You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@santuario.apache.org by bu...@apache.org on 2005/09/26 22:18:50 UTC
DO NOT REPLY [Bug 36785] -
Bug in DSA and RSAKeyValue.getPublicKey()
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG�
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://issues.apache.org/bugzilla/show_bug.cgi?id=36785>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND�
INSERTED IN THE BUG DATABASE.
http://issues.apache.org/bugzilla/show_bug.cgi?id=36785
sean.mullan@sun.com changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |INVALID
Summary|Bug in DSA and |Bug in DSA and
|RSAKeyValue.getPublicKey() |RSAKeyValue.getPublicKey()
------- Additional Comments From sean.mullan@sun.com 2005-09-26 22:18 -------
This behavior is intentional. The XMLSec implementation was changed (in 1.2.1
I believe) to use the JDK's security provider configuration when instantiating
standard algorithms for JCE/JCA objects (Signature, MessageDigest, Cipher, etc).
See the discussion thread at
http://nagoya.apache.org/eyebrowse/BrowseList?listName=security-dev@xml.apache.org&by=thread&from=846607
for more information and rationale.
--
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.