Re: RFR: 8266881: Enable debug log for SSLEngineExplorerMatchedSNI.java

2021-05-12 Thread Hai-May Chao
On Tue, 11 May 2021 04:22:49 GMT, Xue-Lei Andrew Fan wrote: > Hi, > > May I have the following test code reviewed? > > The test SSLEngineExplorerMatchedSNI.java fails intermittently. I tried to > run the test 500 times, but cannot reproduce the issue. The cause is unknown > to me now. It

RFR: 8266400: importkeystore fails to a password less pkcs12 keystore

2021-05-19 Thread Hai-May Chao
Please review the fix to address keytool -importkeystore failure when importing to a password-less PKCS12 keystore. - Commit messages: - 8266400: importkeystore fails to a password less pkcs12 keystore Changes: https://git.openjdk.java.net/jdk/pull/4119/files Webrev:

Integrated: 8266225: jarsigner is using incorrect security property to show weakness of certs

2021-05-11 Thread Hai-May Chao
On Thu, 6 May 2021 16:49:33 GMT, Hai-May Chao wrote: > Please review the change to jarsigner so it uses certpath security property > in order to properly display the weakness of the certificate algorithms. This pull request has now been integrated. Changeset: 995e9560 Author: Hai-Ma

Re: RFR: 8266225: jarsigner is using incorrect security property to show weakness of certs [v2]

2021-05-11 Thread Hai-May Chao
On Fri, 7 May 2021 14:10:14 GMT, Weijun Wang wrote: >> Hai-May Chao has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Test with new java.security file > > Marked as reviewed by weijun (Reviewer).

Re: RFR: 8266225: jarsigner is using incorrect security property to show weakness of certs [v2]

2021-05-06 Thread Hai-May Chao
On Thu, 6 May 2021 18:08:40 GMT, Weijun Wang wrote: >> Hai-May Chao has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Test with new java.security file > > test/jdk/sun/security/tools/jarsigner/CheckSignerCe

Re: RFR: 8266225: jarsigner is using incorrect security property to show weakness of certs [v2]

2021-05-06 Thread Hai-May Chao
> Please review the change to jarsigner so it uses certpath security property > in order to properly display the weakness of the certificate algorithms. Hai-May Chao has updated the pull request incrementally with one additional commit since the last revision: Test with new java.se

Integrated: 8266400: importkeystore fails to a password less pkcs12 keystore

2021-05-24 Thread Hai-May Chao
On Wed, 19 May 2021 19:01:21 GMT, Hai-May Chao wrote: > Please review the fix to address keytool -importkeystore failure when > importing to a password-less PKCS12 keystore. This pull request has now been integrated. Changeset: f2d880c1 Author: Hai-May Chao URL:

Re: RFR: 8266220: keytool still prompt for store password on a password-less pkcs12 file if -storetype pkcs12 is specified [v2]

2021-04-30 Thread Hai-May Chao
On Thu, 29 Apr 2021 17:51:17 GMT, Weijun Wang wrote: >> It's awkward that for a password-less pkcs12 keystore, `keytool -list` does >> not prompt for a password but `keytool -list -storetype pkcs12` does. > > Weijun Wang has updated the pull request incrementally with one additional > commit

Re: RFR: 8257497: Key identifier compliance issue [v2]

2021-02-10 Thread Hai-May Chao
> This change is made for compliance with RFC 5280 section 4.2.1.1 for > Authority Key Identifier extension. Hai-May Chao has updated the pull request incrementally with one additional commit since the last revision: Test case added and not overriding -ext fix - C

Re: RFR: 8257497: Key identifier compliance issue [v2]

2021-02-10 Thread Hai-May Chao
On Wed, 10 Feb 2021 22:41:26 GMT, Weijun Wang wrote: >> Hai-May Chao has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Test case added and not overriding -ext fix > > test/jdk/sun/security/tools/keyt

Re: RFR: 8257497: Key identifier compliance issue [v2]

2021-02-10 Thread Hai-May Chao
On Wed, 10 Feb 2021 23:25:45 GMT, Weijun Wang wrote: >> The current method serves the need to verify the accuracy of the AKID for >> this PR, and it looks straightforward to perceive I think. The API such as >> cert.getExtensionValue(KnownOIDs.AuthorityKeyID.value()), and new DerValue >> to

Re: RFR: 8257497: Key identifier compliance issue [v3]

2021-02-10 Thread Hai-May Chao
> This change is made for compliance with RFC 5280 section 4.2.1.1 for > Authority Key Identifier extension. Hai-May Chao has updated the pull request incrementally with one additional commit since the last revision: API used to get AKID - Changes: - all:

RFR: 8257497: Key identifier compliance issue

2021-02-01 Thread Hai-May Chao
This change is made for compliance with RFC 5280 section 4.2.1.1 for Authority Key Identifier extension. - Commit messages: - 8257497: Key identifier compliance issue Changes: https://git.openjdk.java.net/jdk/pull/2343/files Webrev:

RFR: 8260693: Provide the support for specifying a signer in keytool -genkeypair

2021-03-31 Thread Hai-May Chao
Please review the changes that adds the -signer option to keytool -genkeypair command. As key agreement algorithms do not have a signing algorithm, the specified signer's private key will be used to sign and generate a key agreement certificate. CSR review is at:

Re: RFR: 8260693: Provide the support for specifying a signer in keytool -genkeypair [v2]

2021-04-01 Thread Hai-May Chao
On Wed, 31 Mar 2021 13:36:39 GMT, Weijun Wang wrote: >> Hai-May Chao has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Updated with review comments > > Some comments on the CSR: > 1. In the "Solutio

Re: RFR: 8260693: Provide the support for specifying a signer in keytool -genkeypair [v2]

2021-04-01 Thread Hai-May Chao
ew is at: https://bugs.openjdk.java.net/browse/JDK-8264325 Hai-May Chao has updated the pull request incrementally with one additional commit since the last revision: Updated with review comments - Changes: - all: https://git.openjdk.java.net/jdk/pull/3281/files - new: https://git.openjdk.ja

Re: RFR: 8260693: Provide the support for specifying a signer in keytool -genkeypair [v4]

2021-04-01 Thread Hai-May Chao
ew is at: https://bugs.openjdk.java.net/browse/JDK-8264325 Hai-May Chao has updated the pull request incrementally with one additional commit since the last revision: update with review comments - Changes: - all: https://git.openjdk.java.net/jdk/pull/3281/files - new: https://git.openjdk.ja

Re: RFR: 8260693: Provide the support for specifying a signer in keytool -genkeypair [v3]

2021-04-01 Thread Hai-May Chao
On Thu, 1 Apr 2021 17:04:33 GMT, Weijun Wang wrote: >> As `RecoveryKey()` will make sure if the entry exists in the keystore and is >> a `PrivateKeyEntry`, removed this checking and updated to check for if >> `signerCert` is null. > > Yes, it must be a private key entry. On the other hand, I

Re: RFR: 8260693: Provide the support for specifying a signer in keytool -genkeypair [v3]

2021-04-01 Thread Hai-May Chao
ew is at: https://bugs.openjdk.java.net/browse/JDK-8264325 Hai-May Chao has updated the pull request incrementally with one additional commit since the last revision: Updated with review comments - Changes: - all: https://git.openjdk.java.net/jdk/pull/3281/files - new: https://git.openjdk.ja

Re: RFR: 8260693: Provide the support for specifying a signer in keytool -genkeypair [v2]

2021-04-01 Thread Hai-May Chao
On Thu, 1 Apr 2021 16:53:31 GMT, Weijun Wang wrote: >> Hai-May Chao has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Updated with review comments > > src/java.base/share/classes/sun/security/tools/keytool

Re: RFR: 8260693: Provide the support for specifying a signer in keytool -genkeypair [v3]

2021-04-01 Thread Hai-May Chao
On Thu, 1 Apr 2021 16:49:19 GMT, Weijun Wang wrote: >> Not sure the reason why a change is needed for the existing logic. > > With a signer, it makes no sense to create a single-cert array at the > beginning. I am suggesting: > X509Certificate newCert = keypair.getSelfCertificate(...); >

Re: RFR: 8260693: Provide the support for specifying a signer in keytool -genkeypair [v3]

2021-04-01 Thread Hai-May Chao
On Thu, 1 Apr 2021 21:27:52 GMT, Weijun Wang wrote: >> Hai-May Chao has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Updated with review comments > > src/java.base/share/classes/sun/security/tools/keytool/

Re: RFR: 8225438: javax/net/ssl/TLSCommon/TestSessionLocalPrincipal.java failed with Read timed out

2021-03-22 Thread Hai-May Chao
On Mon, 22 Mar 2021 10:45:34 GMT, Sibabrata Sahoo wrote: > The Test getting timeout intermittently because the SO_TIMEOUT of 5 seconds > set on sslServerSocket. This time interval could be inadequate when the > machine is too busy. Also it looks setting SO_TIMEOUT is unnecessary here. So >

Integrated: 8260693: Provide the support for specifying a signer in keytool -genkeypair

2021-04-08 Thread Hai-May Chao
On Wed, 31 Mar 2021 06:30:01 GMT, Hai-May Chao wrote: > Please review the changes that adds the -signer option to keytool -genkeypair > command. As key agreement algorithms do not have a signing algorithm, the > specified signer's private key will be used to sign and gener

Re: RFR: 8260693: Provide the support for specifying a signer in keytool -genkeypair [v4]

2021-04-07 Thread Hai-May Chao
On Fri, 2 Apr 2021 01:40:16 GMT, Weijun Wang wrote: >> Hai-May Chao has updated the pull request incrementally with one additional >> commit since the last revision: >> >> update with review comments > > src/java.base/share/classes/sun/security/tools/keytool/M

Re: RFR: 8260693: Provide the support for specifying a signer in keytool -genkeypair [v4]

2021-04-07 Thread Hai-May Chao
On Fri, 2 Apr 2021 11:52:16 GMT, Weijun Wang wrote: >>> Maybe we don't need to resolve it in this code change. If we look carefully >>> at RFC 8410 Sections 10.1 and 10.2, it shows the X25519 certificate in 10.2 >>> is using the signer's SKID in 10.1 as its own SKID and it has no AKID. >>>

Re: RFR: 8260693: Provide the support for specifying a signer in keytool -genkeypair [v5]

2021-04-07 Thread Hai-May Chao
ew is at: https://bugs.openjdk.java.net/browse/JDK-8264325 Hai-May Chao has updated the pull request incrementally with one additional commit since the last revision: update with review comments - Changes: - all: https://git.openjdk.java.net/jdk/pull/3281/files - new: https://git.openjdk.ja

Re: RFR: 8260693: Provide the support for specifying a signer in keytool -genkeypair [v5]

2021-04-07 Thread Hai-May Chao
On Thu, 8 Apr 2021 00:01:57 GMT, Weijun Wang wrote: >> Hai-May Chao has updated the pull request incrementally with one additional >> commit since the last revision: >> >> update with review comments > > src/java.base/share/classes/sun/security/tools/keytool

Re: RFR: 8260693: Provide the support for specifying a signer in keytool -genkeypair [v6]

2021-04-07 Thread Hai-May Chao
ew is at: https://bugs.openjdk.java.net/browse/JDK-8264325 Hai-May Chao has updated the pull request incrementally with one additional commit since the last revision: test update with comment - Changes: - all: https://git.openjdk.java.net/jdk/pull/3281/files - new: https://git.openjdk.java.ne

Re: RFR: 8260693: Provide the support for specifying a signer in keytool -genkeypair [v5]

2021-04-07 Thread Hai-May Chao
On Thu, 8 Apr 2021 01:42:18 GMT, Hai-May Chao wrote: >> test/jdk/sun/security/tools/keytool/GenKeyPairSigner.java line 299: >> >>> 297: System.exit(1); >>> 298: } >>> 299: >> >> Since you are here, you can check if t

Re: RFR: Release Note for JDK-8264968 Provide the support for specifying a signer in keytool -genkeypair command

2021-04-13 Thread Hai-May Chao
ng the > signer’s private key. This is especially useful for generating a certificate > with a key agreement algorithm as its public key algorithm. > > --Sean > > On 4/9/21 5:12 PM, Hai-May Chao wrote: >> Please review the release note for JDK-8264968: >> https://bugs.openjdk.java.net/browse/JDK-8264968 >> Thanks, >> Hai-May

Re: RFR: 8236671: NullPointerException in JKS keystore

2021-04-20 Thread Hai-May Chao
On Tue, 20 Apr 2021 11:54:39 GMT, Sean Coffey wrote: > Trivial enough change. Improved the exception thrown from JceKeyStore also. Marked as reviewed by hchao (Committer). - PR: https://git.openjdk.java.net/jdk/pull/3588

RFR: Release Note for JDK-8264968 Provide the support for specifying a signer in keytool -genkeypair command

2021-04-09 Thread Hai-May Chao
Please review the release note for JDK-8264968: https://bugs.openjdk.java.net/browse/JDK-8264968 Thanks, Hai-May

Re: RFR: 8257497: Key identifier compliance issue [v6]

2021-02-16 Thread Hai-May Chao
> This change is made for compliance with RFC 5280 section 4.2.1.1 for > Authority Key Identifier extension. Hai-May Chao has updated the pull request incrementally with one additional commit since the last revision: Compare keys using encoded bytes - Changes: - all:

Re: RFR: 8257497: Key identifier compliance issue [v5]

2021-02-16 Thread Hai-May Chao
On Tue, 16 Feb 2021 18:33:52 GMT, Sean Mullan wrote: >> Hai-May Chao has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Reduced one param to createV3Extensions > > src/java.base/share/classes/sun/security/too

Re: RFR: 8257497: Update keytool to create AKID from the SKID of the issuing certificate as specified by RFC 5280 [v6]

2021-02-17 Thread Hai-May Chao
On Wed, 17 Feb 2021 15:55:30 GMT, Sean Mullan wrote: >> Hai-May Chao has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Compare keys using encoded bytes > > Looks good. However, I think you should change the

Integrated: 8257497: Update keytool to create AKID from the SKID of the issuing certificate as specified by RFC 5280

2021-02-17 Thread Hai-May Chao
On Mon, 1 Feb 2021 23:06:30 GMT, Hai-May Chao wrote: > This change is made for compliance with RFC 5280 section 4.2.1.1 for > Authority Key Identifier extension. This pull request has now been integrated. Changeset: 05301f5f Author: Hai-May Chao URL: https://git.openjdk.java.n

Re: RFR: 8257497: Key identifier compliance issue

2021-02-05 Thread Hai-May Chao
On Fri, 5 Feb 2021 10:16:14 GMT, Sean Coffey wrote: >> This change is made for compliance with RFC 5280 section 4.2.1.1 for >> Authority Key Identifier extension. > > Marked as reviewed by coffeys (Reviewer). @coffeys Thanks for the review! - PR:

Re: RFR: 8257497: Key identifier compliance issue [v5]

2021-02-12 Thread Hai-May Chao
On Fri, 12 Feb 2021 21:01:48 GMT, Weijun Wang wrote: >> Hai-May Chao has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Reduced one param to createV3Extensions > > LGTM. Thanks for the review,

Re: RFR: 8257497: Key identifier compliance issue [v5]

2021-02-12 Thread Hai-May Chao
> This change is made for compliance with RFC 5280 section 4.2.1.1 for > Authority Key Identifier extension. Hai-May Chao has updated the pull request incrementally with one additional commit since the last revision: Reduced one param to createV3Extensions - Changes:

Re: RFR: 8257497: Key identifier compliance issue [v3]

2021-02-12 Thread Hai-May Chao
On Fri, 12 Feb 2021 14:49:17 GMT, Weijun Wang wrote: >> Changed as suggested. > > Sorry, I should have been more verbose on my suggestion. I was thinking about > passing in **_only_** the `KeyIdentifier` and _**not**_ `akey`. After all > both of them are for the same purpose and it's clear to

Re: RFR: 8257497: Key identifier compliance issue [v3]

2021-02-11 Thread Hai-May Chao
On Thu, 11 Feb 2021 19:48:23 GMT, Weijun Wang wrote: >> Hai-May Chao has updated the pull request incrementally with one additional >> commit since the last revision: >> >> API used to get AKID > > src/java.base/share/classes/sun/security/tools/keytool/M

Re: RFR: 8257497: Key identifier compliance issue [v4]

2021-02-11 Thread Hai-May Chao
> This change is made for compliance with RFC 5280 section 4.2.1.1 for > Authority Key Identifier extension. Hai-May Chao has updated the pull request incrementally with one additional commit since the last revision: passing in KeyIdentifier to createV3Extensions - C

RFR: 8272163: Add -version option to keytool and jarsigner

2021-10-14 Thread Hai-May Chao
It'd be useful to have a -version option for keytool and jarsigner. Many other JDK tools already have a -version option. This is to add -version option to keytool and jarsigner like jar command does. - Commit messages: - 8272163: Add -version option to keytool and jarsigner

Re: RFR: 8272163: Add -version option to keytool and jarsigner [v2]

2021-10-18 Thread Hai-May Chao
On Fri, 15 Oct 2021 13:34:48 GMT, Weijun Wang wrote: >> Hai-May Chao has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Fix -version in jarsigner and update tests > > src/jdk.jartool/share/classes/sun/secu

Re: RFR: 8272163: Add -version option to keytool and jarsigner [v2]

2021-10-18 Thread Hai-May Chao
> It'd be useful to have a -version option for keytool and jarsigner. Many > other JDK tools already have a -version option. This is to add -version > option to keytool and jarsigner like jar command does. > > CSR review: > https://bugs.openjdk.java.net/browse/JDK-8275174

Re: RFR: 8272163: Add -version option to keytool and jarsigner

2021-10-18 Thread Hai-May Chao
On Fri, 15 Oct 2021 13:49:27 GMT, Weijun Wang wrote: >> It'd be useful to have a -version option for keytool and jarsigner. Many >> other JDK tools already have a -version option. This is to add -version >> option to keytool and jarsigner like jar command does. >> >> CSR review: >>

Re: RFR: 8272163: Add -version option to keytool and jarsigner [v3]

2021-10-19 Thread Hai-May Chao
> It'd be useful to have a -version option for keytool and jarsigner. Many > other JDK tools already have a -version option. This is to add -version > option to keytool and jarsigner like jar command does. > > CSR review: > https://bugs.openjdk.java.net/browse/JDK-8275174

Re: RFR: 8272163: Add -version option to keytool and jarsigner [v2]

2021-10-19 Thread Hai-May Chao
On Tue, 19 Oct 2021 03:40:55 GMT, Weijun Wang wrote: >> Hai-May Chao has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Fix -version in jarsigner and update tests > > src/jdk.jartool/share/classes/sun/secu

Re: RFR: 8272163: Add -version option to keytool and jarsigner [v4]

2021-10-19 Thread Hai-May Chao
> It'd be useful to have a -version option for keytool and jarsigner. Many > other JDK tools already have a -version option. This is to add -version > option to keytool and jarsigner like jar command does. > > CSR review: > https://bugs.openjdk.java.net/browse/JDK-8275174

Re: RFR: 8272163: Add -version option to keytool and jarsigner [v4]

2021-10-19 Thread Hai-May Chao
On Tue, 19 Oct 2021 13:10:15 GMT, Weijun Wang wrote: >> Hai-May Chao has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Updated comment in test > > Approved the PR. Thanks. I have a small comment on the CSR.

Re: RFR: 8272163: Add -version option to keytool and jarsigner [v5]

2021-10-19 Thread Hai-May Chao
> It'd be useful to have a -version option for keytool and jarsigner. Many > other JDK tools already have a -version option. This is to add -version > option to keytool and jarsigner like jar command does. > > CSR review: > https://bugs.openjdk.java.net/browse/JDK-8275174

Re: RFR: 8272163: Add -version option to keytool and jarsigner [v4]

2021-10-19 Thread Hai-May Chao
On Tue, 19 Oct 2021 13:10:15 GMT, Weijun Wang wrote: >> Hai-May Chao has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Updated comment in test > > Approved the PR. Thanks. I have a small comment on the C

Re: RFR: 8274471: Verification of OCSP Response signed with RSASSA-PSS fails

2021-09-30 Thread Hai-May Chao
On Thu, 30 Sep 2021 15:44:32 GMT, Weijun Wang wrote: > Extra parameters need to be set for RSASSA-PSS signatures. We already have a > helper method for that. > > Some other cleanups: > 1. When using GET for OCSP, make sure no double slash. > 2. Several throws clauses are not necessary. > > No

Re: RFR: 8273826: Correct Manifest file name and NPE checks

2021-10-06 Thread Hai-May Chao
On Wed, 6 Oct 2021 16:58:51 GMT, Sean Coffey wrote: > Use correct manifest file name in the Manifest verifier checks. > Also - extra null check > > The test doesn't reproduce the exact issue reported but should prevent future > regressions in this area. Looks good. - Marked as

Re: RFR: 8274471: Verification of OCSP Response signed with RSASSA-PSS fails [v3]

2021-10-01 Thread Hai-May Chao
On Fri, 1 Oct 2021 14:43:24 GMT, Weijun Wang wrote: >> Extra parameters need to be set for RSASSA-PSS signatures. We already have a >> helper method for that. >> >> Some other cleanups: >> 1. When using GET for OCSP, make sure no double slash. >> 2. Several throws clauses are not necessary. >>

Re: RFR: 8209398: sun/security/pkcs11/KeyStore/SecretKeysBasic.sh failed with "PKCS11Exception: CKR_ATTRIBUTE_SENSITIVE"

2021-12-21 Thread Hai-May Chao
On Tue, 14 Dec 2021 18:33:47 GMT, Valerie Peng wrote: > Can someone help review this small fix? NSS returns PKCS11 > CKR_ATTRIBUTE_SENSITIVE error when trying to retrieve CKA_VALUE out of its > token keys. So this fix is to add special handling for NSS token secret keys. > There is already an

Re: RFR: 8257722: Improve "keytool -printcert -jarfile" output [v2]

2021-10-27 Thread Hai-May Chao
> This change does a few improvements to the output of `keytool -printcert > -jarfile` command to help readability and diagnosis. Hai-May Chao has updated the pull request incrementally with one additional commit since the last revision: Updated TimestampCheck test and removed its

Re: RFR: 8257722: Improve "keytool -printcert -jarfile" output [v3]

2021-10-28 Thread Hai-May Chao
> This change does a few improvements to the output of `keytool -printcert > -jarfile` command to help readability and diagnosis. Hai-May Chao has updated the pull request incrementally with one additional commit since the last revision: Update output per review c

Re: RFR: 8257722: Improve "keytool -printcert -jarfile" output [v3]

2021-10-28 Thread Hai-May Chao
On Tue, 26 Oct 2021 23:23:35 GMT, Weijun Wang wrote: >> Hai-May Chao has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Update output per review comment > > src/java.base/share/classes/sun/security/too

Re: RFR: 8257722: Improve "keytool -printcert -jarfile" output [v4]

2021-10-28 Thread Hai-May Chao
> This change does a few improvements to the output of `keytool -printcert > -jarfile` command to help readability and diagnosis. Hai-May Chao has updated the pull request incrementally with one additional commit since the last revision: Update while block code - C

Re: RFR: 8257722: Improve "keytool -printcert -jarfile" output [v3]

2021-10-28 Thread Hai-May Chao
On Thu, 28 Oct 2021 17:34:46 GMT, Weijun Wang wrote: >> Hai-May Chao has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Update output per review comment > > src/java.base/share/classes/sun/security/too

Integrated: 8272163: Add -version option to keytool and jarsigner

2021-10-22 Thread Hai-May Chao
On Thu, 14 Oct 2021 16:04:08 GMT, Hai-May Chao wrote: > It'd be useful to have a -version option for keytool and jarsigner. Many > other JDK tools already have a -version option. This is to add -version > option to keytool and jarsigner like jar command does. > > CSR

RFR: 8257722: Improve "keytool -printcert -jarfile" output

2021-10-26 Thread Hai-May Chao
This change does a few improvements to the output of `keytool -printcert -jarfile` command to help readability and diagnosis. - Commit messages: - 8257722: Improve "keytool -printcert -jarfile" output Changes: https://git.openjdk.java.net/jdk/pull/6126/files Webrev:

Re: RFR: 8257722: Improve "keytool -printcert -jarfile" output [v4]

2021-10-28 Thread Hai-May Chao
On Thu, 28 Oct 2021 21:13:40 GMT, Hai-May Chao wrote: >> This change does a few improvements to the output of `keytool -printcert >> -jarfile` command to help readability and diagnosis. > > Hai-May Chao has updated the pull request incrementally with one additional >

Re: RFR: 8257722: Improve "keytool -printcert -jarfile" output [v5]

2021-10-28 Thread Hai-May Chao
> This change does a few improvements to the output of `keytool -printcert > -jarfile` command to help readability and diagnosis. Hai-May Chao has updated the pull request incrementally with one additional commit since the last revision: Used LinkedHashSet - Changes:

Integrated: 8257722: Improve "keytool -printcert -jarfile" output

2021-10-28 Thread Hai-May Chao
On Tue, 26 Oct 2021 22:37:02 GMT, Hai-May Chao wrote: > This change does a few improvements to the output of `keytool -printcert > -jarfile` command to help readability and diagnosis. This pull request has now been integrated. Changeset: de93b1d0 Author: Hai-May Chao URL:

RFR: 8273236: keytool does not accurately warn about algorithms that are disabled but have additional constraints

2022-01-11 Thread Hai-May Chao
`keytool` currently uses a simpler scheme in `DisabledAlgorithmConstraints` class when performing algorithm constraints checks. This change is to enhance `keytool` to make use of the new methods `DisabledAlgorithmConstraints.permits` with `CertPathConstraintsParameters` and `checkKey`

RFR: 8282633: jarsigner output does not explain why an EC key is disabled if its curve has been disabled

2022-03-14 Thread Hai-May Chao
When a named curve is disabled in `jdk.disabled.namedCurves` property which is included in `jdk.jar.disabledAlgorithms` and `jdk.certpath.disabledAlgorithms`, `jarsigner` should display the disabled named curve as a result of its disabled algorithm constraint checking. This clarifies why an EC

Re: RFR: 8282633: jarsigner output does not explain why an EC key is disabled if its curve has been disabled

2022-03-15 Thread Hai-May Chao
On Mon, 14 Mar 2022 17:41:28 GMT, Hai-May Chao wrote: > When a named curve is disabled in `jdk.disabled.namedCurves` property which > is included in `jdk.jar.disabledAlgorithms` and > `jdk.certpath.disabledAlgorithms`, `jarsigner` should display the disabled > named curve as a r

Re: RFR: 8282633: jarsigner output does not explain why an EC key is disabled if its curve has been disabled [v2]

2022-03-15 Thread Hai-May Chao
> clarifies why an EC key is disabled in its warning and verbose output. Hai-May Chao has updated the pull request incrementally with one additional commit since the last revision: Check curve in jdk.security.legacyAlgorithms, and update testcase - Changes:

Re: RFR: 8282633: jarsigner output does not explain why an EC key is disabled if its curve has been disabled

2022-03-15 Thread Hai-May Chao
On Tue, 15 Mar 2022 01:16:59 GMT, Weijun Wang wrote: >> When a named curve is disabled in `jdk.disabled.namedCurves` property which >> is included in `jdk.jar.disabledAlgorithms` and >> `jdk.certpath.disabledAlgorithms`, `jarsigner` should display the disabled >> named curve as a result of

Integrated: 8282633: jarsigner output does not explain why an EC key is disabled if its curve has been disabled

2022-03-15 Thread Hai-May Chao
On Mon, 14 Mar 2022 17:41:28 GMT, Hai-May Chao wrote: > When a named curve is disabled in `jdk.disabled.namedCurves` property which > is included in `jdk.jar.disabledAlgorithms` and > `jdk.certpath.disabledAlgorithms`, `jarsigner` should display the disabled > named curve as a r

RFR: 8277474: jarsigner does not check if algorithm parameters are disabled

2022-02-22 Thread Hai-May Chao
This fixes jarsigner to enforce checking against algorithm constraint properties so when the signature algorithms parameters use disabled or legacy algorithms, it will emit warnings accordingly. If the algorithm used in parameters is disabled, jarsigner treats the jar as unsigned.

Re: RFR: 8281234: The -protected option is not always checked in keytool and jarsigner [v2]

2022-02-24 Thread Hai-May Chao
On Fri, 4 Feb 2022 01:19:51 GMT, Weijun Wang wrote: >> The option means there is no need to provide a password when loading a >> keystore. In some places in jarsigner and keytool, even with the option >> specified, password is still prompted for or warnings are still shown. > > Weijun Wang has

Re: RFR: 8277474: jarsigner does not check if algorithm parameters are disabled [v2]

2022-03-02 Thread Hai-May Chao
On Wed, 2 Mar 2022 16:20:53 GMT, Weijun Wang wrote: >> Hai-May Chao has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Removed unneeded import and updated -verbose output > > src/jdk.jartool/share/classe

Re: RFR: 8277474: jarsigner does not check if algorithm parameters are disabled [v2]

2022-03-02 Thread Hai-May Chao
signed. Hai-May Chao has updated the pull request incrementally with one additional commit since the last revision: Removed unneeded import and updated -verbose output - Changes: - all: https://git.openjdk.java.net/jdk/pull/7582/files - new: https://git.openjdk.java.net/jdk/pul

Re: RFR: 8277474: jarsigner does not check if algorithm parameters are disabled [v2]

2022-03-02 Thread Hai-May Chao
On Wed, 2 Mar 2022 15:30:22 GMT, Sean Mullan wrote: >> Hai-May Chao has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Removed unneeded import and updated -verbose output > > src/jdk.jartool/share/classe

Re: RFR: 8277474: jarsigner does not check if algorithm parameters are disabled [v4]

2022-03-02 Thread Hai-May Chao
signed. Hai-May Chao has updated the pull request incrementally with one additional commit since the last revision: Removed unused string - Changes: - all: https://git.openjdk.java.net/jdk/pull/7582/files - new: https://git.openjdk.java.net/jdk/pull/7582/files/516d8bf0..2a73d

Re: RFR: 8277474: jarsigner does not check if algorithm parameters are disabled [v5]

2022-03-03 Thread Hai-May Chao
signed. Hai-May Chao has updated the pull request incrementally with one additional commit since the last revision: Use algname in output - Changes: - all: https://git.openjdk.java.net/jdk/pull/7582/files - new: https://git.openjdk.java.net/jdk/pull/7582/files/2a73d1ef..d2cd7

Re: RFR: 8277474: jarsigner does not check if algorithm parameters are disabled [v4]

2022-03-03 Thread Hai-May Chao
On Thu, 3 Mar 2022 19:35:21 GMT, Weijun Wang wrote: >> Hai-May Chao has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Removed unused string > > src/jdk.jartool/share/classes/sun/security/tools/jarsigner/Main

Re: RFR: 8277474: jarsigner does not check if algorithm parameters are disabled [v6]

2022-03-03 Thread Hai-May Chao
signed. Hai-May Chao has updated the pull request incrementally with one additional commit since the last revision: No need to do toUpperCase - Changes: - all: https://git.openjdk.java.net/jdk/pull/7582/files - new: https://git.openjdk.java.net/jdk/pull/7582/files/d2cd7e

Integrated: 8277474: jarsigner does not check if algorithm parameters are disabled

2022-03-03 Thread Hai-May Chao
On Tue, 22 Feb 2022 22:00:05 GMT, Hai-May Chao wrote: > This fixes jarsigner to enforce checking against algorithm constraint > properties so when the signature algorithms parameters use disabled or legacy > algorithms, it will emit warnings accordingly. If the algorithm used in >

Re: RFR: 8277474: jarsigner does not check if algorithm parameters are disabled [v3]

2022-03-02 Thread Hai-May Chao
signed. Hai-May Chao has updated the pull request incrementally with two additional commits since the last revision: - Updated -verbose output - Updated -verbose output - Changes: - all: https://git.openjdk.java.net/jdk/pull/7582/files - new: https://git.openjdk.java.net/j

Re: RFR: 8277474: jarsigner does not check if algorithm parameters are disabled [v3]

2022-03-02 Thread Hai-May Chao
On Wed, 2 Mar 2022 19:54:13 GMT, Weijun Wang wrote: >> What does it look like now? Also, you might need to create a mapping in >> `Resources.java` because "using" should only be shown when system language >> is English. > > Also, what if it's another algorithm using another type of parameters?

RFR: 8277474: jarsigner does not check if algorithm parameters are disabled

2022-02-22 Thread Hai-May Chao
This fixes jarsigner to enforce checking against algorithm constraint properties so when the signature algorithms parameters use disabled or legacy algorithms, it will emit warnings accordingly. If the algorithm used in parameters is disabled, jarsigner treats the jar as unsigned.

Withdrawn: 8277474: jarsigner does not check if algorithm parameters are disabled

2022-02-22 Thread Hai-May Chao
On Tue, 22 Feb 2022 20:18:19 GMT, Hai-May Chao wrote: > This fixes jarsigner to enforce checking against algorithm constraint > properties so when the signature algorithms parameters use disabled or legacy > algorithms, it will emit warnings accordingly. If the algorithm used in >

Re: RFR: 8283691: Classes in java.security still reference deprecated classes in spec

2022-03-25 Thread Hai-May Chao
On Fri, 25 Mar 2022 15:34:23 GMT, Weijun Wang wrote: > Some spec cleanup. Marked as reviewed by hchao (Committer). - PR: https://git.openjdk.java.net/jdk/pull/7961

Re: RFR: 8283665: Two Jarsigner tests needs to be updated with JDK-8267319

2022-03-25 Thread Hai-May Chao
On Fri, 25 Mar 2022 05:11:18 GMT, Valerie Peng wrote: > Max, can you please help review this fix? It updates the two jarsigner tests > which are added to the main trunk during the code review of JDK-8267319. > > Mach5 run succeeds. > Thanks, > Valerie Marked as reviewed by hchao (Committer).

