Re: RFR[9] JDK-8171297: ProblemList javax/net/ssl/DTLS/PacketLossRetransmission.java due to JDK-8169086
Ok. Xuelei On 12/14/2016 9:54 PM, John Jiang wrote: Hi, javax/net/ssl/DTLS/PacketLossRetransmission.java has failed for several times on macosx-x64 platform. It should put it into ProblemList. Please review the below patch: diff -r 49b3d6d9b4df test/ProblemList.txt --- a/test/ProblemList.txtThu Dec 15 10:47:46 2016 +0530 +++ b/test/ProblemList.txtThu Dec 15 05:52:04 2016 + @@ -217,6 +217,8 @@ sun/security/ssl/SSLSocketImpl/AsyncSSLSocketClose.java 8161232 macosx-all +javax/net/ssl/DTLS/PacketLossRetransmission.java 8169086 macosx-x64 + # jdk_sound Best regards, John Jiang
RFR[9] JDK-8171297: ProblemList javax/net/ssl/DTLS/PacketLossRetransmission.java due to JDK-8169086
Hi, javax/net/ssl/DTLS/PacketLossRetransmission.java has failed for several times on macosx-x64 platform. It should put it into ProblemList. Please review the below patch: diff -r 49b3d6d9b4df test/ProblemList.txt --- a/test/ProblemList.txtThu Dec 15 10:47:46 2016 +0530 +++ b/test/ProblemList.txtThu Dec 15 05:52:04 2016 + @@ -217,6 +217,8 @@ sun/security/ssl/SSLSocketImpl/AsyncSSLSocketClose.java 8161232 macosx-all +javax/net/ssl/DTLS/PacketLossRetransmission.java 8169086 macosx-x64 + # jdk_sound Best regards, John Jiang
Re: RFR[9] JDK-8164595: javax/net/ssl/FixingJavadocs/SSLSessionNulls.java fails intermittently with javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake
Looks fine to me. Thanks, Xuelei On 12/14/2016 12:13 AM, John Jiang wrote: Because of the push for JDK-8170329, the patch has to depend on the new SSLSocketTemplate. Please review the new webrev: http://cr.openjdk.java.net/~jjiang/8164595/webrev.02/ Best regards, John Jiang On 2016/11/23 13:38, John Jiang wrote: Please review this patch. Thanks! John Jiang On 2016/11/19 19:38, John Jiang wrote: After push for JDK-8168969, this fix has to use updated SSLSocketTemplate.java. Please review the updated webrev: http://cr.openjdk.java.net/~jjiang/8164595/webrev.01 Best regards, John Jiang On 2016/10/27 12:36, John Jiang wrote: Hi, Please review this patch for test javax/net/ssl/FixingJavadocs/SSLSessionNulls.java. It takes advantage of javax/net/ssl/templates/SSLTest.java to fix the intermittent SSLHandshakeException issue. Webrev: http://cr.openjdk.java.net/~jjiang/8164595/webrev.00/ Issue: https://bugs.openjdk.java.net/browse/JDK-8164595 Best regards, John Jiang
Re: RFR 8171190: Bump reference of NIST 800-57 Part 1 Rev 3 to Rev 4 in JarSigner API spec
7680 itself is 192 bits, and for any bitLength greater than 7680 I treat it as in a "higher" level. --Max > On Dec 14, 2016, at 5:19 PM, Bernd Eckenfelswrote: > > Hello, > > I noticed in the existing code: Is the comment "256 bits" referring to the > 'comparable strength'? > > # if (bitLength > 7680) { // 256 bits > > If so, it seems misleading, according to table 2 this would be 192 bit. Maybe > this can be corrected, removed or the meaning of the comment clarified. > > Gruss > Bernd > -- > http://bernd.eckenfels.net
Re: RFR 8171190: Bump reference of NIST 800-57 Part 1 Rev 3 to Rev 4 in JarSigner API spec
Hello, I noticed in the existing code: Is the comment "256 bits" referring to the 'comparable strength'? # if (bitLength > 7680) { // 256 bits If so, it seems misleading, according to table 2 this would be 192 bit. Maybe this can be corrected, removed or the meaning of the comment clarified. Gruss Bernd -- http://bernd.eckenfels.net _ From: Wang WeijunSent: Mittwoch, Dezember 14, 2016 4:39 AM Subject: RFR 8171190: Bump reference of NIST 800-57 Part 1 Rev 3 to Rev 4 in JarSigner API spec To: NIST 800-57 Part 1 has a new revision. The lines below are newly introduced in jdk9. diff --git a/src/java.base/share/classes/sun/security/x509/AlgorithmId.java b/src/java.base/share/classes/sun/security/x509/AlgorithmId.java --- a/src/java.base/share/classes/sun/security/x509/AlgorithmId.java +++ b/src/java.base/share/classes/sun/security/x509/AlgorithmId.java @@ -1024,7 +1024,7 @@ } } -// Values from SP800-57 part 1 rev 3 tables 2 and three +// Values from SP800-57 part 1 rev 4 tables 2 and 3 private static String ecStrength (int bitLength) { if (bitLength >= 512) { // 256 bits of strength return "SHA512"; @@ -1035,7 +1035,7 @@ } } -// same values for RSA and DSA +// Same values for RSA and DSA private static String ifcFfcStrength (int bitLength) { if (bitLength > 7680) { // 256 bits return "SHA512"; diff --git a/src/jdk.jartool/share/classes/jdk/security/jarsigner/JarSigner.java b/src/jdk.jartool/share/classes/jdk/security/jarsigner/JarSigner.java --- a/src/jdk.jartool/share/classes/jdk/security/jarsigner/JarSigner.java +++ b/src/jdk.jartool/share/classes/jdk/security/jarsigner/JarSigner.java @@ -430,7 +430,7 @@ * SHA384withECDSA for a 384-bit EC key. * * @implNote This implementation makes use of comparable strengths - * as defined in Tables 2 and 3 of NIST SP 800-57 Part 1-Rev.3. + * as defined in Tables 2 and 3 of NIST SP 800-57 Part 1-Rev.4. * Specifically, if a DSA or RSA key with a key size greater than 7680 * bits, or an EC key with a key size greater than or equal to 512 bits, * SHA-512 will be used as the hash function for the signature. Thanks Max