[security-dev 00020]: Re: Retrieve the effective ProtectionDomains of a AccessControlContext?

2007-10-01 Thread Sean Mullan
Weijun Max Wang wrote: Hi Guys What's the best way to find out what ProtectionDomains are effective currently (or for a given AccessControlContext)? For "effective", I mean those since the last doPrivileged call. I think you could do that with a DomainCombiner, ex: - create an AccessContr

[security-dev 00024]: [Fwd: JSR 321 - Trusted Computing API for JavaTM - JSR Review Ballot]

2007-11-28 Thread Sean Mullan
FYI. --- Begin Message --- The following JSR is now available for review: SR 321 - Trusted Computing API for JavaTM http://jcp.org/en/jsr/detail?id=321 "Develop a Trusted Computing API for Java^TM providing selected functionality the TCG Software Stack offers to the C world, while

[security-dev 00029]: Re: (no subject)

2007-12-18 Thread Sean Mullan
We will be using this mailing list to discuss topics related to the design and implementation of the security component of the OpenJDK. So, there is nothing that you specifically need to do to participate in (or start) a discussion, other than subscribe to the alias. Can you be more specific? --Se

[security-dev 00036]: Re: Code review request: 6634644 broken fragment, should use @link

2008-01-02 Thread Sean Mullan
Hi Max, The fix looks fine. --Sean Max (Weijun) Wang wrote: Hi Sean There's a bug on spec inside javax.security.cert.X509Certificate -START BUG REPORT- 6634644 broken fragment, should use @link Broken fragment in api doc, following lines in javax/security/cert/X509Certificate.java

[security-dev 00037]: Re: [Fwd: Re: JAVASEC - Problem running JAAS client from tutorial]

2008-01-07 Thread Sean Mullan
Weijun Max Wang wrote: Hi All I've tried to disable realm name case check in JDK (equals -> equalsIgnoreCase), and it works. In fact, I do several experiments to change the case of principal names, realm names, service names and hostnames, and MSAD just doesn't care. This is another case of Micr

[security-dev 00109]: hg: jdk7/jsn/jdk: 2 new changesets

2008-03-14 Thread sean . mullan
Changeset: 6068b786e186 Author:mullan Date: 2008-03-13 13:29 -0400 URL: http://hg.openjdk.java.net/jdk7/jsn/jdk/rev/6068b786e186 6611991: Add support for parsing RFC4514 DNs to X500Principal Summary: Added new test and made one code change to escape null characters. Reviewed-by: vin

[security-dev 00138]: Re: JSR105 - Other SignatureMethod implementation ?

2008-04-10 Thread Sean Mullan
Hi JKT, David Herron wrote: JKT wrote: Hi to all, I tried to generated a xmldsig signature by using the JSR105 API. It works well except the fact that I cannot use other signature methods than DSA_SHA1, RSA_SHA1 and HMAC_SHA1. Right. The API is lacking a feature that allows you to extend

[security-dev 00143]: hg: jdk7/jsn/jdk: 2 new changesets

2008-04-14 Thread sean . mullan
Changeset: aabdc646cb31 Author:mullan Date: 2008-04-14 10:25 -0400 URL: http://hg.openjdk.java.net/jdk7/jsn/jdk/rev/aabdc646cb31 6631361: Spec of AccessControlContext constructor is not complete Summary: Add NullPointerException to @throws clause and treat empty array and array of

[security-dev 00160]: hg: jdk7/jsn/jdk: 2 new changesets

2008-04-25 Thread sean . mullan
Changeset: 072695f32409 Author:mullan Date: 2008-04-25 08:58 -0400 URL: http://hg.openjdk.java.net/jdk7/jsn/jdk/rev/072695f32409 6690169: Specification for BasicPermission.equals() is not consistent Summary: Clarified @return to be consistent with method description Reviewed-by: vin

[security-dev 00165]: [Fwd: Corrected Announcement: RFC 5280 on Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile]

2008-05-12 Thread Sean Mullan
FYI, in case you had not seen this announcement. --Sean --- Begin Message --- A new Request for Comments is now available in online RFC libraries. RFC 5280 Title: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation

[security-dev 00191]: Re: Please review: policytool bug

2008-06-09 Thread Sean Mullan
Looks fine to me. --Sean Max (Weijun) Wang wrote: Hi All Please take a review. Bug: http://bugs.sun.com/view_bug.do?bug_id=6711509 Code changes: diff --git a/src/share/classes/sun/security/tools/PolicyTool.java b/src/share/classes/sun/security/tools/PolicyTool.java --- a/src/share/clas

[security-dev 00200]: hg: jdk7/jsn/jdk: 2 new changesets

2008-06-17 Thread sean . mullan
Changeset: 2f21c9f8136a Author:mullan Date: 2008-06-17 10:34 -0400 URL: http://hg.openjdk.java.net/jdk7/jsn/jdk/rev/2f21c9f8136a 6673277: Thread unsafe lazy initialization code in sun.security.provider.certpath.*Checker classes Summary: make supportedExts variable non-static Review

[security-dev 00202]: hg: jdk7/jsn/jdk: 6714842: CertPathBuilder returns incorrect CertPath for BasicConstraints in builderParams

2008-06-19 Thread sean . mullan
Changeset: 4be8dfa19e27 Author:mullan Date: 2008-06-19 14:20 -0400 URL: http://hg.openjdk.java.net/jdk7/jsn/jdk/rev/4be8dfa19e27 6714842: CertPathBuilder returns incorrect CertPath for BasicConstraints in builderParams Summary: Do not consider CA target certificates if selector.ge

[security-dev 00253]: Re: Handling of APDU output chaining in Channel.transmit()

2008-07-28 Thread Sean Mullan
I have asked someone who worked on this code and they said: I believe this is a failsafe to prevent the code from going into an infinite loop when talking to a bad card or driver. --Sean Ming Yung wrote: Hi there, This relates to a limitation (bug?) in the implementation of javax.smartcardi

[security-dev 00260]: Re: Handling of APDU output chaining in Channel.transmit()

2008-07-31 Thread Sean Mullan
Exception message is extremely misleading, by the way. If it wasn't for jpcsc I would have believed that the card did actually stop responding. Thanks, Ming On Tue, Jul 29, 2008 at 1:14 AM, Sean Mullan <[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>> wrote: I have asked

[security-dev 00302]: hg: jdk7/jsn/jdk: 2 new changesets

2008-09-11 Thread sean . mullan
Changeset: 80fe10573687 Author:mullan Date: 2008-09-11 14:05 -0400 URL: http://hg.openjdk.java.net/jdk7/jsn/jdk/rev/80fe10573687 6465942: Add problem identification facility to the CertPathValidator framework Summary: Add support to the java.security.cert APIs for determining the re

[security-dev 00327]: hg: jdk7/jsn/jdk: 2 new changesets

2008-09-22 Thread sean . mullan
Changeset: 74fc78477907 Author:mullan Date: 2008-09-22 10:43 -0400 URL: http://hg.openjdk.java.net/jdk7/jsn/jdk/rev/74fc78477907 6469266: Integrate Apache XMLSec 1.4.2 into JDK 7 Reviewed-by: valeriep ! src/share/classes/com/sun/org/apache/xml/internal/security/Init.java ! src/sha

[security-dev 00344]: hg: jdk7/jsn/jdk: 3 new changesets

2008-10-07 Thread sean . mullan
Changeset: 486b917ed417 Author:mullan Date: 2008-10-07 13:41 -0400 URL: http://hg.openjdk.java.net/jdk7/jsn/jdk/rev/486b917ed417 6752764: PIT B37: CertPath/CertPathValidatorTest/KeyParamsInheritanceTest failed Summary: fix regression introduced by 6465942 Reviewed-by: vinnie ! src/

[security-dev 00359]: Re: SecurityException in AnnotationInvocationHandler.getMemberMethods

2008-10-21 Thread Sean Mullan
I looked at the code changes and it seems fine to me. --Sean Joe Darcy wrote: Hello. On 10/16/08 12:46 PM, Martin Buchholz wrote: Hi all, This is a bug report with fix. Joe Darcy, please file a bug and review this change, I've filed 6761678 "(ann) SecurityException in AnnotationInvocat

[security-dev 00384]: hg: jdk7/tl/jdk: 2 new changesets

2008-10-30 Thread sean . mullan
Changeset: 4ff842aee1fd Author:mullan Date: 2008-10-30 17:24 -0400 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/4ff842aee1fd 6764553: com.sun.org.apache.xml.internal.security.utils.IdResolver is not thread safe Reviewed-by: valeriep ! src/share/classes/com/sun/org/apache/xml/i

[security-dev 00387]: hg: jdk7/tl/jdk: 2 new changesets

2008-11-06 Thread sean . mullan
Changeset: 5102df668164 Author:mullan Date: 2008-11-05 15:55 -0500 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/5102df668164 6744888: OCSP validation code should permit some clock skew when checking validity of OCSP responses Summary: Allow for up to 10 minutes of clock skew whe

[security-dev 00388]: hg: jdk7/tl/jdk: 6765046: CertPathValidatorException(Throwable).getMessage() always returns null since b37

2008-11-06 Thread sean . mullan
Changeset: 3a3e02a55de8 Author:mullan Date: 2008-11-06 12:12 -0500 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/3a3e02a55de8 6765046: CertPathValidatorException(Throwable).getMessage() always returns null since b37 Reviewed-by: vinnie ! src/share/classes/java/security/cert/Cert

[security-dev 00430]: hg: jdk7/tl/jdk: 6728890: Add SwissSign root certificates to the JDK; ...

2008-11-25 Thread sean . mullan
Changeset: 31cb1c17f524 Author:mullan Date: 2008-11-25 10:17 -0500 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/31cb1c17f524 6728890: Add SwissSign root certificates to the JDK 6732157: Add VeriSign TSA Root Cert to the JDK 6754779: Add Camerfirma root certificates to the JDK 676

[security-dev 00508]: Re: SSLContextFactory

2009-01-22 Thread Sean Mullan
Hi Bruno, Bruno Harbulot wrote: Hi Xuelei, Thanks for looking into this. I agree with you, everything that's required is already in the JavaSE API. I find, however, that using these classes requires a careful reading of the JSSE ref. guide and the Certification path ref. guide, both of which

[security-dev 00576]: Re: Code review request: 6780416: New keytool commands/options: -gencert, -printcertreq, -ext

2009-02-18 Thread Sean Mullan
Max (Weijun) Wang wrote: On Feb 18, 2009, at 6:17 PM, Xuelei Fan wrote: > If you find the webrev too long, you might only review a part of it. sun/security/x509/SubjectInfoAccessExtension.java: This class looks fine for me except that the SubjectInfoAccessSyntax is introduced from RFC3280,

