RE: 8179502: Enhance OCSP, CRL and Certificate Fetch Timeouts.

2024-10-07 Thread Hempushpa Sahu
Hi Sean, There is an update from @Jamil Nimeh on the PR (https://github.com/openjdk/jdk17u-dev/pull/2747), and he doesn't have reviewer rights. So, could you please help us here to review the PR. We are really looking forward to getting this backport done, as our customer is waiting for the fix

Re: RFR: 8329251: Print custom truststore/ keystore name [v4]

2024-10-07 Thread Prasadrao Koppula
On Mon, 7 Oct 2024 12:42:00 GMT, Prasadrao Koppula wrote: >> Using SharedSecrets, I attempted to expose FileInputStream::path >> information. After implementing the fix, I validated the startup performance >> tests. Observed no consistent pattern of performance drops or gains, can >> disregard

Re: RFR: 8340327: A common framework to support public key algorithms with standard parameter sets [v10]

2024-10-07 Thread Weijun Wang
On Tue, 8 Oct 2024 01:13:17 GMT, Valerie Peng wrote: >> Weijun Wang has updated the pull request incrementally with one additional >> commit since the last revision: >> >> null check as asserts, and better exception messages > > src/java.base/share/classes/sun/security/pkcs/NamedPKCS8Key.java

Re: RFR: 8340327: A common framework to support public key algorithms with standard parameter sets [v10]

2024-10-07 Thread Valerie Peng
On Tue, 8 Oct 2024 01:15:49 GMT, Valerie Peng wrote: >> Weijun Wang has updated the pull request incrementally with one additional >> commit since the last revision: >> >> null check as asserts, and better exception messages > > src/java.base/share/classes/sun/security/pkcs/NamedPKCS8Key.java

Re: RFR: 8340327: A common framework to support public key algorithms with standard parameter sets [v10]

2024-10-07 Thread Valerie Peng
On Mon, 7 Oct 2024 18:54:03 GMT, Weijun Wang wrote: >> To prepare for new PQC algorithms like ML-KEM and ML-DSA where there are >> only named standardized parameter sets, a common framework is introduced. >> >> A example of EdDSA implementation using this framework is included as a test. > > We

Re: RFR: 8331959: Update PKCS#11 Cryptographic Token Interface to v3.1

2024-10-07 Thread Anthony Scarpino
On Mon, 7 Oct 2024 21:44:45 GMT, Valerie Peng wrote: > Could someone please help review this PR? It updates the PKCS#11 headers and > the relevant files to v3.1. > > Thanks! > Valerie looks good - Marked as reviewed by ascarpino (Reviewer). PR Review: https://git.openjdk.org/jdk

Re: RFR: 8331959: Update PKCS#11 Cryptographic Token Interface to v3.1

2024-10-07 Thread Weijun Wang
On Mon, 7 Oct 2024 21:44:45 GMT, Valerie Peng wrote: > Could someone please help review this PR? It updates the PKCS#11 headers and > the relevant files to v3.1. > > Thanks! > Valerie Looks good to me. Thanks. - Marked as reviewed by weijun (Reviewer). PR Review: https://git.ope

RFR: 8331959: Update PKCS#11 Cryptographic Token Interface to v3.1

2024-10-07 Thread Valerie Peng
Could someone please help review this PR? It updates the PKCS#11 headers and the relevant files to v3.1. Thanks! Valerie - Commit messages: - 8331959: Update PKCS#11 Cryptographic Token Interface to v3.1 Changes: https://git.openjdk.org/jdk/pull/21396/files Webrev: https://webre

Re: RFR: 8340327: A common framework to support public key algorithms with standard parameter sets [v9]

2024-10-07 Thread Sean Mullan
On Mon, 7 Oct 2024 18:07:19 GMT, Weijun Wang wrote: >> src/java.base/share/classes/sun/security/provider/NamedKEM.java line 72: >> >>> 70: throws InvalidAlgorithmParameterException, >>> InvalidKeyException { >>> 71: if (spec != null) { >>> 72: throw new InvalidAl

Re: RFR: 8340327: A common framework to support public key algorithms with standard parameter sets [v10]

2024-10-07 Thread Weijun Wang
> To prepare for new PQC algorithms like ML-KEM and ML-DSA where there are only > named standardized parameter sets, a common framework is introduced. > > A example of EdDSA implementation using this framework is included as a test. Weijun Wang has updated the pull request incrementally with one

Re: RFR: 8340327: A common framework to support public key algorithms with standard parameter sets [v6]

2024-10-07 Thread Weijun Wang
On Mon, 7 Oct 2024 16:46:42 GMT, Sean Mullan wrote: >> Thanks for the explanation. > > So maybe you should also throw `AssertionError` if `fname` is `null` to be > consistent. Yes, I can. - PR Review Comment: https://git.openjdk.org/jdk/pull/21167#discussion_r1790714214

Re: RFR: 8331682: Slow networks/Impatient clients can potentially send unencrypted TLSv1.3 alerts that won't parse on the server [v16]

2024-10-07 Thread Artur Barashev
> Check for unexpected plaintext alert message during TLSv1.3 handshake. This > can happen if client doesn't receive ServerHello due to network timeout and > tries to close the connection by sending an alert message. Artur Barashev has updated the pull request incrementally with one additional

Re: RFR: 8340327: A common framework to support public key algorithms with standard parameter sets [v9]

2024-10-07 Thread Weijun Wang
On Mon, 7 Oct 2024 16:57:56 GMT, Sean Mullan wrote: >> Weijun Wang has updated the pull request incrementally with one additional >> commit since the last revision: >> >> no need for this when there is no ambiguity > > src/java.base/share/classes/sun/security/provider/NamedKEM.java line 72: >

Re: RFR: 8340327: A common framework to support public key algorithms with standard parameter sets [v9]

2024-10-07 Thread Sean Mullan
On Mon, 7 Oct 2024 12:51:56 GMT, Weijun Wang wrote: >> To prepare for new PQC algorithms like ML-KEM and ML-DSA where there are >> only named standardized parameter sets, a common framework is introduced. >> >> A example of EdDSA implementation using this framework is included as a test. > > We

Re: RFR: 8340327: A common framework to support public key algorithms with standard parameter sets [v6]

2024-10-07 Thread Sean Mullan
On Fri, 4 Oct 2024 20:06:49 GMT, Kevin Driver wrote: >> We only have child classes inside JDK, therefore if the convention is not >> followed, it's treated as a programming error. In other cases when the input >> argument are from users we need to be prepared for any invalid input and we >> tr

Re: RFR: 8331682: Slow networks/Impatient clients can potentially send unencrypted TLSv1.3 alerts that won't parse on the server [v15]

2024-10-07 Thread Artur Barashev
> Check for unexpected plaintext alert message during TLSv1.3 handshake. This > can happen if client doesn't receive ServerHello due to network timeout and > tries to close the connection by sending an alert message. Artur Barashev has updated the pull request incrementally with one additional

Re: RFR: 8331682: Slow networks/Impatient clients can potentially send unencrypted TLSv1.3 alerts that won't parse on the server [v14]

2024-10-07 Thread Artur Barashev
> Check for unexpected plaintext alert message during TLSv1.3 handshake. This > can happen if client doesn't receive ServerHello due to network timeout and > tries to close the connection by sending an alert message. Artur Barashev has updated the pull request incrementally with one additional

Re: RFR: 8340327: A common framework to support public key algorithms with standard parameter sets [v9]

2024-10-07 Thread Weijun Wang
> To prepare for new PQC algorithms like ML-KEM and ML-DSA where there are only > named standardized parameter sets, a common framework is introduced. > > A example of EdDSA implementation using this framework is included as a test. Weijun Wang has updated the pull request incrementally with one

Re: RFR: 8340327: A common framework to support public key algorithms with standard parameter sets [v6]

2024-10-07 Thread Weijun Wang
On Fri, 4 Oct 2024 20:05:22 GMT, Kevin Driver wrote: >> I think `this` is necessary when there are input arguments having the same >> name as the instance fields. This happens a lot in a constructor when fields >> are being initialized from input arguments. In other methods, it's more >> commo

Re: RFR: 8340327: A common framework to support public key algorithms with standard parameter sets [v6]

2024-10-07 Thread Weijun Wang
On Fri, 4 Oct 2024 16:56:05 GMT, Kevin Driver wrote: >> Weijun Wang has updated the pull request with a new target base due to a >> merge or a rebase. The incremental webrev excludes the unrelated changes >> brought in by the merge/rebase. The pull request contains six additional >> commits si

Re: RFR: 8329251: Print custom truststore/ keystore name [v4]

2024-10-07 Thread Prasadrao Koppula
> Using SharedSecrets, I attempted to expose FileInputStream::path information. > After implementing the fix, I validated the startup performance tests. > Observed no consistent pattern of performance drops or gains, can disregard > the occasional performance drop observed in 1 or 2 runs. Prasa

Re: RFR: 8340327: A common framework to support public key algorithms with standard parameter sets [v6]

2024-10-07 Thread Weijun Wang
On Fri, 4 Oct 2024 16:47:53 GMT, Kevin Driver wrote: >> Weijun Wang has updated the pull request with a new target base due to a >> merge or a rebase. The incremental webrev excludes the unrelated changes >> brought in by the merge/rebase. The pull request contains six additional >> commits si

Re: Several question about JEP 486

2024-10-07 Thread Peter Firmstone
Hi Lim, You raise a good point about how to prevent loading unauthorized code.  I'm interested to see the responses you'll get. I think OpenJDK was overly focused on sandboxes, applets and serialization, instead of authorization and principles of least privilege, where the focus should have

Re: RFR: 8329251: Print custom truststore/ keystore name [v3]

2024-10-07 Thread Prasadrao Koppula
> Using SharedSecrets, I attempted to expose FileInputStream::path information. > After implementing the fix, I validated the startup performance tests. > Observed no consistent pattern of performance drops or gains, can disregard > the occasional performance drop observed in 1 or 2 runs. Prasa

Re: RFR: 8335288: SunPKCS11 initialization will call C_GetMechanismInfo on unsupported mechanisms [v2]

2024-10-07 Thread Kåre Fiedler Christiansen
On Wed, 21 Aug 2024 00:09:25 GMT, Valerie Peng wrote: >> Can someone help review this fix? Changed the required-mechanism check by >> checking if the particular mechanism is inside the list of enabled supported >> mechanisms. This should be more reliable than calling C_GetMechanismInfo(..) >>