[security-dev 00030]: Code review request: 6634644 broken fragment, should use @link

2007-12-24 Thread Max (Weijun) Wang
Hi Sean There's a bug on spec inside javax.security.cert.X509Certificate -START BUG REPORT- 6634644 broken fragment, should use @link Broken fragment in api doc, following lines in javax/security/cert/ X509Certificate.java should be fixed. line 366: * See getIssuerDN for Name

[security-dev 00034]: Re: JGSS: Re-construct Credentials.acquireTGTFromCache

2008-01-02 Thread Max (Weijun) Wang
Hi Andrew The current CredentialsCache.getInstance() on Windows should always return the file cache, right? Inside the acquireDefaultCreds() method, if cache.getDefaultCreds() returns a non-null object which has the correct eType, then LSA is never read. Take this for example: 1. User lo

[security-dev 00044]: LSA ticket question

2008-01-14 Thread Max (Weijun) Wang
Hi Andrew Want to confirm something with you: There are some kinds of Kerberos tickets inside the LSA cache that you can never get the encoded form, right? I've seen a ticket in kerbtray.exe that's flagged FORWARDED, but never find out how to get its encoded form, therefore cannot use it

[security-dev 00046]: ECC (was Re: LSA ticket question)

2008-01-14 Thread Max (Weijun) Wang
e) A 100% Java implementation should be available in JDK 7. Max On Jan 14, 2008, at 9:59 PM, deepak sahu wrote: hi friends Do u find ECC implemented completely in jdk6? if yes,plz help me find it out.i.e ource file On 1/14/08, Max (Weijun) Wang <[EMAIL PROTECTED]> wrote: Hi Andrew Want to confi

[security-dev 00048]: Re: LSA ticket question

2008-01-14 Thread Max (Weijun) Wang
it into KERB_EXTERNAL_TICKET. Max On Jan 14, 2008, at 10:07 PM, Andrew Fan wrote: Max (Weijun) Wang wrote: Hi Andrew Want to confirm something with you: There are some kinds of Kerberos tickets inside the LSA cache that you can never get the encoded form, right? I don't hav

[security-dev 00103]: How to get the default Kerberos realm?

2008-03-12 Thread Max (Weijun) Wang
Hi All Currently, the JDK works like this (in sun.security.krb5.Config): 1. If the java.security.krb5.kdc system property is set, return it 2. If [libdefaults] default_realm exists in krb5.conf, return it 3. Using DNS (if allowed) a. Find the full qualified host name of the localhost b. Fi

[security-dev 00107]: JSSE sends a packet for every send()?

2008-03-13 Thread Max (Weijun) Wang
Playing with JSSE now. I'm sending a byte[100] on client side using 100 calls of write(int). When receiving them on the server side using read(byte[100]), I need to call it 100 times and each time it only returns 1. Does this mean the client generates one SSL packet for each write() call?

[security-dev 00122]: Tech doc: JGSS in Windows

2008-03-20 Thread Max (Weijun) Wang
Hi All I'm planning to write a technical doc on JGSS programming on Windows. http://docs.google.com/Doc?id=dct969xx_0gbzzcp2n please tell me what kinds of topics you believe should be included, say, JGSS programming on client JGSS programming on server JNDI thru JGSS HTTP/SPE

[security-dev 00190]: Please review: policytool bug

2008-06-09 Thread Max (Weijun) Wang
Hi All Please take a review. Bug: http://bugs.sun.com/view_bug.do?bug_id=6711509 Code changes: diff --git a/src/share/classes/sun/security/tools/PolicyTool.java b/ src/share/classes/sun/security/tools/PolicyTool.java --- a/src/share/classes/sun/security/tools/PolicyTool.java +++ b/src/sha

[security-dev 00291]: Re: Heads up: Bad changeset rollback

2008-09-04 Thread Max (Weijun) Wang
The bug id should have been 6740833. Max On Sep 4, 2008, at 7:26 PM, Mark Wielaard wrote: Hi, On Wed, 2008-09-03 at 14:16 -0700, Mark Reinhold wrote: Date: Wed, 03 Sep 2008 13:08:38 -0700 From: [EMAIL PROTECTED] Last night there was a changeset introduced to the JSN gate that contained an

[security-dev 00377]: Re: JGSS/krb5: Too strict Krb5LoginModule options validation

2008-10-27 Thread Max (Weijun) Wang
Hi Valerie Sun JDK's impl is different (see inline vs IBM). For options in Krb5LoginModule, I think there're 3 rules: 1. No conflict. e.g. only use ccache but storeKey, obviously there's no key to store here 2. Useful. e.g. if useKeyTab=false, then keyTabName is useless so it shouldn't ap

[security-dev 00572]: Code review request: 6780416: New keytool commands/options: -gencert, -printcertreq, -ext

2009-02-18 Thread Max (Weijun) Wang
Hi All Can you take a review of this RFE? 6780416: New keytool commands/options: -gencert, -printcertreq, -ext bug: http://bugs.sun.com/view_bug.do?bug_id=6780416 webrev: http://hgrev.appspot.com/show?id=3077 The spec of the 3 new commands/options is inside the evaluation section of the

[security-dev 00573]: Re: Code review request: 6780416: New keytool commands/options: -gencert, -printcertreq, -ext

2009-02-18 Thread Max (Weijun) Wang
If you are more familiar with the standard webrev format, I have a copy here: http://cr.openjdk.java.net/~weijun/6780416/webrev.00/ On Feb 18, 2009, at 5:05 PM, Max (Weijun) Wang wrote: Hi All Can you take a review of this RFE? 6780416: New keytool commands/options: -gencert

[security-dev 00575]: Re: Code review request: 6780416: New keytool commands/options: -gencert, -printcertreq, -ext

2009-02-18 Thread Max (Weijun) Wang
res, and then update the document link. Does this sound rational? Thanks Max Xuelei Max (Weijun) Wang wrote: Hi All Can you take a review of this RFE? 6780416: New keytool commands/options: -gencert, -printcertreq, -ext bug: http://bugs.sun.com/view_bug.do?bug_id=6780416

[security-dev 00579]: Re: Code review request: 6780416: New keytool commands/options: -gencert, -printcertreq, -ext

2009-02-18 Thread Max (Weijun) Wang
ll. I will look at KeyTool.java tomorrow, others looks fine for me by now. Good. Thanks Max Xuelei Max (Weijun) Wang wrote: Hi All Can you take a review of this RFE? 6780416: New keytool commands/options: -gencert, -printcertreq, -ext bug: http://bugs.sun.com/view_bug.do?bug_id=6780416

[security-dev 00587]: Security starter bugs? (was Re: Request for comments: New Bugzilla-based contribution process)

2009-02-20 Thread Max (Weijun) Wang
On Feb 20, 2009, at 7:05 AM, Brad Wetmore wrote: Some groups have already generated lists of "starter bugs" that might contain useful ideas to get started. Do we have the list? Max

[security-dev 00588]: Code review request: Accepting OpenSSL-style cert

2009-02-20 Thread Max (Weijun) Wang
Hi Vinnie I've forward-ported the OpenSSL-style cert fix to JDK 7, updated an existing test[1], and add a new regression test. can you please take a review? The diff of X509Factory.java is identical to the one I showed you last month. Synopsis: keytool can be more flexible on format of PE

[security-dev 00601]: Re: code review request: 5067458 Loopback SSLSocketImpl createSocket is throwing an exception.

2009-02-22 Thread Max (Weijun) Wang
Fix looks fine. BTW, SSLSocketFactory has another method createSocket(Socket s, String host, int port, boolean autoClose) How does it behave? and, will you clarify its javadoc on the host argument? Max On Feb 23, 2009, at 1:07 PM, Xuelei Fan wrote: I need to

[security-dev 00603]: Re: code review request: 5067458 Loopback SSLSocketImpl createSocket is throwing an exception.

2009-02-22 Thread Max (Weijun) Wang
I see. Everything is OK now. On Feb 23, 2009, at 1:46 PM, Xuelei Fan wrote: Max (Weijun) Wang wrote: Fix looks fine. BTW, SSLSocketFactory has another method createSocket(Socket s, String host, int port, boolean autoClose) How does it behave? Because there is a

[security-dev 00610]: RFC for jarsigner: more warning, more concise output

2009-02-24 Thread Max (Weijun) Wang
Hi All Looking at this bug now: jarsigner needs enhanced cert validation(options) http://bugs.sun.com/view_bug.do?bug_id=6802846 I've exchanged some emails with the bug reporter (BCC'ed :) ). Basically we found these problems with the current jarsigner: 1. Does not care much about warn

[security-dev 00671]: Re: 6787130 Code Review Request

2009-03-06 Thread Max (Weijun) Wang
It looks fine. On Mar 7, 2009, at 12:50 AM, Sean Mullan wrote: Hi Max, Can you review: http://cr.openjdk.java.net/~mullan/6787130/webrev/ Thanks, Sean

[security-dev 00679]: Re: Review request: Infinite loop if SPNEGO specified as sun.security.jgss.mechanism

2009-03-08 Thread Max (Weijun) Wang
On Mar 5, 2009, at 4:41 PM, Xuelei Fan wrote: "sun.security.jgss.mechanism", it is a undocumented property, right? I think it is hard to explain why SPNEGO is request, but KRB5 given, it is not the expected behavior. Why not thrown a GSSException? No, user sets this property so that SPNEG

[security-dev 00723]: Re: Request for comment: How to enable credentials delegation in HTTP Negotiate?

2009-03-29 Thread Max (Weijun) Wang
Ping again, any suggestions? Thanks Max On Nov 25, 2008, at 3:01 PM, Weijun Wang wrote: Hi All The current implementation of HTTP Negotiate authentication has not enabled credential delegation (it simply acquires a new one using either a cached TGT or username/password from Authenticator).

[security-dev 00727]: Re: Request for comment: How to enable credentials delegation in HTTP Negotiate?

2009-03-30 Thread Max (Weijun) Wang
or was designed as cascade-able. Thanks Max - Michael Max (Weijun) Wang wrote: Ping again, any suggestions? Thanks Max On Nov 25, 2008, at 3:01 PM, Weijun Wang wrote: Hi All The current implementation of HTTP Negotiate authentication has not enabled credential delegation (it simply acq

[security-dev 00753]: Re: Code review request: Undefined requesting URL in "java.net.Authenticator.getPasswordAuthentication()"

2009-04-14 Thread Max (Weijun) Wang
On Apr 14, 2009, at 5:59 PM, Christopher Hegarty - Sun Microsystems Ireland wrote: Hi Max, I only looked at the networking part of the changes. They look fine, I just have a few questions/comments: 1) sun.net.www.protocol.http.HttpURLConnection Can you use the same HttpCallerInfo inst

[security-dev 00762]: Re: Code review request: Undefined requesting URL in "java.net.Authenticator.getPasswordAuthentication()"

2009-04-17 Thread Max (Weijun) Wang
ht before the service principal name is created. I also add a test, putting two Kerberos KDC, one HTTP server, one proxy server in a single regression test is fun! Thanks Mx On Apr 14, 2009, at 8:55 PM, Max (Weijun) Wang wrote: On Apr 14, 2009, at 5:59 PM, Christopher Hegarty - Sun Microsys

[security-dev 00775]: Re: inefficient Des3DkCrypto/DigestMD5Base.setParityBit()

2009-04-20 Thread Max (Weijun) Wang
Hi Christian The patch is very good, and much clearer than the previous implementation. I will include it in the fix. Thanks Max On Apr 20, 2009, at 8:44 PM, Christian Thalinger wrote: On Tue, 2009-02-17 at 12:30 -0600, Brad Wetmore wrote: You'd want to talk to Max (Weijun) as he has prima

[security-dev 00848]: Re: Code review request: 6813340: X509Factory should not depend on is.available()==0

2009-05-25 Thread Max (Weijun) Wang
e regarding the content is too hug. OK. I would support 0x83 and 0x84. The multiple byte tag is never supported by DerValue related classes, so I guess it's not necessary to add it here. Thanks Max Weijun Wang wrote: Hi Sean and/or Andrew Can any of you take a review at this bug fi

[security-dev 00850]: Re: Code review request: 6813340: X509Factory should not depend on is.available()==0

