[8] Code review request for 8005922: TEST_BUG: There is no /tmp directory for windows system.

2013-05-02 Thread Jason Uh
Could I please get a review for this fix for 8005922: Edits to the manual test instructions for some policytool tests to accommodate Windows-style paths. Webrev: http://cr.openjdk.java.net/~juh/8005922/webrev.00/ Bug: http://bugs.sun.com/bugdatabase/view_bug.do?bug_id=8005922 Thanks, Jason

Re: [8] Code review request for 8005922: TEST_BUG: There is no /tmp directory for windows system.

2013-05-03 Thread Jason Uh
o that the first step is numbered as "1."? Otherwise, the changes look fine. Thanks, Jason Thanks Max On 5/3/13 1:44 PM, Jason Uh wrote: Could I please get a review for this fix for 8005922: Edits to the manual test instructions for some policytool tests to accommodate Windows-style paths

hg: jdk8/tl/jdk: 8005922: TEST_BUG: There is no /tmp directory for windows system.

2013-05-03 Thread jason . uh
Changeset: d7f3d5659c46 Author:juh Date: 2013-05-03 15:04 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/d7f3d5659c46 8005922: TEST_BUG: There is no /tmp directory for windows system. Reviewed-by: weijun ! test/sun/security/tools/policytool/ChangeUI.html ! test/sun/security/

hg: jdk8/tl/jdk: 8007699: Move some tests from test/sun/security/provider/certpath/X509CertPath to closed repo

2013-05-09 Thread jason . uh
Changeset: bb9cdfac1a7d Author:juh Date: 2013-05-09 12:00 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/bb9cdfac1a7d 8007699: Move some tests from test/sun/security/provider/certpath/X509CertPath to closed repo Reviewed-by: mullan - test/sun/security/provider/certpath/X509

8017325, 8017326: Cleanup of javadoc tag

2013-06-21 Thread Jason Uh
Joe, all, Could I please get a review of the following changes? These changesets convert the ... javadoc tags to {@code ...} as part of an overall effort to clean up doclint warnings. Webrevs -- - java.security.cert: http://cr.openjdk.java.net/~juh/8017325/webrev.00/ - java.security.spec:

Re: 8017325, 8017326: Cleanup of javadoc tag

2013-06-21 Thread Jason Uh
son The files that have been updated On 6/21/13 5:47 PM, Jason Uh wrote: Joe, all, Could I please get a review of the following changes? These changesets convert the ... javadoc tags to {@code ...} as part of an overall effort to clean up doclint warnings. Webrevs -- - java.security.cert:

Re: 8017325, 8017326: Cleanup of javadoc tag

2013-06-24 Thread Jason Uh
On 6/24/13 10:51 AM, Joe Darcy wrote: Hi Jason, On 6/21/2013 6:58 PM, Jason Uh wrote: After learning that javadoc is now capable of properly formatting the "{@code ...}" construct, I have updated the changeset for java.security.cert. Please review instead: Webrevs -- - java.sec

hg: jdk8/tl/jdk: 8017325: Cleanup of the javadoc tag in java.security.cert

2013-06-25 Thread jason . uh
Changeset: 757290440a2f Author:juh Date: 2013-06-25 14:31 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/757290440a2f 8017325: Cleanup of the javadoc tag in java.security.cert Summary: Convert javadoc ... and ... tags to {@code ...} Reviewed-by: darcy ! src/share/classes/ja

hg: jdk8/tl/jdk: 8017326: Cleanup of the javadoc tag in java.security.spec

2013-06-25 Thread jason . uh
Changeset: 3700bb58c9a2 Author:juh Date: 2013-06-25 14:41 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/3700bb58c9a2 8017326: Cleanup of the javadoc tag in java.security.spec Summary: Convert javadoc and tags to {@code ...} Reviewed-by: darcy ! src/share/classes/java/sec

Re: 8017325, 8017326: Cleanup of javadoc tag

2013-06-26 Thread Jason Uh
son, The javadoc changes look good to go back. Thanks, -Joe On 6/25/2013 1:23 PM, Jason Uh wrote: Joe, Here are the updated webrevs: - java.security.cert: http://cr.openjdk.java.net/~juh/8017325/webrev.02/ - java.security.spec: http://cr.openjdk.java.net/~juh/8017326/webrev.01

[8] Review Request: 8019360: Cleanup of the javadoc tag in java.security.*

2013-06-27 Thread Jason Uh
Joe, Could I please get a review of this changeset? These changes convert the remaining ... and ... tags to {@code ...} in java.security and its subpackages. Webrev: http://cr.openjdk.java.net/~juh/8019360/webrev.00/ I've also changed each package's package.html file to package-info.java. I

Re: [8] Review Request: 8019360: Cleanup of the javadoc tag in java.security.*

2013-06-28 Thread Jason Uh
Thanks, Joe. I've updated my changes with all the things you pointed out. The new webrev: http://cr.openjdk.java.net/~juh/8019360/webrev.01/ I'll push this now. Thanks, Jason On 6/27/13 11:36 PM, Joe Darcy wrote: Hi Jason, On 06/27/2013 11:11 PM, Jason Uh wrote: Joe, Could I pl

hg: jdk8/tl/jdk: 8019360: Cleanup of the javadoc tag in java.security.*

2013-06-28 Thread jason . uh
Changeset: 389f59e6288f Author:juh Date: 2013-06-28 10:48 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/389f59e6288f 8019360: Cleanup of the javadoc tag in java.security.* Summary: Convert to {@code ...} tags. convert package.html to package-info.java. Reviewed-by: darcy !

