JDK-4795085 : com.sun.net.ssl.internal.ssl.RSASignature.class BUG
  • Type: Bug
  • Component: security-libs
  • Sub-Component: javax.net.ssl
  • Affected Version: 1.0.3,1.4.1,1.4.2
  • Priority: P4
  • Status: Resolved
  • Resolution: Fixed
  • OS: solaris_8,windows_98
  • CPU: x86,sparc
  • Submitted: 2002-12-17
  • Updated: 2003-05-31
  • Resolved: 2003-01-14
The Version table provides details related to the release that this issue/RFE will be addressed.

Unresolved : Release in which this issue/RFE will be addressed.
Resolved: Release in which this issue/RFE has been resolved.
Fixed : Release in which this issue/RFE has been fixed. The release containing this fix may be available for download as an Early Access Release or a General Availability Release.

To download the current JDK release, click here.
Other Other Other
1.0.3_02 02Fixed 1.4.1_03Fixed 1.4.2Fixed
Related Reports
Duplicate :  
Duplicate :  
Description
(byte)0x63, (byte)0x73, (byte)0x73, (byte)0x2D, 
(byte)0x6D, (byte)0x70, (byte)0x73, (byte)0x2E, (byte)0x72, (byte)0x75, (byte)0x30, (byte)0x1E, 
(byte)0x17, (byte)0x0D, (byte)0x30, (byte)0x32, (byte)0x30, (byte)0x31, (byte)0x33, (byte)0x31, 
(byte)0x32, (byte)0x30, (byte)0x30, (byte)0x30, (byte)0x30, (byte)0x30, (byte)0x5A, (byte)0x17, 
(byte)0x0D, (byte)0x32, (byte)0x32, (byte)0x30, (byte)0x31, (byte)0x33, (byte)0x31, (byte)0x32, 
(byte)0x30, (byte)0x30, (byte)0x30, (byte)0x30, (byte)0x30, (byte)0x5A, (byte)0x30, (byte)0x55, 
(byte)0x31, (byte)0x0B, (byte)0x30, (byte)0x09, (byte)0x06, (byte)0x03, (byte)0x55, (byte)0x04, 
(byte)0x06, (byte)0x13, (byte)0x02, (byte)0x52, (byte)0x55, (byte)0x31, (byte)0x0A, (byte)0x30, 
(byte)0x08, (byte)0x06, (byte)0x03, (byte)0x55, (byte)0x04, (byte)0x0A, (byte)0x13, (byte)0x01, 
(byte)0x2D, (byte)0x31, (byte)0x0A, (byte)0x30, (byte)0x08, (byte)0x06, (byte)0x03, (byte)0x55, 
(byte)0x04, (byte)0x0B, (byte)0x13, (byte)0x01, (byte)0x2D, (byte)0x31, (byte)0x0C, (byte)0x30, 
(byte)0x0A, (byte)0x06, (byte)0x03, (byte)0x55, (byte)0x04, (byte)0x03, (byte)0x13, (byte)0x03, 
(byte)0x74, (byte)0x61, (byte)0x76, (byte)0x31, (byte)0x20, (byte)0x30, (byte)0x1E, (byte)0x06, 
(byte)0x09, (byte)0x2A, (byte)0x86, (byte)0x48, (byte)0x86, (byte)0xF7, (byte)0x0D, (byte)0x01, 
(byte)0x09, (byte)0x01, (byte)0x16, (byte)0x11, (byte)0x74, (byte)0x61, (byte)0x76, (byte)0x40, 
(byte)0x74, (byte)0x65, (byte)0x63, (byte)0x68, (byte)0x6E, (byte)0x6F, (byte)0x73, (byte)0x65, 
(byte)0x72, (byte)0x76, (byte)0x2E, (byte)0x72, (byte)0x75, (byte)0x30, (byte)0x81, (byte)0x9F, 
