Skip to content
This repository has been archived by the owner. It is now read-only.
Permalink
Browse files
8240777: Update all nroff manpages for JDK 15 release
Reviewed-by: dholmes
  • Loading branch information
pavelrappo committed Jul 24, 2020
1 parent 8a9d2b0 commit 922ba8da30d4ab8007837e40c3e48acf700439ab
Show file tree
Hide file tree
Showing 29 changed files with 485 additions and 435 deletions.

Large diffs are not rendered by default.

@@ -1,4 +1,4 @@
.\" Copyright (c) 1994, 2019, Oracle and/or its affiliates. All rights reserved.
.\" Copyright (c) 2019, 2020, Oracle and/or its affiliates. All rights reserved.
.\" DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
.\"
.\" This code is free software; you can redistribute it and/or modify it
@@ -21,7 +21,7 @@
.\"
.\" Automatically generated by Pandoc 2.3.1
.\"
.TH "JFR" "1" "2020" "JDK 14" "JDK Commands"
.TH "JFR" "1" "2020" "JDK 15" "JDK Commands"
.hy
.SH NAME
.PP
@@ -1,5 +1,5 @@
.\"t
.\" Copyright (c) 1994, 2019, Oracle and/or its affiliates. All rights reserved.
.\" Copyright (c) 1998, 2020, Oracle and/or its affiliates. All rights reserved.
.\" DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
.\"
.\" This code is free software; you can redistribute it and/or modify it
@@ -22,7 +22,7 @@
.\"
.\" Automatically generated by Pandoc 2.3.1
.\"
.TH "KEYTOOL" "1" "2020" "JDK 14" "JDK Commands"
.TH "KEYTOOL" "1" "2020" "JDK 15" "JDK Commands"
.hy
.SH NAME
.PP
@@ -101,6 +101,16 @@ It can also display other security\-related information.
.PP
The \f[CB]keytool\f[R] command stores the keys and certificates in a
keystore.
.PP
The \f[CB]keytool\f[R] command uses the
\f[CB]jdk.certpath.disabledAlgorithms\f[R] and
\f[CB]jdk.security.legacyAlgorithms\f[R] security properties to determine
which algorithms are considered a security risk.
It emits warnings when disabled or legacy algorithms are being used.
The \f[CB]jdk.certpath.disabledAlgorithms\f[R] and
\f[CB]jdk.security.legacyAlgorithms\f[R] security properties are defined
in the \f[CB]java.security\f[R] file (located in the JDK\[aq]s
\f[CB]$JAVA_HOME/conf/security\f[R] directory).
.SH COMMAND AND OPTION NOTES
.PP
The following notes apply to the descriptions in \f[B]Commands and
@@ -260,12 +270,10 @@ For example,
.PP
\f[B]Note:\f[R]
.PP
For compatibility reasons, the SunPKCS11 and OracleUcrypto providers can
still be loaded with
\f[CB]\-providerclass\ sun.security.pkcs11.SunPKCS11\f[R] and
\f[CB]\-providerclass\ com.oracle.security.crypto.UcryptoProvider\f[R]
even if they are now defined in modules.
These are the only modules included in JDK that need a configuration,
For compatibility reasons, the SunPKCS11 provider can still be loaded
with \f[CB]\-providerclass\ sun.security.pkcs11.SunPKCS11\f[R] even if it
is now defined in a module.
This is the only module included in the JDK that needs a configuration,
and therefore the most widely used with the \f[CB]\-providerclass\f[R]
option.
For legacy security providers located on classpath and loaded by
@@ -2199,8 +2207,7 @@ file.
The security properties file is called \f[CB]java.security\f[R], and
resides in the security properties directory:
.IP \[bu] 2
\f[B]Oracle Solaris, Linux, and OS X:\f[R]
\f[CB]java.home/lib/security\f[R]
\f[B]Linux and OS X:\f[R] \f[CB]java.home/lib/security\f[R]
.IP \[bu] 2
\f[B]Windows:\f[R] \f[CB]java.home\\lib\\security\f[R]
.PP
@@ -2477,24 +2484,19 @@ A certificates file named \f[CB]cacerts\f[R] resides in the security
properties directory:
.RS
.IP \[bu] 2
\f[B]Oracle Solaris, Linux, and OS X:\f[R]
\f[I]JAVA_HOME\f[R]\f[CB]/lib/security\f[R]
\f[B]Linux and OS X:\f[R] \f[I]JAVA_HOME\f[R]\f[CB]/lib/security\f[R]
.IP \[bu] 2
\f[B]Windows:\f[R] \f[I]JAVA_HOME\f[R]\f[CB]\\lib\\security\f[R]
.PP
\f[I]JAVA_HOME\f[R] is the runtime environment directory, which is the
\f[CB]jre\f[R] directory in the JDK or the top\-level directory of the
Java Runtime Environment (JRE).
