On Wed, 31 Jan 2024 10:23:22 GMT, Daniel Jeliński <djelin...@openjdk.org> wrote:

>> Please review this patch that fixes a memory leak in P11TlsPrfGenerator, 
>> which is triggered during TLS1.2 Finished message generation and 
>> verification.
>> 
>> The patch changes C_SignInit JNI method to free the mechanism data 
>> immediately after use. This matches the behavior of other Init methods (like 
>> C_EncryptInit). The patch also fixes a similar issue in other 
>> signature-related methods.
>> 
>> The change essentially reverts part of 
>> [JDK-8080462](https://bugs.openjdk.org/browse/JDK-8080462).
>> 
>> All sun/security/pkcs11 tests still pass with NSS ~3.35 and~ 3.91. All 
>> tier1-3 tests still pass.
>> 
>> EDIT:
>> Some sun/security/pkcs11 tests fail with NSS 3.64 and older, see 
>> [comment](https://github.com/openjdk/jdk/pull/17584#issuecomment-1914665234)
>
> Daniel Jeliński has updated the pull request incrementally with one 
> additional commit since the last revision:
> 
>   Disable RSA-PSS in known bad NSS versions

Just a minor wording suggestion. 
Disabling older NSS releases due to known issue is the best that we can do to 
work with multiple NSS releases out there.

src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/SunPKCS11.java line 
1311:

> 1309:             if (brokenMechanisms.contains(longMech)) {
> 1310:                 if (showInfo) {
> 1311:                     System.out.println("DISABLED due to broken 
> provider");

nit: how about changing "broken provider" to "known issue with NSS"?

-------------

Marked as reviewed by valeriep (Reviewer).

PR Review: https://git.openjdk.org/jdk/pull/17584#pullrequestreview-1855140171
PR Review Comment: https://git.openjdk.org/jdk/pull/17584#discussion_r1473648397

Reply via email to