Withdrawn: 8334365: Problemlist CAInterop.java#microsoftecc2017

2024-06-23 Thread Christoph Langer
On Mon, 17 Jun 2024 08:01:39 GMT, Christoph Langer wrote: > Exclude CAInterop.java#microsoftecc2017 because it generates lots of noice in > CI. This pull request has been closed without being integrated. - PR: https://git.openjdk.org/jdk/pull/19741

Re: RFR: 8334365: Problemlist CAInterop.java#microsoftecc2017

2024-06-23 Thread Christoph Langer
On Mon, 17 Jun 2024 08:01:39 GMT, Christoph Langer wrote: > Exclude CAInterop.java#microsoftecc2017 because it generates lots of noice in > CI. Closing in favor of https://bugs.openjdk.org/browse/JDK-8334441 - PR Comment: https://git.openjdk.org/jdk/pull/19741#issuec

Re: RFR: 8334202: Exclude CAInterop.java#sslrooteccca,sslrootevrsaca

2024-06-23 Thread Christoph Langer
On Thu, 13 Jun 2024 09:25:11 GMT, Christoph Langer wrote: > Let's exclude these CAInterop tests until the problem is fixed. Closing in favor of https://bugs.openjdk.org/browse/JDK-8334441 - PR Comment: https://git.openjdk.org/jdk/pull/19690#issuecomment-2185711351

Withdrawn: 8334202: Exclude CAInterop.java#sslrooteccca, sslrootevrsaca

2024-06-23 Thread Christoph Langer
On Thu, 13 Jun 2024 09:25:11 GMT, Christoph Langer wrote: > Let's exclude these CAInterop tests until the problem is fixed. This pull request has been closed without being integrated. - PR: https://git.openjdk.org/jdk/pull/19690

Re: [jdk23] RFR: 8334441: Mark tests in jdk_security_infra group as manual

2024-06-22 Thread Christoph Langer
> The commit being backported was authored by Rajan Halade on 21 Jun 2024 and > was reviewed by Christoph Langer and Sean Mullan. > > Thanks! Thanks for doing the backport. - Marked as reviewed by clanger (Reviewer). PR Review: https://git.openjdk.org/jdk/pull/19841#pullrequestreview-2133855195

Withdrawn: 8334201: Exclude CAInterop.java#certignarootca

2024-06-21 Thread Christoph Langer
On Thu, 13 Jun 2024 09:05:07 GMT, Christoph Langer wrote: > The test is failing currently and the JBS issue could not be resolved since > about a month, so let's exclude the test for now. This pull request has been closed without being integrated. - PR: https://git.

Re: RFR: 8334201: Exclude CAInterop.java#certignarootca

2024-06-21 Thread Christoph Langer
On Thu, 13 Jun 2024 09:05:07 GMT, Christoph Langer wrote: > The test is failing currently and the JBS issue could not be resolved since > about a month, so let's exclude the test for now. Withdrawing in favor of #19814 ([JDK-8334441](https://bugs.openjdk.org/browse/

Re: RFR: 8334441: Mark tests in jdk_security_infra group as manual

2024-06-21 Thread Christoph Langer
On Thu, 20 Jun 2024 18:35:00 GMT, Rajan Halade wrote: > Updated all the tests that depend on external infrastructure services as > manual. These tests may fail with external reasons, for instance - change in > CA test portal, certificate status updates, or network issues. Looks good, although

Re: RFR: 8334201: Exclude CAInterop.java#certignarootca

2024-06-19 Thread Christoph Langer
On Thu, 13 Jun 2024 09:05:07 GMT, Christoph Langer wrote: > The test is failing currently and the JBS issue could not be resolved since > about a month, so let's exclude the test for now. Any updates? If not, I would like to integrate this after end of this week... -