2009-05-25 Thread Max (Weijun) Wang
3. 584 ~ EOF You assume that the tag occupy only one byte, that's incorrect, the tag would occupy more than one byte when it is bigger than 30. The assume would make the following length parser code incorrect. You assume that the end of indefinite length is only one zero byte, that's incor

[security-dev 00951]: Re: code review request 6853793: OutOfMemoryError in sun.security.provider.certpath.OCSPChecker.check

2009-07-02 Thread Max (Weijun) Wang
Webrev looks fine. no new regression test, trivial changes, hard to write a new test. This code change is very trivial. But, is there any test for OCSP and HTTP timestamping? I think with Michael's HttpServer class in JDK 6, maybe you can see if it's easy to add one or two tests. Thank

[security-dev 00981]: Re: code review request

2009-07-13 Thread Max (Weijun) Wang
Code looks fine. It seems a Name's first string has never been empty, we haven't noticed any infinite loop before. Max On Jul 13, 2009, at 10:33 PM, Xuelei Fan wrote: Hi Max, Would you please review a simple bug fix of JNDI when you available? webrev: http://cr.openjdk.java.net/~xuelei/6

[security-dev 01104]: So many Cloneables in krb5

2009-08-20 Thread Max (Weijun) Wang
Hi Valerie I take a look at krb5 codes and find many classes Cloneable. These 6 can be easily changed to immutable: Realm.java AuthorizationData.java AuthorizationDataEntry.java HostAddress.java HostAddresses.java Ticket.java This one has internal states, but I see no one clone it:

[security-dev 01132]: Re: 6840752: Provide out-of-the-box support for ECC algorithms

2009-08-27 Thread Max (Weijun) Wang
On Aug 27, 2009, at 9:52 PM, Andrew John Hughes wrote: The problem is more the fact that it's an additional copy rather than using the system installation, which means it has to be patched for bugs and security fixes separately. For IcedTea, I'll look at providing and using the option of using

[security-dev 01137]: Re: 6840752: Provide out-of-the-box support for ECC algorithms

2009-08-27 Thread Max (Weijun) Wang
On Aug 28, 2009, at 9:56 AM, Andrew John Hughes wrote: 2009/8/28 Max (Weijun) Wang : On Aug 27, 2009, at 9:52 PM, Andrew John Hughes wrote: The problem is more the fact that it's an additional copy rather than using the system installation, which means it has to be patched for bug

[security-dev 01139]: Re: 6840752: Provide out-of-the-box support for ECC algorithms

2009-08-28 Thread Max (Weijun) Wang
On Aug 28, 2009, at 10:17 PM, Andrew John Hughes wrote: 2009/8/28 Max (Weijun) Wang : On Aug 28, 2009, at 9:56 AM, Andrew John Hughes wrote: 2009/8/28 Max (Weijun) Wang : On Aug 27, 2009, at 9:52 PM, Andrew John Hughes wrote: The problem is more the fact that it's an additional

[security-dev 01219]: code review request: 6882687 KerberosTime too imprecise

2009-09-16 Thread Max (Weijun) Wang
Hi Valerie Please take a review for the fix at http://cr.openjdk.java.net/~weijun/6882687/webrev.00 Brad This would fix the IgnoreChannelBindings test failure on CYGWIN. Thanks Max Begin forwarded message: From: weijun.w...@sun.com Date: September 17, 2009 1:12:13 AM GMT+08:00

[security-dev 01240]: Code review request: 6880321 sun.security.provider.JavaKeyStore abuse of OOM Exception handling

2009-09-22 Thread Max (Weijun) Wang
Hi Andrew Please take a review on this code change: http://cr.openjdk.java.net/~weijun/6880321/webrev.00/ Thanks Max *Change Request ID*: 6880321 *Synopsis*: sun.security.provider.JavaKeyStore abuse of OOM Exception handling === *Description* =

[security-dev 01242]: Re: Code review request: 6880321 sun.security.provider.JavaKeyStore abuse of OOM Exception handling

2009-09-22 Thread Max (Weijun) Wang
On Sep 22, 2009, at 4:09 PM, Florian Weimer wrote: * Max Wang: Please take a review on this code change: http://cr.openjdk.java.net/~weijun/6880321/webrev.00/ This code is still unreliable. You cannot hide OutOfMemoryError this way. The error could even be thrown in a completely unrel

[security-dev 01324]: Code review request: 6893158: AP_REQ check should use key version number

2009-10-19 Thread Max (Weijun) Wang
Hi Please take a review at -- http://cr.openjdk.java.net/~weijun/6893158/webrev.00 The original EncryptionKey.findKey is still used at other places for client side (initiator). They won't touch the kvno field. Thanks Max Begin forwarded message: From: weijun.w...@sun.com Date: October

[security-dev 01329]: Code review request (was Re: CCC request approved: 6853328: Support OK-AS-DELEGATE flag)

2009-10-20 Thread Max (Weijun) Wang
Hi Valerie The CCC is finally approved. Please take a review at the code changes: http://cr.openjdk.java.net/~weijun/6853328/webrev.00/ Or, have you reviewed this before? It's been a long time since the webrev is created but I cannot find your reply in my old mails. Thanks Max On Oct 20

[security-dev 01428]: Re: Please review patch for regression test sun/security/tools/keytool/StartDate

2009-12-03 Thread Max (Weijun) Wang
Hi Pavel Your change looks fine. The test in OpenJDK was already fixed long time ago: http://bugs.sun.com/bugdatabase/view_bug.do?bug_id=6643094 http://hg.openjdk.java.net/jdk7/tl/jdk/rev/59 I'll create a sub bug id targeting OpenJDK-6 and backport the fix. Thanks Max On Dec 3, 2009, at

[security-dev 01429]: Re: Please review patch for regression test sun/security/tools/keytool/StartDate

2009-12-03 Thread Max (Weijun) Wang
Hi Joe I'll backport the fix to openjdk-6. In fact, I haven't made any changes to openjdk-6 except for SSR releases. Just browse hg.openjdk.java.net and find only one openjdk-6 entrance: http://hg.openjdk.java.net/jdk6/jdk6-gate/jdk/ So there's no sub repo for different groups and this

[security-dev 01444]: Re: hg: jdk7/tl/jdk: 6876158: Remove dependencies on Signer, Certificate, Identity, IdentityScope classes from java.security pkg

2009-12-07 Thread Max (Weijun) Wang
Seems there are more to clean: PolicyFile's ignoreIdentityScope() now default false, it should simply be always false and removed. JarSigner still includes IN_SCOPE words. Is Identity still usable now? Thanks Max On Dec 8, 2009, at 2:21 AM, vincent.r...@sun.com wrote: Changeset: 327adb1

[security-dev 01448]: Code review request: 6908628: ObjectIdentifier s11n test fails

2009-12-08 Thread Max (Weijun) Wang
Hi Xuelei Please take a review at -- http://cr.openjdk.java.net/~weijun/6908628/webrev.00 Thanks Max Begin forwarded message: From: weijun.w...@sun.com Date: December 9, 2009 10:44:23 AM GMT+08:00 *Synopsis*: ObjectIdentifier s11n test fails *Change Request ID*: 6908628 *Synopsis*: Obj

[security-dev 01451]: Another code reviewer? (Re: Code review request (was Re: [Fwd: Re: [Fwd: Seeking JDK/Kerberos assistance]]))

2009-12-08 Thread Max (Weijun) Wang
cal variable "goodkdcs" in its list(String) method which actually contains all kdcs for the specific realm in the end. Thanks, Valerie On 11/22/09 22:10, Max (Weijun) Wang wrote:

[security-dev 01466]: code review request (6906201: EXCEPTION_ACCESS_VIOLATION in sun.security.krb5.Credentials)

2009-12-14 Thread Max (Weijun) Wang
Hi Valerie Please take a review on this fix: http://cr.openjdk.java.net/~weijun/6906201/webrev.00 As the MIT words says, the MS bug was fixed in Vista SP2. However, I tried it on a Vista SP1 and it seems the bug is already fixed there. Therefore I only check the main version number in th

[security-dev 01480]: RFC: keytab automatic refresh in Java

2009-12-21 Thread Max (Weijun) Wang
Hi All I'm planning to support keytab refresh in Java, which means the keytab's content is always reloaded right after AP-REQ is received on the acceptor side. One benefit is that when the service is started, the keytab file needn't include the keys for the service, or, it can simply be n