Re: RFR: 8281289: Improve with List.copyOf

2022-02-04 Thread Hai-May Chao
On Fri, 4 Feb 2022 23:02:21 GMT, Xue-Lei Andrew Fan wrote: > Please review this trivial code clean up, for a little bit better performance. Marked as reviewed by hchao (Committer). Looks good to me. - PR: https://git.openjdk.java.net/jdk/pull/7356

Re: RFR: 8281175: Add a -providerPath option to jarsigner [v2]

2022-02-03 Thread Hai-May Chao
On Thu, 3 Feb 2022 18:32:42 GMT, Weijun Wang wrote: >> Add the `-providerPath` option to jarsigner to be consistent with keytool. > > Weijun Wang has updated the pull request incrementally with one additional > commit since the last revision: > > no need to append to null Code change looks

Re: RFR: 8280890: Cannot use '-Djava.system.class.loader' with class loader in signed JAR

2022-02-04 Thread Hai-May Chao
On Tue, 1 Feb 2022 21:54:29 GMT, Sean Mullan wrote: > This fixes a bootstrapping issue if a custom system class loader is set with > the `-Djava.system.class.loader` option and the custom class loader is inside > a signed JAR. In order to load the custom class loader, the runtime must >

Re: RFR: 8281175: Add a -providerPath option to jarsigner [v2]

2022-02-04 Thread Hai-May Chao
On Thu, 3 Feb 2022 18:32:42 GMT, Weijun Wang wrote: >> Add the `-providerPath` option to jarsigner to be consistent with keytool. > > Weijun Wang has updated the pull request incrementally with one additional > commit since the last revision: > > no need to append to null Marked as reviewed

RFR: 8265765: DomainKeyStore may stop enumerating aliases if a constituting KeyStore is empty

2022-02-08 Thread Hai-May Chao
This is to fix `DomainKeyStore::engineAliases` to take into account that there may be empty keystore(s) within the collection of keystores of a domain keystore. - Commit messages: - 8265765: DomainKeyStore may stop enumerating aliases if a constituting KeyStore is empty Changes:

Re: RFR: 8265765: DomainKeyStore may stop enumerating aliases if a constituting KeyStore is empty [v2]

2022-02-08 Thread Hai-May Chao
> This is to fix `DomainKeyStore::engineAliases` to take into account that > there may be empty keystore(s) within the collection of keystores of a domain > keystore. Hai-May Chao has updated the pull request incrementally with one additional commit since the last revision: Testcas

Re: RFR: 8265765: DomainKeyStore may stop enumerating aliases if a constituting KeyStore is empty

2022-02-08 Thread Hai-May Chao
On Tue, 8 Feb 2022 23:03:41 GMT, Weijun Wang wrote: >> This is to fix `DomainKeyStore::engineAliases` to take into account that >> there may be empty keystore(s) within the collection of keystores of a >> domain keystore. > > Looks good to me. > > Do you want to play with text blocks in the

Integrated: 8265765: DomainKeyStore may stop enumerating aliases if a constituting KeyStore is empty

2022-02-09 Thread Hai-May Chao
On Tue, 8 Feb 2022 17:13:53 GMT, Hai-May Chao wrote: > This is to fix `DomainKeyStore::engineAliases` to take into account that > there may be empty keystore(s) within the collection of keystores of a domain > keystore. This pull request has now been integrated. Changeset: 178b96

Re: RFR: 8273236: keytool does not accurately warn about algorithms that are disabled but have additional constraints [v2]

2022-01-20 Thread Hai-May Chao
; and `checkKey` parameters. For the keyusage in the EE certificate of a > certificate chains, set the variant accordingly when calling > `CertPathConstraintsParameters` constructor. Hai-May Chao has updated the pull request incrementally with one additional commit since the las

Re: RFR: 8273236: keytool does not accurately warn about algorithms that are disabled but have additional constraints [v2]

2022-01-20 Thread Hai-May Chao
On Thu, 13 Jan 2022 16:31:35 GMT, Sean Mullan wrote: >> Hai-May Chao has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Update with review comments > > src/java.base/share/classes/sun/security/tools/keytool

Re: RFR: 8273236: keytool does not accurately warn about algorithms that are disabled but have additional constraints [v3]

2022-01-24 Thread Hai-May Chao
; and `checkKey` parameters. For the keyusage in the EE certificate of a > certificate chains, set the variant accordingly when calling > `CertPathConstraintsParameters` constructor. Hai-May Chao has updated the pull request incrementally with one additional commit since the last revisi

<    1   2   3   >