Re: RFR: 8334202: Exclude CAInterop.java#sslrooteccca,sslrootevrsaca

2024-06-19 Thread Christoph Langer
On Thu, 13 Jun 2024 09:25:11 GMT, Christoph Langer wrote: > Let's exclude these CAInterop tests until the problem is fixed. I'll integrate this if we don't hear back from the CA by the end of the week. - PR Comment: https://git.openjdk.org/jdk/pull/19690#issuecomment-2179010698

Re: RFR: 8333938: Exclude CAInterop.java#digicerttlsrsarootg5

2024-06-19 Thread Christoph Langer
On Thu, 13 Jun 2024 12:32:58 GMT, SendaoYan wrote: > Hi all, > Test > `security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java#digicerttlsrsarootg5` > report failure as failed to validate, before the validate issue has been > fixed, should we problem list the testcase.

Re: RFR: 8334106: Problemlist CAInterop.java#quovadisrootca1g3 due to JDK-8334105 [v2]

2024-06-19 Thread Christoph Langer
On Fri, 14 Jun 2024 00:58:30 GMT, SendaoYan wrote: >> Thanks for the approved. > >> @sendaoYan As a best practice, it would be useful to first understand why >> the test is not working before putting it on the ProblemList. Depending on >> the severity of the problem that is not always possible,

Re: RFR: 8334365: Problemlist CAInterop.java#microsoftecc2017

2024-06-17 Thread Christoph Langer
On Mon, 17 Jun 2024 08:01:39 GMT, Christoph Langer wrote: > Exclude CAInterop.java#microsoftecc2017 because it generates lots of noice in > CI. @rhalade Please also have a look at this one. Thank you! - PR Comment: https://git.openjdk.org/jdk/pull/19741#issuecomment-2172587640

RFR: 8334365: Problemlist CAInterop.java#microsoftecc2017

2024-06-17 Thread Christoph Langer
Exclude CAInterop.java#microsoftecc2017 because it generates lots of noice in CI. - Commit messages: - JDK-8334365 Changes: https://git.openjdk.org/jdk/pull/19741/files Webrev: https://webrevs.openjdk.org/?repo=jdk&pr=19741&range=00 Issue: https://bugs.openjdk.org/browse/JDK-83

Re: RFR: 8334202: Exclude CAInterop.java#sslrooteccca,sslrootevrsaca

2024-06-17 Thread Christoph Langer
On Thu, 13 Jun 2024 09:25:11 GMT, Christoph Langer wrote: > Let's exclude these CAInterop tests until the problem is fixed. @rhalade could you please bless this exclusion quickly since it pops up in tests of all our codelines every day... - PR Comment: https://git.openjdk

Re: RFR: 8334201: Exclude CAInterop.java#certignarootca

2024-06-17 Thread Christoph Langer
On Thu, 13 Jun 2024 09:05:07 GMT, Christoph Langer wrote: > The test is failing currently and the JBS issue could not be resolved since > about a month, so let's exclude the test for now. @rhalade could you please bless this exclusion now since it pops up in tests of all our code

Re: [jdk23] RFR: 8333724: Problem list security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java#teliasonerarootcav1

2024-06-14 Thread Christoph Langer
On Thu, 13 Jun 2024 13:07:23 GMT, Christoph Langer wrote: > Hi all, > > This pull request contains a backport of > [JDK-8333724](https://bugs.openjdk.org/browse/JDK-8333724), commit > [8ffc35d1](https://github.com/openjdk/jdk/commit/8ffc35d117846a7a2aa08afed662273d2f8877

[jdk23] Integrated: 8333724: Problem list security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java#teliasonerarootcav1

2024-06-13 Thread Christoph Langer
On Thu, 13 Jun 2024 13:07:23 GMT, Christoph Langer wrote: > Hi all, > > This pull request contains a backport of > [JDK-8333724](https://bugs.openjdk.org/browse/JDK-8333724), commit > [8ffc35d1](https://github.com/openjdk/jdk/commit/8ffc35d117846a7a2aa08afed662273d2f8877

