It makes sense to me.  No other comment. Thanks!

Xuelei

On 12/23/2019 10:32 PM, Weijun Wang wrote:


On Dec 24, 2019, at 12:11 AM, Xuelei Fan <xuelei....@oracle.com> wrote:

Will the update for getEncodedParams() has other compatibility impact? As it is 
a public method, I'm not sure if the update is necessary and will impact ECDSA 
encoding in other places.  Please double check it.

With the current code, ECDSA will always fail when trying to parse a parameters 
byte array containing a hash algorithm. Therefore this fix will not bring more 
error.

The only parameter for a ECDSA algorithm we can handle now is ECParameters 
(named curve). For ecdsa-with-SHA2, the parameter already contains the hash 
algorithm and I have no idea where to put the curve name. My fix just throws 
away the whole parameter. This should not be a problem since an EC key already 
knows its curve, and the best ECDSA can do is to reject the signature if the 
curve there does not match the key's curve.

The final copy of https://tools.ietf.org/html/rfc5758 didn't mention 
ecdsa-with-SHA2 at all. It was removed in an earlier draft [1] and hopefully no 
one should be using it.

Thanks,
Max

[1] 
https://tools.ietf.org/rfcdiff?difftype=--hwdiff&url2=draft-ietf-pkix-sha2-dsa-ecdsa-05.txt


Otherwise, looks good to me.

Xuelei

On 12/21/2019 5:33 AM, Weijun Wang wrote:
I uploaded a less disruptive webrev at 
https://cr.openjdk.java.net/~weijun/8236470/webrev.01.
--Max
On Dec 21, 2019, at 7:47 PM, Weijun Wang <weijun.w...@oracle.com> wrote:

Oh, I take back the "mutates the internal" words, it didn't. algName is only a 
local variable.

So the major problem of the current code is that while getName() is modified to return 
the "full" signature algorithm name, getEncodedParams() still returns it.

I realized my fix does have the problem that AlgorithmId.parse(input).encode() 
will be different from input, but making change at the root is still better 
than recognizing specifiedWithECDSA_oid and ignoring parameters everywhere.

Thanks,
Max


On Dec 21, 2019, at 7:23 PM, Weijun Wang <weijun.w...@oracle.com> wrote:

Please take a review at

  http://cr.openjdk.java.net/~weijun/8236470/webrev.00/

The current implementation is not good at dealing with ECDSA specified by ecdsa-with-SHA2 
plus a hash algorithm. While the AlgorithmId::getName is able to return the 
"full" signature algorithm name, it mutates the internal, cannot be guaranteed 
to be called, and leaves the parameters unchanged. This fix move the logic to 
AlgorithmId::parse and the class becomes practically immutable.

For Oracle internal reviewers: An update is made to the test also. The closed 
path has been wrong since the repo consolidation. We do have such certs in the 
closed area.

Thanks,
Max



Reply via email to