Re: Further Defenses for the Security Manager

2015-01-15 Thread Michael Maass
Is there a standard corpus of applets that Oracle would use to test this kind of feature? I am need of an applet corpus and I am wondering if there is something out there already that you folks use. Michael On 12/19/2014 07:47 PM, Jeff Nisewanger wrote: Thank you for contacting us and

Re: com.sun.crypto.provider.GHASH performance fix

2015-01-15 Thread Anthony Scarpino
On 01/15/2015 03:10 AM, Florian Weimer wrote: On 08/18/2014 02:32 PM, Florian Weimer wrote: This change addresses a severe performance regression, first introduced in JDK 8, triggered by the negotiation of a GCM cipher suite in the TLS implementation. This regression is a result of the poor

Re: com.sun.crypto.provider.GHASH performance fix

2015-01-15 Thread Florian Weimer
On 01/15/2015 08:31 PM, Michael StJohns wrote: Just for curiosity, what was the improvement in performance? Tim Whittington posted independent benchmark numbers here: http://mail.openjdk.java.net/pipermail/security-dev/2014-November/011458.html He could reproduce the 10x improvement quoted

Re: com.sun.crypto.provider.GHASH performance fix

2015-01-15 Thread Anthony Scarpino
Florian had posted months back about it giving 10x improvement. Hardware acceleration is an separate project as it is mostly changes to hotspot. Tony On Jan 15, 2015, at 11:31 AM, Michael StJohns mstjo...@comcast.net wrote: Just for curiosity, what was the improvement in performance?

Re: com.sun.crypto.provider.GHASH performance fix

2015-01-15 Thread Michael StJohns
Just for curiosity, what was the improvement in performance? I'm wondering if it might be worthwhile to see if its possible to add a plugin to use the hardware instructions: http://www.intel.com/content/dam/www/public/us/en/documents/white-papers/communications-ia-galois-counter-mode-paper.pdf

Re: RFR: JDK-8068748: missing US_export_policy.jar in jdk9-b44 is causing compilation errors building jdk9 source code

2015-01-15 Thread Bradford Wetmore
Looks good, thanks for fixing this! Brad On 1/15/2015 3:05 AM, Erik Joelsson wrote: Hello, Please review the open part of this patch, which changes the building of policy jars to happen even if BUILD_CRYPTO is false. Previously these weren't built as there were signed versions of these

JDK 9 RFR of JDK-8069127: Suppress deprecation warnings in jdk.deploy.osx module

2015-01-15 Thread joe darcy
Hello, Please review these simple changes to address a few stray deprecation warnings in the jdk.deploy.osx module: JDK-8069127: Suppress deprecation warnings in jdk.deploy.osx module http://cr.openjdk.java.net/~darcy/8069127.0/ The patch is ---

Re: JDK 9 RFR of JDK-8069127: Suppress deprecation warnings in jdk.deploy.osx module

2015-01-15 Thread Bradford Wetmore
Looks good. Thanks. Brad On 1/15/2015 4:39 PM, joe darcy wrote: Hello, Please review these simple changes to address a few stray deprecation warnings in the jdk.deploy.osx module: JDK-8069127: Suppress deprecation warnings in jdk.deploy.osx module

RFR: JDK-8068748: missing US_export_policy.jar in jdk9-b44 is causing compilation errors building jdk9 source code

2015-01-15 Thread Erik Joelsson
Hello, Please review the open part of this patch, which changes the building of policy jars to happen even if BUILD_CRYPTO is false. Previously these weren't built as there were signed versions of these jars, but since we no longer sign them, there is no need to not build them. Bug:

Re: DSA with keylength 1024 no longer accepted

2015-01-15 Thread Seán Coffey
Hi Peter, security-dev is best mailing list to discuss this issue, I'm cc'ing that list and bcc'ing off jdk7u-dev. Are you hitting this issue with JDK 8 and later ? (I'll assume so) - You've hit https://bugs.openjdk.java.net/browse/JDK-8039921 To aid compatibility, it's been decided to relax

Re: com.sun.crypto.provider.GHASH performance fix

2015-01-15 Thread Florian Weimer
On 08/18/2014 02:32 PM, Florian Weimer wrote: This change addresses a severe performance regression, first introduced in JDK 8, triggered by the negotiation of a GCM cipher suite in the TLS implementation. This regression is a result of the poor performance of the implementation of the GHASH