-
Enhancement
-
Resolution: Fixed
-
P3
-
12
-
b24
Issue | Fix Version | Assignee | Priority | Status | Resolution | Resolved In Build |
---|---|---|---|---|---|---|
JDK-8216232 | 13 | Weijun Wang | P3 | Resolved | Fixed | team |
JDK-8257678 | 11.0.12-oracle | Prasadarao Koppula | P3 | Resolved | Fixed | b01 |
JDK-8265752 | 11.0.12 | Weijun Wang | P3 | Resolved | Fixed | b01 |
JDK-8266526 | openjdk8u342 | Alexey Bakhtin | P3 | Resolved | Fixed | b01 |
JDK-8264690 | 8u301 | Sean Coffey | P3 | Resolved | Fixed | b03 |
JDK-8266277 | 7u321 | Prasadarao Koppula | P3 | Resolved | Fixed | b01 |
JDK-8264691 | 7u311 | Prasadarao Koppula | P3 | Resolved | Fixed | b04 |
This behaviour differs from JKS where certificates can be retrieved even when a null password is supplied. We should find a way to generate a PKCS12 keystore without encrypting the certificates. Furthermore, in order to completely remove the requirement of a password (when hardcoded or well-known is a security issue), we should also make the Mac part of the PKCS12 keystore optional.
Ultimately, all algorithms and parameters used in encrypting the keys, the certificates (or not encrypting), and calculating the Mac (or not calculating) should be customizable.
- backported by
-
JDK-8216232 Customizing the generation of a PKCS12 keystore
- Resolved
-
JDK-8257678 Customizing the generation of a PKCS12 keystore
- Resolved
-
JDK-8264690 Customizing the generation of a PKCS12 keystore
- Resolved
-
JDK-8264691 Customizing the generation of a PKCS12 keystore
- Resolved
-
JDK-8265752 Customizing the generation of a PKCS12 keystore
- Resolved
-
JDK-8266277 Customizing the generation of a PKCS12 keystore
- Resolved
-
JDK-8266526 Customizing the generation of a PKCS12 keystore
- Resolved
- blocks
-
JDK-8153005 Upgrade the default PKCS12 encryption/MAC algorithms
- Resolved
-
JDK-8162628 The CACERTS keystore type
- Closed
- csr for
-
JDK-8202590 Customizing the generation of a PKCS12 keystore
- Closed
- duplicates
-
JDK-8245169 EncryptedPrivateKeyInfo incorrectly decodes KDF algorithm
- Closed
-
JDK-8208176 Enhance keytool to deal with password-less pkcs12 keystores nicely
- Closed
- relates to
-
JDK-8266400 importkeystore fails to a password less pkcs12 keystore
- Resolved
-
JDK-8266182 Automate manual steps listed in the test jdk/sun/security/pkcs12/ParamsTest.java
- Resolved
-
JDK-8208176 Enhance keytool to deal with password-less pkcs12 keystores nicely
- Closed
-
JDK-8266293 Key protection using PBEWithMD5AndDES fails with "java.security.InvalidAlgorithmParameterException: Salt must be 8 bytes long"
- Resolved
-
JDK-8245169 EncryptedPrivateKeyInfo incorrectly decodes KDF algorithm
- Closed
-
JDK-8267880 Upgrade the default PKCS12 MAC algorithm
- Resolved
-
JDK-8224891 The CACERTS keystore type
- Closed