[prev in list] [next in list] [prev in thread] [next in thread] 

List:       openjdk-security-dev
Subject:    Re: RFR[14] 8232950: SUNPKCS11 Provider incorrectly check key length for PSS Signatures.
From:       Xuelei Fan <Xuelei.Fan () Oracle ! Com>
Date:       2019-10-31 1:28:15
Message-ID: 6F1A3F12-9D83-46E7-979D-5B5F39F40CE3 () Oracle ! Com
[Download RAW message or body]

+1

> On Oct 30, 2019, at 2:00 PM, Anthony Scarpino <anthony.scarpino@oracle.com> wrote:
> 
> > On 10/30/19 1:13 PM, Valerie Peng wrote:
> > Anyone has a minute to review this trivial fix? The supported key size info for \
> > the PKCS#11 PSS mechanism should be in bits. The current code treat them as in \
> > bytes. This does not cause any existing regression test failure because NSS has a \
> >                 very low value, i.e. 128, as the minimum key size.
> > Bug: https://bugs.openjdk.java.net/browse/JDK-8232950
> > Webrev: http://cr.openjdk.java.net/~valeriep/8232950/webrev.00/
> > Mach5 run passed.
> > Thanks,
> > Valerie
> 
> It looks good to me.
> 
> Tony


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic