[ 
https://issues.apache.org/jira/browse/QPID-3973?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13261025#comment-13261025
 ] 

Robbie Gemmell commented on QPID-3973:
--------------------------------------

Ok Jason thats great, thanks for sharing :)

As an update on my earlier sidenote: the icon that usually indicates 
attachments have been granted for inclusion appears to have disappeared from 
JIRAs I know I ticked the box myself on previously, so please disregard my 
comment if you actually did tick the box Jesse. I wonder if a JIRA upgrade has 
broken the plugin or it has simply been removed, I'll try to take a look about 
and/or ask the ASF infrastructure team tomorrow.

Robbie
                
> QPID Java SSLUtil does not support non-JKS key store types
> ----------------------------------------------------------
>
>                 Key: QPID-3973
>                 URL: https://issues.apache.org/jira/browse/QPID-3973
>             Project: Qpid
>          Issue Type: Bug
>          Components: Java Client, Java Common
>    Affects Versions: 0.10
>         Environment: Java 1.6 in FIPS mode (NSS)
>            Reporter: Jesse Sightler
>              Labels: nss, pkcs11
>         Attachments: qpid-java.diff
>
>
> We are required to run our system in FIPS-compliant mode, using the NSS 
> library for Java Security. In this mode, we cannot use JKS for private key 
> storage.
> Unfortunately, SSLUtil does not support configurable KeyStore types, and will 
> throw an exception if we attempt to do this.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: 
https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira

        

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@qpid.apache.org
For additional commands, e-mail: dev-h...@qpid.apache.org

Reply via email to