JEP 287: SHA-3 Hash Algorithms

Valerie Peng valerie.peng at
Thu Apr 21 23:40:01 UTC 2016

Existing security/crypto APIs in JDK are all BYTE constrained. So, the 
implementation will be "BYTE-only".
Are you suggesting to explicitly mention in the SHA-3 JEP that these 
algorithm impl will be "BYTE-only"?

On 4/21/2016 1:40 AM, ecki at wrote:
> Hello,
> Just noticed, the validation program allows BIT- or BYTE-only APIs, the existing ones are all BYTE constrained. That would be a good definition in the JEP:
> Gruss
> Bernd

More information about the security-dev mailing list