Re: [jdk23] RFR: 8333724: Problem list security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java#teliasonerarootcav1

2024-06-13 Thread Christoph Langer
On Thu, 13 Jun 2024 13:07:23 GMT, Christoph Langer wrote: > Hi all, > > This pull request contains a backport of > [JDK-8333724](https://bugs.openjdk.org/browse/JDK-8333724), commit > [8ffc35d1](https://github.com/openjdk/jdk/commit/8ffc35d117846a7a2aa08afed662273d2f8877

Re: RFR: 8334106: Problemlist CAInterop.java#quovadisrootca1g3 due to JDK-8334105 [v2]

2024-06-13 Thread Christoph Langer
On Thu, 13 Jun 2024 12:21:23 GMT, SendaoYan wrote: >> Hi all, >> Test >> `security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java#quovadisrootca1g3` >> report failure as `failed to validate`, before the validate issue has been >> fixed, should we problem list the te

[jdk23] RFR: 8333724: Problem list security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java#teliasonerarootcav1

2024-06-13 Thread Christoph Langer
Hi all, This pull request contains a backport of [JDK-8333724](https://bugs.openjdk.org/browse/JDK-8333724), commit [8ffc35d1](https://github.com/openjdk/jdk/commit/8ffc35d117846a7a2aa08afed662273d2f887770) from the [openjdk/jdk](https://git.openjdk.org/jdk) repository. The commit being backpo

Re: RFR: 8334201: Exclude CAInterop.java#certignarootca

2024-06-13 Thread Christoph Langer
On Thu, 13 Jun 2024 11:55:34 GMT, Sean Mullan wrote: > Please wait for @rhalade to review. Will do. There's also #19685 and #19690. These are somewhat annoying and I'd prefer if we could exclude them for the time being. - PR Comment: https://git.openjdk.org/jdk/pull/19689#issuecom

RFR: 8334202: Exclude CAInterop.java#sslrooteccca,sslrootevrsaca

2024-06-13 Thread Christoph Langer
Let's exclude these CAInterop tests until the problem is fixed. - Commit messages: - JDK-8334202 Changes: https://git.openjdk.org/jdk/pull/19690/files Webrev: https://webrevs.openjdk.org/?repo=jdk&pr=19690&range=00 Issue: https://bugs.openjdk.org/browse/JDK-8334202 Stats: 2 li

Re: RFR: 8334106: Problemlist CAInterop.java#quovadisrootca1g3 due to JDK-8334105

2024-06-13 Thread Christoph Langer
On Thu, 13 Jun 2024 01:20:55 GMT, SendaoYan wrote: > Hi all, > Test > `security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java#quovadisrootca1g3` > report failure as `failed to validate`, before the validate issue has been > fixed, should we problem list the testcas

RFR: 8334201: Exclude CAInterop.java#certignarootca

2024-06-13 Thread Christoph Langer
The test is failing currently and the JBS issue could not be resolved since about a month, so let's exclude the test for now. - Commit messages: - JDK-8334201 Changes: https://git.openjdk.org/jdk/pull/19689/files Webrev: https://webrevs.openjdk.org/?repo=jdk&pr=19689&range=00 I

Re: RFR: 8334106: Problemlist CAInterop.java#quovadisrootca1g3 due to JDK-8334105

2024-06-13 Thread Christoph Langer
On Thu, 13 Jun 2024 01:20:55 GMT, SendaoYan wrote: > Hi all, > Test > `security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java#quovadisrootca1g3` > report failure as `failed to validate`, before the validate issue has been > fixed, should we problem list the testcas

Integrated: 8326000: Remove obsolete comments for class sun.security.ssl.SunJSSE

2024-02-17 Thread Christoph Langer
On Thu, 15 Feb 2024 22:32:58 GMT, Christoph Langer wrote: > The experimental SunJSSE FIPS compliant mode was removed in JDK13 with > [JDK-8217835](https://bugs.openjdk.org/browse/JDK-8217835). > It seems the removal of some comments had been missed at that time. This > could be i

Re: RFR: 8326000: Remove obsolete comments for class sun.security.ssl.SunJSSE [v2]

2024-02-16 Thread Christoph Langer
> The experimental SunJSSE FIPS compliant mode was removed in JDK13 with > [JDK-8217835](https://bugs.openjdk.org/browse/JDK-8217835). > It seems the removal of some comments had been missed at that time. This > could be irritating to readers of the code. Christoph Langer has upda

Re: RFR: 8326000: Remove obsolete comments for class sun.security.ssl.SunJSSE

2024-02-16 Thread Christoph Langer
On Fri, 16 Feb 2024 04:24:06 GMT, Anthony Scarpino wrote: > You will need to update the copyright on the file. Right. Updated. - PR Comment: https://git.openjdk.org/jdk/pull/17885#issuecomment-1947979882

RFR: 8326000: Remove obsolete comments for class sun.security.ssl.SunJSSE

2024-02-15 Thread Christoph Langer
The experimental SunJSSE FIPS compliant mode was removed in JDK13 with [JDK-8217835](https://bugs.openjdk.org/browse/JDK-8217835). It seems the removal of some comments had been missed at that time. This could be irritating to readers of the code. - Commit messages: - JDK-8326000

Re: RFR: JDK-8316341: sun/security/pkcs11/PKCS11Test.java needs adjustment on Linux ppc64le Ubuntu 22

2023-09-15 Thread Christoph Langer
On Fri, 15 Sep 2023 08:21:00 GMT, Matthias Baesken wrote: > Currently sun/security/pkcs11/PKCS11Test.java needs adjustment on Linux > ppc64le Ubuntu 22, it does not find the NSS libs because the new file system > locations are not handled, unlike on Linux x86_64 . Marked as reviewed by clanger

Re: RFR: JDK-8315644: increase timeout of sun/security/tools/jarsigner/Warning.java

2023-09-04 Thread Christoph Langer
On Mon, 4 Sep 2023 13:09:08 GMT, Matthias Baesken wrote: > on some slow machines, sun/security/tools/jarsigner/Warning.java runs > sometimes into timeouts (with fastdebug binaries). > So the current timeout of the test should be increased. Marked as reviewed by clanger (Reviewer).

[jdk21] Integrated: 8309088: security/infra/java/security/cert/CertPathValidator/certification/AmazonCA.java fails

2023-08-03 Thread Christoph Langer
On Wed, 2 Aug 2023 06:42:29 GMT, Christoph Langer wrote: > Hi all, > > This pull request contains a backport of > [JDK-8309088](https://bugs.openjdk.org/browse/JDK-8309088), commit > [4c2e54fb](https://github.com/openjdk/jdk/commit/4c2e54fb055bee0af5cd838fdd32a0f7902d51

[jdk21] RFR: 8309088: security/infra/java/security/cert/CertPathValidator/certification/AmazonCA.java fails

2023-08-01 Thread Christoph Langer
Hi all, This pull request contains a backport of [JDK-8309088](https://bugs.openjdk.org/browse/JDK-8309088), commit [4c2e54fb](https://github.com/openjdk/jdk/commit/4c2e54fb055bee0af5cd838fdd32a0f7902d51e3) from the [openjdk/jdk](https://git.openjdk.org/jdk) repository. The commit being backpo

Re: [jdk21] RFR: 8310549: avoid potential leaks in KeystoreImpl.m related to JNU_CHECK_EXCEPTION early returns

2023-07-04 Thread Christoph Langer
On Fri, 30 Jun 2023 12:28:43 GMT, Matthias Baesken wrote: > 8310549: avoid potential leaks in KeystoreImpl.m related to > JNU_CHECK_EXCEPTION early returns Marked as reviewed by clanger (Reviewer). - PR Review: https://git.openjdk.org/jdk21/pull/86#pullrequestreview-1512250194

