Integrated: 8328864: NullPointerException in sun.security.jca.ProviderList.getService()

2024-05-02 Thread Ben Perez
On Thu, 11 Apr 2024 16:29:00 GMT, Ben Perez wrote: > Updated `getService` to check whether `getProvider` returns null when > checking for preferred providers and `continue` the loop if that is the case. > Added `NullPreferredList` test. This pull request has now been integrated.

Re: RFR: 8328864: NullPointerException in sun.security.jca.ProviderList.getService() [v2]

2024-04-17 Thread Ben Perez
> Updated `getService` to check whether `getProvider` returns null when > checking for preferred providers and `continue` the loop if that is the case. > Added `NullPreferredList` test. Ben Perez has updated the pull request with a new target base due to a merge or a rebase. The in

RFR: 8328864: NullPointerException in sun.security.jca.ProviderList.getService()

2024-04-11 Thread Ben Perez
Updated `getService` to check whether `getProvider` returns null when checking for preferred providers and `continue` the loop if that is the case. Added `NullPreferredList` test. - Commit messages: - Fixed and renamed test, getService now continues loop instead of returning null

Integrated: 8328318: Wrong description in X509Extension.getExtensionValue method javadoc

2024-04-09 Thread Ben Perez
On Mon, 1 Apr 2024 17:39:07 GMT, Ben Perez wrote: > Removed `PrivateKeyUsagePeriod` from method javadoc and added several > commonly used extensions This pull request has now been integrated. Changeset: 316361b9 Author: Ben Perez Committer: Sean Mullan URL: https://git.openj

Re: RFR: 8328318: Wrong description in X509Extension.getExtensionValue method javadoc [v3]

2024-04-09 Thread Ben Perez
> Removed `PrivateKeyUsagePeriod` from method javadoc and added several > commonly used extensions Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Added Authority Information Access OID - Changes: - all:

Re: RFR: 8328318: Wrong description in X509Extension.getExtensionValue method javadoc [v2]

2024-04-03 Thread Ben Perez
> Removed `PrivateKeyUsagePeriod` from method javadoc and added several > commonly used extensions Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Updated copyright - Changes: - all: https://git.openjdk.org/jd

RFR: 8328318: Wrong description in X509Extension.getExtensionValue method javadoc

2024-04-01 Thread Ben Perez
Removed `PrivateKeyUsagePeriod` from method javadoc and added several commonly used extensions - Commit messages: - removed PrivateKeyUsagePeriod from table and added several other commonly used extensions Changes: https://git.openjdk.org/jdk/pull/18565/files Webrev:

Integrated: 8265372: Simplify PKCS9Attribute

2024-02-16 Thread Ben Perez
On Fri, 15 Dec 2023 20:34:21 GMT, Ben Perez wrote: > Refactored PKCS9Attribute to use a hash map instead of multiple arrays. The > key for the hash map is an `ObjectIdentifier` and the values are a record > `AttributeInfo` that stores the information previously contained in the

Re: RFR: 8265372: Simplify PKCS9Attribute [v8]

2024-01-31 Thread Ben Perez
ut prior to this refactor the > aforementioned OIDs were treated differently than unknown OIDs. Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Added comment to EncodeDecode test - Changes: - all: http

Re: RFR: 8265372: Simplify PKCS9Attribute [v7]

2024-01-31 Thread Ben Perez
ut prior to this refactor the > aforementioned OIDs were treated differently than unknown OIDs. Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Added EncodeDecode.java test - Changes: - all: https://git.openjdk.org/jd

Re: RFR: 8265372: Simplify PKCS9Attribute [v6]

2024-01-31 Thread Ben Perez
ut prior to this refactor the > aforementioned OIDs were treated differently than unknown OIDs. Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Refactor to simplify lambda expressions in AttributeInfo. Added new test - C

Re: RFR: 8265372: Simplify PKCS9Attribute [v5]

2024-01-11 Thread Ben Perez
ut prior to this refactor the > aforementioned OIDs were treated differently than unknown OIDs. Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Added comments for new functions - Changes: - all: https://git.openjdk.or

Re: RFR: 8265372: Simplify PKCS9Attribute [v4]

2024-01-11 Thread Ben Perez
On Thu, 11 Jan 2024 23:42:31 GMT, Ben Perez wrote: >> Refactored PKCS9Attribute to use a hash map instead of multiple arrays. The >> key for the hash map is an `ObjectIdentifier` and the values are a record >> `AttributeInfo` that stores the information previously contained

Re: RFR: 8265372: Simplify PKCS9Attribute [v4]

2024-01-11 Thread Ben Perez
ut prior to this refactor the > aforementioned OIDs were treated differently than unknown OIDs. Ben Perez has updated the pull request incrementally with one additional commit since the last revision: removed calls to Class.forName - Changes: - all: https://git.openjdk.or

Re: RFR: 8265372: Simplify PKCS9Attribute [v3]

2024-01-11 Thread Ben Perez
ut prior to this refactor the > aforementioned OIDs were treated differently than unknown OIDs. Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Added encoding and value functionality to AttributeInfo to replace large swi

Re: RFR: 8265372: Simplify PKCS9Attribute [v2]

2024-01-11 Thread Ben Perez
On Wed, 10 Jan 2024 02:53:15 GMT, Valerie Peng wrote: >> src/java.base/share/classes/sun/security/pkcs/PKCS9Attribute.java line 321: >> >>> 319: >>> 320: this.oid = oid; >>> 321: info = oidMap.get(oid); >> >> What if `info` is `null` (there is no entry for the specified OID)?

Re: RFR: 8265372: Simplify PKCS9Attribute [v2]

2024-01-11 Thread Ben Perez
On Tue, 2 Jan 2024 21:54:19 GMT, Weijun Wang wrote: >> Do you think we can remove `PKCS9Attributes.getAttributes()` entirely or >> should we just modify it to not use `PKCS9_OIDS` anymore? > > I think we can remove both. There is no need to keep a useless method as long > as it's not an

Re: RFR: 8265372: Simplify PKCS9Attribute [v2]

2024-01-03 Thread Ben Perez
ut prior to this refactor the > aforementioned OIDs were treated differently than unknown OIDs. Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Minor fixes to make the code more readable, inlined init(), removed PKCS9Attributes.

Re: RFR: 8265372: Simplify PKCS9Attribute

2024-01-03 Thread Ben Perez
On Thu, 21 Dec 2023 17:01:08 GMT, Weijun Wang wrote: >> Refactored PKCS9Attribute to use a hash map instead of multiple arrays. The >> key for the hash map is an `ObjectIdentifier` and the values are a record >> `AttributeInfo` that stores the information previously contained in the >> arrays

Re: RFR: 8265372: Simplify PKCS9Attribute

2024-01-02 Thread Ben Perez
On Thu, 21 Dec 2023 16:27:43 GMT, Weijun Wang wrote: >> Refactored PKCS9Attribute to use a hash map instead of multiple arrays. The >> key for the hash map is an `ObjectIdentifier` and the values are a record >> `AttributeInfo` that stores the information previously contained in the >> arrays

RFR: 8265372: Simplify PKCS9Attribute

2023-12-15 Thread Ben Perez
Refactored PKCS9Attribute to use a hash map instead of multiple arrays. The key for the hash map is an `ObjectIdentifier` and the values are a record `AttributeInfo` that stores the information previously contained in the arrays `PKCS9_VALUE_TAGS`, `VALUE_CLASSES`, and `SINGLE_VALUED`. It

Integrated: 8296787: Unify debug printing format of X.509 cert serial numbers

2023-12-14 Thread Ben Perez
On Mon, 27 Nov 2023 21:45:23 GMT, Ben Perez wrote: > Updated `X509CertSelector.java`, `SerialNumber.java`, and `SSLLogger` to use > same debug printing format for X.509 serial numbers. The changes are: > - `X509CertSelector` was `SN: 83be056904246b1a1756ac95991c74a` and now is

Re: RFR: 8296787: Unify debug printing format of X.509 cert serial numbers [v10]

2023-12-12 Thread Ben Perez
ial number" : 08:3B:E0:56:90:42:46:B1:A1:75:6A:C9:59:91:C7:4A` Ben Perez has updated the pull request incrementally with one additional commit since the last revision: updated copyright - Changes: - all: https://git.openjdk.org/jdk/pull/16834/files - new: https://g

Re: RFR: 8296787: Unify debug printing format of X.509 cert serial numbers [v9]

2023-12-11 Thread Ben Perez
ial number" : 08:3B:E0:56:90:42:46:B1:A1:75:6A:C9:59:91:C7:4A` Ben Perez has updated the pull request incrementally with one additional commit since the last revision: updated test certs to use new serial number format - Changes: - all: https://git.openjdk.org/jdk/pull

Re: RFR: 8296787: Unify debug printing format of X.509 cert serial numbers [v8]

2023-12-11 Thread Ben Perez
ial number" : 08:3B:E0:56:90:42:46:B1:A1:75:6A:C9:59:91:C7:4A` Ben Perez has updated the pull request incrementally with one additional commit since the last revision: added bug number to test - Changes: - all: https://git.openjdk.org/jdk/pull/16834/files - new: https://g

Re: RFR: 8296787: Unify debug printing format of X.509 cert serial numbers [v7]

2023-12-08 Thread Ben Perez
ial number" : 08:3B:E0:56:90:42:46:B1:A1:75:6A:C9:59:91:C7:4A` Ben Perez has updated the pull request incrementally with one additional commit since the last revision: added format check to X509CertSelectorTest - Changes: - all: https://git.openjdk.org/jdk/pull/16834/files

Re: RFR: 8296787: Unify debug printing format of X.509 cert serial numbers [v6]

2023-12-05 Thread Ben Perez
ial number" : 08:3B:E0:56:90:42:46:B1:A1:75:6A:C9:59:91:C7:4A` Ben Perez has updated the pull request incrementally with one additional commit since the last revision: refactored serial number printing into a new toString method - Changes: - all: https://git.openjdk.org/jdk

Re: RFR: 8296787: Unify debug printing format of X.509 cert serial numbers [v5]

2023-12-04 Thread Ben Perez
ial number" : 08:3B:E0:56:90:42:46:B1:A1:75:6A:C9:59:91:C7:4A` Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Standardized serial number print format - Changes: - all: https://git.openjdk.org/jdk/pull/16834/files

Re: RFR: 8296787: Unify debug printing format of X.509 cert serial numbers [v4]

2023-11-29 Thread Ben Perez
ial number" : 08:3B:E0:56:90:42:46:B1:A1:75:6A:C9:59:91:C7:4A` Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Replaced formatting function with Debug.toString. Changed toString method in SerialNumber to use camel case ---

Re: RFR: 8296787: Unify debug printing format of X.509 cert serial numbers [v3]

2023-11-29 Thread Ben Perez
> Updated `X509CertSelector.java` and `SerialNumber.java` to use same debug > printing format for X.509 serial numbers. The format in `SSLLogger.java` is > slightly different but now uses the `toString` method in `SerialNumber.java` > for better readability. Ben Perez has upda

Re: RFR: 8296787: Unify debug printing format of X.509 cert serial numbers [v2]

2023-11-28 Thread Ben Perez
> Updated `X509CertSelector.java` and `SerialNumber.java` to use same debug > printing format for X.509 serial numbers. The format in `SSLLogger.java` is > slightly different but now uses the `toString` method in `SerialNumber.java` > for better readability. Ben Perez has upda

RFR: 8296787: Unify debug printing format of X.509 cert serial numbers

2023-11-27 Thread Ben Perez
Updated `X509CertSelector.java` and `SerialNumber.java` to use same debug printing format for X.509 serial numbers. The format in `SSLLogger.java` is slightly different but now uses the `toString` method in `SerialNumber.java` for better readability. - Commit messages: - Merge

Re: RFR: 8317538: RSA have scalability issue for high vCPU numbers [v3]

2023-11-16 Thread Ben Perez
> Modified `getService` method to prevent caching of `ServiceKey`, which was > negatively impacting multithreaded performance Ben Perez has updated the pull request incrementally with one additional commit since the last revision: changed cache to use threadlocal - C

Integrated: 8311546: Certificate name constraints improperly validated with leading period

2023-11-01 Thread Ben Perez
On Fri, 20 Oct 2023 20:52:13 GMT, Ben Perez wrote: > Updated the `constrains` method in `DNSName.java` to accept certificates with > a leading period. This pull request has now been integrated. Changeset: bfaf5704 Author: Ben Perez Committer: Sean Mullan URL:

Re: RFR: 8311546: Certificate name constraints improperly validated with leading period [v2]

2023-10-30 Thread Ben Perez
> Updated the `constrains` method in `DNSName.java` to accept certificates with > a leading period. Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Updated documentation, minor fixes in test - Changes: - all:

Re: RFR: 8317538: RSA have scalability issue for high vCPU numbers

2023-10-27 Thread Ben Perez
On Fri, 27 Oct 2023 17:05:36 GMT, Anthony Scarpino wrote: > I have a few questions: > > * The change listed in the bug is not the same as this PR. The bug removes > the section and leaves only the new ServiceKey(). The condition statement > left will always be false. > * This seems like a

Re: RFR: 8317538: RSA have scalability issue for high vCPU numbers [v2]

2023-10-27 Thread Ben Perez
> Modified `getService` method to prevent caching of `ServiceKey`, which was > negatively impacting multithreaded performance Ben Perez has updated the pull request incrementally with one additional commit since the last revision: changed fix to align with bug report - C

RFR: 8317538: RSA have scalability issue for high vCPU numbers

2023-10-27 Thread Ben Perez
Modified `getService` method to prevent caching of `ServiceKey`, which was negatively impacting multithreaded performance - Commit messages: - changed ServiceKey initialization to prevent caching Changes: https://git.openjdk.org/jdk/pull/16403/files Webrev:

RFR: 8311546: Certificate name constraints improperly validated with leading period

2023-10-23 Thread Ben Perez
Updated the `constrains` method in `DNSName.java` to accept certificates with a leading period. - Commit messages: - removed tabs - replaced tabs with spaces - Merge branch 'openjdk:master' into JDK-8311546 - Changed documentation for LeadingPeriod test - Removed unnecessary

Integrated: 4964430: (spec) missing IllegalStateException exception requirement for javax.crypto.Cipher.doFinal

2023-10-05 Thread Ben Perez
On Wed, 13 Sep 2023 18:08:35 GMT, Ben Perez wrote: > Updated IllegalStateException exception requirements for `update`, `doFinal`, > `wrap`, and `unwrap` This pull request has now been integrated. Changeset: 991ce84e Author: Ben Perez Committer: Valerie Peng URL:

Re: RFR: 4964430: (spec) missing IllegalStateException exception requirement for javax.crypto.Cipher.doFinal [v5]

2023-10-05 Thread Ben Perez
> Updated IllegalStateException exception requirements for `update`, `doFinal`, > `wrap`, and `unwrap` Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Wording change for NullCipher doc, added @code tags - Changes:

Re: RFR: 4964430: (spec) missing IllegalStateException exception requirement for javax.crypto.Cipher.doFinal [v4]

2023-10-04 Thread Ben Perez
> Updated IllegalStateException exception requirements for `update`, `doFinal`, > `wrap`, and `unwrap` Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Updated docs for NullCipher to indicate it will not throw and IllegalStateExc

Re: RFR: 4964430: (spec) missing IllegalStateException exception requirement for javax.crypto.Cipher.doFinal [v3]

2023-10-03 Thread Ben Perez
> Updated IllegalStateException exception requirements for `update`, `doFinal`, > `wrap`, and `unwrap` Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Updated doc for updateAAD, fixed copywrite - Changes: - all:

Re: RFR: 4964430: (spec) missing IllegalStateException exception requirement for javax.crypto.Cipher.doFinal [v2]

2023-10-03 Thread Ben Perez
On Mon, 25 Sep 2023 23:48:49 GMT, Valerie Peng wrote: > * Given the current checkCipherState() impl does not check for states for > NullCipher objects, do we want to also update the javax.crypto.NullCipher > class javadoc to mention that IllegalStateException is not thrown by various >

Re: RFR: 4964430: (spec) missing IllegalStateException exception requirement for javax.crypto.Cipher.doFinal [v2]

2023-10-02 Thread Ben Perez
On Mon, 25 Sep 2023 23:48:49 GMT, Valerie Peng wrote: > * Cipher.updateAAD(...) methods also calls checkCipherState(), so its javadoc > should be updated as well? The current documentation for Cipher.updateAAD(...) is: "@throws IllegalStateException if this {@code Cipher} object is in a wrong

Integrated: 8304956: Update KeyStore.getDefaultType​() specification to return pkcs12 as fallback

2023-09-22 Thread Ben Perez
On Thu, 7 Sep 2023 18:12:28 GMT, Ben Perez wrote: > Replaced "jks" with "pkcs12" in both the spec and fallback for > `KeyStore.getDefaultType()` This pull request has now been integrated. Changeset: 53516aed Author:Ben Perez Committer: Sean Mullan URL: h

Re: RFR: 8304956: Update KeyStore.getDefaultType​() specification to return pkcs12 as fallback [v5]

2023-09-21 Thread Ben Perez
On Thu, 21 Sep 2023 19:08:16 GMT, Sean Mullan wrote: >> Ben Perez has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Fixed copyright, refactored test to get rid of runTest > > test/jdk/java/security/KeySto

Re: RFR: 8304956: Update KeyStore.getDefaultType​() specification to return pkcs12 as fallback [v6]

2023-09-21 Thread Ben Perez
> Replaced "jks" with "pkcs12" in both the spec and fallback for > `KeyStore.getDefaultType()` Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Changed @run arguments to completely override java.security -

Re: RFR: 8304956: Update KeyStore.getDefaultType​() specification to return pkcs12 as fallback [v5]

2023-09-21 Thread Ben Perez
> Replaced "jks" with "pkcs12" in both the spec and fallback for > `KeyStore.getDefaultType()` Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Fixed copyright, refactored test to get rid of runTest -

Re: RFR: 8304956: Update KeyStore.getDefaultType​() specification to return pkcs12 as fallback [v3]

2023-09-20 Thread Ben Perez
On Wed, 20 Sep 2023 06:08:11 GMT, Valerie Peng wrote: >> Ben Perez has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Added test to check that when keystore.type is null it defaults to pkcs12 > > test/jdk

Re: RFR: 8304956: Update KeyStore.getDefaultType​() specification to return pkcs12 as fallback [v4]

2023-09-20 Thread Ben Perez
> Replaced "jks" with "pkcs12" in both the spec and fallback for > `KeyStore.getDefaultType()` Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Changed test description, fixed indentation

Re: RFR: 8304956: Update KeyStore.getDefaultType​() specification to return pkcs12 as fallback [v3]

2023-09-20 Thread Ben Perez
On Wed, 20 Sep 2023 06:02:52 GMT, Valerie Peng wrote: >> Ben Perez has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Added test to check that when keystore.type is null it defaults to pkcs12 > > test/jdk

Re: RFR: 8304956: Update KeyStore.getDefaultType​() specification to return pkcs12 as fallback [v3]

2023-09-19 Thread Ben Perez
> Replaced "jks" with "pkcs12" in both the spec and fallback for > `KeyStore.getDefaultType()` Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Added test to check that when keystore.type is

Re: RFR: 4964430: (spec) missing IllegalStateException exception requirement for javax.crypto.Cipher.doFinal [v2]

2023-09-14 Thread Ben Perez
> Updated IllegalStateException exception requirements for `update`, `doFinal`, > `wrap`, and `unwrap` Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Removed periods at end of IllegalStateException comment - C

RFR: 4964430: Missing IllegalStateException exception requirement for javax.crypto.Cipher.doFinal

2023-09-13 Thread Ben Perez
Updated IllegalStateException exception requirements for `update`, `doFinal`, `wrap`, and `unwrap` - Commit messages: - Updated IllegalStateException requirement in update, doFinal, wrap, and unwrap Changes: https://git.openjdk.org/jdk/pull/15727/files Webrev:

Re: RFR: 8304956: Update KeyStore.getDefaultType​() specification to return pkcs12 as fallback [v2]

2023-09-11 Thread Ben Perez
> Replaced "jks" with "pkcs12" in both the spec and fallback for > `KeyStore.getDefaultType()` Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Changed KEYSTORE_TYPE spec to indicate pkcs12 default -

RFR: 8304956: Update KeyStore.getDefaultType​() specification to return pkcs12 as fallback

2023-09-07 Thread Ben Perez
Replaced "jks" with "pkcs12" in both the spec and fallback for `KeyStore.getDefaultType()` - Commit messages: - removed jks as fallback keystore and replaced with pkcs12 Changes: https://git.openjdk.org/jdk/pull/15625/files Webrev: https://webrevs.openjdk.org/?repo=jdk=15625=00

Integrated: 8175874: Update Security.insertProviderAt to specify behavior when requested position is out of range.

2023-08-23 Thread Ben Perez
On Tue, 18 Jul 2023 19:59:34 GMT, Ben Perez wrote: > Fixing the bug as stated would cause compatibility issues. E.g. the > `addProvider` function always adds new providers at position 0 and therefore > would always throw an error. Instead of changing how the function handles >

Re: RFR: 8175874: Update Security.insertProviderAt to specify behavior when requested position is out of range. [v7]

2023-08-23 Thread Ben Perez
unction spec. Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Added bugid to ChangeProviders - Changes: - all: https://git.openjdk.org/jdk/pull/14925/files - new: https://git.openjdk.org/jdk/pull/14925/files/1addeebf..1d64b

Re: RFR: 8175874: Update Security.insertProviderAt to specify behavior when requested position is out of range. [v6]

2023-08-21 Thread Ben Perez
unction spec. Ben Perez has updated the pull request with a new target base due to a merge or a rebase. The incremental webrev excludes the unrelated changes brought in by the merge/rebase. The pull request contains seven additional commits since the last revision: - Merge branch 'openjdk:mast

Re: RFR: 8175874: Update Security.insertProviderAt to specify behavior when requested position is out of range. [v5]

2023-08-18 Thread Ben Perez
unction spec. Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Simplified test in ChangeProviders - Changes: - all: https://git.openjdk.org/jdk/pull/14925/files - new: https://git.openjdk.org/jdk/pull/14925/files/80b373

Re: RFR: 8175874: Update Security.insertProviderAt to specify behavior when requested position is out of range. [v4]

2023-08-17 Thread Ben Perez
unction spec. Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Changed function spec wording, updated test - Changes: - all: https://git.openjdk.org/jdk/pull/14925/files - new: https://git.openjdk.org/jdk/pull/14925/fi

Integrated: 8314240: test/jdk/sun/security/pkcs/pkcs7/SignerOrder.java fails to compile

2023-08-16 Thread Ben Perez
On Tue, 15 Aug 2023 19:42:44 GMT, Ben Perez wrote: > Included `null` as an argument to `pkcs71.verify` in SignerOrder.java This pull request has now been integrated. Changeset: f143380d Author: Ben Perez Committer: Sean Mullan URL: https://git.openjdk.org/jdk/com

RFR: 8314240: test/jdk/sun/security/pkcs/pkcs7/SignerOrder.java fails to compile

2023-08-15 Thread Ben Perez
Included `null` as an argument to `pkcs71.verify` in SignerOrder.java - Commit messages: - updated copyright - Fixed SignerOrder test and removed from ProblemList Changes: https://git.openjdk.org/jdk/pull/15296/files Webrev: https://webrevs.openjdk.org/?repo=jdk=15296=00 Issue:

Integrated: 8314059: Remove PKCS7.verify()

2023-08-14 Thread Ben Perez
On Fri, 11 Aug 2023 17:23:52 GMT, Ben Perez wrote: > Removed PKCS7.verify() since no other code in JDK calls it. This pull request has now been integrated. Changeset: 595fdd36 Author: Ben Perez Committer: Sean Mullan URL: https://git.openjdk.org/jdk/com

Re: RFR: 8314059: Remove PKCS7.verify() [v2]

2023-08-14 Thread Ben Perez
> Removed PKCS7.verify() since no other code in JDK calls it. Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Updated copyright - Changes: - all: https://git.openjdk.org/jdk/pull/15251/files - new: ht

Re: RFR: 8175874: Define algorithm names for keys derived from KeyAgreement [v3]

2023-08-11 Thread Ben Perez
> Fixing the bug as stated would cause compatibility issues. E.g. the > `addProvider` function always adds new providers at position 0 and therefore > would always throw an error. Instead of changing how the function handles > indices, we instead have left an `@implNote` Ben Perez

RFR: 8314059: Remove PKCS7.verify()

2023-08-11 Thread Ben Perez
Removed PKCS7.verify() since no other code in JDK calls it. - Commit messages: - removed verify method that takes no arguments Changes: https://git.openjdk.org/jdk/pull/15251/files Webrev: https://webrevs.openjdk.org/?repo=jdk=15251=00 Issue:

Re: RFR: 8175874: Security.insertProviderAt should throw IllegalArgumentException when index is illegal [v2]