[security-dev 00584]: Re: Code review request: 6780416: New keytool commands/options: -gencert, -printcertreq, -ext

2009-02-19 Thread Sean Mullan
Hi Max, I only had time to do a quick review of KeyTool.java but everything else looks good. --Sean Max (Weijun) Wang wrote: Hi All Can you take a review of this RFE? 6780416: New keytool commands/options: -gencert, -printcertreq, -ext bug: http://bugs.sun.com/view_bug.do?bug_id=678041

[security-dev 00629]: New W3C XML Security Specifications

2009-02-27 Thread Sean Mullan
The W3C XML Security Working Group has just released 7 first public working drafts of new XML Signature and Encryption specifications. If you use or are interested in JSR 105 (Java XML Digital Signature API) or JSR 106 (Java XML Encryption API), please try to review them and send any comments yo

[security-dev 00670]: 6787130 Code Review Request

2009-03-06 Thread Sean Mullan
Hi Max, Can you review: http://cr.openjdk.java.net/~mullan/6787130/webrev/ Thanks, Sean

[security-dev 00680]: hg: jdk7/tl/jdk: 2 new changesets

2009-03-09 Thread sean . mullan
Changeset: c769c46c27ce Author:mullan Date: 2009-03-09 09:46 -0400 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/c769c46c27ce 6787130: java.policy file contains stale link to http://java.sun.com/notes Reviewed-by: weijun ! src/share/lib/security/java.policy Changeset: aa48deaf9a

[security-dev 00682]: Re: keytool: -import reply different when length is different

2009-03-10 Thread Sean Mullan
Weijun Wang wrote: Hi In keytool's installReply(), there is: if (replyCerts.length == 1) { // single-cert reply newChain = establishCertChain(userCert, replyCerts[0]); } else { // cert-chain reply (e.g., PKCS#7) newChain = validate

[security-dev 00783]: Re: CRL Distribution Points and Issuing DistributionPoint Extension

2009-04-21 Thread Sean Mullan
Xuelei Fan wrote: In line 318, if "idpExt == null" is true, "false" will return. I don't find any spec support such logic, it might be a bug here. I think the codes should looks like: 318 if (idpExt != null && 319 ((Boolean) idpExt.get 320

[security-dev 00885]: Re: CR 6847459 Created, P3 java/classes_secu Allow trust anchor self-issued intermediate version 1 and version 2 certificate

2009-06-08 Thread Sean Mullan
Xuelei Fan wrote: Many, many Verisign root certs are V1, and the intermediate cert are V3. I believe that is because many Verisign roots were issued in the late 1990's and perhaps v3 (published in 1996) had not gained enough support in the market yet. I am wondering if you know if there are

[security-dev 00889]: Re: code review request 6570344 Invalid RSA OID in sun.security.x509.AlgorithmId

2009-06-10 Thread Sean Mullan
The fix looks fine to me. --Sean Xuelei Fan wrote: Hi, The RSA OID from sun.security.x509.AlgorithmId is 1.2.5.8.1.1. However no such OID seems to exist. The correct one should be 2.5.8.1.1. ITU-T X.509 defined RSA encryption algorithm as: id-ea-rsa = {joint-iso-itu-t(2) ds(5) algorithm(8)

[security-dev 00890]: hg: jdk7/tl/jdk: 6845161: Bottleneck in Configuration.getConfiguration synchronized call

2009-06-10 Thread sean . mullan
Changeset: 4da7b972b391 Author:mullan Date: 2009-06-10 09:12 -0700 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/4da7b972b391 6845161: Bottleneck in Configuration.getConfiguration synchronized call Summary: Reduce scope of synchronized block Reviewed-by: weijun ! src/share/classe

[security-dev 00905]: hg: jdk7/tl/jdk: 2 new changesets

2009-06-18 Thread sean . mullan
Changeset: e387bb1367a7 Author:mullan Date: 2009-06-18 09:04 -0400 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/e387bb1367a7 6833839: RFE: improve ManifestDigester by instantiating StringBuilder constructor w/ initial value Reviewed-by: weijun ! src/share/classes/sun/security/u

[security-dev 00965]: Re: code review request 6852744: PIT b61: PKI test suite fails because self signed certificates are being rejected

2009-07-07 Thread Sean Mullan
Hi Andrew, Here are some comments - ForwardBuilder: line 864: typo: s/abchor/anchor In this block of code: 858 if (principal != null && publicKey != null && 859 principal.equals(cert.getSubjectX500Principal())) { 860 if (publicKe

[security-dev 00969]: Re: code review request 6852744: PIT b61: PKI test suite fails because self signed certificates are being rejected

2009-07-08 Thread Sean Mullan
Some additional comments in the new tests describing what path building scenarios are being tested would be very useful. A few comments below. Everything else looks good. Xuelei Fan wrote: new webrev: http://cr.openjdk.java.net/~xuelei/6852744/webrev.01/ Sean Mullan wrote: Hi Andrew, Here

[security-dev 00972]: Re: code review request 6852744: PIT b61: PKI test suite fails because self signed certificates are being rejected

2009-07-08 Thread Sean Mullan
Xuelei Fan wrote: In this block of code: 858 if (principal != null && publicKey != null && 859 principal.equals(cert.getSubjectX500Principal())) { 860 if (publicKey.equals(cert.getPublicKey())) { 861 this

[security-dev 00975]: Re: code review request 6852744: PIT b61: PKI test suite fails because self signed certificates are being rejected

2009-07-09 Thread Sean Mullan
Xuelei Fan wrote: webrev updated, adding comments to tests: http://cr.openjdk.java.net/~xuelei/6852744/webrev.02/ In DisableRevocation.java, why do you add CRLs to the CertStore if revocation is disabled? I think I understand what are your concerns now. If I'm right, you think that the ta

[security-dev 00978]: [Fwd: Last Call: draft-ietf-pkix-ta-format (Trust Anchor Format) to Proposed Standard]

2009-07-10 Thread Sean Mullan
FYI. In future, we should think about enhancing the existing java.security.cert.TrustAnchor class to support this new structure. --Sean --- Begin Message --- The IESG has received a request from the Public-Key Infrastructure (X.509) WG (pkix) to consider the following document: - 'Trust Ancho

[security-dev 00997]: hg: jdk7/tl/jdk: 6787645: CRL validation code should permit some clock skew when checking validity of CRLs

2009-07-20 Thread sean . mullan
Changeset: 1203425b5742 Author:mullan Date: 2009-07-20 17:16 -0400 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/1203425b5742 6787645: CRL validation code should permit some clock skew when checking validity of CRLs Reviewed-by: vinnie ! src/share/classes/java/security/cert/Cert

[security-dev 01029]: Re: DTLS design

2009-07-30 Thread Sean Mullan
Hi Najeeb, Please see an earlier message/thread about a DTLS implementation: http://mail.openjdk.java.net/pipermail/security-dev/2008-January/50.html I am not sure what the status of that project is, but I suggest you try to contact Christian to see what the status is and if you can help.

[security-dev 01193]: hg: jdk7/tl/jdk: 2 new changesets

2009-09-09 Thread sean . mullan
Changeset: 8252729d51a3 Author:mullan Date: 2009-09-09 09:54 -0400 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/8252729d51a3 6745437: Add option to only check revocation of end-entity certificate in a chain of certificates 6869739: Cannot check revocation of single certificate w

[security-dev 01211]: Re: 6854954: Eliminate static dependency on java.awt.AWTPermission

2009-09-15 Thread Sean Mullan
Looks good to me. Super small nit in SecurityConstants: 120try { indentation is off by one space with rest of code. --Sean Alan Bateman wrote: Sean, Mandy - can you review this? I also need someone from the AWT team. This patch eliminates the static dependency on ja

[security-dev 01291]: Re: Need reviewer for 6889552: Sun provider should not require LDAP CertStore to be present

2009-10-08 Thread Sean Mullan
Looks good. --Sean Alan Bateman wrote: Vinnie, Sean, The Sun provider has a dependency on JNDI due to the LDAP CertStore implementation to fetch certs and CRLs from an LDAP directory. I'd like to remove this dependency with the following patch: http://cr.openjdk.java.net/~alanb/6889552/ In

[security-dev 01300]: hg: jdk7/tl/jdk: 2 new changesets

2009-10-14 Thread sean . mullan
Changeset: 5f326176855d Author:mullan Date: 2009-10-14 09:36 -0400 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/5f326176855d 6885667: CertPath/CertPathValidatorTest/bugs/bug6383078 fails on jdk6u18/b02, jdk7/pit/b73 and passes on b72. Summary: Wrap all OCSP exceptions in CertPat

[security-dev 01388]: hg: jdk7/tl/jdk: 6894461: OCSP Checker should not wrap all Exception as "Unable to send OCSP request."(introduced by #6885667)

2009-11-18 Thread sean . mullan
Changeset: 6fac6e5fdf0c Author:mullan Date: 2009-11-18 12:34 -0500 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/6fac6e5fdf0c 6894461: OCSP Checker should not wrap all Exception as "Unable to send OCSP request."(introduced by #6885667) Reviewed-by: vinnie, xuelei ! src/share/cla

[security-dev 01401]: Re: Review request for 6903638: Remove dependency on AuthPermission from SecurityConstants

2009-11-23 Thread Sean Mullan
Mandy Chung wrote: Fixed 6903638: Remove dependency on AuthPermission from SecurityConstants Webrev at: http://cr.openjdk.java.net/~mchung/6903638/webrev.00/ Move the two static fields defined in the SecurityConstants to javax.security.auth.Subject class. javax.security.auth classes are not

[security-dev 01404]: hg: jdk7/tl/jdk: 2 new changesets

2009-11-23 Thread sean . mullan
Changeset: 5d2e63dad298 Author:mullan Date: 2009-11-23 12:36 -0500 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/5d2e63dad298 6899503: Security code issue using Verisign root certificate Summary: Add support for reordering out-of-order certificate chains Reviewed-by: vinnie, xuele

[security-dev 01455]: hg: jdk7/tl/jdk: 2 new changesets

2009-12-10 Thread sean . mullan
Changeset: 7c9be6c9385a Author:mullan Date: 2009-12-10 11:31 -0500 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/7c9be6c9385a 6867348: Digest Value of References inside Manifest - calculation order problem Reviewed-by: xuelei ! src/share/classes/org/jcp/xml/dsig/internal/dom/DOMX

