uary, and
>>> really hope that there will be some good news announced by then.
>>>
>>> It would be very appreciated if anyone can give some information
>>> regarding the backport of this fix to JDK 8 update in advance.
>>>
>>> Thanks for
Hi Aleksej,
We await this backport for migrating our system into JDK 8.
If you want some help to progress it, please let me know :)
Thanks,
Yuji
2016-08-04 9:35 GMT+09:00 KUBOTA Yuji <kubota.y...@gmail.com>:
> Hi Aleksej,
>
> Thank you very much!
> If you need some help about
g months.
>
> Best Regards,
>
> Aleksej
>
> [1] https://bugs.openjdk.java.net/browse/JDK-8162941
>
>
>
> On 02/08/16 08:33, KUBOTA Yuji wrote:
>>
>> Hi all,
>>
>> Could you let me know when this fix will be backport to JDK 8?
>> We need
Hi all,
Could you let me know when this fix will be backport to JDK 8?
We need this backport to migrate our system from JDK 7 to JDK 8.
Thanks,
Yuji
2016-02-10 10:17 GMT+09:00 KUBOTA Yuji <kubota.y...@gmail.com>:
> Hi Miroslav,
>
> Thank you for your sponsor! : https://bugs.o
2016-04-20 7:57 GMT+09:00 :
> I have to agree. I don't think it makes sense to add a known-vulnerable
> encryption algorithm to the JDK. It might work perfectly well for one
> use case but it will eventually be used by someone who doesn't take the
> time to understand
nction<Path, Optional> which
> would provide the passphrase for a given path, or Optional.empty() if the
> Path is unencrypted.
>
> Kind regards, Anthony
>
> [1] https://pkware.cachefly.net/webdocs/casestudies/APPNOTE.TXT
> [2] http://www.winzip.com/win/en/aes_info.htm
>
&g
Hi Sherman and all,
Thank you for all comments about this proposal!
Thank Tomoyuki and Stephen for sharing your needs.
Thank Bernd for sharing your information. However, I am
afraid that AE1 and AE2 may have a risk of patent issue,
while "Traditional PKWare encryption" is explicitly free
from
Hi Mark,
Could you please review my attached patch and reproducer of JDK-8151212 [1] ?
If do you have a comment(s), please let me know.
[1]: https://bugs.openjdk.java.net/browse/JDK-8151212
Thanks,
Yuji
2016-03-05 3:19 GMT+09:00 KUBOTA Yuji <kubota.y...@gmail.com>:
> Hi Roge
com>:
> Hi Yuji,
>
> The patch and reproducer have been attached to the issue 8151212[1].
>
> Thanks, Roger
>
> [1] https://bugs.openjdk.java.net/browse/JDK-8151212
>
> On 3/3/2016 9:06 PM, KUBOTA Yuji wrote:
>
> Hi Roger,
>
> Thank you for your help!
> My patch and reproducer are as below.
>
>
>
e) {
// connection refused
if (re.getCause() instanceof SocketTimeoutException) {
System.out.println("[INFO] Conglaturation. We got a timeout.");
System.exit(0);
}
re.printStackTrace();
Sys
Hi all,
Could someone please review this patch?
Thanks,
Yuji
2016-02-09 15:50 GMT+09:00 KUBOTA Yuji <kubota.y...@gmail.com>:
> Hi David,
>
> Thank you for your advice and cc-ing!
>
> I do not have any role yet, so I paste my patches as below.
>
> diff --git a/src/jav
es the issue and looks ok to me. I'll integrate
> it to standalone JAX-WS repo and it will be integrated into openjdk during
> next syncup.
>
> Thanks
> Miran
>
>
>
>
> On 01/12/15 11:11, KUBOTA Yuji wrote:
>>
>> Hi Miroslav and all,
>>
>> Could y
Sorry.
>
> David
>
>
> On 9/02/2016 12:10 AM, KUBOTA Yuji wrote:
>>
>> Hi all,
>>
>> Could someone review this fix?
>>
>> Thanks,
>> Yuji
>>
>> 2016-02-04 2:27 GMT+09:00 KUBOTA Yuji <kubota.y...@gmail.com>:
>>>
Hi all,
Could someone review this fix?
Thanks,
Yuji
2016-02-04 2:27 GMT+09:00 KUBOTA Yuji <kubota.y...@gmail.com>:
> Hi all,
>
> Could someone please review and sponsor this fix ?
