-
Notifications
You must be signed in to change notification settings - Fork 35
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
NotImplementedError: Saving of JCEKS keystores is not implemented #33
Comments
Unless @magnuswatn or @voetsjoeba will be surprising us again, I think the current set of formats is all that's planned for the moment. If you'd like to take a swing, by all means! |
Yes, please by all means we love PRs!
Your energy and enthusiasm is appreciated.
…On Wed, May 31, 2017 at 4:28 PM, Mahmoud Hashemi ***@***.***> wrote:
Unless @magnuswatn <https://github.com/magnuswatn> or @voetsjoeba
<https://github.com/voetsjoeba> will be surprising us again, I think the
current set of formats is all that's planned for the moment. If you'd like
to take a swing, by all means!
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#33 (comment)>, or mute
the thread
<https://github.com/notifications/unsubscribe-auth/AAhMvj4DkDP1bnYt85TzXXE65MSxv_zDks5r_fevgaJpZM4NsP3C>
.
|
I've had a local branch that implements writing all keystore types for a while, but I've been hesitant to push it out for the same reasons as originally discussed in PR #29 when JKS write support came up, i.e. I'm not so sure the choice of cryptographic parameters for JCEKS and BKS keystores is as straightforward as it may seem ... |
@voetsjoeba yeah I think now that there's a concrete case, I think creating a warning type and emitting a warning is a reasonable course. Alternatively, we could require the extra step of setting an attribute, like |
(Alternatively, could have it as a kwarg to those methods, too.) |
That sounds like a good approach. We could start off with the same choices/ranges as the original JCEKS and BC implementations, then do some testing to see if any increases are generally well accepted by major keystore readers and go from there to decide whether we want to use those as the defaults. I'll try to find some time to work on that. |
I’d like to bump this up. I would like to be able to store client IDs and API keys in a jceks but having to go write up a Java program to do it makes this library less useful. |
FWIW, for PBE parms, I’d be thrilled with PBKDF2WithSha256, AES128 and 10,000 iterations. |
1 similar comment
FWIW, for PBE parms, I’d be thrilled with PBKDF2WithSha256, AES128 and 10,000 iterations. |
Hello,
At the moment, when saving a keystore of type "JCEKS"m I get the following error :
Is the implementation on the way / planned ?
For sure.... this is not to set pressure on it ^^ but as I find this library promising, I just wanted to be informed about it ;)
Thx for your answers !
The text was updated successfully, but these errors were encountered: