[Mono-bugs] [Bug 75779][Wis] Changed - Mono PKCS #12's with
passwords longer than 31 bytes cannot be validated by Microsoft
bugzilla-daemon at bugzilla.ximian.com
bugzilla-daemon at bugzilla.ximian.com
Fri Nov 4 16:35:31 EST 2005
Please do not reply to this email- if you want to comment on the bug, go to the
URL shown below and enter your comments there.
Changed by sebastien at ximian.com.
http://bugzilla.ximian.com/show_bug.cgi?id=75779
--- shadow/75779 2005-10-06 12:27:06.000000000 -0400
+++ shadow/75779.tmp.4337 2005-11-04 16:35:31.000000000 -0500
@@ -1,13 +1,13 @@
Bug#: 75779
Product: Mono: Class Libraries
Version: 1.1
OS: unknown
OS Details:
-Status: ASSIGNED
-Resolution:
+Status: RESOLVED
+Resolution: FIXED
Severity: Unknown
Priority: Wishlist
Component: Mono.Security
AssignedTo: sebastien at ximian.com
ReportedBy: dgranath at gmail.com
QAContact: mono-bugs at ximian.com
@@ -75,6 +75,20 @@
openssl pkcs12 -in long32.p12 -out long32.pem -nodes
Enter Import Password:
MAC verified OK
I've updated mono with an "interoperability warning". I'll look into
adding a property to truncate the password to 31 chars later.
+
+------- Additional Comments From sebastien at ximian.com 2005-11-04 16:35 -------
+Fixed in SVN (r52592) with new tests (r52593).
+
+I added a new static property "MaximumPasswordLength" that will
+truncate the password to this length value, so:
+
+PKCS12.MaximumPasswordLength = PKCS12.CryptoApiPasswordLimit;
+PKCS12 p12 = new PKCS12 (data, password);
+
+will work just like the PFXImportCertStore would. The default value
+for MaximumPasswordLength is Int32.MaxValue so this shouldn't affect
+interoperability with the current code and/or any other "normal"
+implementation.
More information about the mono-bugs
mailing list