[crac] RFR: Reseed secure random on checkpoint restore [v2]

Alexey Bakhtin abakhtin at openjdk.java.net
Fri Dec 24 12:14:07 UTC 2021


> Proposed changes in the SecureRandom implementation allow invalidating and reseeding SHA1PRNG secure random during checkpoint/restore. SHA1PRNG can be invalidated and reseeded in case of being created with a default embedded seed generator. Also, SHA1PRNG is used as an additional seed generator to the SUN NativePRNG implementation, so it is desirable to have reseeded SHA1PRNG after restore.
> Two jtreg tests added: 
> - verify if no deadlocks introduced by checkpoint/restore
> - verify if SHA1PRNG is reseeded if created with default embedded seed generator

Alexey Bakhtin has updated the pull request incrementally with one additional commit since the last revision:

  Add separate JDKResorce for seeder

-------------

Changes:
  - all: https://git.openjdk.java.net/crac/pull/7/files
  - new: https://git.openjdk.java.net/crac/pull/7/files/dc636105..e26d0b81

Webrevs:
 - full: https://webrevs.openjdk.java.net/?repo=crac&pr=7&range=01
 - incr: https://webrevs.openjdk.java.net/?repo=crac&pr=7&range=00-01

  Stats: 65 lines in 1 file changed: 36 ins; 25 del; 4 mod
  Patch: https://git.openjdk.java.net/crac/pull/7.diff
  Fetch: git fetch https://git.openjdk.java.net/crac pull/7/head:pull/7

PR: https://git.openjdk.java.net/crac/pull/7


More information about the crac-dev mailing list