Skip to content

Conversation

@ties
Copy link
Member

@ties ties commented Sep 1, 2023

  • I have updated the changelog in README.md


public KeyPair generate() {
try {
final KeyPairGenerator generator = KeyPairGenerator.getInstance(ALGORITHM, provider);

Check failure

Code scanning / CodeQL

Use of a potentially broken or risky cryptographic algorithm

Cryptographic algorithm [EC](1) may not be secure, consider using a different algorithm.

private static final PregeneratedEcKeyPairFactory INSTANCE = new PregeneratedEcKeyPairFactory("SunEC");

private static final char[] PASSPHRASE = "passphrase".toCharArray();

Check failure

Code scanning / CodeQL

Hard-coded credential in API call

Hard-coded value flows to [sensitive API call](1). Hard-coded value flows to [sensitive API call](2). Hard-coded value flows to [sensitive API call](3). Hard-coded value flows to [sensitive API call](4). Hard-coded value flows to [sensitive API call](5).
Validate.isTrue(!resources.isEmpty(), "empty resources");
}

if (builderHelper.getSigningKeyPair().getPublic().getAlgorithm() == "EC") {

Check warning

Code scanning / CodeQL

Reference equality test on strings

String values compared with == .
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants