[ 
https://issues.apache.org/jira/browse/TIKA-4194?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17816781#comment-17816781
 ] 

Hudson commented on TIKA-4194:
------------------------------

SUCCESS: Integrated in Jenkins build Tika » tika-main-jdk11 #1504 (See 
[https://ci-builds.apache.org/job/Tika/job/tika-main-jdk11/1504/])
[TIKA-4194] Fix for unrecognized pkcs12 keystores (#1589) (github: 
[https://github.com/apache/tika/commit/c2acd713bb31b88419ebc70dd31c4bfb23bd390f])
* (edit) tika-core/src/main/resources/org/apache/tika/mime/tika-mimetypes.xml


> tika fails to detect certain pkcs12 keystores types p12 pfx
> -----------------------------------------------------------
>
>                 Key: TIKA-4194
>                 URL: https://issues.apache.org/jira/browse/TIKA-4194
>             Project: Tika
>          Issue Type: Bug
>          Components: detector
>    Affects Versions: 2.9.1
>            Reporter: Lonzak
>            Priority: Major
>
> We use tika to detect the type of a file which is uploaded. In most cases 
> this works quite well. However recently some files were rejected because tika 
> reports an invalid file type. We'll get
> {code:java}
> APPLICATION/OCTET-STREAM{code}
> instead of
> {code:java}
> APPLICATION/X-X509-KEY{code}
> I did an analysis and found that tika doesn't recognize certain types of 
> pkcs12 keystores. The test keystores can be found 
> [here|https://github.com/redhat-qe-security/keyfile-corpus/tree/master].
> I created a list to show which ones are effected.  Out of 157 keystores 132 
> are correctly detected and 25 are not.
>  
> ||#||correct?||type||filename||
> |1|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|dsa(1024,sha1),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |2|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|dsa(1024,sha1),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |3|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|ecdsa(P-256,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |4|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|ecdsa(P-256,sha256),cert(none),key(none),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |5|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|ecdsa(P-256,sha256),cert(none),key(none).p12|
> |6|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|ecdsa(P-256,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |7|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(0),iter(2048),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |8|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(0),iter(2048),keyLen(default),prf(default)),des-ede3-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |9|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(16),iter(2048),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |10|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(16),iter(2048),keyLen(default),prf(default)),des-ede3-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |11|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(64),iter(1000000),keyLen(default),prf(hmacWithSHA512)),aes-256-cbc(IV(16)))),mac(sha512,salt(64),iter(1000000)),pass(ascii).p12|
> |12|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(1),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |13|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(1),keyLen(default),prf(default)),des-ede3-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |14|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(1000000),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |15|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(1000000),keyLen(default),prf(default)),des-ede3-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |16|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(16),prf(default)),rc2-cbc(keyBits(56=128bit),IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |17|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(16),prf(hmacWithSHA256)),rc2-cbc(keyBits(56=128bit),IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |18|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(5),prf(default)),rc2-cbc(keyBits(160=40bit),IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |19|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(5),prf(hmacWithSHA256)),rc2-cbc(keyBits(160=40bit),IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |20|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(8),prf(default)),rc2-cbc(keyBits(120=64bit),IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |21|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |22|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(unicode,openssl-1.0.2k-1.fc24).p12|
> |23|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-192-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |24|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-256-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |25|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aria-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |26|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aria-192-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |27|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aria-256-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |28|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),des-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |29|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),des-ede3-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |30|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),des-ede3-cbc(IV(8)))),mac(sha256,salt(8),iter(2048)),pass-mac(ascii),pass-cipher(ascii2).p12|
> |31|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmac-sha3-224)),aes-128-cbc(IV(16)))),mac(sha256,salt(8),iter(2048)),pass(ascii).p12|
> |32|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmac-sha3-256)),aes-128-cbc(IV(16)))),mac(sha256,salt(8),iter(2048)),pass(ascii).p12|
> |33|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmac-sha3-384)),aes-128-cbc(IV(16)))),mac(sha256,salt(8),iter(2048)),pass(ascii).p12|
> |34|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmac-sha3-512)),aes-128-cbc(IV(16)))),mac(sha256,salt(8),iter(2048)),pass(ascii).p12|
> |35|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithMD5)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |36|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithMD5)),des-ede3-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |37|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA224)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |38|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA224)),des-ede3-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |39|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |40|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(unicode,openssl-1.1.1-d1da335c5).p12|
> |41|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),aes-128-cbc(IV(16)))),mac(sha3-224,salt(8),iter(2048)),pass(ascii).p12|
> |42|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),aes-128-cbc(IV(16)))),mac(sha3-256,salt(8),iter(2048)),pass(ascii).p12|
> |43|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),aes-128-cbc(IV(16)))),mac(sha3-384,salt(8),iter(2048)),pass(ascii).p12|
> |44|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),aes-128-cbc(IV(16)))),mac(sha3-512,salt(8),iter(2048)),pass(ascii).p12|
> |45|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),aes-128-cbc(IV(16)))),mac(sha512-224,salt(8),iter(2048)),pass(ascii).p12|
