[RFR] JDK-8225436 : Stapled OCSPResponses should be added to PKIXRevocationChecker irrespective of revocationEnabled flag

Sean Mullan sean.mullan at oracle.com
Mon Aug 19 19:55:47 UTC 2019


Looks good. There is one case where an unnecessary ArrayList is created 
(on line 406-7) if revocation is disabled AND we don't find a 
RevocationChecker -- it would be useful if you could avoid that by 
iterating over the checkers before creating the array list, since it is 
probably the more common case. In fact, there is probably some 
unnecessary copying even before that since the PKIXParameters has 
already been cloned in engineValidate. We avoid some of that 
cloning/copying in the certpath provider (see the ValidatorParams class 
in sun.security.provider.certpath.PKIX) - you could look into that to 
see if you could use that here - I'll also think about it again when I 
have a little more time ...

--Sean

On 8/16/19 5:25 PM, Jamil Nimeh wrote:
> Hello all,
> 
> This fixes a bug where stapled OCSP responses were being ignored by the 
> internal Validator in all cases when revocation checking is disabled. If 
> the TrustManagerFactory is initialized with CertPathParameters that 
> include a PKIXRevocationChecker, then that should override the 
> setRevocationEnabled flag and any stapled responses should be taken into 
> account during path validation.
> 
> Bug: https://bugs.openjdk.java.net/browse/JDK-8225436
> 
> Webrev: http://cr.openjdk.java.net/~jnimeh/reviews/8225436/webrev.01/
> 
> Thanks,
> 
> --Jamil
> 



More information about the security-dev mailing list