Re: RFR: 8276348: Use blessed modifier order in java.base

2021-11-02 Thread Martin Buchholz
On Tue, 2 Nov 2021 19:14:23 GMT, Pavel Rappo wrote: >> Pragmatically, fix the script to ignore those keywords on comment lines. >> Learn Perl, its just a regular expression pattern match and replace >> expression. >> >> All of the changes have to be manually reviewed by the author and then th

Re: RFR: 8276348: Use blessed modifier order in java.base

2021-11-02 Thread Martin Buchholz
On Tue, 2 Nov 2021 16:30:56 GMT, Pavel Rappo wrote: > This PR follows up one of the recent PRs, where I used a non-canonical > modifier order. Since the problem was noticed [^1], why not to address it at > mass? > > As far as I remember, the first mass-canonicalization of modifiers took place

Integrated: 8252412: [macos11] system dynamic libraries removed from filesystem

2021-01-26 Thread Martin Buchholz
On Sun, 17 Jan 2021 20:24:44 GMT, Martin Buchholz wrote: > 8252412: [macos11] system dynamic libraries removed from filesystem This pull request has now been integrated. Changeset: c836da38 Author: Martin Buchholz URL: https://git.openjdk.java.net/jdk/commit/c836da38 Stats:

Re: RFR: 8252412: [macos11] system dynamic libraries removed from filesystem [v2]

2021-01-26 Thread Martin Buchholz
On Sat, 23 Jan 2021 02:03:01 GMT, Valerie Peng wrote: >> Martin Buchholz has refreshed the contents of this pull request, and >> previous commits have been removed. The incremental views will show >> differences compared to the previous content of the PR. > > Marked

Re: RFR: JDK-8235903: GCC default -fno-common exposes "multiple definition" link errors

2019-12-15 Thread Martin Buchholz
forwarded to other teams for review. On Fri, Dec 13, 2019 at 3:14 AM Patrick Zhang OS < patr...@os.amperecomputing.com> wrote: > Hi > > Please review this patch, if it should be reviewed by any group other than > core-libs, please help forward it. Thanks. > > JBS: https://bugs.openjdk.java.net/br

Re: RFR: JDK-8225392: Comparison builds are failing due to cacerts file

2019-06-12 Thread Martin Buchholz
s long as the certs and their aliases are > unchanged, the output cacerts will always be the same. I can send out a > code review today. > > > > Thanks, > > Max > > > >> On Jun 12, 2019, at 10:59 AM, Weijun Wang > wrote: > >> > >> Good idea

Re: RFR 8076190: Customizing the generation of a PKCS12 keystore

2018-10-10 Thread Martin Buchholz
On Wed, Oct 10, 2018 at 3:10 AM, Weijun Wang wrote: > > > > On Oct 10, 2018, at 1:07 AM, Martin Buchholz > wrote: > > > > Seems alright to this non-crypto expert. > > > > The key thing I would like to see working is: > > > > If I create a keyst

Re: RFR 8076190: Customizing the generation of a PKCS12 keystore

2018-10-09 Thread Martin Buchholz
Seems alright to this non-crypto expert. The key thing I would like to see working is: If I create a keystore for cacerts and then use it via -with-cacerts-file taking the defaults, this results in goodness (which presumably means not getting JKS keystore) Make sure keystore creators don't have

Re: RFR: JDK-8200178 Remove mapfiles for JDK native libraries

2018-03-28 Thread Martin Buchholz
On Wed, Mar 28, 2018 at 3:14 PM, Magnus Ihse Bursie < magnus.ihse.bur...@oracle.com> wrote: > On 2018-03-28 23:53, Martin Buchholz wrote: > > I can't find any documentation for what JNIEXPORT and friends actually do. > People including myself have been cargo-culting JN

Re: RFR: JDK-8200178 Remove mapfiles for JDK native libraries

2018-03-28 Thread Martin Buchholz
I can't find any documentation for what JNIEXPORT and friends actually do. People including myself have been cargo-culting JNIEXPORT and JNICALL for decades. Why aren't they in the JNI spec? --- It's fishy that the attribute externally_visible (which seems very interesting!) is ARM specific. #

Re: RFR: 8194960: Add a test for trust manager and cacerts keystore sanity

2018-01-16 Thread Martin Buchholz
On Mon, Jan 15, 2018 at 7:47 PM, Weijun Wang wrote: > Hi Martin > > This is fine as a test. I don't know which is the recommended call, but > "keytool -list -cacerts" also does it. > > The test uses an API that adds a layer of abstraction, not exposing the presence of a cacerts file. > BTW, usu

RFR: 8194960: Add a test for trust manager and cacerts keystore sanity

2018-01-11 Thread Martin Buchholz
https://bugs.openjdk.java.net/browse/JDK-8194960 http://cr.openjdk.java.net/~martin/webrevs/jdk/CacertsExplorer/ I have no idea what I'm doing, so review this carefully. Is this really the recommended way to list all the cacerts?

Re: RFR: [Updated] Update tables in java.base to be HTML5-friendly.

2017-05-10 Thread Martin Buchholz
Looks good. --- I suspect there's some way to specify the styles more compactly, but I don't know enough css to say. --- +table.borderless thead tr th, table.borderless tbody tr th, table.borderless tr th, +table.plain > thead > tr > th, table.plain > tbody > tr > th, table.plain > tr > th, I

Re: RFR: Update tables in java.base to be HTML5-friendly.

2017-05-03 Thread Martin Buchholz
Jonathan Gibbons for "css style czar"! --- I checked the tables at http://cr.openjdk.java.net/~jjg/8179479-8179592/api/java/util/concurrent/BlockingDeque.html They look perfectly fine, although I feel a twinge of non-collapsed-border-nostalgia. --- Yes, "striped" is a much better name than "al

Re: RFR: Update tables in java.base to be HTML5-friendly.

2017-05-03 Thread Martin Buchholz
Jon, I am happy for you to own the html5 style for the entire javadoc; consistency wins; my comments are only suggestions and I'm no html or css expert. On Wed, May 3, 2017 at 5:03 PM, Jonathan Gibbons < jonathan.gibb...@oracle.com> wrote: > > > On 05/03/2017 04:39 PM, M

Re: RFR: Update tables in java.base to be HTML5-friendly.

2017-05-03 Thread Martin Buchholz
Thanks, Jon. For the Deque/Queue tables - * + * I expected that we would modify these to which rendered alright and is compliant (although "border" is a weird boolean) and makes the "border intent" clear to humans and to browsers. THIS IS JAVA, so I'd prefer more verbose meaningful names for

Re: RFR: 8173581 : performance regression in com/sun/crypto/provider/OutputFeedback.java

2017-01-30 Thread Martin Buchholz
I judge this to be more serious than P3, even though correctness is not affected, since production services have noticed unacceptable performance regressions. On Mon, Jan 30, 2017 at 12:08 PM, Sean Mullan wrote: > The fix looks ok to me, but I would also like Valerie to review it since > she is

Re: RFR 8166976: TestCipherPBECons has wrong @run line

2016-09-30 Thread Martin Buchholz
On Fri, Sep 30, 2016 at 11:14 AM, Bradford Wetmore < bradford.wetm...@oracle.com> wrote: > Looks fine. Looks like a copy/paste error. Good catch. > > If you want to be consistent, you could do the same with the others in > this directory, or just the one. > It would be a fine project to delete

RFR 8166976: TestCipherPBECons has wrong @run line

2016-09-30 Thread Martin Buchholz
https://bugs.openjdk.java.net/browse/JDK-8166976 http://cr.openjdk.java.net/~martin/webrevs/openjdk9/TestCipherPBECons/

Re: RFR: JDK-8156584: Initialization race in sun.security.x509.AlgorithmId.get

2016-05-13 Thread Martin Buchholz
Pushed. Xuelei, would you like to do the paperwork for the follow-on jdk8 backport? On Fri, May 13, 2016 at 4:58 PM, Xuelei Fan wrote: > On 5/14/2016 3:50 AM, Martin Buchholz wrote: >> Hi Xuelei, >> >> The jdk9 version is still up in the air. I propose committing: >>

Re: RFR: JDK-8156584: Initialization race in sun.security.x509.AlgorithmId.get

2016-05-13 Thread Martin Buchholz
Hi Xuelei, The jdk9 version is still up in the air. I propose committing: http://cr.openjdk.java.net/~martin/webrevs/openjdk9/AlgorithmId-get-race/ On Thu, May 12, 2016 at 5:01 PM, Xuelei Fan wrote: > On 5/13/2016 3:00 AM, Martin Buchholz wrote: >> I have a new simpler webrev follo

Re: RFR: JDK-8156584: Initialization race in sun.security.x509.AlgorithmId.get

2016-05-12 Thread Martin Buchholz
tin, > > If you agree with the update, I will sponsor your contribution for the > testing and integration for JDK 9. > > Thanks, > Xuelei > > On 5/12/2016 2:27 PM, Martin Buchholz wrote: >> Xuelei, >> >> I again invite you to take ownership of this change. >>

Re: RFR: JDK-8156584: Initialization race in sun.security.x509.AlgorithmId.get

2016-05-11 Thread Martin Buchholz
. But we can also use the default initial capacity (16) if you prefer. On Wed, May 11, 2016 at 10:54 PM, Xuelei Fan wrote: > On 5/12/2016 1:21 PM, Martin Buchholz wrote: >> Hi Xuelei, >> >> I think the non-test code will work well with any set of providers, >> but is optim

Re: RFR: JDK-8156584: Initialization race in sun.security.x509.AlgorithmId.get

2016-05-11 Thread Martin Buchholz
plications may customize > Security providers and more OID numbers may get removed/added later, so > the oid number may be not a fixed hard-coded number. It may be easier > to maintain the code if using the default initial capacity of HashMap. > > Thanks, > Xuelei > > > On

Re: RFR: JDK-8156584: Initialization race in sun.security.x509.AlgorithmId.get

2016-05-11 Thread Martin Buchholz
Webrev updated. Still looking for crypto-collaborator. On Tue, May 10, 2016 at 12:43 PM, Martin Buchholz wrote: > https://bugs.openjdk.java.net/browse/JDK-8156584 > http://cr.openjdk.java.net/~martin/webrevs/openjdk8/AlgorithmId-get-race/ > > I'm not a crypto engineer, so I&#x

RFR: JDK-8156584: Initialization race in sun.security.x509.AlgorithmId.get

2016-05-10 Thread Martin Buchholz
https://bugs.openjdk.java.net/browse/JDK-8156584 http://cr.openjdk.java.net/~martin/webrevs/openjdk8/AlgorithmId-get-race/ I'm not a crypto engineer, so I'm hoping someone on security-dev adopts this fix. But current webrev is intended to be a complete fix for jdk8.

Re: [concurrency-interest] ThreadLocalRandom clinit troubles

2014-07-18 Thread Martin Buchholz
ksandr Otenko" < > oleksandr.ote...@oracle.com>: > > Can someone summarize what happened? >> >> SecureRandom used to get entropy from /dev/random, which is configurable >> through a policy file to /dev/urandom. Has this changed? >> >> Alex >> >>

Re: ThreadLocalRandom clinit troubles

2014-07-11 Thread Martin Buchholz
Thanks to Peter for digging into the secure seed generator classes and coming up with a patch. Openjdk security folks, please review. I confess to getting lost whenever I try to orient myself in the twisty maze of seed generator implementation files. Anyways, it seems important to have prngs lik

Re: [concurrency-interest] ThreadLocalRandom.nextSecondarySeed() re-initializes TLR's seed

2014-06-22 Thread Martin Buchholz
On Fri, Jun 20, 2014 at 1:42 AM, Peter Levart wrote: > > This pertains to the other thread (ThreadLocalRandom clinit troubles) > started by Martin Buchholz, right? He's making a valid point. The "seeder" > static field is still uninitialized during either NetworkInter

Re: 8008662: Add @jdk.Supported to JDK-specific/supported API

2013-02-22 Thread Martin Buchholz
Hi Joe, On Fri, Feb 22, 2013 at 11:19 AM, Joe Darcy wrote: > > Should third-party vendor extensions that are "supported" for public use > by the third-party use jdk.Supported? > > > No; as I envision it, the jdk.Supported annotation is only meant to convey > supported-ness in the JDK of parts o

Re: 8008662: Add @jdk.Supported to JDK-specific/supported API

2013-02-22 Thread Martin Buchholz
On Thu, Feb 21, 2013 at 6:16 PM, Joe Darcy wrote: > > However, the com.sun.* subpackages are a mix of APIs that are supported as > described above as well as APIs that are not supported. I was under the impression that the general rule was that all of com.sun.* fell under the "jdk supported" um

Re: Permission Bug in AtomicLongFieldUpdater and AtomicIntegerFieldUpdater

2010-04-21 Thread Martin Buchholz
as I'm not a subscriber.> >> >> Doug Lea said the following on 04/16/10 21:43: >>> >>> On 04/15/10 18:34, Martin Buchholz wrote: >>> >>>> People are using Atomic field updaters to update fields in classes in >>>> other classloader

Re: Permission Bug in AtomicLongFieldUpdater and AtomicIntegerFieldUpdater

2010-04-19 Thread Martin Buchholz
#x27;m not a subscriber.> > > Doug Lea said the following on 04/16/10 21:43: >> >> On 04/15/10 18:34, Martin Buchholz wrote: >> >>> People are using Atomic field updaters to update fields in classes in >>> other classloaders. >>> >> >>

Re: Permission Bug in AtomicLongFieldUpdater and AtomicIntegerFieldUpdater

2010-04-16 Thread Martin Buchholz
On Thu, Apr 15, 2010 at 19:04, David Holmes wrote: > Martin Buchholz said the following on 04/16/10 11:38: >> >> On Thu, Apr 15, 2010 at 17:49, David Holmes >> wrote: >>> >>> If this proceeds I think you need to include AtomicReferenceFieldUpdater >>

Re: Permission Bug in AtomicLongFieldUpdater and AtomicIntegerFieldUpdater

2010-04-15 Thread Martin Buchholz
seems inconsistent that getDeclaredField's internal checks say you don't > have permission to access this field, while what should amount to the same > checks via ReflectUtil say you do. The question is: which check is wrong? > > David > - > > > Martin Bu

Permission Bug in AtomicLongFieldUpdater and AtomicIntegerFieldUpdater

2010-04-15 Thread Martin Buchholz
Hi java.util.concurrent security team, People are using Atomic field updaters to update fields in classes in other classloaders. Toby writes: We received a bug report for App Engine that AtomicLongFieldUpdater (and its sibling) were failing with RuntimePermission accessDeclaredMembers. Looking a

[security-dev 00361]: Re: SecurityException in AnnotationInvocationHandler.getMemberMethods

2008-10-22 Thread Martin Buchholz
eedom from security * exceptions. * @author Martin Buchholz */ import java.lang.annotation.Annotation; import java.lang.annotation.ElementType; import java.lang.annotation.Retention; import java.lang.annotation.RetentionPolicy; import java.lang.annotation.Target; import java.lang.reflect.M