> |46|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),aes-128-cbc(IV(16)))),mac(sha512-256,salt(8),iter(2048)),pass(ascii).p12|
> |47|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),bf-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |48|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),camellia-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |49|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),camellia-192-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |50|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),camellia-256-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |51|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),cast5-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |52|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),des-ede3-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |53|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),idea-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |54|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),seed-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |55|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA384)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |56|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA384)),des-ede3-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |57|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA512)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |58|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA512)),des-ede3-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |59|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA512_224)),aes-128-cbc(IV(16)))),mac(sha256,salt(8),iter(2048)),pass(ascii).p12|
> |60|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA512_256)),aes-128-cbc(IV(16)))),mac(sha256,salt(8),iter(2048)),pass(ascii).p12|
> |61|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(scrypt(salt(64),N(16384),r(8),p(1)),aes-256-cbc(IV(16)))),mac(sha512,salt(64),iter(1000000)),pass(ascii).p12|
> |62|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithMD2AndDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |63|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithMD2AndRC2-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |64|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithMD5AndDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |65|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithMD5AndRC2-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |66|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithSHA1AndDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |67|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithSHA1AndRC2-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |68|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithSHAAnd128BitRC2-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |69|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithSHAAnd128BitRC4,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |70|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithSHAAnd2-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |71|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(0),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |72|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(16),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |73|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(1)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |74|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(1000000)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |75|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |76|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(pbewithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |77|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithSHAAnd40BitRC4,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |78|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(none),key(none),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |79|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(none),key(none),mac(sha256,salt(8),iter(2048)),pass(ascii).p12|
> |80|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(none),key(none),mac(sha256,salt(8),iter(2048)),pass(empty).p12|
> |81|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(none),key(none).p12|
> |82|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(none),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(16),prf(default)),rc2-cbc(keyBits(56=128bit),IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |83|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(none),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(5),prf(default)),rc2-cbc(keyBits(160=40bit),IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |84|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(none),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(8),prf(default)),rc2-cbc(keyBits(120=64bit),IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |85|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(none),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |86|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(none),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-192-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |87|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(none),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-256-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |88|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(none),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),des-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |89|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(none),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),des-ede3-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |90|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(PBES2(PBKDF2(salt(18),iter(5127),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),key(PBES2(PBKDF2(salt(16),iter(5301),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(10240)),pass(ascii).p12|
> |91|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |92|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(16),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |93|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(5318)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(5204)),mac(sha1,salt(8),iter(10240),pass(ascii).p12|
> |94|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(0),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(0),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |95|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(16),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(16),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |96|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(1)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(1)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |97|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(1000000)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(1000000)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |98|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(16),prf(default)),rc2-cbc(keyBits(58=128bit),IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |99|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(5),prf(default)),rc2-cbc(keyBits(160=40bit),IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |100|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(8),prf(default)),rc2-cbc(keyBits(120=64bit),IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |101|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |102|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-192-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |103|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-256-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |104|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),des-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |105|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),des-ede3-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |106|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(md4,salt(8),iter(2048)),pass(ascii).p12|
