Re: RFR: 8347067: Load certificates without explicit trust settings in KeyChainStore [v5]

2025-04-01 Thread Alexey Bakhtin
On Tue, 1 Apr 2025 17:29:57 GMT, Sean Mullan wrote: > > > I am dubious that this is the right thing to do. There is a distinct > > > difference between a certificate that is trusted and one that requires > > > additional validation to determine if it is trusted. Blindly trusting > > > self-sig

Re: RFR: 8347067: Load certificates without explicit trust settings in KeyChainStore [v5]

2025-01-27 Thread Alexey Bakhtin
On Mon, 27 Jan 2025 22:43:32 GMT, Tim Jacomb wrote: >> ## The change >> >> Without this change intermediate certificates that don't have explicit trust >> settings are ignored not added to the truststore. >> >> >> >> ## Reproducer >> >> See https://github.com/timja/openjdk-intermediate-ca-r

Re: RFR: 8347067: Load certificates without explicit trust settings in KeyChainStore [v4]

2025-01-27 Thread Alexey Bakhtin
On Mon, 27 Jan 2025 21:34:08 GMT, Tim Jacomb wrote: >> ## The change >> >> Without this change intermediate certificates that don't have explicit trust >> settings are ignored not added to the truststore. >> >> >> >> ## Reproducer >> >> See https://github.com/timja/openjdk-intermediate-ca-r

Re: RFR: 8347067: Load certificates without explicit trust settings in KeyChainStore [v3]

2025-01-27 Thread Alexey Bakhtin
On Sun, 26 Jan 2025 22:58:04 GMT, Tim Jacomb wrote: >> test/jdk/java/security/KeyStore/CheckMacOSKeyChainIntermediateCATrust.java >> line 166: >> >>> 164: private static void assertThat(boolean expected, String message, >>> List certificates) { >>> 165: if (!expected) { >>> 166:

Re: RFR: 8347067: Load certificates without explicit trust settings in KeyChainStore [v3]

2025-01-27 Thread Alexey Bakhtin
On Sat, 25 Jan 2025 01:12:01 GMT, Alexey Bakhtin wrote: >> Tim Jacomb has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Revert unneeded change > > test/jdk/java/security/KeyStore/CheckMacOSKeyChainInter

Re: RFR: 8347067: Load certificates without explicit trust settings in KeyChainStore [v3]

2025-01-27 Thread Alexey Bakhtin
On Sun, 26 Jan 2025 23:04:29 GMT, Tim Jacomb wrote: >> ## The change >> >> Without this change intermediate certificates that don't have explicit trust >> settings are ignored not added to the truststore. >> >> >> >> ## Reproducer >> >> See https://github.com/timja/openjdk-intermediate-ca-r

Re: RFR: 8347067: Load certificates without explicit trust settings in KeyChainStore

2025-01-24 Thread Alexey Bakhtin
On Fri, 3 Jan 2025 11:28:01 GMT, Tim Jacomb wrote: > ## The change > > Without this change intermediate certificates that don't have explicit trust > settings are ignored not added to the truststore. > > > > ## Reproducer > > See https://github.com/timja/openjdk-intermediate-ca-reproducer >

Re: RFR: 8347067: Load certificates without explicit trust settings in KeyChainStore

2025-01-24 Thread Alexey Bakhtin
On Fri, 3 Jan 2025 11:28:01 GMT, Tim Jacomb wrote: > ## The change > > Without this change intermediate certificates that don't have explicit trust > settings are ignored not added to the truststore. > > > > ## Reproducer > > See https://github.com/timja/openjdk-intermediate-ca-reproducer >

Re: RFR: 8347067: Load certificates without explicit trust settings in KeyChainStore

2025-01-24 Thread Alexey Bakhtin
On Tue, 7 Jan 2025 17:01:10 GMT, Tim Jacomb wrote: >> ## The change >> >> Without this change intermediate certificates that don't have explicit trust >> settings are ignored not added to the truststore. >> >> >> >> ## Reproducer >> >> See https://github.com/timja/openjdk-intermediate-ca-re

Re: RFR: 8347067: Load certificates without explicit trust settings in KeyChainStore

