JEP 287: SHA-3 Hash Algorithms
valerie.peng at oracle.com
Thu Apr 21 23:40:01 UTC 2016
Existing security/crypto APIs in JDK are all BYTE constrained. So, the
implementation will be "BYTE-only".
Are you suggesting to explicitly mention in the SHA-3 JEP that these
algorithm impl will be "BYTE-only"?
On 4/21/2016 1:40 AM, ecki at zusammenkunft.net wrote:
> Just noticed, the validation program allows BIT- or BYTE-only APIs, the existing ones are all BYTE constrained. That would be a good definition in the JEP:
More information about the security-dev