(byte)0x30, (byte)0x0D, (byte)0x06, (byte)0x09, (byte)0x2A, (byte)0x86, (byte)0x48, (byte)0x86, 
(byte)0xF7, (byte)0x0D, (byte)0x01, (byte)0x01, (byte)0x01, (byte)0x05, (byte)0x00, (byte)0x03, 
(byte)0x81, (byte)0x8D, (byte)0x00, (byte)0x30, (byte)0x81, (byte)0x89, (byte)0x02, (byte)0x81, 
(byte)0x81, (byte)0x00, (byte)0xC7, (byte)0xB3, (byte)0x38, (byte)0xC1, (byte)0x37, (byte)0x34, 
(byte)0x9B, (byte)0xB9, (byte)0x91, (byte)0x67, (byte)0x82, (byte)0x84, (byte)0x7A, (byte)0x0C, 
(byte)0x6D, (byte)0xFF, (byte)0x52, (byte)0xAB, (byte)0x2C, (byte)0x14, (byte)0x43, (byte)0xCE, 
(byte)0x6A, (byte)0x5C, (byte)0x88, (byte)0xCC, (byte)0x58, (byte)0x15, (byte)0x49, (byte)0x51, 
(byte)0x61, (byte)0x5A, (byte)0xA9, (byte)0x39, (byte)0x66, (byte)0xF4, (byte)0x56, (byte)0xD1, 
(byte)0x82, (byte)0x27, (byte)0xE8, (byte)0x34, (byte)0xCF, (byte)0x01, (byte)0x37, (byte)0xF9, 
(byte)0x2C, (byte)0xF8, (byte)0x55, (byte)0x3B, (byte)0x15, (byte)0x12, (byte)0x48, (byte)0x46, 
(byte)0xB8, (byte)0xCD, (byte)0x15, (byte)0xEC, (byte)0x04, (byte)0x73, (byte)0x91, (byte)0x0F, 
(byte)0xE0, (byte)0x30, (byte)0xB6, (byte)0x64, (byte)0x74, (byte)0xF5, (byte)0x89, (byte)0x7B, 
(byte)0xAA, (byte)0x9C, (byte)0x4A, (byte)0x71, (byte)0x4C, (byte)0x7E, (byte)0x7E, (byte)0x0A, 
(byte)0x77, (byte)0x35, (byte)0xFF, (byte)0x2D, (byte)0x5F, (byte)0x57, (byte)0xFB, (byte)0x01, 
(byte)0x6D, (byte)0x41, (byte)0x7B, (byte)0x07, (byte)0xA3, (byte)0xFC, (byte)0xA3, (byte)0x35, 
(byte)0x25, (byte)0xBA, (byte)0x48, (byte)0x82, (byte)0x30, (byte)0x62, (byte)0xA7, (byte)0x21, 
(byte)0x60, (byte)0x83, (byte)0x5D, (byte)0x37, (byte)0x5F, (byte)0xBC, (byte)0x85, (byte)0x08, 
(byte)0x6B, (byte)0x2B, (byte)0x45, (byte)0x2A, (byte)0xAB, (byte)0x76, (byte)0xDC, (byte)0x4E, 
(byte)0x1A, (byte)0xD0, (byte)0x27, (byte)0xB9, (byte)0x8B, (byte)0x05, (byte)0x60, (byte)0x50, 
(byte)0x89, (byte)0xE1, (byte)0x02, (byte)0x03, (byte)0x01, (byte)0x00, (byte)0x01, (byte)0xA3, 
(byte)0x20, (byte)0x30, (byte)0x1E, (byte)0x30, (byte)0x1C, (byte)0x06, (byte)0x03, (byte)0x55, 
(byte)0x1D, (byte)0x11, (byte)0x04, (byte)0x15, (byte)0x30, (byte)0x13, (byte)0x81, (byte)0x11, 
(byte)0x74, (byte)0x61, (byte)0x76, (byte)0x40, (byte)0x74, (byte)0x65, (byte)0x63, (byte)0x68, 
(byte)0x6E, (byte)0x6F, (byte)0x73, (byte)0x65, (byte)0x72, (byte)0x76, (byte)0x2E, (byte)0x72, 
(byte)0x75, (byte)0x30, (byte)0x0D, (byte)0x06, (byte)0x09, (byte)0x2A, (byte)0x86, (byte)0x48, 
(byte)0x86, (byte)0xF7, (byte)0x0D, (byte)0x01, (byte)0x01, (byte)0x05, (byte)0x05, (byte)0x00, 
