Re: RFR: 8331682: Increase default timeout value

2024-11-20 Thread Matthias Baesken
On Wed, 20 Nov 2024 01:23:10 GMT, Artur Barashev wrote: > SAP complains about SSLSocketNoServerHelloClientShutdown timing out in their > test environment (concurrent test execution with high CPU load). This change > addresses this issue in 2 ways: > - Increase default timeout value > - Allow ad

Re: [jdk23] RFR: 8333724: Problem list security/infra/java/security/cert/CertPathValidator/certification/CAInterop.java#teliasonerarootcav1

2024-06-13 Thread Matthias Baesken
70) > from the [openjdk/jdk](https://git.openjdk.org/jdk) repository. > > The commit being backported was authored by Matthias Baesken on 7 Jun 2024 > and was reviewed by Lutz Schmidt and Sergey Bylokhov. > > Since this is a test update, it can be pushed under RDP1 ruling. > >

Re: RFR: 8326000: Remove obsolete comments for class sun.security.ssl.SunJSSE [v2]

2024-02-16 Thread Matthias Baesken
On Fri, 16 Feb 2024 08:52:19 GMT, Christoph Langer wrote: >> The experimental SunJSSE FIPS compliant mode was removed in JDK13 with >> [JDK-8217835](https://bugs.openjdk.org/browse/JDK-8217835). >> It seems the removal of some comments had been missed at that time. This >> could be irritating t

Re: RFR: 8319128: sun/security/pkcs11 tests fail on OL 7.9 aarch64 [v6]

2024-01-11 Thread Matthias Baesken
On Thu, 4 Jan 2024 15:21:39 GMT, Matthew Donovan wrote: >> In this PR, I included logic to skip tests on Oracle Linux prior to version >> 8. The NSS binaries we are using for testing use a newer version of GLIBC >> than is included with OL 7.9. > > Matthew Donovan has updated the pull request

Re: RFR: 8319128: sun/security/pkcs11 tests fail on OL 7.9 aarch64 [v6]

2024-01-11 Thread Matthias Baesken
On Thu, 11 Jan 2024 15:08:28 GMT, Matthew Donovan wrote: >> test/lib/jdk/test/lib/Platform.java line 354: >> >>> 352: public static boolean isOracleLinux7() { >>> 353: if >>> (System.getProperty("os.name").toLowerCase().contains("linux") && >>> 354: >>> System.getPr

Re: RFR: 8319128: sun/security/pkcs11 tests fail on OL 7.9 aarch64 [v6]

2024-01-11 Thread Matthias Baesken
On Thu, 4 Jan 2024 15:21:39 GMT, Matthew Donovan wrote: >> In this PR, I included logic to skip tests on Oracle Linux prior to version >> 8. The NSS binaries we are using for testing use a newer version of GLIBC >> than is included with OL 7.9. > > Matthew Donovan has updated the pull request

Integrated: JDK-8322782: Clean up usages of unnecessary fully qualified class name "java.util.Arrays"

2024-01-04 Thread Matthias Baesken
On Wed, 3 Jan 2024 11:41:20 GMT, Matthias Baesken wrote: > In [JDK-8322772](https://bugs.openjdk.org/browse/JDK-8322772) one similar > cleanup has been proposed before (and was done in the change). But there are > a number of other places in the codebase where the import is done

Re: RFR: JDK-8322782: Clean up usages of unnecessary fully qualified class name "java.util.Arrays" [v3]

2024-01-04 Thread Matthias Baesken
On Wed, 3 Jan 2024 13:55:22 GMT, Matthias Baesken wrote: >> In [JDK-8322772](https://bugs.openjdk.org/browse/JDK-8322772) one similar >> cleanup has been proposed before (and was done in the change). But there are >> a number of other places in the codebase where the import

Re: RFR: JDK-8322782: Clean up usages of unnecessary fully qualified class name "java.util.Arrays" [v3]

2024-01-03 Thread Matthias Baesken
On Wed, 3 Jan 2024 13:55:22 GMT, Matthias Baesken wrote: >> In [JDK-8322772](https://bugs.openjdk.org/browse/JDK-8322772) one similar >> cleanup has been proposed before (and was done in the change). But there are >> a number of other places in the codebase where the import

Re: RFR: JDK-8322782: Clean up usages of unnecessary fully qualified class name "java.util.Arrays" [v3]

2024-01-03 Thread Matthias Baesken
;java.util.Arrays" is used so more > cleanups can be done. Matthias Baesken has updated the pull request incrementally with one additional commit since the last revision: Adjust Invokers.java too - Changes: - all: https://git.openjdk.org/jdk/pull/17241/files - new: ht

Re: RFR: JDK-8322782: Clean up usages of unnecessary fully qualified class name "java.util.Arrays" [v2]

2024-01-03 Thread Matthias Baesken
;java.util.Arrays" is used so more > cleanups can be done. Matthias Baesken has updated the pull request incrementally with one additional commit since the last revision: adjust copyright date - Changes: - all: https://git.openjdk.org/jdk/pull/17241/files - new: https:/

RFR: JDK-8322782: Clean up usages of unnecessary fully qualified class name "java.util.Arrays"

2024-01-03 Thread Matthias Baesken
In [JDK-8322772](https://bugs.openjdk.org/browse/JDK-8322772) one similar cleanup has been proposed before (and was done in the change). But there are a number of other places in the codebase where the import is done and still the unneeded fully qualified class name "java.util.Arrays" is used so

Re: RFR: 8319128: sun/security/pkcs11 tests fail on OL 7.9 aarch64 [v2]

2023-12-15 Thread Matthias Baesken
On Mon, 27 Nov 2023 14:47:29 GMT, Matthew Donovan wrote: >> In this PR, I included logic to skip tests on Oracle Linux prior to version >> 8. The NSS binaries we are using for testing use a newer version of GLIBC >> than is included with OL 7.9. > > Matthew Donovan has updated the pull request

Re: RFR: 8319128: sun/security/pkcs11 tests fail on OL 7.9 aarch64 [v3]

2023-12-15 Thread Matthias Baesken
On Thu, 14 Dec 2023 19:08:20 GMT, Matthew Donovan wrote: >> In this PR, I included logic to skip tests on Oracle Linux prior to version >> 8. The NSS binaries we are using for testing use a newer version of GLIBC >> than is included with OL 7.9. > > Matthew Donovan has updated the pull request

Re: RFR: JDK-8313764: Offer JVM HS functionality to shared lib load operations done by the JDK codebase [v2]

2023-11-15 Thread Matthias Baesken
On Wed, 23 Aug 2023 15:18:03 GMT, Matthias Baesken wrote: >> Currently there is a number of functionality that would be interesting to >> have for shared lib load operations in the JDK C code. >> Some examples : >> Events::log_dll_message for hs-err file

Re: RFR: 8318240: [AIX] Cleaners.java test failure

2023-10-19 Thread Matthias Baesken
On Tue, 17 Oct 2023 07:31:07 GMT, Varada M wrote: > When the test sets the sun.security.jgss.native and > sun.security.nativegss.debug as true, the test fails on AIX due to missing > Kerberos GSS API dynamic library` libgssapi_krb5.so` > > JBS Issue : [JDK-8318240](https://bugs.openjdk.org/br

Re: RFR: JDK-8313764: Offer JVM HS functionality to shared lib load operations done by the JDK codebase [v2]

2023-10-16 Thread Matthias Baesken
On Wed, 23 Aug 2023 15:18:03 GMT, Matthias Baesken wrote: >> Currently there is a number of functionality that would be interesting to >> have for shared lib load operations in the JDK C code. >> Some examples : >> Events::log_dll_message for hs-err file

Re: RFR: JDK-8316671: sun/security/ssl/SSLSocketImpl/SSLSocketCloseHang.java test fails intermittent with Read timed out

2023-09-26 Thread Matthias Baesken
On Tue, 26 Sep 2023 07:23:20 GMT, Matthias Baesken wrote: > We sometimes run into the following error. This especially occurs when > running with fastdebug binaries and on Linux ppc64le machines. > Current timeout set in the test is 1 second. > > Server accepting: 315357614

Integrated: JDK-8316671: sun/security/ssl/SSLSocketImpl/SSLSocketCloseHang.java test fails intermittent with Read timed out

2023-09-26 Thread Matthias Baesken
On Tue, 26 Sep 2023 07:23:20 GMT, Matthias Baesken wrote: > We sometimes run into the following error. This especially occurs when > running with fastdebug binaries and on Linux ppc64le machines. > Current timeout set in the test is 1 second. > > Server accepting: 315357614

RFR: JDK-8316671: sun/security/ssl/SSLSocketImpl/SSLSocketCloseHang.java test fails intermittent with Read timed out

2023-09-26 Thread Matthias Baesken
We sometimes run into the following error. This especially occurs when running with fastdebug binaries and on Linux ppc64le machines. Current timeout set in the test is 1 second. Server accepting: 315357614990101 Server accepted: 315359219006041 Client starting handshake: 315359228098300 java.net

Integrated: JDK-8316341: sun/security/pkcs11/PKCS11Test.java needs adjustment on Linux ppc64le Ubuntu 22

2023-09-18 Thread Matthias Baesken
On Fri, 15 Sep 2023 08:21:00 GMT, Matthias Baesken wrote: > Currently sun/security/pkcs11/PKCS11Test.java needs adjustment on Linux > ppc64le Ubuntu 22, it does not find the NSS libs because the new file system > locations are not handled, unlike on Linux x86_64 . This pull reques

Re: RFR: JDK-8316341: sun/security/pkcs11/PKCS11Test.java needs adjustment on Linux ppc64le Ubuntu 22

2023-09-18 Thread Matthias Baesken
On Fri, 15 Sep 2023 08:21:00 GMT, Matthias Baesken wrote: > Currently sun/security/pkcs11/PKCS11Test.java needs adjustment on Linux > ppc64le Ubuntu 22, it does not find the NSS libs because the new file system > locations are not handled, unlike on Linux x86_64 . Hi Christoph

RFR: JDK-8316341: sun/security/pkcs11/PKCS11Test.java needs adjustment on Linux ppc64le Ubuntu 22

2023-09-15 Thread Matthias Baesken
Currently sun/security/pkcs11/PKCS11Test.java needs adjustment on Linux ppc64le Ubuntu 22, it does not find the NSS libs because the new file system locations are not handled, unlike on Linux x86_64 . - Commit messages: - JDK-8316341 Changes: https://git.openjdk.org/jdk/pull/15759

Integrated: JDK-8315644: increase timeout of sun/security/tools/jarsigner/Warning.java

2023-09-05 Thread Matthias Baesken
On Mon, 4 Sep 2023 13:09:08 GMT, Matthias Baesken wrote: > on some slow machines, sun/security/tools/jarsigner/Warning.java runs > sometimes into timeouts (with fastdebug binaries). > So the current timeout of the test should be increased. This pull request has now been integrated.

Re: RFR: JDK-8315644: increase timeout of sun/security/tools/jarsigner/Warning.java

2023-09-05 Thread Matthias Baesken
On Mon, 4 Sep 2023 13:09:08 GMT, Matthias Baesken wrote: > on some slow machines, sun/security/tools/jarsigner/Warning.java runs > sometimes into timeouts (with fastdebug binaries). > So the current timeout of the test should be increased. Thanks for the reviews ! - P

Re: RFR: JDK-8315644: increase timeout of sun/security/tools/jarsigner/Warning.java

2023-09-04 Thread Matthias Baesken
On Mon, 4 Sep 2023 13:09:08 GMT, Matthias Baesken wrote: > on some slow machines, sun/security/tools/jarsigner/Warning.java runs > sometimes into timeouts (with fastdebug binaries). > So the current timeout of the test should be increased. Hi Christoph, thanks for t

RFR: JDK-8315644: increase timeout of sun/security/tools/jarsigner/Warning.java

2023-09-04 Thread Matthias Baesken
on some slow machines, sun/security/tools/jarsigner/Warning.java runs sometimes into timeouts (with fastdebug binaries). So the current timeout of the test should be increased. - Commit messages: - JDK-8315644 Changes: https://git.openjdk.org/jdk/pull/15560/files Webrev: https://w

Re: RFR: JDK-8313764: Offer JVM HS functionality to shared lib load operations done by the JDK codebase [v2]

2023-08-28 Thread Matthias Baesken
On Mon, 28 Aug 2023 02:26:30 GMT, David Holmes wrote: > Sorry but looking at the hotspot part of this I do not like the code in > jvm.cpp at all - it is far too messy. I expected to see a simple interface to > os::dlopen which then handles all the platform specific issues. > > I'm also somewha

Re: RFR: JDK-8313764: Offer JVM HS functionality to shared lib load operations done by the JDK codebase

2023-08-24 Thread Matthias Baesken
On Wed, 23 Aug 2023 12:26:36 GMT, Martin Doerr wrote: > Please check windows-aarch64 build error: unresolved external symbol > dlopen_ext Hi Martin, thanks ! I did a small adjustment, now the windows aarch64 build works. - PR Comment: https://git.openjdk.org/jdk/pull/15264#issue

Re: RFR: JDK-8313764: Offer JVM HS functionality to shared lib load operations done by the JDK codebase [v2]

2023-08-23 Thread Matthias Baesken
Cache on AIX ( see > LoadedLibraries::reload() , see also > https://bugs.openjdk.org/browse/JDK-8314152 ), > this is currently not fully in sync with libs loaded form jdk c-libs and > sometimes reports outdated information > > Offer an interface (e.g. jvm.cpp) to support thi

Re: RFR: JDK-8313764: Offer JVM HS functionality to shared lib load operations done by the JDK codebase

2023-08-15 Thread Matthias Baesken
On Mon, 14 Aug 2023 07:48:00 GMT, Matthias Baesken wrote: > Currently there is a number of functionality that would be interesting to > have for shared lib load operations in the JDK C code. > Some examples : > Events::log_dll_message for hs-err files reporting > JFR event Na

Re: RFR: JDK-8313764: Offer JVM HS functionality to shared lib load operations done by the JDK codebase

2023-08-14 Thread Matthias Baesken
On Mon, 14 Aug 2023 07:48:00 GMT, Matthias Baesken wrote: > Currently there is a number of functionality that would be interesting to > have for shared lib load operations in the JDK C code. > Some examples : > Events::log_dll_message for hs-err files reporting > JFR event Na

RFR: JDK-8313764: Offer JVM HS functionality to shared lib load operations done by the JDK codebase

2023-08-14 Thread Matthias Baesken
Currently there is a number of functionality that would be interesting to have for shared lib load operations in the JDK C code. Some examples : Events::log_dll_message for hs-err files reporting JFR event NativeLibraryLoad There is the need to update the shared lib Cache on AIX ( see LoadedLibra

Re: RFR: 8309214: sun/security/pkcs11/KeyStore/CertChainRemoval.java fails after 8301154

2023-08-11 Thread Matthias Baesken
On Thu, 3 Aug 2023 20:51:33 GMT, Valerie Peng wrote: > This change addresses the scenario where a certificate is first stored as > part of a certificate chain and then stored again as a certificate > corresponding to a PrivateKey entry. Newer version of NSS errors out with > CKR_GENERAL_ERROR

Re: RFR: 8309214: sun/security/pkcs11/KeyStore/CertChainRemoval.java fails after 8301154

2023-08-09 Thread Matthias Baesken
On Tue, 8 Aug 2023 23:03:02 GMT, Valerie Peng wrote: > > Hi Valerie, we put the PR into our build/test queue to check if it solves > > some errors we currently notice in CertChainRemoval.java . > > Sure, thanks! What is the errors that you observed? Are you running against > NSS and which vers

Re: RFR: 8309214: sun/security/pkcs11/KeyStore/CertChainRemoval.java fails after 8301154

2023-08-04 Thread Matthias Baesken
On Thu, 3 Aug 2023 20:51:33 GMT, Valerie Peng wrote: > This change addresses the scenario where a certificate is first stored as > part of a certificate chain and then stored again as a certificate > corresponding to a PrivateKey entry. Newer version of NSS errors out with > CKR_GENERAL_ERROR

Re: [jdk21] RFR: 8309088: security/infra/java/security/cert/CertPathValidator/certification/AmazonCA.java fails

2023-08-02 Thread Matthias Baesken
On Wed, 2 Aug 2023 06:42:29 GMT, Christoph Langer wrote: > Hi all, > > This pull request contains a backport of > [JDK-8309088](https://bugs.openjdk.org/browse/JDK-8309088), commit > [4c2e54fb](https://github.com/openjdk/jdk/commit/4c2e54fb055bee0af5cd838fdd32a0f7902d51e3) > from the [openjdk

Re: RFR: 8312489: Increase jdk.jar.maxSignatureFileSize default which is too low for JARs such as WhiteSource/Mend unified agent jar [v3]

2023-07-31 Thread Matthias Baesken
On Fri, 28 Jul 2023 22:49:04 GMT, Hai-May Chao wrote: >> JDK-8312489: Increase jdk.jar.maxSignatureFileSize default which is too low >> for JARs such as WhiteSource/Mend unified agent jar > > Hai-May Chao has updated the pull request incrementally with one additional > commit since the last rev

Integrated: JDK-8312512: sspi.cpp avoid some NULL checks related to free and delete

2023-07-25 Thread Matthias Baesken
On Mon, 24 Jul 2023 07:50:44 GMT, Matthias Baesken wrote: > sspi.cpp contains the gss_export_name function, where at the end some cleanup > is done by calling delete. However this should be done more careful, because > the function get_full_name which is called in gss_export_name mig

Re: RFR: JDK-8312512: sspi.cpp avoid some NULL checks related to free and delete [v2]

2023-07-24 Thread Matthias Baesken
On Mon, 24 Jul 2023 11:30:29 GMT, Matthias Baesken wrote: >> sspi.cpp contains the gss_export_name function, where at the end some >> cleanup is done by calling delete. However this should be done more careful, >> because the function get_full_name which is called in gss

Re: RFR: JDK-8312512: sspi.cpp gss_export_name avoid delete on NULL fullname [v2]

2023-07-24 Thread Matthias Baesken
On Mon, 24 Jul 2023 11:01:07 GMT, Daniel JeliƄski wrote: > `free`, `delete` and `delete[]` are all safe to call on a NULL pointer. > > I noticed that we are checking for NULL in other places in this file; could > you remove these checks? Hi, I found and adjusted a number of places where the po

Re: RFR: JDK-8312512: sspi.cpp gss_export_name avoid delete on NULL fullname [v2]

2023-07-24 Thread Matthias Baesken
in this case. Matthias Baesken has updated the pull request incrementally with one additional commit since the last revision: remove unneeded NULL checks forfree and delete calls - Changes: - all: https://git.openjdk.org/jdk/pull/14989/files - new: https://git.openjdk.org/jdk/pull

RFR: JDK-8312512: sspi.cpp gss_export_name avoid delete on NULL fullname

2023-07-24 Thread Matthias Baesken
sspi.cpp contains the gss_export_name function, where at the end some cleanup is done by calling delete. However this should be done more careful, because the function get_full_name which is called in gss_export_name might return NULL, so we better avoid calling delete in this case. ---

[jdk21] Integrated: 8310549: avoid potential leaks in KeystoreImpl.m related to JNU_CHECK_EXCEPTION early returns

2023-07-04 Thread Matthias Baesken
On Fri, 30 Jun 2023 12:28:43 GMT, Matthias Baesken wrote: > 8310549: avoid potential leaks in KeystoreImpl.m related to > JNU_CHECK_EXCEPTION early returns This pull request has now been integrated. Changeset: 8d6ef6fd Author:Matthias Baesken URL: https://git.openjdk.org

[jdk21] RFR: 8310549: avoid potential leaks in KeystoreImpl.m related to JNU_CHECK_EXCEPTION early returns

2023-06-30 Thread Matthias Baesken
8310549: avoid potential leaks in KeystoreImpl.m related to JNU_CHECK_EXCEPTION early returns - Commit messages: - Backport 7da3f1999fc5d1b9162443d97dfae7fe7b04dfc5 Changes: https://git.openjdk.org/jdk21/pull/86/files Webrev: https://webrevs.openjdk.org/?repo=jdk21&pr=86&range=00

Re: RFR: 8309740: Expand timeout windows for tests in JDK-8179502

2023-06-23 Thread Matthias Baesken
On Fri, 16 Jun 2023 18:19:45 GMT, Jamil Nimeh wrote: > This PR is for tests that were modified/added in JDK-8179502. The timeout > windows for those tests were a little too short on some test systems, > especially when the system is under heavy load. After a few iterations > trying out vario

Integrated: JDK-8310549: avoid potential leaks in KeystoreImpl.m related to JNU_CHECK_EXCEPTION early returns

2023-06-22 Thread Matthias Baesken
On Wed, 21 Jun 2023 14:10:20 GMT, Matthias Baesken wrote: > In src/java.base/macosx/native/libosxsecurity/KeystoreImpl.m there are a few > JNU_CHECK_EXCEPTION macro usages that could potentially cause leaks. This pull request has now been integrated. Changeset: 7da3f199 Author:Ma

Re: RFR: JDK-8310549: avoid potential leaks in KeystoreImpl.m related to JNU_CHECK_EXCEPTION early returns

2023-06-22 Thread Matthias Baesken
On Wed, 21 Jun 2023 14:10:20 GMT, Matthias Baesken wrote: > In src/java.base/macosx/native/libosxsecurity/KeystoreImpl.m there are a few > JNU_CHECK_EXCEPTION macro usages that could potentially cause leaks. Hi Weijun, thanks for the review ! - PR Comment: https://git.openj

RFR: JDK-8310549: avoid potential leaks in KeystoreImpl.m related to JNU_CHECK_EXCEPTION early returns

2023-06-21 Thread Matthias Baesken
In src/java.base/macosx/native/libosxsecurity/KeystoreImpl.m there are a few JNU_CHECK_EXCEPTION macro usages that could potentially cause leaks. - Commit messages: - JDK-8310549 Changes: https://git.openjdk.org/jdk/pull/14590/files Webrev: https://webrevs.openjdk.org/?repo=jdk&pr

Re: RFR: JDK-8309340: Provide sctpHandleSocketErrorWithMessage

2023-06-06 Thread Matthias Baesken
On Tue, 6 Jun 2023 07:15:08 GMT, Alan Bateman wrote: >> There are cases in the sctp coding where a function >> sctpHandleSocketErrorWithMessage would be beneficial (similar to existing >> handleSocketErrorWithMessage) to provide more detail what failed. >> >> Additionally sctpHandleSocketError

Re: RFR: JDK-8309340: Provide sctpHandleSocketErrorWithMessage

2023-06-06 Thread Matthias Baesken
On Tue, 6 Jun 2023 08:51:33 GMT, Daniel Fuchs wrote: > FWIW the changes look good to me. Thanks for looking into it. - PR Comment: https://git.openjdk.org/jdk/pull/14280#issuecomment-1578414732

Re: RFR: JDK-8309340: Provide sctpHandleSocketErrorWithMessage

2023-06-06 Thread Matthias Baesken
On Tue, 6 Jun 2023 07:16:13 GMT, Alan Bateman wrote: > I see this was integrated without a reviewer in the area but I think the > changes are okay. Hi Alan, I think Christoph is very competent in the area. But should I look into the census next time for some special reviewer category (and whic

Re: RFR: JDK-8309340: Provide sctpHandleSocketErrorWithMessage

2023-06-06 Thread Matthias Baesken
On Fri, 2 Jun 2023 08:03:01 GMT, Matthias Baesken wrote: > There are cases in the sctp coding where a function > sctpHandleSocketErrorWithMessage would be beneficial (similar to existing > handleSocketErrorWithMessage) to provide more detail what failed. > &g

Integrated: JDK-8309340: Provide sctpHandleSocketErrorWithMessage

2023-06-06 Thread Matthias Baesken
On Fri, 2 Jun 2023 08:03:01 GMT, Matthias Baesken wrote: > There are cases in the sctp coding where a function > sctpHandleSocketErrorWithMessage would be beneficial (similar to existing > handleSocketErrorWithMessage) to provide more detail what failed. > &g

RFR: JDK-8309340: Provide sctpHandleSocketErrorWithMessage

2023-06-02 Thread Matthias Baesken
There are cases in the sctp coding where a function sctpHandleSocketErrorWithMessage would be beneficial (similar to existing handleSocketErrorWithMessage) to provide more detail what failed. Additionally sctpHandleSocketErrorWithMessage was a bit modified (added errno handling for ENOTCONN fro

Integrated: JDK-8308872: enhance logging and some exception in krb5/Config.java

2023-05-31 Thread Matthias Baesken
On Thu, 25 May 2023 14:31:04 GMT, Matthias Baesken wrote: > There exists already some logging in krb5/Config.java (enabled by > -Dsun.security.krb5.debug=true), this could be enhanced for easier analysis > of problems. Additionally some exception(s) might be slightly adjusted.

Re: RFR: JDK-8308872: enhance logging and some exception in krb5/Config.java [v2]

2023-05-31 Thread Matthias Baesken
On Fri, 26 May 2023 08:04:58 GMT, Matthias Baesken wrote: >> There exists already some logging in krb5/Config.java (enabled by >> -Dsun.security.krb5.debug=true), this could be enhanced for easier analysis >> of problems. Additionally some exception(s) might be slightly adju

Re: RFR: JDK-8308872: enhance logging and some exception in krb5/Config.java [v2]

2023-05-26 Thread Matthias Baesken
> There exists already some logging in krb5/Config.java (enabled by > -Dsun.security.krb5.debug=true), this could be enhanced for easier analysis > of problems. Additionally some exception(s) might be slightly adjusted. Matthias Baesken has updated the pull request incrementally

RFR: JDK-8308872: enhance logging and some exception in krb5/Config.java

2023-05-25 Thread Matthias Baesken
There exists already some logging in krb5/Config.java (enabled by -Dsun.security.krb5.debug=true), this could be enhanced for easier analysis of problems. Additionally some exception(s) might be slightly adjusted. - Commit messages: - JDK-8308872 Changes: https://git.openjdk.org/j

Re: RFR: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates [v3]

2023-05-17 Thread Matthias Baesken
On Wed, 17 May 2023 08:06:56 GMT, Christoph Langer wrote: >> With this PR we try to be better in loading certificates from the MacOS >> Keychain into a JDK Trust store. >> >> The current implementation after JDK-8278449 would only load/trust >> certificates from an identity (with private key a

Re: RFR: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates [v3]

2023-05-17 Thread Matthias Baesken
On Wed, 17 May 2023 08:06:56 GMT, Christoph Langer wrote: >> With this PR we try to be better in loading certificates from the MacOS >> Keychain into a JDK Trust store. >> >> The current implementation after JDK-8278449 would only load/trust >> certificates from an identity (with private key a

Re: RFR: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates

2023-05-17 Thread Matthias Baesken
On Wed, 17 May 2023 07:14:06 GMT, Christoph Langer wrote: > > Hi Christoph, I do not see any reference to kSecTrustSettingsDomainSystem > > in your coding. Handling at least kSecTrustSettingsDomainUser and > > kSecTrustSettingsDomainAdmin is good but I am not sure about > > kSecTrustSettingsDo

Re: RFR: JDK-8308156: VerifyCACerts.java misses blank in error output

2023-05-16 Thread Matthias Baesken
On Tue, 16 May 2023 08:48:03 GMT, Matthias Baesken wrote: > In the checksum-related check, we miss blanks in the error output of the > calculated and expected checksum. Hi Rajan and Sean, thanks for the reviews ! - PR Comment: https://git.openjdk.org/jdk/pull/14003#issuec

Integrated: JDK-8308156: VerifyCACerts.java misses blank in error output

2023-05-16 Thread Matthias Baesken
On Tue, 16 May 2023 08:48:03 GMT, Matthias Baesken wrote: > In the checksum-related check, we miss blanks in the error output of the > calculated and expected checksum. This pull request has now been integrated. Changeset: 5a92aae1 Author:Matthias Baesken URL:

Re: RFR: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates

2023-05-16 Thread Matthias Baesken
On Thu, 11 May 2023 21:38:35 GMT, Christoph Langer wrote: > With this PR we try to be better in loading certificates from the MacOS > Keychain into a JDK Trust store. > > The current implementation after JDK-8278449 would only load/trust > certificates from an identity (with private key availa

RFR: JDK-8308156: VerifyCACerts.java misses blank in error output

2023-05-16 Thread Matthias Baesken
In the checksum-related check, we miss blanks in the error output of the calculated and expected checksum. - Commit messages: - JDK-8308156 Changes: https://git.openjdk.org/jdk/pull/14003/files Webrev: https://webrevs.openjdk.org/?repo=jdk&pr=14003&range=00 Issue: https://bugs.o

Re: RFR: 8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates

2023-05-16 Thread Matthias Baesken
On Thu, 11 May 2023 21:38:35 GMT, Christoph Langer wrote: > With this PR we try to be better in loading certificates from the MacOS > Keychain into a JDK Trust store. > > The current implementation after JDK-8278449 would only load/trust > certificates from an identity (with private key availa

Withdrawn: JDK-8303465: KeyStore of type KeychainStore, provider Apple shows different behavior after 8278449

2023-05-12 Thread Matthias Baesken
On Thu, 2 Mar 2023 13:33:53 GMT, Matthias Baesken wrote: > After 8278449, we seem to ignore in the call > > ` if (SecTrustSettingsCopyTrustSettings(certRef, > kSecTrustSettingsDomainUser, &trustSettings) == errSecItemNotFound) ` > > all trusted certs from admin and sy

Re: RFR: JDK-8303465: KeyStore of type KeychainStore, provider Apple shows different behavior after 8278449

2023-04-13 Thread Matthias Baesken
On Thu, 2 Mar 2023 13:33:53 GMT, Matthias Baesken wrote: > After 8278449, we seem to ignore in the call > > ` if (SecTrustSettingsCopyTrustSettings(certRef, > kSecTrustSettingsDomainUser, &trustSettings) == errSecItemNotFound) ` > > all trusted certs from admin and sy

Re: RFR: JDK-8303465: KeyStore of type KeychainStore, provider Apple shows different behavior after 8278449

2023-03-16 Thread Matthias Baesken
On Tue, 7 Mar 2023 17:32:15 GMT, Weijun Wang wrote: > I'll think about it more and discuss with my colleagues. Hi Weijun, is there some news from your colleagues ? - PR: https://git.openjdk.org/jdk/pull/12829

Integrated: JDK-8303576: addIdentitiesToKeystore in KeystoreImpl.m needs CFRelease call in early potential CHECK_NULL return

2023-03-09 Thread Matthias Baesken
The message from this sender included one or more files which could not be scanned for virus detection; do not open these files unless you are certain of the sender's intent. -- On Tue, 7 Mar 2023 15:56:55 GMT, Matthias Ba

Re: RFR: JDK-8303576: addIdentitiesToKeystore in KeystoreImpl.m needs CFRelease call in early potential CHECK_NULL return [v3]

2023-03-08 Thread Matthias Baesken
> Similar to what had been done in > [JDK-8303354](https://bugs.openjdk.org/browse/JDK-8303354) , we miss > CFRelease on the variable identitySearch in early CHECK_NULL returns > potentially done in the function addIdentitiesToKeystore. Matthias Baesken has updated the

Re: RFR: JDK-8303576: addIdentitiesToKeystore in KeystoreImpl.m needs CFRelease call in early potential CHECK_NULL return [v2]

2023-03-07 Thread Matthias Baesken
> Similar to what had been done in > [JDK-8303354](https://bugs.openjdk.org/browse/JDK-8303354) , we miss > CFRelease on the variable identitySearch in early CHECK_NULL returns > potentially done in the function addIdentitiesToKeystore. Matthias Baesken has updated the

RFR: JDK-8303576: addIdentitiesToKeystore in KeystoreImpl.m needs CFRelease call in early potential CHECK_NULL return

2023-03-07 Thread Matthias Baesken
Similar to what had been done in [JDK-8303354](https://bugs.openjdk.org/browse/JDK-8303354) , we miss CFRelease on the variable identitySearch in early CHECK_NULL returns potentially done in the function addIdentitiesToKeystore. - Commit messages: - JDK-8303576 Changes: https://g

Re: RFR: JDK-8303465: KeyStore of type KeychainStore, provider Apple shows different behavior after 8278449

2023-03-07 Thread Matthias Baesken
On Thu, 2 Mar 2023 13:33:53 GMT, Matthias Baesken wrote: > After 8278449, we seem to ignore in the call > > ` if (SecTrustSettingsCopyTrustSettings(certRef, > kSecTrustSettingsDomainUser, &trustSettings) == errSecItemNotFound) ` > > all trusted certs from admin and sy

Re: RFR: JDK-8303465: KeyStore of type KeychainStore, provider Apple shows different behavior after 8278449

