JDK 16 Early Access build 26 is now available

Previous Topic Next Topic
classic Classic list List threaded Threaded
1 message Options
Reply | Threaded
Open this post in threaded view

JDK 16 Early Access build 26 is now available

Rory O'Donnell
Hi All,

OpenJDK 16 Early Access build 26 is now available at http://jdk.java.net/16
  • Schedule: JDK 16 Rampdown Phase One Starts on 2020/12/10 [1]
  • Features [1]: Most recent Integrations:
    • Integrated JEP 389: Foreign Linker API (Incubator) with this release.
      • JEP 389 introduces an API that offers statically-typed, pure-Java access to native code.
      • This API, together with the JEP 383, will considerably simplify the otherwise error-prone process of binding to a native library.
  • Release Notes [2]
  • Changes in recent builds that maybe of interest:
    • Build 26
      • JDK-8202343: Disable TLS 1.0 and 1.1
      • JDK-8251317: Support for CLDR version 38
      • JDK-8212879: Make JVMTI TagMap table concurrent
      • JDK-8236926: Concurrently uncommit memory in G1
      • JDK-8243559: Removed Root Certificates with 1024-bit Keys
      • JDK-8253459: Argument index of zero or unrepresentable by int throws IllegalFormatException
      • JDK-8256643: Terminally deprecate ThreadGroup stop, destroy, isDestroyed, setDaemon and isDaemon
    • Build 25
      • JDK-8247781: Day period support added to java.time formats
      • JDK-8202471: (ann) Cannot read type annotations on generic receiver type's type variables [Reported by ByteBuddy]
      • JDK-8255947: [macos] Signed macOS jpackage app doesn't filter spurious '-psn' argument [Reported by JOSM]
      • JDK-8256063: Module::getPackages returns the set of package names in this module

Project Lanai Early-Access: EA 7 Build 16-lanai+3-278 (2020/11/17)

The Java Cryptographic Roadmap has been updated [3]:

  • Distrust TLS 1.0 and TLS 1.1 by default
    • TLS protocol versions 1.0 and 1.1 are no longer considered secure and have been superseded by more secure and modern versions (TLS 1.2 and 1.3). This change has been integrated with JDK 16 Early Access build 26.
  • Upgrade of default algorithms used to encrypt PKCS12 keystores
    • The new algorithms are based on AES-256 and SHA-256 and are stronger than the old algorithms which were based on RC2, DESede, and SHA-1.This change is already included in JDK 16 Early Access build 23.

[1] https://openjdk.java.net/projects/jdk/16/
[2] https://jdk.java.net/16/release-notes
[3] https://www.java.com/en/jre-jdk-cryptoroadmap.html
Rgds, Rory O'Donnell
Quality Engineering Manager
Oracle EMEA, Dublin, Ireland