[security-dev 01490]: Re: OCSP Issues in JDK6

2010-01-05 Thread Sean Mullan
Hi Todd, This should be fixed in OpenJDK 7. Can you test against JDK 7 to see if it works and I'll investigate porting the fix to OpenJDK 6? --Sean Todd E. Johnson wrote: Hello, I posted a bug on this issue at http://bugreport.sun.com/ The Sun provider currently ignores all but the first S

[security-dev 01492]: Secure Coding Guidelines for the Java Programming Language, Version 3.0

2010-01-06 Thread Sean Mullan
A new version (3.0) of the Secure Coding Guidelines for the Java Programming Language has just been published at http://java.sun.com/security/seccodeguide.html The secure coding guidelines documents best practices and patterns that you should adhere to when writing Java code in order to avoid v

[security-dev 01517]: hg: jdk7/tl/jdk: 2 new changesets

2010-01-15 Thread sean . mullan
Changeset: 51d62db10c93 Author:mullan Date: 2010-01-15 09:48 -0500 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/51d62db10c93 6915939: Exception should be thrown if OCSP SingleResponses contain unresolved critical extensions Reviewed-by: xuelei ! src/share/classes/sun/security/p

[security-dev 01557]: Re: Code review request: 6919610 KeyTabInputStream uses static field for per-instance value

2010-01-25 Thread Sean Mullan
Looks fine to me. --Sean Max (Weijun) Wang wrote: Hi All Please take a review at -- http://cr.openjdk.java.net/~weijun/6919610/webrev.00 Bug description follows. Thanks Max *Change Request ID*: 6919610 *Synopsis*: KeyTabInputStream uses static field for per-instance value Product:

[security-dev 01654]: Re: Ending support for Java 1.1 policy files

2010-03-01 Thread Sean Mullan
Looks fine to me. --Sean Vincent Ryan wrote: Please review this minor change to eliminate a reference to the sun.security.provider.IdentityDatabase class in the java.security configuration file. That class was removed as part of our modularization effort. http://cr.openjdk.java.net/~vinnie/69

[security-dev 01700]: Re: Please review new regression test for java.net.* API

2010-03-18 Thread Sean Mullan
Alan Bateman wrote: Christopher Hegarty -Sun Microsystems Ireland wrote: : Alan is correct there are already tests for SSL/Https in javax.net, but I believe these use self signed certs, no dependency on cacerts. OK, in that case adding a new test make sense. The test/java/net tree is probably

[security-dev 01701]: Re: Please review new regression test for java.net.* API

2010-03-18 Thread Sean Mullan
Christopher Hegarty -Sun Microsystems Ireland wrote: Pavel Tisnovsky wrote: Christopher Hegarty -Sun Microsystems Ireland wrote: Alan Bateman wrote: Pavel Tisnovsky wrote: Hi, please review new regression test for java.net.* API. This test check if the cacerts keytool database is configured

[security-dev 01704]: Re: Please review new regression test for java.net.* API

2010-03-18 Thread Sean Mullan
Andrew John Hughes wrote: This has been posted about before; OpenJDK currently can't bootstrap itself because it doesn't have a working cacerts store (the JAXP URL uses https). I don't know how to solve this; we can certainly have the cacerts file populated on GNU/Linux systems, but I don't hav

[security-dev 01725]: Re: Please review new regression test for java.net.* API

2010-03-22 Thread Sean Mullan
Andrew John Hughes wrote: On 18 March 2010 21:12, Christopher Hegarty -Sun Microsystems Ireland wrote: Andrew John Hughes wrote: On 18 March 2010 20:56, Christopher Hegarty -Sun Microsystems Ireland wrote: Brad, Pavel, Andrew, I'm also not comfortable with this test, but what bothers me mor

[security-dev 01728]: Re: Please review new regression test for java.net.* API

2010-03-22 Thread Sean Mullan
Andrew John Hughes wrote: On Windows you can use the "Windows-ROOT" KeyStore type, ex: keytool -list -keystore NONE -storetype Windows-ROOT Ok, so that presumably makes some Windows system call, right? Yes. I haven't tried it, but you could probably use the keytool -importkeystore opti

[security-dev 01760]: Quick code review for 6909281

2010-04-09 Thread Sean Mullan
Hi Andrew, Could I get a quick code review for 6909281 which also needs to be fixed in JDK 7: http://cr.openjdk.java.net/~mullan/6909281/webrev/ Thanks, Sean

[security-dev 01767]: hg: jdk7/tl/jdk: 6909281: 6u19 b99(pit):Error loading first applet in browser session( both FF && IE, windows ): NPE is thrown

2010-04-09 Thread sean . mullan
Changeset: 710c4493902f Author:mullan Date: 2010-04-09 07:21 -0700 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/710c4493902f 6909281: 6u19 b99(pit):Error loading first applet in browser session( both FF && IE, windows ): NPE is thrown Summary: Fix for 6633872 causes NPE due to u

Re: code review request: 6947487: use HexDumpEncoder.encodeBuffer()

2010-04-28 Thread Sean Mullan
Looks good to me. --Sean On 4/27/10 4:44 AM, Weijun Wang wrote: Hi Simple fix, webrev at http://cr.openjdk.java.net/~weijun/6947487/webrev.00 Thanks Max Begin forwarded message: *Change Request ID*: 6947487 *Synopsis*: use HexDumpEncoder.encodeBuffer() === *Description*

Re: code review request: 6948803/7: CertPath validation regression caused by SHA1 replacement root and MD2 disable feature