2025-01-24 Thread Alexey Bakhtin
On Mon, 6 Jan 2025 21:53:34 GMT, Tim Jacomb wrote: > Does that add value to add a test so someone could run it manually? Yes, I think a manual test is better than nothing. - PR Comment: https://git.openjdk.org/jdk/pull/22911#issuecomment-2574022994

Re: KeychainStore include user and predefined roots within one truststore

2025-01-17 Thread Alexey Bakhtin
> > Tim, any progress on the OCA? > > Thanks, > > Sean > > On 1/13/25 2:47 PM, Alexey Bakhtin wrote: >> Hello Sean, Tim >> >> I've attached logs to the JDK-8347067, created based on Tim’s report. >> As you mentioned already, the issue happens

Re: RFR: 8347506: Compatible OCSP readtimeout property with OCSP timeout

2025-01-14 Thread Alexey Bakhtin
On Tue, 14 Jan 2025 22:41:47 GMT, Jamil Nimeh wrote: > This makes a small change to the default value of the > `com.sun.security.ocsp.readtimeout` System property. When not explicitly > specified, it will be set to the value of the `com.sun.security.ocsp.timeout` > System property, which help

Re: KeychainStore include user and predefined roots within one truststore

2025-01-13 Thread Alexey Bakhtin
Hello Sean, Tim I've attached logs to the JDK-8347067, created based on Tim’s report. As you mentioned already, the issue happens because the TLS server sends truncated chain without CA intermediate certificates. In my understanding, it should not be a problem if the Root and CA intermediate are

Re: KeychainStore include user and predefined roots within one truststore

2025-01-03 Thread Alexey Bakhtin
Hello Tim, It looks like the use case you described can be easily achieved by wrapping all certificates from the KeychainStore-ROOT and KeychainStore stores into one custom Trust Store. As far as I know, all certificates should be in one or another Keychain store. Also, please look at my comme

Re: RFR: 8344366: Remove Security Manager dependencies from javax.net.ssl and sun.security.ssl packages [v2]

2024-11-22 Thread Alexey Bakhtin
On Fri, 22 Nov 2024 16:39:49 GMT, Sean Mullan wrote: >> Yes, you are right, javadoc is the same. So, not entirely correct about API. >> But the same exact place in the KeyManagerFactory is not modified. I do not >> know the exact policy about references in the javadoc. I prefer to have a >> ful

Re: RFR: 8344366: Remove Security Manager dependencies from javax.net.ssl and sun.security.ssl packages

2024-11-21 Thread Alexey Bakhtin
On Thu, 21 Nov 2024 22:45:12 GMT, Sean Mullan wrote: >> src/java.base/share/classes/javax/net/ssl/TrustManagerFactory.java line 72: >> >>> 70: * security property to the desired algorithm name. >>> 71: * >>> 72: * @see java.security.Security security properties >> >> it looks lik

Re: RFR: 8344366: Remove Security Manager dependencies from javax.net.ssl and sun.security.ssl packages

2024-11-21 Thread Alexey Bakhtin
On Thu, 21 Nov 2024 18:29:24 GMT, Sean Mullan wrote: > Now that JEP 486 has been integrated, the `javax.net.ssl` and > `sun.security.ssl` package implementation dependencies on > `System.getSecurityManager`, `AccessController.doPrivileged` and > `AccessControlContext` can be removed. > > Most

Re: RFR: 8331163: Consider Trust Settings to select SSL certificate [v2]

2024-07-17 Thread Alexey Bakhtin
> Please review a proposal to verify Trust Settings for Keychain key entries. > > Keychain-related Jtreg tests passed. Alexey Bakhtin has updated the pull request incrementally with one additional commit since the last revision: Add verification to the manual macos

Re: RFR: 8331163: Consider Trust Settings to select SSL certificate

2024-06-28 Thread Alexey Bakhtin
On Fri, 28 Jun 2024 13:07:55 GMT, Weijun Wang wrote: > Hi Alexey, sorry I'll be on vacation starting tomorrow and won't be able to > review this in 3 weeks. At the mean time, can you try to create a test? > Thanks. Thank you. Will try. - PR Comment: https://git.openjdk.org/jdk/pu

