Thanks for your review. Some comments below.

On 22/10/2013 05:41, Xuelei Fan wrote:
OCSPRequest.java
================
line 79-80, Note that Debug.getInstance("certpath") may return null.
Looks like don't need dump variable any more.

Although null is returned it is not a problem since the isOn method
is a static.


OCSPResponse.java
================
line 134-135.
-------------
Debug.getInstance("certpath") may return null. May not need dump variable.

As above.



line 299:
---------
    byte[] responderKey = seq.getData().getOctetString();

I was wondering the variable may be responderKeyId:
    responderKeyId = seq.getData().getOctetString();

That's an error. I've corrected that.


line 380-381:
-------------
Per RFC 2560, responderKeyId is a SHA-1 hash of responder's public key.
  The value may be not the SubjectKeyIdentifier in a certificate per RFC
5280.

True. But if the formats don't match then that's a configuration
problem that will affect other OCSP clients too. I could generate a
new hash for the comparison but that seemed expensive.



line 373-384:
-------------
Why only include certs that match the responderID?  I was wondering that
these certs is used to build a full certification path.  The cert does
not match the responderID may be used as intermediate cert of a path.

Currently, certpath validation is not performed for the responder cert.



line 442-445:
-------------
Need more time to parse the following update.

Xuelei

On 10/22/2013 5:36 AM, Vincent Ryan wrote:
Please review this fix to support key-rollover certs
(same name, different keys):

Bug: https://bugs.openjdk.java.net/browse/JDK-8012636
Webrev: http://cr.openjdk.java.net/~vinnie/8012636/webrev.00/

This issue arises when an OCSP responder replaces its public key
but retains its subject name. The OCSP client must be able to
validate responses signed by both keys.

Thanks.


Reply via email to