Re: PKCS12 problem with JSS

2007-11-15 Thread David Stutzman
I was looking at how the password was getting converted to bytes today. The PKCS12 spec (downloaded from http://www.rsa.com/rsalabs/node.asp?id=2138, page 14) says the password bytes are BMPStrings with a null terminator and no byte order marks. It shows a sample password of "Beavis" and the byte

Re: PKCS12 problem with JSS

2007-11-06 Thread Glen Beasley
Could you zip up your test class and db then send to my email. thank you, glen David Stutzman wrote: > I've created a test class and a db to be used with it that shows the > following issues I get while exporting credentials to PKCS12 files using > JSS. > > 1) FIPS enabled generates PBA key

Re: PKCS12 problem with JSS

2007-11-06 Thread David Stutzman
I've created a test class and a db to be used with it that shows the following issues I get while exporting credentials to PKCS12 files using JSS. 1) FIPS enabled generates PBA key error (this issue was first mentioned in a separate thread) 2) 4 of the 8 PBEAlgorithms won't export the EPKI (tho

Re: PKCS12 problem with JSS (more info again)

2007-10-23 Thread David Stutzman
I did a lot of playing around yesterday. I added a note to the bug showing where the 16 byte salt is set as a #define and used no matter what algorithm is passed in from JSS. Unfortunately that didn't help out with decrypting the key. What I have determined is that if JSS creates an EPKI stru

Re: PKCS12 problem with JSS (more info)

2007-10-19 Thread David Stutzman
Per Nelson and Glen I filed https://bugzilla.mozilla.org/show_bug.cgi?id=400404. I know you said there are 2 separate issues but I think the first issue (incompatible PKCS12 files) is caused by the second (salt sizes for PBEAlgs) so I only filed the one bug. Based on my testing I think as l

Re: PKCS12 problem with JSS (more info)

2007-10-19 Thread David Stutzman
Nelson B wrote: > The first issue is (apparently) that PKCS#12 files created with JSS > that use an algorithm other than PBE_SHA1_DES3_CBC are unreadable by > OpenSSL. The bug should be filed against JSS. Please include code > and steps by which the problem can be reproduced. Do I hardcode a key

Re: PKCS12 problem with JSS (more info)

2007-10-18 Thread Nelson B
David, I agree with Glen that there are (at least) two separate issues here, and that bugs should be filed on both of them. The first issue is (apparently) that PKCS#12 files created with JSS that use an algorithm other than PBE_SHA1_DES3_CBC are unreadable by OpenSSL. The bug should be filed aga

Re: PKCS12 problem with JSS (more info)

2007-10-18 Thread Glen Beasley
hi David, you should file two bugs: JSS has different Salt size than NSS for PBE NSS appears to only handle PBE_SHA1_DES3_CBC for PKCS12 I will try to work on the bugs shortly. thanks, glen David Stutzman wrote: > David Stutzman wrote: > >> I'm generating keys in the softoken and then e

Re: PKCS12 problem with JSS (more info)

2007-10-18 Thread David Stutzman
David Stutzman wrote: > I'm generating keys in the softoken and then exporting them to PKCS12 > files with their freshly issued certs. I get the private key using the > getEncryptedPrivateKeyInfo method of CryptoStore. > > This epki is reporting a 16 byte salt but when I ask the algorithm for