gnutls-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[sr #108090] Unable to decode PKCS12 with NULL password since 3.0.20


From: Alexandre Chataignon
Subject: [sr #108090] Unable to decode PKCS12 with NULL password since 3.0.20
Date: Thu, 19 Jul 2012 21:32:35 +0000
User-agent: Mozilla/5.0 (X11; Linux i686; rv:13.0) Gecko/20100101 Firefox/13.0.1

Follow-up Comment #2, sr #108090 (project gnutls):

Actually, I have generated a batch of pkcs12 certificates with a python
snippet similar to the one I have posted without asking me too much questions.
I mean, it uses openssl api in its simplest form, the generated pkcs12 works
fine with openssl itself, but also in OpenVPN for example. It's impossible for
me to regenerate all the certificates, so yes, I would like backwards
compatibility.

I don't know the right behavior, but the fact that it used to work in gnutls
and that it works in OpenSSL makes me think that's a regression.

> Do you see difference in the key generated from "" with 0 size, and NULL
with 0 size? 

Ahem, I don't understand the question, can you describe please ?

    _______________________________________________________

Reply to this item at:

  <http://savannah.gnu.org/support/?108090>

_______________________________________________
  Message sent via/by Savannah
  http://savannah.gnu.org/




reply via email to

[Prev in Thread] Current Thread [Next in Thread]