Re: RFR: JDK-8309340: Provide sctpHandleSocketErrorWithMessage

2023-06-05 Thread Christoph Langer
On Fri, 2 Jun 2023 08:03:01 GMT, Matthias Baesken wrote: > There are cases in the sctp coding where a function > sctpHandleSocketErrorWithMessage would be beneficial (similar to existing > handleSocketErrorWithMessage) to provide more detail what failed. > > Additionally sctpHandleSocketErrorW

Re: RFR: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates [v6]

2023-06-05 Thread Christoph Langer
On Fri, 19 May 2023 12:19:56 GMT, Christoph Langer wrote: >> With this PR we try to be better in loading certificates from the MacOS >> Keychain into a JDK Trust store. >> >> The current implementation after JDK-8278449 would only load/trust >> certificates from

Integrated: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates

2023-06-05 Thread Christoph Langer
On Thu, 11 May 2023 21:38:35 GMT, Christoph Langer wrote: > With this PR we try to be better in loading certificates from the MacOS > Keychain into a JDK Trust store. > > The current implementation after JDK-8278449 would only load/trust > certificates from an identity (w

Re: RFR: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates [v6]

2023-06-03 Thread Christoph Langer
On Sat, 27 May 2023 22:47:53 GMT, Weijun Wang wrote: >> Christoph Langer has updated the pull request incrementally with one >> additional commit since the last revision: >> >> Remove another obsolete comment > > I think you can finalize the CSR now. @wangweij

Re: RFR: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates [v6]

2023-05-30 Thread Christoph Langer
On Sat, 27 May 2023 22:47:53 GMT, Weijun Wang wrote: > I think you can finalize the CSR now. Thx for the hint, done. - PR Comment: https://git.openjdk.org/jdk/pull/13945#issuecomment-1568048939

Re: RFR: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates [v6]

2023-05-23 Thread Christoph Langer
On Tue, 23 May 2023 17:05:13 GMT, Weijun Wang wrote: > I've started the CSR at https://bugs.openjdk.org/browse/JDK-8308690. Please > edit if there is any issue. At the same time, please write a release note. > See https://openjdk.org/guide/#release-notes for the process. Thanks. I've created a

Re: RFR: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates [v6]

2023-05-23 Thread Christoph Langer
On Tue, 23 May 2023 13:50:48 GMT, Weijun Wang wrote: > The code change looks fine to me. Thanks. > > Since this is rather a big behavior change, I think a CSR and a release note > are required. The previous release note on this is at > https://www.oracle.com/java/technologies/javase/19-relnote

Re: RFR: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates [v6]

2023-05-22 Thread Christoph Langer
On Mon, 22 May 2023 22:43:18 GMT, Weijun Wang wrote: >> This handles the case, when a certificate is in both, the login (user) and >> system keychain. > > How do you know "the existing entry must have the same properties and trust > settings"? Trust settings are stored per certificate. That is

Re: RFR: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates [v6]

2023-05-21 Thread Christoph Langer
On Fri, 19 May 2023 20:28:42 GMT, Weijun Wang wrote: > Since you removed the key usage checks, can you update the PR description > please? Done. > src/java.base/macosx/classes/apple/security/KeychainStore.java line 808: > >> 806: // Check whether a certificate with same alias alre

Re: RFR: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates [v6]

2023-05-19 Thread Christoph Langer
ficates that should be trusted > from "security dump-trust-settings" are contained in the keystore and those > that should be disallowed are absent. Christoph Langer has updated the pull request incrementally with one additional commit since the last revision: Remove another obsole

Re: RFR: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates [v5]

2023-05-19 Thread Christoph Langer
ficates that should be trusted > from "security dump-trust-settings" are contained in the keystore and those > that should be disallowed are absent. Christoph Langer has updated the pull request incrementally with one additional commit since the last revision: Remove further unnecessa

Re: RFR: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates [v4]

2023-05-19 Thread Christoph Langer
ficates that should be trusted > from "security dump-trust-settings" are contained in the keystore and those > that should be disallowed are absent. Christoph Langer has updated the pull request with a new target base due to a merge or a rebase. The incremental webrev excludes the unrel

Re: RFR: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates [v3]

2023-05-19 Thread Christoph Langer
On Thu, 18 May 2023 00:00:58 GMT, Weijun Wang wrote: > Before your new change, such a certificate is not trusted, because > `SecTrustSettingsCopyTrustSettings` returns `errSecItemNotFound` so > `jm_createTrustedCertEntry` is not called at all. > > I am not sure if such a certificate is meant t

Re: RFR: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates [v3]

2023-05-17 Thread Christoph Langer
On Wed, 17 May 2023 12:42:32 GMT, Matthias Baesken wrote: >> Christoph Langer has updated the pull request incrementally with one >> additional commit since the last revision: >> >> Check return code of SecTrustSettingsCopyTrustSettings and address review >&

Re: RFR: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates [v3]

2023-05-17 Thread Christoph Langer
On Wed, 17 May 2023 20:49:34 GMT, Weijun Wang wrote: > No matter what `SecTrustSettingsCopyTrustSettings` returns, you will always > call `jm_createTrustedCertEntry`. This means if I add a self-signed > certificate but has not added any trusted settings onto it, it will be always > trusted. Is

Re: RFR: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates [v3]

2023-05-17 Thread Christoph Langer
On Wed, 17 May 2023 17:34:42 GMT, Sean Mullan wrote: > Please don't integrate this until I or someone from my team reviews it. > Thanks. Sure. - PR Comment: https://git.openjdk.org/jdk/pull/13945#issuecomment-1552088991

Re: RFR: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates

2023-05-17 Thread Christoph Langer
On Wed, 17 May 2023 07:36:33 GMT, Matthias Baesken wrote: > Yes this seems to be the case. Could you maybe add a one liner comment to > libosxsecurity/KeystoreImpl.m (near to the user and admin domain handling) > summarizing what you said? And I still prefer checking the return values of > the

Re: RFR: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates [v3]

2023-05-17 Thread Christoph Langer
ficates that should be trusted > from "security dump-trust-settings" are contained in the keystore and those > that should be disallowed are absent. Christoph Langer has updated the pull request incrementally with one additional commit since the last revision: Check return code o

Re: RFR: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates

2023-05-17 Thread Christoph Langer
On Tue, 16 May 2023 07:46:37 GMT, Matthias Baesken wrote: > Hi Christoph, I do not see any reference to kSecTrustSettingsDomainSystem in > your coding. Handling at least kSecTrustSettingsDomainUser and > kSecTrustSettingsDomainAdmin is good but I am not sure about > kSecTrustSettingsDomainSyst

Re: RFR: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates [v2]

2023-05-16 Thread Christoph Langer
ficates that should be trusted > from "security dump-trust-settings" are contained in the keystore and those > that should be disallowed are absent. Christoph Langer has updated the pull request incrementally with one additional commit since the last revision: Add some more initializa

RFR: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates

2023-05-11 Thread Christoph Langer
With this PR we try to be better in loading certificates from the MacOS Keychain into a JDK Trust store. The current implementation after JDK-8278449 would only load/trust certificates from an identity (with private key available) and certificates that have explicit trust set in the user domain

Re: RFR: JDK-8303354: addCertificatesToKeystore in KeystoreImpl.m needs CFRelease call in early potential CHECK_NULL return

2023-02-28 Thread Christoph Langer
On Tue, 28 Feb 2023 15:17:19 GMT, Matthias Baesken wrote: > We have a (potential) early return in addCertificatesToKeystore in > KeystoreImpl.m . This is implemented by the CHECK_NULL macro. However this > missed a CFRelease call. Makes sense. - Marked as reviewed by clanger (Rev