2023-08-11 Thread Ben Perez
> Fixing the bug as stated would cause compatibility issues. E.g. the > `addProvider` function always adds new providers at position 0 and therefore > would always throw an error. Instead of changing how the function handles > indices, we instead have left an `@implNote` Ben Perez

RFR: 8175874: Security.insertProviderAt should throw IllegalArgumentException when index is illegal

2023-07-18 Thread Ben Perez
Fixing the bug as stated would cause compatibility issues. E.g. the `addProvider` function always adds new providers at position 0 and therefore would always throw an error. Instead of changing how the function handles indices, we instead have left an `@implNote` - Commit

Integrated: 8279254: PKCS9Attribute SigningTime always encoded in UTFTime

2023-06-23 Thread Ben Perez
On Thu, 22 Jun 2023 18:45:14 GMT, Ben Perez wrote: > Added single-argument `putTime` method to `DerOutputStream` that selects the > correct encoding based on the `Date` value. Similarly, a `getTime` method was > added to `DerValue` to automatically call the correct decoding funct

Re: RFR: 8279254: PKCS9Attribute SigningTime always encoded in UTFTime [v4]

2023-06-23 Thread Ben Perez
Furthermore, the `encode` method in > `PKCS9Attribute` was changed to utilize the new `putTime` method. Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Moved UTC date range to constants - Changes: - all: https://git.

Re: RFR: 8279254: PKCS9Attribute SigningTime always encoded in UTFTime [v3]

2023-06-22 Thread Ben Perez
Furthermore, the `encode` method in > `PKCS9Attribute` was changed to utilize the new `putTime` method. Ben Perez has updated the pull request incrementally with two additional commits since the last revision: - Fixed epoch literals to be in milliseconds - Updated copyright in

Re: RFR: 8279254: PKCS9Attribute SigningTime always encoded in UTFTime [v2]

2023-06-22 Thread Ben Perez
Furthermore, the `encode` method in > `PKCS9Attribute` was changed to utilize the new `putTime` method. Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Replaced depreciated ctor in putTime. Added getTime method to

RFR: 8279254: PKCS9Attribute SigningTime always encoded in UTFTime

2023-06-22 Thread Ben Perez
Added single-argument `putTime` method to `DerOutputStream` that selects the correct encoding based on the `Date` value. Similarly, a `getTime` method was added to `DerValue` to automatically call the correct decoding function based on the date type specified by the `tag`. Furthermore, the

Integrated: 8308808: SunMSCAPI public keys returns internal key array

2023-06-16 Thread Ben Perez
On Mon, 12 Jun 2023 18:49:59 GMT, Ben Perez wrote: > Changed `getEncoded` for both EC and RSA to return a copy of the internal key > array to avoid mutability issues. This pull request has now been integrated. Changeset: 4eb4f20a Author: Ben Perez Committer: Sean Mullan URL:

Re: RFR: 8308808: SunMSCAPI public keys returns internal key array [v5]

2023-06-15 Thread Ben Perez
> Changed `getEncoded` for both EC and RSA to return a copy of the internal key > array to avoid mutability issues. Ben Perez has updated the pull request incrementally with one additional commit since the last revision: fixed copyrite date - Changes: - all:

Re: RFR: 8308808: SunMSCAPI public keys returns internal key array [v4]

2023-06-15 Thread Ben Perez
> Changed `getEncoded` for both EC and RSA to return a copy of the internal key > array to avoid mutability issues. Ben Perez has updated the pull request incrementally with one additional commit since the last revision: added copyrite to test - Changes: - all:

Re: RFR: 8308808: SunMSCAPI public keys returns internal key array [v3]

2023-06-15 Thread Ben Perez
> Changed `getEncoded` for both EC and RSA to return a copy of the internal key > array to avoid mutability issues. Ben Perez has updated the pull request incrementally with two additional commits since the last revision: - Removed unnecessary imports - Removed unnecessary module i

Re: RFR: 8308808: SunMSCAPI public keys returns internal key array [v2]

2023-06-14 Thread Ben Perez
On Wed, 14 Jun 2023 20:28:15 GMT, Sean Mullan wrote: >> Ben Perez has updated the pull request incrementally with one additional >> commit since the last revision: >> >> Changed array copy to be more compact > > src/jdk.crypto.mscapi/windows/classes/sun/s

Re: RFR: 8308808: SunMSCAPI public keys returns internal key array [v2]