.PP
The \f[CB]cacerts\f[R] file represents a system\-wide keystore with CA
certificates.
System administrators can configure and manage that file with the
\f[CB]keytool\f[R] command by specifying \f[CB]jks\f[R] as the keystore
type.
The \f[CB]cacerts\f[R] keystore file ships with a default set of root CA
certificates.
For Oracle Solaris, Linux, OS X, and Windows, you can list the default
certificates with the following command:
For Linux, OS X, and Windows, you can list the default certificates with
the following command:
.RS
.PP
\f[CB]keytool\ \-list\ \-cacerts\f[R]
@@ -2518,10 +2520,10 @@ bundled in the \f[CB]cacerts\f[R] file and make your own trust decisions.
.PP
To remove an untrusted CA certificate from the \f[CB]cacerts\f[R] file,
use the \f[CB]\-delete\f[R] option of the \f[CB]keytool\f[R] command.
You can find the \f[CB]cacerts\f[R] file in the JRE installation
directory.
You can find the \f[CB]cacerts\f[R] file in the JDK\[aq]s
\f[CB]$JAVA_HOME/lib/security\f[R] directory.
Contact your system administrator if you don\[aq]t have permission to
edit this file
edit this file.
.RE
.TP
.B Internet RFC 1421 Certificate Encoding Standard
@@ -2672,7 +2674,7 @@ fingerprints, as follows:
\f[R]
.fi
.PP
\f[B]Oracle Solaris Example:\f[R]
\f[B]Linux Example:\f[R]
.PP
View the certificate first with the \f[CB]\-printcert\f[R] command or the
\f[CB]\-importcert\f[R] command without the \f[CB]\-noprompt\f[R] option.
@@ -2743,7 +2745,7 @@ it can generate certificates that don\[aq]t conform to the standard,
such as self\-signed certificates that would be used for internal
testing purposes.
Certificates that don\[aq]t conform to the standard might be rejected by
JRE or other applications.
the JDK or other applications.
Users should ensure that they provide the correct options for
\f[CB]\-dname\f[R], \f[CB]\-ext\f[R], and so on.
.SH IMPORT A NEW TRUSTED CERTIFICATE
@@ -1,4 +1,4 @@
.\" Copyright (c) 1994, 2019, Oracle and/or its affiliates. All rights reserved.
.\" Copyright (c) 1998, 2020, Oracle and/or its affiliates. All rights reserved.
.\" DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
.\"
.\" This code is free software; you can redistribute it and/or modify it
@@ -21,7 +21,7 @@
.\"
.\" Automatically generated by Pandoc 2.3.1
.\"
.TH "RMID" "1" "2020" "JDK 14" "JDK Commands"
.TH "RMID" "1" "2020" "JDK 15" "JDK Commands"
.hy
.SH NAME
.PP
@@ -38,6 +38,12 @@ See \f[B]Options for rmid\f[R].
.RE
.SH DESCRIPTION
.PP
\f[B]Deprecation Notice:\f[R] The rmid tool and the RMI Activation
mechanism have been deprecated and may be removed from a future version
of the platform.
See \f[B]JEP 385\f[R] [https://openjdk.java.net/jeps/385] for further
information.
.PP
The \f[CB]rmid\f[R] command starts the activation system daemon.
The activation system daemon must be started before objects that can be
activated are either registered with the activation system or activated
@@ -79,11 +85,10 @@ and a registry on the registry\[aq]s default port, 1099.
.PP
\f[CB]rmid\ \-J\-Djava.security.policy=rmid.policy\ \-port\ 1099\f[R]
.RE
.SH START RMID ON DEMAND (ORACLE SOLARIS AND LINUX ONLY)
.SH START RMID ON DEMAND (LINUX ONLY)
.PP
An alternative to starting \f[CB]rmid\f[R] from the command line is to
configure \f[CB]inetd\f[R] (Oracle Solaris) or \f[CB]xinetd\f[R] (Linux) to
start \f[CB]rmid\f[R] on demand.
configure \f[CB]xinetd\f[R] (Linux) to start \f[CB]rmid\f[R] on demand.
.PP
When RMID starts, it attempts to obtain an inherited channel (inherited
from \f[CB]inetd\f[R]/\f[CB]xinetd\f[R]) by calling the
@@ -257,14 +262,14 @@ It is safe to grant these permissions universally because only the
An example policy file that grants various execute permissions to the
\f[CB]rmid\f[R] command is:
.IP \[bu] 2
\f[B]Oracle Solaris:\f[R]
\f[B]Linux:\f[R]
.RS 2
.IP
.nf
\f[CB]
grant\ {
\ \ \ \ permission\ com.sun.rmi.rmid.ExecPermission
\ \ \ \ \ \ \ \ "/files/apps/java/jdk1.7.0/solaris/bin/java";
\ \ \ \ \ \ \ \ "/files/apps/java/jdk1.7.0/linux/bin/java";

\ \ \ \ permission\ com.sun.rmi.rmid.ExecPermission
\ \ \ \ \ \ \ \ "/files/apps/rmidcmds/*";
@@ -314,15 +319,13 @@ By default, the version of the \f[CB]java\f[R] command found in
\f[CB]java.home\f[R] is used (the same one that the \f[CB]rmid\f[R] command
uses), and doesn\[aq]t need to be specified in the policy file.
The second permission allows the \f[CB]rmid\f[R] command to execute any
command in either the directory \f[CB]/files/apps/rmidcmds\f[R] (Oracle
Solaris, Linux, and macOS) or the directory
\f[CB]c:\\files\\apps\\rmidcmds\\\f[R] (Windows).
command in either the directory \f[CB]/files/apps/rmidcmds\f[R] (Linux and
macOS) or the directory \f[CB]c:\\files\\apps\\rmidcmds\\\f[R] (Windows).
.PP
The third permission granted, \f[CB]ExecOptionPermission\f[R], allows the
\f[CB]rmid\f[R] command to start an activation group that defines the
security policy file to be either \f[CB]/files/policies/group.policy\f[R]
(Oracle Solaris) or \f[CB]c:\\files\\policies\\group.policy\f[R]
(Windows).
(Linux) or \f[CB]c:\\files\\policies\\group.policy\f[R] (Windows).
The next permission allows the \f[CB]java.security.debug\ property\f[R] to
be used by an activation group.
The last permission allows any property in the
@@ -1,4 +1,4 @@
.\" Copyright (c) 1994, 2019, Oracle and/or its affiliates. All rights reserved.
.\" Copyright (c) 1997, 2020, Oracle and/or its affiliates. All rights reserved.
.\" DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
.\"
.\" This code is free software; you can redistribute it and/or modify it
@@ -21,7 +21,7 @@
.\"
.\" Automatically generated by Pandoc 2.3.1
.\"
.TH "RMIREGISTRY" "1" "2020" "JDK 14" "JDK Commands"
.TH "RMIREGISTRY" "1" "2020" "JDK 15" "JDK Commands"
.hy
.SH NAME
.PP
@@ -1,4 +1,4 @@
.\" Copyright (c) 1994, 2019, Oracle and/or its affiliates. All rights reserved.
.\" Copyright (c) 2006, 2020, Oracle and/or its affiliates. All rights reserved.
.\" DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
.\"
.\" This code is free software; you can redistribute it and/or modify it
@@ -21,7 +21,7 @@
.\"
.\" Automatically generated by Pandoc 2.3.1
.\"
.TH "JRUNSCRIPT" "1" "2020" "JDK 14" "JDK Commands"
.TH "JRUNSCRIPT" "1" "2020" "JDK 15" "JDK Commands"
.hy
.SH NAME
.PP
@@ -1,4 +1,4 @@
.\" Copyright (c) 1994, 2019, Oracle and/or its affiliates. All rights reserved.
.\" Copyright (c) 2019, 2020, Oracle and/or its affiliates. All rights reserved.
.\" DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
.\"
.\" This code is free software; you can redistribute it and/or modify it
@@ -21,7 +21,7 @@
.\"
.\" Automatically generated by Pandoc 2.3.1
.\"
.TH "JAOTC" "1" "2020" "JDK 14" "JDK Commands"
.TH "JAOTC" "1" "2020" "JDK 15" "JDK Commands"
.hy
.SH NAME
.PP
@@ -1,4 +1,4 @@
.\" Copyright (c) 1994, 2019, Oracle and/or its affiliates. All rights reserved.
.\" Copyright (c) 1994, 2020, Oracle and/or its affiliates. All rights reserved.
