Not complicated at all. It works and I've updated the CSR. --Max
> On May 20, 2020, at 4:40 AM, Anthony Scarpino <anthony.scarp...@oracle.com> > wrote: > > If the code exists that reusing the old extensions, then that's probably > best. But if it requires a large reworking of the code maybe it's not worth > all that work when two new extension values are easier. I'm ok either way > you want to proceed. > > Tony > > > On 5/19/20 1:30 PM, Weijun Wang wrote: >> The block file is a pkcs7 in DER. It contains every algid you want. IIRC you >> can put a DSA signature in a .RSA file. >> —Max >>> 在 2020年5月20日,04:25,Anthony Scarpino <anthony.scarp...@oracle.com> 写道: >>> >>> I just noticed at the end of your CSR the link to the jar spec and I see >>> that 1-3 character extension are required. >>> >>> Are these signature files just a byte array of the signature result? Is >>> the extension the only thing that tells what kind of signature it is? >>> Reusing ".EC" or ".RSA" makes sense if there is an OID that identifies the >>> key. In my quick look at the spec, I don't see any the file format >>> definition. >>> >>> Tony >>> >>>> On 5/19/20 11:03 AM, Anthony Scarpino wrote: >>>>> On 5/19/20 2:43 AM, Weijun Wang wrote: >>>>> Please review the CSR at >>>>> >>>>> https://bugs.openjdk.java.net/browse/JDK-8245274 >>>>> >>>>> The most arguable is the new block extension names. I drafted "PSS" for >>>>> "RSASSA-PSS", and "EDD" for "EdDSA", since the old extension names never >>>>> exceeded 3 letters. If we do not care about this, we can just make them >>>>> "RSASSA-PSS" and "EdDSA". We've always treated the extension name in a >>>>> case-insensitive way but this needs some debugging. >>>> Is the block file extension just the old FAT 8.3 filename format? Is >>>> there something requiring we have an extension or that it be three or >>>> fewer? I'd prefer we just have no extension, or if having some extension >>>> make sense, I'd prefer the full name. >>>>> >>>>> Another thing I haven't mentioned in the CSR is about using `-sigalg >>>>> RSASSA-PSS` for an RSA key. The hashAlgorithm and maskGenAlgorithm of the >>>>> PSS parameters will be determined by the key size of the key, i.e. >>>>> >>>>> // Same values for RSA and DSA >>>>> private static String ifcFfcStrength (int bitLength) { >>>>> if (bitLength > 7680) { // 256 bits >>>>> return "SHA512"; >>>>> } else if (bitLength > 3072) { // 192 bits >>>>> return "SHA384"; >>>>> } else { // 128 bits and less >>>>> return "SHA256"; >>>>> } >>>>> } >>>>> >>>>> and it's not adjustable. I don't know what the best place is for this >>>>> info. >>>> Does that make it different than other algorithms that require the >>>> parameters to be set? It sounds like something for the man page and >>>> treated as a doc update in the CSR if I understand the situation correctly. >>>> Tony >>>>> >>>>> Thanks, >>>>> Max >>>>> >>> >