OK, now I see, it will probably require a "pem" style, because PKCS12
stores X.509 certs too, "x509" would be too generic.

I must admit, I have never used the KeyStore interface directly, but I
can't image that it would be too hard to add virtual aliases for.

I'd be happy to review your ideas.

Michael

Am 2019-06-02 um 17:00 schrieb Weijun Wang:
But it still has to be a keystore. KeyStore is designed into SSL's TrustManagerFactory. JSSE has system 
properties javax.net.ssl.trustStore* pointing to it specifying file name, keystore type, and password. If we 
really use a PEM bundle, we might need to define a new keystore type "x509" or "pem". 
It's certainly cert-only, it might or might not be read-only. For the same reason I described in the CSR, it 
probably should be loadable by KeyStore.getInstance("JKS").

I can do some experiment. This won't go into JDK 13 anyway so there is time to 
discuss.

Thanks,
Max

On Jun 2, 2019, at 7:09 PM, Michael Osipov <1983-01...@gmx.net> wrote:

Am 2019-06-02 um 12:36 schrieb Alan Bateman:
On 02/06/2019 09:48, Weijun Wang wrote:
:

There is also a compatibility impact as someone out there might be
opening cacerts directly.

A general point here is that the contents of the lib directory is not a
supported interface, a point that may be relevant to the wording in the
CSR.

Correct, from a user's POV it is completely opaque to me. It is at the
descretion of Oracle just like the mod files, but from a packager's POV
I need to be able to exchange this sytemwide without much hassle wich
neither JDK nor PKCS12 do this atm compared to a PEM bundle.

Michael



Reply via email to