.\" DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
.\"
.\" This code is free software; you can redistribute it and/or modify it
@@ -21,7 +21,7 @@
.\"
.\" Automatically generated by Pandoc 2.3.1
.\"
.TH "JAVAC" "1" "2020" "JDK 14" "JDK Commands"
.TH "JAVAC" "1" "2020" "JDK 15" "JDK Commands"
.hy
.SH NAME
.PP
@@ -1027,7 +1027,7 @@ Note that the following lists have no line\-continuation characters.
.PP
Create a file named \f[CB]options\f[R] that contains the following:
.PP
\f[B]Oracle Solaris, Linux, and macOS:\f[R]
\f[B]Linux and macOS:\f[R]
.IP
.nf
\f[CB]
@@ -1274,7 +1274,7 @@ This example compiles the \f[CB]Aloha.java\f[R], \f[CB]GutenTag.java\f[R],
\f[CB]Hello.java\f[R], and \f[CB]Hi.java\f[R] source files in the
\f[CB]greetings\f[R] package.
.PP
\f[B]Oracle Solaris, Linux, and macOS:\f[R]
\f[B]Linux and macOS:\f[R]
.IP
.nf
\f[CB]
@@ -1300,7 +1300,7 @@ Aloha.java\ \ \ \ \ \ \ \ \ \ GutenTag.java\ \ \ \ \ \ \ Hello.java\ \ \ \ \ \ \
After changing one of the source files in the previous example,
recompile it:
.PP
\f[B]Oracle Solaris, Linux, and macOS:\f[R]
\f[B]Linux and macOS:\f[R]
.IP
.nf
\f[CB]
@@ -1330,7 +1330,7 @@ you are in, then add the examples directory to the user class path by
setting \f[CB]CLASSPATH\f[R].
This example uses the \f[CB]\-classpath\f[R] option.
.PP
\f[B]Oracle Solaris, Linux, and macOS:\f[R]
\f[B]Linux and macOS:\f[R]
.RS
.PP
\f[CB]javac\ \-classpath\ /examples\ /examples/greetings/Hi.java\f[R]
@@ -1345,7 +1345,7 @@ This example uses the \f[CB]\-classpath\f[R] option.
If you change \f[CB]greetings.Hi\f[R] to use a banner utility, then that
utility also needs to be accessible through the user class path.
.PP
\f[B]Oracle Solaris, Linux, and macOS:\f[R]
\f[B]Linux and macOS:\f[R]
.IP
.nf
\f[CB]
@@ -1367,7 +1367,7 @@ To execute a class in the \f[CB]greetings\f[R] package, the program needs
access to the \f[CB]greetings\f[R] package, and to the classes that the
\f[CB]greetings\f[R] classes use.
.PP
\f[B]Oracle Solaris, Linux, and macOS:\f[R]
\f[B]Linux and macOS:\f[R]
.RS
.PP
\f[CB]java\ \-classpath\ /examples:/lib/Banners.jar\ greetings.Hi\f[R]
@@ -1571,7 +1571,7 @@ hierarchy\f[R].
.PP
While \f[CB]javac\f[R] is fairly relaxed about the organization of source
code, beyond the expectation that source will be organized in one or
package hierarchies, and can generally accomodate organizations
package hierarchies, and can generally accommodate organizations
prescribed by development environments and build tools, Java tools in
general, and \f[CB]javac\f[R] and the Java launcher in particular, are
more stringent regarding the organization of compiled class files, and
@@ -2105,7 +2105,7 @@ annotation.
For example:
.RS
.IP \[bu] 2
\f[B]Oracle Solaris, Linux, and macOS:\f[R]
\f[B]Linux and macOS:\f[R]
\f[CB]javac\ \-Xlint:path\ \-classpath\ /nonexistentpath\ Example.java\f[R]
.IP \[bu] 2
\f[B]Windows:\f[R]
@@ -1,4 +1,4 @@
.\" Copyright (c) 1994, 2019, Oracle and/or its affiliates. All rights reserved.
.\" Copyright (c) 1997, 2020, Oracle and/or its affiliates. All rights reserved.
.\" DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
.\"
.\" This code is free software; you can redistribute it and/or modify it
@@ -21,7 +21,7 @@
.\"
.\" Automatically generated by Pandoc 2.3.1
.\"
.TH "SERIALVER" "1" "2020" "JDK 14" "JDK Commands"
.TH "SERIALVER" "1" "2020" "JDK 15" "JDK Commands"
.hy
.SH NAME
.PP

0 comments on commit 922ba8d

Please sign in to comment.