-
Sub-task
-
Resolution: Fixed
-
P4
-
None
-
None
-
b06
- duplicates
-
JDK-8253664 JSSE Client does not accept status_request extension in CertificateRequest messages for TLS 1.3
-
- Resolved
-
- relates to
-
JDK-8256872 SSLEngine negotiation fail exception behavior changed from fail-fast to fail-lazy
-
- Closed
-
-
JDK-8256665 Check session context for TLS 1.3 session resumption
-
- Closed
-
-
JDK-8256756 NPE in SupportedGroupsExtension
-
- Closed
-
-
JDK-8256767 Remove the temporary tls13VN field
-
- Closed
-
-
JDK-8256869 SSL session resumption/SNI with TLS1.2 causes StackOverflowError
-
- Closed
-
-
JDK-8256871 SSLContextImpl.statusResponseManager should be generated if required
-
- Closed
-
-
JDK-8256873 SSLSessionImpl.getLocalPrincipal() throws NPE
-
- Closed
-
-
JDK-8256875 SSLSocket stream close() does not close the associated socket
-
- Closed
-
-
JDK-8256876 SSLSocket#setEnabledCipherSuites is accepting empty string
-
- Closed
-
-
JDK-8256879 Still unable to use custom SSLEngine with default TrustManagerFactory after JDK-8207029
-
- Closed
-
-
JDK-8256880 sun.security.ssl.HandshakeHash.T12HandshakeHash constructor check backwards.
-
- Closed
-
-
JDK-8256882 The size of key_exchange may be wrong on FFDHE
-
- Closed
-
-
JDK-8256887 TLS 1.3 half-close and synchronization issues
-
- Closed
-
-
JDK-8256891 TLS 1.3 handshake server name indication is missing on a session resume
-
- Closed
-
-
JDK-8256897 TLS 1.3 server fails if ClientHello doesn't have pre_shared_key and psk_key_exchange_modes
-
- Closed
-
-
JDK-8256899 TLSv.1.3 interop problems with OpenSSL 1.1.1 when used on the client side with mutual auth
-
- Closed
-
-
JDK-8256908 Unable to use custom SSLEngine with default TrustManagerFactory after updating to JDK 11 b21
-
- Closed
-
-
JDK-8256914 UnsatisfiedLinkError or NoSuchAlgorithmException after removing sunec.dll
-
- Closed
-
-
JDK-8256666 Curve in certificate should not affect signature scheme when using TLSv1.3
-
- Closed
-
-
JDK-8256668 Delegated task created by SSLEngine throws BufferUnderflowException
-
- Closed
-
-
JDK-8256676 Delegated task created by SSLEngine throws java.nio.BufferUnderflowException
-
- Closed
-
-
JDK-8256677 Duplicated synchronized keywords in SSLSocketImpl
-
- Closed
-
-
JDK-8256681 Finished message validation failure should be decrypt_error alert
-
- Closed
-
-
JDK-8256684 Improperly use of the Optional API
-
- Closed
-
-
JDK-8256687 Incorrectly named signature scheme ecdsa_secp512r1_sha512
-
- Closed
-
-
JDK-8256689 Increase the priorities of GCM cipher suites
-
- Closed
-
-
JDK-8256749 No extensions debug log for ClientHello
-
- Closed
-
-
JDK-8256758 NullPointerException in sun.security.ssl.OutputRecord.changeWriteCiphers
-
- Closed
-
-
JDK-8256760 Possible race condition in TLS 1.3 session resumption
-
- Closed
-
-
JDK-8256800 RSASSA-PSS certificate cannot be selected for client auth on TLSv1.2
-
- Closed
-
-
JDK-8256868 SSL Handshake failures are reported with more generic SSLException
-
- Closed
-
-
JDK-8256878 SSLSocketImpl erroneously wraps SocketException
-
- Closed
-
-
JDK-8256881 The "supported_groups" extension in ServerHellos
-
- Closed
-
-
JDK-8256884 TLS 1.3 CertificateRequest message sometimes offers disallowed signature algorithms
-
- Closed
-
-
JDK-8256892 TLS 1.3 resumed session does not retain peer certificate chain
-
- Closed
-
-
JDK-8256898 TLS 1.3 session resumption with hello retry request failed with "illegal_parameter"
-
- Closed
-
-
JDK-8256905 TLSv1.3 fail with ClassException when EC keys are stored in PKCS11
-
- Closed
-
-
JDK-8256907 TLSv1.3 may generate TLSInnerPlainText longer than 2^14+1 bytes
-
- Closed
-
-
JDK-8256646 Errors in alert ssl message does not reflect the actual certificate status
-
- Closed
-
-
JDK-8256745 Misleading code in SSLCipher
-
- Closed
-
-
JDK-8256915 Unsupported ciphersuites may be offered by a TLS client
-
- Closed
-