RFR: 8331163: Consider Trust Settings to select SSL certificate

2024-06-24 Thread Alexey Bakhtin
Please review a proposal to verify Trust Settings for Keychain key entries. Keychain-related Jtreg tests passed. - Commit messages: - 8331163: Consider Trust Settings to select SSL certificate Changes: https://git.openjdk.org/jdk/pull/19872/files Webrev: https://webrevs.openjdk.o

Integrated: 8320362: Load anchor certificates from Keychain keystore

2024-03-21 Thread Alexey Bakhtin
On Sat, 18 Nov 2023 02:41:05 GMT, Alexey Bakhtin wrote: > Please review the proposed fix. > > The patch loads system root certificates from the MacOS Keychain with > TrustSettings. > It allows to build a trusted certificate path using the MacOS Keychain store > only. Thi

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v9]

2024-03-21 Thread Alexey Bakhtin
On Thu, 21 Mar 2024 15:20:39 GMT, Sean Mullan wrote: >> Alexey Bakhtin has refreshed the contents of this pull request, and previous >> commits have been removed. The incremental views will show differences >> compared to the previous content of the PR. The pull request co

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v11]

2024-03-21 Thread Alexey Bakhtin
> Please review the proposed fix. > > The patch loads system root certificates from the MacOS Keychain with > TrustSettings. > It allows to build a trusted certificate path using the MacOS Keychain store > only. Alexey Bakhtin has updated the pull request incrementally w

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v10]

2024-03-21 Thread Alexey Bakhtin
> Please review the proposed fix. > > The patch loads system root certificates from the MacOS Keychain with > TrustSettings. > It allows to build a trusted certificate path using the MacOS Keychain store > only. Alexey Bakhtin has updated the pull request incrementally w

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v9]

2024-03-20 Thread Alexey Bakhtin
> Please review the proposed fix. > > The patch loads system root certificates from the MacOS Keychain with > TrustSettings. > It allows to build a trusted certificate path using the MacOS Keychain store > only. Alexey Bakhtin has refreshed the contents of this pull req

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v8]

2024-03-20 Thread Alexey Bakhtin
> Please review the proposed fix. > > The patch loads system root certificates from the MacOS Keychain with > TrustSettings. > It allows to build a trusted certificate path using the MacOS Keychain store > only. Alexey Bakhtin has updated the pull request incrementally w

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v7]

2024-03-20 Thread Alexey Bakhtin
On Tue, 19 Mar 2024 14:01:14 GMT, Sean Mullan wrote: >> Alexey Bakhtin has updated the pull request incrementally with one >> additional commit since the last revision: >> >> Load root certificates from SystemRootCertificates.keychain > > Is it practical to add

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v7]

2024-03-18 Thread Alexey Bakhtin
On Mon, 18 Mar 2024 21:05:38 GMT, Weijun Wang wrote: >> CSR is in the Proposed state now. Workflow does not allow me to Finalize it. > > Now that it's in Proposed state, Joe will need to move to Provisional first. > Since it was already Provisional some time ago and you haven't really updated >

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v7]

2024-03-18 Thread Alexey Bakhtin
On Mon, 18 Mar 2024 20:50:06 GMT, Weijun Wang wrote: >> Thank you. I've updated CSR and waiting for review. > > I added myself as a reviewer some time ago. You can finalize it and wait for > approval. CSR is in the Proposed state now. Workflow does not allow me to Finalize it. - P

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v7]

2024-03-18 Thread Alexey Bakhtin
On Mon, 18 Mar 2024 14:28:02 GMT, Weijun Wang wrote: >> Hi @wangweij , >> Thank you for review. >> Unfortunately `SecTrustCopyCustomAnchorCertificates` can not be used also. >> It is used to retrieve certificates from your own created SecTrust. As I >> know it is not possible to create/load Se

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v7]

2024-03-08 Thread Alexey Bakhtin
On Fri, 8 Mar 2024 19:47:00 GMT, Weijun Wang wrote: >> Alexey Bakhtin has updated the pull request incrementally with one >> additional commit since the last revision: >> >> Load root certificates from SystemRootCertificates.keychain > > src/java.bas

