Extending KeyStore.PasswordProtection works well for keys and for certs.
To retain its immutability, a new constructor that takes the PBE
algorithm name and a new getter could be added.

Thanks.

On 01/10/2012 20:03, Michael StJohns wrote:
At 02:17 PM 10/1/2012, Vincent Ryan wrote:

We could examine a mechansim for keystore applications to override the default 
PBE algorithm for protecting keys and certs.
Maybe extend KeyStore.LoadStoreParameter?

So don't change the PKCS12 instance type, instead deal with this on an entry by 
entry basis? Makes sense.

Probably the right change is to extend KeyStore.PasswordProtection, and allow 
the user to provide a different algorithm per entry?  If you are loading, you 
can use KeyStore.PasswordProtection, and it takes the algorithm from the entry 
info.  If you are storing, and you don't specify the algorithm, you get the 
default (perhaps specified in java.security props file next to the keystore 
default type?)

Mike


Mike




On 1 Oct 2012, at 18:50, Michael StJohns wrote:

My main reason for suggesting this is that the all but one of the algorithm 
suites defined in PKCS12 are either deprecated or prohibited by NIST guidance.  
The undeprecated suite appears to be the default one used by the java 
implementation.  It would be nice to have a choice.

See below.

At 12:51 PM 10/1/2012, Vincent Ryan wrote:
Hello Mike,

The new PBE algorithms in JEP-121, such as PBEWithHmacSHA256AndAES_128, could 
certainly be used
for PKCS12 keystores within Java environments - the problem is maintaining 
interoperability with existing
crypto toolkits and web browsers.

Yup - but someone has to be first....   :-)

Mike


Is there any interest among those on this list in promoting wider support for 
these PBE algorithms?

Thanks.


On 1 Oct 2012, at 17:06, Michael StJohns wrote:

At 08:27 PM 9/28/2012, [email protected] wrote:
Posted: http://openjdk.java.net/jeps/166

- Mark

This seems at least partially related to JEP 121 and maybe even dependent on 
it.  Might be useful to have a cross reference.  Also, probably useful to 
decide/state a new default PKCS12 algorithm?  E.g. maybe 
PBEwithSHA256andAES-128?

Mike







Reply via email to