You are viewing a plain text version of this content. The canonical link for it is here.
Posted to common-issues@hadoop.apache.org by "Yi Liu (JIRA)" <ji...@apache.org> on 2014/06/22 09:21:25 UTC
[jira] [Resolved] (HADOOP-10713) Refactor
CryptoCodec#generateSecureRandom to take a byte[]
[ https://issues.apache.org/jira/browse/HADOOP-10713?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Yi Liu resolved HADOOP-10713.
-----------------------------
Resolution: Fixed
Fix Version/s: (was: 3.0.0)
fs-encryption (HADOOP-10150 and HDFS-6134)
Hadoop Flags: Reviewed
> Refactor CryptoCodec#generateSecureRandom to take a byte[]
> ----------------------------------------------------------
>
> Key: HADOOP-10713
> URL: https://issues.apache.org/jira/browse/HADOOP-10713
> Project: Hadoop Common
> Issue Type: Sub-task
> Components: security
> Affects Versions: fs-encryption (HADOOP-10150 and HDFS-6134)
> Reporter: Andrew Wang
> Assignee: Andrew Wang
> Priority: Trivial
> Fix For: fs-encryption (HADOOP-10150 and HDFS-6134)
>
> Attachments: HADOOP-10713.001.patch, HADOOP-10713.002.patch
>
>
> Following suit with the Java Random implementations, it'd be better if we switched CryptoCodec#generateSecureRandom to take a byte[] for parity.
> Also, let's document that this method needs to be thread-safe, which is an important consideration for CryptoCodec implementations.
--
This message was sent by Atlassian JIRA
(v6.2#6252)