[13] RFR JDK-7107615 "scalability bloker in javax.crypto.JceSecurity"

Alan Bateman Alan.Bateman at oracle.com
Mon May 13 09:36:37 UTC 2019



On 13/05/2019 10:04, Daniel Fuchs wrote:
> Hi Valery,
>
> On 11/05/2019 00:36, Valerie Peng wrote:
>> http://cr.openjdk.java.net/~valeriep/7107615/webrev.02/
>>
>> Please let me know if you have more comments.
>
> If I'm not mistaken, the only thing that references
> the IdentityWrapper<Provider> is the key in the WeakHashMap.
> Therefore, it is only weakly referenced and can be immediatly
> garbage collected. I don't think this is what you want?
>
> I believe what you are trying to achieve there is rather to use
> a plain ConcurrentHashMap, and have IdentityWrapper extend
> WeakReference<Provider> instead. You may need to store
> the hashCode in IdentityWrapper so that it doesn't change
> when the underlying Provider is garbage collected.
>
> Then you can use a ReferenceQueue to purge the map regularly.
Right, plus getVerificationResult is accessing the WeakHashMap without 
synchronization.

I think it would be useful to get a summary on whether this issue is 
trying to address one or two points. For the scalability point then I 
assume a CHM + computeIfAbsent would help. If the issue is also that you 
want the key (Provider) to be weak then it will require additional work, 
as Daniel points out.

-Alan




More information about the security-dev mailing list