There doesn't appear to be anything wrong with your code to me, and I'd have thought that PKCS#12 keystores should be readable across all versions of all JREs.
There doesn't appear to be anything wrong with your code to me, and I'd have thought that PKCS#12 keystores should be readable across all versions of all JREs. Have you tried using OpenSSL to verify your store?
Openssl pkcs12 -in /tmp/file. P12 -nokeys -nocerts -info Enter Import Password: MAC Iteration 1 MAC verified OK PKCS7 Encrypted data: (chg by me)***************, Iteration 1 Certificate bag Certificate bag Key bag Certificate bag keytool -list -v -keystore /tmp/file. P12 keytool error (likely untranslated): java.io.
IOException: Invalid keystore format It works with openssl, but don't work with keytool java based tool – David May 4 at 13:59 Seems like sun jdk 1.6 can't access to this p12 file format. But actually I'd thought PKCS12 was a generic file format to prevent compatibility issues between keystores formats. – David May 4 at 15:11 If it couldn't access PKCS#12 stores, you'd get an exception when you call getInstance("PKCS12"), so it is supported, but it's a bit fussy.
Can you create a keystore with Sun, and open with OpenSSL and IBM? – David Grant May 4 at 17:34.
Here's the answer: www-01.ibm.com/support/docview.wss?uid=s... -- Problem conclusion This defect will be fixed in: 1.4.2 SR14 5.0.0 SR12 6.0.0 SR9 . The PKCS SafeContents. GetSafeBags( ) method was modified to detect when the SafeBag array is null and to return an empty SafeBag array instead.
PKCS callers of this method are prepared to handle an empty SafeBag array.
I cant really gove you an answer,but what I can give you is a way to a solution, that is you have to find the anglde that you relate to or peaks your interest. A good paper is one that people get drawn into because it reaches them ln some way.As for me WW11 to me, I think of the holocaust and the effect it had on the survivors, their families and those who stood by and did nothing until it was too late.