[8] Request for review: 8019539: Fix doclint errors in java.security and its subpackages

2013-07-01 Thread Jason Uh
Joe, Could I please get a review of this changeset? These changes fixed all (40) doclint errors in java.security and its subpackages. Webrev: http://cr.openjdk.java.net/~juh/8019539/webrev.00/ No undesirable changes were detected by specdiff. Thanks, Jason

Re: [8] Request for review: 8019539: Fix doclint errors in java.security and its subpackages

2013-07-01 Thread Jason Uh
Joe, Thanks for your comments. I just sent out an updated webrev, but let me put out a new one including my updates and changes to address your comments. Thanks, Jason On 07/01/2013 04:16 PM, Joseph Darcy wrote: On 7/1/2013 3:22 PM, Jason Uh wrote: Joe, Could I please get a review of

Re: [8] Request for review: 8019539: Fix doclint errors in java.security and its subpackages

2013-07-01 Thread Jason Uh
ags instead of creating multiple blocks. Thanks, Jason On 07/01/2013 03:22 PM, Jason Uh wrote: Joe, Could I please get a review of this changeset? These changes fixed all (40) doclint errors in java.security and its subpackages. Webrev: http://cr.openjdk.java.net/~juh/8019539/webrev.00/

Re: [8] Request for review: 8019539: Fix doclint errors in java.security and its subpackages

2013-07-01 Thread Jason Uh
Hi Joe, Here's an update to my changes to address your comments below. http://cr.openjdk.java.net/~juh/8019539/webrev.02/ Thanks, Jason On 07/01/2013 04:16 PM, Joseph Darcy wrote: On 7/1/2013 3:22 PM, Jason Uh wrote: Joe, Could I please get a review of this changeset? These changes

hg: jdk8/tl/jdk: 8019539: Fix doclint errors in java.security and its subpackages

2013-07-01 Thread jason . uh
Changeset: 17f44b2dde41 Author:juh Date: 2013-07-01 17:46 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/17f44b2dde41 8019539: Fix doclint errors in java.security and its subpackages Reviewed-by: darcy ! src/share/classes/java/security/KeyStore.java ! src/share/classes/java/

[8] Request for Review: 8019772: Fix doclint issues in javax.crypto and javax.security subpackages

2013-07-02 Thread Jason Uh
Hi Joe, Please review this changeset, which fixes doclint errors and warnings in javax.crypto, javax.security.auth, and javax.security.cert. Webrev: http://cr.openjdk.java.net/~juh/8019772/webrev.00/ Changeset have been checked for undesirable changes with specdiff. Thanks, Jason

hg: jdk8/tl/jdk: 8019772: Fix doclint issues in javax.crypto and javax.security subpackages

2013-07-03 Thread jason . uh
Changeset: d5de500c99a3 Author:juh Date: 2013-07-03 12:51 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/d5de500c99a3 8019772: Fix doclint issues in javax.crypto and javax.security subpackages Reviewed-by: darcy ! src/share/classes/javax/crypto/Cipher.java ! src/share/classe

[8] Request for review: 8020091: Fix HTML doclint issues in java.io

2013-07-08 Thread Jason Uh
Hi Joe, Please review this changeset, which fixes the HTML doclint issues in java.io. Webrev: http://cr.openjdk.java.net/~juh/8020091/webrev.00/ No undesirable changes detected by specdiff. Thanks! Jason

Re: [8] Request for review: 8020091: Fix HTML doclint issues in java.io

2013-07-08 Thread Jason Uh
Yikes. Just realized I copied the wrong list. My apologies, all. Thanks for the review, Joe! Jason On 07/08/2013 06:37 PM, Joseph Darcy wrote: Hi Jason; Looks good; approved to go back. Thanks, -Joe On 7/8/2013 5:17 PM, Jason Uh wrote: Hi Joe, Please review this changeset, which fixes

hg: jdk8/tl/jdk: 8020091: Fix HTML doclint issues in java.io

2013-07-08 Thread jason . uh
Changeset: 52454985425d Author:juh Date: 2013-07-08 19:24 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/52454985425d 8020091: Fix HTML doclint issues in java.io Reviewed-by: darcy ! src/share/classes/java/io/DataInput.java ! src/share/classes/java/io/FileInputStream.java !

hg: jdk8/tl/jdk: 8020318: Fix doclint issues in java.net

2013-07-10 Thread jason . uh
Changeset: 702556f7977e Author:juh Date: 2013-07-10 18:01 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/702556f7977e 8020318: Fix doclint issues in java.net Reviewed-by: darcy, khazra ! src/share/classes/java/net/CookieStore.java ! src/share/classes/java/net/HttpURLPermissi

[8] Request for Review: 8020557: javadoc cleanup in javax.security

2013-07-15 Thread Jason Uh
Hi Joe, Could you please review this changeset? This change converts the javadoc "..." and "..." HTML tags to "{@code ...}" and also converts package.html files to package-info.java files. Webrev: http://cr.openjdk.java.net/~juh/8020557/webrev.00/ No changes detected by specdiff. Thanks, Ja

hg: jdk8/tl/jdk: 8020557: javadoc cleanup in javax.security

2013-07-16 Thread jason . uh
Changeset: f7af15e2c95b Author:juh Date: 2013-07-16 12:19 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/f7af15e2c95b 8020557: javadoc cleanup in javax.security Reviewed-by: darcy ! src/share/classes/javax/security/auth/AuthPermission.java ! src/share/classes/javax/security/

hg: jdk8/tl/jdk: 8020426: Fix doclint accessibility issues in java.io

2013-07-18 Thread jason . uh
Changeset: 6e10d93273d0 Author:juh Date: 2013-07-18 10:49 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/6e10d93273d0 8020426: Fix doclint accessibility issues in java.io Reviewed-by: mduigou, darcy, chegar ! src/share/classes/java/io/DataInput.java ! src/share/classes/java/

[8] Request for Review: 8016916: UnstructuredName should support DirectoryString

2013-07-23 Thread Jason Uh
Can I please get a review of this changeset? Bug: http://bugs.sun.com/bugdatabase/view_bug.do?bug_id=8016916 Webrev: http://cr.openjdk.java.net/~juh/8016916/webrev.00/ This change adds PrintableString to the list of ASN.1 tags that PKCS9Attribute accepts for the UnstructuredName attribute. Also

hg: jdk8/tl/jdk: 8016916: UnstructuredName should support DirectoryString

2013-07-24 Thread jason . uh
Changeset: f9224fb49890 Author:juh Date: 2013-07-24 12:48 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/f9224fb49890 8016916: UnstructuredName should support DirectoryString Reviewed-by: mullan ! src/share/classes/sun/security/pkcs/PKCS9Attribute.java ! src/share/classes/su

hg: jdk8/tl/jdk: 8019544: Need to run ProviderTest.java in othervm mode.

2013-07-26 Thread jason . uh
Changeset: 7ae061cfd4be Author:juh Date: 2013-07-26 14:16 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/7ae061cfd4be 8019544: Need to run ProviderTest.java in othervm mode. Reviewed-by: wetmore, xuelei, vinnie Contributed-by: rajan.hal...@oracle.com ! test/sun/security/ssl/

hg: jdk8/tl/jdk: 8012971: PKCS11Test hiding exception failures

2013-07-29 Thread jason . uh
Changeset: c042fd498f79 Author:ascarpino Date: 2013-07-19 11:34 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/c042fd498f79 8012971: PKCS11Test hiding exception failures Reviewed-by: vinnie, valeriep ! test/ProblemList.txt ! test/sun/security/pkcs11/PKCS11Test.java ! test/su

hg: jdk8/tl/jdk: 8020424: The NSS version should be detected before running crypto tests

2013-07-29 Thread jason . uh
Changeset: e47569593fa0 Author:ascarpino Date: 2013-07-29 13:43 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/e47569593fa0 8020424: The NSS version should be detected before running crypto tests Reviewed-by: valeriep ! test/ProblemList.txt ! test/sun/security/pkcs11/KeyStor

hg: jdk8/tl/jdk: 8021833: javadoc cleanup in java.net

2013-07-30 Thread jason . uh
Changeset: c76f89695c90 Author:juh Date: 2013-07-30 11:04 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/c76f89695c90 8021833: javadoc cleanup in java.net Summary: and converted to {@code }; package.html to package-info.java Reviewed-by: darcy, chegar ! src/share/classes/

[8] Request for review: 8022439: Fix lint warnings in sun.security.ec

2013-08-06 Thread Jason Uh
Hi Joe, Could you please review this changeset, which takes care of deprecation warnings in sun.security.ec? http://cr.openjdk.java.net/~juh/8022439/webrev.00 Thanks, Jason

hg: jdk8/tl/jdk: 8022439: Fix lint warnings in sun.security.ec

2013-08-06 Thread jason . uh
Changeset: 8112076ae424 Author:juh Date: 2013-08-06 13:46 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/8112076ae424 8022439: Fix lint warnings in sun.security.ec Reviewed-by: darcy ! src/share/classes/sun/security/ec/ECDSASignature.java

[8] Request for Review: 8022443: Fix lint warnings in sun.security.pkcs12

2013-08-06 Thread Jason Uh
Hi Joe, Please review this changeset, which fixes lint deprecation warnings in sun.security.pkcs12. http://cr.openjdk.java.net/~juh/8022443/webrev.00/ Thanks! Jason

hg: jdk8/tl/jdk: 8022443: Fix lint warnings in sun.security.pkcs12

2013-08-06 Thread jason . uh
Changeset: 69cfd941aec2 Author:juh Date: 2013-08-06 14:10 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/69cfd941aec2 8022443: Fix lint warnings in sun.security.pkcs12 Reviewed-by: darcy ! src/share/classes/sun/security/pkcs12/PKCS12KeyStore.java

[8] Request for Review: 8022461: Fix lint warnings in sun.security.{provider, rsa, x509}

2013-08-06 Thread Jason Uh
Joe, Sean, Could I please get a review of this changeset? This change fixes deprecation warnings in: sun.security.provider sun.security.rsa sun.security.x509 In sun.security.provider and sun.security.rsa, I change the use of sun.security.x509.X509Key's key bytes to the BitArray form of the

Re: [8] Request for Review: 8022461: Fix lint warnings in sun.security.{provider, rsa, x509}

2013-08-07 Thread Jason Uh
x On 8/7/13 7:51 AM, Joe Darcy wrote: Hi Jason, Looks fine to me, but a security reviewer should approve as well. Thanks, -Joe On 08/06/2013 04:46 PM, Jason Uh wrote: Joe, Sean, Could I please get a review of this changeset? This change fixes deprecation warnings in: sun.security.p

Re: [8] Request for Review: 8022461: Fix lint warnings in sun.security.{provider, rsa, x509}

2013-08-08 Thread Jason Uh
On 08/07/2013 04:49 PM, Weijun Wang wrote: On 8/8/13 7:13 AM, Jason Uh wrote: On 8/6/13 6:30 PM, Weijun Wang wrote: One question: In src/share/classes/sun/security/x509/X509Key.java, two fields are now not recommended: @Deprecated protected byte[] key = null

hg: jdk8/tl/jdk: 8022461: Fix lint warnings in sun.security.{provider, rsa, x509}

2013-08-08 Thread jason . uh
Changeset: 67edbf7e6b26 Author:juh Date: 2013-08-08 17:06 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/67edbf7e6b26 8022461: Fix lint warnings in sun.security.{provider,rsa,x509} Reviewed-by: darcy, weijun, xuelei, mullan ! src/share/classes/sun/security/provider/DSAPublic

[8] Request for review: 8024432: Fix doclint issues in java.security

2013-09-06 Thread Jason Uh
Hi Joe, Please review this fix, which fixes doclint issues in java.security java.security.cert java.security.interfaces webrev: http://cr.openjdk.java.net/~juh/8024432/webrev.00/ Changes have been checked against specdiff. Thanks, Jason

Re: [8] Request for review: 8024432: Fix doclint issues in java.security

2013-09-06 Thread Jason Uh
Thanks, Joe. I'll make that revision before I push. On 09/06/2013 03:20 PM, Joseph Darcy wrote: Hi Jason, For the serialVersionUID changes, I recommend using "type" rather than "class". Otherwise, the changes look fine. Thanks, -Joe On 9/6/2013 2:40 PM, Jason U

hg: jdk8/tl/jdk: 8024432: Fix doclint issues in java.security

2013-09-09 Thread jason . uh
Changeset: be0bcd6a904e Author:juh Date: 2013-09-09 10:52 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/be0bcd6a904e 8024432: Fix doclint issues in java.security Reviewed-by: darcy, mullan ! src/share/classes/java/security/AccessController.java ! src/share/classes/java/secu

Re: [8] Request for review: 8024432: Fix doclint issues in java.security

2013-09-09 Thread Jason Uh
Thanks for catching that. I'll include that correction, too. Jason On 9/9/13 8:30 AM, Sean Mullan wrote: CertPathBuilderSpi [90]: should be "{@code CertPathChecker}" --Sean On 09/06/2013 05:40 PM, Jason Uh wrote: Hi Joe, Please review this fix, which fixes do

hg: jdk8/tl/jdk: 7122707: Security Providers need to have their version numbers updated for JDK8

2013-09-30 Thread jason . uh
Changeset: d0de46a2cbd0 Author:ascarpino Date: 2013-09-19 11:59 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/d0de46a2cbd0 7122707: Security Providers need to have their version numbers updated for JDK8 Reviewed-by: xuelei ! src/macosx/classes/apple/security/AppleProvider.j

hg: jdk8/tl/jdk: 8004283: test/sun/security/pkcs11/KeyStore/SecretKeysBasic.sh failing intermittently

2013-09-30 Thread jason . uh
Changeset: 2434e79fc41f Author:ascarpino Date: 2013-09-18 14:57 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/2434e79fc41f 8004283: test/sun/security/pkcs11/KeyStore/SecretKeysBasic.sh failing intermittently Reviewed-by: vinnie ! test/sun/security/pkcs11/KeyStore/SecretKey

hg: jdk8/tl/jdk: 8009438: sun/security/pkcs11/Secmod tests failing on Ubuntu 12.04

2013-09-30 Thread jason . uh
Changeset: e4c897b33cb7 Author:ascarpino Date: 2013-09-02 09:52 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/e4c897b33cb7 8009438: sun/security/pkcs11/Secmod tests failing on Ubuntu 12.04 Reviewed-by: vinnie ! src/share/classes/sun/security/pkcs11/Secmod.java

[8] Request for Review: 8026233: test/sun/security/tools/keytool/StorePasswords.java needs to clean up files

2013-10-09 Thread Jason Uh
Hi Vinnie, Could you please review this fix? The test sun/security/tools/keytool/StorePasswords.java can terminate with an error on Windows because of files not getting cleaned up, so this fix deletes the keystore file at the end of the test. webrev: http://cr.openjdk.java.net/~juh/8026233/w

[8] Request for Review: 8026052: cannot find symbol Proc

2013-10-09 Thread Jason Uh
Please review this fix. This changeset removes trailing slashes at the end of the test library paths in the jtreg @library tag, which can cause the tests to fail on Windows. webrev: http://cr.openjdk.java.net/~juh/8026052/webrev.00/ Thanks, Jason

Re: [8] Request for Review: 8026052: cannot find symbol Proc

2013-10-15 Thread Jason Uh
more like a jtreg issue if it cannot deal with that slash. I haven't noticed it failing on Windows before. Can you point me to a jtr file. Thanks Max On 10/10/13 8:56 AM, Jason Uh wrote: Please review this fix. This changeset removes trailing slashes at the end of the test library pat