2010-05-24 Thread Sean Mullan
Yes, looks good to me. --Sean Xuelei Fan wrote: Looks fine to me. Andrew On 5/21/2010 5:34 PM, Weijun Wang wrote: Hi Sean and Andrew This webrev is 6948803 for opejdk-7. Please review it: http://cr.openjdk.java.net/~weijun/6948803/webrev.00/ The src/ changes are identical to the 6u21 o

hg: jdk7/tl/jdk: 2 new changesets

2010-07-01 Thread sean . mullan
Changeset: 9bffc32b645d Author:mullan Date: 2010-07-01 15:20 -0400 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/9bffc32b645d 6782979: Add JNLPAppletLauncher (6618105) to blacklist Reviewed-by: ohair ! make/java/security/Makefile Changeset: c0d2a097eb99 Author:mullan Date:

DSA and ECDSA signature format is incompatible with XMLDSig

2010-07-15 Thread Sean Mullan
Hi, I would like to try to fix a long-standing XMLDSig issue with the current DSA and ECDSA signature bytes format. The format of the Signature bytes for these algorithms is an ASN.1 encoded sequence of the integers r and s: SEQUENCE ::= { r INTEGER, s INTEGER } Unfortunately, this is no

Re: DSA and ECDSA signature format is incompatible with XMLDSig

2010-07-19 Thread Sean Mullan
Hi Maarten, Thanks for the comments, a few replies below - Maarten Bodewes wrote: On Thu, Jul 15, 2010 at 6:57 PM, Sean Mullan <mailto:sean.mul...@oracle.com>> wrote: I would like to try to fix a long-standing XMLDSig issue with the current DSA and ECDSA signature byt

Re: DSA and ECDSA signature format is incompatible with XMLDSig

2010-07-19 Thread Sean Mullan
On 7/19/10 5:32 PM, Maarten Bodewes wrote: Darn, that was a bit premature, I don't see how the PKCS#11 provider can support this. Currently it only lists the SHA256withECDSA and such. This would make it near impossible to directly perform XML signatures using a HSM or software PKCS#11 lib. I'm

hg: jdk7/tl/jdk: 6870553: X509Certificate.getSigAlgName method description uses non-standard algorithm name as example

2010-07-20 Thread sean . mullan
Changeset: 9d1994d53a67 Author:mullan Date: 2010-07-20 10:41 -0400 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/9d1994d53a67 6870553: X509Certificate.getSigAlgName method description uses non-standard algorithm name as example Reviewed-by: xuelei ! src/share/classes/java/securi

Re: code review request: 6973371: X509Factory should recognize PEM headers

2010-07-30 Thread Sean Mullan
Hi Max, I'm not sure about this change. There's a definitely a change in behavior. Before generateCertificate would only read one PEM block from the stream, and throw an exception if it wasn't a certificate. But the current fix ignores non certificate blocks until it finds a certificate or end

6653372 code review request

2010-08-02 Thread Sean Mullan
Hi Max, Can you review this simple fix? http://cr.openjdk.java.net/~mullan/6653372/webrev.00/ Thanks, Sean

Re: code review request: 6973371: X509Factory should recognize PEM headers

2010-08-02 Thread Sean Mullan
icate blocks. I suppose one could interpret it that way, but I would be wary of changing the behavior after so many years. Also, I'm wondering why the submitter could not have caught the exception and continued to read the rest of the data? --Sean Thanks Max On Jul 31, 2010, at 12:46 AM,

hg: jdk7/tl/jdk: 2 new changesets

2010-08-03 Thread sean . mullan
Changeset: a21c46dac6cf Author:mullan Date: 2010-08-03 09:39 -0400 URL: http://hg.openjdk.java.net/jdk7/tl/jdk/rev/a21c46dac6cf 6653372: Error in java.security.KeyStore example code Reviewed-by: weijun ! src/share/classes/java/security/KeyStore.java Changeset: 2feeefb45a44 Author:

Re: Code Review Request for 7155720: PKCS11 minor issues in native code

2013-04-01 Thread Sean Mullan
On 03/29/2013 08:32 PM, Valerie (Yu-Ching) Peng wrote: Trivial fix - just add null check and OOM error handling for the 2 malloc calls inside src/solaris/native/sun/security/pkcs11/wrapper/p11_md.c. Please find webrev against JDK8 at: http://cr.openjdk.java.net/~valeriep/7107615/webrev.00/ Wr

Re: Adding xmlsec crypto provider after change

2013-04-08 Thread Sean Mullan
On 04/06/2013 04:22 AM, Damian Kolasa wrote: Hi all, I only wanted to point out that You might need to review the java.security file because recent versions of xmlsec, changed provider package to: org.apache.jcp.xml.dsig.internal.dom adding "apache" in between org and jcp. The Apache Santuar

Re: Why cannot overwrite a KeyEntry with a TrustCertEntry?

