On 1 Nov 2012, at 23:55, Weijun Wang wrote: > > > 在 Nov 1, 2012,10:49 PM,Bruce Rich <br...@us.ibm.com> 写道: > >> Max, >> >> There is already substantial usage of JCEKS to store secret keys. And that >> has been operational since Java 5. >> So I'm not sure what question you are asking. One might have asked whether >> the multi-format keystore would also accommodate JCEKS. > > Yes this is what I'm thinking about. If we are about to retire JKS, why not > cover JCEKS as well?
We have no plans to retire JKS (or JCEKS). We're just examining how best to transition the _default_ keystore format from JKS to PKCS12, in JDK 8. I don't see a need for the multi-format keystore to accommodate JCEKS since JCEKS is normally instantiated by explicitly specifying its keystore type (and not by calling KeyStore.getDefaultType()). > >> If that was your question, I think it would increase the scope beyond what >> can be accomplished in the near term, which is why the focus is on JKS, >> which is the format used by cacerts, for example. > > I see. > > Thanks > Max > >> >> Bruce A Rich >> brich at-sign us dot ibm dot com >> >> >> >> >> From: Weijun Wang <weijun.w...@oracle.com> >> To: security-dev@openjdk.java.net >> Date: 10/31/2012 09:27 PM >> Subject: Re: Transitioning the default keystore format to PKCS#12 >> Sent by: security-dev-boun...@openjdk.java.net >> >> >> >> A little off topic: >> >> Do we still care about the JCEKS storetype? Maybe no one stores secret >> keys in a keystore? >> >> Thanks >> Max >> >> >> On 11/01/2012 12:55 AM, Vincent Ryan wrote: >> > >> > Before considering migrating the platform default keystore format to >> > PKCS12 its keystore implementation >> > must at least match the functionality of JKS. >> > >> > I have developed a prototype of a multi-format keystore that understands >> > both JKS and PKCS12 >> > formats - it checks for the JKS magic number to determine the format. By >> > supporting both formats, >> > existing applications that access keystores using the platform default >> > keystore format, continue to >> > function as expected. >> > >> > In addition, storing trusted certs in PKCS12 is now supported. I've >> > selected the X.509 >> > extendedKeyUsage attribute to explicitly denote that a certificate is >> > trusted - its default value is >> > trusted-for-any-purpose. This well-known attribute is stored with the >> > certificate in a PKCS12 >> > certBag. >> > >> > Webrev: >> > http://cr.openjdk.java.net/~vinnie/jdk8-multi/webrev/ >> > >> > Please send me any comments. >> > Thanks. >> > >> >>