e some good news announced by then.
>>>
>>> It would be very appreciated if anyone can give some information
>>> regarding the backport of this fix to JDK 8 update in advance.
>>>
>>> Thanks for all your hard work and contributions.
>>>
>>
Hi Aleksej,
We await this backport for migrating our system into JDK 8.
If you want some help to progress it, please let me know :)
Thanks,
Yuji
2016-08-04 9:35 GMT+09:00 KUBOTA Yuji :
> Hi Aleksej,
>
> Thank you very much!
> If you need some help about the patch, pleas
rds,
>
> Aleksej
>
> [1] https://bugs.openjdk.java.net/browse/JDK-8162941
>
>
>
> On 02/08/16 08:33, KUBOTA Yuji wrote:
>>
>> Hi all,
>>
>> Could you let me know when this fix will be backport to JDK 8?
>> We need this backport to migrate our syste
Hi all,
Could you let me know when this fix will be backport to JDK 8?
We need this backport to migrate our system from JDK 7 to JDK 8.
Thanks,
Yuji
2016-02-10 10:17 GMT+09:00 KUBOTA Yuji :
> Hi Miroslav,
>
> Thank you for your sponsor! : https://bugs.openjdk.java.net/browse/JDK-814608
2016-04-20 7:57 GMT+09:00 :
> I have to agree. I don't think it makes sense to add a known-vulnerable
> encryption algorithm to the JDK. It might work perfectly well for one
> use case but it will eventually be used by someone who doesn't take the
> time to understand it, assumes that it provide
> would provide the passphrase for a given path, or Optional.empty() if the
> Path is unencrypted.
>
> Kind regards, Anthony
>
> [1] https://pkware.cachefly.net/webdocs/casestudies/APPNOTE.TXT
> [2] http://www.winzip.com/win/en/aes_info.htm
>
>
> On 8/04/2016 13:04, KUBOT
Hi Sherman and all,
Thank you for all comments about this proposal!
Thank Tomoyuki and Stephen for sharing your needs.
Thank Bernd for sharing your information. However, I am
afraid that AE1 and AE2 may have a risk of patent issue,
while "Traditional PKWare encryption" is explicitly free
from th
Hi Mark,
Could you please review my attached patch and reproducer of JDK-8151212 [1] ?
If do you have a comment(s), please let me know.
[1]: https://bugs.openjdk.java.net/browse/JDK-8151212
Thanks,
Yuji
2016-03-05 3:19 GMT+09:00 KUBOTA Yuji :
> Hi Roger and all,
>
> Thanks your help
The patch and reproducer have been attached to the issue 8151212[1].
>
> Thanks, Roger
>
> [1] https://bugs.openjdk.java.net/browse/JDK-8151212
>
> On 3/3/2016 9:06 PM, KUBOTA Yuji wrote:
>
> Hi Roger,
>
> Thank you for your help!
> My patch and reproducer are as below.
>
>
>
// connection refused
if (re.getCause() instanceof SocketTimeoutException) {
System.out.println("[INFO] Conglaturation. We got a timeout.");
System.exit(0);
}
re.printStackTrace();
System.exit(2);
} catch (I
Hi all,
Could someone please review this patch?
Thanks,
Yuji
2016-02-09 15:50 GMT+09:00 KUBOTA Yuji :
> Hi David,
>
> Thank you for your advice and cc-ing!
>
> I do not have any role yet, so I paste my patches as below.
>
> diff --git a/src/java.rmi/share/classes/
. I'll integrate
> it to standalone JAX-WS repo and it will be integrated into openjdk during
> next syncup.
>
> Thanks
> Miran
>
>
>
>
> On 01/12/15 11:11, KUBOTA Yuji wrote:
>>
>> Hi Miroslav and all,
>>
>> Could you please review the below issu
avid
>
>
> On 9/02/2016 12:10 AM, KUBOTA Yuji wrote:
>>
>> Hi all,
>>
>> Could someone review this fix?
>>
>> Thanks,
>> Yuji
>>
>> 2016-02-04 2:27 GMT+09:00 KUBOTA Yuji :
>>>
>>> Hi all,
>>>
>>> Could
Hi all,
Could someone review this fix?
Thanks,
Yuji
2016-02-04 2:27 GMT+09:00 KUBOTA Yuji :
> Hi all,
>
> Could someone please review and sponsor this fix ?
> I write the details of this issue again. Please review it.
>
> =Problem=
> Potential infinite waiting at TCPCha
f/jdk9.patch
If you run the test program with modified JDK9 by my patch, the test
program will get java.net.SocketTimeoutException after the connection
timeout happen, then return 0.
Thanks,
Yuji.
2016-01-13 23:31 GMT+09:00 KUBOTA Yuji :
> Hi all,
>
> Can somebody please review and
Hi Sherman and all,
Could you please let know your thought and the past case about AES?
Thanks,
Yuji
2016-01-08 0:01 GMT+09:00 KUBOTA Yuji :
> Hi Sherman,
>
> Thank you for sharing!
>
> 2016-01-07 4:04 GMT+09:00 Xueming Shen :
>> The reason that I'm not convinced th
Hi all,
Can somebody please review and sponsor this fix ?
Thanks,
Yuji
2016-01-05 17:56 GMT+09:00 KUBOTA Yuji :
> Hi Jaroslav and core-libs-dev,
>
> Thank Jaroslav for your kindness!
>
> For core-libs-dev members, links the information about this issue.
>
> * detai
>> If yes, it must to set the appropriate password to the returned ZipEntry
>>> via
>>> ZipEntry.setTraditionalEncryption(password); before reading any byte from
>>> the input stream.
>>
>> Yes, we have to add note the flow of codes to the JavaDoc.
>>
n
>> details.
>>
>> For ZipFile and ZipInputStream, we can add note to the api doc to force the
>> invoker to check if the returned ZipEntry indicates it's an encrypted
>> entry. If yes,
>> it must to set the appropriate password to the returned ZipEntry
k we might be faced technical difficulty about a
processing between zlib and the internal buffer of InflaterInputStream
/ DeflaterOutputStream. Please give us time to implement.
>
> -Sherman
Thanks,
Yuji
>
> On 01/04/2016 06:26 AM, KUBOTA Yuji wrote:
>>
>> Hi Sher
reports?
Hope this patch helps to community.
Thanks,
Yuji
2016-01-04 23:51 GMT+09:00 Jaroslav Bachorik :
> Hi Yuji,
>
> On 4.1.2016 15:14, KUBOTA Yuji wrote:
>>
>> Hi all,
>>
>> Could you please review this patch?
>
>
> Sorry for the long delay. Shanli
Hi Sherman and all,
Happy new year to everyone!
Please let know your feedback about this proposal. :-)
Thanks,
Yuji
2015-12-21 22:38 GMT+09:00 KUBOTA Yuji :
> Hi Sherman,
>
> 2015-12-20 16:35 GMT+09:00 Xueming Shen :
>> It is no longer necessary to touch the native code (zip_
w it?
>>>>>
>>>>>
>>>>> Thanks,
>>>>>
>>>>> Yasumasa
>>>>>
>>>>>
>>>>> On 2015/12/12 21:23, Yasumasa Suenaga wrote:
>>>>>>
>>>>>>
sly flawed, and
> in particular
> is vulnerable to known-plaintext attacks":-) Any request to support
> "stronger" encryption
> mechanism, such as the AES based?
>
> Regards,
> Sherman
>
>
> On 12/2/15 6:48 PM, KUBOTA Yuji wrote:
>>
>> Hi all,
>
Hi all,
We need reviewer(s) for this PoC.
Could you please review this proposal and PoC ?
Thanks,
Yuji
2015-11-26 13:22 GMT+09:00 KUBOTA Yuji :
> Hi all,
>
> * Sorry for my mistake. I re-post this mail because I sent before get
> a response of subscription confirmation of core-libs-
Hi Miroslav,
2015-12-02 22:39 GMT+09:00 Miroslav Kos :
> thanks for the patch - it fixes the issue and looks ok to me. I'll integrate
> it to standalone JAX-WS repo and it will be integrated into openjdk during
> next syncup.
Thanks for your quick response and push! I will get 2nd
"Contributed-by
Hi Miroslav and all,
Could you please review the below issue and patch?
I got the advice by Alan at net-dev. So I want to ask you.
http://mail.openjdk.java.net/pipermail/net-dev/2015-December/009361.html
I'm at the HackerGarten @ JavaOne15, and write a patch for OpenJDK
community. This's se
Hi all,
Our customers have to handle password-protected zip files. However,
Java SE does not provide the APIs to handle it yet, so we must use
third party library so far.
Recently, we found JDK-4347142: "Need method to set Password
protection to Zip entries", and we tried to implement it.
The cu
Hi all,
* Sorry for my mistake. I re-post this mail because I sent before get
a response of subscription confirmation of core-libs-dev.
Our customers have to handle password-protected zip files. However,
Java SE does not provide the APIs to handle it yet, so we must use
third party library so far
29 matches
Mail list logo