Re: RFR [14] 8223940: Private key not supported by chosen signature algorithm

2019-11-06 Thread Xuelei Fan
On 11/5/2019 4:49 PM, Valerie Peng wrote: Hi Xuelei, Updated webrev looks good. If we have a failing test to verify the changes, perhaps you can try disabling the CKM_RSA_PKCS_PSS in the PKCS11 provider configuration file. Or, you can always comment out the PSS Signature entry registration i

RFR [14] 8214483: Remove algorithms that use MD5, DES, or ECB from security requirements

2019-11-06 Thread Sean Mullan
Please remove this change to remove the Java SE requirements to implement security algorithms based on DES, MD5, or ECB. It makes sense to periodically review these requirements and remove algorithms or modes that are known to be weak and of which usage has declined significantly and thus compa

Re: RFR [14] 8214483: Remove algorithms that use MD5, DES, or ECB from security requirements

2019-11-06 Thread Xuelei Fan
Looks good to me. Xuelei On 11/6/2019 8:27 AM, Sean Mullan wrote: Please remove this change to remove the Java SE requirements to implement security algorithms based on DES, MD5, or ECB. It makes sense to periodically review these requirements and remove algorithms or modes that are known to

Re: RFR [14] 8214483: Remove algorithms that use MD5, DES, or ECB from security requirements

2019-11-06 Thread Sean Mullan
On 11/6/19 11:40 AM, Xuelei Fan wrote: Looks good to me. Thanks. Also, someone spotted a typo in my message below: Xuelei On 11/6/2019 8:27 AM, Sean Mullan wrote: Please remove this change to remove the Java SE requirements to Should be "Please review ..." --Sean implement security alg

Re: RFR [14] 8214483: Remove algorithms that use MD5, DES, or ECB from security requirements

2019-11-06 Thread Bernd Eckenfels
Hello, While it is probably a good thing to not use ECB I can imagine you actually need it to implement single-block operations, so I am not sure if it’s a good idea if any general purpose JVM does not provide AES/ECB or RSA/ECB? (Maybe a new raw single block mode instead?) For example TLS1.2

Re: RFR [14] 8214483: Remove algorithms that use MD5, DES, or ECB from security requirements

2019-11-06 Thread Sean Mullan
Hi Bernd, On 11/6/19 3:05 PM, Bernd Eckenfels wrote: Hello, While it is probably a good thing to not use ECB I can imagine you actually need it to implement single-block operations, so I am not sure if it’s a good idea if any general purpose JVM does not provide AES/ECB or RSA/ECB? (Maybe a

Re: RFR [14] 8214483: Remove algorithms that use MD5, DES, or ECB from security requirements

2019-11-06 Thread Michael StJohns
On 11/6/2019 11:27 AM, Sean Mullan wrote: Please remove this change to remove the Java SE requirements to implement security algorithms based on DES, MD5, or ECB. It makes sense to periodically review these requirements and remove algorithms or modes that are known to be weak and of which usage