Hi David & Richard,
OpenJDK 16
Early Access build 26 is now
available at
http://jdk.java.net/16
- These early-access , open-source builds are provided under
the
- Schedule: JDK 16 Rampdown Phase One Starts on 2020/12/10
[1]
- Features [1]: Most recent Integrations:
- Integrated JEP 389: Foreign Linker
API (Incubator) with this release.
- JEP 389 introduces an API that offers statically-typed,
pure-Java access to native code.
- This API, together with the JEP 383,
will considerably simplify the otherwise error-prone
process of binding to a native library.
- Changes in recent builds that maybe of interest:
- Build 26
- JDK-8202343: Disable TLS 1.0 and 1.1
- JDK-8251317: Support for CLDR version 38
- JDK-8212879: Make JVMTI TagMap table concurrent
- JDK-8236926: Concurrently uncommit memory in G1
- JDK-8243559: Removed Root Certificates with 1024-bit Keys
- JDK-8253459: Argument index of zero or unrepresentable by
int throws IllegalFormatException
- JDK-8256643: Terminally deprecate ThreadGroup stop,
destroy, isDestroyed, setDaemon and isDaemon
- Build 25
- JDK-8247781: Day period support added to java.time formats
- JDK-8202471: (ann) Cannot read type annotations on generic
receiver type's type variables [Reported by
ByteBuddy]
- JDK-8255947: [macos] Signed macOS jpackage app doesn't
filter spurious '-psn' argument [Reported by
JOSM]
- JDK-8256063: Module::getPackages returns the set of
package names in this module
- JDK 16 - topics of interest
- Inside Java Episode 7 “The Vector API” with John Rose and
Paul Sandoz
- Biased locking Obsoletion update
- Project Loom with Ron Pressler
- Update on 64-bit ARM Support for Oracle OpenJDK and Oracle
JDK
Project Lanai Early-Access: EA
7 Build 16-lanai+3-278 (2020/11/17)
The Java Cryptographic Roadmap has been updated [3]:
- Distrust TLS 1.0 and TLS 1.1 by default
- TLS protocol versions 1.0 and 1.1 are no longer considered
secure and have been superseded by more secure and modern
versions (TLS 1.2 and 1.3). This change has been integrated
with JDK 16 Early Access build 26.
- Upgrade of default algorithms used to encrypt PKCS12 keystores
- The new algorithms are based on AES-256 and SHA-256 and are
stronger than the old algorithms which were based on RC2,
DESede, and SHA-1.This change is already included in JDK 16
Early Access build 23.
RgdsRory
[1] https://openjdk.java.net/projects/jdk/16/
[2] https://jdk.java.net/16/release-notes
[3] https://www.java.com/en/jre-jdk-cryptoroadmap.html
--
Rgds, Rory O'Donnell
Quality Engineering Manager
Oracle EMEA, Dublin, Ireland