Re: RFR JDK-8049432: Need new tests for testing TLS property jdk.tls.client.protocols with various protocols and values

2014-12-03 Thread Xuelei Fan
Looks fine to me. Only a few minor comments: 1. 201 String[] expecteSupported_protos = new String[] { 202 "SSLv2Hello", "SSLv3", "TLSv1", "TLSv1.1", "TLSv1.2" 203 }; This variable can be define as a static class variable: public class TLSClientPropertyTest

Fwd: RFR 8066397 Remove network-related seed initialization code in ThreadLocal/SplittableRandom

2014-12-03 Thread Wang Weijun
Hi Brad Is this the same as your Non-blocking SecureRandom? They have a webrev at http://cr.openjdk.java.net/~plevart/jdk9-dev/SystemRandom/webrev.01/ Thanks Max > Begin forwarded message: > > Date: December 3, 2014 at 00:42:41 GMT+8 > From: Peter Levart > To: Paul Sandoz , core-libs-dev

AUTO: Zhemin Feng is out of the office (returning 08/12/2014)

2014-12-03 Thread Zhemin Feng
I am out of the office until 08/12/2014. I will take leave from 3rd Dec, and will be back on 8th Dec. Please contact Ke Pi/Singapore/IBM for Java Security L3 work. Best regards, Feng Zhemin Note: This is an automated response to your message "security-dev Digest, Vol 90, Issue 2" sent on 12

Is it reasonable to compare outputs between JMH and hprof?

2014-12-03 Thread Wang Weijun
Hi All I am comparing the difference of SHA-1 and SHA-256. First I wrote a JMH benchmark: @Benchmark public void sig1(Blackhole bh) throws Exception { bh.consume(sig("SHA-1")); } @Benchmark public void sig2(Blackhole bh) throws Exception { bh.consume(sig("SHA-256")); } byte[] sig(Strin

Re: Is it reasonable to compare outputs between JMH and hprof?

2014-12-03 Thread Bernd Eckenfels
Hello, I would use the power of JMH to test this with different array sizes and with and without provider instantiation. I did that a while back for MDC/MAC, and SHA256 is not that attractive anymore as SHA512 is faster (and with SHA512-256 not bigger) (Java7Windows7:) https://gist.github.com