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v5]

2024-03-08 Thread Alexey Bakhtin
On Fri, 16 Feb 2024 15:01:34 GMT, Weijun Wang wrote: >>> Will KEYCHAINSTORE-ROOT contains trusted certs inside KEYCHAINSTORE? I >>> tried on my machine and there are some items not in `security >>> dump-trust-settings -s`. >> `security dump-trust-settings -s` returns only predefined root certif

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v5]

2024-02-23 Thread Alexey Bakhtin
On Fri, 16 Feb 2024 15:01:34 GMT, Weijun Wang wrote: > > `security dump-trust-settings -s` returns only predefined root > > certificates. KEYCHAINSTORE-ROOT additionally contains installed root > > trusted certificates in the system domain > > Are you sure they should be added into this keysto

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v7]

2024-02-23 Thread Alexey Bakhtin
> Please review the proposed fix. > > The patch loads system root certificates from the MacOS Keychain with > TrustSettings. > It allows to build a trusted certificate path using the MacOS Keychain store > only. Alexey Bakhtin has updated the pull request incrementally w

Re: Apple KeychainStore: Can it be used to access the MacOS trust store?

2024-02-14 Thread Alexey Bakhtin
Hello Graham, This functionality is under review now at https://github.com/openjdk/jdk/pull/16722 This patch proposes access to the MacOS trust store using new java KeychainStore-Root keystore. Feel free to review and comment. Regards Aleksei > On 14 Feb 2024, at 02:16, Graham Leggett wrote:

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v5]

2024-02-02 Thread Alexey Bakhtin
On Thu, 1 Feb 2024 21:07:32 GMT, Weijun Wang wrote: >> Alexey Bakhtin has updated the pull request incrementally with one >> additional commit since the last revision: >> >> Update CheckMacOSKeyChainTrust test > > test/jdk/java/security/KeyStore/CheckMacOSKeyCha

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v6]

2024-02-02 Thread Alexey Bakhtin
> Please review the proposed fix. > > The patch loads system root certificates from the MacOS Keychain with > TrustSettings. > It allows to build a trusted certificate path using the MacOS Keychain store > only. Alexey Bakhtin has updated the pull request incrementally w

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v5]

2024-02-02 Thread Alexey Bakhtin
On Fri, 2 Feb 2024 19:37:18 GMT, Alexey Bakhtin wrote: > Will KEYCHAINSTORE-ROOT contains trusted certs inside KEYCHAINSTORE? I tried > on my machine and there are some items not in `security dump-trust-settings > -s`. `security dump-trust-settings -s` returns only predefined root cer

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v5]

2024-02-02 Thread Alexey Bakhtin
On Thu, 1 Feb 2024 21:36:51 GMT, Weijun Wang wrote: > Will KEYCHAINSTORE-ROOT contains trusted certs inside KEYCHAINSTORE? I tried > on my machine and there are some items not in `security dump-trust-settings > -s`. I've found an issue in the original implementation that prevents adding diffe

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v5]

2024-02-01 Thread Alexey Bakhtin
On Thu, 1 Feb 2024 21:11:31 GMT, Weijun Wang wrote: >> Alexey Bakhtin has updated the pull request incrementally with one >> additional commit since the last revision: >> >> Update CheckMacOSKeyChainTrust test > > test/jdk/java/security/KeyStore/CheckMacOSKeyCha

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v4]

2024-01-31 Thread Alexey Bakhtin
On Wed, 31 Jan 2024 15:08:09 GMT, Weijun Wang wrote: > Great! The change looks good. Can you manage to add a test? Maybe try to load > both store types. Make sure they have different contents and not empty (?). Thank you. I have updated `java/security/KeyStore/CheckMacOSKeyChainTrust.java` tes

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v4]

2024-01-31 Thread Alexey Bakhtin
On Wed, 31 Jan 2024 15:33:28 GMT, Weijun Wang wrote: > Do you intend to call `addIdentitiesToKeystore` for both store types? Yes, you are right. Thank you. We do not need private identities in the root keystore. Updated - PR Comment: https://git.openjdk.org/jdk/pull/16722#issuecom

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v5]

2024-01-31 Thread Alexey Bakhtin
> Please review the proposed fix. > > The patch loads system root certificates from the MacOS Keychain with > TrustSettings. > It allows to build a trusted certificate path using the MacOS Keychain store > only. Alexey Bakhtin has updated the pull request incrementally w

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v3]

2024-01-25 Thread Alexey Bakhtin
On Wed, 24 Jan 2024 16:04:03 GMT, Weijun Wang wrote: > Is it possible to reuse some some lines from `addCertificatesToKeystore`? > > BTW, I reviewed the CSR. Hi @wangweij, Thank you a lot for PR and CSR review. I have updated PR with review findings and refactored addCertificatesToKeystore/add

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v4]

2024-01-25 Thread Alexey Bakhtin
> Please review the proposed fix. > > The patch loads system root certificates from the MacOS Keychain with > TrustSettings. > It allows to build a trusted certificate path using the MacOS Keychain store > only. Alexey Bakhtin has updated the pull request incrementally w

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v3]

2024-01-25 Thread Alexey Bakhtin
On Wed, 24 Jan 2024 15:41:11 GMT, Weijun Wang wrote: >> Alexey Bakhtin has updated the pull request incrementally with one >> additional commit since the last revision: >> >> Add KeychainStore-ROOT keystore for root certificates > > src/java.base

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v3]

2024-01-04 Thread Alexey Bakhtin
On Thu, 4 Jan 2024 16:56:36 GMT, Weijun Wang wrote: > What are the change for existing `addCertificatesToKeystore` for? Is there > any behavior change? Hi @wangweij . No behavior changes. Just reformatted to make it similar to addCertificatesToKeystoreRoot. Can be reverted back. -

Re: RFR: 8320362: Load anchor certificates from Keychain keystore

2024-01-03 Thread Alexey Bakhtin
On Mon, 20 Nov 2023 13:49:33 GMT, Weijun Wang wrote: >> Please review the proposed fix. >> >> The patch loads system root certificates from the MacOS Keychain with >> TrustSettings. >> It allows to build a trusted certificate path using the MacOS Keychain store >> only. > > How about putting t

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v3]

2024-01-03 Thread Alexey Bakhtin
> Please review the proposed fix. > > The patch loads system root certificates from the MacOS Keychain with > TrustSettings. > It allows to build a trusted certificate path using the MacOS Keychain store > only. Alexey Bakhtin has updated the pull request incrementally w

Re: RFR: 8320362: Load anchor certificates from Keychain keystore [v2]

2023-12-01 Thread Alexey Bakhtin
> Please review the proposed fix. > > The patch loads system root certificates from the MacOS Keychain with > TrustSettings. > It allows to build a trusted certificate path using the MacOS Keychain store > only. Alexey Bakhtin has updated the pull request incrementally w

RFR: 8320362: Load anchor certificates from Keychain keystore

2023-11-19 Thread Alexey Bakhtin
Please review the proposed fix. The patch loads system root certificates from the MacOS Keychain with TrustSettings. It allows to build a trusted certificate path using the MacOS Keychain store only. - Commit messages: - 8320362: Load anchor certificates from Keychain keystore Ch

Re: RFR: 8311532: Option to disable Krb5LoginModule::login method [v2]

2023-09-21 Thread Alexey Bakhtin
On Thu, 24 Aug 2023 21:24:51 GMT, Alexey Bakhtin wrote: >> JGSS is implemented in the JVM in 2 levels: the standard Java security >> provider for Kerberos in sun.security.jgss.krb5.Krb5MechFactory and the JAAS >> login module for Kerberos in com.sun.security.auth.modu

Re: RFR: 8311532: Option to disable Krb5LoginModule::login method [v2]

2023-08-24 Thread Alexey Bakhtin
y (`“sun.security.auth.skipLogin”`) > to set the default value if this option is not provided. This way it would > not break the regular Java Kerberos provider and allow users to both > individually (via JAAS configs) and globally (via the property) set the > expected behavior Alexe

