On 10/12/2016 12:15 PM, Sean Mullan wrote:
On 10/12/2016 01:47 PM, Anthony Scarpino wrote:
New webrev: http://cr.openjdk.java.net/~ascarpino/8165274/webrev.02/

* DisabledAlgorithmConstraints

  700                         "Algorithm constraints check failed on
keysize limits."
  701                                 + algorithm + " " + size + "bit
used with " +

Looks like you could insert a couple of spaces above, one after
"limits." and one before "bit ...". Also do you want to say " bit key ...".

* OCSP

129             responderURI, new OCSPResponse.IssuerInfo(null,
issuerCert), null,

Ack.. I thought I only had one of these so that's why I discounted it.. I need to add what I did below with a TrustAnchor object using issuerCert.


This will still throw NPE.

  169                 new TrustAnchor(issuerCert.getSubjectX500Principal(),
  170                         issuerCert.getPublicKey(), null),

Why are you using the issuerCert's key and dn as the trust anchor here?
We don't actually know if that is the trust anchor, so I would just use
null.

Later in the verify(), AlgorithmChecker needs a TrustAnchor object. In this case, because it's the old method that deploy is using, I have to manufacture a TrustAnchor until they can use the new method with the real TrustAnchor. Either way, if I pass null for the trust anchor, IssuerInfo will need to create a TrustAnchor from the same data. Do you want me to add a comment what the TrustAnchor object is?

Unless there is further discussion about TrustAnchor part, I can easily fix the above two comments without a new webrev.

Tony



--Sean


On 10/12/2016 07:55 AM, Sean Mullan wrote:
* AlgorithmChecker

Not sure why these changes are necessary or why the check method has
been made non-static. Isn't the previous code sufficient?


Yeah, that change doesn't appear to be necessary anymore..

* OCSP

129             responderURI, new OCSPResponse.IssuerInfo(null,
issuerCert), null,

Passing null to OCSPResponse.IssuerInfo will throw an NPE. (but see
comment below)


You must have loaded the page just before I refreshed the webrev.  I
fixed.

I also added some changes in the exception messages to
DisabledAlgorithmConstraints to give the cert subject, algorithm and/or
keysize if used..


* OCSPResponse

For IssuerInfo, you don't always have/know the TrustAnchor, so shouldn't
it be optional?

RevocationChecker always has a TrustAnchor as PKIXCertPathValidator
passes it. AlgorithmChecker always needs a TrustAnchor, which
PKIXCertPathValidator call.  So I don't see a situation where we don't
always have an TrustAnchor.


1061                 return anchor;

should be indented 4 spaces

--Sean

On 10/10/2016 02:53 PM, Anthony Scarpino wrote:
Hi,

I need a review of a fix to JEP 288 were certpath algorithm checking
wasn't checking OCSP certs against the jdkCA keyword.

http://cr.openjdk.java.net/~ascarpino/8165274/webrev/

thanks

Tony


Reply via email to