Withdrawn: 8348432: Use block size as the default Hmac key length for JDK providers

2025-04-04 Thread duke
On Fri, 7 Feb 2025 22:19:41 GMT, Valerie Peng wrote: > Could someone help review this straight forward change? > > Changing to use block size instead of the hash output length as the default > Hmac key sizes. The relevant regression tests have been adjusted accordingly > as well. > > Thanks,

Re: RFR: 8349400: Improve startup speed via eliminating nested classes [v2]

2025-04-04 Thread Shaojin Wen
> During JVM startup, the class KnownOIDs is loaded. KnownOIDs has 10 anonymous > classes, which slows down the startup. This PR is to improve KnownOIDs and > eliminate unnecessary embedded classes. > > > Here's how to reproduce this: > > > public class Startup { > public static void main

Re: RFR: 8254622: Hide superclasses from conditionally exported packages

2025-04-04 Thread Chen Liang
On Fri, 4 Apr 2025 13:36:19 GMT, Hannes Wallnöfer wrote: > Please review an enhancement to treat classes and interfaces that are not > included and not unconditionally exported as hidden. This means they do not > show up in the generated documentation even if they are implemented or > extended

Re: RFR: 8351034: Add AVX-512 intrinsics for ML-DSA [v13]

2025-04-04 Thread Sandhya Viswanathan
On Wed, 2 Apr 2025 07:38:34 GMT, Ferenc Rakoczi wrote: >> By using the AVX-512 vector registers the speed of the computation of the >> ML-DSA algorithms (key generation, document signing, signature verification) >> can be approximately doubled. > > Ferenc Rakoczi has updated the pull request in

Re: RFR: 8349890 : Option -Djava.security.debug=x509,ava breaks special chars [v2]

2025-04-04 Thread Koushik Muthukrishnan Thirupattur
> **A DESCRIPTION OF THE PROBLEM :** > Enabling -Djava.security.debug=x509,ava affects how special characters in > certificates are processed. The expected behavior is that debugging should > not interfere with the normal encoding of certificate fields. > > **Fix:** > The Debugging will no longe

Re: RFR: 8353578: Refactor existing usage of internal HKDF impl to use the KDF API

2025-04-04 Thread Bradford Wetmore
On Wed, 2 Apr 2025 21:43:19 GMT, Valerie Peng wrote: > This PR removes the internal JSSE HKDF impl and changes to use the KDF API > for the HKDF support from JCA/JCE providers. > > This is just code refactoring. Known-answer regression test for the internal > JSSE HKDF impl is removed as the t

Re: RFR: 8353578: Refactor existing usage of internal HKDF impl to use the KDF API

2025-04-04 Thread Bradford Wetmore
On Thu, 3 Apr 2025 00:51:44 GMT, Valerie Peng wrote: >> src/java.base/share/classes/sun/security/ssl/KAKeyDerivation.java line 120: >> >>> 118: SecretKey earlySecret = >>> hkdf.deriveKey("TlsEarlySecret", >>> 119: HKDFParameterSpec.ofExtract().addSalt(zer

Re: RFR: 8353641: Deprecate core library permission classes for removal [v4]

2025-04-04 Thread Sean Mullan
On Fri, 4 Apr 2025 19:00:02 GMT, Roger Riggs wrote: >> Now that the Security Manager is permanently disabled, the following >> permission classes in the core libraries area can be deprecated for removal >> as they are no longer useful: FilePermission, LinkPermission, >> LoggingPermission, Prop

Re: RFR: 8352277: java.security documentation: incorrect regex syntax describing "usage" algorithm constraint

2025-04-04 Thread Anthony Scarpino
On Tue, 25 Mar 2025 14:29:22 GMT, Artur Barashev wrote: > We have an incorrect regex syntax when describing a "usage" algorithm > constraint. Current syntax indicates that usage types are optional while they > are not: at least one usage type should be specified. looks good - Mar

Withdrawn: 8225739: sun/security/pkcs11/tls/tls12/FipsModeTLS12.java is not reliable

2025-04-04 Thread duke
On Fri, 17 Jan 2025 17:24:57 GMT, Martin Balao wrote: > Hello, > > I would like to propose a solution for this test that makes it more clear > when it's skipped. > > Regards, > Martin.- This pull request has been closed without being integrated. - PR: https://git.openjdk.org/jdk

Re: RFR: 8348732: SunJCE and SunPKCS11 have different PBE key encodings

2025-04-04 Thread Valerie Peng
On Tue, 18 Mar 2025 23:15:13 GMT, Francisco Ferrari Bihurriet wrote: >> As part of [https://bugs.openjdk.org/browse/JDK-8301553](JDK-8301553), >> SunPKCS11 provider added support for PBE SecretKeyFactories for >> `HmacPBESHAxxx` and `PBEWithHmacSHAxxxAndAES_yyy`. These impls produce keys >> w

Re: RFR: 8340321: Disable SHA-1 in TLS/DTLS 1.2 handshake signatures [v3]

2025-04-04 Thread Artur Barashev
> Disable SHA-1 in TLS/DTLS 1.2 handshake signatures (but not in certificate > signatures). > https://www.rfc-editor.org/rfc/rfc9155.html Artur Barashev has updated the pull request incrementally with one additional commit since the last revision: Disable ECDSA_SHA1 to be used for TLSv1.3 han

Re: RFR: 8350134: Support DHKEM with PKCS11 [v3]

2025-04-04 Thread Weijun Wang
> This code change adds supports for getting public key from an EC private key > and slicing a secret key in PKCS #11. These are necessary to support DHKEM > for keys in SunPKCS11. The first support is still not complete and there is > no way to get the public key if the private key is unwrapped

Re: RFR: 8353641: Deprecate core library permission classes for removal [v6]

2025-04-04 Thread Roger Riggs
> Now that the Security Manager is permanently disabled, the following > permission classes in the core libraries area can be deprecated for removal > as they are no longer useful: FilePermission, LinkPermission, > LoggingPermission, PropertyPermission, ReflectPermission, RuntimePermission, > a

Re: RFR: 8353641: Deprecate core library permission classes for removal [v5]

2025-04-04 Thread Roger Riggs
> Now that the Security Manager is permanently disabled, the following > permission classes in the core libraries area can be deprecated for removal > as they are no longer useful: FilePermission, LinkPermission, > LoggingPermission, PropertyPermission, ReflectPermission, RuntimePermission, > a

Re: RFR: 8351566: Consolidate third party artifacts used in tests

2025-04-04 Thread Matthew Donovan
On Tue, 11 Mar 2025 15:15:39 GMT, Mikhail Yankelevich wrote: > 8351566: Consolidate third party artifacts used in tests test/lib/jdk/test/lib/security/NSSArtifactFetcher.java line 44: > 42: final Class nssLibClass = getNssLibClass(osId); > 43: if(nssLibClass == null){ > 44:

Re: RFR: 8351034: Add AVX-512 intrinsics for ML-DSA [v5]

2025-04-04 Thread Ferenc Rakoczi
On Thu, 6 Mar 2025 19:26:14 GMT, Volodymyr Paprotski wrote: >> Ferenc Rakoczi has updated the pull request incrementally with one >> additional commit since the last revision: >> >> Accepted review comments. > > src/hotspot/cpu/x86/stubGenerator_x86_64_sha3.cpp line 409: > >> 407: __ evmo

Re: RFR: 8353641: Deprecate core library permission classes for removal [v4]

2025-04-04 Thread Sean Mullan
On Fri, 4 Apr 2025 19:00:02 GMT, Roger Riggs wrote: >> Now that the Security Manager is permanently disabled, the following >> permission classes in the core libraries area can be deprecated for removal >> as they are no longer useful: FilePermission, LinkPermission, >> LoggingPermission, Prop