Re: RFR: 8311532: Option to disable Krb5LoginModule::login method

2023-08-14 Thread Alexey Bakhtin
On Fri, 11 Aug 2023 23:08:56 GMT, Alexey Bakhtin wrote: > JGSS is implemented in the JVM in 2 levels: the standard Java security > provider for Kerberos in sun.security.jgss.krb5.Krb5MechFactory and the JAAS > login module for Kerberos in com.sun.security.auth.module.Krb5LoginModul

Re: RFR: 8311532: Option to disable Krb5LoginModule::login method

2023-08-14 Thread Alexey Bakhtin
On Mon, 14 Aug 2023 16:28:24 GMT, Eirik Bjorsnos wrote: >> JGSS is implemented in the JVM in 2 levels: the standard Java security >> provider for Kerberos in sun.security.jgss.krb5.Krb5MechFactory and the JAAS >> login module for Kerberos in com.sun.security.auth.module.Krb5LoginModule. >> The

RFR: 8311532: Option to disable Krb5LoginModule::login method

2023-08-11 Thread Alexey Bakhtin
JGSS is implemented in the JVM in 2 levels: the standard Java security provider for Kerberos in sun.security.jgss.krb5.Krb5MechFactory and the JAAS login module for Kerberos in com.sun.security.auth.module.Krb5LoginModule. The problem is that in this hierarchy, the login module doesn't go throug

Re: RFR: 8309330: Allow java.security to be extended via a properties directory [v2]

2023-06-02 Thread Alexey Bakhtin
On Fri, 2 Jun 2023 12:58:36 GMT, Andrew John Hughes wrote: >> Currently, security properties are held within the `java.security` file in >> the JDK tree for each installed JDK. The system property >> `java.security.properties` can be used to point to a file containing >> additional properties.

Re: RFR: 8309330: Allow java.security to be extended via a properties directory

2023-06-01 Thread Alexey Bakhtin
On Fri, 2 Jun 2023 00:57:49 GMT, Andrew John Hughes wrote: > Currently, security properties are held within the `java.security` file in > the JDK tree for each installed JDK. The system property > `java.security.properties` can be used to point to a file containing > additional properties. The

Integrated: 8303809: Dispose context in SPNEGO NegotiatorImpl

2023-03-14 Thread Alexey Bakhtin
On Wed, 8 Mar 2023 09:05:19 GMT, Alexey Bakhtin wrote: > This patch fixes a possible native memory leak in case of a custom native GSS > provider. > The actual leak was reported in production. > > sun/security/jgss, sun/security/krb5, sun/net/www/protocol/http jtreg tests >

Re: RFR: 8303809: Dispose context in SPNEGO NegotiatorImpl [v5]

2023-03-14 Thread Alexey Bakhtin
On Tue, 14 Mar 2023 16:35:30 GMT, Daniel Fuchs wrote: > Thanks Alexey. Tests returned green. Good to go! Thank you a lot for review - PR: https://git.openjdk.org/jdk/pull/12920

Re: RFR: 8303809: Dispose context in SPNEGO NegotiatorImpl [v4]

2023-03-14 Thread Alexey Bakhtin
On Tue, 14 Mar 2023 14:30:21 GMT, Daniel Fuchs wrote: >> Alexey Bakhtin has updated the pull request incrementally with one >> additional commit since the last revision: >> >> More space after catch > > src/java.base/share/classes/sun/net/www/protocol/http/Neg

Re: RFR: 8303809: Dispose context in SPNEGO NegotiatorImpl [v5]

2023-03-14 Thread Alexey Bakhtin
> This patch fixes a possible native memory leak in case of a custom native GSS > provider. > The actual leak was reported in production. > > sun/security/jgss, sun/security/krb5, sun/net/www/protocol/http jtreg tests > are passed Alexey Bakhtin has updated the pull request

Re: RFR: 8303809: Dispose context in SPNEGO NegotiatorImpl [v4]

2023-03-13 Thread Alexey Bakhtin
> This patch fixes a possible native memory leak in case of a custom native GSS > provider. > The actual leak was reported in production. > > sun/security/jgss, sun/security/krb5, sun/net/www/protocol/http jtreg tests > are passed Alexey Bakhtin has updated the pull request

Re: RFR: 8303809: Dispose context in SPNEGO NegotiatorImpl [v2]

2023-03-13 Thread Alexey Bakhtin
On Mon, 13 Mar 2023 16:02:10 GMT, Weijun Wang wrote: >> Alexey Bakhtin has updated the pull request incrementally with one >> additional commit since the last revision: >> >> Fix formatting > > src/java.base/share/classes/sun/net/www/protocol/http/NegotiateA

Re: RFR: 8303809: Dispose context in SPNEGO NegotiatorImpl [v3]

2023-03-13 Thread Alexey Bakhtin
> This patch fixes a possible native memory leak in case of a custom native GSS > provider. > The actual leak was reported in production. > > sun/security/jgss, sun/security/krb5, sun/net/www/protocol/http jtreg tests > are passed Alexey Bakhtin has updated the pull request

Re: RFR: 8303809: Dispose context in SPNEGO NegotiatorImpl [v2]

2023-03-10 Thread Alexey Bakhtin
> This patch fixes a possible native memory leak in case of a custom native GSS > provider. > The actual leak was reported in production. > > sun/security/jgss, sun/security/krb5, sun/net/www/protocol/http jtreg tests > are passed Alexey Bakhtin has updated the pull request

Re: RFR: 8303809: Dispose context in SPNEGO NegotiatorImpl

2023-03-10 Thread Alexey Bakhtin
On Fri, 10 Mar 2023 15:05:16 GMT, Weijun Wang wrote: >> This patch fixes a possible native memory leak in case of a custom native >> GSS provider. >> The actual leak was reported in production. >> >> sun/security/jgss, sun/security/krb5, sun/net/www/protocol/http jtreg tests >> are passed > >

Re: RFR: 8303809: Dispose context in SPNEGO NegotiatorImpl

2023-03-09 Thread Alexey Bakhtin
On Wed, 8 Mar 2023 09:05:19 GMT, Alexey Bakhtin wrote: > This patch fixes a possible native memory leak in case of a custom native GSS > provider. > The actual leak was reported in production. > > sun/security/jgss, sun/security/krb5, sun/net/www/protocol/http jtreg test

Re: RFR: 8303809: Dispose context in SPNEGO NegotiatorImpl

2023-03-09 Thread Alexey Bakhtin
On Wed, 8 Mar 2023 12:29:55 GMT, Daniel Fuchs wrote: >> This patch fixes a possible native memory leak in case of a custom native >> GSS provider. >> The actual leak was reported in production. >> >> sun/security/jgss, sun/security/krb5, sun/net/www/protocol/http jtreg tests >> are passed > >

Re: RFR: 8303809: Dispose context in SPNEGO NegotiatorImpl

2023-03-09 Thread Alexey Bakhtin
On Wed, 8 Mar 2023 12:24:51 GMT, Daniel Fuchs wrote: >> This patch fixes a possible native memory leak in case of a custom native >> GSS provider. >> The actual leak was reported in production. >> >> sun/security/jgss, sun/security/krb5, sun/net/www/protocol/http jtreg tests >> are passed > >

Re: RFR: 8303809: Dispose context in SPNEGO NegotiatorImpl

2023-03-09 Thread Alexey Bakhtin
On Wed, 8 Mar 2023 09:05:19 GMT, Alexey Bakhtin wrote: > This patch fixes a possible native memory leak in case of a custom native GSS > provider. > The actual leak was reported in production. > > sun/security/jgss, sun/security/krb5, sun/net/www/protocol/http jtreg test

RFR: 8303809: Dispose context in SPNEGO NegotiatorImpl

2023-03-08 Thread Alexey Bakhtin
This patch fixes a possible native memory leak in case of a custom native GSS provider. The actual leak was reported in production. sun/security/jgss, sun/security/krb5, sun/net/www/protocol/http jtreg tests are passed - Commit messages: - 8303809: Dispose context in SPNEGO Negoti