You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@santuario.apache.org by bu...@apache.org on 2005/09/26 22:18:50 UTC

DO NOT REPLY [Bug 36785] - Bug in DSA and RSAKeyValue.getPublicKey()

DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG�
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://issues.apache.org/bugzilla/show_bug.cgi?id=36785>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND�
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=36785


sean.mullan@sun.com changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|                            |INVALID
            Summary|Bug in DSA and              |Bug in DSA and
                   |RSAKeyValue.getPublicKey()  |RSAKeyValue.getPublicKey()




------- Additional Comments From sean.mullan@sun.com  2005-09-26 22:18 -------
This behavior is intentional. The XMLSec implementation was changed (in 1.2.1
I believe) to use the JDK's security provider configuration when instantiating 
standard algorithms for JCE/JCA objects (Signature, MessageDigest, Cipher, etc).

See the discussion thread at
http://nagoya.apache.org/eyebrowse/BrowseList?listName=security-dev@xml.apache.org&by=thread&from=846607
for more information and rationale.

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.