Re: RFR: 8349583: Add mechanism to disable signature schemes based on their TLS scope [v19]

2025-04-04 Thread Anthony Scarpino
On Mon, 24 Mar 2025 17:24:01 GMT, Artur Barashev wrote: >> Currently when a signature scheme constraint is specified with >> "jdk.tls.disabledAlgorithms" property we don't differentiate between >> signatures used to sign a TLS handshake exchange and the signatures used in >> TLS certificates:

Re: RFR: 8349583: Add mechanism to disable signature schemes based on their TLS scope [v18]

2025-04-04 Thread Anthony Scarpino
On Wed, 12 Mar 2025 17:26:30 GMT, Artur Barashev wrote: >> Currently when a signature scheme constraint is specified with >> "jdk.tls.disabledAlgorithms" property we don't differentiate between >> signatures used to sign a TLS handshake exchange and the signatures used in >> TLS certificates:

Re: RFR: 8353641: Deprecate core library permission classes for removal [v4]

2025-04-04 Thread Roger Riggs
> Now that the Security Manager is permanently disabled, the following > permission classes in the core libraries area can be deprecated for removal > as they are no longer useful: FilePermission, LinkPermission, > LoggingPermission, PropertyPermission, ReflectPermission, RuntimePermission, > a

Re: RFR: 8339280: jarsigner -verify performs cross-checking between CEN and LOC [v21]

2025-04-04 Thread Hai-May Chao
On Thu, 27 Mar 2025 21:37:24 GMT, Sean Mullan wrote: >> Hai-May Chao has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Fix typo > > Marked as reviewed by mullan (Reviewer). @seanjmullan @wangweij Thanks for the review. - PR

Re: RFR: 8345139: Fix bugs and inconsistencies in the Provider services map [v5]

2025-04-04 Thread Martin Balao
On Thu, 3 Apr 2025 00:27:50 GMT, Martin Balao wrote: >> src/java.base/share/classes/java/security/Provider.java line 1037: >> >>> 1035: } >>> 1036: >>> 1037: if (mi.isLegacy) { >> >> For legacy entry, there is no check on the `legacyApiCall` value, is this >> due to th

Re: RFR: 8340321: Disable SHA-1 in TLS/DTLS 1.2 handshake signatures [v2]

2025-04-04 Thread Artur Barashev
On Fri, 4 Apr 2025 17:50:58 GMT, Artur Barashev wrote: >> test/jdk/sun/security/ssl/SignatureScheme/DisableSHA1inHandshakeSignatureTLS12.java >> line 28: >> >>> 26: * @bug 8340321 >>> 27: * @summary Disable SHA-1 in TLS/DTLS 1.2 signatures. >>> 28: * This test only covers TLS 1.2. >

Re: RFR: 8340321: Disable SHA-1 in TLS/DTLS 1.2 handshake signatures [v2]

2025-04-04 Thread Artur Barashev
On Wed, 2 Apr 2025 15:58:00 GMT, Artur Barashev wrote: >> test/jdk/sun/security/ssl/SignatureScheme/DisableSHA1inHandshakeSignatureDTLS12.java >> line 34: >> >>> 32: */ >>> 33: >>> 34: import java.lang.Override; >> >> You shouldn't have to import java.lang.Override > > Indeed, thanks! For so

Re: RFR: 8340321: Disable SHA-1 in TLS/DTLS 1.2 handshake signatures [v2]

2025-04-04 Thread Artur Barashev
> Disable SHA-1 in TLS/DTLS 1.2 handshake signatures (but not in certificate > signatures). > https://www.rfc-editor.org/rfc/rfc9155.html Artur Barashev has updated the pull request incrementally with one additional commit since the last revision: Add TLSv1.3 unit test - Changes

Re: RFR: 8353641: Deprecate core library permission classes for removal [v3]

2025-04-04 Thread Iris Clark
On Fri, 4 Apr 2025 18:21:29 GMT, Roger Riggs wrote: >> Now that the Security Manager is permanently disabled, the following >> permission classes in the core libraries area can be deprecated for removal >> as they are no longer useful: FilePermission, LinkPermission, >> LoggingPermission, Prop

Re: RFR: 8350134: Support DHKEM with PKCS11 [v2]

2025-04-04 Thread Weijun Wang
> This code change adds support for getting public key from an EC private key > in PKCS #11. This is is necessary to support DHKEM for keys in SunPKCS11. The > support is still not complete and there is no way to get the public key if > the private key is unwrapped from an encrypted form. PKCS #

Re: RFR: 8349583: Add mechanism to disable signature schemes based on their TLS scope [v22]

2025-04-04 Thread Sean Mullan
On Mon, 31 Mar 2025 14:17:50 GMT, Artur Barashev wrote: >> Currently when a signature scheme constraint is specified with >> "jdk.tls.disabledAlgorithms" property we don't differentiate between >> signatures used to sign a TLS handshake exchange and the signatures used in >> TLS certificates:

Re: RFR: 8348967: Deprecate security permission classes for removal

2025-04-04 Thread David Lloyd
Greetings Daniel, For the sake of discussion, I will look at these classes as classifiable into two groups: classes that we use (or are useful) only in the context of a security manager, and classes that we use (or are useful) independently of any other JDK API. I would put all three of these cla

Re: RFR: 8348967: Deprecate security permission classes for removal [v2]

2025-04-04 Thread Iris Clark
On Fri, 4 Apr 2025 18:04:39 GMT, Sean Mullan wrote: >> Please review this change to terminally deprecate the following security >> related permission classes: `java.security.UnresolvedPermission`, >> `javax.net.ssl.SSLPermission`, `javax.security.auth.AuthPermission`, >> `javax.security.auth.P

Re: RFR: 8348967: Deprecate security permission classes for removal [v2]

2025-04-04 Thread Roger Riggs
On Fri, 4 Apr 2025 18:04:39 GMT, Sean Mullan wrote: >> Please review this change to terminally deprecate the following security >> related permission classes: `java.security.UnresolvedPermission`, >> `javax.net.ssl.SSLPermission`, `javax.security.auth.AuthPermission`, >> `javax.security.auth.P

Re: RFR: 8345139: Fix bugs and inconsistencies in the Provider services map [v5]

2025-04-04 Thread Martin Balao
On Mon, 3 Mar 2025 18:31:19 GMT, Valerie Peng wrote: >> Francisco Ferrari Bihurriet has updated the pull request incrementally with >> one additional commit since the last revision: >> >> Clear ServicesMap fields in the declared order >> >> Constructors assign the fields in the same orde

Re: RFR: 8339280: jarsigner -verify performs cross-checking between CEN and LOC [v13]

2025-04-04 Thread Hai-May Chao
> The jarsigner -verify command currently performs verification by reading from > JarFile to navigate the central directory (CEN) headers. It is now enhanced > to include cross-validation of entries between JarFile (CEN-based) and > JarInputStream (stream-based) representations of the JAR. It em

Re: RFR: 8353641: Deprecate core library permission classes for removal [v3]

2025-04-04 Thread Roger Riggs
> Now that the Security Manager is permanently disabled, the following > permission classes in the core libraries area can be deprecated for removal > as they are no longer useful: FilePermission, LinkPermission, > LoggingPermission, PropertyPermission, ReflectPermission, RuntimePermission, > a

Re: RFR: 8348967: Deprecate security permission classes for removal

2025-04-04 Thread Daniel Fuchs
On Fri, 4 Apr 2025 12:42:36 GMT, Sean Mullan wrote: > Please review this change to terminally deprecate the following security > related permission classes: `java.security.AllPermission`, > `java.security.UnresolvedPermission`, `javax.net.ssl.SSLPermission`, > `javax.security.auth.AuthPermissi

