Code Review Request: TLS 1.3 full handshake (JDK-8196584)

Adam Petcher adam.petcher at oracle.com
Fri Mar 23 19:35:54 UTC 2018


Note: I am not a Reviewer. This is not a Review.

I took a look at some of the files that I was working in during my 
extension development. I just have a few minor comments:

TransportContext.java, line 428: It's not clear why the outbound 
direction is closed here. Consider adding more comments to describe what 
is going on.

SessionId.java, lines 54: need to clone()?
SessionId.java, lines 81-87: you could do Arrays.hashCode(sessionId)

SSLExtension.java, line 441: The word "trad" is used here and in other 
places in the file. Should this be "trade"?

KeyShareExtension.java, lines 264-265: I think you can remove the 
comment, and the code is fine as it is. The problem of large ClientHello 
messages should be addressed when we add support for HelloRetryRequest.


On 2/22/2018 3:29 PM, Xuelei Fan wrote:
> Updated to use package private HKDF implementation.
>
> webrev (based on JDK-8185576):
>       http://cr.openjdk.java.net/~xuelei/8196584/webrev-step.01
>
> webrev (including JDK-8185576):
>       http://cr.openjdk.java.net/~xuelei/8196584/webrev-full.01
>
> Thanks,
> Xuelei
>
> On 2/20/2018 11:57 AM, Xuelei Fan wrote:
>> Hi,
>>
>> I'd like to invite you to review the TLS 1.3 full handshake 
>> implementation.  I appreciate it if I could have feedback before 
>> March 9, 2018.
>>
>> In the "JDK-8185576: New handshake implementation" [1] code review 
>> around, I was trying to re-org the TLS handshaking implementation in the
>> SunJSSE provider.  If you had reviewed that part, you can start from 
>> the following webrev that based on the update of JDK-8185576:
>>      http://cr.openjdk.java.net/~xuelei/8196584/webrev-step.00
>>
>> If you would like start from earlier, here is the webrev that 
>> contains the handshaking implementation re-org in JDK-8185576:
>>      http://cr.openjdk.java.net/~xuelei/8196584/webrev-full.00
>>
>>
>> This changeset only implements the full handshake of TLS 1.3, rather 
>> then a fully implementation of the latest TLS 1.3 draft [2].
>>
>> In this implementation, I removed:
>> 1. the KRB5 cipher suite implementation.
>> Please let me know if you are still using KRB5 cipher suite.  I may 
>> not add them back if no objections.
>>
>> 2. OCSP stapling.
>> This feature will be added back later.
>>
>> Resumption and key update, and more features may be added later.
>>
>> Thanks & Regards,
>> Xuelei
>>
>> [1]: 
>> http://mail.openjdk.java.net/pipermail/security-dev/2017-December/016642.html 
>>
>> [2]: https://tools.ietf.org/html/draft-ietf-tls-tls13-24




More information about the security-dev mailing list