Re: [8] Request for Review: 8026233: test/sun/security/tools/keytool/StorePasswords.java needs to clean up files

2013-10-17 Thread Jason Uh
01:57, Jason Uh wrote: Hi Vinnie, Could you please review this fix? The test sun/security/tools/keytool/StorePasswords.java can terminate with an error on Windows because of files not getting cleaned up, so this fix deletes the keystore file at the end of the test. webrev: http://cr.openjdk.jav

hg: jdk8/tl/jdk: 8026233: test/sun/security/tools/keytool/StorePasswords.java needs to clean up files

2013-10-17 Thread jason . uh
Changeset: fa38f8e0accd Author:juh Date: 2013-10-17 12:00 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/fa38f8e0accd 8026233: test/sun/security/tools/keytool/StorePasswords.java needs to clean up files Reviewed-by: vinnie ! test/sun/security/tools/keytool/StorePasswords.ja

[8] Request for Review: 8025287: NPE in api/java_security/cert/PKIXRevocationChecker/GeneralTests_GeneralTests

2013-10-21 Thread Jason Uh
Hi Sean, Could I please get a review of this changeset? The change checks for null params when RevocationChecker.init is called. Bug: https://bugs.openjdk.java.net/browse/JDK-8025287 Webrev: http://cr.openjdk.java.net/~juh/8025287/webrev.00/ Thanks, Jason

hg: jdk8/tl/jdk: 3 new changesets

2013-10-21 Thread jason . uh
Changeset: 975e3a89814e Author:darcy Date: 2013-10-21 13:36 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/975e3a89814e 8024603: Turn on javac lint checking for auxiliaryclass, empty, and try in jdk build Reviewed-by: erikj, ihse, chegar ! makefiles/Setup.gmk Changeset: f4

Re: [8] Request for Review: 8025287: NPE in api/java_security/cert/PKIXRevocationChecker/GeneralTests_GeneralTests

2013-10-22 Thread Jason Uh
System.out.println("Testing that get methods return null or " + "empty lists/sets/maps"); requireNull(prc.getOcspResponder(), "getOcspResponder()"); --Sean On 10/21/2013 08:12 PM, Jason Uh wrote: Hi Sean, Could I please get

hg: jdk8/tl/jdk: 8025287: NPE in api/java_security/cert/PKIXRevocationChecker/GeneralTests_GeneralTests

2013-10-22 Thread jason . uh
Changeset: c956a5d0618f Author:juh Date: 2013-10-22 11:57 -0700 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/c956a5d0618f 8025287: NPE in api/java_security/cert/PKIXRevocationChecker/GeneralTests_GeneralTests Reviewed-by: mullan ! src/share/classes/sun/security/provider/certpat

hg: jdk8/tl/jdk: 8021418: Intermittent: SSLSocketSSLEngineTemplate.java test fails with timeout

2013-11-27 Thread jason . uh
Changeset: 5ac7cd164300 Author:juh Date: 2013-11-27 15:25 -0800 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/5ac7cd164300 8021418: Intermittent: SSLSocketSSLEngineTemplate.java test fails with timeout Reviewed-by: xuelei, wetmore Contributed-by: rajan.hal...@oracle.com ! test/su

[8] Request for Review: 8007967: Infinite loop can happen in sun.security.provider.certpath.SunCertPathBuilder.depthFirstSearchForward()

2013-12-03 Thread Jason Uh
Could I please get a review for this change? This change fixes some issues in CertPath building and CRL verification. The main components of this fix are: 1. Proper setting of TrustAnchors when verifying indirect CRLs obtained from CRL Distribution Points. I added an overloaded getCRLs() metho

Re: JDK 8 RFR of 8029475 Fix more doclint issues in javax.security

2013-12-03 Thread Jason Uh
Thanks for fixing these, Joe! The changes look good. Jason On 12/03/2013 09:40 AM, Joe Darcy wrote: Hello, Please review my fixes for JDK-8029475 Fix more doclint issues in javax.security http://cr.openjdk.java.net/~darcy/8029475.0/ Changes also in-line below. Thanks, -Jo

Re: [8] Request for Review: 8007967: Infinite loop can happen in sun.security.provider.certpath.SunCertPathBuilder.depthFirstSearchForward()

2013-12-05 Thread Jason Uh
d @code tags, that is only for javadoc comments. --Sean On 12/03/2013 01:51 PM, Jason Uh wrote: Could I please get a review for this change? This change fixes some issues in CertPath building and CRL verification. The main components of this fix are: 1. Proper setting of TrustAnchors when verifyi

Re: [8] Request for Review: 8007967: Infinite loop can happen in sun.security.provider.certpath.SunCertPathBuilder.depthFirstSearchForward()

2013-12-05 Thread Jason Uh
/2013 04:04 PM, Jason Uh wrote: Thanks, Sean. I've updated the webrev with your suggestions. Also, I've changed the check for loops in ForwardBuilder.java to bail out whenever the same certificate is encountered twice. Please note that none of the policy mapping tests in the NIST PKITS

hg: jdk8/tl/jdk: 8007967: Infinite loop can happen in sun.security.provider.certpath.SunCertPathBuilder.depthFirstSearchForward()

2013-12-06 Thread jason . uh
Changeset: d6c4ae56c079 Author:juh Date: 2013-12-06 11:36 -0800 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/d6c4ae56c079 8007967: Infinite loop can happen in sun.security.provider.certpath.SunCertPathBuilder.depthFirstSearchForward() Reviewed-by: mullan ! src/share/classes/sun

