[ https://issues.apache.org/jira/browse/TIKA-4194 ]
Lonzak deleted comment on TIKA-4194: ------------------------------ was (Author: tom_1st): The ticket was resolved with 2.9.2 - right? So the version can be set and the ticket be closed... I would do that but don't have the rights... > tika fails to detect certain pkcs12 keystores types p12 pfx > ----------------------------------------------------------- > > Key: TIKA-4194 > URL: https://issues.apache.org/jira/browse/TIKA-4194 > Project: Tika > Issue Type: Bug > Components: detector > Affects Versions: 2.9.1 > Reporter: Lonzak > Priority: Major > Fix For: 2.9.2 > > > We use tika to detect the type of a file which is uploaded. In most cases > this works quite well. However recently some files were rejected because tika > reports an invalid file type. We'll get > {code:java} > APPLICATION/OCTET-STREAM{code} > instead of > {code:java} > APPLICATION/X-X509-KEY{code} > (As pointed out in TIKA-3784 the mimetype should really be > "application/x-pkcs12" but for us "application/x-x509-key" works for now) > > I did an analysis and found that tika doesn't recognize certain types of > pkcs12 keystores. The test keystores can be found > [here|https://github.com/redhat-qe-security/keyfile-corpus/tree/master]. > I created a list to show which ones are effected. Out of 157 keystores 132 > are correctly detected and 25 are not. > > ||#||correct?||type||filename|| > |1|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|dsa(1024,sha1),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |2|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|dsa(1024,sha1),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |3|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|ecdsa(P-256,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |4|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|ecdsa(P-256,sha256),cert(none),key(none),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |5|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|ecdsa(P-256,sha256),cert(none),key(none).p12| > |6|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|ecdsa(P-256,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |7|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(0),iter(2048),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |8|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(0),iter(2048),keyLen(default),prf(default)),des-ede3-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |9|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(16),iter(2048),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |10|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(16),iter(2048),keyLen(default),prf(default)),des-ede3-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |11|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(64),iter(1000000),keyLen(default),prf(hmacWithSHA512)),aes-256-cbc(IV(16)))),mac(sha512,salt(64),iter(1000000)),pass(ascii).p12| > |12|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(1),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |13|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(1),keyLen(default),prf(default)),des-ede3-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |14|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(1000000),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |15|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(1000000),keyLen(default),prf(default)),des-ede3-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |16|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(16),prf(default)),rc2-cbc(keyBits(56=128bit),IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |17|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(16),prf(hmacWithSHA256)),rc2-cbc(keyBits(56=128bit),IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |18|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(5),prf(default)),rc2-cbc(keyBits(160=40bit),IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |19|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(5),prf(hmacWithSHA256)),rc2-cbc(keyBits(160=40bit),IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |20|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(8),prf(default)),rc2-cbc(keyBits(120=64bit),IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |21|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |22|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(unicode,openssl-1.0.2k-1.fc24).p12| > |23|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-192-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |24|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-256-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |25|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aria-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |26|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aria-192-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |27|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aria-256-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |28|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),des-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |29|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),des-ede3-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |30|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),des-ede3-cbc(IV(8)))),mac(sha256,salt(8),iter(2048)),pass-mac(ascii),pass-cipher(ascii2).p12| > |31|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmac-sha3-224)),aes-128-cbc(IV(16)))),mac(sha256,salt(8),iter(2048)),pass(ascii).p12| > |32|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmac-sha3-256)),aes-128-cbc(IV(16)))),mac(sha256,salt(8),iter(2048)),pass(ascii).p12| > |33|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmac-sha3-384)),aes-128-cbc(IV(16)))),mac(sha256,salt(8),iter(2048)),pass(ascii).p12| > |34|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmac-sha3-512)),aes-128-cbc(IV(16)))),mac(sha256,salt(8),iter(2048)),pass(ascii).p12| > |35|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithMD5)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |36|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithMD5)),des-ede3-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |37|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA224)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |38|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA224)),des-ede3-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |39|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |40|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(unicode,openssl-1.1.1-d1da335c5).p12| > |41|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),aes-128-cbc(IV(16)))),mac(sha3-224,salt(8),iter(2048)),pass(ascii).p12| > |42|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),aes-128-cbc(IV(16)))),mac(sha3-256,salt(8),iter(2048)),pass(ascii).p12| > |43|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),aes-128-cbc(IV(16)))),mac(sha3-384,salt(8),iter(2048)),pass(ascii).p12| > |44|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),aes-128-cbc(IV(16)))),mac(sha3-512,salt(8),iter(2048)),pass(ascii).p12| > |45|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),aes-128-cbc(IV(16)))),mac(sha512-224,salt(8),iter(2048)),pass(ascii).p12| > |46|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),aes-128-cbc(IV(16)))),mac(sha512-256,salt(8),iter(2048)),pass(ascii).p12| > |47|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),bf-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |48|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),camellia-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |49|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),camellia-192-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |50|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),camellia-256-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |51|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),cast5-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |52|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),des-ede3-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |53|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),idea-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |54|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA256)),seed-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |55|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA384)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |56|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA384)),des-ede3-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |57|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA512)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |58|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA512)),des-ede3-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |59|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA512_224)),aes-128-cbc(IV(16)))),mac(sha256,salt(8),iter(2048)),pass(ascii).p12| > |60|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(hmacWithSHA512_256)),aes-128-cbc(IV(16)))),mac(sha256,salt(8),iter(2048)),pass(ascii).p12| > |61|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(PBES2(scrypt(salt(64),N(16384),r(8),p(1)),aes-256-cbc(IV(16)))),mac(sha512,salt(64),iter(1000000)),pass(ascii).p12| > |62|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithMD2AndDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |63|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithMD2AndRC2-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |64|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithMD5AndDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |65|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithMD5AndRC2-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |66|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithSHA1AndDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |67|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithSHA1AndRC2-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |68|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithSHAAnd128BitRC2-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |69|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithSHAAnd128BitRC4,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |70|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithSHAAnd2-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |71|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(0),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |72|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(16),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |73|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(1)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |74|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(1000000)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |75|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |76|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(pbewithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |77|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert&key(pbeWithSHAAnd40BitRC4,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |78|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(none),key(none),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |79|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(none),key(none),mac(sha256,salt(8),iter(2048)),pass(ascii).p12| > |80|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(none),key(none),mac(sha256,salt(8),iter(2048)),pass(empty).p12| > |81|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(none),key(none).p12| > |82|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(none),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(16),prf(default)),rc2-cbc(keyBits(56=128bit),IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |83|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(none),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(5),prf(default)),rc2-cbc(keyBits(160=40bit),IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |84|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(none),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(8),prf(default)),rc2-cbc(keyBits(120=64bit),IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |85|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(none),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |86|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(none),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-192-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |87|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(none),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-256-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |88|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(none),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),des-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |89|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(none),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),des-ede3-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |90|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(PBES2(PBKDF2(salt(18),iter(5127),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),key(PBES2(PBKDF2(salt(16),iter(5301),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(10240)),pass(ascii).p12| > |91|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |92|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(16),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |93|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(5318)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(5204)),mac(sha1,salt(8),iter(10240),pass(ascii).p12| > |94|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(0),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(0),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |95|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(16),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(16),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |96|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(1)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(1)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |97|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(1000000)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(1000000)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |98|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(16),prf(default)),rc2-cbc(keyBits(58=128bit),IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |99|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(5),prf(default)),rc2-cbc(keyBits(160=40bit),IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |100|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(8),prf(default)),rc2-cbc(keyBits(120=64bit),IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |101|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |102|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-192-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |103|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-256-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |104|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),des-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |105|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),des-ede3-cbc(IV(8)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |106|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(md4,salt(8),iter(2048)),pass(ascii).p12| > |107|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(md5,salt(8),iter(2048)),pass(ascii).p12| > |108|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(0),iter(2048)),pass(ascii).p12| > |109|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(20),iter(2048)),pass(ascii).p12| > |110|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(1000000)),pass(ascii).p12| > |111|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |112|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(empty).p12| > |113|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(unicode,openssl-1.0.2k-1.fc24).p12| > |114|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(unicode,openssl-1.1.1-d1da335c5).p12| > |115|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass-mac(ascii),pass-cipher(ascii2).p12| > |116|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(default=1)),pass(ascii).p12| > |117|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha224,salt(8),iter(2048)),pass(ascii).p12| > |118|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha256,salt(0),iter(2048)),pass(ascii).p12| > |119|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha256,salt(32),iter(2048)),pass(ascii).p12| > |120|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha256,salt(8),iter(1000000)),pass(ascii).p12| > |121|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha256,salt(8),iter(2048)),pass(ascii).p12| > |122|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha256,salt(8),iter(default=1)),pass(ascii).p12| > |123|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha384,salt(8),iter(2048)),pass(ascii).p12| > |124|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha512,salt(8),iter(2048)),pass(ascii).p12| > |125|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),pass(ascii).p12| > |126|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |127|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(PBES2(PBKDF2(salt(16),iter(2000),keyLen(16),prf(hmacWithSHA1)),seed-cbc(IV(16)))),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12| > |128|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(PBES2(PBKDF2(salt(16),iter(2000),keyLen(32),prf(hmacWithSHA1)),aes-128-cbc(IV(16)))),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12| > |129|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(PBES2(PBKDF2(salt(16),iter(2000),keyLen(32),prf(hmacWithSHA1)),aes-128-ecb)),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12| > |130|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(PBES2(PBKDF2(salt(16),iter(2000),keyLen(32),prf(hmacWithSHA1)),aes-192-cbc(IV(16)))),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12| > |131|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(PBES2(PBKDF2(salt(16),iter(2000),keyLen(32),prf(hmacWithSHA1)),aes-192-ecb)),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12| > |132|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(PBES2(PBKDF2(salt(16),iter(2000),keyLen(32),prf(hmacWithSHA1)),aes-256-cbc(IV(16)))),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12| > |133|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(PBES2(PBKDF2(salt(16),iter(2000),keyLen(32),prf(hmacWithSHA1)),aes-256-ecb)),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12| > |134|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(PBES2(PBKDF2(salt(16),iter(2000),keyLen(32),prf(hmacWithSHA1)),camellia-128-cbc(IV(16)))),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12| > |135|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(PBES2(PBKDF2(salt(16),iter(2000),keyLen(32),prf(hmacWithSHA1)),camellia-192-cbc(IV(16)))),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12| > |136|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(PBES2(PBKDF2(salt(16),iter(2000),keyLen(32),prf(hmacWithSHA1)),camellia-256-cbc(IV(16)))),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12| > |137|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(PBES2(PBKDF2(salt(16),iter(2000),keyLen(8),prf(hmacWithSHA1)),des-ecb)),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12| > |138|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |139|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithMD2AndDES-CBC,salt(16),iter(2000)),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12| > |140|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithMD5AndDES-CBC,salt(16),iter(2000)),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12| > |141|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithSHA1AndDES-CBC,salt(16),iter(2000)),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12| > |142|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithSHAAnd128BitRC2-CBC,salt(16),iter(2000)),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf).p12| > |143|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithSHAAnd128BitRC4,salt(16),iter(2000)),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf).p12| > |144|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(16),iter(2000)),cert(pbeWithMD2AndDES-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12| > |145|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(16),iter(2000)),cert(pbeWithMD5AndDES-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12| > |146|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(16),iter(2000)),cert(pbeWithSHA1AndDES-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf),malformed(nss-3.21).p12| > |147|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(16),iter(2000)),cert(pbeWithSHAAnd128BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf).p12| > |148|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(16),iter(2000)),cert(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf).p12| > |149|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(16),iter(2000)),cert(pbeWithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf).p12| > |150|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(16),iter(2000)),cert(pbeWithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(unicode,nss-3.28.3-1.1.fc24),ber(inf).p12| > |151|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa(2048,sha256),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |152|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf).p12| > |153|NOK|APPLICATION/OCTET-STREAM|rsa(2048,sha256),key(pbeWithSHAAnd40BitRC4,salt(16),iter(2000)),cert(pbewithSHAAnd40BitRC2-CBC,salt(16),iter(2000)),mac(sha1,salt(16),iter(2000)),pass(ascii),ber(inf).p12| > |154|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa-pss(2048,sha256),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |155|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa-pss(2048,sha256),cert(none),key(none),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |156|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa-pss(2048,sha256),cert(pbeWithSHAAnd40BitRC2-CBC,salt(8),iter(2048)),key(pbeWithSHAAnd3-KeyTripleDES-CBC,salt(8),iter(2048)),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > |157|OK|APPLICATION/X-X509-KEY; > FORMAT=DER|rsa-pss(2048,sha256,restrict),cert&key(PBES2(PBKDF2(salt(8),iter(2048),keyLen(default),prf(default)),aes-128-cbc(IV(16)))),mac(sha1,salt(8),iter(2048)),pass(ascii).p12| > -- This message was sent by Atlassian Jira (v8.20.10#820010)