2013-04-11 Thread Sean Mullan
On 04/11/2013 04:36 AM, Weijun Wang wrote: Hi All The KeyStore::setCertificateEntry has * @exception KeyStoreException if the keystore has not been initialized, * or the given alias already exists and does not identify an * entry containing a trusted certificate, * or this operation fails for s

Re: Code review request: 8009636: JARSigner including TimeStamp PolicyID (TSAPolicyID) as defined in RFC3161

2013-04-11 Thread Sean Mullan
Looks good. One comment. In PKCS7.java, can you document the new tSAPolicyId parameter in the javadoc. --Sean On 04/10/2013 10:06 PM, Weijun Wang wrote: Hi Sean Please review the code changes http://cr.openjdk.java.net/~weijun/8009636/webrev.00/ Here I add a new -tsapolicycd option to j

[8] Code Review Request for 8011313: OCSP timeout set to wrong value if com.sun.security.ocsp.timeout not defined

2013-04-25 Thread Sean Mullan
Hi Vinnie, Could I get a code review for the fix for 8011313: http://cr.openjdk.java.net/~mullan/webrevs/8011313/webrev.00/ The bug has been tagged with noreg-sqe since there is an existing SQE test for this. Thanks, Sean

[8] Code Review Request for 8013228: Create new system properties to control allowable OCSP clock skew and CRL connection timeout

2013-04-25 Thread Sean Mullan
This fix adds support for 2 new system properties to allow users to adjust the maximum allowable clock skew when validating OCSP responses, and a maximum connection timeout for downloading CRLs. webrev: http://cr.openjdk.java.net/~mullan/webrevs/8013228/webrev.00/ Thanks, Sean

Re: RFR: 8012261: update policytool to support java.net.HttpURLPermission

2013-05-17 Thread Sean Mullan
Looks fine to me. --Sean On 05/16/2013 10:17 PM, Weijun Wang wrote: Hi All Please take a look at http://cr.openjdk.java.net/~weijun/8012261/webrev.00/ which supports the new HttpURLPermission type introduced in 8010464: Evolve java networking same origin policy http://hg.open

Re: A fundamental JGSS-API bug?

2013-06-07 Thread Sean Mullan
On 06/07/2013 09:42 AM, Weijun Wang wrote: Hi All The GSSContext::initSecContext() method could either return a token (possibly null if no more token is needed) when the call succeeds or throw a GSSException if there is a failure, but not *both*. The same applies to acceptSecContext(). However,

Re: Code review request: 8015274, 8015276 and 8016158: policytool manual test problems

2013-06-11 Thread Sean Mullan
Why did you need to check for a $HOME/.java.policy file in i18n.sh? Can you explain that? Otherwise, changes look good to me. --Sean On 06/08/2013 09:32 PM, Weijun Wang wrote: Updated at http://cr.openjdk.java.net/~weijun/8015274/webrev.01/ A new bug 8016158 is added. The changes inclu

Re: Code review request: 8015274, 8015276 and 8016158: policytool manual test problems

2013-06-11 Thread Sean Mullan
rning should be created. Ok, can you add a comment about that for future reference? Thanks, Sean -Max On 6/11/13 9:16 PM, Sean Mullan wrote: Why did you need to check for a $HOME/.java.policy file in i18n.sh? Can you explain that? Otherwise, changes look good to me. --Sean On 06/08/2013 0

Re: Status update: BigInteger performance enhancements

2013-06-12 Thread Sean Mullan
(cc-ing security-dev for comments) Original thread is at http://mail.openjdk.java.net/pipermail/core-libs-dev/2013-June/017912.html --Sean On 06/12/2013 11:17 AM, Brian Burkhalter wrote: On Jun 12, 2013, at 6:19 AM, Florian Weimer wrote: On 06/11/2013 11:31 PM, Brian Burkhalter wrote: W

hg: jdk8/tl/jdk: 8014307: Memory leak ... security/jgss/wrapper/GSSLibStub.c

2013-06-14 Thread sean . mullan
Changeset: f695f447f6b7 Author:jzavgren Date: 2013-06-14 09:13 -0400 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/f695f447f6b7 8014307: Memory leak ... security/jgss/wrapper/GSSLibStub.c Summary: I modified the native procedure: Java_sun_security_jgss_wrapper_GSSLibStub_initCont

Re: [8] code review request for 7165807: Non optimized initialization of NSS crypto library leads to scalability issues

2013-06-19 Thread Sean Mullan
Looks good, just a couple of comments: 1. I think the name "nssOptimizeSpace" is clearer. The "Use" part seems a bit odd in the property name. 2. Add the appropriate noreg label to the bug. 3. File a followup doc bug to document the attribute in the PKCS11 guide. --Sean On 06/19/2013 08:49

Re: [7u] code review request: 8014805: NPE is thrown during certpath validation if certificate does not have AuthorityKeyIdentifier extension

2013-06-24 Thread Sean Mullan
On 06/24/2013 10:38 AM, Vincent Ryan wrote: Hello all, The fix to handle Authority Key IDs also applies to Subject Key IDs so I've duplicated the changes: http://cr.openjdk.java.net/~vinnie/8014805/webrev.01 1211 subjectKeyId = id.getIdentifier(); Should "id" be "

Re: [7u] code review request: 8014805: NPE is thrown during certpath validation if certificate does not have AuthorityKeyIdentifier extension

2013-06-24 Thread Sean Mullan
Looks good. --Sean On 06/24/2013 02:33 PM, Vincent Ryan wrote: I've updated the webrev to address your comments: http://cr.openjdk.java.net/~vinnie/8014805/webrev.02/ Thanks. On 24 Jun 2013, at 16:24, Sean Mullan wrote: On 06/24/2013 10:38 AM, Vincent Ryan wrote: Hello all, Th

Code Review Request: 8011547 : Update XML Signature implementation to Apache Santuario 1.5.4

