Currently `gcjwebplugin' only supports Mozilla-based browsers (e.g.,234 Firefox, Galeon, Mozilla).235 236 237 File: cp-tools.info, Node: Security Tools, Next: Other Tools, Prev: Applet Tools, Up: Top238 239 2 Security Tools240 ****************241 242 Two Security Tools are available with GNU Classpath: `jarsigner' and243 `keytool'.244 245 To avoid conflicts with other implementations, the jarsigner246 executable is called `gjarsigner' and the keytool executable is called247 `gkeytool'.248 249 * Menu:250 251 * jarsigner Tool:: Sign and verify .JAR files252 * keytool Tool:: Manage private keys and public certificates253 254 If while using these tools you think you found a bug, then please255 report it at classpath-bugs256 (http://www.gnu.org/software/classpath/bugs.html).257 258 259 File: cp-tools.info, Node: jarsigner Tool, Next: keytool Tool, Prev: Security Tools, Up: Security Tools260 261 2.1 The `jarsigner' Tool262 ========================263 264 The `jarsigner' tool is invoked from the command line, in one of two265 forms, as follows:266 267 jarsigner [OPTION]... FILE ALIAS268 269 jarsigner `-verify' [OPTION]... FILE270 271 When the first form is used, the tool signs the designated JAR file.272 The second form, on the other hand, is used to verify a previously273 signed JAR file.274 275 FILE is the .JAR file to process; i.e. to sign if the first syntax276 form is used, or to verify if the second syntax form is used instead.277 278 ALIAS must be a known Alias of a Key Entry in the designated Key279 Store. The private key material associated with this Alias is then used280 for signing the designated .JAR file.281 282 * Menu:283 284 * Common jarsigner Options:: Options used when signing or verifying a file285 * Signing Options:: Options only used when signing a .JAR file286 * Verification Options:: Options only used when verifying a .JAR file287 288 289 File: cp-tools.info, Node: Common jarsigner Options, Next: Signing Options, Prev: jarsigner Tool, Up: jarsigner Tool290 291 2.1.1 Common options292 --------------------293 294 The following options may be used when the tool is used for either295 signing, or verifying, a .JAR file.296 297 `-verbose'298 Use this option to force the tool to generate more verbose299 messages, during its processing.300 301 `-internalsf'302 When present, the tool will include -which otherwise it does not-303 the `.SF' file in the `.DSA' generated file.304 305 `-sectionsonly'306 When present, the tool will include in the `.SF' generated file307 -which otherwise it does not- a header containing a hash of the308 whole manifest file. When that header is included, the tool can309 quickly check, during verification, if the hash (in the header)310 matches or not the manifest file.311 312 `-provider PROVIDER_CLASS_NAME'313 A fully qualified class name of a Security Provider to add to the314 current list of Security Providers already installed in the JVM315 in-use. If a provider class is specified with this option, and was316 successfully added to the runtime -i.e. it was not already317 installed- then the tool will attempt to remove this Security318 Provider before exiting.319 320 `-help'321 Prints a help text similar to this one.322 323 324 325 File: cp-tools.info, Node: Signing Options, Next: Verification Options, Prev: Common jarsigner Options, Up: jarsigner Tool326 327 2.1.2 Signing options328 ---------------------329 330 The following options may be specified when using the tool for signing331 purposes.332 333 `-keystore URL'334 Use this option to specify the location of the key store to use.335 The default value is a file URL referencing the file named336 `.keystore' located in the path returned by the call to337 `java.lang.System#getProperty(String)' using `user.home' as338 argument.339 340 If a URL was specified, but was found to be malformed -e.g.341 missing protocol element- the tool will attempt to use the URL342 value as a file-name (with absolute or relative path-name) of a343 key store -as if the protocol was `file:'.344 345 `-storetype STORE_TYPE'346 Use this option to specify the type of the key store to use. The347 default value, if this option is omitted, is that of the property348 `keystore.type' in the security properties file, which is obtained349 by invoking the static method call `getDefaultType()' in350 `java.security.KeyStore'.351 352 `-storepass PASSWORD'353 Use this option to specify the password which will be used to354 unlock the key store. If this option is missing, the User will be355 prompted to provide a password.356 357 `-keypass PASSWORD'358 Use this option to specify the password which the tool will use to359 unlock the Key Entry associated with the designated Alias.360 361 If this option is omitted, the tool will first attempt to unlock362 the Key Entry using the same password protecting the key store. If363 this fails, you will then be prompted to provide a password.364 365 `-sigfile NAME'366 Use this option to designate a literal that will be used to367 construct file names for both the `.SF' and `.DSA' signature368 files. These files will be generated, by the tool, and placed in369 the `META-INF' directory of the signed JAR. Permissible370 characters for NAME must be in the range "a-zA-Z0-9_-". All371 characters will be converted to upper-case ones.372 373 If this option is missing, the first eight characters of the ALIAS374 argument will be used. When this is the case, any character in375 ALIAS that is outside the permissible range of characters will be376 replaced by an underscore.377 378 `-signedjar FILE'379 Use this option to specify the file name of the signed JAR. If380 this option is omitted, then the signed JAR will be named the same381 as FILE; i.e. the input JAR file will be replaced with the signed382 copy.383 384 385 386 File: cp-tools.info, Node: Verification Options, Prev: Signing Options, Up: jarsigner Tool387 388 2.1.3 Verification options389 --------------------------390 391 The following options may be specified when using the tool for392 verification purposes.393 394 `-verify'395 Use this option to indicate that the tool is to be used for396 verification purposes.397 398 `-certs'399 This option is used in conjunction with the `-verbose' option.400 When present, along with the `-verbose' option, the tool will401 print more detailed information about the certificates of the402 signer(s) being processed.403 404 405 406 File: cp-tools.info, Node: keytool Tool, Prev: jarsigner Tool, Up: Security Tools407 408 2.2 The `keytool' Tool409 ======================410 411 Cryptographic credentials, in a Java environment, are usually stored in412 a Key Store. The Java SDK specifies a Key Store as a persistent413 container of two types of objects: Key Entries and Trusted414 Certificates. The security tool `keytool' is a Java-based application415 for managing those types of objects.416 417 A Key Entry represents the private key part of a key-pair used in418 Public-Key Cryptography, and a signed X.509 certificate which419 authenticates the public key part for a known entity; i.e. the owner of420 the key-pair. The X.509 certificate itself contains the public key part421 of the key-pair.422 423 A Trusted Certificate is a signed X.509 certificate issued by a424 trusted entity. The Trust in this context is relative to the User of425 the `keytool'. In other words, the existence of a Trusted Certificate426 in the Key Store processed by a `keytool' command implies that the User427 trusts the Issuer of that Trusted Certificate to also sign, and hence428 authenticates, other Subjects the tool may process.429 430 Trusted Certificates are important because they allow the tool to431 mechanically construct Chains of Trust starting from one of the Trusted432 Certificates in a Key Store and ending with a certificate whose Issuer433 is potentially unknown. A valid chain is an ordered list, starting with434 a Trusted Certificate (also called the anchor), ending with the target435 certificate, and satisfying the condition that the Subject of436 certificate `#i' is the Issuer of certificate `#i + 1'.437 438 The `keytool' is invoked from the command line as follows:439 440 keytool [COMMAND] ...441 442 Multiple COMMANDs may be specified at once, each complete with its443 own options. `keytool' will parse all the arguments, before processing,444 and executing, each `COMMAND'. If an exception occurs while executing445 one COMMAND `keytool' will abort. Note however that because the446 implementation of the tool uses code to parse command line options that447 also supports GNU-style options, you have to separate each command448 group with a double-hyphen; e.g449 450 keytool -list -- -printcert -alias mykey451 452 Here is a summary of the commands supported by the tool:453 454 1. Add/Update commands455 `-genkey [OPTION]...'456 Generate a new Key Entry, eventually creating a new key store.457 458 `-import [OPTION]...'459 Add, to a key store, Key Entries (private keys and460 certificate chains authenticating the public keys) and461 Trusted Certificates (3rd party certificates which can be462 used as Trust Anchors when building chains-of-trust).463 464 `-selfcert [OPTION]...'465 Generate a new self-signed Trusted Certificate.466 467 `-cacert [OPTION]...'468 Import a CA Trusted Certificate.469 470 `-identitydb [OPTION]...'471 NOT IMPLEMENTED YET.472 Import a JDK 1.1 style Identity Database.473 474 2. Export commands475 `-certreq [OPTION]...'476 Issue a Certificate Signing Request (CSR) which can be then477 sent to a Certification Authority (CA) to issue a certificate478 signed (by the CA) and authenticating the Subject of the479 request.480 481 `-export [OPTION]...'482 Export a certificate from a key store.483 484 3. Display commands485 `-list [OPTION]...'486 Print one or all certificates in a key store to `STDOUT'.487 488 `-printcert [OPTION]...'489 Print a human-readable form of a certificate, in a designated490 file, to `STDOUT'.491 492 4. Management commands493 `-keyclone [OPTION]...'494 Clone a Key Entry in a key store.495 496 `-storepasswd [OPTION]...'497 Change the password protecting a key store.498 499 `-keypasswd [OPTION]...'500 Change the password protecting a Key Entry in a key store.501 502 `-delete [OPTION]...'503 Delete a Key Entry or a Trusted Certificate from a key store.504 505 * Menu:506 507 * Getting Help:: How to get help with keytool commands508 * Common keytool Options:: Options used in more than one command509 * Distinguished Names:: X.500 Distinguished Names used in certificates510 * Add/Update Commands:: Commands for adding data to a Key Store511 * Export Commands:: Commands for exporting data from a Key Store512 * Display Commands:: Commands for displaying data in a Key Store513 * Management Commands:: Commands for managing a Key Store514 515 516 File: cp-tools.info, Node: Getting Help, Next: Common keytool Options, Prev: keytool Tool, Up: keytool Tool517 518 2.2.1 Getting help519 ------------------520 521 To get a general help text about the tool, use the `-help' option; e.g.522 523 `keytool -help'524 525 To get more specific help text about one of the tool's command use526 the `-help' option for that command; e.g.527 528 `keytool -genkey -help'529 530 In both instances, the tool will print a help text and then will531 exit the running JVM.532 533 It is worth noting here that the help messages printed by the tool534 are I18N-ready. This means that if/when the contents of the tool's535 Message Bundle properties file are available in languages other than536 English, you may see those messages in that language.537 538 539 File: cp-tools.info, Node: Common keytool Options, Next: Distinguished Names, Prev: Getting Help, Up: keytool Tool540 541 2.2.2 Common options542 --------------------543 544 The following `OPTION's are used in more than one `COMMAND'. They are545 described here to reduce redundancy.546 547 `-alias ALIAS'548 Every entry, be it a Key Entry or a Trusted Certificate, in a key549 store is uniquely identified by a user-defined ALIAS string. Use550 this option to specify the ALIAS to use when referring to an entry551 in the key store. Unless specified otherwise, a default value of552 `mykey' shall be used when this option is omitted from the command553 line.554 555 `-keyalg ALGORITHM'556 Use this option to specify the canonical name of the key-pair557 generation algorithm. The default value for this option is `DSS'558 (a synonym for the Digital Signature Algorithm also known as DSA).559 560 `-keysize SIZE'561 Use this option to specify the number of bits of the shared562 modulus (for both the public and private keys) to use when563 generating new keys. A default value of `1024' will be used if564 this option is omitted from the command line.565 566 `-validity DAY_COUNT'567 Use this option to specify the number of days a newly generated568 certificate will be valid for. The default value is `90' (days) if569 this option is omitted from the command line.570 571 `-storetype STORE_TYPE'572 Use this option to specify the type of the key store to use. The573 default value, if this option is omitted, is that of the property574 `keystore.type' in the security properties file, which is obtained575 by invoking the static method call `getDefaultType()' in576 `java.security.KeyStore'.577 578 `-storepass PASSWORD'579 Use this option to specify the password protecting the key store.580 If this option is omitted from the command line, you will be581 prompted to provide a password.582 583 `-keystore URL'584 Use this option to specify the location of the key store to use.585 The default value is a file URL referencing the file named586 `.keystore' located in the path returned by the call to587 `java.lang.System#getProperty(String)' using `user.home' as588 argument.589 590 If a URL was specified, but was found to be malformed -e.g.591 missing protocol element- the tool will attempt to use the URL592 value as a file-name (with absolute or relative path-name) of a593 key store -as if the protocol was `file:'.594 595 `-provider PROVIDER_CLASS_NAME'596 A fully qualified class name of a Security Provider to add to the597 current list of Security Providers already installed in the JVM598 in-use. If a provider class is specified with this option, and was599 successfully added to the runtime -i.e. it was not already600 installed- then the tool will attempt to removed this Security601 Provider before exiting.602 603 `-file FILE'604 Use this option to designate a file to use with a command. When605 specified with this option, the value is expected to be the fully606 qualified path of a file accessible by the File System. Depending607 on the command, the file may be used as input or as output. When608 this option is omitted from the command line, `STDIN' will be used609 instead, as the source of input, and `STDOUT' will be used instead610 as the output destination.611 612 `-v'613 Unless specified otherwise, use this option to enable more verbose614 output.615 616 617 618 File: cp-tools.info, Node: Distinguished Names, Next: Add/Update Commands, Prev: Common keytool Options, Up: keytool Tool619 620 2.2.3 X.500 Distinguished Names621 -------------------------------622 623 A Distinguished Name (or DN) MUST be supplied with some of the624 `COMMAND's using a `-dname' option. The syntax of a valid value for625 this option MUST follow RFC-2253 specifications. Namely the following626 components (with their accepted meaning) will be recognized. Note that627 the component name is case-insensitive:628 629 CN630 The Common Name; e.g. `host.domain.com'631 632 OU633 The Organizational Unit; e.g. `IT Department'634 635 O636 The Organization Name; e.g. `The Sample Company'637 638 L639 The Locality Name; e.g. `Sydney'640 641 ST642 The State Name; e.g. `New South Wales'643 644 C645 The 2-letter Country identifier; e.g. `AU'646 647 When specified with a `-dname' option, each pair of component/value648 will be separated from the other with a comma. Each component and value649 pair MUST be separated by an equal sign. For example, the following is650 a valid DN value:651 CN=host.domain.com, O=The Sample Company, L=Sydney, ST=NSW, C=AU652 653 If the Distinguished Name is required, and no valid default value can654 be used, the tool will prompt you to enter the information through the655 console.656 657 658 File: cp-tools.info, Node: Add/Update Commands, Next: Export Commands, Prev: Distinguished Names, Up: keytool Tool659 660 2.2.4 Add/Update commands661 -------------------------662 663 * Menu:664 665 * Command -genkey:: Generate private key and self-signed certificate666 * Command -import:: Import certificates and certificate replies667 * Command -selfcert:: Generate self-signed certificate668 * Command -cacert:: Import a CA Trusted Certificate669 * Command -identitydb:: Import JDK-1 style identities670 671 672 File: cp-tools.info, Node: Command -genkey, Next: Command -import, Prev: Add/Update Commands, Up: Add/Update Commands673 674 2.2.4.1 The `-genkey' command675 .............................676 677 Use this command to generate a new key-pair (both private and public678 keys), and save these credentials in the key store as a Key Entry,679 associated with the designated (if was