Re: RFR: 8348967: Deprecate security permission classes for removal [v2]

2025-04-04 Thread Sean Mullan
> Please review this change to terminally deprecate the following security > related permission classes: `java.security.UnresolvedPermission`, > `javax.net.ssl.SSLPermission`, `javax.security.auth.AuthPermission`, > `javax.security.auth.PrivateCredentialPermission`, > `javax.security.auth.kerbe

Re: RFR: 8353671: Remove dead code missed in JDK-8350459

2025-04-04 Thread Volodymyr Paprotski
On Thu, 3 Apr 2025 18:42:35 GMT, Volodymyr Paprotski wrote: > 8353671: Remove dead code missed in JDK-8350459 @ascarpino If you wouldn't mind, should be a quick one :) - PR Comment: https://git.openjdk.org/jdk/pull/24423#issuecomment-2779414600

Re: RFR: 8340321: Disable SHA-1 in TLS/DTLS 1.2 handshake signatures

2025-04-04 Thread Artur Barashev
On Fri, 4 Apr 2025 17:18:44 GMT, Sean Mullan wrote: >> Disable SHA-1 in TLS/DTLS 1.2 handshake signatures (but not in certificate >> signatures). >> https://www.rfc-editor.org/rfc/rfc9155.html > > test/jdk/sun/security/ssl/SignatureScheme/DisableSHA1inHandshakeSignatureTLS12.java > line 28: >

Re: RFR: 8349890 : Option -Djava.security.debug=x509,ava breaks special chars [v3]

2025-04-04 Thread Koushik Muthukrishnan Thirupattur
On Fri, 4 Apr 2025 13:51:33 GMT, Sean Mullan wrote: >> Koushik Muthukrishnan Thirupattur has updated the pull request incrementally >> with one additional commit since the last revision: >> >> 8349890:Option -Djava.security.debug=x509,ava breaks special chars > > test/jdk/sun/security/x509/X5

Re: RFR: 8349890 : Option -Djava.security.debug=x509,ava breaks special chars [v4]

2025-04-04 Thread Koushik Muthukrishnan Thirupattur
> **A DESCRIPTION OF THE PROBLEM :** > Enabling -Djava.security.debug=x509,ava affects how special characters in > certificates are processed. The expected behavior is that debugging should > not interfere with the normal encoding of certificate fields. > > **Fix:** > The Debugging will no longe

Re: RFR: 8340321: Disable SHA-1 in TLS/DTLS 1.2 handshake signatures

2025-04-04 Thread Sean Mullan
On Tue, 1 Apr 2025 20:53:01 GMT, Artur Barashev wrote: > Disable SHA-1 in TLS/DTLS 1.2 handshake signatures (but not in certificate > signatures). > https://www.rfc-editor.org/rfc/rfc9155.html test/jdk/sun/security/ssl/SignatureScheme/DisableSHA1inHandshakeSignatureTLS12.java line 28: > 26:

RFR: 8348967: Deprecate security permission classes for removal

2025-04-04 Thread Sean Mullan
Please review this change to terminally deprecate the following security related permission classes: `java.security.AllPermission`, `java.security.UnresolvedPermission`, `javax.net.ssl.SSLPermission`, `javax.security.auth.AuthPermission`, `javax.security.auth.PrivateCredentialPermission`, `jav

Re: RFR: 8349890 : Option -Djava.security.debug=x509,ava breaks special chars [v3]

2025-04-04 Thread Sean Mullan
On Fri, 4 Apr 2025 03:18:31 GMT, Koushik Muthukrishnan Thirupattur wrote: >> **A DESCRIPTION OF THE PROBLEM :** >> Enabling -Djava.security.debug=x509,ava affects how special characters in >> certificates are processed. The expected behavior is that debugging should >> not interfere with the n

Re: RFR: 8353641: Deprecate core library permission classes for removal [v2]

2025-04-04 Thread Roger Riggs
> Now that the Security Manager is permanently disabled, the following > permission classes in the core libraries area can be deprecated for removal > as they are no longer useful: FilePermission, LinkPermission, > LoggingPermission, PropertyPermission, ReflectPermission, RuntimePermission, > a

Re: RFR: 8350459: MontgomeryIntegerPolynomialP256 multiply intrinsic with AVX2 on x86_64 [v8]

2025-04-04 Thread Volodymyr Paprotski
On Fri, 4 Apr 2025 14:26:30 GMT, Sean Mullan wrote: > > Done I think: https://bugs.openjdk.org/browse/JDK-8297970 > > Is this link correct? This issue was fixed in JDK 20. Sorry.. copy/paste didnt notice.. https://bugs.openjdk.org/browse/JDK-8353670 (also ends in *70!) - PR Comme

Re: RFR: 8348967: Deprecate security permission classes for removal

2025-04-04 Thread David M . Lloyd
On Fri, 4 Apr 2025 12:42:36 GMT, Sean Mullan wrote: > Please review this change to terminally deprecate the following security > related permission classes: `java.security.AllPermission`, > `java.security.UnresolvedPermission`, `javax.net.ssl.SSLPermission`, > `javax.security.auth.AuthPermissi

Re: RFR: 8348967: Deprecate security permission classes for removal

2025-04-04 Thread Sean Mullan
On Fri, 4 Apr 2025 14:49:36 GMT, David M. Lloyd wrote: > `AllPermission` is an integral concept of permission sets, and thus we would > be obliged to create our own if the JDK one disappeared, causing > compatibility problems due to the class moving to a new package from the > point of view of

Re: RFR: 8348967: Deprecate security permission classes for removal

2025-04-04 Thread Daniel Fuchs
Hi David, Are there other subclasses of Permission that this framework uses? More specifically - would it be fine to deprecate NetPermission, URLPermission and SocketPermission classes? best regards, -- daniel On 04/04/2025 15:51, David M. Lloyd wrote: Can you elaborate or give an example/poi

Re: RFR: 8348967: Deprecate security permission classes for removal

2025-04-04 Thread robert engels
On Fri, 4 Apr 2025 12:42:36 GMT, Sean Mullan wrote: > Please review this change to terminally deprecate the following security > related permission classes: `java.security.AllPermission`, > `java.security.UnresolvedPermission`, `javax.net.ssl.SSLPermission`, > `javax.security.auth.AuthPermissi

Re: RFR: 8350126: Regression ~3% on Crypto-ChaCha20Poly1305.encrypt for MacOSX aarch64

2025-04-04 Thread Jamil Nimeh
On Fri, 4 Apr 2025 14:35:59 GMT, Andrew Haley wrote: >> This fix addresses a performance regression found on some aarch64 >> processors, namely the Apple M1, when we moved to a quarter round parallel >> implementation in JDK-8349106. After making some improvements in the >> ordering of the in

Re: RFR: 8350459: MontgomeryIntegerPolynomialP256 multiply intrinsic with AVX2 on x86_64 [v8]

2025-04-04 Thread Sean Mullan
On Thu, 3 Apr 2025 18:49:24 GMT, Volodymyr Paprotski wrote: > Done I think: https://bugs.openjdk.org/browse/JDK-8297970 Is this link correct? This issue was fixed in JDK 20. - PR Comment: https://git.openjdk.org/jdk/pull/23719#issuecomment-2778889529

Re: RFR: 8348967: Deprecate security permission classes for removal

2025-04-04 Thread David M . Lloyd
On Fri, 4 Apr 2025 14:12:55 GMT, Sean Mullan wrote: > > > Please review this change to terminally deprecate the following security > > > related permission classes: `java.security.AllPermission`, > > > `java.security.UnresolvedPermission`, `javax.net.ssl.SSLPermission`, > > > `javax.security.a

