Movatterモバイル変換


[0]ホーム

URL:


Wayback Machine
523 captures
16 May 2007 - 21 Sep 2024
AprJUNAug
Previous capture06Next capture
202120222023
success
fail
COLLECTED BY
TIMESTAMPS
loading
The Wayback Machine - https://web.archive.org/web/20220606190100/http://openjdk.java.net/groups/security/

The Security Group

The Securitygroup is comprisedof developers who participate in the design, implementation, andmaintenance of Java Security components.

The current members of the Security Group arelisted in thecensus.

Submitting Vulnerabilities

If you have any potential vulnerability to report, please seeOracle'sReportingSecurity Vulnerabilities page or theOpenJDKVulnerabilities page.

Introduction

The term "Security" has broad meanings and interpretations. Itspans a wide range of areas, including cryptography, public keyinfrastructure, secure communication, authentication, and accesscontrol. The security component thus comprises a large set of APIs,tools, and implementations of commonly-used security algorithms andprotocols.

As security concepts such as permissions are tightly interwoventhroughout the entire Java source code, these component pages donot address issues in the other primary component areas (languagefeatures and virtual machine implementations, core libraries,graphics subsystems, hotspot, serviceability, etc). For a moredetailed treatment, please see the corresponding componentpages.

The primary emphasis of these pages is to explore the coresecurity components source bases, and hopefully, get developers upto speed quickly.

The Security Source Layout

The Java security components have been developed and expandedover the years, so the hierarchy may seem complicated simply due tothe large number of source files and directories. But the filesgenerally follow fairly straightforward patterns.

All of the security component source code is included in theOpenJDK project under thejdk subtree. As there are somany different components, they are split into many subdirectories,generally based on functional area. In most cases, the main API andimplementation-independent classes live in thejava/*orjavax/* hierarchy, and the implementation classesare in thesun/* hierarchy. The makefiles used tobuild these files are generally found in themakesubdirectory of the same name. Like any software projects, thereare exceptions to this guidance.

Cryptographic Cautions

Anyone who has worked in cryptography knows the import/export ofcryptographic code involves complicated legal issues. The JCE inOpenJDK has an open cryptographic interface, meaning it does notrestrict which providers can be used.Compliance with UnitedStates export controls and with local law governing theimport/export of products incorporating the JCE in the OpenJDK isthe responsibility of the licensee.

Building the security components

The workspace distributionMUST ALWAYS BE buildable fromscratch. As the security components have interdependencies withother parts of the JDK, you should always do a successful tops-downbuild on any new workspaceBEFORE making any changes. Itwill be very helpful to keep the build log, so that if any changesare not compiling, you can determine the correct makefile touse.

When you have changes that are almost ready to submit, youshould delete your build directories and rebuild everything fromscratch one last time, just to ensure you haven't introduced anincompatible build change or unexpected interdependency. If yourchanges might impact other workspaces (such as control, deploy, orinstall), you should build those workspaces as well. See the buildinstructions for more information on building the variousworkspaces.

As mentioned earlier, the makefiles generally follow the packagehierarchy. If you make a change tojava.security.KeyStore, you should go to themake/java/security and issue a make command fromthere.

Testing your changes

As a rule, unit tests for fixes and new functionality are prettymuch mandatory. However, before submitting changes, you should runthe relevent regression tests to make sure that the existing testscontinue to pass. For the security component, at a minimum youshould run:

The full suite will be run before your changes are placed intothe source tree. However, if your changes break something, it willbe a lot more work to diagnose, and then fix or back out. Do asmuch testing as possible.

Documentation

Community

OpenJDK logo
Installing
Contributing
Sponsoring
Developers' Guide
Vulnerabilities
JDK GA/EA Builds
Mailing lists
Wiki ·IRC
Bylaws ·Census
Legal
JEP Process
Source code
Mercurial
GitHub
Tools
Mercurial
Git
jtreg harness
Groups
(overview)
Adoption
Build
Client Libraries
Compatibility & Specification Review
Compiler
Conformance
Core Libraries
Governing Board
HotSpot
IDE Tooling & Support
Internationalization
JMX
Members
Networking
Porters
Quality
Security
Serviceability
Vulnerability
Web
Projects
(overview)
Amber
Annotations Pipeline 2.0
Audio Engine
Build Infrastructure
CRaC
Caciocavallo
Closures
Code Tools
Coin
Common VM Interface
Compiler Grammar
Detroit
Developers' Guide
Device I/O
Duke
Font Scaler
Framebuffer Toolkit
Graal
Graphics Rasterizer
HarfBuzz Integration
IcedTea
JDK 6
JDK 7
JDK 7 Updates
JDK 8
JDK 8 Updates
JDK 9
JDK (…17,18,19)
JDK Updates
JavaDoc.Next
Jigsaw
Kona
Kulla
Lambda
Lanai
Leyden
Lilliput
Locale Enhancement
Loom
Memory Model Update
Metropolis
Mission Control
Modules
Multi-Language VM
Nashorn
New I/O
OpenJFX
Panama
Penrose
Port: AArch32
Port: AArch64
Port: BSD
Port: Haiku
Port: Mac OS X
Port: MIPS
Port: Mobile
Port: PowerPC/AIX
Port: RISC-V
Port: s390x
Portola
SCTP
Shenandoah
Skara
Sumatra
ThreeTen
Tiered Attribution
Tsan
Type Annotations
XRender Pipeline
Valhalla
Verona
VisualVM
Wakefield
Zero
ZGC
Oracle logo
© 2022 Oracle Corporation and/or its affiliates
Terms of Use · License:GPLv2 ·Privacy ·Trademarks

[8]ページ先頭

©2009-2025 Movatter.jp