Re: [8] RFR JDK-8029788: Certificate validation- java.lang.ClassCastException

2013-12-09 Thread Jason Uh
Hi Vinnie, The change looks good to me. Jason (Not an official Reviewer) On 12/9/13 3:25 PM, Vincent Ryan wrote: Please review this fix to the OCSPResponse class in the internal sun.security.provider.certpath package. Previously, when validating an OCSP response, it expected the supplied issu

[9] Request for Review: 8031025: SQE test CertPath/CertPathBuilderTest/* failed with java.lang.IndexOutOfBoundsException

2014-02-12 Thread Jason Uh
Hi all, Please review this fix for JDK 9, which checks for an empty cert path list in RevocationChecker. webrev: http://cr.openjdk.java.net/~juh/8031025/webrev.01 noreq-sqe, as the fix can be verified with existing SQE tests. Thanks, Jason

Re: Review Request for JDK-8025708 : Certificate Path Building problem with AKI serial number

2014-02-13 Thread Jason Uh
Hi Sean, Looks good to me, but I'm not an official Reviewer. I have a couple of questions, though. 1. This isn't a part of your change, but shouldn't the comment on line 200 of AdaptableX509CertSelector.java read "As for version 3,..." and not "As for version 2,..."? 2. Just curious, any re

Re: Review Request for JDK-8025708 : Certificate Path Building problem with AKI serial number

2014-02-14 Thread Jason Uh
On 2/14/14 7:17 AM, Sean Mullan wrote: On 02/13/2014 10:04 PM, Jason Uh wrote: Hi Sean, Looks good to me, but I'm not an official Reviewer. I have a couple of questions, though. Sure. 1. This isn't a part of your change, but shouldn't the comment

[9] Request for Review: 8021804: Certpath validation fails if validity period of root cert does not include validity period of intermediate cert

2014-02-28 Thread Jason Uh
Hi Sean, Could I please get a review of this change? This fix allows a certpath to be validated when a certificate issued by a version 1 trusted cert has a validity period that doesn't fall within the validity of the issuer. Trust anchors whose validity do contain the issued cert's validity p

Request for Review: 8035973: NPE in ForwardBuilder

2014-02-28 Thread Jason Uh
Could I please get a review of this change? Just a simple fix for 7u-dev that adds a check for a null CertStore, in case URICertStore.getInstance returns null. webrev: http://cr.openjdk.java.net/~juh/8035973/webrev.00/ bug: http://bugs.openjdk.java.net/browse/JDK-8035973 noreg-sqe because an

Re: Request for Review: 8035973: NPE in ForwardBuilder

2014-02-28 Thread Jason Uh
Do I need more than one noreg tag? I already have noreg-sqe. On 2/28/14 3:31 PM, Xuelei Fan wrote: Looks fine to me. noreg-trivial tag? Xuelei On 3/1/2014 3:56 AM, Jason Uh wrote: Could I please get a review of this change? Just a simple fix for 7u-dev that adds a check for a null

Re: Request for Review: 8035973: NPE in ForwardBuilder

2014-03-03 Thread Jason Uh
On 3/3/14 5:38 AM, Sean Mullan wrote: On 02/28/2014 02:56 PM, Jason Uh wrote: Could I please get a review of this change? Looks fine to me, but the priority should be higher if this requires a backport to 7u. Also, the bug should be labeled with "8-na" and "9-na" since thi

[9] Request for Review: 8036844: test failures due to wrong keystore paths

2014-03-06 Thread Jason Uh
Please review this fix for 8036844, which updates the path to a keystore used in a couple of tests. The path is no longer accurate after the recent changes to the JSSE test hierarchy. This webrev also includes a patch from Max for an enhancement to printssl.sh to correctly handle a failure in P

Re: [9] Request for Review: 8021804: Certpath validation fails if validity period of root cert does not include validity period of intermediate cert

2014-03-10 Thread Jason Uh
Thanks, Sean. I've simplified my changes to only removing the call to setValidityPeriod. http://cr.openjdk.java.net/~juh/8021804/webrev.01 Jason On 3/10/14 12:00 PM, Sean Mullan wrote: Hi Jason, Sorry for the delay in reviewing this. On 02/28/2014 02:54 PM, Jason Uh wrote: Hi Sean,

Re: [9] Request for Review: 8021804: Certpath validation fails if validity period of root cert does not include validity period of intermediate cert

2014-03-11 Thread Jason Uh
les. Otherwise, fix looks good and you can push without a re-review. --Sean On 03/10/2014 08:00 PM, Jason Uh wrote: Thanks, Sean. I've simplified my changes to only removing the call to setValidityPeriod. http://cr.openjdk.java.net/~juh/8021804/webrev.01 Jason On 3/10/14 12:00 PM, Se

Re: [9] Request for Review: 8021804: Certpath validation fails if validity period of root cert does not include validity period of intermediate cert

2014-03-11 Thread Jason Uh
! Check out other tests to see examples. Otherwise, fix looks good and you can push without a re-review. --Sean On 03/10/2014 08:00 PM, Jason Uh wrote: Thanks, Sean. I've simplified my changes to only removing the call to setValidityPeriod. http://cr.openjdk.java.net/~juh/8021804/webrev.0

Re: RFR 8037262: typo in error message in KrbAsReq.authenticate()

