[Mono-bugs] [Bug 75779][Wis] Changed - Mono PKCS #12's with passwords longer than 31 bytes cannot be validated by Microsoft

bugzilla-daemon at bugzilla.ximian.com bugzilla-daemon at bugzilla.ximian.com
Fri Nov 4 16:35:31 EST 2005


Please do not reply to this email- if you want to comment on the bug, go to the
URL shown below and enter your comments there.

Changed by sebastien at ximian.com.

http://bugzilla.ximian.com/show_bug.cgi?id=75779

--- shadow/75779	2005-10-06 12:27:06.000000000 -0400
+++ shadow/75779.tmp.4337	2005-11-04 16:35:31.000000000 -0500
@@ -1,13 +1,13 @@
 Bug#: 75779
 Product: Mono: Class Libraries
 Version: 1.1
 OS: unknown
 OS Details: 
-Status: ASSIGNED   
-Resolution: 
+Status: RESOLVED   
+Resolution: FIXED
 Severity: Unknown
 Priority: Wishlist
 Component: Mono.Security
 AssignedTo: sebastien at ximian.com                            
 ReportedBy: dgranath at gmail.com               
 QAContact: mono-bugs at ximian.com
@@ -75,6 +75,20 @@
 openssl pkcs12 -in long32.p12 -out long32.pem -nodes
 Enter Import Password:
 MAC verified OK
 
 I've updated mono with an "interoperability warning". I'll look into
 adding a property to truncate the password to 31 chars later.
+
+------- Additional Comments From sebastien at ximian.com  2005-11-04 16:35 -------
+Fixed in SVN (r52592) with new tests (r52593).
+
+I added a new static property "MaximumPasswordLength" that will
+truncate the password to this length value, so:
+
+PKCS12.MaximumPasswordLength = PKCS12.CryptoApiPasswordLimit;
+PKCS12 p12 = new PKCS12 (data, password);
+
+will work just like the PFXImportCertStore would. The default value
+for MaximumPasswordLength is Int32.MaxValue so this shouldn't affect
+interoperability with the current code and/or any other "normal"
+implementation.


More information about the mono-bugs mailing list