On Tue, 16 Jul 2024 08:59:20 GMT, Julian Waters wrote:
>> snprintf has been available for all officially and unofficially supported
>> compilers for Windows, Visual Studio since version 2015 and gcc since, well,
>> forever. snprintf is conforming to C99 since the start when compiling using
>>
> Hi
>
> This change is to improve TLS 1.3 session resumption by allowing a TLS server
> to send more than one resumption ticket per connection and clients to store
> more. Resumption is a quick way to use an existing TLS session to establish
> another session by avoiding the long TLS full han
On Tue, 25 Jun 2024 09:57:46 GMT, Daniel Jeliński wrote:
> Please add a test that starts multiple resumptions in parallel using the
> tickets received in the first connection. The test should verify that:
>
> * each resumption uses a different ticket
>
> * all resumptions succeed
>
>
On Mon, 24 Jun 2024 16:03:43 GMT, Anthony Scarpino
wrote:
>> Hi
>>
>> This change is to improve TLS 1.3 session resumption by allowing a TLS
>> server to send more than one resumption ticket per connection and clients to
>> store more. Resumption is a quick way to use an existing TLS session
Can someone help review this fix? Changed the required-mechanism check by
checking if the particular mechanism is inside the list of enabled supported
mechanisms. This should be more reliable than calling C_GetMechanismInfo(..) on
the required mechanism given vendors may return various sorts of
On Tue, 9 Jul 2024 07:13:06 GMT, Prajwal Kumaraswamy
wrote:
>> The client identity checks when "HTTPS" endpoint identification algorithm is
>> set on SSL server throws "java.security.cert.CertificateException: No
>> subject alternative names present" when client certificate's SubjectAltName
>
Hi,
I'd like to make a proposal to fix
[JDK-8336499](https://bugs.openjdk.org/browse/JDK-8336499).
With the proposed change, a non-sensitive RSA private key is first interpreted
as a CRT key. If that fails (e.g. one of the attributes is not available), a
second attempt is made to interpret the
On Thu, 6 Jun 2024 15:45:54 GMT, Fernando Guallini
wrote:
>> As highlighted in the bug description, The test
>> **security/Security/SynchronizedAccess.java** have some issues:
>>
>> 1. it needs to implement the sigalg, otherwise it throws
>> java.security.NoSuchAlgorithmException . Even thoug
> Introduce an API for Key Derivation Functions (KDFs), which are cryptographic
> algorithms for deriving additional keys from a secret key and other data. See
> [JEP 478](https://openjdk.org/jeps/478).
Kevin Driver has updated the pull request with a new target base due to a merge
or a rebase.
On Tue, 16 Jul 2024 08:59:20 GMT, Julian Waters wrote:
>> snprintf has been available for all officially and unofficially supported
>> compilers for Windows, Visual Studio since version 2015 and gcc since, well,
>> forever. snprintf is conforming to C99 since the start when compiling using
>>
On Tue, 16 Jul 2024 08:52:01 GMT, Julian Waters wrote:
>> src/jdk.jdwp.agent/windows/native/libjdwp/util_md.h line 32:
>>
>>> 30: #include /* for _MAx_PATH */
>>> 31:
>>> 32: typedef unsigned long long UNSIGNED_JLONG;
>>
>> This change has nothing to do with _sprintf. Not sure why it's
On Tue, 16 Jul 2024 08:59:20 GMT, Julian Waters wrote:
>> snprintf has been available for all officially and unofficially supported
>> compilers for Windows, Visual Studio since version 2015 and gcc since, well,
>> forever. snprintf is conforming to C99 since the start when compiling using
>>
> snprintf has been available for all officially and unofficially supported
> compilers for Windows, Visual Studio since version 2015 and gcc since, well,
> forever. snprintf is conforming to C99 since the start when compiling using
> gcc, and 2015 when using Visual Studio. Since it conforms to
On Mon, 15 Jul 2024 16:30:02 GMT, Kim Barrett wrote:
>> Julian Waters has updated the pull request incrementally with one additional
>> commit since the last revision:
>>
>> USe os::snprintf in HotSpot
>
> src/jdk.jdwp.agent/windows/native/libjdwp/util_md.h line 32:
>
>> 30: #include /
14 matches
Mail list logo