Re: Unable to read PKCS#8 file generated using OpenSSL command line tool

2008-09-30 Thread Elio Maldonado
I was able to export a PKCS #8 encrypted key with either SEC_OID_DES_EDE3_CBC or SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_3KEY_TRIPLE_DES_CBC which OpenSSL reads, I did not try other algorithms at the. A somewhat sanitized extract of the pertinent function follows: --

Re: Unable to read PKCS#8 file generated using OpenSSL command line tool

2008-09-30 Thread Julien R Pierre - Sun Microsystems
Subrata, Subrata Mazumdar wrote: > > > Wan-Teh Chang wrote: >> On Sat, Sep 27, 2008 at 12:17 PM, Nelson B Bolyard >> <[EMAIL PROTECTED]> wrote: >> >>> Subrata Mazumdar wrote, On 2008-09-27 06:33: >>> Actually, the problem is even worse - some of the applications use unencrypted

Re: Unable to read PKCS#8 file generated using OpenSSL command line tool

2008-09-30 Thread Robert Relyea
Subrata Mazumdar wrote: Bob, I implemented the importing and exporting of private key from PKCS#8 file using NSS API. Here is what I found based on my testing : Using Mozilla NSS API, I can only import/export private key in PKCS#8 format with "PKCS12 V2 PBE With SHA1 And 3KEY Triple DES-cbc"

Re: Unable to read PKCS#8 file generated using OpenSSL command line tool

2008-09-30 Thread Jean-Marc Desperrier
Nelson B Bolyard wrote: > [...] > What about that problem necessitates the use of PKCS#8? > On what stone is it chiseled that servers must read private keys from > PKCS#8 files every time they start up? It makes sense to limit the number of formats used, and to say the private key and the cert sh

Re: Unable to read PKCS#8 file generated using OpenSSL command line tool

2008-09-30 Thread Jean-Marc Desperrier
Nelson B Bolyard wrote: > [...]. Applications > that generate private keys and then just leave them lying around in > unprotected files are having fun with cryptography, but aren't serious > about security. NSS is serious about security. Using passwords stored in configuration files is being ser