Re: RFR: 8350126: Regression ~3% on Crypto-ChaCha20Poly1305.encrypt for MacOSX aarch64

2025-04-04 Thread Andrew Haley
On Thu, 3 Apr 2025 16:31:39 GMT, Jamil Nimeh wrote: > This fix addresses a performance regression found on some aarch64 processors, > namely the Apple M1, when we moved to a quarter round parallel implementation > in JDK-8349106. After making some improvements in the ordering of the > instruc

Re: RFR: 8348732: SunJCE and SunPKCS11 have different PBE key encodings [v3]

2025-04-04 Thread Francisco Ferrari Bihurriet
On Thu, 27 Mar 2025 21:04:39 GMT, Valerie Peng wrote: >>> Hi @valeriepeng, I found code assuming `com.sun.crypto.provider.PBEKey` >>> contains only ASCII, please find my suggestions in the review comments. I >>> also added a suggestion for the tests, in order to increase the coverage in >>> th

RFR: 8254622: Hide superclasses from conditionally exported packages

2025-04-04 Thread Hannes Wallnöfer
Please review an enhancement to treat classes and interfaces that are not included and not unconditionally exported as hidden. This means they do not show up in the generated documentation even if they are implemented or extended by a documented type. This change makes the `@hidden` JavaDoc ta

Re: RFR: 8349348: Refactor ClassLoaderDeadlock.sh and Deadlock.sh to run fully in java [v3]

2025-04-04 Thread Sean Mullan
On Thu, 6 Mar 2025 11:49:12 GMT, Mikhail Yankelevich wrote: >> Refactor the following to run fully in java: >> test/java/security//Security/ClassLoaderDeadlock/ClassLoaderDeadlock.sh >> test/java/security//Security/ClassLoaderDeadlock/Deadlock.sh > > Mikhail Yankelevich has updated the pull requ

Re: RFR: 8348967: Deprecate security permission classes for removal

2025-04-04 Thread Sean Mullan
On Fri, 4 Apr 2025 12:42:36 GMT, Sean Mullan wrote: > Please review this change to terminally deprecate the following security > related permission classes: `java.security.AllPermission`, > `java.security.UnresolvedPermission`, `javax.net.ssl.SSLPermission`, > `javax.security.auth.AuthPermissi

Re: RFR: 8348967: Deprecate security permission classes for removal

2025-04-04 Thread David M . Lloyd
On Fri, 4 Apr 2025 12:42:36 GMT, Sean Mullan wrote: > Please review this change to terminally deprecate the following security > related permission classes: `java.security.AllPermission`, > `java.security.UnresolvedPermission`, `javax.net.ssl.SSLPermission`, > `javax.security.auth.AuthPermissi

RFR: 8353641: Deprecate core library permission classes for removal

2025-04-04 Thread Roger Riggs
Now that the Security Manager is permanently disabled, the following permission classes in the core libraries area can be deprecated for removal as they are no longer useful: FilePermission, LinkPermission, LoggingPermission, PropertyPermission, ReflectPermission, RuntimePermission, and Seriali

Re: RFR: 8353641: Deprecate core library permission classes for removal

2025-04-04 Thread Daniel Fuchs
On Fri, 4 Apr 2025 12:37:32 GMT, Roger Riggs wrote: > Now that the Security Manager is permanently disabled, the following > permission classes in the core libraries area can be deprecated for removal > as they are no longer useful: FilePermission, LinkPermission, > LoggingPermission, Property

Re: RFR: 8351565: Implement JEP 502: Stable Values (Preview)

2025-04-04 Thread Maurizio Cimadamore
In general I don't disagree. There is, however, at least _some_ cases where the imperative API is less difficult to use. In some cases you know that a class has a complex lifecycle -- perhaps it starts off in a simple "larval" state, where the instance only exist in a single thread. In