RFR 10 (XS): 8184673: Fix compatibility issue in AlgorithmChecker for 3rd party JCE providers
Sean Mullan
sean.mullan at oracle.com
Fri Jul 14 18:05:55 UTC 2017
It would be nice to write a regression test for this, but I suspect it
is quite a bit of work or not practical. Please consider it, or add an
appropriate noreg label to the bug.
--Sean
On 7/14/17 12:56 PM, Anthony Scarpino wrote:
> On 07/14/2017 08:37 AM, Langer, Christoph wrote:
>> Hi,
>>
>> after the discussion in thread
>> http://mail.openjdk.java.net/pipermail/security-dev/2017-July/016068.html,
>> please review my proposed change:
>>
>> Bug: https://bugs.openjdk.java.net/browse/JDK-8184673
>>
>> Change:
>>
>> *diff -r 76fca9438ee9 -r 9c2438e0a823
>> src/java.base/share/classes/sun/security/provider/certpath/AlgorithmChecker.java*
>>
>>
>> ---
>> a/src/java.base/share/classes/sun/security/provider/certpath/AlgorithmChecker.java
>> Thu Jul 13 13:42:39 2017 +0200
>> +++
>> b/src/java.base/share/classes/sun/security/provider/certpath/AlgorithmChecker.java
>> Fri Jul 14 17:35:36 2017 +0200
>>
>> @@ -270,7 +270,7 @@
>>
>> AlgorithmParameters currSigAlgParams =
>> algorithmId.getParameters();
>>
>> PublicKey currPubKey = cert.getPublicKey();
>> - String currSigAlg = ((X509Certificate)cert).getSigAlgName();
>> + currSigAlg = x509Cert.getSigAlgName();
>
> I think you need to prepend with "String " to your change.
>
>>
>> // Check the signature algorithm and parameters against
>> constraints.
>>
>> if (!constraints.permits(SIGNATURE_PRIMITIVE_SET, currSigAlg,
>
> Otherwise it looks fine.
>
> Tony
>
More information about the security-dev
mailing list