specified with the `-alias'680 option) or default (if the `-alias' option is omitted) Alias.681 682 The private key material will be protected with a user-defined683 password (see `-keypass' option). The public key on the other hand will684 be part of a self-signed X.509 certificate, which will form a 1-element685 chain and will be saved in the key store.686 687 `-alias ALIAS'688 For more details *note ALIAS: alias.689 690 `-keyalg ALGORITHM'691 For more details *note ALGORITHM: keyalg.692 693 `-keysize KEY_SIZE'694 For more details *note KEY_SIZE: keysize.695 696 `-sigalg ALGORITHM'697 The canonical name of the digital signature algorithm to use for698 signing certificates. If this option is omitted, a default value699 will be chosen based on the type of the key-pair; i.e. the700 algorithm that ends up being used by the -keyalg option. If the701 key-pair generation algorithm is `DSA', the value for the702 signature algorithm will be `SHA1withDSA'. If on the other hand703 the key-pair generation algorithm is `RSA', then the tool will use704 `MD5withRSA' as the signature algorithm.705 706 `-dname NAME'707 This a mandatory value for the command. If no value is specified708 -i.e. the `-dname' option is omitted- the tool will prompt you to709 enter a Distinguished Name to use as both the Owner and Issuer of710 the generated self-signed certificate.711 712 For more details *note X.500 DISTINGUISHED NAME: dn.713 714 `-keypass PASSWORD'715 Use this option to specify the password which the tool will use to716 protect the newly created Key Entry.717 718 If this option is omitted, you will be prompted to provide a719 password.720 721 `-validity DAY_COUNT'722 For more details *note DAY_COUNT: validity.723 724 `-storetype STORE_TYPE'725 For more details *note STORE_TYPE: storetype.726 727 `-keystore URL'728 For more details *note URL: keystore.729 730 `-storepass PASSWORD'731 For more details *note PASSWORD: storepass.732 733 `-provider PROVIDER_CLASS_NAME'734 For more details *note PROVIDER_CLASS_NAME: provider.735 736 `-v'737 For more details *note verbose::.738 739 740 741 File: cp-tools.info, Node: Command -import, Next: Command -selfcert, Prev: Command -genkey, Up: Add/Update Commands742 743 2.2.4.2 The `-import' command744 .............................745 746 Use this command to read an X.509 certificate, or a PKCS#7 Certificate747 Reply from a designated input source and incorporate the certificates748 into the key store.749 750 If the Alias does not already exist in the key store, the tool751 treats the certificate read from the input source as a new Trusted752 Certificate. It then attempts to discover a chain-of-trust, starting753 from that certificate and ending at another Trusted Certificate,754 already stored in the key store. If the `-trustcacerts' option is755 present, an additional key store, of type `JKS' named `cacerts', and756 assumed to be present in `${JAVA_HOME}/lib/security' will also be757 consulted if found -`${JAVA_HOME}' refers to the location of an758 installed Java Runtime Environment (JRE). If no chain-of-trust can be759 established, and unless the `-noprompt' option has been specified, the760 certificate is printed to `STDOUT' and the user is prompted for a761 confirmation.762 763 If Alias exists in the key store, the tool will treat the764 certificate(s) read from the input source as a Certificate Reply, which765 can be a chain of certificates, that eventually would replace the chain766 of certificates associated with the Key Entry of that Alias. The767 substitution of the certificates only occurs if a chain-of-trust can be768 established between the bottom certificate of the chain read from the769 input file and the Trusted Certificates already present in the key770 store. Again, if the `-trustcacerts' option is specified, additional771 Trusted Certificates in the same `cacerts' key store will be772 considered. If no chain-of-trust can be established, the operation will773 abort.774 775 `-alias ALIAS'776 For more details *note ALIAS: alias.777 778 `-file FILE'779 For more details *note FILE: file.780 781 `-keypass PASSWORD'782 Use this option to specify the password which the tool will use to783 protect the Key Entry associated with the designated Alias, when784 replacing this Alias' chain of certificates with that found in the785 certificate reply.786 787 If this option is omitted, and the chain-of-trust for the788 certificate reply has been established, the tool will first789 attempt to unlock the Key Entry using the same password protecting790 the key store. If this fails, you will then be prompted to provide791 a password.792 793 `-noprompt'794 Use this option to prevent the tool from prompting the user.795 796 `-trustcacerts'797 Use this option to indicate to the tool that a key store, of type798 `JKS', named `cacerts', and usually located in `lib/security' in799 an installed Java Runtime Environment should be considered when800 trying to establish chain-of-trusts.801 802 `-storetype STORE_TYPE'803 For more details *note STORE_TYPE: storetype.804 805 `-keystore URL'806 For more details *note URL: keystore.807 808 `-storepass PASSWORD'809 For more details *note PASSWORD: storepass.810 811 `-provider PROVIDER_CLASS_NAME'812 For more details *note PROVIDER_CLASS_NAME: provider.813 814 `-v'815 For more details *note verbose::.816 817 818 819 File: cp-tools.info, Node: Command -selfcert, Next: Command -cacert, Prev: Command -import, Up: Add/Update Commands820 821 2.2.4.3 The `-selfcert' command822 ...............................823 824 Use this command to generate a self-signed X.509 version 1 certificate.825 The newly generated certificate will form a chain of one element which826 will replace the previous chain associated with the designated Alias827 (if `-alias' option was specified), or the default Alias (if `-alias'828 option was omitted).829 830 `-alias ALIAS'831 For more details *note ALIAS: alias.832 833 `-sigalg ALGORITHM'834 The canonical name of the digital signature algorithm to use for835 signing the certificate. If this option is omitted, a default836 value will be chosen based on the type of the private key837 associated with the designated Alias. If the private key is a838 `DSA' one, the value for the signature algorithm will be839 `SHA1withDSA'. If on the other hand the private key is an `RSA'840 one, then the tool will use `MD5withRSA' as the signature841 algorithm.842 843 `-dname NAME'844 Use this option to specify the Distinguished Name of the newly845 generated self-signed certificate. If this option is omitted, the846 existing Distinguished Name of the base certificate in the chain847 associated with the designated Alias will be used instead.848 849 For more details *note X.500 DISTINGUISHED NAME: dn.850 851 `-validity DAY_COUNT'852 For more details *note DAY_COUNT: validity.853 854 `-keypass PASSWORD'855 Use this option to specify the password which the tool will use to856 unlock the Key Entry associated with the designated Alias.857 858 If this option is omitted, the tool will first attempt to unlock859 the Key Entry using the same password protecting the key store. If860 this fails, you will then be prompted to provide a password.861 862 `-storetype STORE_TYPE'863 For more details *note STORE_TYPE: storetype.864 865 `-keystore URL'866 For more details *note URL: keystore.867 868 `-storepass PASSWORD'869 For more details *note PASSWORD: storepass.870 871 `-provider PROVIDER_CLASS_NAME'872 For more details *note PROVIDER_CLASS_NAME: provider.873 874 `-v'875 For more details *note verbose::.876 877 878 879 File: cp-tools.info, Node: Command -cacert, Next: Command -identitydb, Prev: Command -selfcert, Up: Add/Update Commands880 881 2.2.4.4 The `-cacert' command882 .............................883 884 Use this command to import, a CA certificate and add it to the key885 store as a Trusted Certificate. The Alias for this new entry will be886 constructed from the FILE's base-name after replacing hyphens and dots887 with underscores.888 889 This command is useful when used in a script that recursively visits890 a directory of CA certificates to populate a `cacerts.gkr' Key Store of891 trusted certificates which can then be used commands that specify the892 `-trustcacerts' option.893 894 `-file FILE'895 For more details *note FILE: file.896 897 `-storetype STORE_TYPE'898 For more details *note STORE_TYPE: storetype.899 900 `-keystore URL'901 For more details *note URL: keystore.902 903 `-storepass PASSWORD'904 For more details *note PASSWORD: storepass.905 906 `-provider PROVIDER_CLASS_NAME'907 For more details *note PROVIDER_CLASS_NAME: provider.908 909 `-v'910 For more details *note verbose::.911 912 913 914 File: cp-tools.info, Node: Command -identitydb, Prev: Command -cacert, Up: Add/Update Commands915 916 2.2.4.5 The `-identitydb' command917 .................................918 919 NOT IMPLEMENTED YET.920 921 Use this command to import a JDK 1.1 style Identity Database.922 923 `-file FILE'924 For more details *note FILE: file.925 926 `-storetype STORE_TYPE'927 For more details *note STORE_TYPE: storetype.928 929 `-keystore URL'930 For more details *note URL: keystore.931 932 `-storepass PASSWORD'933 For more details *note PASSWORD: storepass.934 935 `-provider PROVIDER_CLASS_NAME'936 For more details *note PROVIDER_CLASS_NAME: provider.937 938 `-v'939 For more details *note verbose::.940 941 942 943 File: cp-tools.info, Node: Export Commands, Next: Display Commands, Prev: Add/Update Commands, Up: keytool Tool944 945 2.2.5 Export commands946 ---------------------947 948 * Menu:949 950 * Command -certreq:: Generate Certificate Signing Requests (CSR)951 * Command -export:: Export a certificate in a Key Store952 953 954 File: cp-tools.info, Node: Command -certreq, Next: Command -export, Prev: Export Commands, Up: Export Commands955 956 2.2.5.1 The `-certreq' command957 ..............................958 959 Use this command to generate a PKCS#10 Certificate Signing Request960 (CSR) and write it to a designated output destination. The contents of961 the destination should look something like the following:962 963 -----BEGIN NEW CERTIFICATE REQUEST-----964 MI...QAwXzEUMBIGA1UEAwwLcnNuQGdudS5vcmcxGzAZBgNVBAoMElUg965 Q2...A0GA1UEBwwGU3lkbmV5MQwwCgYDVQQIDANOU1cxCzAJBgNVBACC966 ...967 FC...IVwNVOfQLRX+O5kAhQ/a4RTZme2L8PnpvgRwrf7Eg8D6w==968 -----END NEW CERTIFICATE REQUEST-----969 970 IMPORTANT: Some documentation (e.g. RSA examples) claims that the971 `Attributes' field, in the CSR is `OPTIONAL' while RFC-2986 implies the972 opposite. This implementation considers this field, by default, as973 `OPTIONAL', unless the option `-attributes' is specified on the command974 line.975 976 `-alias ALIAS'977 For more details *note ALIAS: alias.978 979 `-sigalg ALGORITHM'980 The canonical name of the digital signature algorithm to use for981 signing the certificate. If this option is omitted, a default982 value will be chosen based on the type of the private key983 associated with the designated Alias. If the private key is a984 `DSA' one, the value for the signature algorithm will be985 `SHA1withDSA'. If on the other hand the private key is an `RSA'986 one, then the tool will use `MD5withRSA' as the signature987 algorithm.988 989 `-file FILE'990 For more details *note FILE: file.991 992 `-keypass PASSWORD'993 Use this option to specify the password which the tool will use to994 unlock the Key Entry associated with the designated Alias.995 996 If this option is omitted, the tool will first attempt to unlock997 the Key Entry using the same password protecting the key store. If998 this fails, you will then be prompted to provide a password.999 1000 `-storetype STORE_TYPE'1001 For more details *note STORE_TYPE: storetype.1002 1003 `-keystore URL'1004 For more details *note URL: keystore.1005 1006 `-storepass PASSWORD'1007 For more details *note PASSWORD: storepass.1008 1009 `-provider PROVIDER_CLASS_NAME'1010 For more details *note PROVIDER_CLASS_NAME: provider.1011 1012 `-v'1013 For more details *note verbose::.1014 1015 `-attributes'1016 Use this option to force the tool to encode a `NULL' DER value in1017 the CSR as the value of the `Attributes' field.1018 1019 1020 1021 File: cp-tools.info, Node: Command -export, Prev: Command -certreq, Up: Export Commands1022 1023 2.2.5.2 The `-export' command1024 .............................1025 1026 Use this command to export a certificate stored in a key store to a1027 designated output destination, either in binary format (if the `-v'1028 option is specified), or in RFC-1421 compliant encoding (if the `-rfc'1029 option is specified instead).1030 1031 `-alias ALIAS'1032 For more details *note ALIAS: alias.1033 1034 `-file FILE'1035 For more details *note FILE: file.1036 1037 `-storetype STORE_TYPE'1038 For more details *note STORE_TYPE: storetype.1039 1040 `-keystore URL'1041 For more details *note URL: keystore.1042 1043 `-storepass PASSWORD'1044 For more details *note PASSWORD: storepass.1045 1046 `-provider PROVIDER_CLASS_NAME'1047 For more details *note PROVIDER_CLASS_NAME: provider.1048 1049 `-rfc'1050 Use RFC-1421 specifications when encoding the output.1051 1052 `-v'1053 Output the certificate in binary DER encoding. This is the default1054 output format of the command if neither `-rfc' nor `-v' options1055 were detected on the command line. If both this option and the1056 `-rfc' option are detected on the command line, the tool will opt1057 for the RFC-1421 style encoding.1058 1059 1060 1061 File: cp-tools.info, Node: Display Commands, Next: Management Commands, Prev: Export Commands, Up: keytool Tool1062 1063 2.2.6 Display commands1064 ----------------------1065 1066 * Menu:1067 1068 * Command -list:: Display information about one or all Aliases1069 * Command -printcert:: Print a certificate or a certificate fingerprint1070 1071 1072 File: cp-tools.info, Node: Command -list, Next: Command -printcert, Prev: Display Commands, Up: Display Commands1073 1074 2.2.6.1 The `-list' command1075 ...........................1076 1077 Use this command to print one or all of a key store entries to1078 `STDOUT'. Usually this command will only print a fingerprint of the1079 certificate, unless either the `-rfc' or the `-v' option is specified.1080 1081 `-alias ALIAS'1082 If this option is omitted, the tool will print ALL the entries1083 found in the key store.1084 1085 For more details *note ALIAS: alias.1086 1087 `-storetype STORE_TYPE'1088 For more details *note STORE_TYPE: storetype.1089 1090 `-keystore URL'1091 For more details *note URL: keystore.1092 1093 `-storepass PASSWORD'1094 For more details *note PASSWORD: storepass.1095 1096 `-provider PROVIDER_CLASS_NAME'1097 For more details *note PROVIDER_CLASS_NAME: provider.1098 1099 `-rfc'1100 Use RFC-1421 specifications when encoding the output.1101 1102 `-v'1103 Output the certificate in human-readable format. If both this1104 option and the `-rfc' option are detected on the command line, the1105 tool will opt for the human-readable form and will not abort the1106 command.1107 1108 1109 1110 File: cp-tools.info, Node: Command -printcert, Prev: Command -list, Up: Display Commands1111 1112 2.2.6.2 The `-printcert' command1113 ................................1114 1115 Use this command to read a certificate from a designated input source1116 and print it to `STDOUT' in a human-readable form.1117 1118 `-file FILE'1119 For more details *note FILE: file.1120 1121 `-v'1122 For more details *note verbose::.1123 1124 1125 1126 File: cp-tools.info, Node: Management Commands, Prev: Display Commands, Up: keytool Tool1127 1128 2.2.7 Management commands1129 -------------------------1130 1131 * Menu:1132 1133 * Command -keyclone:: Clone a Key Entry in a Key Store1134 * Command -storepasswd:: Change the password protecting a Key Store1135 * Command -keypasswd:: Change the password protecting a Key Entry1136 * Command -delete:: Remove an entry in a Key Store1137 1138 1139 File: cp-tools.info, Node: Command -keyclone, Next: Command -storepasswd, Prev: Management Commands, Up: Management Commands1140 1141 2.2.7.1 The `-keyclone' command1142 ...............................1143 1144 Use this command to clone an existing Key Entry and store it under a1145 new (different) Alias protecting, its private key material with1146 possibly a new password.1147 1148 `-alias ALIAS'1149 For more details *note ALIAS: alias.1150 1151 `-dest ALIAS'1152 Use this option to specify the new Alias which will be used to1153 identify the cloned copy of the Key Entry.1154 1155 `-keypass PASSWORD'1156 Use this option to specify the password which the tool will use to1157 unlock the Key Entry associated with the designated Alias.1158 1159 If this option is omitted, the tool will first attempt to unlock1160 the Key Entry using the same password protecting the key store. If1161 this fails, you will then be prompted to provide a password.1162 1163 `-new PASSWORD'1164 Use this option to specify the password protecting the private key1165 material of the newly cloned copy of the Key Entry.1166 1167 `-storetype STORE_TYPE'1168 For more details *note STORE_TYPE: storetype.1169 1170 `-keystore URL'1171 For more details *note URL: keystore.1172 1173 `-storepass PASSWORD'1174 For more details *note PASSWORD: storepass.1175 1176 `-provider PROVIDER_CLASS_NAME'1177 For more details *note PROVIDER_CLASS_NAME: provider.1178 1179 `-v'1180 For more details *note verbose::.1181 1182 1183 1184 File: cp-tools.info, Node: Command -storepasswd, Next: Command -keypasswd, Prev: Command -keyclone, Up: Management Commands1185 1186 2.2.7.2 The `-storepasswd' command1187 ..................................1188 1189 Use this command to change the password protecting a key store.1190 1191 `-new PASSWORD'1192 The new, and different, password which will be used to protect the1193 designated key store.1194 1195 `-storetype STORE_TYPE'1196 For more details *note STORE_TYPE: storetype.1197 1198 `-keystore URL'1199 For more details *note URL: keystore.1200 1201 `-storepass PASSWORD'1202 For more details *note PASSWORD: storepass.1203 1204 `-provider PROVIDER_CLASS_NAME'1205 For more details *note PROVIDER_CLASS_NAME: provider.1206 1207 `-v'1208 For more details *note verbose::.1209 1210 1211 1212 File: cp-tools.info, Node: Command -keypasswd, Next: Command -delete, Prev: Command -storepasswd, Up: Management Commands1213 1214 2.2.7.3 The `-keypasswd' command1215 ................................1216 1217 Use this command to change the password protecting the private key1218 material of a designated Key Entry.1219 1220 `-alias ALIAS'1221 For more details *note ALIAS: alias.1222 1223 Use this option to specify the password which the tool will use to1224 unlock the Key Entry associated with the designated Alias.1225 1226 If this option is omitted, the tool will first attempt to unlock1227 the Key Entry using the same password protecting the key store. If1228 this fails, you will then be prompted to provide a password.1229 1230 `-new PASSWORD'1231 The new, and different, password which will be used to protect the1232 private key material of the designated Key Entry.1233 1234 `-storetype STORE_TYPE'1235 For more details *note STORE_TYPE: storetype.1236 1237 `-keystore URL'1238 For more details *note URL: keystore.1239 1240 `-storepass PASSWORD'1241 For more details *note PASSWORD: storepass.1242 1243 `-provider PROVIDER_CLASS_NAME'1244 For more details *note PROVIDER_CLASS_NAME: provider.1245 1246 `-v'1247 For more details *note verbose::.1248 1249 1250 1251 File: cp-tools.info, Node: Command -delete, Prev: Command -keypasswd, Up: Management Commands1252 1253 2.2.7.4 The `-delete' command1254 .............................1255 1256 Use this command to delete a designated key store entry.1257 1258 `-alias ALIAS'1259 For more details *note ALIAS: alias.1260 1261 `-storetype STORE_TYPE'1262 For more details *note STORE_TYPE: storetype.1263 1264 `-keystore URL'1265 For more details *note URL: keystore.1266 1267 `-storepass PASSWORD'1268 For more details *note PASSWORD: storepass.1269 1270 `-provider PROVIDER_CLASS_NAME'1271 For more details *note PROVIDER_CLASS_NAME: provider.1272 1273 `-v'1274 For more details *note verbose::.1275 1276 1277 1278 File: cp-tools.info, Node: Other Tools, Next: I18N Issues, Prev: Security Tools, Up: Top1279 1280 3 Other Tools1281 *************1282 1283 This is a list of currently undocumented classpath tools: jar, javah,1284 gcjh, native2ascii, orbd, serialver, rmid, rmiregistry and tnameserv.1285 1286 * Menu:1287 1288 * jar Tool:: Archive tool for Java archives1289 * javah Tool:: A java header compiler1290 * gcjh Tool:: A java header compiler (old version)1291 * native2ascii Tool:: An encoding converter1292 * orbd Tool:: An object request broker daemon1293 * serialver Tool:: A serial version command1294 * rmid Tool:: RMI activation daemon1295 * rmiregistry Tool:: Remote object registry1296 * tnameserv Tool:: Naming service1297 1298 1299 File: cp-tools.info, Node: jar Tool, Next: javah Tool, Up: Other Tools1300 1301 3.1 The `jar' Tool1302 ==================1303 1304 `gjar' is an implementation of Sun's jar utility that comes with the1305 JDK.1306 1307 If any file is a directory then it is processed recursively. The1308 manifest file name and the archive file name needs to be specified in1309 the same order the `-m' and `-f' flags are specified.1310 1311 Operation mode:1312 1313 `-c'1314 Create new archive.1315 1316 `-t'1317 List table of contents for archive.1318 1319 `-x'1320 Extract named (or all) files from archive.1321 1322 `-u'1323 Update existing archive.1324 1325 `-i FILE'1326 Compute archive index.1327 1328 Operation modifiers:1329 1330 `-f FILE'1331 Specify archive file name.1332 1333 `-0'1334 Store only; use no ZIP compression.1335 1336 `-v'1337 Generate verbose output on standard output.1338 1339 `-M'1340 Do not create a manifest file for the entries.1341 1342 `-m MANIFEST'1343 Include manifest information from specified MANIFEST file.1344 1345 File name selection:1346 1347 `-C DIR FILE'1348 Change to the DIR and include the following FILE.1349 1350 `-@'1351 Read the names of the files to add to the archive from stdin. This1352 option is supported only in combination with `-c' or `-u'. Non1353 standard option added in the GCC version.1354 1355 Standard options:1356 1357 `-help'1358 Print help text, then exit.1359 1360 `-version'1361 Print version number, then exit.1362 1363 `-JOPTION'1364 Pass argument to the Java runtime.1365 1366 java(1), ...1367 1368 1369 File: cp-tools.info, Node: javah Tool, Next: gcjh Tool, Prev: jar Tool, Up: Other Tools1370 1371 3.2 The `javah' Tool1372 ====================1373 1374 The `gjavah' program is used to generate header files from class files.1375 It can generate both CNI and JNI header files, as well as stub1376 implementation files which can be used as a basis for implementing the1377 required native methods.1378 1379 `-d DIR'1380 Set output directory.1381 1382 `-o FILE'1383 Set output file (only one of `-d' or `-o' may be used).1384 1385 `-cmdfile FILE'1386 Read command file.1387 1388 `-all DIR'1389 Operate on all class files under directory DIR.1390 1391 `-stubs'1392 Emit stub implementation.1393 1394 `-jni'1395 Emit JNI stubs or header (default).1396 1397 `-cni'1398 Emit CNI stubs or header (default JNI).1399 1400 `-verbose'1401 Set verbose mode.1402 1403 `-force'1404 Output files should always be written.1405 1406 Class path options:1407 `-classpath PATH'1408 Set the class path.1409 1410 `-IDIR'1411 Add directory to class path.1412 1413 `-bootclasspath PATH'1414 Set the boot class path.1415 1416 `-extdirs PATH'1417 Set the extension directory path.1418 1419 Standard options:1420 `-help'1421 Print help text, then exit.1422 1423 `-version'1424 Print version number, then exit.1425 1426 `-JOPTION'1427 Pass argument to the Java runtime.1428 1429 javac(1), ...1430 1431 1432 File: cp-tools.info, Node: gcjh Tool, Next: native2ascii Tool, Prev: javah Tool, Up: Other Tools1433 1434 3.3 The `gcjh' Tool1435 ===================1436 1437 The `gcjh' program is used to generate header files from class files.1438 It can generate both CNI and JNI header files, as well as stub1439 implementation files which can be used as a basis for implementing the1440 required native methods. It is similar to `javah' but has slightly1441 different command line options, and defaults to CNI.1442 1443 See `javah' for a full description; this page only lists the1444 additional options provided by `gcjh'.1445 1446 CNI text options1447 `-add TEXT'1448 Insert TEXT into class body.1449 1450 `-append TEXT'1451 Append TEXT after class declaration.1452 1453 `-friend TEXT'1454 Insert TEXT as a `friend' declaration.1455 1456 `-prepend TEXT'1457 Insert TEXT before start of class.1458 1459 Compatibility options (unused)1460 `-td DIR'1461 `-M'1462 `-MM'1463 `-MD'1464 `-MMD'1465 Unused compatibility option.1466 1467 Standard options:1468 `-help'1469 Print help text, then exit.1470 1471 `-version'1472 Print version number, then exit.1473 1474 `-JOPTION'1475 Pass argument to the Java runtime.1476 1477 javac(1), javah(1), ...1478 1479 1480 File: cp-tools.info, Node: native2ascii Tool, Next: orbd Tool, Prev: gcjh Tool, Up: Other Tools1481 1482 3.4 The `native2ascii' Tool1483 ===========================1484 1485 To be written ...1486 1487 `-encoding NAME'1488 Set the encoding to use.1489 1490 `-reversed'1491 Convert from encoding to native.1492 1493 Standard options:1494 `-help'1495 Print help text, then exit.1496 1497 `-version'1498 Print version number, then exit.1499 1500 `-JOPTION'1501 Pass argument to the Java runtime.1502 1503 javac(1), ...1504 1505 1506 File: cp-tools.info, Node: orbd Tool, Next: serialver Tool, Prev: native2ascii Tool, Up: Other Tools1507 1508 3.5 The `orbd' object request broker daemon1509 ===========================================1510 1511 To be written ...1512 1513 `-ORBInitialPort PORT'1514 Port on which persistent naming service is to be started.1515 1516 `-ior FILE'1517 File in which to store persistent naming service's IOR reference1518 1519 `-directory DIR'1520 Directory in which to store persistent data.1521 1522 `-restart'1523 Restart persistent naming service, clearing persistent naming1524 database.1525 1526 Standard options:1527 `-help'1528 Print help text, then exit.1529 1530 `-version'1531 Print version number, then exit.1532 1533 `-JOPTION'1534 Pass argument to the Java runtime.1535 1536 java(1), ...1537 1538 1539 File: cp-tools.info, Node: serialver Tool, Next: rmid Tool, Prev: orbd Tool, Up: Other Tools1540 1541 3.6 The `serialver' version command1542 ===================================1543 1544 Print the serialVersionUID of the specified classes.1545 1546 `-classpath PATH'1547 Class path to use to find classes.1548 1549 Standard options:1550 `-help'1551 Print help text, then exit.1552 1553 `-version'1554 Print version number, then exit.1555 1556 `-JOPTION'1557 Pass argument to the Java runtime.1558 1559 javac(1), ...1560 1561 1562 File: cp-tools.info, Node: rmid Tool, Next: rmiregistry Tool, Prev: serialver Tool, Up: Other Tools1563 1564 3.7 The `rmid' RMI activation system daemon1565 ===========================================1566 1567 `rmiregistry' starts a remote object registry on the current host. If1568 no port number is specified, then port 1099 is used.1569 1570 Activation process control:1571 `-port PORT'1572 Port on which activation system is to be started.1573 1574 `-restart'1575 Restart activation system, clearing persistent naming database, if1576 any.1577 1578 `-stop'1579 Stop activation system.1580 1581 Persistence:1582 `-persistent'1583 Make activation system persistent.1584 1585 `-directory DIR'1586 Directory in which to store persistent data.1587 1588 Debugging:1589 `-verbose'1590 Log binding events to standard out.1591 1592 Standard options:1593 `-help'1594 Print help text, then exit.1595 1596 `-version'1597 Print version number, then exit.1598 1599 `-JOPTION'1600 Pass argument to the Java runtime.1601 1602 java(1), ...1603 1604 1605 File: cp-tools.info, Node: rmiregistry Tool, Next: tnameserv Tool, Prev: rmid Tool, Up: Other Tools1606 1607 3.8 The `rmiregistry' Tool1608 ==========================1609 1610 `grmiregistry' starts a remote object registry on the current host. If1611 no port number is specified, then port 1099 is used.1612 1613 Registry process control:1614 `-restart'1615 Restart RMI naming service, clearing persistent naming database, if1616 any.1617 1618 `-stop'1619 Stop RMI naming service.1620 1621 Persistence:1622 `-persistent'1623 Make RMI naming service persistent.1624 1625 `-directory DIR'1626 Directory in which to store persistent data.1627 1628 Debugging:1629 `-verbose'1630 Log binding events to standard out.1631 1632 Standard options:1633 `-help'1634 Print help text, then exit.1635 1636 `-version'1637 Print version number, then exit.1638 1639 `-JOPTION'1640 Pass argument to the Java runtime.1641 1642 java(1), ...1643 1644 1645 File: cp-tools.info, Node: tnameserv Tool, Prev: rmiregistry Tool, Up: Other Tools1646 1647 3.9 The `tnameserv' Tool1648 ========================1649 1650 To be written ...1651 1652 `-ORBInitialPort PORT'1653 Port on which naming service is to be started.1654 1655 `-ior FILE'1656 File in which to store naming service's IOR reference.1657 1658 Standard options:1659 `-help'1660 Print help text, then exit.1661 1662 `-version'1663 Print version number, then exit.1664 1665 `-JOPTION'1666 Pass argument to the Java runtime.1667 1668 java(1), ...1669 1670 1671 File: cp-tools.info, Node: I18N Issues, Prev: Other Tools, Up: Top1672 1673 4 I18N Issues1674 *************1675 1676 Some tools -*note Security Tools::- allow using other than the English1677 language when prompting the User for input, and outputing messages.1678 This chapter describes the elements used to offer this support and how1679 they can be adapted for use with specific languages.1680 1681 * Menu:1682 1683 * Language Resources:: Where resources are located1684 * Message Formats:: How messages are internationalized1685 1686 1687 File: cp-tools.info, Node: Language Resources, Next: Message Formats, Prev: I18N Issues, Up: I18N Issues1688 1689 4.1 Language-specific resources1690 ===============================1691 1692 The Tools use Java `ResourceBundle's to store messages, and message1693 templates they use at runtime to generate the message text itself,1694 depending on the locale in use at the time.1695 1696 The Resource Bundles these tools use are essentially Java Properties1697 files consisting of a set of Name/Value pairs. The Name is the Propery1698 Name and the Value is a substitution string that is used when the code1699 references the associated Name. For example the following is a line in1700 a Resource Bundle used by the `keytool' Tool:1701 1702 Command.23=A correct key password MUST be provided1703 1704 When the tool needs to signal a mandatory but missing key password,1705 it would reference the property named `Command.23' and the message "`A1706 correct key password MUST be provided'" will be used instead. This1707 indirect referencing of "resources" permits replacing, as late as1708 possible, the English strings with strings in other languages, provided1709 of course Resource Bundles in those languages are provided.1710 1711 For the GNU Classpath Tools described in this Guide, the Resource1712 Bundles are files named `messages[_ll[_CC[_VV]]].properties' where:1713 1714 LL1715 Is the 2-letter code for the Language,1716 1717 CC1718 Is the 2-letter code for the Region, and1719 1720 VV1721 Is the 2-letter code for the Variant of the language.1722 1723 The complete list of language codes can be found at Code for the1724 representation of names of languages1725 (http://ftp.ics.uci.edu/pub/ietf/http/related/iso639.txt). A similar1726 list for the region codes can be found at ISO 3166 Codes (Countries)1727 (http://userpage.chemie.fu-berlin.de/diverse/doc/ISO_3166.html).1728 1729 The location of the Resource Bundles for the GNU Classpath Tools is1730 specific to each tool. The next table shows where these files are found1731 in a standard GNU Classpath distribution:1732 1733 `jarsigner'1734 `gnu/classpath/tools/jarsigner'1735 1736 `keytool'1737 `gnu/classpath/tools/keytool'1738 1739 The collection of Resource Bundles in a location act as an inverted1740 tree with a parent-child relationship. For example suppose in the1741 `gnu/classpath/tools/keytool' there are 3 message bundles named:1742 1743 1. `messages.properties'1744 1745 2. `messages_fr.properties'1746 1747 3. `messages_fr_FR.properties'1748 1749 In the above example, bundle #1 will act as the parent of bundle #2,1750 which in turn will act as the parent for bundle #3. This ordering is1751 used by the Java runtime to choose which file to load based on the set1752 Locale. For example if the Locale is `fr_CH', `messages_fr.properties'1753 will be used because (a) `messages_fr_CH.properties' does not exist,1754 but (b) `messages_fr.properties' is the parent for the required bundle,1755 and it exists. As another example, suppose the Locale was set to1756 `en_AU'; then the tool will end up using `messages.properties' because1757 (a) `messages_en_AU.properties' does not exist, (b)1758 `messages_en.properties' which is the parent for the required bundle1759 does not exist, but (c) `messages.properties' exists and is the root of1760 the hierarchy.1761 1762 You can see from the examples above that `messages.properties' is1763 the safety net that the Java runtime falls back to when failing to find1764 a specific bunlde and its parent(s). This file is always provided with1765 the Tool. In time, more localized versions will be included to cater1766 for other languages.1767 1768 In the meantime, if you are willing to contribute localized versions1769 of these resources, grab the `messages.properties' for a specific tool;1770 translate it; save it with the appropriate language and region suffix1771 and mail it to `classpath@gnu.org'.1772 1773 1774 File: cp-tools.info, Node: Message Formats, Prev: Language Resources, Up: I18N Issues1775 1776 4.2 Message formats1777 ===================1778 1779 If you open any of the `messages.properties' described in the previous1780 section, you may see properties that look like so:1781 1782 Command.67=Issuer: {0}1783 Command.68=Serial number: {0,number}1784 Command.69=Valid from: {0,date,full} - {0,time,full}1785 Command.70=\ \ \ \ \ until: {0,date,full} - {0,time,full}1786 1787 These are Message Formats used by the tools to customize a text1788 string that will then be used either as a prompt for User input or as1789 output.1790 1791 If you are translating a `messages.properties' be careful not to1792 alter text between curly braces.1793 1794 1795 1796 Tag Table:1797 Node: Top4451798 Node: Applet Tools38941799 Node: appletviewer Tool44671800 Node: gcjwebplugin75821801 Node: Security Tools78941802 Node: jarsigner Tool85471803 Node: Common jarsigner Options95941804 Node: Signing Options109091805 Node: Verification Options134911806 Node: keytool Tool140791807 Node: Getting Help185071808 Node: Common keytool Options192511809 Ref: alias195241810 Ref: keyalg199061811 Ref: keysize201361812 Ref: validity204011813 Ref: storetype206161814 Ref: storepass209471815 Ref: keystore211441816 Ref: provider216871817 Ref: file220941818 Ref: verbose225651819 Node: Distinguished Names226571820 Ref: dn228511821 Node: Add/Update Commands239141822 Node: Command -genkey244421823 Node: Command -import268501824 Node: Command -selfcert299941825 Node: Command -cacert321731826 Node: Command -identitydb332261827 Node: Export Commands338841828 Node: Command -certreq342001829 Node: Command -export366061830 Node: Display Commands378031831 Node: Command -list381351832 Node: Command -printcert392681833 Node: Management Commands396521834 Node: Command -keyclone400841835 Node: Command -storepasswd414871836 Node: Command -keypasswd422161837 Node: Command -delete434101838 Node: Other Tools440331839 Node: jar Tool448181840 Node: javah Tool462101841 Node: gcjh Tool474291842 Node: native2ascii Tool485421843 Node: orbd Tool490031844 Node: serialver Tool497331845 Node: rmid Tool502021846 Node: rmiregistry Tool511431847 Node: tnameserv Tool519831848 Node: I18N Issues524731849 Node: Language Resources529741850 Node: Message Formats566371851 1852 End Tag Table -