2013-06-28 Thread Sean Mullan
Hi Xuelei, Please review my JDK 8 code changes to bring our XML Signature implementation up-to-date with Apache Santuario version 1.5.4. The changes are extensive, but many of them are simple formatting or refactoring changes. Any questions, let me know. http://cr.openjdk.java.net/~mullan/w

Re: [8] code review request: 8019259: Failover to CRL checking does not happen if wrong OCSP responder URL is set

2013-07-02 Thread Sean Mullan
On 07/01/2013 07:02 PM, Xuelei Fan wrote: On 7/1/2013 8:56 PM, Vincent Ryan wrote: I think that wrapping a RuntimeException (in CPVE) is acceptable in this case because the goal is to activate the failover mechanism from OCSP to CRL. Do you want RuntimeException to be re-thrown? No. It is acc

Re: [8] code review request: 8019259: Failover to CRL checking does not happen if wrong OCSP responder URL is set

2013-07-02 Thread Sean Mullan
ption thrown in that block is an IOException, so the extra try/catch blocks for RuntimeException and Exception are unnecessary. --Sean On 2 Jul 2013, at 16:19, Sean Mullan wrote: On 07/01/2013 07:02 PM, Xuelei Fan wrote: On 7/1/2013 8:56 PM, Vincent Ryan wrote: I think that wrapp

hg: jdk8/tl/jdk: 2 new changesets

2013-07-05 Thread sean . mullan
Changeset: 028ef97797c1 Author:mullan Date: 2013-07-05 15:54 -0400 URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/028ef97797c1 8011547: Update XML Signature implementation to Apache Santuario 1.5.4 Reviewed-by: xuelei ! src/share/classes/com/sun/org/apache/xml/internal/security/a

7u40 Review Request for 8017173: XMLCipher with RSA_OAEP Key Transport algorithm can't be instantiated

2013-07-08 Thread Sean Mullan
Hi Xuelei, Can you please review my fix for JDK-8017173? This is a regression introduced in 7u25. It does not affect JDK 8, because the recent fix for JDK-8011547 to integrate the Apache Santuario release 1.5.4 also fixed this issue. However, I am not backporting the JDK 8 code, which is more

Re: Request for review: 8019267: NPE in AbstractSaslImpl when trace level >= FINER in KRB5

2013-07-09 Thread Sean Mullan
Looks fine. --Sean On 07/09/2013 03:32 AM, Weijun Wang wrote: Hi All An NPE was suppressed in jdk8 with a simple if. This new fix tries to output useful info even for a null argument. Please review the code changes at http://cr.openjdk.java.net/~weijun/8019267/webrev.01/ The added test

Re: RFR : 8019979 : Replace CheckPackageAccess test with better one from closed repo

2013-07-09 Thread Sean Mullan
Looks good to me. --Sean On 07/09/2013 09:28 AM, Seán Coffey wrote: I'd like to move this testcase from our internal test repo and replace the current "test/java/lang/SecurityManager/CheckPackageAccess.java" testcase . It's a straightforward test to ensure that the package restrictions enforced

Re: Request for review: 8019267: NPE in AbstractSaslImpl when trace level >= FINER in KRB5

2013-07-10 Thread Sean Mullan
/ Thanks Max On 7/9/13 8:16 PM, Sean Mullan wrote: Looks fine. --Sean On 07/09/2013 03:32 AM, Weijun Wang wrote: Hi All An NPE was suppressed in jdk8 with a simple if. This new fix tries to output useful info even for a null argument. Please review the code changes at http

Re: Code review reqest: 8019410: sun/security/krb5/auto/ReplayCacheTestProc.java

2013-07-12 Thread Sean Mullan
Looks fine to me. --Sean On 07/12/2013 03:19 AM, Weijun Wang wrote: Please take a look at http://cr.openjdk.java.net/~weijun/8019410/webrev.00/ The ReplayCacheTestProc test fails on linux-i586 with MIT krb5 1.6.1 installed. The reason is that the acceptor does not start at all using nativ

[8] Code Review Request: 8010748: Add PKIXRevocationChecker NO_FALLBACK option and improve SOFT_FAIL option

2013-07-16 Thread Sean Mullan
Please review my JDK 8 fix for 8010748: http://bugs.sun.com/view_bug.do?bug_id=8010748 This add a few useful API additions to JEP 124 (Enhance the Certificate Revocation-Checking API) from experience with using the API. webrev: http://cr.openjdk.java.net/~mullan/webrevs/8010748/webrev.00/

Re: [7u] 8020940: Valid OCSP responses are rejected for backdated enquiries

2013-07-19 Thread Sean Mullan
Looks good. --Sean On 07/19/2013 12:39 PM, Vincent Ryan wrote: Please review the following change to correct the handling of backdated OCSP requests: Bug: http://bugs.sun.com/view_bug.do?bug_id=8020940 [not yet visible] Webrev: http://cr.openjdk.java.net/~vinnie/8020940/webrev.00 It modifie

[8] Request for review: 8012288: XML DSig API allows wrong tag names and extra elements in SignedInfo

2013-07-23 Thread Sean Mullan
Xuelei, Could you please review my fix for 8012288: http://cr.openjdk.java.net/~mullan/webrevs/8012288/webrev.00/ There is already an SQE test for this, so I have added the noreg-sqe label. Thanks, Sean

  1   2   3   4   5   6   7   8   9   10   >