Not sure but you could try running with -Djava.security.debug=all on the
java command line and see if you see anything unusual in the output or
delays/timeouts (as compared with PKCS12).
--Sean
On 6/5/19 12:25 PM, Michael Osipov wrote:
Folks,
I am trying to perform TLS auth with a PKCS12 and
On 6/5/2019 11:04 PM, Jamil Nimeh wrote:
Hi Xuelei, thanks for the feedback. A couple comments in-line below.
On 6/5/2019 5:37 PM, Xuelei Fan wrote:
On 6/5/2019 4:57 PM, Jamil Nimeh wrote:
I think what it's saying is that what was explicitly called out in
4507 (where there is both the exten
Hi Max,
On 6/5/19 9:55 PM, Weijun Wang wrote:
>
>> If there are no further comments and jdk-submit tests succeed, I'll push
>> tomorrow (2019-06-06) at around 11 am EST.
>
> None from me.
>
> Such a new feature would need a release note. I've created a skeleton at
> https://bugs.openjdk.java.n
Hi Max,
On 6/5/19 10:20 PM, Weijun Wang wrote:
> For the server referral part, I think we can clone some existing cross-realm
> authentication test and remove the [domain_realm] part in the client's
> krb5.conf and see if the authentication still succeeds.
I'm not sure why you would remove the
Continue for the SessionTicketExtension.java.
On 6/3/2019 5:42 PM, Anthony Scarpino wrote:
http://cr.openjdk.java.net/~ascarpino/stateless/webrev.02
SessionTicketExtension.java (continue):
---
368 if (!((SSLSessionContextImpl)chc.sslContext.
36
Continue for the rest of the update.
On 6/3/2019 5:42 PM, Anthony Scarpino wrote:
http://cr.openjdk.java.net/~ascarpino/stateless/webrev.02
Finished.java
-
447 NewSessionTicket.handshake12Producer.produce(shc,
message);
624 SSLHandshake[] probableHandsh
Good morning/afternoon/evening/night,
This RFE adds TLS protocol versions 1->1.3 support for the x25519/x448
curves in the SunJSSE provider. These algorithms are preferred by many
of the major browsers for their efficiency and security properties.
This work is the natural extension of JDK-81
On 6/3/19 5:40 PM, Michał Zegan wrote:
W dniu 03.06.2019 o 22:34, Sean Mullan pisze:
On 6/3/19 1:16 PM, Michał Zegan wrote:
It says in PKIXParameters.setRevocationEnabled [1]:
"Sophisticated applications should set this flag to false when it is not
practical to use a PKIX service provider's
> On Jun 6, 2019, at 11:38 PM, Martin Balao wrote:
>
> Hi Max,
>
> On 6/5/19 10:20 PM, Weijun Wang wrote:
>> For the server referral part, I think we can clone some existing cross-realm
>> authentication test and remove the [domain_realm] part in the client's
>> krb5.conf and see if the aut
Hi, Max,
- line 424: the "(used to be const)" comment can now be removed.
- line 396-403: on line 338, there is no need to go to err as no memory
has been allocated. What happens when jumping to err but the variables,
i.e. value and name, have not been declared? Line 400-401 seems not used
Webrev updated: http://cr.openjdk.java.net/~valeriep/8080462/webrev.02/
Mach5 run looks clean.
Thanks,
Valerie
On 6/5/2019 7:42 PM, Valerie Peng wrote:
Hi Jamil,
Thanks much for reviewing this~
On 6/5/2019 9:21 AM, Jamil Nimeh wrote:
Hi Valerie, on the whole it looks really good. I do have
On 6/5/19 9:58 AM, Xuelei Fan wrote:
Continue for the SessionTicketExtension.java.
On 6/3/2019 5:42 PM, Anthony Scarpino wrote:
http://cr.openjdk.java.net/~ascarpino/stateless/webrev.02
SessionTicketExtension.java (continue):
---
231 SessionStateS
On 6/6/2019 9:46 PM, Anthony Scarpino wrote:
On 6/5/19 9:58 AM, Xuelei Fan wrote:
Continue for the SessionTicketExtension.java.
On 6/3/2019 5:42 PM, Anthony Scarpino wrote:
http://cr.openjdk.java.net/~ascarpino/stateless/webrev.02
SessionTicketExtension.java (continue):
--
13 matches
Mail list logo