Hi Bernd,
Thanks for the comments~ Please find additional reply inline.
On 3/18/2020 4:06 PM, Bernd Eckenfels wrote:
Hello Valerie.
In MacKAT 121 you would get a NPE if the catch prints the skip message,
probably needs an additional return; guard?
Good catch, will add a return.
The BAOS default length change in parse() was not immediately clear to me?
(Maybe next s. Base64?)
Some of the test values use ":" as a separator. When such separator is present,
it takes a longer string to represent the same number of bytes. So, depending on whether
the separator is used, the default number of bytes is calculated differently.
BTW It is good to see that you also add truncated SHA512 variants. It's not
mentioned in commit message or RFE.
Support for the truncated SHA512 variants is mainly done in a separate/earlier
RFE, i.e. JDK-8051408 (https://bugs.openjdk.java.net/browse/JDK-8051408). I
only added the missing OIDs and the supporting classes, i.e. KeyGenerator for
Hmac w/ truncated SHA512 variants. I can add a comment to the RFE to make this
clear.
Regards,
Valerie
hTH
Bernd
--
http://bernd.eckenfels.net
Von: security-dev <security-dev-boun...@openjdk.java.net> im Auftrag von Valerie Peng
<valerie.p...@oracle.com>
Gesendet: Wednesday, March 18, 2020 11:57:37 PM
An: OpenJDK Dev list <security-dev@openjdk.java.net>
Betreff: [15] RFR 8172680: Support SHA-3 based Hmac algorithms
Anyone has time to help review this straight forward RFE? It's to add
SHA-3 support to Hmac.
RFE: https://bugs.openjdk.java.net/browse/JDK-8172680
Webrev: http://cr.openjdk.java.net/~valeriep/8172680/webrev.00/
Mach5 run is clean.
Thanks,
Valerie