On Tue, 9 Apr 2024 02:01:36 GMT, Anthony Scarpino wrote:
>> Volodymyr Paprotski has updated the pull request incrementally with one
>> additional commit since the last revision:
>>
>> remove use of jdk.crypto.ec
>
> src/java.base/share/classes/sun/security/ec/ECOperations.java line 308:
>
>>
On Tue, 23 Apr 2024 19:55:57 GMT, Anthony Scarpino
wrote:
>> Volodymyr Paprotski has updated the pull request incrementally with one
>> additional commit since the last revision:
>>
>> Comments from Jatin and Tony
>
> src/java.base/share/classes/sun/security/ec/ECOperations.java line 204:
>
On Tue, 16 Apr 2024 02:26:57 GMT, Jatin Bhateja wrote:
>> Per-above, this is a switch statement (`UNLIKELY`) fallback. I can still add
>> alignment and loop rotation, but being a fallback figured its more important
>> to keep it small&readable...
>
> It's all part of intrinsic, no harm in polis
> Performance. Before:
>
> Benchmark(algorithm) (dataSize) (keyLength)
> (provider) Mode Cnt ScoreError Units
> SignatureBench.ECDSA.signSHA256withECDSA1024 256
> thrpt3 6443.934 ± 6.491 ops/s
> SignatureBench.ECDSA.
Hi Simon,
Thanks for reporting. The problem is already tracked under
https://bugs.openjdk.org/browse/JDK-8325022.
Cheers,
Daniel
śr., 24 kwi 2024 o 15:52 Simon Bernard napisał(a):
>
> Hi,
>
> I think that maybe I found a bad message for SSLHanshakeException in
> sun.security.ssl.CertificateMessa
Thx Sean,
So just to be sure that I get you correctly, that means there is only a
static way to disable that ? No way to configure it differently for each
SslSocket or SslEngine?
For example, If I have a java application with 1 socket for https (e.g.
a REST API) and another socket on for co
Hi,
I think that maybe I found a bad message for SSLHanshakeException in
sun.security.ssl.CertificateMessage.
At server side configured with *CLIENT_AUTH_REQUIRED*, I get this
SSLHanshakeException when trying to connect with a client sending an
empty cert chain :
|Caused by: javax.net.ssl.
On Wed, 24 Apr 2024 07:14:31 GMT, Andrew Haley wrote:
>> Hi,
>>
>> I would like to propose an implementation to support AES CBC with Ciphertext
>> Stealing (CTS) in SunPKCS11, according to what has been specified in
>> [JDK-8330843 CSR](https://bugs.openjdk.org/browse/JDK-8330843).
>>
>> What
On Mon, 22 Apr 2024 18:31:37 GMT, Francisco Ferrari Bihurriet
wrote:
> Hi,
>
> I would like to propose an implementation to support AES CBC with Ciphertext
> Stealing (CTS) in SunPKCS11, according to what has been specified in
> [JDK-8330843 CSR](https://bugs.openjdk.org/browse/JDK-8330843).