On Tue, 17 Nov 2020 17:55:19 GMT, Sean Mullan <mul...@openjdk.org> wrote:

>> This change disables the TLSv1 and TLSv1.1 protocols by adding them to the 
>> jdk.tls.disabledAlgorithms security property in the java.security file. 
>> These protocols use weak algorithms and are being deprecated by the IETF. 
>> They should be disabled by default to improve the default security 
>> configuration of the JDK. See the CSR for more rationale: 
>> https://bugs.openjdk.java.net/browse/JDK-8254713
>> 
>> The fix mostly involves changes to existing tests that for one reason or 
>> another depend on the TLSv1 and TLSv1.1 protocols being enabled. There is a 
>> new test specifically for this issue: 
>> test/jdk/sun/security/ssl/SSLContextImpl/SSLContextDefault.java
>
> Sean Mullan has updated the pull request incrementally with one additional 
> commit since the last revision:
> 
>   More test changes.

Marked as reviewed by xuelei (Reviewer).

test/jdk/sun/security/ssl/EngineArgs/DebugReportsOneExtraByte.java line 95:

> 93: 
> 94:     private SSLEngine clientEngine;     // client Engine
> 95:     private ByteBuffer clientOut;       // write side of clientEngine

Good to see cleanup like this.

-------------

PR: https://git.openjdk.java.net/jdk/pull/1235

Reply via email to