> |107|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(md5,salt(8),iter(2048)),pass(ascii).p12|
> |108|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(0),iter(2048)),pass(ascii).p12|
> |109|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(20),iter(2048)),pass(ascii).p12|
> |110|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(1000000)),pass(ascii).p12|
> |111|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |112|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(empty).p12|
> |113|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(unicode,openssl-1.0.2k-1.fc24).p12|
> |114|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(unicode,openssl-1.1.1-d1da335c5).p12|
> |115|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass-mac(ascii),pass-cipher(ascii2).p12|
> |116|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(default=1)),pass(ascii).p12|
> |117|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha224,salt(8),iter(2048)),pass(ascii).p12|
> |118|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha256,salt(0),iter(2048)),pass(ascii).p12|
> |119|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha256,salt(32),iter(2048)),pass(ascii).p12|
> |120|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha256,salt(8),iter(1000000)),pass(ascii).p12|
> |121|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha256,salt(8),iter(2048)),pass(ascii).p12|
> |122|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha256,salt(8),iter(default=1)),pass(ascii).p12|
> |123|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha384,salt(8),iter(2048)),pass(ascii).p12|
> |124|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha512,salt(8),iter(2048)),pass(ascii).p12|
> |125|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),pass(ascii).p12|
> |126|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |127|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(PBES2(PBKDF2(salt(16),iter(2000),keyLen(16),prf(hmacWithSHA1)),seed-cbc(IV(16)))),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12|
> |128|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(PBES2(PBKDF2(salt(16),iter(2000),keyLen(32),prf(hmacWithSHA1)),aes-128-cbc(IV(16)))),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12|
> |129|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(PBES2(PBKDF2(salt(16),iter(2000),keyLen(32),prf(hmacWithSHA1)),aes-128-ecb)),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12|
> |130|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(PBES2(PBKDF2(salt(16),iter(2000),keyLen(32),prf(hmacWithSHA1)),aes-192-cbc(IV(16)))),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12|
> |131|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(PBES2(PBKDF2(salt(16),iter(2000),keyLen(32),prf(hmacWithSHA1)),aes-192-ecb)),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12|
> |132|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(PBES2(PBKDF2(salt(16),iter(2000),keyLen(32),prf(hmacWithSHA1)),aes-256-cbc(IV(16)))),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12|
> |133|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(PBES2(PBKDF2(salt(16),iter(2000),keyLen(32),prf(hmacWithSHA1)),aes-256-ecb)),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12|
> |134|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(PBES2(PBKDF2(salt(16),iter(2000),keyLen(32),prf(hmacWithSHA1)),camellia-128-cbc(IV(16)))),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12|
> |135|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(PBES2(PBKDF2(salt(16),iter(2000),keyLen(32),prf(hmacWithSHA1)),camellia-192-cbc(IV(16)))),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12|
> |136|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(PBES2(PBKDF2(salt(16),iter(2000),keyLen(32),prf(hmacWithSHA1)),camellia-256-cbc(IV(16)))),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12|
> |137|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(PBES2(PBKDF2(salt(16),iter(2000),keyLen(8),prf(hmacWithSHA1)),des-ecb)),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12|
> |138|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |139|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithMD2AndDES-CBC,salt(16),iter(2000)),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12|
> |140|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithMD5AndDES-CBC,salt(16),iter(2000)),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12|
> |141|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithSHA1AndDES-CBC,salt(16),iter(2000)),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12|
> |142|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithSHAAnd128BitRC2-CBC,salt(16),iter(2000)),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf).p12|
> |143|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithSHAAnd128BitRC4,salt(16),iter(2000)),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf).p12|
> |144|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(16),iter(2000)),cert(pbeWithMD2AndDES-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12|
> |145|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(16),iter(2000)),cert(pbeWithMD5AndDES-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12|
> |146|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(16),iter(2000)),cert(pbeWithSHA1AndDES-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12|
> |147|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(16),iter(2000)),cert(pbeWithSHAAnd128BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf).p12|
> |148|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(16),iter(2000)),cert(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf).p12|
> |149|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(16),iter(2000)),cert(pbeWithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf).p12|
> |150|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(16),iter(2000)),cert(pbeWithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(unicode,nss-3.28.3-1.1.fc24),ber(inf).p12|
> |151|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa(2048,sha256),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |152|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf).p12|
> |153|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithSHAAnd40BitRC4,salt(16),iter(2000)),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf).p12|
> |154|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa-pss(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |155|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa-pss(2048,sha256),cert(none),key(none),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |156|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa-pss(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
> |157|OK|APPLICATION/X-X509-KEY; 
> FORMAT=DER|rsa-pss(2048,sha256,restrict),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12|
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to