[sr #108090] Unable to decode PKCS12 with NULL password since 3.0.20
Alexandre Chataignon
INVALID.NOREPLY at gnu.org
Thu Jul 19 23:32:35 CEST 2012
Follow-up Comment #2, sr #108090 (project gnutls):
Actually, I have generated a batch of pkcs12 certificates with a python
snippet similar to the one I have posted without asking me too much questions.
I mean, it uses openssl api in its simplest form, the generated pkcs12 works
fine with openssl itself, but also in OpenVPN for example. It's impossible for
me to regenerate all the certificates, so yes, I would like backwards
compatibility.
I don't know the right behavior, but the fact that it used to work in gnutls
and that it works in OpenSSL makes me think that's a regression.
> Do you see difference in the key generated from "" with 0 size, and NULL
with 0 size?
Ahem, I don't understand the question, can you describe please ?
_______________________________________________________
Reply to this item at:
<http://savannah.gnu.org/support/?108090>
_______________________________________________
Message sent via/by Savannah
http://savannah.gnu.org/
More information about the Gnutls-devel
mailing list