libjava/classpath/doc/gappletviewer.1
diff -Naur gcc-4.3.3.orig/libjava/classpath/doc/gappletviewer.1 gcc-4.3.3/libjava/classpath/doc/gappletviewer.1
old new 1 .\" Automatically generated by Pod::Man 2.16 (Pod::Simple 3.05)2 .\"3 .\" Standard preamble:4 .\" ========================================================================5 .de Sh \" Subsection heading6 .br7 .if t .Sp8 .ne 59 .PP10 \fB\\$1\fR11 .PP12 ..13 .de Sp \" Vertical space (when we can't use .PP)14 .if t .sp .5v15 .if n .sp16 ..17 .de Vb \" Begin verbatim text18 .ft CW19 .nf20 .ne \\$121 ..22 .de Ve \" End verbatim text23 .ft R24 .fi25 ..26 .\" Set up some character translations and predefined strings. \*(-- will27 .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left28 .\" double quote, and \*(R" will give a right double quote. \*(C+ will29 .\" give a nicer C++. Capital omega is used to do unbreakable dashes and30 .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff,31 .\" nothing in troff, for use with C<>.32 .tr \(*W-33 .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'34 .ie n \{\35 . ds -- \(*W-36 . ds PI pi37 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch38 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch39 . ds L" ""40 . ds R" ""41 . ds C` ""42 . ds C' ""43 'br\}44 .el\{\45 . ds -- \|\(em\|46 . ds PI \(*p47 . ds L" ``48 . ds R" ''49 'br\}50 .\"51 .\" Escape single quotes in literal strings from groff's Unicode transform.52 .ie \n(.g .ds Aq \(aq53 .el .ds Aq '54 .\"55 .\" If the F register is turned on, we'll generate index entries on stderr for56 .\" titles (.TH), headers (.SH), subsections (.Sh), items (.Ip), and index57 .\" entries marked with X<> in POD. Of course, you'll have to process the58 .\" output yourself in some meaningful fashion.59 .ie \nF \{\60 . de IX61 . tm Index:\\$1\t\\n%\t"\\$2"62 ..63 . nr % 064 . rr F65 .\}66 .el \{\67 . de IX68 ..69 .\}70 .\"71 .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).72 .\" Fear. Run. Save yourself. No user-serviceable parts.73 . \" fudge factors for nroff and troff74 .if n \{\75 . ds #H 076 . ds #V .8m77 . ds #F .3m78 . ds #[ \f179 . ds #] \fP80 .\}81 .if t \{\82 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)83 . ds #V .6m84 . ds #F 085 . ds #[ \&86 . ds #] \&87 .\}88 . \" simple accents for nroff and troff89 .if n \{\90 . ds ' \&91 . ds ` \&92 . ds ^ \&93 . ds , \&94 . ds ~ ~95 . ds /96 .\}97 .if t \{\98 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"99 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'100 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'101 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'102 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'103 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'104 .\}105 . \" troff and (daisy-wheel) nroff accents106 .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'107 .ds 8 \h'\*(#H'\(*b\h'-\*(#H'108 .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]109 .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'110 .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'111 .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]112 .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]113 .ds ae a\h'-(\w'a'u*4/10)'e114 .ds Ae A\h'-(\w'A'u*4/10)'E115 . \" corrections for vroff116 .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'117 .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'118 . \" for low resolution devices (crt and lpr)119 .if \n(.H>23 .if \n(.V>19 \120 \{\121 . ds : e122 . ds 8 ss123 . ds o a124 . ds d- d\h'-1'\(ga125 . ds D- D\h'-1'\(hy126 . ds th \o'bp'127 . ds Th \o'LP'128 . ds ae ae129 . ds Ae AE130 .\}131 .rm #[ #] #H #V #F C132 .\" ========================================================================133 .\"134 .IX Title "GAPPLETVIEWER 1"135 .TH GAPPLETVIEWER 1 "2009-01-24" "0.96-pre" "GNU"136 .\" For nroff, turn off justification. Always turn off hyphenation; it makes137 .\" way too many mistakes in technical documents.138 .if n .ad l139 .nh140 .SH "NAME"141 gappletviewer \- Load and runs an applet142 .SH "SYNOPSIS"143 .IX Header "SYNOPSIS"144 appletviewer [\fI\s-1OPTION\s0\fR]... \fI\s-1URL\s0\fR...145 .PP146 appletviewer [\fI\s-1OPTION\s0\fR]... \fB\-code\fR \fI\s-1CODE\s0\fR147 .PP148 appletviewer [\fI\s-1OPTION\s0\fR]... \fB\-plugin\fR \fI\s-1INPUT\s0\fR,\fI\s-1OUTPUT\s0\fR149 .SH "DESCRIPTION"150 .IX Header "DESCRIPTION"151 The \fBappletviewer\fR tool loads and runs an applet.152 .PP153 Use the first form to test applets specified by tag. The \s-1URL\s0 should154 resolve to an \s-1HTML\s0 document from which the \fBappletviewer\fR will155 extract applet tags. The \s-1APPLET\s0, \s-1EMBED\s0 and \s-1OBJECT\s0 tags are supported.156 If a given document contains multiple applet tags, all the applets157 will be loaded, with each applet appearing in its own window.158 Likewise, when multiple URLs are specified, each applet tag instance159 is given its own window. If a given document contains no recognized160 tags the \fBappletviewer\fR does nothing.161 .PP162 .Vb 1163 \& appletviewer http://www.gnu.org/software/classpath/164 .Ve165 .PP166 Use the second form to test an applet in development. This form167 allows applet tag attributes to be supplied on the command line. Only168 one applet may be specified using the \fB\-code\fR option. The169 \&\fB\-code\fR option overrides the \s-1URL\s0 form \*(-- any URLs specified will170 be ignored.171 .PP172 .Vb 1173 \& appletviewer \-code Test.class \-param datafile,data.txt174 .Ve175 .PP176 \&\fBgcjwebplugin\fR uses the third form to communicate with the177 \&\fBappletviewer\fR through named pipes.178 .SH "OPTIONS"179 .IX Header "OPTIONS"180 \&\s-1URL\s0 \s-1OPTIONS\s0181 .IP "\fB\-debug\fR" 4182 .IX Item "-debug"183 This option is not yet implemented but is provided for compatibility.184 .IP "\fB\-encoding\fR \fI\s-1CHARSET\s0\fR" 4185 .IX Item "-encoding CHARSET"186 Use this option to specify an alternate character encoding for the187 specified \s-1HTML\s0 page.188 .PP189 \&\s-1APPLET\s0 \s-1TAG\s0 \s-1OPTIONS\s0190 .IP "\fB\-code\fR \fI\s-1CODE\s0\fR" 4191 .IX Item "-code CODE"192 Use the \fB\-code\fR option to specify the value of the applet tag193 \&\fI\s-1CODE\s0\fR attribute.194 .IP "\fB\-codebase\fR \fI\s-1CODEBASE\s0\fR" 4195 .IX Item "-codebase CODEBASE"196 Use the \fB\-codebase\fR option to specify the value of the applet tag197 \&\fI\s-1CODEBASE\s0\fR attribute.198 .IP "\fB\-archive\fR \fI\s-1ARCHIVE\s0\fR" 4199 .IX Item "-archive ARCHIVE"200 Use the \fB\-archive\fR option to specify the value of the applet tag201 \&\fI\s-1ARCHIVE\s0\fR attribute.202 .IP "\fB\-width\fR \fI\s-1WIDTH\s0\fR" 4203 .IX Item "-width WIDTH"204 Use the \fB\-width\fR option to specify the value of the applet tag205 \&\fI\s-1WIDTH\s0\fR attribute.206 .IP "\fB\-height\fR \fI\s-1HEIGHT\s0\fR" 4207 .IX Item "-height HEIGHT"208 Use the \fB\-height\fR option to specify the value of the applet tag209 \&\fI\s-1HEIGHT\s0\fR attribute.210 .IP "\fB\-param\fR \fI\s-1NAME\s0\fR\fB,\fR\fI\s-1VALUE\s0\fR" 4211 .IX Item "-param NAME,VALUE"212 Use the \fB\-param\fR option to specify values for the \fI\s-1NAME\s0\fR213 and \fI\s-1VALUE\s0\fR attributes of an applet \s-1PARAM\s0 tag.214 .PP215 \&\s-1PLUGIN\s0 \s-1OPTION\s0216 .IP "\fB\-plugin\fR \fI\s-1INPUT\s0\fR\fB,\fR\fI\s-1OUTPUT\s0\fR" 4217 .IX Item "-plugin INPUT,OUTPUT"218 \&\fBgcjwebplugin\fR uses the \fB\-plugin\fR option to specify the219 named pipe the \fBappletviewer\fR should use for receiving commands220 (\fI\s-1INPUT\s0\fR) and the one it should use for sending commands to221 \&\fBgcjwebplugin\fR (\fI\s-1OUTPUT\s0\fR).222 .PP223 \&\s-1DEBUGGING\s0 \s-1OPTION\s0224 .IP "\fB\-verbose\fR" 4225 .IX Item "-verbose"226 Use the \fB\-verbose\fR option to have the \fBappletviewer\fR print227 debugging messages.228 .PP229 \&\s-1STANDARD\s0 \s-1OPTIONS\s0230 .IP "\fB\-help\fR" 4231 .IX Item "-help"232 Use the \fB\-help\fR option to have the \fBappletviewer\fR print a233 usage message, then exit.234 .IP "\fB\-version\fR" 4235 .IX Item "-version"236 Use the \fB\-version\fR option to have the \fBappletviewer\fR print237 its version, then exit.238 .IP "\fB\-J\fR\fI\s-1OPTION\s0\fR" 4239 .IX Item "-JOPTION"240 Use the \fB\-J\fR option to pass \fI\s-1OPTION\s0\fR to the virtual machine that241 will run the \fBappletviewer\fR. Unlike other options, there must242 not be a space between the \fB\-J\fR and \fI\s-1OPTION\s0\fR.243 .SH "SEE ALSO"244 .IX Header "SEE ALSO" -
libjava/classpath/doc/gjar.1
diff -Naur gcc-4.3.3.orig/libjava/classpath/doc/gjar.1 gcc-4.3.3/libjava/classpath/doc/gjar.1
old new 1 .\" Automatically generated by Pod::Man 2.16 (Pod::Simple 3.05)2 .\"3 .\" Standard preamble:4 .\" ========================================================================5 .de Sh \" Subsection heading6 .br7 .if t .Sp8 .ne 59 .PP10 \fB\\$1\fR11 .PP12 ..13 .de Sp \" Vertical space (when we can't use .PP)14 .if t .sp .5v15 .if n .sp16 ..17 .de Vb \" Begin verbatim text18 .ft CW19 .nf20 .ne \\$121 ..22 .de Ve \" End verbatim text23 .ft R24 .fi25 ..26 .\" Set up some character translations and predefined strings. \*(-- will27 .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left28 .\" double quote, and \*(R" will give a right double quote. \*(C+ will29 .\" give a nicer C++. Capital omega is used to do unbreakable dashes and30 .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff,31 .\" nothing in troff, for use with C<>.32 .tr \(*W-33 .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'34 .ie n \{\35 . ds -- \(*W-36 . ds PI pi37 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch38 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch39 . ds L" ""40 . ds R" ""41 . ds C` ""42 . ds C' ""43 'br\}44 .el\{\45 . ds -- \|\(em\|46 . ds PI \(*p47 . ds L" ``48 . ds R" ''49 'br\}50 .\"51 .\" Escape single quotes in literal strings from groff's Unicode transform.52 .ie \n(.g .ds Aq \(aq53 .el .ds Aq '54 .\"55 .\" If the F register is turned on, we'll generate index entries on stderr for56 .\" titles (.TH), headers (.SH), subsections (.Sh), items (.Ip), and index57 .\" entries marked with X<> in POD. Of course, you'll have to process the58 .\" output yourself in some meaningful fashion.59 .ie \nF \{\60 . de IX61 . tm Index:\\$1\t\\n%\t"\\$2"62 ..63 . nr % 064 . rr F65 .\}66 .el \{\67 . de IX68 ..69 .\}70 .\"71 .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).72 .\" Fear. Run. Save yourself. No user-serviceable parts.73 . \" fudge factors for nroff and troff74 .if n \{\75 . ds #H 076 . ds #V .8m77 . ds #F .3m78 . ds #[ \f179 . ds #] \fP80 .\}81 .if t \{\82 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)83 . ds #V .6m84 . ds #F 085 . ds #[ \&86 . ds #] \&87 .\}88 . \" simple accents for nroff and troff89 .if n \{\90 . ds ' \&91 . ds ` \&92 . ds ^ \&93 . ds , \&94 . ds ~ ~95 . ds /96 .\}97 .if t \{\98 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"99 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'100 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'101 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'102 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'103 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'104 .\}105 . \" troff and (daisy-wheel) nroff accents106 .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'107 .ds 8 \h'\*(#H'\(*b\h'-\*(#H'108 .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]109 .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'110 .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'111 .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]112 .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]113 .ds ae a\h'-(\w'a'u*4/10)'e114 .ds Ae A\h'-(\w'A'u*4/10)'E115 . \" corrections for vroff116 .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'117 .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'118 . \" for low resolution devices (crt and lpr)119 .if \n(.H>23 .if \n(.V>19 \120 \{\121 . ds : e122 . ds 8 ss123 . ds o a124 . ds d- d\h'-1'\(ga125 . ds D- D\h'-1'\(hy126 . ds th \o'bp'127 . ds Th \o'LP'128 . ds ae ae129 . ds Ae AE130 .\}131 .rm #[ #] #H #V #F C132 .\" ========================================================================133 .\"134 .IX Title "GJAR 1"135 .TH GJAR 1 "2009-01-24" "0.96-pre" "GNU"136 .\" For nroff, turn off justification. Always turn off hyphenation; it makes137 .\" way too many mistakes in technical documents.138 .if n .ad l139 .nh140 .SH "NAME"141 gjar \- \- Archive tool for Java archives142 .SH "SYNOPSIS"143 .IX Header "SYNOPSIS"144 gjar \fB\-ctxui\fR [\fI\s-1OPTIONS\s0\fR] \fIjar-file\fR [\fB\-C\fR \fI\s-1DIR\s0\fR \fI\s-1FILE\s0\fR] \fI\s-1FILE\s0\fR...145 .SH "DESCRIPTION"146 .IX Header "DESCRIPTION"147 \&\fBgjar\fR is an implementation of Sun's jar utility that comes with148 the \s-1JDK\s0.149 .PP150 If any file is a directory then it is processed recursively. The151 manifest file name and the archive file name needs to be specified in152 the same order the \fB\-m\fR and \fB\-f\fR flags are specified.153 .SH "OPTIONS"154 .IX Header "OPTIONS"155 Operation mode:156 .IP "\fB\-c\fR" 4157 .IX Item "-c"158 Create new archive.159 .IP "\fB\-t\fR" 4160 .IX Item "-t"161 List table of contents for archive.162 .IP "\fB\-x\fR" 4163 .IX Item "-x"164 Extract named (or all) files from archive.165 .IP "\fB\-u\fR" 4166 .IX Item "-u"167 Update existing archive.168 .IP "\fB\-i\fR \fI\s-1FILE\s0\fR" 4169 .IX Item "-i FILE"170 Compute archive index.171 .PP172 Operation modifiers:173 .IP "\fB\-f\fR \fI\s-1FILE\s0\fR" 4174 .IX Item "-f FILE"175 Specify archive file name.176 .IP "\fB\-0\fR" 4177 .IX Item "-0"178 Store only; use no \s-1ZIP\s0 compression.179 .IP "\fB\-v\fR" 4180 .IX Item "-v"181 Generate verbose output on standard output.182 .IP "\fB\-M\fR" 4183 .IX Item "-M"184 Do not create a manifest file for the entries.185 .IP "\fB\-m\fR \fImanifest\fR" 4186 .IX Item "-m manifest"187 Include manifest information from specified \fImanifest\fR file.188 .PP189 File name selection:190 .IP "\fB\-C\fR \fI\s-1DIR\s0\fR\fB \fR\fI\s-1FILE\s0\fR" 4191 .IX Item "-C DIR FILE"192 Change to the \fI\s-1DIR\s0\fR and include the following \fI\s-1FILE\s0\fR.193 .IP "\fB\-@\fR" 4194 .IX Item "-@"195 Read the names of the files to add to the archive from stdin. This196 option is supported only in combination with \fB\-c\fR or \fB\-u\fR.197 Non standard option added in the \s-1GCC\s0 version.198 .PP199 Standard options:200 .IP "\fB\-help\fR" 4201 .IX Item "-help"202 Print help text, then exit.203 .IP "\fB\-version\fR" 4204 .IX Item "-version"205 Print version number, then exit.206 .IP "\fB\-J\fR\fI\s-1OPTION\s0\fR" 4207 .IX Item "-JOPTION"208 Pass argument to the Java runtime.209 .SH "SEE ALSO"210 .IX Header "SEE ALSO"211 \&\fIjava\fR\|(1), ... -
libjava/classpath/doc/gjarsigner.1
diff -Naur gcc-4.3.3.orig/libjava/classpath/doc/gjarsigner.1 gcc-4.3.3/libjava/classpath/doc/gjarsigner.1