2014-03-13 Thread Jason Uh
383 * is part of this this AP-REQ. "this" is repeated. Jason On 3/12/14 7:18 PM, Wang Weijun wrote: Tiny webrev at http://cr.openjdk.java.net/~weijun/8037262/webrev.00/ Thanks Max

Re: Change in PKIX certificate chain validation Java 6->Java 7

2014-05-28 Thread Jason Uh
Hi Robert, This was actually fixed in https://bugs.openjdk.java.net/browse/JDK-8021804 and is pending a backport to JDK 7u. Thanks, Jason On 5/28/14 4:04 PM, Robert Gibson wrote: Hi, I was researching a StackOverflow question [1] and I came across some behaviour with the validation of cert

[9] Request for Review: 7065233: To interpret case-insensitive string locale independently

2014-06-19 Thread Jason Uh
Hi Xuelei, Could you please review this change? webrev: http://cr.openjdk.java.net/~juh/7065233/webrev.00/ bug: https://bugs.openjdk.java.net/browse/JDK-7065233 I don't think any of the strings in the lines I changed would be locale-sensitive. There are a few cases fixed here that weren't inclu

[9] RFR: 8007706: X.509 cert extension SAN should support "_" in dNSName

2014-07-22 Thread Jason Uh
Hi Max, Could you please review this fix? http://cr.openjdk.java.net/~juh/8007706/webrev.00/ With the fix, the rules will be: 1. A DNSName must begin with a letter or a digit 2. After the first character, valid characters in DNSName components are letters, digits, hyphens, and underscores A

Re: [9] RFR: 8007706: X.509 cert extension SAN should support "_" in dNSName

2014-08-04 Thread Jason Uh
implementations MUST NOT encode strings that include either the at sign or underscore character as PrintableString. RFC 5280 doesn't allow underscores for *PrintableString*, but DNSName is an *IA5String*, which does support them. Jason On 08/04/2014 03:50 AM, Florian Weimer wrote: On

Re: [9] RFR: 8007706: X.509 cert extension SAN should support "_" in dNSName

2014-08-05 Thread Jason Uh
Thanks, Florian. I will withdraw my review request and close this issue. I'll file a separate bug to allow the first character to be a digit, as RFC 1123 relaxed that restriction. Thanks, Jason On 08/04/2014 11:58 PM, Florian Weimer wrote: On 08/05/2014 07:52 AM, Jason Uh wrote: Hi Fl

[9] RFR: 8054380: X.509 cert extension SubjectAltName should allow digits as first character of dNSName

2014-08-06 Thread Jason Uh
Please review this fix, which allows the first character of a DNSName in a SubjectAltName to be either a letter or a digit. http://cr.openjdk.java.net/~juh/8054380/webrev.01/ This change is to stay compliant with RFC 1123: RFC 1123, Section 2.1: One aspect of host name syntax is hereby chang

Re: [9] RFR: 8054380: X.509 cert extension SubjectAltName should allow digits as first character of dNSName

2014-08-22 Thread Jason Uh
Please see the revised webrev here: http://cr.openjdk.java.net/~juh/8054380/webrev.02/ Additional changes include: 1. Verification of the DNSName during certificate parsing 2. Allowing each component to start with a letter or digit 2. A check to make sure the final character of a component ends i

Re: [9] RFR: 8054380: X.509 cert extension SubjectAltName should allow digits as first character of dNSName

2014-08-25 Thread Jason Uh
(Everything now says "DNSNames".) Updated webrev here: http://cr.openjdk.java.net/~juh/8054380/webrev.03/ Thanks, Jason --Sean On 08/22/2014 05:07 PM, Jason Uh wrote: Please see the revised webrev here: http://cr.openjdk.java.net/~juh/8054380/webrev.02/ Additional changes include: 1. V

Re: [9] RFR: 8054380: X.509 cert extension SubjectAltName should allow digits as first character of dNSName

2014-08-25 Thread Jason Uh
On 08/25/2014 04:14 PM, Sean Mullan wrote: On 08/25/2014 04:05 PM, Jason Uh wrote: On 08/25/2014 03:41 PM, Sean Mullan wrote: Just a couple of comments: 1. I think the check on lines 106-110 can be done prior to the for loop on line 94 I think that check is actually where it should be

Re: Review request for CR 8049039 Need new tests for sun.securiy.x509 classes

2014-08-26 Thread Jason Uh
Hi Raghu, I'm not an official Reviewer, but I have some comments, mostly about X509Test.java. 1. I'm not sure if this matters, but the formatting of your copyright header is a little strange. The text appears to be correct, but the line breaks occur at non-standard places. If you look at any

Re: Review request for CR 8049039 Need new tests for sun.securiy.x509 classes

2014-09-02 Thread Jason Uh
014 9:43 AM, raghu k.nair wrote: Hi Jason, Thanks for your review comments. On 8/26/2014 11:37 PM, Jason Uh wrote: Hi Raghu, I'm not an official Reviewer, but I have some comments, mostly about X509Test.java. 1. I'm not sure if this matters, but the formatting of your copyright heade

Re: Review request for CR 8049039 Need new tests for sun.securiy.x509 classes

2014-09-05 Thread Jason Uh
son, Please review the updated webrev . I have addressed your comments. http://cr.openjdk.java.net/~tyan/raghu/8049039/webrev03/ <http://cr.openjdk.java.net/%7Etyan/raghu/8049039/webrev03/> Thanks, Raghu On 9/3/2014 12:47 AM, Jason Uh wrote: On 8/27/14 8:34 AM, raghu k.nair wrote: Hi

[9] RFR: 8047223: Add algorithm parameter to EncodedKeySpec class and its two subclasses

2014-09-10 Thread Jason Uh
Please review this change, which adds a constructor taking an algorithm name parameter to EncodedKeySpec and its subclasses. This allows the algorithm name to be retrieved in subsequent calls to the EncodedKeySpec. webrev: http://cr.openjdk.java.net/~juh/8047223/webrev.01/ https://bugs.openjdk.

