DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUGĀ·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://issues.apache.org/bugzilla/show_bug.cgi?id=43414>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED ANDĀ·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=43414

           Summary: Cannot parse X509 cert with key size longer than 2048
                    (JRE 1.4)
           Product: Security
           Version: Java 1.4.1
          Platform: All
        OS/Version: other
            Status: NEW
          Severity: blocker
          Priority: P1
         Component: Signature
        AssignedTo: security-dev@xml.apache.org
        ReportedBy: [EMAIL PROTECTED]


There's a 'bug' on the CertificateFactory class of the Sun JCE Provider
integrated in the Sun Java 1.4.2, which supports cryptography for certificates
with key size no longer than 2048 bytes.

In the org.apache.xml.security.keys.content.x509.XMLX509Certificate, the
"getX509Certificate" method only use the CertificateFactory supplied by the Sun
JCE Provider of the JRE.

---------------------------

To fix this bug, developer should be specify another JCE provider (for example
BouncyCastle).

String provider = JCEMapper.getProviderId();
CertificateFactory certFact;
if (provider == null)
{
    certFact = CertificateFactory.getInstance(XMLX509Certificate.JCA_CERT_ID);
}
else
{
    certFact = CertificateFactory.getInstance(XMLX509Certificate.JCA_CERT_ID,
provider);
}
...

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

Reply via email to