old new 1 .\" Automatically generated by Pod::Man 2.16 (Pod::Simple 3.05)2 .\"3 .\" Standard preamble:4 .\" ========================================================================5 .de Sh \" Subsection heading6 .br7 .if t .Sp8 .ne 59 .PP10 \fB\\$1\fR11 .PP12 ..13 .de Sp \" Vertical space (when we can't use .PP)14 .if t .sp .5v15 .if n .sp16 ..17 .de Vb \" Begin verbatim text18 .ft CW19 .nf20 .ne \\$121 ..22 .de Ve \" End verbatim text23 .ft R24 .fi25 ..26 .\" Set up some character translations and predefined strings. \*(-- will27 .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left28 .\" double quote, and \*(R" will give a right double quote. \*(C+ will29 .\" give a nicer C++. Capital omega is used to do unbreakable dashes and30 .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff,31 .\" nothing in troff, for use with C<>.32 .tr \(*W-33 .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'34 .ie n \{\35 . ds -- \(*W-36 . ds PI pi37 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch38 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch39 . ds L" ""40 . ds R" ""41 . ds C` ""42 . ds C' ""43 'br\}44 .el\{\45 . ds -- \|\(em\|46 . ds PI \(*p47 . ds L" ``48 . ds R" ''49 'br\}50 .\"51 .\" Escape single quotes in literal strings from groff's Unicode transform.52 .ie \n(.g .ds Aq \(aq53 .el .ds Aq '54 .\"55 .\" If the F register is turned on, we'll generate index entries on stderr for56 .\" titles (.TH), headers (.SH), subsections (.Sh), items (.Ip), and index57 .\" entries marked with X<> in POD. Of course, you'll have to process the58 .\" output yourself in some meaningful fashion.59 .ie \nF \{\60 . de IX61 . tm Index:\\$1\t\\n%\t"\\$2"62 ..63 . nr % 064 . rr F65 .\}66 .el \{\67 . de IX68 ..69 .\}70 .\"71 .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).72 .\" Fear. Run. Save yourself. No user-serviceable parts.73 . \" fudge factors for nroff and troff74 .if n \{\75 . ds #H 076 . ds #V .8m77 . ds #F .3m78 . ds #[ \f179 . ds #] \fP80 .\}81 .if t \{\82 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)83 . ds #V .6m84 . ds #F 085 . ds #[ \&86 . ds #] \&87 .\}88 . \" simple accents for nroff and troff89 .if n \{\90 . ds ' \&91 . ds ` \&92 . ds ^ \&93 . ds , \&94 . ds ~ ~95 . ds /96 .\}97 .if t \{\98 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"99 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'100 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'101 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'102 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'103 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'104 .\}105 . \" troff and (daisy-wheel) nroff accents106 .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'107 .ds 8 \h'\*(#H'\(*b\h'-\*(#H'108 .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]109 .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'110 .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'111 .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]112 .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]113 .ds ae a\h'-(\w'a'u*4/10)'e114 .ds Ae A\h'-(\w'A'u*4/10)'E115 . \" corrections for vroff116 .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'117 .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'118 . \" for low resolution devices (crt and lpr)119 .if \n(.H>23 .if \n(.V>19 \120 \{\121 . ds : e122 . ds 8 ss123 . ds o a124 . ds d- d\h'-1'\(ga125 . ds D- D\h'-1'\(hy126 . ds th \o'bp'127 . ds Th \o'LP'128 . ds ae ae129 . ds Ae AE130 .\}131 .rm #[ #] #H #V #F C132 .\" ========================================================================133 .\"134 .IX Title "GJARSIGNER 1"135 .TH GJARSIGNER 1 "2009-01-24" "0.96-pre" "GNU"136 .\" For nroff, turn off justification. Always turn off hyphenation; it makes137 .\" way too many mistakes in technical documents.138 .if n .ad l139 .nh140 .SH "NAME"141 gjarsigner \- Java ARchive (JAR) file signing and verification tool142 .SH "SYNOPSIS"143 .IX Header "SYNOPSIS"144 jarsigner [\fI\s-1OPTION\s0\fR]... \fI\s-1FILE\s0\fR \fI\s-1ALIAS\s0\fR145 .PP146 jarsigner \fB\-verify\fR [\fI\s-1OPTION\s0\fR]... \fI\s-1FILE\s0\fR147 .SH "DESCRIPTION"148 .IX Header "DESCRIPTION"149 When the first form is used, the tool signs the designated \s-1JAR\s0 file. The second form, on the other hand, is used to verify a previously signed \s-1JAR\s0 file.150 .PP151 \&\fI\s-1FILE\s0\fR is the .JAR file to process; i.e. to sign if the first syntax form is used, or to verify if the second syntax form is used instead.152 .PP153 \&\fI\s-1ALIAS\s0\fR must be a known \fIAlias\fR of a \fIKey Entry\fR in the designated \fIKey Store\fR. The private key material associated with this \fIAlias\fR is then used for signing the designated .JAR file.154 .SH "OPTIONS"155 .IX Header "OPTIONS"156 \fICommon options\fR157 .IX Subsection "Common options"158 .PP159 The following options may be used when the tool is used for either signing, or verifying, a .JAR file.160 .IP "\fB\-verbose\fR" 4161 .IX Item "-verbose"162 Use this option to force the tool to generate more verbose messages, during its processing.163 .IP "\fB\-internalsf\fR" 4164 .IX Item "-internalsf"165 When present, the tool will include \-\-which otherwise it does not\*(-- the \f(CW\*(C`.SF\*(C'\fR file in the \f(CW\*(C`.DSA\*(C'\fR generated file.166 .IP "\fB\-sectionsonly\fR" 4167 .IX Item "-sectionsonly"168 When present, the tool will include in the \f(CW\*(C`.SF\*(C'\fR generated file \-\-which otherwise it does not\*(-- a header containing a hash of the whole manifest file. When that header is included, the tool can quickly check, during verification, if the hash (in the header) matches or not the manifest file.169 .IP "\fB\-provider \s-1PROVIDER_CLASS_NAME\s0\fR" 4170 .IX Item "-provider PROVIDER_CLASS_NAME"171 A fully qualified class name of a \fISecurity Provider\fR to add to the current list of \fISecurity Providers\fR already installed in the \s-1JVM\s0 in-use. If a provider class is specified with this option, and was successfully added to the runtime \-\-i.e. it was not already installed\*(-- then the tool will attempt to remove this \fISecurity Provider\fR before exiting.172 .IP "\fB\-help\fR" 4173 .IX Item "-help"174 Prints a help text similar to this one.175 .PP176 \fISigning options\fR177 .IX Subsection "Signing options"178 .PP179 The following options may be specified when using the tool for signing purposes.180 .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4181 .IX Item "-keystore URL"182 Use this option to specify the location of the key store to use. The default value is a file \s-1URL\s0 referencing the file named \fI.keystore\fR located in the path returned by the call to \f(CW\*(C`java.lang.System#getProperty(String)\*(C'\fR using \f(CW\*(C`user.home\*(C'\fR as argument.183 .Sp184 If a \s-1URL\s0 was specified, but was found to be malformed \-\-e.g. missing protocol element\*(-- the tool will attempt to use the \s-1URL\s0 value as a file-name (with absolute or relative path-name) of a key store \-\-as if the protocol was \f(CW\*(C`file:\*(C'\fR.185 .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4186 .IX Item "-storetype STORE_TYPE"187 Use this option to specify the type of the key store to use. The default value, if this option is omitted, is that of the property \f(CW\*(C`keystore.type\*(C'\fR in the security properties file, which is obtained by invoking the static method call \f(CW\*(C`getDefaultType()\*(C'\fR in \f(CW\*(C`java.security.KeyStore\*(C'\fR.188 .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4189 .IX Item "-storepass PASSWORD"190 Use this option to specify the password which will be used to unlock the key store. If this option is missing, the User will be prompted to provide a password.191 .IP "\fB\-keypass\fR \fI\s-1PASSWORD\s0\fR" 4192 .IX Item "-keypass PASSWORD"193 Use this option to specify the password which the tool will use to unlock the \fIKey Entry\fR associated with the designated \fIAlias\fR.194 .Sp195 If this option is omitted, the tool will first attempt to unlock the \fIKey Entry\fR using the same password protecting the key store. If this fails, you will then be prompted to provide a password.196 .IP "\fB\-sigfile\fR \fI\s-1NAME\s0\fR" 4197 .IX Item "-sigfile NAME"198 Use this option to designate a literal that will be used to construct file names for both the \f(CW\*(C`.SF\*(C'\fR and \f(CW\*(C`.DSA\*(C'\fR signature files. These files will be generated, by the tool, and placed in the \fIMETA-INF\fR directory of the signed \s-1JAR\s0. Permissible characters for \fI\s-1NAME\s0\fR must be in the range \*(L"a\-zA\-Z0\-9_\-\*(R". All characters will be converted to upper-case ones.199 .Sp200 If this option is missing, the first eight characters of the \fI\s-1ALIAS\s0\fR argument will be used. When this is the case, any character in \fI\s-1ALIAS\s0\fR that is outside the permissible range of characters will be replaced by an underscore.201 .IP "\fB\-signedjar\fR \fI\s-1FILE\s0\fR" 4202 .IX Item "-signedjar FILE"203 Use this option to specify the file name of the signed \s-1JAR\s0. If this option is omitted, then the signed \s-1JAR\s0 will be named the same as \fI\s-1FILE\s0\fR; i.e. the input \s-1JAR\s0 file will be replaced with the signed copy.204 .PP205 \fIVerification options\fR206 .IX Subsection "Verification options"207 .PP208 The following options may be specified when using the tool for verification purposes.209 .IP "\fB\-verify\fR" 4210 .IX Item "-verify"211 Use this option to indicate that the tool is to be used for verification purposes.212 .IP "\fB\-certs\fR" 4213 .IX Item "-certs"214 This option is used in conjunction with the \fB\-verbose\fR option. When present, along with the \fB\-verbose\fR option, the tool will print more detailed information about the certificates of the signer(s) being processed.215 .SH "SEE ALSO"216 .IX Header "SEE ALSO" -
libjava/classpath/doc/gjavah.1
diff -Naur gcc-4.3.3.orig/libjava/classpath/doc/gjavah.1 gcc-4.3.3/libjava/classpath/doc/gjavah.1
old new 1 .\" Automatically generated by Pod::Man 2.16 (Pod::Simple 3.05)2 .\"3 .\" Standard preamble:4 .\" ========================================================================5 .de Sh \" Subsection heading6 .br7 .if t .Sp8 .ne 59 .PP10 \fB\\$1\fR11 .PP12 ..13 .de Sp \" Vertical space (when we can't use .PP)14 .if t .sp .5v15 .if n .sp16 ..17 .de Vb \" Begin verbatim text18 .ft CW19 .nf20 .ne \\$121 ..22 .de Ve \" End verbatim text23 .ft R24 .fi25 ..26 .\" Set up some character translations and predefined strings. \*(-- will27 .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left28 .\" double quote, and \*(R" will give a right double quote. \*(C+ will29 .\" give a nicer C++. Capital omega is used to do unbreakable dashes and30 .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff,31 .\" nothing in troff, for use with C<>.32 .tr \(*W-33 .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'34 .ie n \{\35 . ds -- \(*W-36 . ds PI pi37 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch38 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch39 . ds L" ""40 . ds R" ""41 . ds C` ""42 . ds C' ""43 'br\}44 .el\{\45 . ds -- \|\(em\|46 . ds PI \(*p47 . ds L" ``48 . ds R" ''49 'br\}50 .\"51 .\" Escape single quotes in literal strings from groff's Unicode transform.52 .ie \n(.g .ds Aq \(aq53 .el .ds Aq '54 .\"55 .\" If the F register is turned on, we'll generate index entries on stderr for56 .\" titles (.TH), headers (.SH), subsections (.Sh), items (.Ip), and index57 .\" entries marked with X<> in POD. Of course, you'll have to process the58 .\" output yourself in some meaningful fashion.59 .ie \nF \{\60 . de IX61 . tm Index:\\$1\t\\n%\t"\\$2"62 ..63 . nr % 064 . rr F65 .\}66 .el \{\67 . de IX68 ..69 .\}70 .\"71 .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).72 .\" Fear. Run. Save yourself. No user-serviceable parts.73 . \" fudge factors for nroff and troff74 .if n \{\75 . ds #H 076 . ds #V .8m77 . ds #F .3m78 . ds #[ \f179 . ds #] \fP80 .\}81 .if t \{\82 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)83 . ds #V .6m84 . ds #F 085 . ds #[ \&86 . ds #] \&87 .\}88 . \" simple accents for nroff and troff89 .if n \{\90 . ds ' \&91 . ds ` \&92 . ds ^ \&93 . ds , \&94 . ds ~ ~95 . ds /96 .\}97 .if t \{\98 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"99 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'100 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'101 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'102 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'103 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'104 .\}105 . \" troff and (daisy-wheel) nroff accents106 .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'107 .ds 8 \h'\*(#H'\(*b\h'-\*(#H'108 .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]109 .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'110 .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'111 .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]112 .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]113 .ds ae a\h'-(\w'a'u*4/10)'e114 .ds Ae A\h'-(\w'A'u*4/10)'E115 . \" corrections for vroff116 .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'117 .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'118 . \" for low resolution devices (crt and lpr)119 .if \n(.H>23 .if \n(.V>19 \120 \{\121 . ds : e122 . ds 8 ss123 . ds o a124 . ds d- d\h'-1'\(ga125 . ds D- D\h'-1'\(hy126 . ds th \o'bp'127 . ds Th \o'LP'128 . ds ae ae129 . ds Ae AE130 .\}131 .rm #[ #] #H #V #F C132 .\" ========================================================================133 .\"134 .IX Title "GJAVAH 1"135 .TH GJAVAH 1 "2009-01-24" "0.96-pre" "GNU"136 .\" For nroff, turn off justification. Always turn off hyphenation; it makes137 .\" way too many mistakes in technical documents.138 .if n .ad l139 .nh140 .SH "NAME"141 gjavah \- \- generate header files from Java class files142 .SH "SYNOPSIS"143 .IX Header "SYNOPSIS"144 gjavah ...145 .SH "DESCRIPTION"146 .IX Header "DESCRIPTION"147 The \fBgjavah\fR program is used to generate header files from class148 files. It can generate both \s-1CNI\s0 and \s-1JNI\s0 header files, as well as stub149 implementation files which can be used as a basis for implementing the150 required native methods.151 .SH "OPTIONS"152 .IX Header "OPTIONS"153 .IP "\fB\-d\fR \fI\s-1DIR\s0\fR" 4154 .IX Item "-d DIR"155 Set output directory.156 .IP "\fB\-o\fR \fI\s-1FILE\s0\fR" 4157 .IX Item "-o FILE"158 Set output file (only one of \fB\-d\fR or \fB\-o\fR may be used).159 .IP "\fB\-cmdfile\fR \fI\s-1FILE\s0\fR" 4160 .IX Item "-cmdfile FILE"161 Read command file.162 .IP "\fB\-all\fR \fI\s-1DIR\s0\fR" 4163 .IX Item "-all DIR"164 Operate on all class files under directory \fI\s-1DIR\s0\fR.165 .IP "\fB\-stubs\fR" 4166 .IX Item "-stubs"167 Emit stub implementation.168 .IP "\fB\-jni\fR" 4169 .IX Item "-jni"170 Emit \s-1JNI\s0 stubs or header (default).171 .IP "\fB\-cni\fR" 4172 .IX Item "-cni"173 Emit \s-1CNI\s0 stubs or header (default \s-1JNI\s0).174 .IP "\fB\-verbose\fR" 4175 .IX Item "-verbose"176 Set verbose mode.177 .IP "\fB\-force\fR" 4178 .IX Item "-force"179 Output files should always be written.180 .PP181 Class path options:182 .IP "\fB\-classpath\fR \fI\s-1PATH\s0\fR" 4183 .IX Item "-classpath PATH"184 Set the class path.185 .IP "\fB\-I\fR\fI\s-1DIR\s0\fR" 4186 .IX Item "-IDIR"187 Add directory to class path.188 .IP "\fB\-bootclasspath\fR \fI\s-1PATH\s0\fR" 4189 .IX Item "-bootclasspath PATH"190 Set the boot class path.191 .IP "\fB\-extdirs\fR \fI\s-1PATH\s0\fR" 4192 .IX Item "-extdirs PATH"193 Set the extension directory path.194 .PP195 Standard options:196 .IP "\fB\-help\fR" 4197 .IX Item "-help"198 Print help text, then exit.199 .IP "\fB\-version\fR" 4200 .IX Item "-version"201 Print version number, then exit.202 .IP "\fB\-J\fR\fI\s-1OPTION\s0\fR" 4203 .IX Item "-JOPTION"204 Pass argument to the Java runtime.205 .SH "SEE ALSO"206 .IX Header "SEE ALSO"207 \&\fIjavac\fR\|(1), ... -
libjava/classpath/doc/gkeytool.1
diff -Naur gcc-4.3.3.orig/libjava/classpath/doc/gkeytool.1 gcc-4.3.3/libjava/classpath/doc/gkeytool.1
