I think this is the right answer.
From
https://stackoverflow.com/questions/27323858/java-6-ecdhe-cipher-suite-support
The SSL/TLS implementation "JSSE" in Java 1.6 and later supports ECDHE
suites *IF there is an available (JCE) provider* for needed ECC
primitives. *Java 1.6 OOTB does NOT*
JSSE uses the JCA/JCE libraries (javax.crypto/java.security) for most
crypto routines.
Brad
On 5/29/2016 11:02 PM, Ayaskant Swain wrote:
Hi,
Can anyone please help me know about this - Does JSSE library implement
the Ciphers or Algorithms of a SSL protocol ? I see the jsse.jar library
Hi Wang,
Sorry. Upon looking carefully i found the required classes at this place
http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/file/70e3553d9d6e/src/share/classes/sun/security/ssl
Thanks for helping. Appreciate.
Ayas
On Fri, May 27, 2016 at 2:15 PM, Ayaskant Swain
Hi,
Can anyone please help me know about this - Does JSSE library implement the
Ciphers or Algorithms of a SSL protocol ? I see the jsse.jar library
shipped with the JDK. I read the the Oracle document about JSSE -
Hi Wang,
I did not find the package* sun.security.ssl* in the location you have
provided. I am looking for source code for the package that has classes
such as SSLSocketImpl.java , HandShaker.java etc.
Thanks
Ayas
On Fri, May 27, 2016 at 6:38 AM, Wang Weijun wrote:
>
Thanks for the patch, Siba!
This fix looks confusing to me. TestDSAGenParameterSpec has timeout
specified for 2048 but not for 3072/224 and 4096 case. Why would these
run faster than smaller lengths?
May be there is some other reason, area experts can help here.
Thanks,
Rajan
On 5/31/2016
Thanks Xuelei, thanks Seán!
With kind regards,
Ivan
On 30.05.2016 19:06, Seán Coffey wrote:
Looks good Ivan. Given that we know that the cipher transformation is
RSA/ECB/PKCS1Padding, maybe you can consider printing that in the
exception. As a result, maybe something like :
+
Ivan,
apologies for late review. I like the approach taken. It should help
minimize contention. I'd have to highlight though that most contention
seen in this area will be probably down to lack of raw CPU power. As RSA
key lengths continue to grow, more CPU calculations will become
Hi,
Please review the fix for the following JBS bugs,
JBS: https://bugs.openjdk.java.net/browse/JDK-8157896
https://bugs.openjdk.java.net/browse/JDK-8157898
webrev: http://cr.openjdk.java.net/~ssahoo/8157896/webrev.00/
Description:
These Tests takes a lots of time to
Looks fine. Bug should have a noreg label.
--Sean
On 05/31/2016 09:33 AM, Wang Weijun wrote:
Please review this string change for
https://bugs.openjdk.java.net/browse/JDK-8152108
Correct jarsigner warning message about missing timestamp
---
Please review this string change for
https://bugs.openjdk.java.net/browse/JDK-8152108
Correct jarsigner warning message about missing timestamp
--- a/src/jdk.jartool/share/classes/sun/security/tools/jarsigner/Resources.java
+++
11 matches
Mail list logo