[security-dev 01488]: Re: RFC: keytab automatic refresh in Java

2010-01-03 Thread Max (Weijun) Wang
Hi Please take a review at the CCC: http://ccc.sfbay.sun.com/6894072 Thanks Max On Dec 22, 2009, at 12:25 PM, Max (Weijun) Wang wrote: Hi All I'm planning to support keytab refresh in Java, which means the keytab's content is always reloaded right after AP-REQ is receive

[security-dev 01526]: Re: RFC: keytab automatic refresh in Java

2010-01-15 Thread Max (Weijun) Wang
4072 so we can review it as well? (is this the code, or a design document?) Thanks, -mathieu On Mon, Jan 4, 2010 at 15:00, requ...@openjdk.java.net> wrote: Date: Mon, 04 Jan 2010 13:47:13 +0800 From: "Max (Weijun) Wang" Subject: [security-dev 01488]: Re: RFC: keytab automatic re

[security-dev 01537]: Code review request: 6917791 KeyTabEntry, when the byte value smaller then 16, the string drop '0'.

2010-01-18 Thread Max (Weijun) Wang
Please take a review: http://cr.openjdk.java.net/~weijun/6917791/webrev.00 Before the fix, the hexdump of a keytab only encodes one character for byte smaller than 16. This means 0x12 can be {1,2} or {12}. After the fix, a byte is always encoded in 2 characters. Thanks Max Begin forwar

[security-dev 01556]: Code review request: 6919610 KeyTabInputStream uses static field for per-instance value

2010-01-24 Thread Max (Weijun) Wang
Hi All Please take a review at -- http://cr.openjdk.java.net/~weijun/6919610/webrev.00 Bug description follows. Thanks Max *Change Request ID*: 6919610 *Synopsis*: KeyTabInputStream uses static field for per-instance value Product: java Category: jgss Subcategory: krb5plugin Type:

[security-dev 01578]: Request for comment: spec: NTLM as a SASL mech

2010-02-01 Thread Max (Weijun) Wang
Hi All Please take a review on this draft before I send it for CCC: http://cr.openjdk.java.net/~weijun/spec/NTLMSASL.0.1 The spec includes a raw NTLM API defined in com.sun.* namespace and describes the newly added SASL mech. Thanks Max

[security-dev 01583]: Code review request for 6922482 (was Re: Confusing wording in new keytool command?)

2010-02-02 Thread Max (Weijun) Wang
Brad Wetmore wrote: > Thanks. > > brad > > > Max (Weijun) Wang wrote: >> I'll file the bug and fix it. >> >> Thanks >> Max >> >> On Feb 3, 2010, at 8:43 AM, Brad Wetmore wrote: >> >>> Max, >>> >>> I'm pre

[security-dev 01584]: Re: Request for comment: spec: NTLM as a SASL mech

2010-02-02 Thread Max (Weijun) Wang
On Feb 3, 2010, at 2:44 AM, Bill Shannon wrote: > Max (Weijun) Wang wrote on 02/ 1/10 10:49 PM: >> Hi All >> Please take a review on this draft before I send it for CCC: >> http://cr.openjdk.java.net/~weijun/spec/NTLMSASL.0.1 >> The spec includes a raw NTLM API def

[security-dev 01585]: Re: Request for comment: spec: NTLM as a SASL mech

2010-02-02 Thread Max (Weijun) Wang
, 2010, at 11:45 AM, Nicolas Williams wrote: > On Tue, Feb 02, 2010 at 02:49:54PM +0800, Max (Weijun) Wang wrote: >> Hi All >> >> Please take a review on this draft before I send it for CCC: >> >> http://cr.openjdk.java.net/~weijun/spec/NTLMSASL.0.1 >> >

[security-dev 01588]: Re: Code review request for 6922482 (was Re: Confusing wording in new keytool command?)

2010-02-02 Thread Max (Weijun) Wang
PER, NICKEL, SILVER } ... } Thanks Max [1] http://java.sun.com/docs/books/jls/third_edition/html/classes.html#8.9 > > Brad > > > > Max (Weijun) Wang wrote: >> Hi Brad (or others) >> >> I've just fixed it, please take a review: >>

[security-dev 01597]: Re: Code review request for 6922482 (was Re: Confusing wording in new keytool command?)

2010-02-03 Thread Max (Weijun) Wang
at about 4 page-up from the >> bottom: >> >>public class CoinTest { >>... >>private enum CoinColor { COPPER, NICKEL, SILVER } >>... >>} >> >> Thanks >> Max >> >> [1] http://java.sun.com/docs/books

[security-dev 01598]: Re: Request for comment: spec: NTLM as a SASL mech

2010-02-03 Thread Max (Weijun) Wang
gt;>> On Wed, Feb 03, 2010 at 08:34:13AM -0800, Natalie Li wrote: >>> >>>> Max (Weijun) Wang wrote: >>>> >>>>> Hi Nico >>>>> >>>>> Is there a separate OID for NTLM as a GSS-API mech? >>>>>

[security-dev 01600]: Re: Request for comment: spec: NTLM as a SASL mech

2010-02-04 Thread Max (Weijun) Wang
side > The use of NTLM or NTLMv2 authentication is not negotiated between the client > and server. Hence, authentication might fail if the server mandates NTLMv2 > authentication while the client uses NTLM authentication. Yes, this is what I say "manually setup this config on the clie

[security-dev 01613]: Code review request (6925639: keytool -genkeypair -help missing dname option)

2010-02-11 Thread Max (Weijun) Wang
Hi Sean Fixed, please take a review: http://cr.openjdk.java.net/~weijun/6925639/webrev.00 The -dname option is added into 3 places. Thanks Max On Feb 12, 2010, at 1:22 AM, sean.mul...@sun.com wrote: > *Change Request ID*: 6925639 > > *Synopsis*: keytool -genkeypair -help missing dname op

[security-dev 01643]: Re: Code review request: 6880321 sun.security.provider.JavaKeyStore abuse of OOM Exception handling

2010-02-25 Thread Max (Weijun) Wang
ch is a child of IOException) when there're not enough bytes. I also use a temporary List to hold the certificate list. Thanks Max On Sep 22, 2009, at 6:10 PM, Xuelei Fan wrote: > Max (Weijun) Wang wrote: >> >> On Sep 22, 2009, at 4:09 PM, Florian Weimer wrote: >> &

[security-dev 01647]: Re: Code review request: 6880321 sun.security.provider.JavaKeyStore abuse of OOM Exception handling

2010-02-26 Thread Max (Weijun) Wang
Max, > > I think you still need to catch OOME exception in case of the resource > exhaustation. OOME is unchecked exception, it should be converted to IOE as > the old logic. > > Andrew > > On 2/26/2010 2:09 PM, Max (Weijun) Wang wrote: >> Hi Florian and Andr

[security-dev 01652]: Code review request: 6844909: support allow_weak_crypto in krb5.conf

2010-02-28 Thread Max (Weijun) Wang
Hi Valerie Can you please take a review on this fix? http://cr.openjdk.java.net/~weijun/6844909/webrev.00 Basically, when "allow_weak_crypto = false" is set in krb5.conf's [libdefaults], DES-related etypes will not be used. Note that this setting also removes any weak etypes in the default_

[security-dev 01657]: Re: Code review request: 6844909: support allow_weak_crypto in krb5.conf

2010-03-01 Thread Max (Weijun) Wang
236 still mentions these weak crypto etypes > regardless. Shouldn't it be updated? > > Thanks, > Valerie > On 02/28/10 23:07, Max (Weijun) Wang wrote: >> Hi Valerie >> >> Can you please take a review on this fix? >> >> >> http://cr.openjdk

[security-dev 01659]: Code review request: 6923681: Jarsigner crashes during timestamping

2010-03-01 Thread Max (Weijun) Wang
Hi Vinnie Turns out it's not related to LDAP at all. Just a small coding error, already confirmed by customer. Please take a review: http://cr.openjdk.java.net/~weijun/6923681/webrev.00 Bug is: http://bugs.sun.com/view_bug.do?bug_id=6923681 No reg test. Trivial code update. Why hasn't