Hi Xuelei,

Updated webrev looks good.

If we have a failing test to verify the changes, perhaps you can try disabling the CKM_RSA_PKCS_PSS in the PKCS11 provider configuration file. Or, you can always comment out the PSS Signature entry registration in SunPKCS11 provider.

Thanks,
Valerie
On 11/4/2019 7:27 PM, Xuelei Fan wrote:
Hi Valerie,

Thanks for the review.

On 11/4/2019 6:36 PM, Valerie Peng wrote:
Hi Xuelei,

Overall changes look good.

A nit: SignatureScheme.java:552, "Ignore unsupport..." instead of "Ignore the unsupported..."

Good catch!

It seems that the SignatureScheme selection is always selected with PrivateKey first?
Yes.

It'd be nice to have some comments explain the different handling between getSigner(PrivateKey) and getVerifier(PublicKey), i.e. former returns null vs later passes up the exception.

Yes, better to have some words for the difference.  Here is the updated webrev:
   http://cr.openjdk.java.net/~xuelei/8223940/webrev.01/

Comparing to the previous version, only the SignatureScheme.java is updated.

Thanks,
Xuelei

Thanks,
Valerie


On 10/24/2019 1:56 PM, Xuelei Fan wrote:
Hi,

Could I get the following update reviewed?
    http://cr.openjdk.java.net/~xuelei/8223940/webrev.00/

For signature algorithms, the update will fail back to use the supported signature algorithm for the specific private key. Previously, the first preferred signature algorithm get used ad the private key may not be able to work with the signature algorithm however.

No new regression test as RSASSA-PSS has been supported in the SunPKCS11 provider currently.  Can I get a help for the test if you are running a provider that does not support RSASSA-PSS yet?

Thanks & Regards,
Xuelei

Reply via email to