I would like to know if I have any options to mitigate this. I'm also fully expecting the "JSS has no full-time developers, patches accepted" answer.

The Sun^H^H^HOracle JCE "Standard Names Document" [0], which lays out what the all the algorithm names/permutations are, lists the EC Signature algorithms as such:
NONEwithECDSA
SHA1withECDSA
SHA256withECDSA
SHA384withECDSA
SHA512withECDSA
(ECDSA)

If I query the Mozilla-JSS provider for the algorithms it supports, I get the following EC Signature algorithms:
SHA1withEC
SHA256withEC
SHA384withEC
SHA512withEC

Is there any way to change/add some aliases so the Mozilla-JSS provider uses the official JCE naming?

I'm running into an issue using the CertPath API where it's bombing out [1] chaining my ECC CA hierarchy because it can't find a provider that supports SHA384withECDSA, which, while technically correct, isn't quite the situation.

I know I can probably go in and change the way JSS reports the algorithm to the JCE, but won't I run into trouble with needing the signed crypto provider?

Thanks,
Dave

[0]: http://download.oracle.com/javase/6/docs/technotes/guides/security/StandardNames.html#Signature

[1]: certpath: SunCertPathBuilder.depthFirstSearchForward(): validation failed: java.security.NoSuchAlgorithmException: SHA384withECDSA Signature not available java.security.NoSuchAlgorithmException: SHA384withECDSA Signature not available
        at java.security.Signature.getInstance(Signature.java:193)
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to