[security-dev 00123]: hg: jdk7/jsn/jdk: 4 new changesets

2008-03-21 Thread yu-ching . peng
Changeset: 74bc85c0f2a9 Author:valeriep Date: 2008-03-20 16:02 -0700 URL: http://hg.openjdk.java.net/jdk7/jsn/jdk/rev/74bc85c0f2a9 4898461: Support for ECB and CBC/PKCS5Padding Summary: Add support for ECB mode and PKCS5Padding Reviewed-by: andreas ! src/share/classes/sun/security/

[security-dev 00130]: hg: jdk7/jsn/jdk: 6681652: Two new regression test failures in pkcs11 code

2008-03-31 Thread yu-ching . peng
Changeset: 8805ae9d160c Author:valeriep Date: 2008-03-31 11:09 -0700 URL: http://hg.openjdk.java.net/jdk7/jsn/jdk/rev/8805ae9d160c 6681652: Two new regression test failures in pkcs11 code Summary: Fixed the test to not assume SunJCE provider being the provider for DES Reviewed-by: w

[security-dev 00133]: hg: jdk7/jsn/jdk: 3 new changesets

2008-03-31 Thread yu-ching . peng
Changeset: 17e93b7fb97d Author:valeriep Date: 2008-03-31 16:12 -0700 URL: http://hg.openjdk.java.net/jdk7/jsn/jdk/rev/17e93b7fb97d 6682411: JCK test failed w/ ArrayIndexOutOfBoundException (-1) when decrypting with no data Summary: Fixed PKCS5Padding class with additional check and

[security-dev 00161]: hg: jdk7/jsn/jdk: 3 new changesets

2008-04-25 Thread yu-ching . peng
Changeset: 51eab854cb1a Author:valeriep Date: 2008-04-25 15:19 -0700 URL: http://hg.openjdk.java.net/jdk7/jsn/jdk/rev/51eab854cb1a 6524501: inconsistency with PKCS#11 spec - 0-value flags in CK_SLOT_INFO struct returned by C_GetSlotInfo() Reviewed-by: mullan ! src/share/classes/su

[security-dev 00162]: hg: jdk7/jsn/jdk: 6695818: New regression test (KerberosTixDateTest) for Kerberos failing on (probably) all platforms.

2008-04-30 Thread yu-ching . peng
Changeset: 27719467fb93 Author:valeriep Date: 2008-04-30 11:10 -0700 URL: http://hg.openjdk.java.net/jdk7/jsn/jdk/rev/27719467fb93 6695818: New regression test (KerberosTixDateTest) for Kerberos failing on (probably) all platforms. Reviewed-by: mullan ! test/javax/security/auth/ke

[security-dev 00668]: hg: jdk7/tl/jdk: 2 new changesets

2009-03-05 Thread yu-ching . peng
Changeset: da9d0283a496 Author:valeriep Date: 2009-03-03 19:50 -0800 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/da9d0283a496 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider Summary: Removed finalize() and add more e

[security-dev 00743]: hg: jdk7/tl/jdk: 2 new changesets

2009-04-06 Thread yu-ching . peng
Changeset: 45ff1a9d4edb Author:valeriep Date: 2009-04-06 18:46 -0700 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/45ff1a9d4edb 4735126: (cl) ClassLoader.loadClass locks all instances in chain when delegating Summary: Added support for parallel-capable class loaders Reviewed-by: a

[security-dev 00751]: hg: jdk7/tl/jdk: 6829098: Regression test java/security/Security/ClassLoaderDeadlock/Deadlock2.java error - missing "; "

2009-04-13 Thread yu-ching . peng
Changeset: 6f99dbd58123 Author:valeriep Date: 2009-04-13 18:20 -0700 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/6f99dbd58123 6829098: Regression test java/security/Security/ClassLoaderDeadlock/Deadlock2.java error - missing ";" Summary: Added back the missing ";" Reviewed-by:

[security-dev 00983]: hg: jdk7/tl/jdk: 6832540: IllegalArgumentException in ClassLoader.definePackage when classes are loaded in parallel

2009-07-13 Thread yu-ching . peng
Changeset: beb5e5cad3ae Author:valeriep Date: 2009-07-13 15:14 -0700 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/beb5e5cad3ae 6832540: IllegalArgumentException in ClassLoader.definePackage when classes are loaded in parallel Summary: Modified to handle race condition for parall

[security-dev 01004]: hg: jdk7/tl/jdk: 2 new changesets

2009-07-23 Thread yu-ching . peng
Changeset: cd7758c85d13 Author:valeriep Date: 2009-07-22 17:52 -0700 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/cd7758c85d13 6823905: crash in sun.security.pkcs11.wrapper.PKCS11.C_Sign during stress-test Summary: Initialize relevant return value to NULL Reviewed-by: vinnie ! s

[security-dev 01713]: hg: jdk7/tl/jdk: 3 new changesets

2010-03-18 Thread yu-ching . peng
Changeset: c52f292a8f86 Author:valeriep Date: 2010-03-18 17:05 -0700 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/c52f292a8f86 6695485: SignedObject constructor throws ProviderException if it's called using provider "SunPKCS11-Solaris" Summary: Added checking for RSA key lengths

hg: jdk7/tl/jdk: 2 new changesets

2010-04-12 Thread yu-ching . peng
Changeset: 6b641c576e77 Author:valeriep Date: 2010-04-07 17:20 -0700 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/6b641c576e77 6918573: sun.security.pkcs11.P11RSACipher.finalize() is a scalability blocker Summary: Removed the finalize() methods and use PhantomReference in Session

[security-dev 00040]: Re: JCE webrev requested...