old new 1 .\" Automatically generated by Pod::Man 2.16 (Pod::Simple 3.05)2 .\"3 .\" Standard preamble:4 .\" ========================================================================5 .de Sh \" Subsection heading6 .br7 .if t .Sp8 .ne 59 .PP10 \fB\\$1\fR11 .PP12 ..13 .de Sp \" Vertical space (when we can't use .PP)14 .if t .sp .5v15 .if n .sp16 ..17 .de Vb \" Begin verbatim text18 .ft CW19 .nf20 .ne \\$121 ..22 .de Ve \" End verbatim text23 .ft R24 .fi25 ..26 .\" Set up some character translations and predefined strings. \*(-- will27 .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left28 .\" double quote, and \*(R" will give a right double quote. \*(C+ will29 .\" give a nicer C++. Capital omega is used to do unbreakable dashes and30 .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff,31 .\" nothing in troff, for use with C<>.32 .tr \(*W-33 .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'34 .ie n \{\35 . ds -- \(*W-36 . ds PI pi37 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch38 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch39 . ds L" ""40 . ds R" ""41 . ds C` ""42 . ds C' ""43 'br\}44 .el\{\45 . ds -- \|\(em\|46 . ds PI \(*p47 . ds L" ``48 . ds R" ''49 'br\}50 .\"51 .\" Escape single quotes in literal strings from groff's Unicode transform.52 .ie \n(.g .ds Aq \(aq53 .el .ds Aq '54 .\"55 .\" If the F register is turned on, we'll generate index entries on stderr for56 .\" titles (.TH), headers (.SH), subsections (.Sh), items (.Ip), and index57 .\" entries marked with X<> in POD. Of course, you'll have to process the58 .\" output yourself in some meaningful fashion.59 .ie \nF \{\60 . de IX61 . tm Index:\\$1\t\\n%\t"\\$2"62 ..63 . nr % 064 . rr F65 .\}66 .el \{\67 . de IX68 ..69 .\}70 .\"71 .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).72 .\" Fear. Run. Save yourself. No user-serviceable parts.73 . \" fudge factors for nroff and troff74 .if n \{\75 . ds #H 076 . ds #V .8m77 . ds #F .3m78 . ds #[ \f179 . ds #] \fP80 .\}81 .if t \{\82 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)83 . ds #V .6m84 . ds #F 085 . ds #[ \&86 . ds #] \&87 .\}88 . \" simple accents for nroff and troff89 .if n \{\90 . ds ' \&91 . ds ` \&92 . ds ^ \&93 . ds , \&94 . ds ~ ~95 . ds /96 .\}97 .if t \{\98 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"99 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'100 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'101 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'102 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'103 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'104 .\}105 . \" troff and (daisy-wheel) nroff accents106 .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'107 .ds 8 \h'\*(#H'\(*b\h'-\*(#H'108 .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]109 .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'110 .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'111 .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]112 .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]113 .ds ae a\h'-(\w'a'u*4/10)'e114 .ds Ae A\h'-(\w'A'u*4/10)'E115 . \" corrections for vroff116 .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'117 .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'118 . \" for low resolution devices (crt and lpr)119 .if \n(.H>23 .if \n(.V>19 \120 \{\121 . ds : e122 . ds 8 ss123 . ds o a124 . ds d- d\h'-1'\(ga125 . ds D- D\h'-1'\(hy126 . ds th \o'bp'127 . ds Th \o'LP'128 . ds ae ae129 . ds Ae AE130 .\}131 .rm #[ #] #H #V #F C132 .\" ========================================================================133 .\"134 .IX Title "GKEYTOOL 1"135 .TH GKEYTOOL 1 "2009-01-24" "0.96-pre" "GNU"136 .\" For nroff, turn off justification. Always turn off hyphenation; it makes137 .\" way too many mistakes in technical documents.138 .if n .ad l139 .nh140 .SH "NAME"141 gkeytool \- Manage private keys and public certificates142 .SH "SYNOPSIS"143 .IX Header "SYNOPSIS"144 keytool [\fI\s-1COMMAND\s0\fR] ...145 .SH "DESCRIPTION"146 .IX Header "DESCRIPTION"147 Cryptographic credentials, in a Java environment, are usually stored in a \fIKey Store\fR. The Java \s-1SDK\s0 specifies a \fIKey Store\fR as a persistent container of two types of objects: \fIKey Entries\fR and \fITrusted Certificates\fR. The security tool \fBkeytool\fR is a Java-based application for managing those types of objects.148 .PP149 A \fIKey Entry\fR represents the private key part of a key-pair used in Public-Key Cryptography, and a signed X.509 certificate which authenticates the public key part for a known entity; i.e. the owner of the key-pair. The X.509 certificate itself contains the public key part of the key-pair.150 .PP151 A \fITrusted Certificate\fR is a signed X.509 certificate issued by a trusted entity. The \fITrust\fR in this context is relative to the User of the \fBkeytool\fR. In other words, the existence of a \fITrusted Certificate\fR in the \fIKey Store\fR processed by a \fBkeytool\fR command implies that the User trusts the \fIIssuer\fR of that \fITrusted Certificate\fR to also sign, and hence authenticates, other \fISubjects\fR the tool may process.152 .PP153 \&\fITrusted Certificates\fR are important because they allow the tool to mechanically construct \fIChains of Trust\fR starting from one of the \fITrusted Certificates\fR in a \fIKey Store\fR and ending with a certificate whose \fIIssuer\fR is potentially unknown. A valid chain is an ordered list, starting with a \fITrusted Certificate\fR (also called the \fIanchor\fR), ending with the target certificate, and satisfying the condition that the \fISubject\fR of certificate \f(CW\*(C`#i\*(C'\fR is the \fIIssuer\fR of certificate \f(CW\*(C`#i + 1\*(C'\fR.154 .PP155 The \fBkeytool\fR is invoked from the command line as follows:156 .PP157 .Vb 1158 \& keytool [COMMAND] ...159 .Ve160 .PP161 Multiple \fI\s-1COMMAND\s0\fRs may be specified at once, each complete with its own options. \fBkeytool\fR will parse all the arguments, before processing, and executing, each \f(CW\*(C`COMMAND\*(C'\fR. If an exception occurs while executing one \fI\s-1COMMAND\s0\fR \fBkeytool\fR will abort. Note however that because the implementation of the tool uses code to parse command line options that also supports GNU-style options, you have to separate each command group with a double-hyphen; e.g162 .PP163 .Vb 1164 \& keytool \-list \-\- \-printcert \-alias mykey165 .Ve166 .SH "OPTIONS"167 .IX Header "OPTIONS"168 .IP "\- Add/Update commands" 4169 .IX Item "- Add/Update commands"170 .RS 4171 .PD 0172 .IP "\fB\-genkey [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4173 .IX Item "-genkey [OPTION]..."174 .PD175 Generate a new \fIKey Entry\fR, eventually creating a new key store.176 .IP "\fB\-import [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4177 .IX Item "-import [OPTION]..."178 Add, to a key store, \fIKey Entries\fR (private keys and certificate chains authenticating the public keys) and \fITrusted Certificates\fR (3rd party certificates which can be used as \fITrust Anchors\fR when building chains-of-trust).179 .IP "\fB\-selfcert [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4180 .IX Item "-selfcert [OPTION]..."181 Generate a new self-signed \fITrusted Certificate\fR.182 .IP "\fB\-cacert [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4183 .IX Item "-cacert [OPTION]..."184 Import a \s-1CA\s0 \fITrusted Certificate\fR.185 .IP "\fB\-identitydb [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4186 .IX Item "-identitydb [OPTION]..."187 \&\fB\s-1NOT\s0 \s-1IMPLEMENTED\s0 \s-1YET\s0\fR.Import a \s-1JDK\s0 1.1 style Identity Database.188 .RE189 .RS 4190 .RE191 .IP "\- Export commands" 4192 .IX Item "- Export commands"193 .RS 4194 .PD 0195 .IP "\fB\-certreq [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4196 .IX Item "-certreq [OPTION]..."197 .PD198 Issue a \fICertificate Signing Request\fR (\s-1CSR\s0) which can be then sent to a \fICertification Authority\fR (\s-1CA\s0) to issue a certificate signed (by the \s-1CA\s0) and authenticating the \fISubject\fR of the request.199 .IP "\fB\-export [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4200 .IX Item "-export [OPTION]..."201 Export a certificate from a key store.202 .RE203 .RS 4204 .RE205 .IP "\- Display commands" 4206 .IX Item "- Display commands"207 .RS 4208 .PD 0209 .IP "\fB\-list [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4210 .IX Item "-list [OPTION]..."211 .PD212 Print one or all certificates in a key store to \f(CW\*(C`STDOUT\*(C'\fR.213 .IP "\fB\-printcert [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4214 .IX Item "-printcert [OPTION]..."215 Print a human-readable form of a certificate, in a designated file, to \f(CW\*(C`STDOUT\*(C'\fR.216 .RE217 .RS 4218 .RE219 .IP "\- Management commands" 4220 .IX Item "- Management commands"221 .RS 4222 .PD 0223 .IP "\fB\-keyclone [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4224 .IX Item "-keyclone [OPTION]..."225 .PD226 Clone a \fIKey Entry\fR in a key store.227 .IP "\fB\-storepasswd [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4228 .IX Item "-storepasswd [OPTION]..."229 Change the password protecting a key store.230 .IP "\fB\-keypasswd [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4231 .IX Item "-keypasswd [OPTION]..."232 Change the password protecting a \fIKey Entry\fR in a key store.233 .IP "\fB\-delete [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4234 .IX Item "-delete [OPTION]..."235 Delete a \fIKey Entry\fR or a \fITrusted Certificate\fR from a key store.236 .RE237 .RS 4238 .RE239 .PP240 \fICommon options\fR241 .IX Subsection "Common options"242 .PP243 The following \fB\s-1OPTION\s0\fRs are used in more than one \fB\s-1COMMAND\s0\fR. They are described here to reduce redundancy.244 .IP "\fB\-alias\fR \fIAlias\fR" 4245 .IX Item "-alias Alias"246 Every entry, be it a \fIKey Entry\fR or a \fITrusted Certificate\fR, in a key store is uniquely identified by a user-defined \fIAlias\fR string. Use this option to specify the \fIAlias\fR to use when referring to an entry in the key store. Unless specified otherwise, a default value of \f(CW\*(C`mykey\*(C'\fR shall be used when this option is omitted from the command line.247 .IP "\fB\-keyalg\fR \fI\s-1ALGORITHM\s0\fR" 4248 .IX Item "-keyalg ALGORITHM"249 Use this option to specify the canonical name of the key-pair generation algorithm. The default value for this option is \f(CW\*(C`DSS\*(C'\fR (a synonym for the Digital Signature Algorithm also known as \s-1DSA\s0).250 .IP "\fB\-keysize\fR \fI\s-1SIZE\s0\fR" 4251 .IX Item "-keysize SIZE"252 Use this option to specify the number of bits of the shared modulus (for both the public and private keys) to use when generating new keys. A default value of \f(CW1024\fR will be used if this option is omitted from the command line.253 .IP "\fB\-validity\fR \fI\s-1DAY_COUNT\s0\fR" 4254 .IX Item "-validity DAY_COUNT"255 Use this option to specify the number of days a newly generated certificate will be valid for. The default value is \f(CW90\fR (days) if this option is omitted from the command line.256 .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4257 .IX Item "-storetype STORE_TYPE"258 Use this option to specify the type of the key store to use. The default value, if this option is omitted, is that of the property \f(CW\*(C`keystore.type\*(C'\fR in the security properties file, which is obtained by invoking the static method call \f(CW\*(C`getDefaultType()\*(C'\fR in \f(CW\*(C`java.security.KeyStore\*(C'\fR.259 .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4260 .IX Item "-storepass PASSWORD"261 Use this option to specify the password protecting the key store. If this option is omitted from the command line, you will be prompted to provide a password.262 .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4263 .IX Item "-keystore URL"264 Use this option to specify the location of the key store to use. The default value is a file \s-1URL\s0 referencing the file named \fI.keystore\fR located in the path returned by the call to \f(CW\*(C`java.lang.System#getProperty(String)\*(C'\fR using \f(CW\*(C`user.home\*(C'\fR as argument.265 .Sp266 If a \s-1URL\s0 was specified, but was found to be malformed \-\-e.g. missing protocol element\*(-- the tool will attempt to use the \s-1URL\s0 value as a file-name (with absolute or relative path-name) of a key store \-\-as if the protocol was \f(CW\*(C`file:\*(C'\fR.267 .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4268 .IX Item "-provider PROVIDER_CLASS_NAME"269 A fully qualified class name of a \fISecurity Provider\fR to add to the current list of \fISecurity Providers\fR already installed in the \s-1JVM\s0 in-use. If a provider class is specified with this option, and was successfully added to the runtime \-\-i.e. it was not already installed\*(-- then the tool will attempt to removed this \fISecurity Provider\fR before exiting.270 .IP "\fB\-file\fR \fI\s-1FILE\s0\fR" 4271 .IX Item "-file FILE"272 Use this option to designate a file to use with a command. When specified with this option, the value is expected to be the fully qualified path of a file accessible by the File System. Depending on the command, the file may be used as input or as output. When this option is omitted from the command line, \f(CW\*(C`STDIN\*(C'\fR will be used instead, as the source of input, and \f(CW\*(C`STDOUT\*(C'\fR will be used instead as the output destination.273 .IP "\fB\-v\fR" 4274 .IX Item "-v"275 Unless specified otherwise, use this option to enable more verbose output.276 .PP277 \fIAdd/Update commands\fR278 .IX Subsection "Add/Update commands"279 .PP280 The \fB\-genkey\fR command281 .IX Subsection "The -genkey command"282 .PP283 Use this command to generate a new key-pair (both private and public keys), and save these credentials in the key store as a \fIKey Entry\fR, associated with the designated (if was specified with the \fB\-alias\fR option) or default (if the \fB\-alias\fR option is omitted) \fIAlias\fR.284 .PP285 The private key material will be protected with a user-defined password (see \fB\-keypass\fR option). The public key on the other hand will be part of a self-signed X.509 certificate, which will form a 1\-element chain and will be saved in the key store.286 .IP "\fB\-alias\fR \fI\s-1ALIAS\s0\fR" 4287 .IX Item "-alias ALIAS"288 See \fICommon Options\fR for more details.289 .IP "\fB\-keyalg\fR \fI\s-1ALGORITHM\s0\fR" 4290 .IX Item "-keyalg ALGORITHM"291 See \fICommon Options\fR for more details.292 .IP "\fB\-keysize\fR \fI\s-1KEY_SIZE\s0\fR" 4293 .IX Item "-keysize KEY_SIZE"294 See \fICommon Options\fR for more details.295 .IP "\fB\-sigalg\fR \fI\s-1ALGORITHM\s0\fR" 4296 .IX Item "-sigalg ALGORITHM"297 The canonical name of the digital signature algorithm to use for signing certificates. If this option is omitted, a default value will be chosen based on the type of the key-pair; i.e. the algorithm that ends up being used by the \-keyalg option. If the key-pair generation algorithm is \f(CW\*(C`DSA\*(C'\fR, the value for the signature algorithm will be \f(CW\*(C`SHA1withDSA\*(C'\fR. If on the other hand the key-pair generation algorithm is \f(CW\*(C`RSA\*(C'\fR, then the tool will use \f(CW\*(C`MD5withRSA\*(C'\fR as the signature algorithm.298 .IP "\fB\-dname\fR \fI\s-1NAME\s0\fR" 4299 .IX Item "-dname NAME"300 This a mandatory value for the command. If no value is specified \-\-i.e. the \fB\-dname\fR option is omitted\*(-- the tool will prompt you to enter a \fIDistinguished Name\fR to use as both the \fIOwner\fR and \fIIssuer\fR of the generated self-signed certificate.301 .Sp302 See \fICommon Options\fR for more details.303 .IP "\fB\-keypass\fR \fI\s-1PASSWORD\s0\fR" 4304 .IX Item "-keypass PASSWORD"305 Use this option to specify the password which the tool will use to protect the newly created \fIKey Entry\fR.306 .Sp307 If this option is omitted, you will be prompted to provide a password.308 .IP "\fB\-validity\fR \fI\s-1DAY_COUNT\s0\fR" 4309 .IX Item "-validity DAY_COUNT"310 See \fICommon Options\fR for more details.311 .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4312 .IX Item "-storetype STORE_TYPE"313 See \fICommon Options\fR for more details.314 .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4315 .IX Item "-keystore URL"316 See \fICommon Options\fR for more details.317 .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4318 .IX Item "-storepass PASSWORD"319 See \fICommon Options\fR for more details.320 .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4321 .IX Item "-provider PROVIDER_CLASS_NAME"322 See \fICommon Options\fR for more details.323 .IP "\fB\-v\fR" 4324 .IX Item "-v"325 See \fICommon Options\fR for more details.326 .PP327 The \fB\-import\fR command328 .IX Subsection "The -import command"329 .PP330 Use this command to read an X.509 certificate, or a PKCS#7 \fICertificate Reply\fR from a designated input source and incorporate the certificates into the key store.331 .PP332 If the \fIAlias\fR does not already exist in the key store, the tool treats the certificate read from the input source as a new \fITrusted Certificate\fR. It then attempts to discover a chain-of-trust, starting from that certificate and ending at another \fITrusted Certificate\fR, already stored in the key store. If the \fB\-trustcacerts\fR option is present, an additional key store, of type \f(CW\*(C`JKS\*(C'\fR named \fIcacerts\fR, and assumed to be present in \fI${\s-1JAVA_HOME\s0}/lib/security\fR will also be consulted if found \-\-\f(CW\*(C`${JAVA_HOME}\*(C'\fR refers to the location of an installed \fIJava Runtime Environment\fR (\s-1JRE\s0). If no chain-of-trust can be established, and unless the \f(CW\*(C`\-noprompt\*(C'\fR option has been specified, the certificate is printed to \f(CW\*(C`STDOUT\*(C'\fR and the user is prompted for a confirmation.333 .PP334 If \fIAlias\fR exists in the key store, the tool will treat the certificate(s) read from the input source as a \fICertificate Reply\fR, which can be a chain of certificates, that eventually would replace the chain of certificates associated with the \fIKey Entry\fR of that \fIAlias\fR. The substitution of the certificates only occurs if a chain-of-trust can be established between the bottom certificate of the chain read from the input file and the \fITrusted Certificates\fR already present in the key store. Again, if the \fB\-trustcacerts\fR option is specified, additional \fITrusted Certificates\fR in the same \fIcacerts\fR key store will be considered. If no chain-of-trust can be established, the operation will abort.335 .IP "\fB\-alias\fR \fI\s-1ALIAS\s0\fR" 4336 .IX Item "-alias ALIAS"337 See \fICommon Options\fR for more details.338 .IP "\fB\-file\fR \fI\s-1FILE\s0\fR" 4339 .IX Item "-file FILE"340 See \fICommon Options\fR for more details.341 .IP "\fB\-keypass\fR \fI\s-1PASSWORD\s0\fR" 4342 .IX Item "-keypass PASSWORD"343 Use this option to specify the password which the tool will use to protect the \fIKey Entry\fR associated with the designated \fIAlias\fR, when replacing this \fIAlias\fR' chain of certificates with that found in the certificate reply.344 .Sp345 If this option is omitted, and the chain-of-trust for the certificate reply has been established, the tool will first attempt to unlock the \fIKey Entry\fR using the same password protecting the key store. If this fails, you will then be prompted to provide a password.346 .IP "\fB\-noprompt\fR" 4347 .IX Item "-noprompt"348 Use this option to prevent the tool from prompting the user.349 .IP "\fB\-trustcacerts\fR" 4350 .IX Item "-trustcacerts"351 Use this option to indicate to the tool that a key store, of type \f(CW\*(C`JKS\*(C'\fR, named \fIcacerts\fR, and usually located in \fIlib/security\fR in an installed \fIJava Runtime Environment\fR should be considered when trying to establish chain-of-trusts.352 .