RFR 8171277: Elliptic Curves for Security in Crypto
Adam Petcher
adam.petcher at oracle.com
Tue Mar 20 16:29:52 UTC 2018
Latest webrev: http://cr.openjdk.java.net/~apetcher/8171277/webrev.02/
This webrev incorporates the changes from the field arithmetic code (in
my other code review), as well as changes from Sean's comments.
On 3/15/2018 2:46 PM, Sean Mullan wrote:
> I reviewed the rest of the code and only have 2 other comments:
>
> * XECIterative.java
>
> 53: typo s/taks/takes
>
> * Convert.java
>
> Since these are static methods that could be useful to other
> regression tests, consider moving this to a test library location and
> using the jtreg @library label. However, I'm ok if you don't do this
> now - we can always do it later.
>
> --Sean
>
> On 3/12/18 3:03 PM, Sean Mullan wrote:
>> On 3/9/18 8:25 AM, Adam Petcher wrote:
>>> New webrev: http://cr.openjdk.java.net/~apetcher/8171277/webrev.01/
>>>
>>
>>>> I think somewhere there should be a sentence or two on the
>>>> difference between XECKeys and ECKeys and when you would want to
>>>> use each. This is important enough that I think some detail should
>>>> be in the javadoc to help users distinguish them. Perhaps put it in
>>>> the XEC class description. Maybe more details can go in the JCA
>>>> security guide.
>>>
>>> I added a sentence to the comments in XECKey, but I'm not sure how
>>> much we should say here. I don't know if we should get into
>>> mathematical details. Take a look at the new wording and let me know
>>> if I should add more information.
>>
>> Looks good. I would probably also put a similar sentence in the
>> XECPublicKey and XECPrivateKey classes just so it is not missed.
>>
>> All other changes look good.
>>
>> --Sean
More information about the security-dev
mailing list