RFR 8202299: Java Keystore fails to load PKCS12/PFX certificates created in WindowsServer2016

Sean Mullan sean.mullan at oracle.com
Wed May 16 18:42:06 UTC 2018

The while(true) in PKCS12KeyStore.java seems like it isn't really 
necessary, since you are calling the code inside it at most twice. I 
think a better approach would be to move lines 2134-2146 into a utility 
method and call it again if you get an Exception and the password is empty.

Looks fine otherwise.


On 4/27/18 12:56 PM, Weijun Wang wrote:
> Please take a look at
>     http://cr.openjdk.java.net/~weijun/8202299/webrev.00/
> Turns out we have to retry [0] other than [] in all 3 locations: decrypting keys, decrypting certs, and verifying the mac.
> Thanks
> Max
> p.s. You might wonder why suddenly in Windows Server 2016, Microsoft starts using [0] to generate the Mac. In fact, they have been doing this all the time. However, before 2016, they also encrypted the certificates, and to decrypt them, Java has already changed password from [] to [0].
> p.p.s. But is this correct? Should the certificate decryption code only temporarily retries [0] but not changing password itself? Well, maybe. But unless a weird software sometimes uses [] and sometimes [0], this will not be a problem, and changing password itself saves us some cycles from always trying twice.

More information about the security-dev mailing list