Re: [8u-dev] Request for Review + Request for Approval for Backport 8049171: Additional tests for jarsigner's warnings

2016-05-11 Thread Svetlana Nikandrova
Thank you! About buffer size - there's nothing special about it. I believe I just took 1024 from some java code example. Thank you, Svetlana On 11.05.2016 7:40, Wang Weijun wrote: Looks fine to me. Just curious, why choose BUFFER_SIZE = 1024 in Utils.java? In JDK 9, DEFAULT_BUFFER_SIZE = 8

Re: RFR: JDK-8156584: Initialization race in sun.security.x509.AlgorithmId.get

2016-05-11 Thread Martin Buchholz
Webrev updated. Still looking for crypto-collaborator. On Tue, May 10, 2016 at 12:43 PM, Martin Buchholz wrote: > https://bugs.openjdk.java.net/browse/JDK-8156584 > http://cr.openjdk.java.net/~martin/webrevs/openjdk8/AlgorithmId-get-race/ > > I'm not a crypto engineer, so I'm hoping someone on se

RE: [9] RFR: 8141039: Test Task: Develop new tests for JEP 273: DRBG-Based SecureRandom Implementations

2016-05-11 Thread Sibabrata Sahoo
Hi Max, Please find the updated webrev: http://cr.openjdk.java.net/~ssahoo/8141039/webrev.01/ Changes includes: - Removed otherVM option and default "securerandom.drbg.config" will get reset after each DRBG test run. This change affected to all test files. - Addressed all the following comments

RFR: 9: 8156671: Refactor sun/security/rsa/SignatureTest.java

2016-05-11 Thread Rajan Halade
Please provide your review of patch to refactor SignatureTest. This test now runs all signature algorithms with key generated once resulting in saving 75% of execution time. Bug: https://bugs.openjdk.java.net/browse/JDK-8156671 Webrev: http://cr.openjdk.java.net/~rhalade/8156671/webrev.00/ Tha

RFR 8155847: SHA groups needed for jdk.security.provider.preferred

2016-05-11 Thread Anthony Scarpino
Hi I need a review of my changes to jdk.security.preferred.provider to add Groups. This makes it a lot cleaner for support a group of algorithms that are very similar, such as SHA2 (aka SHA224, SHA256, SHA384, ... ) http://cr.openjdk.java.net/~ascarpino/8155847/webrev/ thanks Tony

RFR 8154005: Add algorithm constraint that specifies the restriction date

2016-05-11 Thread Anthony Scarpino
Please review the changes related to 8154005. This is a continuation JEP-288. It adds a denyAfter constraint the stops PKIX algorithm support at a specified date. http://cr.openjdk.java.net/~ascarpino/8154005/webrev/ thanks Tony

Re: RFR 8154005: Add algorithm constraint that specifies the restriction date

2016-05-11 Thread ecki
Hello, In AlgorithmChecker the Javadoc seems to not follow "@param name desc" format (in two places). Also it should most likely describe something like "time the signature claimed to be made to check time range limited ciphers after that date or similiar) * @param PKIXParameter timestamp (or

Re: RFR 8156501: DRBG not synchronized at reseeding

2016-05-11 Thread Wang Weijun
Ping again, and webrev updated at http://cr.openjdk.java.net/~weijun/8156501/webrev.01/ Volatile keyword added to reseedCounter. Thanks Max > On May 9, 2016, at 11:51 AM, Wang Weijun wrote: > > Hi All > > Please review the fix at > > http://cr.openjdk.java.net/~weijun/8156501/webrev.00

Re: RFR 8156501: DRBG not synchronized at reseeding

2016-05-11 Thread Xuelei Fan
Looks fine to me except a minor comment: AbstractDrbg.java = 54 * Since 8098581, there is no more synchronized keyword on SecureRandom APIs. 55 * An implementation is required to protect shared access to instantiate states 56 * (instantiated, nonce) and DRBG states (v, c,

