You are viewing a plain text version of this content. The canonical link for it is here.
Posted to common-issues@hadoop.apache.org by "Andrew Wang (JIRA)" <ji...@apache.org> on 2014/06/18 21:00:25 UTC

[jira] [Updated] (HADOOP-10713) Refactor CryptoCodec#generateSecureRandom to take a byte[]

     [ https://issues.apache.org/jira/browse/HADOOP-10713?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Andrew Wang updated HADOOP-10713:
---------------------------------

    Summary: Refactor CryptoCodec#generateSecureRandom to take a byte[]  (was: Document thread-safety of CryptoCodec#generateSecureRandom)

> Refactor CryptoCodec#generateSecureRandom to take a byte[]
> ----------------------------------------------------------
>
>                 Key: HADOOP-10713
>                 URL: https://issues.apache.org/jira/browse/HADOOP-10713
>             Project: Hadoop Common
>          Issue Type: Sub-task
>          Components: security
>    Affects Versions: fs-encryption (HADOOP-10150 and HDFS-6134)
>            Reporter: Andrew Wang
>            Assignee: Andrew Wang
>            Priority: Trivial
>             Fix For: 3.0.0
>
>         Attachments: HADOOP-10713.001.patch
>
>
> Random implementations have to deal with thread-safety; this should be specified in the javadoc so implementors know to do this for CryptoCodec subclasses.



--
This message was sent by Atlassian JIRA
(v6.2#6252)