On Sat, 9 Nov 2024 00:07:07 GMT, Artur Barashev <abaras...@openjdk.org> wrote:

>> The current syntax of the jdk.tls.disabledAlgorithms makes it difficult to 
>> disable algorithms that affect both the key exchange and authentication 
>> parts of a TLS cipher suite. For example, if you add "RSA" to the 
>> jdk.tls.disabledAlgorithms security property, it disables all cipher suites 
>> that use RSA, whether it is for key exchange or authentication. If you only 
>> want to disable cipher suites that use RSA for key exchange, the only 
>> workaround is to list the whole cipher suite name, so an exact match is 
>> done, but if there are many cipher suites that use that key exchange 
>> algorithm, this becomes cumbersome.
>
> Artur Barashev has updated the pull request incrementally with one additional 
> commit since the last revision:
> 
>   Set initial cache size

test/jdk/sun/security/ssl/CipherSuite/AbstractDisableCipherSuites.java line 48:

> 46:     private static final byte HSMSG_CLIHELLO = 0x01;
> 47:     private static final ByteBuffer CLIOUTBUF =
> 48:             ByteBuffer.wrap("Client Side".getBytes());

That's something more on a nitpick-level but `getBytes()` uses the system's 
encoding. On IBM i this is EBCDIC and there might be systems out there using 
Little/BigEndian-Encodings. I assume this will break this test, won't it? 
`getBytes("8859_1")` should prevent that, called in a static-Block in order to 
catch the declared exception.

-------------

PR Review Comment: https://git.openjdk.org/jdk/pull/21841#discussion_r1835376988

Reply via email to