2008-01-10 Thread Valerie (Yu-Ching) Peng
The changes look fine although I prefer the later, e.g. explicitly specifies SunJCE to be used, slightly since it does not depend on other provider(s). Thanks, Valerie Brad Wetmore wrote: Valerie, Here's that PBE memory leak bug which was calling "new SunJCE" for every PBE key created.

[security-dev 01746]: Re: '\0' in alias name of a pkcs11 keystore

2010-03-30 Thread Valerie (Yu-Ching) Peng
Why do you assume that the key is generated in software? You use the KeyGenerator API to generate a key, this key can be generated on the HSM if you have SunPKCS11 provider configured to be the most preferred provider. This key should actually just encapsulate the native key handle (not the act

[security-dev 01752]: Re: alias in KeyPairGenerator - was: '\0' in alias name of a pkcs11 keystore

2010-03-31 Thread Valerie (Yu-Ching) Peng
ate key object. If we want to use HSM vendors tools to manipulate objects this usually causes problems because they mostly rely on an alias. So finally :-) this is why an alias parameter to KeyPairGenerator would be useful. Cheers, Tomas On 03/30/2010 08:34 PM, Valerie (Yu-Ching) Peng wrote:

Re: [PATCH FOR REVIEW]: Improve error output for NSS provider

2010-04-15 Thread Valerie (Yu-Ching) Peng
I've looked at the changes and they look fine to me. If you can work w/ Andrew to get this in, e.g. bug id, integration, etc., that'd be good. Thanks, Valerie On 04/14/10 23:49, Bradford Wetmore wrote: Valerie, did you want to look at this, or I can work with Andrew on getting this in. It's

Re: [security-dev 01750]: Re: alias in KeyPairGenerator - was: '\0' in alias name of a pkcs11 keystore

2010-04-19 Thread Valerie (Yu-Ching) Peng
rwise it is not possible to generate key because the HSM will throw an error, usually invalid_template. Does this happen for all keys or just for EC keys? Cheers, Tomas Valerie (Yu-Ching) Peng wrote: If the default PKCS11 config is used, I'd expect that KeyPairGen

Re: [security-dev 01750]: Re: alias in KeyPairGenerator - was: '\0' in alias name of a pkcs11 keystore

2010-04-20 Thread Valerie (Yu-Ching) Peng
RIVATE_KEY,*) = { CKA_EXTRACTABLE = false CKA_DECRYPT = true CKA_SIGN = true CKA_UNWRAP = true } - The results are the same as in 2. Only the certificate has a label when listing the objects in the HSM (with 'cmu list'). Kind regards, Tomas Valerie (Yu-Ching) Peng wrote: You

Re: code review request: 6882687 KerberosTime too imprecise

2010-05-18 Thread Valerie (Yu-Ching) Peng
Hi, Max, Your fixes look fine. Thanks, Valerie On 05/17/10 03:06, Weijun Wang wrote: Hi Valerie A new bug 6950930 filed for the same problem. So ping again. Webrev small update at -- http://cr.openjdk.java.net/~weijun/6882687/webrev.01 Changes: 1. 2009 -> 2010 2. new fields now private

Re: code review request: 6844907: krb5 etype order should be from strong to weak

2010-06-07 Thread Valerie (Yu-Ching) Peng
Max, Changes look fine to me. Thanks, Valerie On 06/01/10 01:33, Weijun Wang wrote: Hi All Please review this webrev: http://cr.openjdk.java.net/~weijun/6844907/webrev.00/ Three notes: 1. The etype order change has effect on keys in a keytab file. In KeyTab.java, I've made the followi

Re: [security-dev 01547]: Re: PING: [PATCH FOR REVIEW]: 6763530: Fix breakage of NSS-based Elliptic Curve Cryptography in OpenJDK6

2010-06-28 Thread Valerie (Yu-Ching) Peng
Vinnie is on vacation, so I'll take a shot of answering this. According to the bug record, the fix for 6763530 is in jdk7, openjdk6 and not in Oracle's jdk6 update release. Not all bugs are backported, it's subject to RE's discretion. I've opened a subCR against this particular release train an

Re: code review request: 6969292: make DNS lookup for realm/kdc really work

2010-07-16 Thread Valerie (Yu-Ching) Peng
Looks fine except the following minor nit: - Why not return realm on line 1224 after a match is found? Doesn't seem necessary to continue w/ the whole for-loop. Thanks, Valerie On 07/15/10 23:23, Weijun Wang wrote: Updated webrev: http://cr.openjdk.java.net/~weijun/6969292/webrev.01/ Chang

Re: code review request: 6960894: Better AS-REQ creation and processing

2010-07-30 Thread Valerie (Yu-Ching) Peng
right? Can you rename them so it's clearer? There is no checking in getKeys() and if called out of sequence, it looks to me that it'll error out w/ NPE since eType is still null. Thanks, Valerie On 07/21/10 12:32, Valerie (Yu-Ching) Peng wrote: On 06/13/10 08:02, Weijun Wa

Code review request for 6687725 and 6848930

2010-08-31 Thread Valerie (Yu-Ching) Peng
Hi, Brad, Do you have time to review these two PKCS11 fixes? They are straight forward. 6687725: Internal PKCS5Padding impl should throw IllegalBlockSizeException and not BadPaddingException Webrev - http://cr.openjdk.java.net/~valeriep/6687725 6848930: JSN security test jce/Global/Cipher/P

Code review request for 6850402 and 6887853

2010-08-31 Thread Valerie (Yu-Ching) Peng
Hi, Sean, Do you have time to review these two fixes? 6850402: Deadlock on sun.security.jca.ProviderConfig starting from jdk7-b55 http://cr.openjdk.java.net/~valeriep/6850402 Note: verify by re-running the stress test 6887853: javadoc for java.lang.Classloader should be more clear http://cr.ope

Re: Code review request for 6687725 and 6848930

2010-09-01 Thread Valerie (Yu-Ching) Peng
st of the week. Brad On 8/31/2010 5:20 PM, Valerie (Yu-Ching) Peng wrote: Hi, Brad, Do you have time to review these two PKCS11 fixes? They are straight forward. 6687725: Internal PKCS5Padding impl should throw IllegalBlockSizeException and not BadPaddingException Webrev - http://cr.o

Code Review Request for 7155720: PKCS11 minor issues in native code

2013-03-29 Thread Valerie (Yu-Ching) Peng
Trivial fix - just add null check and OOM error handling for the 2 malloc calls inside src/solaris/native/sun/security/pkcs11/wrapper/p11_md.c. Please find webrev against JDK8 at: http://cr.openjdk.java.net/~valeriep/7107615/webrev.00/ Thanks, Valerie

Re: Code Review Request for 7155720: PKCS11 minor issues in native code

2013-04-01 Thread Valerie (Yu-Ching) Peng
Yes, please find the correct webrev at: http://cr.openjdk.java.net/~valeriep/7155720/webrev.00/ Thanks, Valerie On 04/01/13 07:43, Sean Mullan wrote: On 03/29/2013 08:32 PM, Valerie (Yu-Ching) Peng wrote: Trivial fix - just add null check and OOM error handling for the 2 malloc calls inside

Re: Code Review Request for 7155720: PKCS11 minor issues in native code

2013-04-04 Thread Valerie (Yu-Ching) Peng
Makes sense. I will update the fix accordingly. Thanks, Valerie On 04/04/13 00:33, Florian Weimer wrote: On 04/01/2013 08:26 PM, Valerie (Yu-Ching) Peng wrote: Yes, please find the correct webrev at: http://cr.openjdk.java.net/~valeriep/7155720/webrev.00/ I think in the second hunk of the

Re: Code review request: 8011124: Make KerberosTime immutable

2013-04-16 Thread Valerie (Yu-Ching) Peng
Changes look good, don't forget to update the copyright years though. Thanks, Valerie On 04/03/13 04:31, Weijun Wang wrote: http://cr.openjdk.java.net/~weijun/8011124/webrev.00/ KerberosTime is a very basic data type and it is nice to be immutable. One test is updated. No new regression test f

Re: Code review request JDK-8006935: Need to take care of long secret keys in HMAC/PRF compuation

2013-04-16 Thread Valerie (Yu-Ching) Peng
The fixes look fine. Thanks, Valerie On 04/16/13 05:30, Xuelei Fan wrote: Hi Valerie, Are you available to review the HAMC impl update in JCE/TLS? Webrev: http://cr.openjdk.java.net./~xuelei/8006935/webrev.00/ The issue comes from the practice that the industry starts to use large Diffie-Hel

Code Review Request for 7196009

2013-04-18 Thread Valerie (Yu-Ching) Peng
Max, Do you have time to review the following fix? 7196009: SunPkcs11 provider fails to parse config path containing parenthesis I made the adjustments to support quoted strings for the library path settings in the PKCS11 provider configuration file. If the path contain parenthesis or spaces,

Code Review Requests for 7196382 and 8010134

2013-04-18 Thread Valerie (Yu-Ching) Peng
Xuelei, Do you have time to review the following two fixes? 7196382: PKCS11 provider should support 2048-bit DH 8010134: A finalizer in sun.security.pkcs11.wrapper.PKCS11 perhaps should be protected The first one removes the hardcoded limit of 1024 for DH and the second one is making the fina

Re: Code Review Request for 7196009

2013-04-22 Thread Valerie (Yu-Ching) Peng
t; -Max > > 在 Apr 19, 2013,10:38,"Valerie (Yu-Ching) Peng" 写道: > >> Max, >> >> Do you have time to review the following fix? >> 7196009: SunPkcs11 provider fails to parse config path containing parenthesis >> >> I made the adjustments to support q

Re: Code Review Request for 7196009

2013-04-22 Thread Valerie (Yu-Ching) Peng
The concurrent config parsing impl in SunPKCS11 provider may seem more complicated than necessary at the first sight. However, it has several advantages: this strict parsing can detect invalid settings right at parsing time and fail if any error is detected. Special handling for different keys

Re: Code review: 8001284 & 8012971

2013-04-23 Thread Valerie (Yu-Ching) Peng
Both fixes look fine. However, for easier tracking, it's better to separate them out into 2 separate webrevs under their corresponding bug ids. Can you please do that? Thanks, Valerie On 04/22/13 14:18, Anthony Scarpino wrote: This code review is for the following two bugs: - 8001284 Buffer p

Re: Review Request for 9000142: PlatformPCSC.java loading unversioned native shared library

2013-04-24 Thread Valerie (Yu-Ching) Peng
Won't this change break systems which don't have libpcsclite.so.1? Changes like this need to be thought through. What happens when libpcsclite.so.2 comes out? As for API changes, shouldn't there be some compatibility requirement on APIs as libpcsclite.so evolves? Valerie On 04/24/13 04:05, Fl

