[RFR] JDK-8225436 : Stapled OCSPResponses should be added to PKIXRevocationChecker irrespective of revocationEnabled flag

Jamil Nimeh jamil.j.nimeh at oracle.com
Tue Aug 20 16:14:46 UTC 2019


Thanks for the review, Sean.  I've made a couple changes based on your 
recommendations.  I don't create a mutable ArrayList any longer in the 
case where we're making a new PKIXRevocationChecker.  In that one case I 
just directly add it to the PKIXBuilderParameters and if one already 
exists from the immutable CPC list I can just add the responses to it 
and push the whole list back.

http://cr.openjdk.java.net/~jnimeh/reviews/8225436/webrev.02/

--Jamil

On 8/19/19 12:55 PM, Sean Mullan wrote:
> Looks good. There is one case where an unnecessary ArrayList is 
> created (on line 406-7) if revocation is disabled AND we don't find a 
> RevocationChecker -- it would be useful if you could avoid that by 
> iterating over the checkers before creating the array list, since it 
> is probably the more common case. In fact, there is probably some 
> unnecessary copying even before that since the PKIXParameters has 
> already been cloned in engineValidate. We avoid some of that 
> cloning/copying in the certpath provider (see the ValidatorParams 
> class in sun.security.provider.certpath.PKIX) - you could look into 
> that to see if you could use that here - I'll also think about it 
> again when I have a little more time ...
>
> --Sean
>
> On 8/16/19 5:25 PM, Jamil Nimeh wrote:
>> Hello all,
>>
>> This fixes a bug where stapled OCSP responses were being ignored by 
>> the internal Validator in all cases when revocation checking is 
>> disabled. If the TrustManagerFactory is initialized with 
>> CertPathParameters that include a PKIXRevocationChecker, then that 
>> should override the setRevocationEnabled flag and any stapled 
>> responses should be taken into account during path validation.
>>
>> Bug: https://bugs.openjdk.java.net/browse/JDK-8225436
>>
>> Webrev: http://cr.openjdk.java.net/~jnimeh/reviews/8225436/webrev.01/
>>
>> Thanks,
>>
>> --Jamil
>>



More information about the security-dev mailing list