Re: RFR 8156501: DRBG not synchronized at reseeding

2016-05-11 Thread Wang Weijun
> On May 12, 2016, at 9:31 AM, Xuelei Fan wrote: > > Looks fine to me except a minor comment: > > AbstractDrbg.java > = > 54 * Since 8098581, there is no more synchronized keyword on > SecureRandom APIs. > 55 * An implementation is required to protect shared access to > inst

8156213: Remove SHA-1 and 3KeyTDEA algorithms from DRBG

2016-05-11 Thread Wang Weijun
Please take a review at http://cr.openjdk.java.net/~weijun/8156213/webrev.00/ In its initial changeset, The SUN implementation of DRBG supports all algorithms described in NIST SP 800-90Ar1. However, one algorithm is already considered weak today (3KeyTDEA) and another is likely to be consid

Re: [9] RFR: 8141039: Test Task: Develop new tests for JEP 273: DRBG-Based SecureRandom Implementations

2016-05-11 Thread Wang Weijun
> On May 12, 2016, at 1:46 AM, Sibabrata Sahoo > wrote: > > Hi Max, > > Please find the updated webrev: > http://cr.openjdk.java.net/~ssahoo/8141039/webrev.01/ > > Changes includes: > - Removed otherVM option and default "securerandom.drbg.config" will get > reset after each DRBG test run.

Re: 8156213: Remove SHA-1 and 3KeyTDEA algorithms from DRBG

2016-05-11 Thread Bradford Wetmore
Looks good. Brad On 5/11/2016 7:27 PM, Wang Weijun wrote: Please take a review at http://cr.openjdk.java.net/~weijun/8156213/webrev.00/ In its initial changeset, The SUN implementation of DRBG supports all algorithms described in NIST SP 800-90Ar1. However, one algorithm is already cons

Re: RFR: JDK-8156584: Initialization race in sun.security.x509.AlgorithmId.get

2016-05-11 Thread Xuelei Fan
AlgorithmId.java Line 582-587, about the capacity of hash map, applications may customize Security providers and more OID numbers may get removed/added later, so the oid number may be not a fixed hard-coded number. It may be easier to maintain the code if using the default initial

Re: 8156213: Remove SHA-1 and 3KeyTDEA algorithms from DRBG

2016-05-11 Thread Xuelei Fan
On 5/12/2016 12:24 PM, Bradford Wetmore wrote: > Looks good. > +1. Xuelei > Brad > > > On 5/11/2016 7:27 PM, Wang Weijun wrote: >> Please take a review at >> >>http://cr.openjdk.java.net/~weijun/8156213/webrev.00/ >> >> In its initial changeset, The SUN implementation of DRBG supports all

Re: RFR: JDK-8156584: Initialization race in sun.security.x509.AlgorithmId.get

2016-05-11 Thread Martin Buchholz
Hi Xuelei, I think the non-test code will work well with any set of providers, but is optimized for the default set of providers. If the user removes a provider, then the hashmap will be auto-compacted. The OidTableSize test will fail if the default providers are changed, but that actually helps

Re: RFR: JDK-8156584: Initialization race in sun.security.x509.AlgorithmId.get

2016-05-11 Thread Xuelei Fan
On 5/12/2016 1:21 PM, Martin Buchholz wrote: > Hi Xuelei, > > I think the non-test code will work well with any set of providers, > but is optimized for the default set of providers. If the user > removes a provider, then the hashmap will be auto-compacted. The > OidTableSize test will fail if t

Re: RFR: JDK-8156584: Initialization race in sun.security.x509.AlgorithmId.get

2016-05-11 Thread Martin Buchholz
Xuelei, I again invite you to take ownership of this change. It needs to be ported to jdk9. If we simply delete OidTableSize then the initialization code will be close to optimal for the default configuration, and it will still work well if configured a little differently, so I would keep it. Bu

Re: RFR: JDK-8156584: Initialization race in sun.security.x509.AlgorithmId.get

2016-05-11 Thread Xuelei Fan
Hi Martin, If you agree with the update, I will sponsor your contribution for the testing and integration for JDK 9. Thanks, Xuelei On 5/12/2016 2:27 PM, Martin Buchholz wrote: > Xuelei, > > I again invite you to take ownership of this change. > It needs to be ported to jdk9. > > If we simply