-
Type:
Enhancement
-
Status: Resolved
-
Priority:
P3
-
Resolution: Fixed
-
Affects Version/s: 12
-
Fix Version/s: 12
-
Component/s: security-libs
-
Labels:
-
Subcomponent:
-
Resolved In Build:b24
Issue | Fix Version | Assignee | Priority | Status | Resolution | Resolved In Build |
---|---|---|---|---|---|---|
JDK-8216232 | 13 | Weijun Wang | P3 | Resolved | Fixed | team |
JDK-8257678 | 11-pool | Alexey Bakhtin | P3 | New | Unresolved |
This behaviour differs from JKS where certificates can be retrieved even when a null password is supplied. We should find a way to generate a PKCS12 keystore without encrypting the certificates. Furthermore, in order to completely remove the requirement of a password (when hardcoded or well-known is a security issue), we should also make the Mac part of the PKCS12 keystore optional.
Ultimately, all algorithms and parameters used in encrypting the keys, the certificates (or not encrypting), and calculating the Mac (or not calculating) should be customizable.
- backported by
-
JDK-8216232 Customizing the generation of a PKCS12 keystore
-
- Resolved
-
-
JDK-8257678 Customizing the generation of a PKCS12 keystore
-
- New
-
- blocks
-
JDK-8162628 The CACERTS keystore type
-
- Open
-
-
JDK-8153005 Upgrade the default PKCS12 encryption/MAC algorithms
-
- Resolved
-
- csr for
-
JDK-8202590 Customizing the generation of a PKCS12 keystore
-
- Closed
-
- duplicates
-
JDK-8208176 Enhance keytool to deal with password-less pkcs12 keystores nicely
-
- Closed
-
- relates to
-
JDK-8208176 Enhance keytool to deal with password-less pkcs12 keystores nicely
-
- Closed
-
-
JDK-8245169 EncryptedPrivateKeyInfo incorrectly decodes KDF algorithm
-
- Open
-
-
JDK-8224891 The CACERTS keystore type
-
- Draft
-