Re: Code Review Requests for 7196382 and 8010134

2013-04-25 Thread Valerie (Yu-Ching) Peng
additional algorithm-specific check (e.g. multiples of 64 bits) that can't be expressed through the ranges. I am still testing out the changes. Will post an updated webrev for 7196382 once I am done testing... Thanks! Valerie On 04/18/13 21:45, Xuelei Fan wrote: On 4/19/2013 10:43 AM, Valerie

Re: Code Review Requests for 7196382 and 8010134

2013-04-26 Thread Valerie (Yu-Ching) Peng
Xuelei, I have updated the webrev for 7196382 so it uses the key size range info from the underlying PKCS library for key size checking: http://cr.openjdk.java.net/~valeriep/7196382/webrev.01/ Thanks, Valerie On 04/25/13 10:59, Valerie (Yu-Ching) Peng wrote: Xuelei, Thanks for the review

Re: Code review request: 8010192: Enable native JGSS provider on Mac

2013-05-03 Thread Valerie (Yu-Ching) Peng
So, has this changes been tested against the existing regression tests on Mac? After this, is the native JGSS provider get used on Mac for most if not all Kerberos operation or is it still Java Kerberos? Otherwise, changes look ok to me. Valerie On 03/18/13 05:38, Erik Joelsson wrote: The b

Re: [8] code review request 4634141: PBE Cipher should have the ability to use params from PBE Key

2013-05-03 Thread Valerie (Yu-Ching) Peng
Vinnie, Hmm, so, are we taking the salt and ic value from the key object for decrypt mode? If yes, then the if-cond checking on line 214 will have to be deferred to a later point where we checked both key and the parameters. Do we check for consistent values of salt and ic if both key and pa

Re: Code review request: 8012679: Let allow_weak_crypto default to false

2013-05-07 Thread Valerie (Yu-Ching) Peng
Changes look fine. Thanks, Valerie On 05/06/13 19:47, Weijun Wang wrote: Webrev at http://cr.openjdk.java.net/~weijun/8012679/webrev.00/ Thanks Max

Code Review Request for 8013069: javax.crypto tests fail with new PBE algorithm names

2013-05-07 Thread Valerie (Yu-Ching) Peng
Vinnie, Could you please help reviewing the fixes for 8013069 "javax.crypto tests fail with new PBE algorithm names"? Given that the current javax.crypto.Mac API doesn't provide a way to return algorithm parameters (unlike most of other crypto engine classes), I think it's better to error ou

Re: Code Review Request for 8013069: javax.crypto tests fail with new PBE algorithm names

2013-05-08 Thread Valerie (Yu-Ching) Peng
ic' be expanded to 'iteration count' in the exception message in HmacPKCS12PBESHA1.java and PBMAC1Core.java? On 8 May 2013, at 02:08, Valerie (Yu-Ching) Peng wrote: Vinnie, Could you please help reviewing the fixes for 8013069 "javax.crypto tests fail with new PBE algori

Re: RFR JDK-8014307

2013-05-15 Thread Valerie (Yu-Ching) Peng
John, 1) 332-333 can be replaced w/ a deleteGSSOID(nameType) call. Also, with this deleteGSSOID(nameType) call, we should also add the following line: resetGSSBuffer(env, jnameVal, &nameVal); 2) I think the ExceptionCheck block on line 932 should also be enhanced w/ resetGSSBuffer(env, j

Re: RFR JDK-8014307

2013-05-22 Thread Valerie (Yu-Ching) Peng
The resetGSSBuffer(..) call on line 829 should be removed as the inToken structure isn't even initialized yet (initGSSBuffer call is on line 833). Rest looks fine. Thanks, Valerie On 05/22/13 11:54, John Zavgren wrote: Greetings: I just updated: /jdk/src/share/native/sun/security/jgss/wrapper/G

Re: Code review request: 8014196: ktab creates a file with zero kt_vno

2013-05-23 Thread Valerie (Yu-Ching) Peng
On 05/12/13 22:39, Weijun Wang wrote: Hi Valerie Please take a look at http://cr.openjdk.java.net/~weijun/8014196/webrev.01/ KeyTab.getInstance() used to return null if the keytab file does not exists, but since we supported dynamic ktab, the result is never null. But the KeyTab object ha

Code Review Request for 7196805: DH Key interoperability testing between SunJCE and JsafeJCE not successful

2013-05-28 Thread Valerie (Yu-Ching) Peng
Vinnie, Can you help reviewing my fix for 7196805 "DH Key interoperability testing between SunJCE and JsafeJCE not successful"? In SunJCE provider, the equality check for DH private/public keys is based on DER encoding which may not be correct all the time due to the optional L value defined

Re: Code review request: 8001326: Improve Kerberos replay caching

2013-05-30 Thread Valerie (Yu-Ching) Peng
One question: In DflCache.java, you mentioned that the old style block is always created even if a new style is available. When both are present, Is it always new style before old one? The impl in DflCache.java seems to assume this. Thanks, Valerie On 05/28/13 01:45, Weijun Wang wrote: Pleas

Code review request for 8012637: Adjust CipherInputStream class to work in AEAD/GCM mode

2013-06-11 Thread Valerie (Yu-Ching) Peng
Xuelei, Can you help review this one-line fix? 8012637: Adjust CipherInputStream class to work in AEAD/GCM mode The webrev is at: http://cr.openjdk.java.net/~valeriep/8012637/webrev.00/ Thanks, Valerie

Code Review Requests for 8012900: CICO ignores AAD in GCM mode

2013-06-11 Thread Valerie (Yu-Ching) Peng
Xuelei, Here is another GCM and CipherInputStream/CipherOutputStream related fix, i.e. for 8012900: CICO ignores AAD in GCM mode The key changes are in CipherCore.java, GalorisCounterMode.java, the rest files only have minor changes. Essentially, when using AES/GCM cipher in decryption mode,

Re: Code review request: 8014310: JAAS/Krb5LoginModule using des encytypes failure with NPE after JDK-8012679

2013-06-12 Thread Valerie (Yu-Ching) Peng
Changes look fine. Just curious, what's the reason for the changes in KeyTab.java? Valerie On 06/07/13 00:31, Weijun Wang wrote: Ding dong. On 5/27/13 10:06 AM, Weijun Wang wrote: Please review the code changes at http://cr.openjdk.java.net/~weijun/8014310/webrev.00/ The reason is that

Re: Code review request: 8014310: JAAS/Krb5LoginModule using des encytypes failure with NPE after JDK-8012679

2013-06-12 Thread Valerie (Yu-Ching) Peng
Ok, I have no more comments. Thanks, Valerie On 06/12/13 15:16, Wang Weijun wrote: > > 在 Jun 13, 2013,4:14 AM,"Valerie (Yu-Ching) Peng" 写道: > >> Changes look fine. >> Just curious, what's the reason for the changes in KeyTab.java? > There was an EType.get

Re: RFR JDK-8014307

2013-06-14 Thread Valerie (Yu-Ching) Peng
e: RFR JDK-8014307 Date: Wed, 22 May 2013 16:18:33 -0700 From: Valerie (Yu-Ching) Peng Reply-To: valerie.p...@oracle.com To: security-dev@openjdk.java.net The resetGSSBuffer(..) call on line 829 should be removed as the inToken structure isn't even initialized yet (initGSSBuffer call

Re: Code review request for 8012637: Adjust CipherInputStream class to work in AEAD/GCM mode

2013-06-14 Thread Valerie (Yu-Ching) Peng
/java/javase/documentation/codeconventions-142311.html#15395 - if (!done) cipher.doFinal(); + if (!done) { + cipher.doFinal(); + } Xuelei On 6/12/2013 6:52 AM, Valerie (Yu-Ching) Peng wrote: Xuelei, Can you help review this one-line fix? 8012637: Adjust CipherInputStream class to work

Re: Code Review Request for 7196805: DH Key interoperability testing between SunJCE and JsafeJCE not successful

2013-06-17 Thread Valerie (Yu-Ching) Peng
ss the central authority specifies a private-value length l, in which case the integer shall satisfy 2^(l-1)<= x< 2^l. I will re-test everything and let you know once I have the webrev updated. Thanks, Valerie Thanks Max On 5/29/13 9:25 AM, Valerie (Yu-Ching) Peng wrote: Vinnie, Can y

Re: RFR JDK8007636

2013-06-18 Thread Valerie (Yu-Ching) Peng
I recall reviewing this use-after-free problem a while ago? Isn't this the same one that's caught by parfait earlier? The synopsis for 8007636 is "[parfait] False positive buffer overrun error in jdk/src/solaris/transport/socket/socket_md.c". Your changes do not seem to match the bug description

Re: Code Review Request for 7196805: DH Key interoperability testing between SunJCE and JsafeJCE not successful

2013-06-19 Thread Valerie (Yu-Ching) Peng
I have updated the webrev to address your comments: http://cr.openjdk.java.net/~valeriep/7196805/webrev.01/ As for using JDK 8 default method feature, I think maybe it's better to delay the adoption to a later release since it's easier for sustaining to just grab current changes and apply to ea

Re: RFR JDK-8003245

2013-06-19 Thread Valerie (Yu-Ching) Peng
John, Just wondering that if you have checked other PKCS11 native code in the same directory for similar problems? It seems to me that at least p11_crypt.c, p11_digest.c, p11_general.c, also contains similar usage pattern. Thanks, Valerie On 06/18/13 19:27, John Zavgren wrote: Greetings:

Re: Code Review Request for 7196805: DH Key interoperability testing between SunJCE and JsafeJCE not successful

2013-06-25 Thread Valerie (Yu-Ching) Peng
t. Thanks, Valerie On 06/24/13 21:20, Weijun Wang wrote: Code change looks fine. No regression test? --Max On 6/20/13 4:45 AM, Valerie (Yu-Ching) Peng wrote: I have updated the webrev to address your comments: http://cr.openjdk.java.net/~valeriep/7196805/webrev.01/ As for using JDK 8 default method

Re: [8] code review request for 7165807: Non optimized initialization of NSS crypto library leads to scalability issues

2013-06-25 Thread Valerie (Yu-Ching) Peng
- The private static native boolean nssInit(...) method should be removed? It seems obsolete by nssInitWithOptions(...) and I didn't see it being used anywhere. Same goes for the corresponding JNI method impl, i.e. Java_sun_security_pkcs11_Secmod_nssInit, in the j2secmod.c file. - Particul

Re: Code Review Request for 7196805: DH Key interoperability testing between SunJCE and JsafeJCE not successful

2013-06-25 Thread Valerie (Yu-Ching) Peng
Great, thanks for the review! Valerie On 06/25/13 16:34, Wang Weijun wrote: > > 在 Jun 26, 2013,6:51 AM,"Valerie (Yu-Ching) Peng" 写道: > >> It's covered by SQE interoperability tests. > That's enough. > >> In terms of regression tests, I think we sh

Re: [8] code review request for 7165807: Non optimized initialization of NSS crypto library leads to scalability issues

2013-06-26 Thread Valerie (Yu-Ching) Peng
Sure, zapping the nssInit() for only JDK 8 is fine. Being a private static method, I doubt that its removal will break anything though. Thanks, Valerie On 06/26/13 11:38, Vincent Ryan wrote: Thanks for the review Valerie. Comments below. On 26 Jun 2013, at 00:23, Valerie (Yu-Ching) Peng

Re: Code review request: 6755701 SecretKeySpec & DES

2013-07-02 Thread Valerie (Yu-Ching) Peng
Well, I don't think there is anything wrong with the SecretKeyFactory.generateSecret API. DESKeySpec/DESedeKeySpec do check the length of the key bytes when constructed. If we were to accept the SecretKeySpec object as generic key spec, then we should add additional checkings and throw Invalid

Re: Code review request: 6755701 SecretKeySpec & DES

2013-07-03 Thread Valerie (Yu-Ching) Peng
As I mentioned in my earlier email, I think you should add a check to ensure that the result from theSecretKeySpec.getEncoded() has the right length (i.e. 8 for DES, 24 for DESede) before passing them to DESKey/DESedeKey. Valerie On 07/03/13 11:46, Anthony Scarpino wrote: I updated the webre

Re: Code Review Requests for 8012900: CICO ignores AAD in GCM mode

2013-07-05 Thread Valerie (Yu-Ching) Peng
cation tag checking failure). The data may have been write to the I/O, therefor, applications who want to use GCM and CI/CO may need to take additional actions to handle the IOException. Xuelei On 6/12/2013 7:16 AM, Valerie (Yu-Ching) Peng wrote: Xuelei, Here is another GCM and CipherInputStream/Cip

Re: Code Review Requests for 7196382 and 8010134

2013-07-09 Thread Valerie (Yu-Ching) Peng
7:29 AM, Valerie (Yu-Ching) Peng wrote: Xuelei, I have updated the webrev for 7196382 so it uses the key size range info from the underlying PKCS library for key size checking: http://cr.openjdk.java.net/~valeriep/7196382/webrev.01/ 107 //TBD: auto-adjust default keysize in case it's ou

Code Review Request for 8020310: JDK-6356530 broke the old build

2013-07-10 Thread Valerie (Yu-Ching) Peng
While working w/ Dave for a JCE provider build, I ran into a build failure due to a javac change, i.e. 6356530 " -Xlint:serial does not flag abstract classes with concrete methods/members". The new-infra build does not have this problem, only the old build does. Here is the bug id and its web

Re: code review request: 8012971 PKCS11Test hiding exception failures

2013-07-10 Thread Valerie (Yu-Ching) Peng
Tony, Did someone review this yet? Since there are 3 bug fixes, can you separate them out into 3 webrevs? I believe that has been the convention to have one webrev corresponding to one bug. Otherwise, things can get confusing for both reviewers as well as sustaining if later they tried to back

Code Review Request for 8020321: Problem in PKCS11 regression test TestRSAKeyLength

2013-07-10 Thread Valerie (Yu-Ching) Peng
Anyone has one minute to review this trivial and straight forward fix to existing PKCS11 regression test? 8020321: Problem in PKCS11 regression test TestRSAKeyLength webrev: http://cr.openjdk.java.net/~valeriep/8020321/webrev.00/ Thanks, Valerie

Re: Code Review Request for 8020321: Problem in PKCS11 regression test TestRSAKeyLength

2013-07-10 Thread Valerie (Yu-Ching) Peng
Need to make sure this won't happen again by adding a check. Thanks for another quick review, Valerie On 07/10/13 18:30, Xuelei Fan wrote: Wow, you are so careful about the hard-coded arrays. Looks fine. Xuelei On 7/11/2013 9:10 AM, Valerie (Yu-Ching) Peng wrote: Anyone has one minu

Re: code review request: 8012971 PKCS11Test hiding exception failures

2013-07-11 Thread Valerie (Yu-Ching) Peng
n may vary. Thanks, Valerie On 07/10/13 21:56, Anthony Scarpino wrote: Sure I'll break it up if that's easier and someone will review it. thanks Tony On 07/10/2013 06:07 PM, Valerie (Yu-Ching) Peng wrote: Tony, Did someone review this yet? Since there are 3 bug fixes, can you se

Re: code review request: 8012971 PKCS11Test hiding exception failures

2013-07-18 Thread Valerie (Yu-Ching) Peng
Please find comments inline. On 07/17/13 13:51, Anthony Scarpino wrote: I have broken these into two webrev. The first: JDK-8012971 PKCS11Test hiding exception failures http://cr.openjdk.java.net/~ascarpino/8012971/webrev.01/ handles the minimum changes needed for PKCS11Test to function and

Re: code review request: 8012971 PKCS11Test hiding exception failures

2013-07-18 Thread Valerie (Yu-Ching) Peng
Just noticed that the newly-added import statement on line 32 seems redundant? Webrev seems the same? Thanks, Valerie On 07/18/13 15:17, Anthony Scarpino wrote: On 07/18/2013 02:49 PM, Valerie (Yu-Ching) Peng wrote: Please find comments inline. On 07/17/13 13:51, Anthony Scarpino wrote

Re: code review request: 8012971 PKCS11Test hiding exception failures

2013-07-19 Thread Valerie (Yu-Ching) Peng
t was necessary, but I found the unused variable that was triggering the compile error without it. Tony On 07/18/2013 03:40 PM, Valerie (Yu-Ching) Peng wrote: Just noticed that the newly-added import statement on line 32 seems redundant? Webrev seems the same? Thanks, Valerie On 07/18/13

Re: [7u] 8020940: Valid OCSP responses are rejected for backdated enquiries

2013-07-22 Thread Valerie (Yu-Ching) Peng
The changes look fine. However, the dateCheckedAgainst argument for method SingleResponse constructor becomes obsolete and not used at all. Should it be removed from the method signature, i.e. any reason to keep this? Thanks, Valerie On 07/19/13 09:39, Vincent Ryan wrote: Please review the f

Re: code review request: 8012971 PKCS11Test hiding exception failures

2013-07-23 Thread Valerie (Yu-Ching) Peng
263 System.arraycopy(data, 900, data, 0, 100); 264 is.read(data, 0, 900); Do you really mean to overwrite the data[0..99] that you just copied on line 263 with line 264? In addition, don't you want to know how much is read in order to exclude the data from ea

Re: code review request: 8012971 PKCS11Test hiding exception failures

2013-07-24 Thread Valerie (Yu-Ching) Peng
On 07/24/13 13:53, Anthony Scarpino wrote: On 07/23/2013 06:00 PM, Valerie (Yu-Ching) Peng wrote: 263 System.arraycopy(data, 900, data, 0, 100); 264 is.read(data, 0, 900); Do you really mean to overwrite the data[0..99] that you just copied on line 263 with

Re: code review request: 8012971 PKCS11Test hiding exception failures

2013-07-25 Thread Valerie (Yu-Ching) Peng
Looks good~ Thanks, Valerie On 07/25/13 15:17, Anthony Scarpino wrote: On 07/24/2013 06:37 PM, Valerie (Yu-Ching) Peng wrote: On 07/24/13 13:53, Anthony Scarpino wrote: On 07/23/2013 06:00 PM, Valerie (Yu-Ching) Peng wrote: 263 System.arraycopy(data, 900, data, 0, 100

Re: [8] Request for review: 8016848: javax_security/auth/login tests fail in compact 1 and 2 profiles

2013-08-07 Thread Valerie (Yu-Ching) Peng
Sounds like Xuelie is referring to the general model between the XXX and XXXSpi classes, i.e. XXX is the public class which encapsulate XXXSpi (the underlying engine class that service providers implement). For example, javax.crypto.Cipher and javax.crypto.CipherSpi is one example. But I recall

Re: Code review request: 8012615: Realm.getRealmsList returns realms list in wrong

2013-08-07 Thread Valerie (Yu-Ching) Peng
Was catching up on other tasks, will come back to this today or tomorrow... Thanks, Valerie On 08/06/13 20:49, Weijun Wang wrote: Ping again. On 7/29/13 5:11 PM, Weijun Wang wrote: Hi Valerie Please review the capaths code change at http://cr.openjdk.java.net/~weijun/8012615/webrev.01/

Re: Code review request: 8012615: Realm.getRealmsList returns realms list in wrong

2013-08-22 Thread Valerie (Yu-Ching) Peng
1. Line 255, "returns if keys exists" should be "returns true if key exists". 2. Line 257, "@see get" should be "@see get0"? 3. You may want to add the following to the public getAll(String... keys) method. @throws IllegalArgumentException ... looks fine Before I looked at Realm.java, I

Re: Code review request: 8012615: Realm.getRealmsList returns realms list in wrong

2013-08-28 Thread Valerie (Yu-Ching) Peng
08/22/13 21:55, Weijun Wang wrote: On 8/23/13 10:39 AM, Valerie (Yu-Ching) Peng wrote: 1. Line 255, "returns if keys exists" should be "returns true if key exists". 2. Line 257, "@see get" should be "@see get0"? I meant looking at the how IAE is thrown

Re: Code review request: 8012615: Realm.getRealmsList returns realms list in wrong

2013-09-13 Thread Valerie (Yu-Ching) Peng
The changes look fine - I don't care for supporting the chaining since it complicates up the parsing code very much. Oh-well. But at least the new code is way shorter than the older one. It's unfortunate that in order to support this chaining, we ended up wasting more cycles processing the who

Re: Code review request: 8012615: backport of capaths fix to 7u60

2013-09-25 Thread Valerie (Yu-Ching) Peng
Fixes look fine. Thanks, Valerie On 09/18/13 06:59, Weijun Wang wrote: Hi Valerie I've backported 8012615 to 7u60. Please take a review http://cr.openjdk.java.net/~weijun/8012615/7u-dev/webrev.00/ Changes include: 1. Direct copy of parseCapaths and parseHierarchy from jdk8, except for

Code Review Request for 8014374: Cannot initialize "AES/GCM/NoPadding" on wrap/unseal on solaris with OracleUcrypto

2013-09-27 Thread Valerie (Yu-Ching) Peng
Xuelei, Since the source for OracleUcrypto provider isn't included in OpenJDK, it probably makes more sense to have its regression tests off OpenJDK as well. Please find the changes for the test relocation under 8014374: Webrev: http://cr.openjdk.java.net/~valeriep/8014374/webrev.00/ Thanks,

Re: Code Review Request for 8014374: Cannot initialize "AES/GCM/NoPadding" on wrap/unseal on solaris with OracleUcrypto

2013-09-30 Thread Valerie (Yu-Ching) Peng
The new tests in the closed repo will also be addressed under 8014374. So, you won't see them until this fix is integrated. Thanks, Valerie On 09/27/13 17:34, Bradford Wetmore wrote: On 9/27/2013 4:49 PM, Valerie (Yu-Ching) Peng wrote: Xuelei, Since the source for OracleUcrypto pro

Code Review Request for 8025967 "addition of -Werror broke the old build"

2013-10-04 Thread Valerie (Yu-Ching) Peng
Well, can someone please review the following trivial fix today or early Monday? 8025967: addition of -Werror broke the old build JCE is still using the legacy build and as a result, I have to fix build warnings in other components in order for the whole build to succeed. The changes are all

