Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

back-port: use stronger cipher for secure storage #67

Merged

Conversation

gireeshpunathil
Copy link

move the default from weaker MD5/DES to a stronger SHA/AES which is available in JVMs.
PBEWithMD5AndDES -> PBEWithHmacSHA512AndAES_256

Refs: eclipse-equinox/equinox#285

/cc @tjwatson

@gireeshpunathil
Copy link
Author

pushed a commit to accommodate a change that we missed in the original PR. see eclipse-equinox/equinox#316

@gireeshpunathil
Copy link
Author

/cc @tjwatson could this be reviewed / landed?

move the default from weaker MD5/DES to a stronger SHA/AES
which is available in JVMs.

PBEWithMD5AndDES -> PBEWithHmacSHA512AndAES_256
@gireeshpunathil
Copy link
Author

@tjwatson - made those changes, pls take another look. learning a lot in versioning!

Copy link
Contributor

@tjwatson tjwatson left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@gireeshpunathil
Copy link
Author

Collaborators - PR is approved, let me know if there is anything pending here, or else pls do the needful to land, and then I can build a patch and deliver to my user who asked for it. thanks in advance!

@tjwatson tjwatson merged commit 17dbb7d into eclipse-equinox:R4_23_maintenance Feb 16, 2024
1 of 2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants