[EXTERNAL]Re: Use of OpenSSL as JCE security provider if available on system
John Gray
John.Gray at entrustdatacard.com
Mon Apr 15 18:12:34 UTC 2019
Our Entrust Authority Security Toolkit for the Java platform also contains a FIPS 140-2 certified provider, and we add pluggable crypto ability to provide FIPS 140-2 crypto using the TLS protocol available in the JVM (when our FIPS 140-2 certified provider is being used).
Cheers,
John Gray
Entrust Datacard
-----Original Message-----
From: security-dev [mailto:security-dev-bounces at openjdk.java.net] On Behalf Of coderaptor
Sent: Friday, April 12, 2019 1:15 PM
To: Simone Bordet <simone.bordet at gmail.com>
Cc: OpenJDK Dev list <security-dev at openjdk.java.net>
Subject: [EXTERNAL]Re: Use of OpenSSL as JCE security provider if available on system
WARNING: This email originated outside of Entrust Datacard.
DO NOT CLICK links or attachments unless you trust the sender and know the content is safe.
I may be off-mark here (since I did not go over the mail thread with a fine comb), but one possible use is to satisfy cases where FIPS 140-2 validated library is a requirement. Currently, there are very few options in the market (BouncyCastle is FIPS 140-2, RSA BSAFE has exited), so the ability to use OpenSSL as a JCE provided would be immensely beneficial.
Thanks.
-ag
On Thu, Mar 21, 2019 at 8:43 AM Simone Bordet <simone.bordet at gmail.com> wrote:
>
> Hi,
>
> On Thu, Mar 21, 2019 at 3:43 PM Sean Mullan <sean.mullan at oracle.com> wrote:
> > But, if we want to explore this further, I think it first makes
> > sense to take a step back and focus more on what benefits an OpenSSL
> > provider or "native bridge" would provide.
>
> Benchmarked 3x-10x performance improvements.
> https://nbsoftsolutions.com/blog/dropwizard-1-3-upcoming-tls-improveme
> nts
>
> I guess the memory allocation/footprint has similar improvements, with
> the JDK insisting at requiring ~17 KiB buffers to read HTTP requests
> in the order of <1 KiB.
>
> --
> Simone Bordet
> ---
> Finally, no matter how good the architecture and design are, to
> deliver bug-free software with optimal performance and reliability,
> the implementation technique must be flawless. Victoria Livschitz
More information about the security-dev
mailing list