Hi Tony,

Please include this tiny change to keytool:

diff --git a/src/java.base/share/classes/sun/security/tools/keytool/Main.java 
b/src/java.base/share/classes/sun/security/tools/keytool/Main.java
--- a/src/java.base/share/classes/sun/security/tools/keytool/Main.java
+++ b/src/java.base/share/classes/sun/security/tools/keytool/Main.java
@@ -4658,7 +4658,7 @@
                     rb.getString("whose.key.risk"),
                     label,
                     String.format(rb.getString("key.bit"),
-                            KeyUtil.getKeySize(key), key.getAlgorithm())));
+                            KeyUtil.getKeySize(key), 
fullDisplayAlgName(key))));
         }
     }

Without this change, when a new keypair is generated using a disabled curve 
name, it will show

   The generated certificate uses a 256-bit EC key which is considered a 
security risk.

with it, there is a clue

   The generated certificate uses a 256-bit EC (secp256k1) key which is 
considered a security risk.

I used to only check the algorithm name and key size.

Thanks,
Max


> On Dec 10, 2019, at 2:04 AM, Anthony Scarpino <[email protected]> 
> wrote:
> 
> I've updated the webrev to address many of the comments.  In particular 
> adding checks when keys given directly.  Also, the changing from legacyEC 
> hardcoded list to a security property jdk.disabled.namedCurves.
> 
> https://cr.openjdk.java.net/~ascarpino/8233228/webrev.01/
> 
> Tony

Reply via email to