> I write the details of this issue again. Please review it.
>
> =Problem=
>
f/jdk9.patch
If you run the test program with modified JDK9 by my patch, the test
program will get java.net.SocketTimeoutException after the connection
timeout happen, then return 0.
Thanks,
Yuji.
2016-01-13 23:31 GMT+09:00 KUBOTA Yuji <kubota.y...@gmail.com>:
> Hi all,
>
> Can
Hi Sherman and all,
Could you please let know your thought and the past case about AES?
Thanks,
Yuji
2016-01-08 0:01 GMT+09:00 KUBOTA Yuji <kubota.y...@gmail.com>:
> Hi Sherman,
>
> Thank you for sharing!
>
> 2016-01-07 4:04 GMT+09:00 Xueming Shen <xueming.s...@or
Hi all,
Can somebody please review and sponsor this fix ?
Thanks,
Yuji
2016-01-05 17:56 GMT+09:00 KUBOTA Yuji <kubota.y...@gmail.com>:
> Hi Jaroslav and core-libs-dev,
>
> Thank Jaroslav for your kindness!
>
> For core-libs-dev members, links the information about this
e the flow of codes to the JavaDoc.
>>
>>> Again, we should not have any "encryption" related public field/method in
>>> DeflaterOutputStream/InflaterInputStream. Ideally these two classes
>>> really
>>> should not be aware of "encryption"
at all.
Agree, but I think we might be faced technical difficulty about a
processing between zlib and the internal buffer of InflaterInputStream
/ DeflaterOutputStream. Please give us time to implement.
>
> -Sherman
Thanks,
Yuji
>
> On 01/04/2016 06:26 AM, KUBOTA Yuji wrote:
>>
&g
e password to the returned ZipEntry via
>> ZipEntry.setTraditionalEncryption(password); before reading any byte from
>> the
>> input stream.
>>
>> Again, we should not have any "encryption" related public field/method in
>> DeflaterOutputStream/Inflat
these reports?
Hope this patch helps to community.
Thanks,
Yuji
2016-01-04 23:51 GMT+09:00 Jaroslav Bachorik <jaroslav.bacho...@oracle.com>:
> Hi Yuji,
>
> On 4.1.2016 15:14, KUBOTA Yuji wrote:
>>
>> Hi all,
>>
>> Could you please review this patch?
>
>
>
K-4347142/webrev.01/
>>>>>
>>>>> Could you review it?
>>>>>
>>>>>
>>>>> Thanks,
>>>>>
>>>>> Yasumasa
>>>>>
>>>>>
>>>>> On 2015/12/12 21:23, Yas
Hi Miroslav,
2015-12-02 22:39 GMT+09:00 Miroslav Kos :
> thanks for the patch - it fixes the issue and looks ok to me. I'll integrate
> it to standalone JAX-WS repo and it will be integrated into openjdk during
> next syncup.
Thanks for your quick response and push! I
Hi all,
We need reviewer(s) for this PoC.
Could you please review this proposal and PoC ?
Thanks,
Yuji
2015-11-26 13:22 GMT+09:00 KUBOTA Yuji <kubota.y...@gmail.com>:
> Hi all,
>
> * Sorry for my mistake. I re-post this mail because I sent before get
> a response of subscri
iki, "known to be seriously flawed, and
> in particular
> is vulnerable to known-plaintext attacks":-) Any request to support
> "stronger" encryption
> mechanism, such as the AES based?
>
> Regards,
> Sherman
>
>
> On 12/2/15 6:48 PM, KUBOTA Yuji wr
Hi Miroslav and all,
Could you please review the below issue and patch?
I got the advice by Alan at net-dev. So I want to ask you.
http://mail.openjdk.java.net/pipermail/net-dev/2015-December/009361.html
I'm at the HackerGarten @ JavaOne15, and write a patch for OpenJDK
community. This's
Hi all,
Our customers have to handle password-protected zip files. However,
Java SE does not provide the APIs to handle it yet, so we must use
third party library so far.
Recently, we found JDK-4347142: "Need method to set Password
protection to Zip entries", and we tried to implement it.
The
Hi all,
* Sorry for my mistake. I re-post this mail because I sent before get
a response of subscription confirmation of core-libs-dev.
Our customers have to handle password-protected zip files. However,
Java SE does not provide the APIs to handle it yet, so we must use
third party library so
28 matches
Mail list logo