On Tue, 29 Oct 2024 15:56:50 GMT, Fernando Guallini <fguall...@openjdk.org> 
wrote:

>> Several tests are identified to use weak/legacy algorithms. As these tests 
>> purpose is not to exercise weak algorithms, these are updated in this PR to 
>> use stronger algorithms. If the test uses a weak key, it is updated as well.
>
> Fernando Guallini has updated the pull request incrementally with one 
> additional commit since the last revision:
> 
>   add more algos to TestExplicitKeyLength.java

test/jdk/java/security/Signature/ByteBuffers.java line 53:

> 51:         KeyPair kp = kpg.generateKeyPair();
> 52: 
> 53:         Signature sig = Signature.getInstance("SHA224withDSA", p);

Why is SHA224 used instead of SHA256 here and on other tests in this PR?

-------------

PR Review Comment: https://git.openjdk.org/jdk/pull/21578#discussion_r1823595478

Reply via email to