Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Revert to Java impl when non-default SecureRandom present #97

Merged
merged 1 commit into from
Dec 12, 2023

Conversation

KostasTsiounis
Copy link
Contributor

If one initializes any of the NativeECKeyPairGenerator or NativeXDHKeyPairGenerator with a SecureRandom implementation, it is effectively ignored, as the equivalent OpenSSL code is used instead.

This fix changes that to using OpenSSL only when no or the default Sun implementation of SecureRandom is provided. In any other case, the original Java implementation is used to generate the appropriate KeyPair.

Back-ported from: ibmruntimes/openj9-openjdk-jdk#711

Fixes: eclipse-openj9/openj9#17633

Signed-off by: Kostas Tsiounis [email protected]

@pshipton
Copy link
Member

jenkins compile amac jdk21

@pshipton pshipton merged commit 11223f1 into ibmruntimes:openj9 Dec 12, 2023
4 checks passed
@pshipton
Copy link
Member

Testing passed in a grinder.
https://openj9-jenkins.osuosl.org/view/Test/job/Grinder/3145/

@KostasTsiounis KostasTsiounis deleted the secure_random branch May 16, 2024 18:26
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

jdk21 com/sun/crypto/provider/DHKEM/Compliance Undetermined for -6756058909602679649
2 participants