2023-06-14 Thread Ben Perez
> Changed `getEncoded` for both EC and RSA to return a copy of the internal key > array to avoid mutability issues. Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Changed array copy to be more compact - Changes:

Integrated: 8308474: DSA does not reset SecureRandom when initSign is called again

2023-06-13 Thread Ben Perez
On Thu, 1 Jun 2023 21:17:11 GMT, Ben Perez wrote: > Fixed `engineInitSign` in `DSA.java` and added `SecureRandomReset.java` to > DSA tests This pull request has now been integrated. Changeset: bed9161c Author: Ben Perez Committer: Weijun Wang URL: https://git.openjdk.o

Integrated: 8307144: namedParams in XECParameters and EdDSAParameters can be private final

2023-06-12 Thread Ben Perez
On Thu, 25 May 2023 21:17:40 GMT, Ben Perez wrote: > Changed `namedParams` in XECParameters and EdDSAParameters to be `private > final` This pull request has now been integrated. Changeset: 3c15ad8d Author: Ben Perez Committer: Sean Mullan URL: https://git.openjdk.org/jdk/

RFR: 8308808: SunMSCAPI public keys returns internal key array

2023-06-12 Thread Ben Perez
Changed `getEncoded` for both EC and RSA to return a copy of the internal key array to avoid mutability issues. - Commit messages: - updated copywrite - Fixed getEncoded for CRSAPublicKey - Fixed imports and formatting - Modify getEncoded to return copy of encoding. Added test.

Withdrawn: 8307144: namedParams in XECParameters and EdDSAParameters can be private final

2023-06-12 Thread Ben Perez
On Thu, 25 May 2023 21:17:40 GMT, Ben Perez wrote: > Changed `namedParams` in XECParameters and EdDSAParameters to be `private > final` This pull request has been closed without being integrated. - PR: https://git.openjdk.org/jdk/pull/14162

Re: RFR: 8307144: namedParams in XECParameters and EdDSAParameters can be private final [v2]

2023-06-08 Thread Ben Perez
> Changed `namedParams` in XECParameters and EdDSAParameters to be `private > final` Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Updated copywrite, added line breaks for readability - Changes: - all:

Re: RFR: 8308474: DSA does not reset SecureRandom when initSign is called again [v2]

2023-06-08 Thread Ben Perez
> Fixed `engineInitSign` in `DSA.java` and added `SecureRandomReset.java` to > DSA tests Ben Perez has updated the pull request incrementally with one additional commit since the last revision: Formatting changes, updated copywrite - Changes: - all: https://git.openj

Re: RFR: 8308474: DSA does not reset SecureRandom when initSign is called again

2023-06-07 Thread Ben Perez
On Wed, 7 Jun 2023 07:00:45 GMT, Bernd wrote: >> Fixed `engineInitSign` in `DSA.java` and added `SecureRandomReset.java` to >> DSA tests > > test/jdk/sun/security/provider/DSA/SecureRandomReset.java line 51: > >> 49: >> 50: // Re-initialize deterministic RNG and sign >> 51:

RFR: 8307144: namedParams in XECParameters and EdDSAParameters can be private final

2023-06-06 Thread Ben Perez
Changed `namedParams` in XECParameters and EdDSAParameters to be `private final` - Commit messages: - Formatted to adhere to the blessed modifier order - Fixed accidental newline - Formatting changes - Changed namedParams to be private final static - Revert "Changed namedParams

Re: RFR: 8308474: DSA does not reset SecureRandom when initSign is called again

2023-06-06 Thread Ben Perez
On Tue, 6 Jun 2023 14:12:22 GMT, Weijun Wang wrote: >> Fixed `engineInitSign` in `DSA.java` and added `SecureRandomReset.java` to >> DSA tests > > test/jdk/sun/security/provider/DSA/SecureRandomReset.java line 28: > >> 26: * @bug 8308474 >> 27: * @summary Test that calling initSign resets

RFR: 8308474: DSA does not reset SecureRandom when initSign is called again

2023-06-06 Thread Ben Perez
Fixed `engineInitSign` in `DSA.java` and added `SecureRandomReset.java` to DSA tests - Commit messages: - Updated copywrite - Removed redundant call to getSigningRandom, fixed test formatting - Added test for RNG rest - Removed misplaced call to getSigningRandom - Added RNG