The Version table provides details related to the release that this issue/RFE will be addressed.
Unresolved : Release in which this issue/RFE will be addressed. Resolved: Release in which this issue/RFE has been resolved. Fixed : Release in which this issue/RFE has been fixed. The release containing this fix may be available for download as an Early Access Release or a General Availability Release.
Test used for verification:
/open/test jdk/javax/crypto/SecretKeyFactory/SecKeyFacSunJCEPrf.java
Tested on linux-x64 (llg00bux.uk.oracle.com)
Jdk11.0.5 b01: test PASSED
Jdk13-ea b10 : test FAILED
There was one attached java file with the bug and ran that also :-
Jdk11.0.5 b01-PASS
EXPECTED -
Java SecurityProvider list:
Provider at position = 1 has name = SUN
Provider at position = 2 has name = SunRsaSign
Provider at position = 3 has name = SunEC
Provider at position = 4 has name = SunJSSE
Provider at position = 5 has name = SunJCE
Provider at position = 6 has name = SunJGSS
Provider at position = 7 has name = SunSASL
Provider at position = 8 has name = XMLDSig
Provider at position = 9 has name = SunPCSC
Provider at position = 10 has name = SunMSCAPI
Added Provider to Position 1: BCFIPS
BouncyCastle FIPStatus: true
BouncyCastle FIPS Approved Mode: true
JDK 13-ea b10 - FAILED
Output:
org.bouncycastle.crypto.IllegalKeyException: Key size for HMAC must be at least 112 bits in approved mode: SHA-1/HMAC
at org.bouncycastle.crypto.fips.FipsSHS$MACOperatorFactory.createMAC(Unknown Source)
at org.bouncycastle.crypto.fips.FipsSHS$MACOperatorFactory.createMAC(Unknown Source)
at org.bouncycastle.crypto.fips.FipsMACOperatorFactory.createOutputMACCalculator(Unknown Source)
at org.bouncycastle.crypto.fips.FipsMACOperatorFactory.createOutputMACCalculator(Unknown Source)
Resolution: The fix succeeded.