-
Notifications
You must be signed in to change notification settings - Fork 148
8333857: Test sun/security/ssl/SSLSessionImpl/ResumeChecksServer.java failed: Existing session was used #2494
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
👋 Welcome back goetz! A progress list of the required criteria for merging this PR into |
|
@GoeLin This change now passes all automated pre-integration checks. ℹ️ This project also has non-automated pre-integration requirements. Please see the file CONTRIBUTING.md for details. After integration, the commit message for the final commit will be: You can use pull request commands such as /summary, /contributor and /issue to adjust it as needed. At the time when this comment was updated there had been 18 new commits pushed to the
As there are no conflicts, your changes will automatically be rebased on top of these commits when integrating. If you prefer to avoid this automatic rebasing, please check the documentation for the /integrate command for further details. ➡️ To integrate this PR with the above commit message to the |
|
This backport pull request has now been updated with issue from the original commit. |
| params.setNeedClientAuth(true); | ||
| params.setAlgorithmConstraints(new NoSig( | ||
| first ? "ecdsa_secp521r1_sha512" : | ||
| "ecdsa_secp384r1_sha384")); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Seems those constraints ecdsa_secp521r1_sha512 / ecdsa_secp384r1_sha384 came in with https://bugs.openjdk.org/browse/JDK-8357033 .
Have you checked if this is okay ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good catch, this is a change of JDK-8357033 I included here.
But I think the change is not really related to 8357033, but rather giving the test more recent ciphers. They are both also available in 21.
We could probably use the old code (ecdsa/rsa), but maybe using the new ones is a good improvement? It is unlikely 8357033 is backported.
|
Looks mostly okay; not 100% sure about the SIGNATURE_SCHEME constraints settings, do you want them here? |
|
/integrate |
|
Going to push as commit 2d4c2aa.
Your commit was automatically rebased without conflicts. |
I backport this for parity with 21.0.11-oracle.
Needed to resolve and adapt larger parts of ResumeChecksServer.java as https://bugs.openjdk.org/browse/JDK-8357033 is not in 21.
Progress
Issue
Reviewers
Reviewing
Using
gitCheckout this PR locally:
$ git fetch https://git.openjdk.org/jdk21u-dev.git pull/2494/head:pull/2494$ git checkout pull/2494Update a local copy of the PR:
$ git checkout pull/2494$ git pull https://git.openjdk.org/jdk21u-dev.git pull/2494/headUsing Skara CLI tools
Checkout this PR locally:
$ git pr checkout 2494View PR using the GUI difftool:
$ git pr show -t 2494Using diff file
Download this PR as a diff file:
https://git.openjdk.org/jdk21u-dev/pull/2494.diff
Using Webrev
Link to Webrev Comment