2023-03-02 Thread Matthias Baesken
On Thu, 2 Mar 2023 15:23:02 GMT, Weijun Wang wrote: > dump-trust-setting I have found some errors with dump-trust-settings like this one https://github.com/wbond/package_control/issues/1017 but not sure if this is related to what you saw on your test infrastructure. - PR: https:

Re: RFR: JDK-8303465: KeyStore of type KeychainStore, provider Apple shows different behavior after 8278449

2023-03-02 Thread Matthias Baesken
On Thu, 2 Mar 2023 15:23:02 GMT, Weijun Wang wrote: > I'd like to contribute a test. Thanks for contributing the test. Any suggestion where to place the test ? - PR: https://git.openjdk.org/jdk/pull/12829

Integrated: JDK-8303354: addCertificatesToKeystore in KeystoreImpl.m needs CFRelease call in early potential CHECK_NULL return

2023-03-02 Thread Matthias Baesken
On Tue, 28 Feb 2023 15:17:19 GMT, Matthias Baesken wrote: > We have a (potential) early return in addCertificatesToKeystore in > KeystoreImpl.m . This is implemented by the CHECK_NULL macro. However this > missed a CFRelease call. This pull request has now been integrated.

Re: RFR: JDK-8303354: addCertificatesToKeystore in KeystoreImpl.m needs CFRelease call in early potential CHECK_NULL return [v2]

2023-03-02 Thread Matthias Baesken
On Thu, 2 Mar 2023 09:47:56 GMT, Matthias Baesken wrote: >> We have a (potential) early return in addCertificatesToKeystore in >> KeystoreImpl.m . This is implemented by the CHECK_NULL macro. However this >> missed a CFRelease call. > > Matthias Baesken has

Re: RFR: JDK-8303354: addCertificatesToKeystore in KeystoreImpl.m needs CFRelease call in early potential CHECK_NULL return [v2]

2023-03-02 Thread Matthias Baesken
On Thu, 2 Mar 2023 13:54:05 GMT, Weijun Wang wrote: > Thanks for the fix. I almost think we should invent a CHECK_NULL_GOTO_ERROUT > macro, but your fix is also OK. I think I discussed a while back some extended CHECK_NULL_ - macros (I think it was for freeing before return) but it was not s

RFR: JDK-8303465: KeyStore of type KeychainStore, provider Apple shows different behavior after 8278449

2023-03-02 Thread Matthias Baesken
After 8278449, we seem to ignore in the call ` if (SecTrustSettingsCopyTrustSettings(certRef, kSecTrustSettingsDomainUser, &trustSettings) == errSecItemNotFound) ` all trusted certs from admin and system domains, so a lot more certs are ignored than necessary. Probably we should take at least

Re: RFR: JDK-8303354: addCertificatesToKeystore in KeystoreImpl.m needs CFRelease call in early potential CHECK_NULL return [v2]

2023-03-02 Thread Matthias Baesken
> We have a (potential) early return in addCertificatesToKeystore in > KeystoreImpl.m . This is implemented by the CHECK_NULL macro. However this > missed a CFRelease call. Matthias Baesken has updated the pull request incrementally with one additional commit since the last revision:

Re: RFR: JDK-8303354: addCertificatesToKeystore in KeystoreImpl.m needs CFRelease call in early potential CHECK_NULL return

2023-03-02 Thread Matthias Baesken
On Wed, 1 Mar 2023 19:51:46 GMT, Weijun Wang wrote: >> We have a (potential) early return in addCertificatesToKeystore in >> KeystoreImpl.m . This is implemented by the CHECK_NULL macro. However this >> missed a CFRelease call. > > src/java.base/macosx/native/libosxsecurity/KeystoreImpl.m line

Re: RFR: JDK-8303354: addCertificatesToKeystore in KeystoreImpl.m needs CFRelease call in early potential CHECK_NULL return

2023-02-28 Thread Matthias Baesken
On Tue, 28 Feb 2023 17:55:39 GMT, Christoph Langer wrote: > Makes sense. Hi Christoph, thanks for the review ! May I have a second review ? Thanks, Matthias - PR: https://git.openjdk.org/jdk/pull/12788

RFR: JDK-8303354: addCertificatesToKeystore in KeystoreImpl.m needs CFRelease call in early potential CHECK_NULL return

2023-02-28 Thread Matthias Baesken
We have a (potential) early return in addCertificatesToKeystore in KeystoreImpl.m . This is implemented by the CHECK_NULL macro. However this missed a CFRelease call. - Commit messages: - JDK-8303354 Changes: https://git.openjdk.org/jdk/pull/12788/files Webrev: https://webrevs.op

Re: RFR: 8299817: [s390] AES-CTR mode intrinsic fails with multiple short update() calls [v3]

2023-02-16 Thread Matthias Baesken
On Thu, 16 Feb 2023 11:51:59 GMT, Lutz Schmidt wrote: >> This PR addresses an issue in the AES-CTR mode intrinsic on s390. When a >> message is ciphered in multiple, small (< 16 bytes) segments, the result is >> incorrect. >> >> This is not just a band-aid fix. The issue was taken as a chance

Re: RFR: 8299817: [s390] AES-CTR mode intrinsic fails with multiple short update() calls [v2]

2023-02-16 Thread Matthias Baesken
On Mon, 30 Jan 2023 12:26:57 GMT, Lutz Schmidt wrote: >> This PR addresses an issue in the AES-CTR mode intrinsic on s390. When a >> message is ciphered in multiple, small (< 16 bytes) segments, the result is >> incorrect. >> >> This is not just a band-aid fix. The issue was taken as a chance

Re: RFR: 8299817: [s390] AES-CTR mode intrinsic fails with multiple short update() calls [v2]

2023-02-15 Thread Matthias Baesken
On Mon, 30 Jan 2023 12:26:57 GMT, Lutz Schmidt wrote: >> This PR addresses an issue in the AES-CTR mode intrinsic on s390. When a >> message is ciphered in multiple, small (< 16 bytes) segments, the result is >> incorrect. >> >> This is not just a band-aid fix. The issue was taken as a chance

Re: RFR: JDK-8298170 : Introduce a macro for exception check, free and return

2022-12-28 Thread Matthias Baesken
On Tue, 6 Dec 2022 15:20:26 GMT, Matthias Baesken wrote: > We have a number of places in the codebase where a macro could help when we > check an exception and afterwrads free something and return. okay, if keeping the block in the code that contains free and return, we probably jus

Withdrawn: JDK-8298170 : Introduce a macro for exception check, free and return

2022-12-28 Thread Matthias Baesken
On Tue, 6 Dec 2022 15:20:26 GMT, Matthias Baesken wrote: > We have a number of places in the codebase where a macro could help when we > check an exception and afterwrads free something and return. This pull request has been closed without being integrated. - PR:

Integrated: JDK-8235297: sun/security/ssl/SSLSessionImpl/ResumptionUpdateBoundValues.java fails intermittent

2022-12-28 Thread Matthias Baesken
On Thu, 22 Dec 2022 11:44:52 GMT, Matthias Baesken wrote: > The test sun/security/ssl/SSLSessionImpl/ResumptionUpdateBoundValues.java > fails intermittent with timeouts , this info should be added to the test. This pull request has now been integrated. Changeset: d490f15e

RFR: JDK-8235297: sun/security/ssl/SSLSessionImpl/ResumptionUpdateBoundValues.java fails intermittent

2022-12-22 Thread Matthias Baesken
The test sun/security/ssl/SSLSessionImpl/ResumptionUpdateBoundValues.java fails intermittent with timeouts , this info should be added to the test. - Commit messages: - JDK-8235297 Changes: https://git.openjdk.org/jdk/pull/11766/files Webrev: https://webrevs.openjdk.org/?repo=jd

Re: RFR: JDK-8298170 : Introduce a macro for exception check, free and return

2022-12-09 Thread Matthias Baesken
On Tue, 6 Dec 2022 15:20:26 GMT, Matthias Baesken wrote: > We have a number of places in the codebase where a macro could help when we > check an exception and afterwrads free something and return. Hi Roger , the new proposed version JNU_CHECK_EXCEPTION_DO is now almost as lengthy

Re: RFR: JDK-8298170 : Introduce a macro for exception check, free and return

2022-12-07 Thread Matthias Baesken
On Tue, 6 Dec 2022 20:40:34 GMT, Roger Riggs wrote: > The existing code more obviously handles memory deallocation. Thomas Stuefe suggested something like this JNU_CHECK_EXCEPTION_DO(env, action) JNU_CHECK_EXCEPTION_DO_AND_RETURN(env, action, retval) usage example: `JNU_CHECK_EXCEPTION_DO(e

RFR: JDK-8298170 : Introduce a macro for exception check, free and return

2022-12-06 Thread Matthias Baesken
We have a number of places in the codebase where a macro could help when we check an exception and afterwrads free something and return. - Commit messages: - JDK-8298170 Changes: https://git.openjdk.org/jdk/pull/11539/files Webrev: https://webrevs.openjdk.org/?repo=jdk&pr=11539&r

Integrated: JDK-8296406: ChainingConstructors jtreg test reduce code duplication

2022-11-09 Thread Matthias Baesken
On Mon, 7 Nov 2022 12:49:21 GMT, Matthias Baesken wrote: > The java/security/Exceptions/ChainingConstructors jdk jtreg test shows quite > a lot of code duplication. The test code can be simplified e.g. by using > generics. Additionally the test failure output was improved and a test f

Re: RFR: JDK-8296406: ChainingConstructors jtreg test reduce code duplication [v2]

2022-11-09 Thread Matthias Baesken
On Tue, 8 Nov 2022 16:16:53 GMT, Matthias Baesken wrote: >> The java/security/Exceptions/ChainingConstructors jdk jtreg test shows quite >> a lot of code duplication. The test code can be simplified e.g. by using >> generics. Additionally the test failure output was impro

Re: RFR: JDK-8296406: ChainingConstructors jtreg test reduce code duplication

2022-11-08 Thread Matthias Baesken
On Mon, 7 Nov 2022 12:49:21 GMT, Matthias Baesken wrote: > The java/security/Exceptions/ChainingConstructors jdk jtreg test shows quite > a lot of code duplication. The test code can be simplified e.g. by using > generics. Additionally the test failure output was improved and a test f

Re: RFR: JDK-8296406: ChainingConstructors jtreg test reduce code duplication [v2]

2022-11-08 Thread Matthias Baesken
on was added. Matthias Baesken has updated the pull request incrementally with one additional commit since the last revision: Add SSLException test, adjust summary, add bug-id - Changes: - all: https://git.openjdk.org/jdk/pull/11016/files - new: https://git.openjdk.org/jdk/pull

Re: RFR: JDK-8296406: ChainingConstructors jtreg test reduce code duplication

2022-11-08 Thread Matthias Baesken
On Tue, 8 Nov 2022 14:01:29 GMT, Sean Mullan wrote: >> The java/security/Exceptions/ChainingConstructors jdk jtreg test shows quite >> a lot of code duplication. The test code can be simplified e.g. by using >> generics. Additionally the test failure output was improved and a test for >> the c

  1   2   >