Re: RFR: 8344316: Add extra line in security/auth/callback/TextCallbackHandler/Password.java to make clear it is not a JTReg test [v8]

2025-01-24 Thread Mikhail Yankelevich
> * Changed security/auth/callback/TextCallbackHandler/Password.java to run > with JTReg, now the dialog box with instructions will appear as a ui Mikhail Yankelevich has updated the pull request incrementally with one additional commit since the last revision: Wording change, command is sing

Re: RFR: 8344316: Add extra line in security/auth/callback/TextCallbackHandler/Password.java to make clear it is not a JTReg test [v7]

2025-01-24 Thread Mikhail Yankelevich
On Thu, 23 Jan 2025 15:59:13 GMT, Weijun Wang wrote: >> Mikhail Yankelevich has updated the pull request incrementally with one >> additional commit since the last revision: >> >> typos > > test/jdk/com/sun/security/auth/callback/TextCallbackHandler/Password.java > line 55: > >> 53:

Re: RFR: 8345139: Fix bugs and inconsistencies in the Provider services map [v2]

2025-01-24 Thread Anthony Scarpino
On Thu, 12 Dec 2024 04:50:04 GMT, Martin Balao wrote: >> src/java.base/share/classes/java/security/Provider.java line 710: >> >>> 708: * Enum to inform the result of an operation on the services >>> map. >>> 709: */ >>> 710: enum SvcOpResult { >> >> Why use an enum he

Re: RFR: 8344316: security/auth/callback/TextCallbackHandler/Password.java make runnable with JTReg and add the UI [v9]

2025-01-24 Thread Mikhail Yankelevich
> * Changed security/auth/callback/TextCallbackHandler/Password.java to run > with JTReg, now the dialog box with instructions will appear as a ui Mikhail Yankelevich has updated the pull request incrementally with one additional commit since the last revision: visible and invisible order cha

Re: RFR: 8347065: Add missing @spec tags for Java Security Standard Algorithm Names

2025-01-24 Thread duke
On Fri, 10 Jan 2025 19:22:52 GMT, Koushik Muthukrishnan Thirupattur wrote: > **Description:** > [JDK-8305406](https://bugs.openjdk.org/browse/JDK-8305406) added the `@spec` > tags to multiple places where there were links to > "{@docRoot}/../specs/security/standard-names.html". However, it has

Re: RFR: 8344943: Mark not subclassable classes final in java.base exported classes [v2]

2025-01-24 Thread Eirik Bjørsnøs
On Fri, 17 Jan 2025 18:19:56 GMT, Eirik Bjørsnøs wrote: >> Please review this PR which adds the `final` modifier to non-subclassable >> classes in `java.base`. >> >> The classes were identified using an automated analysis. See CSR for details. >> >> Besides simply adding the `final` access mod

Re: RFR: 8347067: Load certificates without explicit trust settings in KeyChainStore

2025-01-24 Thread Alexey Bakhtin
On Mon, 6 Jan 2025 21:53:34 GMT, Tim Jacomb wrote: > Does that add value to add a test so someone could run it manually? Yes, I think a manual test is better than nothing. - PR Comment: https://git.openjdk.org/jdk/pull/22911#issuecomment-2574022994

RFR: 8347067: Load certificates without explicit trust settings in KeyChainStore

2025-01-24 Thread Tim Jacomb
## The change Without this change intermediate certificates that don't have explicit trust settings are ignored not added to the truststore. ## Reproducer See https://github.com/timja/openjdk-intermediate-ca-reproducer Without this change the reproducer fails, and with this change it succeed

Re: RFR: 8347067: Load certificates without explicit trust settings in KeyChainStore

2025-01-24 Thread Alexey Bakhtin
On Tue, 7 Jan 2025 17:01:10 GMT, Tim Jacomb wrote: >> ## The change >> >> Without this change intermediate certificates that don't have explicit trust >> settings are ignored not added to the truststore. >> >> >> >> ## Reproducer >> >> See https://github.com/timja/openjdk-intermediate-ca-re

Re: RFR: 8347067: Load certificates without explicit trust settings in KeyChainStore

2025-01-24 Thread Tim Jacomb
On Fri, 3 Jan 2025 11:38:29 GMT, Tim Jacomb wrote: >> ## The change >> >> Without this change intermediate certificates that don't have explicit trust >> settings are ignored not added to the truststore. >> >> >> >> ## Reproducer >> >> See https://github.com/timja/openjdk-intermediate-ca-re

Re: RFR: 8347067: Load certificates without explicit trust settings in KeyChainStore

2025-01-24 Thread Tim Jacomb
On Fri, 3 Jan 2025 11:28:01 GMT, Tim Jacomb wrote: > ## The change > > Without this change intermediate certificates that don't have explicit trust > settings are ignored not added to the truststore. > > > > ## Reproducer > > See https://github.com/timja/openjdk-intermediate-ca-reproducer >

Re: RFR: 8347067: Load certificates without explicit trust settings in KeyChainStore

2025-01-24 Thread Tim Jacomb
On Tue, 7 Jan 2025 17:21:50 GMT, Alexey Bakhtin wrote: >> test/jdk/java/security/KeyStore/CheckMacOSKeyChainIntermediateCATrust.java >> line 43: >> >>> 41: >>> 42: /* >>> 43: * @test >> >> @alexeybakhtin quick question on how this should be marked as manual. >> >> I see all tests in >> htt

Re: RFR: 8347067: Load certificates without explicit trust settings in KeyChainStore

2025-01-24 Thread Tim Jacomb
On Mon, 6 Jan 2025 20:43:22 GMT, Tim Jacomb wrote: > Is it possible to add jtreg test for this scenario? I've done some research. I _think_ it would only be possible with manual intervention to run it. The certificates could be generated with a script, similar to the existing https://github.co

Re: RFR: 8347067: Load certificates without explicit trust settings in KeyChainStore

2025-01-24 Thread Tim Jacomb
On Fri, 3 Jan 2025 16:29:57 GMT, Tim Jacomb wrote: >> Ok this isn't working properly 😢 >> >> 1. ⛔ Fails: Marking the certificate as OS default (which for CA certs is >> trust: false) - with an intermediate >> 2. ⛔ Fails: Marking the certificate as OS default without an intermediate >> 3. ⛔ Fa

Re: RFR: 8347067: Load certificates without explicit trust settings in KeyChainStore

2025-01-24 Thread Tim Jacomb
On Fri, 3 Jan 2025 16:52:51 GMT, Tim Jacomb wrote: >> Interesting for root certificate `SecTrustSettingsCopyTrustSettings` returns: >> >> * -25300 (not found) when trust policy is `Use System Defaults` >> * 0 and a `kSecTrustSettingsResult` value of 3 when set to Never Trust >> * 0 and a `kSecTr

Re: RFR: 8347067: Load certificates without explicit trust settings in KeyChainStore

2025-01-24 Thread Tim Jacomb
On Fri, 3 Jan 2025 15:36:33 GMT, Tim Jacomb wrote: >> src/java.base/macosx/native/libosxsecurity/KeystoreImpl.m line 496: >> >>> 494: >>> 495: // Only add certificates with trust settings >>> 496: if (inputTrust == NULL) { >> >> From what I can tell non root certificate

Re: RFR: 8347067: Load certificates without explicit trust settings in KeyChainStore

2025-01-24 Thread Tim Jacomb
On Sat, 4 Jan 2025 00:19:46 GMT, Alexey Bakhtin wrote: > I think, in this particular case, we need two iterations to add certificates > into the trust store. The first iteration will add certificates with non-null > trust settings, and the second iteration should verify and add certificates >

Re: RFR: 8347067: Load certificates without explicit trust settings in KeyChainStore

2025-01-24 Thread Alexey Bakhtin
On Fri, 3 Jan 2025 11:28:01 GMT, Tim Jacomb wrote: > ## The change > > Without this change intermediate certificates that don't have explicit trust > settings are ignored not added to the truststore. > > > > ## Reproducer > > See https://github.com/timja/openjdk-intermediate-ca-reproducer >

Integrated: 8344943: Mark not subclassable classes final in java.base exported classes

2025-01-24 Thread Eirik Bjørsnøs
On Tue, 26 Nov 2024 13:04:41 GMT, Eirik Bjørsnøs wrote: > Please review this PR which adds the `final` modifier to non-subclassable > classes in `java.base`. > > The classes were identified using an automated analysis. See CSR for details. > > Besides simply adding the `final` access modifier,

Re: RFR: 8345139: Fix bugs and inconsistencies in the Provider services map [v2]

2025-01-24 Thread Anthony Scarpino
On Wed, 8 Jan 2025 16:32:46 GMT, Francisco Ferrari Bihurriet wrote: >> Hi, this pull request implements the fixes for bugs and inconsistencies >> described in [JDK-8345139](https://bugs.openjdk.org/browse/JDK-8345139 "Fix >> bugs and inconsistencies in the Provider services map"). >> >>

Integrated: 8344361: Restore null return for invalid services from legacy providers

2025-01-24 Thread Sean Coffey
On Mon, 20 Jan 2025 16:06:56 GMT, Sean Coffey wrote: > Correct a corner case where null should be returned if a service from the > legacyMap is marked invalid. > > New test case added. This pull request has now been integrated. Changeset: e20bd018 Author:Sean Coffey URL: https://

Re: RFR: 8344361: Restore null return for invalid services from legacy providers

2025-01-24 Thread Sean Coffey
On Mon, 20 Jan 2025 16:06:56 GMT, Sean Coffey wrote: > Correct a corner case where null should be returned if a service from the > legacyMap is marked invalid. > > New test case added. Thanks for the review Valerie - PR Comment: https://git.openjdk.org/jdk/pull/23201#issuecommen

Re: RFR: 8346587: Distrust TLS server certificates anchored by Camerfirma Root CAs [v3]

2025-01-24 Thread Mark Powers
On Thu, 23 Jan 2025 22:17:14 GMT, Sean Mullan wrote: >> I think you added the fields for the root certificates, and not these >> certificates. Also, these are not root certificates, so I would remove "Root >> Certificate". >> >> You can use `keytool -printcert -file ...` and just include the f

Re: RFR: 8346587: Distrust TLS server certificates anchored by Camerfirma Root CAs [v3]

2025-01-24 Thread Mark Powers
> [JDK-8346587](https://bugs.openjdk.org/browse/JDK-8346587) Mark Powers has updated the pull request incrementally with one additional commit since the last revision: no root certificate - Changes: - all: https://git.openjdk.org/jdk/pull/22985/files - new: https://git.openjd

Re: RFR: 8346587: Distrust TLS server certificates anchored by Camerfirma Root CAs [v3]

2025-01-24 Thread Sean Mullan
On Fri, 24 Jan 2025 17:33:49 GMT, Mark Powers wrote: >> [JDK-8346587](https://bugs.openjdk.org/browse/JDK-8346587) > > Mark Powers has updated the pull request incrementally with one additional > commit since the last revision: > > no root certificate Marked as reviewed by mullan (Reviewer).

Re: RFR: 8347067: Load certificates without explicit trust settings in KeyChainStore

2025-01-24 Thread Tim Jacomb
On Tue, 7 Jan 2025 20:20:46 GMT, Tim Jacomb wrote: >> The test should be marked as `@run junit/manual ` and added to the >> `jdk_security_manual_interactive` part of the TEST.groups > > Any idea how I can run the test after making those changes? > > The test just gets skipped with: > > > CONF

Re: RFR: 8347123: Add missing @serial tags to other modules [v2]

2025-01-24 Thread Hannes Wallnöfer
On Thu, 23 Jan 2025 16:16:03 GMT, Hannes Wallnöfer wrote: >> There's not a great number of "good" examples of this in the JDK, so >> probably OK except it >> seems like most cases will do it like a normal javadoc method so you'd want >> an @param tag too. >> >> note : this is a desktop class,

Re: RFR: 8347506: Compatible OCSP readtimeout property with OCSP timeout [v2]

2025-01-24 Thread Jamil Nimeh
> This makes a small change to the default value of the > `com.sun.security.ocsp.readtimeout` System property. When not explicitly > specified, it will be set to the value of the `com.sun.security.ocsp.timeout` > System property, which helps ease the transition from older JDK versions > where

Re: RFR: 8184352: Remove Sun provider information from KeyPairGenerator javadoc

2025-01-24 Thread Sean Mullan
On Thu, 23 Jan 2025 20:56:25 GMT, Ben Perez wrote: > Removed algorithm-specific information from `KeyPairGenerator` class > description and instead linked out to the Sun Provider documentation src/java.base/share/classes/java/security/KeyPairGenerator.java line 73: > 71: * associated with eac

Integrated: 8339891: Several sun/security/ssl/SSLSessionImpl/* tests override test.java.opts

2025-01-24 Thread Sonia Zaldana Calles
On Thu, 7 Nov 2024 15:44:56 GMT, Sonia Zaldana Calles wrote: > Hi all, > > This PR addresses [8339891](https://bugs.openjdk.org/browse/JDK-8339891). > With this patch, "test.java.opts" aggregates on options set via jtreg as > opposed to overriding them. > > Thanks, > Sonia This pull requ

Re: RFR: 8347065: Add missing @spec tags for Java Security Standard Algorithm Names [v3]

2025-01-24 Thread Koushik Muthukrishnan Thirupattur
> **Description:** > [JDK-8305406](https://bugs.openjdk.org/browse/JDK-8305406) added the `@spec` > tags to multiple places where there were links to > "{@docRoot}/../specs/security/standard-names.html". However, it has not > covered those cases where a link is an anchor inside this document. Th

Integrated: 8346587: Distrust TLS server certificates anchored by Camerfirma Root CAs

2025-01-24 Thread Mark Powers
On Wed, 8 Jan 2025 23:27:34 GMT, Mark Powers wrote: > [JDK-8346587](https://bugs.openjdk.org/browse/JDK-8346587) This pull request has now been integrated. Changeset: 907350e9 Author:Mark Powers URL: https://git.openjdk.org/jdk/commit/907350e9e8e9b66365e9eaa3ae89ddc55cf9731f Stats:

Re: RFR: 8347123: Add missing @serial tags to other modules [v2]

2025-01-24 Thread Hannes Wallnöfer
> Please review a doc-only change to mostly add missing `@serial` javadoc tags. > This is a sub-task of [JDK-8286931] to allow us to re-enable the javadoc > `-serialwarn` option in the JDK doc build, which has been disabled since JDK > 19. > > [JDK-8286931]: https://bugs.openjdk.org/browse/JDK-

Re: RFR: 8347067: Load certificates without explicit trust settings in KeyChainStore

2025-01-24 Thread Alexey Bakhtin
On Fri, 3 Jan 2025 11:28:01 GMT, Tim Jacomb wrote: > ## The change > > Without this change intermediate certificates that don't have explicit trust > settings are ignored not added to the truststore. > > > > ## Reproducer > > See https://github.com/timja/openjdk-intermediate-ca-reproducer >

Re: RFR: 8347065: Add missing @spec tags for Java Security Standard Algorithm Names [v2]

2025-01-24 Thread Koushik Muthukrishnan Thirupattur
> **Description:** > [JDK-8305406](https://bugs.openjdk.org/browse/JDK-8305406) added the `@spec` > tags to multiple places where there were links to > "{@docRoot}/../specs/security/standard-names.html". However, it has not > covered those cases where a link is an anchor inside this document. Th

Integrated: 8347506: Compatible OCSP readtimeout property with OCSP timeout

2025-01-24 Thread Jamil Nimeh
On Tue, 14 Jan 2025 22:41:47 GMT, Jamil Nimeh wrote: > This makes a small change to the default value of the > `com.sun.security.ocsp.readtimeout` System property. When not explicitly > specified, it will be set to the value of the `com.sun.security.ocsp.timeout` > System property, which help