mirror of
https://github.com/openjdk/jdk.git
synced 2025-09-19 02:24:40 +02:00
8253866: Security Libs Terminology Refresh
Reviewed-by: erikj, weijun, mullan
This commit is contained in:
parent
c2a3c7ef7d
commit
8554fe6ebc
15 changed files with 71 additions and 69 deletions
|
@ -1,5 +1,5 @@
|
|||
/*
|
||||
* Copyright (c) 1998, 2020, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 1998, 2021, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
|
@ -551,7 +551,7 @@ public final class JceKeyStore extends KeyStoreSpi {
|
|||
* }
|
||||
*
|
||||
* ended by a keyed SHA1 hash (bytes only) of
|
||||
* { password + whitener + preceding body }
|
||||
* { password + extra data + preceding body }
|
||||
*/
|
||||
|
||||
// password is mandatory when storing
|
||||
|
@ -897,7 +897,7 @@ public final class JceKeyStore extends KeyStoreSpi {
|
|||
|
||||
/**
|
||||
* To guard against tampering with the keystore, we append a keyed
|
||||
* hash with a bit of whitener.
|
||||
* hash with a bit of extra data.
|
||||
*/
|
||||
private MessageDigest getPreKeyedHash(char[] password)
|
||||
throws NoSuchAlgorithmException
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
/*
|
||||
* Copyright (c) 1997, 2019, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 1997, 2021, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
|
@ -90,7 +90,7 @@ class JarVerifier {
|
|||
/** makes code source singleton instances unique to us */
|
||||
private Object csdomain = new Object();
|
||||
|
||||
/** collect -DIGEST-MANIFEST values for blacklist */
|
||||
/** collect -DIGEST-MANIFEST values for deny list */
|
||||
private List<Object> manifestDigests;
|
||||
|
||||
public JarVerifier(byte rawBytes[]) {
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
/*
|
||||
* Copyright (c) 1997, 2020, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 1997, 2021, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
|
@ -551,7 +551,7 @@ public abstract class JavaKeyStore extends KeyStoreSpi {
|
|||
* }
|
||||
*
|
||||
* ended by a keyed SHA1 hash (bytes only) of
|
||||
* { password + whitener + preceding body }
|
||||
* { password + extra data + preceding body }
|
||||
*/
|
||||
|
||||
// password is mandatory when storing
|
||||
|
@ -817,7 +817,7 @@ public abstract class JavaKeyStore extends KeyStoreSpi {
|
|||
|
||||
/**
|
||||
* To guard against tampering with the keystore, we append a keyed
|
||||
* hash with a bit of whitener.
|
||||
* hash with a bit of extra data.
|
||||
*/
|
||||
private MessageDigest getPreKeyedHash(char[] password)
|
||||
throws NoSuchAlgorithmException
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
/*
|
||||
* Copyright (c) 2012, 2020, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 2012, 2021, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
|
@ -55,12 +55,12 @@ public final class UntrustedCertificates {
|
|||
@Override
|
||||
public Void run() {
|
||||
File f = new File(StaticProperty.javaHome(),
|
||||
"lib/security/blacklisted.certs");
|
||||
"lib/security/blocked.certs");
|
||||
try (FileInputStream fin = new FileInputStream(f)) {
|
||||
props.load(fin);
|
||||
} catch (IOException fnfe) {
|
||||
if (debug != null) {
|
||||
debug.println("Error parsing blacklisted.certs");
|
||||
debug.println("Error parsing blocked.certs");
|
||||
}
|
||||
}
|
||||
return null;
|
||||
|
|
|
@ -441,21 +441,22 @@ networkaddress.cache.negative.ttl=10
|
|||
# Policy for failed Kerberos KDC lookups:
|
||||
#
|
||||
# When a KDC is unavailable (network error, service failure, etc), it is
|
||||
# put inside a blacklist and accessed less often for future requests. The
|
||||
# put inside a secondary list and accessed less often for future requests. The
|
||||
# value (case-insensitive) for this policy can be:
|
||||
#
|
||||
# tryLast
|
||||
# KDCs in the blacklist are always tried after those not on the list.
|
||||
# KDCs in the secondary list are always tried after those not on the list.
|
||||
#
|
||||
# tryLess[:max_retries,timeout]
|
||||
# KDCs in the blacklist are still tried by their order in the configuration,
|
||||
# but with smaller max_retries and timeout values. max_retries and timeout
|
||||
# are optional numerical parameters (default 1 and 5000, which means once
|
||||
# and 5 seconds). Please notes that if any of the values defined here is
|
||||
# more than what is defined in krb5.conf, it will be ignored.
|
||||
# KDCs in the secondary list are still tried by their order in the
|
||||
# configuration, but with smaller max_retries and timeout values.
|
||||
# max_retries and timeout are optional numerical parameters (default 1 and
|
||||
# 5000, which means once and 5 seconds). Please note that if any of the
|
||||
# values defined here are more than what is defined in krb5.conf, it will be
|
||||
# ignored.
|
||||
#
|
||||
# Whenever a KDC is detected as available, it is removed from the blacklist.
|
||||
# The blacklist is reset when krb5.conf is reloaded. You can add
|
||||
# Whenever a KDC is detected as available, it is removed from the secondary
|
||||
# list. The secondary list is reset when krb5.conf is reloaded. You can add
|
||||
# refreshKrb5Config=true to a JAAS configuration file so that krb5.conf is
|
||||
# reloaded whenever a JAAS authentication is attempted.
|
||||
#
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue