Re: endpoint identification algorithm, only in "1.2"?

2014-10-08 Thread Xuelei Fan
On 10/9/2014 7:06 AM, Bernd Eckenfels wrote: > Hello, > > the JCE algorithm specification > > http://docs.oracle.com/javase/7/docs/technotes/guides/security/StandardNames.html > > states for TLS: > > "... The Java SE 7 release supports endpoint identification algorithms > for TLS 1.2. The algor

endpoint identification algorithm, only in "1.2"?

2014-10-08 Thread Bernd Eckenfels
Hello, the JCE algorithm specification http://docs.oracle.com/javase/7/docs/technotes/guides/security/StandardNames.html states for TLS: "... The Java SE 7 release supports endpoint identification algorithms for TLS 1.2. The algorithm name can be passed to the setEndpointIdentificationAlgorithm

Re: [concurrency-interest] Here's why Atomic*FieldReference access checking is broken

2014-10-08 Thread √iktor Ҡlang
Hi Peter, can you quantify: " is almost no additional runtime overhead."? On Wed, Oct 8, 2014 at 11:38 AM, Peter Levart wrote: > On 10/05/2014 10:44 PM, Peter Levart wrote: > >> The 3rd report shows a result of experimental AtomicIntegerFieldUpdater >> implementation which loads new VM-anonymou

Re: [tls] On 8059818 Keytool does not recognize jssecacerts for -trustcacerts command line option

2014-10-08 Thread Sean Mullan
On 10/08/2014 08:14 AM, Wang Weijun wrote: On Oct 8, 2014, at 23:00, Sean Mullan wrote: I agree that we should not read jssecacerts by default. My vote would be to extend -trustcacerts to take an optional path to a cacerts file but fallback on lib/security/cacerts if not specified. No key

Re: [tls] On 8059818 Keytool does not recognize jssecacerts for -trustcacerts command line option

2014-10-08 Thread Wang Weijun
On Oct 8, 2014, at 23:00, Sean Mullan wrote: > > I agree that we should not read jssecacerts by default. My vote would be to > extend -trustcacerts to take an optional path to a cacerts file but fallback > on lib/security/cacerts if not specified. No keytool option takes an optional argument

Re: [tls] On 8059818 Keytool does not recognize jssecacerts for -trustcacerts command line option

2014-10-08 Thread Sean Mullan
On 10/08/2014 01:57 AM, Wang Weijun wrote: On Oct 8, 2014, at 16:01, Xuelei Fan wrote: It looks strange to me now that this keytool command cannot specify the customized trusted anchor sources. Normally, the key store of the trust anchor should be customizable so that users can use the trust

Re: [concurrency-interest] Here's why Atomic*FieldReference access checking is broken

2014-10-08 Thread Peter Levart
On 10/08/2014 01:19 PM, Doug Lea wrote: On 10/08/2014 05:38 AM, Peter Levart wrote: http://cr.openjdk.java.net/~plevart/jdk9-dev/AtomicFieldUpdater.AccessChecks/AnonClassPerCclass/AtomicIntegerFieldUpdater.java Paul Sandoz has been working on VarHandles (like MethodHandles) for similar p

Re: RFR 8044215: Unable to initiate SpNego using a S4U2Proxy GSSCredential (Krb5ProxyCredential)

2014-10-08 Thread Wang Weijun
Ping again. --Max On Sep 28, 2014, at 16:55, Wang Weijun wrote: > Please review the fix at > > http://cr.openjdk.java.net/~weijun/8044215/webrev.00 > > If a service is using constrained delegation to act as a client, it should > not be able to request for a traditional delegation to anothe

Re: [concurrency-interest] Here's why Atomic*FieldReference access checking is broken

2014-10-08 Thread Peter Levart
On 10/08/2014 12:23 PM, √iktor Ҡlang wrote: Hi Peter, can you quantify: " is almost no additional runtime overhead."? Limited to AtomicIntegerFieldUpdater, all individual modifying operations that map directly to Unsafe intrinsics benchmarked with JMH tests run at same speed as normal Java v

