Unfortunately we cannot modify a Java SE API in an update release so there is no opportunity to backport the keystore probe mechanism to JDK 8u.
> On 23 May 2015, at 22:57, Thomas Lußnig <open...@suche.org> wrote: > > On 23.05.2015 10:59, Vincent Ryan wrote: >> The aim of this enhancement is to address a specific compatibility risk for >> JKS and >> not to offer a general purpose mechanism for loading any keystore type. In >> general, >> the keystore type should match the keystore file format. >> >> In JDK 9 there is a new probe mechanism for keystores that is more similar to >> what you are proposing. The advantage of that mechanism is that the keystore >> type will exactly match the keystore file format. > When there is already an new probe mechanism for keystore detetion, why > do not backport/use it ? > Why build this limited version for one single usecase instead of using > the more gerneral solution ? >> >>> On 23 May 2015, at 09:42, Thomas Lußnig <open...@suche.org> wrote: >>> >>> Hi, >>> >>> 1) Would it not be an good idea to check the first bytes of the message >>> so that the dual class already know what type the stream is >>> and there is no unnecessary instanciation of exceptions and engine class? >>> 2) If we add an "smart" keystore why we limit it to two types? I do not >>> see any reason why it should not be possible to add other store types to: >>> - JCEKS >>> - PKCS11 >>> It could be extended via securit property >>> java.security.smartKeystore.<N>.type = PKCS11 >>> java.security.smartKeystore.<N>.magic = <HexSequence> (Optional for >>> Performance) >>> java.security.smartKeystore.<N>.engineClass = CanonicalEngine Class Name >>> >>> This would be only an small code change but an usefull improvement. >>> >>> Gruß Thomas >>> >>> >>> On 22.05.2015 22:01, Sean Mullan wrote: >>>> Looks fine to me. >>>> >>>> --Sean >>>> >>>> On 05/22/2015 03:10 PM, Vincent Ryan wrote: >>>>> Thanks Thomas and Sean for your review comments. >>>>> >>>>> KeyStoreDelegator matches the JDK 9 version. I’ve moved it to the >>>>> sun.security.package and modified it as suggested. >>>>> I also made JavaKeyStore package-private but DualFormatJKS needs to >>>>> remain public. >>>>> The cert in trusted.pem is an arbitrary X.509 cert and I’ve added a >>>>> comment in the TestKeystoreCompat test. >>>>> >>>>> A new webrev is available at: >>>>> http://cr.openjdk.java.net/~vinnie/8062552/webrev.02/ >