On Tue, 29 Oct 2024 15:56:50 GMT, Fernando Guallini <fguall...@openjdk.org> wrote:
>> Several tests are identified to use weak/legacy algorithms. As these tests >> purpose is not to exercise weak algorithms, these are updated in this PR to >> use stronger algorithms. If the test uses a weak key, it is updated as well. > > Fernando Guallini has updated the pull request incrementally with one > additional commit since the last revision: > > add more algos to TestExplicitKeyLength.java test/jdk/java/security/Signature/ByteBuffers.java line 53: > 51: KeyPair kp = kpg.generateKeyPair(); > 52: > 53: Signature sig = Signature.getInstance("SHA224withDSA", p); Why is SHA224 used instead of SHA256 here and on other tests in this PR? ------------- PR Review Comment: https://git.openjdk.org/jdk/pull/21578#discussion_r1823595478