Re: Code Review Request for 8025967 "addition of -Werror broke the old build"

2013-10-07 Thread Valerie (Yu-Ching) Peng
look over the non-security component changes. --Sean On 10/04/2013 06:24 PM, Valerie (Yu-Ching) Peng wrote: Well, can someone please review the following trivial fix today or early Monday? 8025967: addition of -Werror broke the old build JCE is still using the legacy build and as a result, I ha

Code Review Request for 8026943: SQE test jce/Global/Cipher/SameBuffer failed

2013-11-13 Thread Valerie (Yu-Ching) Peng
Can someone help review my fixes for 8026943 "SQE test jce/Global/Cipher/SameBuffer failed"? According to Cipher javadoc, both its update(...) and doFinal(...) methods should be copy-safe, meaning the |input| and |output| buffers can reference the same byte array and no unprocessed input dat

Re: [8] RFR 8028377: test/sun/security/provider/KeyStore/DKSTest.sh attempts to write to ${test.src}

2013-11-19 Thread Valerie (Yu-Ching) Peng
If the test passed, these temporary files should be removed, shouldn't they? Thanks, Valerie On 11/19/13 07:29, Vincent Ryan wrote: On 19/11/2013 14:30, Weijun Wang wrote: Why not just put the file in the current directory? That's the real scratch dir. Or the cfg file needs an absolute path?

Code Review Request for 7200306: SunPKCS11 provider delays the check of DSA key size for SHA1withDSA to sign() instead of init()

2013-11-19 Thread Valerie (Yu-Ching) Peng
Can someone please help review my fixes for 7200306: SunPKCS11 provider delays the check of DSA key size for SHA1withDSA to sign() instead of init()? Native PKCS11 libraries don't seem to check the key during the initialization calls (triggered by initSign()/initVerify()). Rather, it errors

Re: Code Review Request for 7200306: SunPKCS11 provider delays the check of DSA key size for SHA1withDSA to sign() instead of init()

2013-11-22 Thread Valerie (Yu-Ching) Peng
:37 PM, Valerie (Yu-Ching) Peng wrote: Can someone please help review my fixes for 7200306: SunPKCS11 provider delays the check of DSA key size for SHA1withDSA to sign() instead of init()? Native PKCS11 libraries don't seem to check the key during the initialization calls (triggered by ini

Re: Code Review Request for 7200306: SunPKCS11 provider delays the check of DSA key size for SHA1withDSA to sign() instead of init()

2013-11-22 Thread Valerie (Yu-Ching) Peng
Thanks for the prompt review~ Valerie On 11/22/13 12:20, Sean Mullan wrote: On 11/22/2013 02:54 PM, Valerie (Yu-Ching) Peng wrote: Even if Solaris PKCS11 provider starts to support 2048-bit DSA keys, its SHA1withDSA signature impl should still only accept up-to-1024-bit DSA keys. The longer

RFR 8029158: sun/security/pkcs11/Signature/TestDSAKeyLength.java does not compile (or run)

2013-12-02 Thread Valerie (Yu-Ching) Peng
Please help review this regression test fix which addresses the setting on test utility classes as well as skip testing against newer NSS libraries for a problem with NSS. The webrev can be found at: http://cr.openjdk.java.net/~valeriep/8029158/webrev.00/ Thanks, Valerie

Re: RFR: 8031046: Native Windows ccache might still get unsupported ticket

2014-01-10 Thread Valerie (Yu-Ching) Peng
Changes look fine. Thanks, Valerie On 12/27/13 01:59, Weijun Wang wrote: Hi All Please review the code changes at http://cr.openjdk.java.net/~weijun/8031046/webrev.00/ In 8016594, we updated Windows LSA retrieval so that when the existing TGT has a session key whose etype is not supporte

Re: Code Review Request: 7107611 sun.security.pkcs11.SessionManager is scalability blocker

2014-02-10 Thread Valerie (Yu-Ching) Peng
Well, there are some changes that look strange which I need more time to figure out. For example, the purpose for the 2 new pkg private methods of poll(Pool) and release(Pool, Session) of the static class Pool. Also, now that every P11Cipher "object" has its own session pool, will this have

Re: Code Review Request: 7107611 sun.security.pkcs11.SessionManager is scalability blocker

2014-02-11 Thread Valerie (Yu-Ching) Peng
Please see comments inline. On 02/10/14 16:30, Anthony Scarpino wrote: On 02/10/2014 03:04 PM, Valerie (Yu-Ching) Peng wrote: Well, there are some changes that look strange which I need more time to figure out. For example, the purpose for the 2 new pkg private methods of poll(Pool) and

Re: RFR: 8034033: [parfait] JNI exception pending in share/native/sun/security/krb5/nativeccache.c

2014-02-12 Thread Valerie (Yu-Ching) Peng
Max, Changes look fine. However, I noticed some calls which may throw exceptions but no check is added, e.g. 593 (*env)->SetObjectArrayElement(env, address_list, index, address); BTW, I noticed there are several existing calls to ExceptionOccurred(...) which can be replaced with Ex

Review Request for JDK-8033571: [parfait] warning from b128 for security/smartcardio/pcsc_md.c: JNI exception pending

2014-02-13 Thread Valerie (Yu-Ching) Peng
Can someone please review the fixes which checks for pending exceptions in native code "pcsc_md.c"? The fix is trivial scope-wise. Webrev: http://cr.openjdk.java.net/~valeriep/8033571/webrev.00/ Thanks, Valerie

  1   2   3   >