On Mon, 27 Nov 2023 14:09:42 GMT, Weijun Wang <wei...@openjdk.org> wrote:

>> Code changes for HSS/LMS that's related to keytool and jarsigner:
>> 
>> 1. No need to add `-sigalg` for both tools when HSS/LMS key is involved, it 
>> can only be `HSS/LMS`.
>> 2. The `digestAlgorithm` field in a PKCS7 `SignerInfo`. It must be the same 
>> as the hash algorithm used by the HSS/LMS key. This needs to be enforced 
>> both at signing and verification.
>> 3. HSS/LMS reuses `.DSA` as the signature block file extension inside a 
>> signed JAR file
>
> Weijun Wang has updated the pull request incrementally with one additional 
> commit since the last revision:
> 
>   no need to talk about the limitation here

Looks good - one minor comment. However, I still would like @ferakocz to review 
the `KeyUtil.hashAlgFromHSS` method.

src/java.base/share/classes/sun/security/util/SignatureFileVerifier.java line 
190:

> 188:      * signature verification process actually does not require the
> 189:      * extension matches the key algorithm as long as it's one of
> 190:      * "RSA", "DSA", and "EC".

Some minor wording suggestions on second sentence: "This is safe because the 
signature verification process does not require the extension to match the key 
algorithm as long as it is "RSA", "DSA", or "EC."

-------------

Marked as reviewed by mullan (Reviewer).

PR Review: https://git.openjdk.org/jdk/pull/14254#pullrequestreview-1751025651
PR Review Comment: https://git.openjdk.org/jdk/pull/14254#discussion_r1406532964

Reply via email to