> Did we get to a conclusion on whether to have central infrastructure to
> read/parse the security property? As I recall, this one was originally
> proposed before the generalization of the networking solution. There are
> details related to trimming that would be better not to duplicate if
> poss
Ok, thanks. Looks like the “Default” case is not-an-issue.
-Chris.
> On 8 Aug 2018, at 22:29, Xuelei Fan wrote:
>
> The "Default" algorithm defined in the SunJSSE provider is for TLS protocols.
>
> Xuelei
>
> On 8/8/2018 1:28 PM, Sean Mullan wrote:
>> On 8/8/18 1:58 PM, Anthony Scarpino wrote
Matthias,
> On 9 Aug 2018, at 08:07, Baesken, Matthias wrote:
>
>> Did we get to a conclusion on whether to have central infrastructure to
>> read/parse the security property? As I recall, this one was originally
>> proposed before the generalization of the networking solution. There are
>> deta
Webrev updated at
http://cr.openjdk.java.net/~weijun/8076190/webrev.02
The only change is in keytool/Main and the test. keytool will not prompt for
store password if it detects a password-less keystore.
This is 3) below.
Thanks
Max
> On Jul 24, 2018, at 6:49 PM, Weijun Wang wrote:
>
> Pl
I've been looking further at how private/temporary buffers are used in
cipher/keystore management and identified some more areas that could
benefit with a more aggressive nulling out of contents.
I've been testing through use of stepping through debugging sessions
while setting/getting keys an
Adding RFR to title..
On 09/08/2018 11:37, Seán Coffey wrote:
I've been looking further at how private/temporary buffers are used in
cipher/keystore management and identified some more areas that could
benefit with a more aggressive nulling out of contents.
I've been testing through use of st
On 8/8/18 5:29 PM, Xuelei Fan wrote:
The "Default" algorithm defined in the SunJSSE provider is for TLS
protocols.
What if I set DTLS to be the default, though? Ex:
SSLContext.setDefault(SSLContext.getInstance("DTLS"));
--Sean
Xuelei
On 8/8/2018 1:28 PM, Sean Mullan wrote:
On 8/8/18
On 8/9/2018 4:25 AM, Sean Mullan wrote:
On 8/8/18 5:29 PM, Xuelei Fan wrote:
The "Default" algorithm defined in the SunJSSE provider is for TLS
protocols.
What if I set DTLS to be the default, though? Ex:
SSLContext.setDefault(SSLContext.getInstance("DTLS"));
Good point! Maybe, we also
I there any idea when the patch will be merged and a release will be cut so we
can enable testing with JDK11 again for netty ?
> On 31. Jul 2018, at 07:19, Norman Maurer wrote:
>
> After digging more this morning I noticed the test code did made some wrong
> assumptions which just worked out
I'm waiting for the CSR approval for JDK 11:
https://bugs.openjdk.java.net/browse/JDK-8208526
Thanks,
Xuelei
On 8/9/2018 6:50 AM, Norman Maurer wrote:
I there any idea when the patch will be merged and a release will be cut so we
can enable testing with JDK11 again for netty ?
On 31. Jul 20
A few (mostly minor) comments on the Solution section. I'll continue my
review of the rest of the CSR later.
First sentence, "from the existing API ECDSA ..." should that be "API
for ECDSA"?
// example: use KeyFactory to contruct a public key
typo: construct
"This API does not standardize "
On 8/9/2018 1:17 PM, Sean Mullan wrote:
A few (mostly minor) comments on the Solution section. I'll continue
my review of the rest of the CSR later.
First sentence, "from the existing API ECDSA ..." should that be "API
for ECDSA"?
// example: use KeyFactory to contruct a public key
typo: c
Hi Alan,
On 8/6/2018 11:12 PM, Alan Bateman wrote:
On 06/08/2018 20:11, joe darcy wrote:
Hello,
Various interfaces in the JDK extend Serializable and declare
serialVersionUID fields. Such fields are ineffectual and
@SuppressWarnings("serial") should be applied to such fields to
suppress f
On 8/7/18 11:53 PM, Weijun Wang wrote:
On Aug 8, 2018, at 12:58 AM, Sean Mullan wrote:
On 8/6/18 8:20 PM, Weijun Wang wrote:
I'm not seeing how this would be a behavior change if it is a new option, can
you add more details on that? If I specify -providerName, intuitively I would
expect i
Hi Xuelei,
My test passed using that patch. I’ll continue to explore over the next few
days. But that patch resolves the main issues that I had encountered.
Thanks,
- Tim
> On Aug 7, 2018, at 8:54 AM, Xuelei Fan wrote:
>
> Xuelei
Thank you, Tim! Please feel free to submit bugs and comments.
Xuelei
On 8/9/2018 4:23 PM, Tim Brooks wrote:
Hi Xuelei,
My test passed using that patch. I’ll continue to explore over the next
few days. But that patch resolves the main issues that I had encountered.
Thanks,
- Tim
On Aug 7
16 matches
Mail list logo