On Fri, 18 Apr 2025 17:04:56 GMT, Artur Barashev wrote:
> The current key manager is SunX509, which is configured in the java.security.
> The SunX509 algorithm does not check of the local certificate. The PKIX
> algorithm should be preferred now so that the default key manager could be
> more
On Tue, 17 Dec 2024 02:50:21 GMT, Xue-Lei Andrew Fan wrote:
> I agree that this proposal cannot solve all situation. But can it address the
> situations that FIPS approval can be granted? Otherwise, this proposal might
> just look great but no one can use it.
@martinuy mostly answered your que
On Sun, 15 Dec 2024 09:15:10 GMT, Xue-Lei Andrew Fan wrote:
> > It's only the combination of a Provider that overrides
> > getService/getServices + does not call putService/put + overrides
> > newInstance without calling its parent + uses a non-Java SE service type
> > that would be unfiltered
On Thu, 21 Nov 2024 14:03:37 GMT, Sean Mullan wrote:
>> Now that JEP 486 has been integrated, `java.security.jgss` and
>> `jdk.security.jgss` module dependencies on `System.getSecurityManager` and
>> `AccessController.doPrivileged*` can be removed.
>>
>> There is an undocumented property named
On Tue, 19 Nov 2024 20:43:25 GMT, Sean Mullan wrote:
> Now that JEP 486 has been integrated, `java.security.jgss` and
> `jdk.security.jgss` module dependencies on `System.getSecurityManager` and
> `AccessController.doPrivileged*` can be removed.
>
> There is an undocumented property named "sun
On Wed, 11 Sep 2024 09:19:21 GMT, Jaikiran Pai wrote:
>> Can I please get a review of this trivial change which replaces the usages
>> of `-mx` and `-ms` to `-Xmx` and `-Xms` in tests and in one code comment?
>>
>> As noted in https://bugs.openjdk.org/browse/JDK-8339834, these options are
>> o
On Fri, 10 May 2024 00:19:32 GMT, Volodymyr Paprotski wrote:
>> Performance. Before:
>>
>> Benchmark(algorithm) (dataSize) (keyLength)
>> (provider) Mode Cnt ScoreError Units
>> SignatureBench.ECDSA.signSHA256withECDSA1024 256
On Thu, 9 May 2024 22:23:02 GMT, Volodymyr Paprotski wrote:
>> Performance. Before:
>>
>> Benchmark(algorithm) (dataSize) (keyLength)
>> (provider) Mode Cnt ScoreError Units
>> SignatureBench.ECDSA.signSHA256withECDSA1024 256
>
On Tue, 2 Apr 2024 19:19:59 GMT, Volodymyr Paprotski wrote:
>> Performance. Before:
>>
>> Benchmark(algorithm) (dataSize) (keyLength)
>> (provider) Mode Cnt ScoreError Units
>> SignatureBench.ECDSA.signSHA256withECDSA1024 256
>
On Mon, 15 Apr 2024 22:12:30 GMT, Volodymyr Paprotski wrote:
>> Performance. Before:
>>
>> Benchmark(algorithm) (dataSize) (keyLength)
>> (provider) Mode Cnt ScoreError Units
>> SignatureBench.ECDSA.signSHA256withECDSA1024 256
On Wed, 10 Apr 2024 18:02:38 GMT, Volodymyr Paprotski wrote:
> > In `ECOperations.java`, if I understand this correctly, it is to replace
> > the existing `PointMultiplier` with montgomery-based PointMuliplier. But
> > when I look at the code, I see both are still options. If I read this
> > c
On Tue, 2 Apr 2024 19:19:59 GMT, Volodymyr Paprotski wrote:
>> Performance. Before:
>>
>> Benchmark(algorithm) (dataSize) (keyLength)
>> (provider) Mode Cnt ScoreError Units
>> SignatureBench.ECDSA.signSHA256withECDSA1024 256
>
On Tue, 13 Jun 2023 20:36:28 GMT, Anthony Scarpino
wrote:
> Hi,
>
> I need a code review for moving the contents of the jdk.crypto.ec module into
> java.base. This moves the SunEC JCE Provider (Elliptic Curve) into
> java.base. EC has always been separate from the base mod
API changes to EC, XEC, and EdDSA classes . Applications
> that unwisely accessing internal EC classes will need to use the java.base
> module.
>
> Thanks
>
> Tony
Anthony Scarpino has updated the pull request incrementally with one additional
commit since
API changes to EC, XEC, and EdDSA classes . Applications
> that unwisely accessing internal EC classes will need to use the java.base
> module.
>
> Thanks
>
> Tony
Anthony Scarpino has updated the pull request incrementally with one additional
commit since
On Thu, 29 Jun 2023 18:36:55 GMT, Valerie Peng wrote:
>> Anthony Scarpino has updated the pull request incrementally with one
>> additional commit since the last revision:
>>
>> update for review: changed test, removed commented out code in module,
>> fixed s
API changes to EC, XEC, and EdDSA classes . Applications
> that unwisely accessing internal EC classes will need to use the java.base
> module.
>
> Thanks
>
> Tony
Anthony Scarpino has updated the pull request incrementally with one additional
commit since the last rev
On Tue, 20 Jun 2023 10:55:12 GMT, Alan Bateman wrote:
> I think we've converged on the right motivation. If would be good to check if
> there are TLS tests that could run with --limit-modules java.base, that would
> give confidence that the API/implementation will work when the run-time image
On Tue, 13 Jun 2023 20:36:28 GMT, Anthony Scarpino
wrote:
> Hi,
>
> I need a code review for moving the contents of the jdk.crypto.ec module into
> java.base. This moves the SunEC JCE Provider (Elliptic Curve) into
> java.base. EC has always been separate from the base mod
On Sat, 17 Jun 2023 13:10:35 GMT, Alan Bateman wrote:
> > This moves the SunEC JCE Provider (Elliptic Curve) into java.base. EC has
> > always been separate from the base module/pkg because of its dependence on
> > a native library. That library was removed in JDK 16.
>
> The proposed changes
On Sat, 17 Jun 2023 12:53:17 GMT, Alan Bateman wrote:
>> src/jdk.crypto.ec/share/classes/module-info.java line 36:
>>
>>> 34: @Deprecated(since="22", forRemoval = true)
>>> 35: module jdk.crypto.ec {
>>> 36: //provides java.security.Provider with sun.security.ec.SunEC;
>>
>> Just remove it.
Hi,
I need a code review for moving the contents of the jdk.crypto.ec module into
java.base. This moves the SunEC JCE Provider (Elliptic Curve) into java.base.
EC has always been separate from the base module/pkg because of its dependence
on a native library. That library was removed in JDK
On Wed, 14 Jun 2023 11:39:14 GMT, Sean Coffey wrote:
>> New functionality in the -XshowSettings menu to display relevant information
>> about JDK security configuration
>
> Sean Coffey has updated the pull request incrementally with one additional
> commit since the last revision:
>
> Incorp
23 matches
Mail list logo