Re: [concurrency-interest] Here's why Atomic*FieldReference access checking is broken

2014-10-08 Thread Doug Lea
On 10/08/2014 05:38 AM, Peter Levart wrote: http://cr.openjdk.java.net/~plevart/jdk9-dev/AtomicFieldUpdater.AccessChecks/AnonClassPerCclass/AtomicIntegerFieldUpdater.java Paul Sandoz has been working on VarHandles (like MethodHandles) for similar purposes. Possibly even the same purposes. Se

Re: [concurrency-interest] Here's why Atomic*FieldReference access checking is broken

2014-10-08 Thread Peter Levart
On 10/05/2014 10:44 PM, Peter Levart wrote: The 3rd report shows a result of experimental AtomicIntegerFieldUpdater implementation which loads new VM-anonymous class for each new instance which allows VM compiler to specialize code for a particular field. Such implementation is nearly as fast a

Re: [tls] On 8059818 Keytool does not recognize jssecacerts for -trustcacerts command line option

2014-10-08 Thread Wang Weijun
On Oct 8, 2014, at 16:01, Xuelei Fan wrote: > It looks strange to me now that this keytool command cannot specify the > customized trusted anchor sources. Normally, the key store of the trust > anchor should be customizable so that users can use the trust anchor > other than the cacerts key sto

Re: RFR: 8004488 wrong permissions checked in krb5

2014-10-08 Thread Wang Weijun
Code change looks fine. Thanks Max On Oct 8, 2014, at 16:27, Seán Coffey wrote: > Ping. > > regards, > Sean. > > On 02/10/2014 17:34, Seán Coffey wrote: >> I'm looking to backport this fix to JDK 7u code line. The fix applies pretty >> much as is with the JDK 8 fix with the exception of not

Re: request for review : 8052406: SSLv2Hello protocol may be filtered out unexpectedly

2014-10-08 Thread Xuelei Fan
Looks fine to me. Thanks for take care of the backport. Xuelei On 10/8/2014 4:25 PM, Seán Coffey wrote: > Ping. > > regards, > Sean. > > On 02/10/2014 10:19, Seán Coffey wrote: >> I should have prefixed my comments with point that this is a request >> for review given the changes. Subject upda

Re: RFR: 8004488 wrong permissions checked in krb5

2014-10-08 Thread Seán Coffey
Ping. regards, Sean. On 02/10/2014 17:34, Seán Coffey wrote: I'm looking to backport this fix to JDK 7u code line. The fix applies pretty much as is with the JDK 8 fix with the exception of not having to deal with a ServiceCreds tgt variable (Krb5Util.java) which was only introduced in JDK 8

Re: request for review : 8052406: SSLv2Hello protocol may be filtered out unexpectedly

2014-10-08 Thread Seán Coffey
Ping. regards, Sean. On 02/10/2014 10:19, Seán Coffey wrote: I should have prefixed my comments with point that this is a request for review given the changes. Subject updated. regards, Sean. On 01/10/2014 17:23, Seán Coffey wrote: Turned out that I do need to make a change to this backport.

Re: [tls] On 8059818 Keytool does not recognize jssecacerts for -trustcacerts command line option

2014-10-08 Thread Xuelei Fan
On 10/8/2014 3:33 PM, Wang Weijun wrote: > > On Oct 8, 2014, at 12:25, Xuelei Fan wrote: > >> On 10/8/2014 12:21 PM, Wang Weijun wrote: >>> There are two keystores here. -keystore points to user's keystore that >>> keytool will save into. cacerts is a read-only keystore that is used to >>> fin

Re: [tls] On 8059818 Keytool does not recognize jssecacerts for -trustcacerts command line option

2014-10-08 Thread Wang Weijun
On Oct 8, 2014, at 12:25, Xuelei Fan wrote: > On 10/8/2014 12:21 PM, Wang Weijun wrote: >> There are two keystores here. -keystore points to user's keystore that >> keytool will save into. cacerts is a read-only keystore that is used to find >> trusted certs. > Got it. > > Is it possible to a