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4353 .IX Item "-storetype STORE_TYPE"354 See \fICommon Options\fR for more details.355 .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4356 .IX Item "-keystore URL"357 See \fICommon Options\fR for more details.358 .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4359 .IX Item "-storepass PASSWORD"360 See \fICommon Options\fR for more details.361 .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4362 .IX Item "-provider PROVIDER_CLASS_NAME"363 See \fICommon Options\fR for more details.364 .IP "\fB\-v\fR" 4365 .IX Item "-v"366 See \fICommon Options\fR for more details.367 .PP368 The \fB\-selfcert\fR command369 .IX Subsection "The -selfcert command"370 .PP371 Use this command to generate a self-signed X.509 version 1 certificate. The newly generated certificate will form a chain of one element which will replace the previous chain associated with the designated \fIAlias\fR (if \fB\-alias\fR option was specified), or the default \fIAlias\fR (if \fB\-alias\fR option was omitted).372 .IP "\fB\-alias\fR \fI\s-1ALIAS\s0\fR" 4373 .IX Item "-alias ALIAS"374 See \fICommon Options\fR for more details.375 .IP "\fB\-sigalg\fR \fI\s-1ALGORITHM\s0\fR" 4376 .IX Item "-sigalg ALGORITHM"377 The canonical name of the digital signature algorithm to use for signing the certificate. If this option is omitted, a default value will be chosen based on the type of the private key associated with the designated \fIAlias\fR. If the private key is a \f(CW\*(C`DSA\*(C'\fR one, the value for the signature algorithm will be \f(CW\*(C`SHA1withDSA\*(C'\fR. If on the other hand the private key is an \f(CW\*(C`RSA\*(C'\fR one, then the tool will use \f(CW\*(C`MD5withRSA\*(C'\fR as the signature algorithm.378 .IP "\fB\-dname\fR \fI\s-1NAME\s0\fR" 4379 .IX Item "-dname NAME"380 Use this option to specify the \fIDistinguished Name\fR of the newly generated self-signed certificate. If this option is omitted, the existing \fIDistinguished Name\fR of the base certificate in the chain associated with the designated \fIAlias\fR will be used instead.381 .Sp382 See \fICommon Options\fR for more details.383 .IP "\fB\-validity\fR \fI\s-1DAY_COUNT\s0\fR" 4384 .IX Item "-validity DAY_COUNT"385 See \fICommon Options\fR for more details.386 .IP "\fB\-keypass\fR \fI\s-1PASSWORD\s0\fR" 4387 .IX Item "-keypass PASSWORD"388 Use this option to specify the password which the tool will use to unlock the \fIKey Entry\fR associated with the designated \fIAlias\fR.389 .Sp390 If this option is omitted, the tool will first attempt to unlock the \fIKey Entry\fR using the same password protecting the key store. If this fails, you will then be prompted to provide a password.391 .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4392 .IX Item "-storetype STORE_TYPE"393 See \fICommon Options\fR for more details.394 .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4395 .IX Item "-keystore URL"396 See \fICommon Options\fR for more details.397 .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4398 .IX Item "-storepass PASSWORD"399 See \fICommon Options\fR for more details.400 .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4401 .IX Item "-provider PROVIDER_CLASS_NAME"402 See \fICommon Options\fR for more details.403 .IP "\fB\-v\fR" 4404 .IX Item "-v"405 See \fICommon Options\fR for more details.406 .PP407 The \fB\-cacert\fR command408 .IX Subsection "The -cacert command"409 .PP410 Use this command to import, a \s-1CA\s0 certificate and add it to the key store as a \fITrusted Certificate\fR. The \fIAlias\fR for this new entry will be constructed from the \s-1FILE\s0's base-name after replacing hyphens and dots with underscores.411 .PP412 This command is useful when used in a script that recursively visits a directory of \s-1CA\s0 certificates to populate a \f(CW\*(C`cacerts.gkr\*(C'\fR \fIKey Store\fR of trusted certificates which can then be used commands that specify the \fB\-trustcacerts\fR option.413 .IP "\fB\-file\fR \fI\s-1FILE\s0\fR" 4414 .IX Item "-file FILE"415 See \fICommon Options\fR for more details.416 .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4417 .IX Item "-storetype STORE_TYPE"418 See \fICommon Options\fR for more details.419 .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4420 .IX Item "-keystore URL"421 See \fICommon Options\fR for more details.422 .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4423 .IX Item "-storepass PASSWORD"424 See \fICommon Options\fR for more details.425 .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4426 .IX Item "-provider PROVIDER_CLASS_NAME"427 See \fICommon Options\fR for more details.428 .IP "\fB\-v\fR" 4429 .IX Item "-v"430 See \fICommon Options\fR for more details.431 .PP432 The \fB\-identitydb\fR command433 .IX Subsection "The -identitydb command"434 .PP435 \&\fB\s-1NOT\s0 \s-1IMPLEMENTED\s0 \s-1YET\s0\fR.436 .PP437 Use this command to import a \s-1JDK\s0 1.1 style Identity Database.438 .IP "\fB\-file\fR \fI\s-1FILE\s0\fR" 4439 .IX Item "-file FILE"440 See \fICommon Options\fR for more details.441 .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4442 .IX Item "-storetype STORE_TYPE"443 See \fICommon Options\fR for more details.444 .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4445 .IX Item "-keystore URL"446 See \fICommon Options\fR for more details.447 .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4448 .IX Item "-storepass PASSWORD"449 See \fICommon Options\fR for more details.450 .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4451 .IX Item "-provider PROVIDER_CLASS_NAME"452 See \fICommon Options\fR for more details.453 .IP "\fB\-v\fR" 4454 .IX Item "-v"455 See \fICommon Options\fR for more details.456 .PP457 \fIExport commands\fR458 .IX Subsection "Export commands"459 .PP460 The \fB\-certreq\fR command461 .IX Subsection "The -certreq command"462 .PP463 Use this command to generate a PKCS#10 \fICertificate Signing Request\fR (\s-1CSR\s0) and write it to a designated output destination. The contents of the destination should look something like the following:464 .PP465 .Vb 6466 \& \-\-\-\-\-BEGIN NEW CERTIFICATE REQUEST\-\-\-\-\-467 \& MI...QAwXzEUMBIGA1UEAwwLcnNuQGdudS5vcmcxGzAZBgNVBAoMElUg468 \& Q2...A0GA1UEBwwGU3lkbmV5MQwwCgYDVQQIDANOU1cxCzAJBgNVBACC469 \& ...470 \& FC...IVwNVOfQLRX+O5kAhQ/a4RTZme2L8PnpvgRwrf7Eg8D6w==471 \& \-\-\-\-\-END NEW CERTIFICATE REQUEST\-\-\-\-\-472 .Ve473 .PP474 \&\fB\s-1IMPORTANT\s0\fR: Some documentation (e.g. \s-1RSA\s0 examples) claims that the \f(CW\*(C`Attributes\*(C'\fR field, in the \s-1CSR\s0 is \f(CW\*(C`OPTIONAL\*(C'\fR while \s-1RFC\-2986\s0 implies the opposite. This implementation considers this field, by default, as \f(CW\*(C`OPTIONAL\*(C'\fR, unless the option \fB\-attributes\fR is specified on the command line.475 .IP "\fB\-alias\fR \fI\s-1ALIAS\s0\fR" 4476 .IX Item "-alias ALIAS"477 See \fICommon Options\fR for more details.478 .IP "\fB\-sigalg\fR \fI\s-1ALGORITHM\s0\fR" 4479 .IX Item "-sigalg ALGORITHM"480 The canonical name of the digital signature algorithm to use for signing the certificate. If this option is omitted, a default value will be chosen based on the type of the private key associated with the designated \fIAlias\fR. If the private key is a \f(CW\*(C`DSA\*(C'\fR one, the value for the signature algorithm will be \f(CW\*(C`SHA1withDSA\*(C'\fR. If on the other hand the private key is an \f(CW\*(C`RSA\*(C'\fR one, then the tool will use \f(CW\*(C`MD5withRSA\*(C'\fR as the signature algorithm.481 .IP "\fB\-file\fR \fI\s-1FILE\s0\fR" 4482 .IX Item "-file FILE"483 See \fICommon Options\fR for more details.484 .IP "\fB\-keypass\fR \fI\s-1PASSWORD\s0\fR" 4485 .IX Item "-keypass PASSWORD"486 Use this option to specify the password which the tool will use to unlock the \fIKey Entry\fR associated with the designated \fIAlias\fR.487 .Sp488 If this option is omitted, the tool will first attempt to unlock the \fIKey Entry\fR using the same password protecting the key store. If this fails, you will then be prompted to provide a password.489 .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4490 .IX Item "-storetype STORE_TYPE"491 See \fICommon Options\fR for more details.492 .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4493 .IX Item "-keystore URL"494 See \fICommon Options\fR for more details.495 .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4496 .IX Item "-storepass PASSWORD"497 See \fICommon Options\fR for more details.498 .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4499 .IX Item "-provider PROVIDER_CLASS_NAME"500 See \fICommon Options\fR for more details.501 .IP "\fB\-v\fR" 4502 .IX Item "-v"503 See \fICommon Options\fR for more details.504 .IP "\fB\-attributes\fR" 4505 .IX Item "-attributes"506 Use this option to force the tool to encode a \f(CW\*(C`NULL\*(C'\fR \s-1DER\s0 value in the \s-1CSR\s0 as the value of the \f(CW\*(C`Attributes\*(C'\fR field.507 .PP508 The \fB\-export\fR command509 .IX Subsection "The -export command"510 .PP511 Use this command to export a certificate stored in a key store to a designated output destination, either in binary format (if the \fB\-v\fR option is specified), or in \s-1RFC\-1421\s0 compliant encoding (if the \fB\-rfc\fR option is specified instead).512 .IP "\fB\-alias\fR \fI\s-1ALIAS\s0\fR" 4513 .IX Item "-alias ALIAS"514 See \fICommon Options\fR for more details.515 .IP "\fB\-file\fR \fI\s-1FILE\s0\fR" 4516 .IX Item "-file FILE"517 See \fICommon Options\fR for more details.518 .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4519 .IX Item "-storetype STORE_TYPE"520 See \fICommon Options\fR for more details.521 .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4522 .IX Item "-keystore URL"523 See \fICommon Options\fR for more details.524 .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4525 .IX Item "-storepass PASSWORD"526 See \fICommon Options\fR for more details.527 .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4528 .IX Item "-provider PROVIDER_CLASS_NAME"529 See \fICommon Options\fR for more details.530 .IP "\fB\-rfc\fR" 4531 .IX Item "-rfc"532 Use \s-1RFC\-1421\s0 specifications when encoding the output.533 .IP "\fB\-v\fR" 4534 .IX Item "-v"535 Output the certificate in binary \s-1DER\s0 encoding. This is the default output format of the command if neither \fB\-rfc\fR nor \f(CW\*(C`\-v\*(C'\fR options were detected on the command line. If both this option and the \fB\-rfc\fR option are detected on the command line, the tool will opt for the \s-1RFC\-1421\s0 style encoding.536 .PP537 \fIDisplay commands\fR538 .IX Subsection "Display commands"539 .PP540 The \fB\-list\fR command541 .IX Subsection "The -list command"542 .PP543 Use this command to print one or all of a key store entries to \f(CW\*(C`STDOUT\*(C'\fR. Usually this command will only print a \fIfingerprint\fR of the certificate, unless either the \fB\-rfc\fR or the \fB\-v\fR option is specified.544 .IP "\fB\-alias\fR \fI\s-1ALIAS\s0\fR" 4545 .IX Item "-alias ALIAS"546 If this option is omitted, the tool will print \s-1ALL\s0 the entries found in the key store.547 .Sp548 See \fICommon Options\fR for more details.549 .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4550 .IX Item "-storetype STORE_TYPE"551 See \fICommon Options\fR for more details.552 .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4553 .IX Item "-keystore URL"554 See \fICommon Options\fR for more details.555 .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4556 .IX Item "-storepass PASSWORD"557 See \fICommon Options\fR for more details.558 .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4559 .IX Item "-provider PROVIDER_CLASS_NAME"560 See \fICommon Options\fR for more details.561 .IP "\fB\-rfc\fR" 4562 .IX Item "-rfc"563 Use \s-1RFC\-1421\s0 specifications when encoding the output.564 .IP "\fB\-v\fR" 4565 .IX Item "-v"566 Output the certificate in human-readable format. If both this option and the \fB\-rfc\fR option are detected on the command line, the tool will opt for the human-readable form and will not abort the command.567 .PP568 The \fB\-printcert\fR command569 .IX Subsection "The -printcert command"570 .PP571 Use this command to read a certificate from a designated input source and print it to \f(CW\*(C`STDOUT\*(C'\fR in a human-readable form.572 .IP "\fB\-file\fR \fI\s-1FILE\s0\fR" 4573 .IX Item "-file FILE"574 See \fICommon Options\fR for more details.575 .IP "\fB\-v\fR" 4576 .IX Item "-v"577 See \fICommon Options\fR for more details.578 .PP579 \fIManagement commands\fR580 .IX Subsection "Management commands"581 .PP582 The \fB\-keyclone\fR command583 .IX Subsection "The -keyclone command"584 .PP585 Use this command to clone an existing \fIKey Entry\fR and store it under a new (different) \fIAlias\fR protecting, its private key material with possibly a new password.586 .IP "\fB\-alias\fR \fI\s-1ALIAS\s0\fR" 4587 .IX Item "-alias ALIAS"588 See \fICommon Options\fR for more details.589 .IP "\fB\-dest\fR \fI\s-1ALIAS\s0\fR" 4590 .IX Item "-dest ALIAS"591 Use this option to specify the new \fIAlias\fR which will be used to identify the cloned copy of the \fIKey Entry\fR.592 .IP "\fB\-keypass\fR \fI\s-1PASSWORD\s0\fR" 4593 .IX Item "-keypass PASSWORD"594 Use this option to specify the password which the tool will use to unlock the \fIKey Entry\fR associated with the designated \fIAlias\fR.595 .Sp596 If this option is omitted, the tool will first attempt to unlock the \fIKey Entry\fR using the same password protecting the key store. If this fails, you will then be prompted to provide a password.597 .IP "\fB\-new\fR \fI\s-1PASSWORD\s0\fR" 4598 .IX Item "-new PASSWORD"599 Use this option to specify the password protecting the private key material of the newly cloned copy of the \fIKey Entry\fR.600 .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4601 .IX Item "-storetype STORE_TYPE"602 See \fICommon Options\fR for more details.603 .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4604 .IX Item "-keystore URL"605 See \fICommon Options\fR for more details.606 .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4607 .IX Item "-storepass PASSWORD"608 See \fICommon Options\fR for more details.609 .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4610 .IX Item "-provider PROVIDER_CLASS_NAME"611 See \fICommon Options\fR for more details.612 .IP "\fB\-v\fR" 4613 .IX Item "-v"614 See \fICommon Options\fR for more details.615 .PP616 The \fB\-storepasswd\fR command617 .IX Subsection "The -storepasswd command"618 .PP619 Use this command to change the password protecting a key store.620 .IP "\fB\-new\fR \fI\s-1PASSWORD\s0\fR" 4621 .IX Item "-new PASSWORD"622 The new, and different, password which will be used to protect the designated key store.623 .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4624 .IX Item "-storetype STORE_TYPE"625 See \fICommon Options\fR for more details.626 .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4627 .IX Item "-keystore URL"628 See \fICommon Options\fR for more details.629 .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4630 .IX Item "-storepass PASSWORD"631 See \fICommon Options\fR for more details.632 .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4633 .IX Item "-provider PROVIDER_CLASS_NAME"634 See \fICommon Options\fR for more details.635 .IP "\fB\-v\fR" 4636 .IX Item "-v"637 See \fICommon Options\fR for more details.638 .PP639 The \fB\-keypasswd\fR command640 .IX Subsection "The -keypasswd command"641 .PP642 Use this command to change the password protecting the private key material of a designated \fIKey Entry\fR.643 .IP "\fB\-alias\fR \fI\s-1ALIAS\s0\fR" 4644 .IX Item "-alias ALIAS"645 See \fICommon Options\fR for more details.646 .Sp647 Use this option to specify the password which the tool will use to unlock the \fIKey Entry\fR associated with the designated \fIAlias\fR.648 .Sp649 If this option is omitted, the tool will first attempt to unlock the \fIKey Entry\fR using the same password protecting the key store. If this fails, you will then be prompted to provide a password.650 .IP "\fB\-new\fR \fI\s-1PASSWORD\s0\fR" 4651 .IX Item "-new PASSWORD"652 The new, and different, password which will be used to protect the private key material of the designated \fIKey Entry\fR.653 .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4654 .IX Item "-storetype STORE_TYPE"655 See \fICommon Options\fR for more details.656 .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4657 .IX Item "-keystore URL"658 See \fICommon Options\fR for more details.659 .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4660 .IX Item "-storepass PASSWORD"661 See \fICommon Options\fR for more details.662 .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4663 .IX Item "-provider PROVIDER_CLASS_NAME"664 See \fICommon Options\fR for more details.665 .IP "\fB\-v\fR" 4666 .IX Item "-v"667 See \fICommon Options\fR for more details.668 .PP669 The \fB\-delete\fR command670 .IX Subsection "The -delete command"671 .PP672 Use this command to delete a designated key store entry.673 .IP "\fB\-alias\fR \fI\s-1ALIAS\s0\fR" 4674 .IX Item "-alias ALIAS"675 See \fICommon Options\fR for more details.676 .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4677 .IX Item "-storetype STORE_TYPE"678 See \fICommon Options\fR for more details.679 .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4680 .IX Item "-keystore URL"681 See \fICommon Options\fR for more details.682 .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4683 .IX Item "-storepass PASSWORD"684 See \fICommon Options\fR for more details.685 .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4686 .IX Item "-provider PROVIDER_CLASS_NAME"687 See \fICommon Options\fR for more details.688 .IP "\fB\-v\fR" 4689 .IX Item "-v"690 See \fICommon Options\fR for more details.691 .SH "SEE ALSO"692 .IX Header "SEE ALSO" -
libjava/classpath/doc/gnative2ascii.1
diff -Naur gcc-4.3.3.orig/libjava/classpath/doc/gnative2ascii.1 gcc-4.3.3/libjava/classpath/doc/gnative2ascii.1
old new 1 .\" Automatically generated by Pod::Man 2.16 (Pod::Simple 3.05)2 .\"3 .\" Standard preamble:4 .\" ========================================================================5 .de Sh \" Subsection heading6 .br7 .if t .Sp8 .ne 59 .PP10 \fB\\$1\fR11 .PP12 ..13 .de Sp \" Vertical space (when we can't use .PP)14 .if t .sp .5v15 .if n .sp16 ..17 .de Vb \" Begin verbatim text18 .ft CW19 .nf20 .ne \\$121 ..22 .de Ve \" End verbatim text23 .ft R24 .fi25 ..26 .\" Set up some character translations and predefined strings. \*(-- will27 .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left28 .\" double quote, and \*(R" will give a right double quote. \*(C+ will29 .\" give a nicer C++. Capital omega is used to do unbreakable dashes and30 .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff,31 .\" nothing in troff, for use with C<>.32 .tr \(*W-33 .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'34 .ie n \{\35 . ds -- \(*W-36 . ds PI pi37 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch38 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch39 . ds L" ""40 . ds R" ""41 . ds C` ""42 . ds C' ""43 'br\}44 .el\{\45 . ds -- \|\(em\|46 . ds PI \(*p47 . ds L" ``48 . ds R" ''49 'br\}50 .\"51 .\" Escape single quotes in literal strings from groff's Unicode transform.52 .ie \n(.g .ds Aq \(aq53 .el .ds Aq '54 .\"55 .\" If the F register is turned on, we'll generate index entries on stderr for56 .\" titles (.TH), headers (.SH), subsections (.Sh), items (.Ip), and index57 .\" entries marked with X<> in POD. Of course, you'll have to process the58 .\" output yourself in some meaningful fashion.59 .ie \nF \{\60 . de IX61 . tm Index:\\$1\t\\n%\t"\\$2"62 ..63 . nr % 064 . rr F65 .\}66 .el \{\67 . de IX68 ..69 .\}70 .\"71 .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).72 .\" Fear. Run. Save yourself. No user-serviceable parts.73 . \" fudge factors for nroff and troff74 .if n \{\75 . ds #H 076 . ds #V .8m77 . ds #F .3m78 . ds #[ \f179 . ds #] \fP80 .\}81 .if t \{\82 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)83 . ds #V .6m84 . ds #F 085 . ds #[ \&86 . ds #] \&87 .\}88 . \" simple accents for nroff and troff89 .if n \{\90 . ds ' \&91 . ds ` \&92 . ds ^ \&93 . ds , \&94 . ds ~ ~95 . ds /96 .\}97 .if t \{\98 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"99 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'100 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'101 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'102 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'103 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'104 .\}105 . \" troff and (daisy-wheel) nroff accents106 .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'107 .ds 8 \h'\*(#H'\(*b\h'-\*(#H'108 .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]109 .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'110 .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'111 .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]112 .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]113 .ds ae a\h'-(\w'a'u*4/10)'e114 .ds Ae A\h'-(\w'A'u*4/10)'E115 . \" corrections for vroff116 .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'117 .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'118 . \" for low resolution devices (crt and lpr)119 .if \n(.H>23 .if \n(.V>19 \120 \{\121 . ds : e122 . ds 8 ss123 . ds o a124 . ds d- d\h'-1'\(ga125 . ds D- D\h'-1'\(hy126 . ds th \o'bp'127 . ds Th \o'LP'128 . ds ae ae129 . ds Ae AE130 .\}131 .rm #[ #] #H #V #F C132 .\" ========================================================================133 .\"134 .IX Title "GNATIVE2ASCII 1"135 .TH GNATIVE2ASCII 1 "2009-01-24" "0.96-pre" "GNU"136 .\" For nroff, turn off justification. Always turn off hyphenation; it makes137 .\" way too many mistakes in technical documents.138 .if n .ad l139 .nh140 .SH "NAME"141 gnative2ascii \- \- An encoding converter142 .SH "SYNOPSIS"143 .IX Header "SYNOPSIS"144 gnative2ascii [\fI\s-1OPTIONS\s0\fR]... [\fI\s-1INPUTFILE\s0\fR [\fI\s-1OUTPUTFILE\s0\fR]]145 .SH "DESCRIPTION"146 .IX Header "DESCRIPTION"147 To be written ...148 .SH "OPTIONS"149 .IX Header "OPTIONS"150 .IP "\fB\-encoding\fR \fI\s-1NAME\s0\fR" 4151 .IX Item "-encoding NAME"152 Set the encoding to use.153 .IP "\fB\-reversed\fR" 4154 .IX Item "-reversed"155 Convert from encoding to native.156 .PP157 Standard options:158 .IP "\fB\-help\fR" 4159 .IX Item "-help"160 Print help text, then exit.161 .IP "\fB\-version\fR" 4162 .IX Item "-version"163 Print version number, then exit.164 .IP "\fB\-J\fR\fI\s-1OPTION\s0\fR" 4165 .IX Item "-JOPTION"166 Pass argument to the Java runtime.167 .SH "SEE ALSO"168 .IX Header "SEE ALSO"169 \&\fIjavac\fR\|(1), ... -
libjava/classpath/doc/gorbd.1
diff -Naur gcc-4.3.3.orig/libjava/classpath/doc/gorbd.1 gcc-4.3.3/libjava/classpath/doc/gorbd.1
old new 1 .\" Automatically generated by Pod::Man 2.16 (Pod::Simple 3.05)2 .\"3 .\" Standard preamble:4 .\" ========================================================================5 .de Sh \" Subsection heading6 .br7 .if t .Sp8 .ne 59 .PP10 \fB\\$1\fR11 .PP12 ..13 .de Sp \" Vertical space (when we can't use .PP)14 .if t .sp .5v15 .if n .sp16 ..17 .de Vb \" Begin verbatim text18 .ft CW19 .nf20 .ne \\$121 ..22 .de Ve \" End verbatim text23 .ft R24 .fi25 ..26 .\" Set up some character translations and predefined strings. \*(-- will27 .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left28 .\" double quote, and \*(R" will give a right double quote. \*(C+ will29 .\" give a nicer C++. Capital omega is used to do unbreakable dashes and30 .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff,31 .\" nothing in troff, for use with C<>.32 .tr \(*W-33 .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'34 .ie n \{\35 . ds -- \(*W-36 . ds PI pi37 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch38 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch39 . ds L" ""40 . ds R" ""41 . ds C` ""42 . ds C' ""43 'br\}44 .el\{\45 . ds -- \|\(em\|46 . ds PI \(*p47 . ds L" ``48 . ds R" ''49 'br\}50 .\"51 .\" Escape single quotes in literal strings from groff's Unicode transform.52 .ie \n(.g .ds Aq \(aq53 .el .ds Aq '54 .\"55 .\" If the F register is turned on, we'll generate index entries on stderr for56 .\" titles (.TH), headers (.SH), subsections (.Sh), items (.Ip), and index57 .\" entries marked with X<> in POD. Of course, you'll have to process the58 .\" output yourself in some meaningful fashion.59 .ie \nF \{\60 . de IX61 . tm Index:\\$1\t\\n%\t"\\$2"62 ..63 . nr % 064 . rr F65 .\}66 .el \{\67 . de IX68 ..69 .\}70 .\"71 .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).72 .\" Fear. Run. Save yourself. No user-serviceable parts.73 . \" fudge factors for nroff and troff74 .if n \{\75 . ds #H 076 . ds #V .8m77 . ds #F .3m78 . ds #[ \f179 . ds #] \fP80 .\}81 .if t \{\82 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)83 . ds #V .6m84 . ds #F 085 . ds #[ \&86 . ds #] \&87 .\}88 . \" simple accents for nroff and troff89 .if n \{\90 . ds ' \&91 . ds ` \&92 . ds ^ \&93 . ds , \&94 . ds ~ ~95 . ds /96 .\}97 .if t \{\98 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"99 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'100 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'101 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'102 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'103 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'104 .\}105 . \" troff and (daisy-wheel) nroff accents106 .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'107 .ds 8 \h'\*(#H'\(*b\h'-\*(#H'108 .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]109 .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'110 .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'111 .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]112 .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]113 .ds ae a\h'-(\w'a'u*4/10)'e114 .ds Ae A\h'-(\w'A'u*4/10)'E115 . \" corrections for vroff116 .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'117 .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'118 . \" for low resolution devices (crt and lpr)119 .if \n(.H>23 .if \n(.V>19 \120 \{\121 . ds : e122 . ds 8 ss123 . ds o a124 . ds d- d\h'-1'\(ga125 . ds D- D\h'-1'\(hy126 . ds th \o'bp'127 . ds Th \o'LP'128 . ds ae ae129 . ds Ae AE130 .\}131 .rm #[ #] #H #V #F C132 .\" ========================================================================133 .\"134 .IX Title "GORBD 1"135 .TH GORBD 1 "2009-01-24" "0.96-pre" "GNU"136 .\" For nroff, turn off justification. Always turn off hyphenation; it makes137 .\" way too many mistakes in technical documents.138 .if n .ad l139 .nh140 .SH "NAME"141 gorbd \- \- An object request broker daemon142 .SH "SYNOPSIS"143 .IX Header "SYNOPSIS"144 gorbd ...145 .SH "DESCRIPTION"146 .IX Header "DESCRIPTION"147 To be written ...148 .SH "OPTIONS"149 .IX Header "OPTIONS"150 .IP "\fB\-ORBInitialPort\fR \fI\s-1PORT\s0\fR" 4151 .IX Item "-ORBInitialPort PORT"152 Port on which persistent naming service is to be started.153 .IP "\fB\-ior\fR \fI\s-1FILE\s0\fR" 4154 .IX Item "-ior FILE"155 File in which to store persistent naming service's \s-1IOR\s0 reference156 .IP "\fB\-directory\fR \fI\s-1DIR\s0\fR" 4157 .IX Item "-directory DIR"158 Directory in which to store persistent data.159 .IP "\fB\-restart\fR" 4160 .IX Item "-restart"161 Restart persistent naming service, clearing persistent naming162 database.163 .PP164 Standard options:165 .IP "\fB\-help\fR" 4166 .IX Item "-help"167 Print help text, then exit.168 .IP "\fB\-version\fR" 4169 .IX Item "-version"170 Print version number, then exit.171 .IP "\fB\-J\fR\fI\s-1OPTION\s0\fR" 4172 .IX Item "-JOPTION"173 Pass argument to the Java runtime.174 .SH "SEE ALSO"175 .IX Header "SEE ALSO"176 \&\fIjava\fR\|(1), ... -
libjava/classpath/doc/grmid.1
diff -Naur gcc-4.3.3.orig/libjava/classpath/doc/grmid.1 gcc-4.3.3/libjava/classpath/doc/grmid.1
old new 1 .\" Automatically generated by Pod::Man 2.16 (Pod::Simple 3.05)2 .\"3 .\" Standard preamble:4 .\" ========================================================================5 .de Sh \" Subsection heading6 .br7 .if t .Sp8 .ne 59 .PP10 \fB\\$1\fR11 .PP12 ..13 .de Sp \" Vertical space (when we can't use .PP)14 .if t .sp .5v15 .if n .sp16 ..17 .de Vb \" Begin verbatim text18 .ft CW19 .nf20 .ne \\$121 ..22 .de Ve \" End verbatim text23 .ft R24 .fi25 ..26 .\" Set up some character translations and predefined strings. \*(-- will27 .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left28 .\" double quote, and \*(R" will give a right double quote. \*(C+ will29 .\" give a nicer C++. Capital omega is used to do unbreakable dashes and30 .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff,31 .\" nothing in troff, for use with C<>.32 .tr \(*W-33 .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'34 .ie n \{\35 . ds -- \(*W-36 . ds PI pi37 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch38 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch39 . ds L" ""40 . ds R" ""41 . ds C` ""42 . ds C' ""43 'br\}44 .el\{\45 . ds -- \|\(em\|46 . ds PI \(*p47 . ds L" ``48 . ds R" ''49 'br\}50 .\"51 .\" Escape single quotes in literal strings from groff's Unicode transform.52 .ie \n(.g .ds Aq \(aq53 .el .ds Aq '54 .\"55 .\" If the F register is turned on, we'll generate index entries on stderr for56 .\" titles (.TH), headers (.SH), subsections (.Sh), items (.Ip), and index57 .\" entries marked with X<> in POD. Of course, you'll have to process the58 .\" output yourself in some meaningful fashion.59 .ie \nF \{\60 . de IX61 . tm Index:\\$1\t\\n%\t"\\$2"62 ..63 . nr % 064 . rr F65 .\}66 .el \{\67 . de IX68 ..69 .\}70 .\"71 .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).72 .\" Fear. Run. Save yourself. No user-serviceable parts.73 . \" fudge factors for nroff and troff74 .if n \{\75 . ds #H 076 . ds #V .8m77 . ds #F .3m78 . ds #[ \f179 . ds #] \fP80 .\}81 .if t \{\82 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)83 . ds #V .6m84 . ds #F 085 . ds #[ \&86 . ds #] \&87 .\}88 . \" simple accents for nroff and troff89 .if n \{\90 . ds ' \&91 . ds ` \&92 . ds ^ \&93 . ds , \&94 . ds ~ ~95 . ds /96 .\}97 .if t \{\98 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"99 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'100 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'101 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'102 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'103 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'104 .\}105 . \" troff and (daisy-wheel) nroff accents106 .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'107 .ds 8 \h'\*(#H'\(*b\h'-\*(#H'108 .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]109 .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'110 .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'111 .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]112 .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]113 .ds ae a\h'-(\w'a'u*4/10)'e114 .ds Ae A\h'-(\w'A'u*4/10)'E115 . \" corrections for vroff116 .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'117 .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'118 . \" for low resolution devices (crt and lpr)119 .if \n(.H>23 .if \n(.V>19 \120 \{\121 . ds : e122 . ds 8 ss123 . ds o a124 . ds d- d\h'-1'\(ga125 . ds D- D\h'-1'\(hy126 . ds th \o'bp'127 . ds Th \o'LP'128 . ds ae ae129 . ds Ae AE130 .\}131 .rm #[ #] #H #V #F C132 .\" ========================================================================133 .\"134 .IX Title "GRMID 1"135 .TH GRMID 1 "2009-01-24" "0.96-pre" "GNU"136 .\" For nroff, turn off justification. Always turn off hyphenation; it makes137 .\" way too many mistakes in technical documents.138 .if n .ad l139 .nh140 .SH "NAME"141 grmid \- \- RMI activation system daemon142 .SH "SYNOPSIS"143 .IX Header "SYNOPSIS"144 grmid [\fI\s-1OPTIONS\s0\fR]...145 .SH "DESCRIPTION"146 .IX Header "DESCRIPTION"147 \&\fBrmiregistry\fR starts a remote object registry on the current148 host. If no port number is specified, then port 1099 is used.149 .SH "OPTIONS"150 .IX Header "OPTIONS"151 Activation process control:152 .IP "\fB\-port\fR \fI\s-1PORT\s0\fR" 4153 .IX Item "-port PORT"154 Port on which activation system is to be started.155 .IP "\fB\-restart\fR" 4156 .IX Item "-restart"157 Restart activation system, clearing persistent naming database, if158 any.159 .IP "\fB\-stop\fR" 4160 .IX Item "-stop"161 Stop activation system.162 .PP163 Persistence:164 .IP "\fB\-persistent\fR" 4165 .IX Item "-persistent"166 Make activation system persistent.167 .IP "\fB\-directory\fR \fI\s-1DIR\s0\fR" 4168 .IX Item "-directory DIR"169 Directory in which to store persistent data.170 .PP171 Debugging:172 .IP "\fB\-verbose\fR" 4173 .IX Item "-verbose"174 Log binding events to standard out.175 .PP176 Standard options:177 .IP "\fB\-help\fR" 4178 .IX Item "-help"179 Print help text, then exit.180 .IP "\fB\-version\fR" 4181 .IX Item "-version"182 Print version number, then exit.183 .IP "\fB\-J\fR\fI\s-1OPTION\s0\fR" 4184 .IX Item "-JOPTION"185 Pass argument to the Java runtime.186 .SH "SEE ALSO"187 .IX Header "SEE ALSO"188 \&\fIjava\fR\|(1), ... -
libjava/classpath/doc/grmiregistry.1
diff -Naur gcc-4.3.3.orig/libjava/classpath/doc/grmiregistry.1 gcc-4.3.3/libjava/classpath/doc/grmiregistry.1