[9] RFR: 8037550: Update RFC references in javadoc to RFC 5280

2014-09-18 Thread Jason Uh
Please review this changeset, which updates references to RFC 3280 to RFC 5280. RFC 5280 has obsoleted 3280. http://cr.openjdk.java.net/~juh/8037550/webrev.03/ Thanks, Jason

Re: CFV: New Security Group Member: Anthony Scarpino

2014-11-04 Thread Jason Uh
Vote: Yes Jason On 11/03/2014 09:28 AM, Sean Mullan wrote: I hereby nominate Anthony Scarpino to Membership in the Security Group. Anthony is a member of the Java Security Libraries team at Oracle and has been an active contributor to the OpenJDK Security Group for approximately two years. Ant

[9] Request for Review: 8046724: XML Signature ECKeyValue elements cannot be marshalled or unmarshalled

2014-12-16 Thread Jason Uh
Please review this fix, which allows XML Signature ECKeyValue elements to be marshalled and unmarshalled. Dependence on internal sun.security.* classes has been removed, so that the (un)marshalling can happen without reflection. webrev: http://cr.openjdk.java.net/~juh/8046724/00/ bug: https:/

Re: [9] Request for Review: 8046724: XML Signature ECKeyValue elements cannot be marshalled or unmarshalled

2015-01-08 Thread Jason Uh
wn on line 498) 520,524: these methods should be private --Sean On 12/16/2014 02:44 PM, Jason Uh wrote: Please review this fix, which allows XML Signature ECKeyValue elements to be marshalled and unmarshalled. Dependence on internal sun.security.* classes has been removed, so that the (un)marsha

Re: [9] Request for Review: 8046724: XML Signature ECKeyValue elements cannot be marshalled or unmarshalled

2015-01-09 Thread Jason Uh
Thanks, I'll push after I remove that comment. Jason On 01/09/2015 10:50 AM, Sean Mullan wrote: On 01/08/2015 09:46 PM, Jason Uh wrote: Thanks, Sean. Here is an updated webrev with your suggested changes. I've also added tests here, and will no longer be adding tests for this ch

[9] RFR: 8059916: Change default criticality of policy mappings and policy constraints certificate extensions

2015-01-12 Thread Jason Uh
Please review this change, which changes the default criticality of the policy mappings and policy constraints certificate extensions. This change makes both extensions critical by default, per RFC 5280. webrev: http://cr.openjdk.java.net/~juh/8059916/01/webrev bug: https://bugs.openjdk.java.ne

Re: [9] RFR: 8059916: Change default criticality of policy mappings and policy constraints certificate extensions

2015-01-13 Thread Jason Uh
gs_Id; +critical = true; (Good catch, Jamil.) Jason On 1/13/15 4:55 AM, Sean Mullan wrote: Looks good to me. --Sean On 01/12/2015 06:56 PM, Jason Uh wrote: Please review this change, which changes the default criticality of the policy mappings and policy constraints certificate extensions.

[9] RFR: 8042967: Add variant of DSA Signature algorithms that do not ASN.1 encode the signature bytes

2015-01-22 Thread Jason Uh
Please review this change, which enables DSA and ECDSA signatures in the IEEE P1363 format (the concatenation of r and s). This is accomplished through an implementation of AlgorithmParameterSpec, SignatureFormatParameterSpec, which can be passed to the existing Signature.setParameter() method

Re: [9] RFR: 8042967: Add variant of DSA Signature algorithms that do not ASN.1 encode the signature bytes

2015-01-23 Thread Jason Uh
TestDSA2 - can you add an @bug 8042967 to each of these tests, since you are extending them to test this new format. - can you also add a test which uses the SignatureFormatParameterSpec.ASN1 enum (by passing it to setParameter)? --Sean On 01/22/2015 09:46 PM, Jason Uh wrote: Please revie

Re: [9] RFR: 8042967: Add variant of DSA Signature algorithms that do not ASN.1 encode the signature bytes

2015-01-29 Thread Jason Uh
Mike, Thanks for your feedback. I'll be changing this fix to introduce new algorithm Strings to specify the P1363 format. These strings will be of the form: withinFormat For example: SHA1withDSAinP1363Format SHA1withECDSAinP1363Format The intent is to reduce potential confusion with

Re: [9] RFR: 8042967: Add variant of DSA Signature algorithms that do not ASN.1 encode the signature bytes

2015-01-30 Thread Jason Uh
Mike, Thanks again for weighing in. As you're not opposed to the proposal, I will go ahead and move forward with this plan. I will put out an updated webrev with the new approach once it is ready. Thanks, Jason On 1/29/15 3:56 PM, Michael StJohns wrote: At 03:41 PM 1/29/2015, Jas

  1   2   >