[xmlsec] mscrypto 1.2.18 key is not found
Aleksey Sanin
aleksey at aleksey.com
Sat Jun 25 16:18:04 PDT 2011
Sorry, I don't have Windows environment to play with anymore :(
Aleksey
On 6/25/11 10:10 AM, Ed Shallow wrote:
> Any ideas guys ?
>
> Ed
>
> ------------------------------------------------------------------------
> *From:* Aleksey Sanin <aleksey at aleksey.com>
> *To:* EdShallow <ed.shallow at gmail.com>
> *Cc:* Roumen Petrov <xmlsec at roumenpetrov.info>; xmlsec at aleksey.com;
> Igor Zlatković <igor at zlatkovic.com>
> *Sent:* Wed, June 22, 2011 10:13:00 AM
> *Subject:* Re: [xmlsec] mscrypto 1.2.18 key is not found
>
> Thanks, Ed!
> Aleksey
>
> On 6/21/11 10:12 PM, EdShallow wrote:
>> PostScript ... my motive to upgrade to at least 1.2.15 is my desire
>> to utilize the new SHA2 algorithms introduced for mscrypto.
>>
>> Thanks in advance for helping,
>> Ed
>>
>> On Wed, Jun 22, 2011 at 1:09 AM, EdShallow <ed.shallow at gmail.com
>> <mailto:ed.shallow at gmail.com>> wrote:
>>
>> Some updates with respect to mscrypto 1.2.18
>>
>> The "key is not found" error with 1.2.18 is misleading. In fact
>> what is happening is that when specifying a KeyName for a
>> certificate associated with its private key in a key store that
>> is not "logged in", you get the "key is not found" error.
>>
>> If the CSP's container allows you to log in to the key store
>> prior to usage, then XMSec mscrypto will succeed as long as the
>> session with the private key has been logged in.
>>
>> Now please be aware not all CSPs allow you to login in advance of
>> searching the certificate and adopting the key. In fact most
>> don't and prompt at first programmatic usage (i.e. adoption or
>> context acquire).
>>
>> The only CSP I have tried (and this is how I found the problem)
>> is Entrust's CAPI CSP called Entrust Service Provider for Windows
>> version 9.1. If I login to my Entrust key store before running an
>> XMLSec sign operation, it works. If I am NOT already logged in to
>> my Entrust key store when I executed the XMLSec command, it
>> fails. Additionally the error message generated by XMLSec is not
>> indicative of really what is happening.
>>
>> The standard Microsoft Cryptographic Service Provider and the
>> Microsoft Enhanced Cryptographic Service Provider do NOT allow
>> this login in advance of usage. A login dialog box appears only
>> when your CAPI code attempts to acquire the certificate context
>> and use the key for signing. Any use of these 2 CSPs fails with
>> XMLSec 1.2.18.
>>
>> This "key is not found" behavior does NOT happen with 1.2.10,
>> 1.2.11, 1.2.13 all of which work fine.
>>
>> When using these earlier versions of XMLSec, a dialog box with
>> login prompt is presented as a result of key adoption and
>> everything works fine after a successful password is entered. The
>> dialog re-prompts until the correct password is provided. This is
>> expected behavior.
>>
>> All this testing was done with Igor's 1.2.18 Unicode=yes binaries
>> which do not crash but do exhibit the incorrect behavior
>> described above. I did not test much with the Unicode=no binaries
>> as soon as I encountered the crashes.
>>
>> I am not sure what triggers the dialog box with the key
>> protection password prompt, but this is the error with 1.2.18.
>> All earlier versions before 1.2.13 DO trigger this dialog box
>> correctly.
>>
>> Hope this helps,
>> Ed
>>
>>
>>
>>
>> On Tue, Jun 21, 2011 at 4:38 PM, Roumen Petrov
>> <xmlsec at roumenpetrov.info <mailto:xmlsec at roumenpetrov.info>> wrote:
>>
>> EdShallow wrote:
>>
>> OK guys, here is the story with mscrypto:
>>
>> [SNIP]
>>
>> throughout the above tests. it is clear that the mscrypto
>> code somewhere
>> after 1.2.13 has introduced the error.
>>
>> [SNIP]
>> One change , if i remember well , is CP_ACP -> CP_UTF8 . It
>> is based on request posted to the list.
>> I don't have environment to test. Probably this could be
>> issue, but you report ascii(latin1) names and I'm not sure
>> that this modification is reason for failure.
>>
>> If "Shallow, Ed" and "Adam Grossman" work fine with 1.2.13
>> there is not reason to fail if CP_ACP -> CP_UTF8.
>>
>> Also I'm afraid with report like "openssl sign with .p12 -
>> crash". I don't know what to say .
>>
>>
>> Roumen
>>
>>
>>
>>
>> --
>> Ed's Contact Information:
>> Mobile Phone: 613-852-6410
>> Gmail: ed.shallow at gmail.com <mailto:ed.shallow at gmail.com>
>> VOIP Address: 107529 at sip.ca1.voip.ms <mailto:107529 at sip.ca1.voip.ms>
>> VOIP DID#: 613-458-5004
>> Skype ID: edward.shallow
>> Home Phone: 613-482-2090
>>
>>
>>
>>
>> --
>> Ed's Contact Information:
>> Mobile Phone: 613-852-6410
>> Gmail: ed.shallow at gmail.com <mailto:ed.shallow at gmail.com>
>> VOIP Address: 107529 at sip.ca1.voip.ms <mailto:107529 at sip.ca1.voip.ms>
>> VOIP DID#: 613-458-5004
>> Skype ID: edward.shallow
>> Home Phone: 613-482-2090
>>
>>
>> _______________________________________________
>> xmlsec mailing list
>> xmlsec at aleksey.com
>> http://www.aleksey.com/mailman/listinfo/xmlsec
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.aleksey.com/pipermail/xmlsec/attachments/20110625/a4981aa0/attachment.html>
More information about the xmlsec
mailing list