(byte)0x03, (byte)0x82, (byte)0x01, (byte)0x01, (byte)0x00, (byte)0xC7, (byte)0xAA, (byte)0xB2, 
(byte)0x6B, (byte)0xEA, (byte)0xDB, (byte)0xB5, (byte)0xF3, (byte)0x2B, (byte)0x16, (byte)0x27, 
(byte)0xEC, (byte)0xDD, (byte)0x03, (byte)0x48, (byte)0x84, (byte)0x81, (byte)0x91, (byte)0xB6, 
(byte)0x67, (byte)0x8D, (byte)0xDD, (byte)0xCB, (byte)0xFB, (byte)0x10, (byte)0xF2, (byte)0x55, 
(byte)0x78, (byte)0x85, (byte)0xC2, (byte)0xA2, (byte)0x48, (byte)0x79, (byte)0x6B, (byte)0xFF, 
(byte)0x06, (byte)0x65, (byte)0x62, (byte)0x91, (byte)0x84, (byte)0x5C, (byte)0x8B, (byte)0x4C, 
(byte)0x74, (byte)0xE4, (byte)0xF9, (byte)0x2F, (byte)0x8B, (byte)0xD0, (byte)0x7F, (byte)0x87, 
(byte)0xFC, (byte)0xEF, (byte)0x57, (byte)0x17, (byte)0x4E, (byte)0x49, (byte)0x4C, (byte)0xD9, 
(byte)0x9B, (byte)0x72, (byte)0x6B, (byte)0x36, (byte)0x33, (byte)0x44, (byte)0xFE, (byte)0x03, 
(byte)0x7F, (byte)0x74, (byte)0x69, (byte)0x30, (byte)0x50, (byte)0x3C, (byte)0xA0, (byte)0x89, 
(byte)0x9B, (byte)0xD7, (byte)0x65, (byte)0x4C, (byte)0xE8, (byte)0x6D, (byte)0xA7, (byte)0xD9, 
(byte)0xB3, (byte)0xDC, (byte)0x13, (byte)0x4D, (byte)0x91, (byte)0x79, (byte)0x89, (byte)0x1A, 
(byte)0x28, (byte)0xBA, (byte)0x7D, (byte)0x9A, (byte)0x00, (byte)0x04, (byte)0x05, (byte)0xDA, 
(byte)0x30, (byte)0x6D, (byte)0xEF, (byte)0x65, (byte)0xCF, (byte)0x70, (byte)0x87, (byte)0xFC, 
(byte)0x6C, (byte)0xB9, (byte)0x94, (byte)0x3E, (byte)0x56, (byte)0xEA, (byte)0x7E, (byte)0x49, 
(byte)0xEC, (byte)0x43, (byte)0x3F, (byte)0xFD, (byte)0x1A, (byte)0x6E, (byte)0x71, (byte)0xF4, 
(byte)0xD7, (byte)0x24, (byte)0xEC, (byte)0x99, (byte)0x1F, (byte)0x4E, (byte)0x0F, (byte)0xCC, 
(byte)0x8A, (byte)0x29, (byte)0x5B, (byte)0x18, (byte)0x05, (byte)0xF2, (byte)0x60, (byte)0x8E, 
(byte)0x4A, (byte)0xEB, (byte)0x65, (byte)0xB7, (byte)0x80, (byte)0x8C, (byte)0xA9, (byte)0x4E, 
(byte)0xB3, (byte)0xAB, (byte)0xE8, (byte)0xB3, (byte)0x7F, (byte)0xCE, (byte)0x3F, (byte)0xD1, 
(byte)0xC8, (byte)0xC5, (byte)0x19, (byte)0x6F, (byte)0xC4, (byte)0xB9, (byte)0x12, (byte)0x07, 
(byte)0x8A, (byte)0xDB, (byte)0x8D, (byte)0x4D, (byte)0x07, (byte)0x69, (byte)0x99, (byte)0x7E, 
(byte)0xA2, (byte)0x3B, (byte)0xD3, (byte)0xB1, (byte)0x5F, (byte)0x7F, (byte)0xFC, (byte)0x54, 
(byte)0xDD, (byte)0x6F, (byte)0x47, (byte)0x76, (byte)0xAD, (byte)0xC9, (byte)0xA6, (byte)0x29, 
(byte)0x64, (byte)0x28, (byte)0xED, (byte)0xCA, (byte)0x29, (byte)0xBE, (byte)0xD1, (byte)0x82, 
(byte)0x8E, (byte)0x02, (byte)0xB2, (byte)0x20, (byte)0xE9, (byte)0x40, (byte)0xB1, (byte)0xAE, 
(byte)0xB4, (byte)0x5F, (byte)0x7E, (byte)0x59, (byte)0x25, (byte)0x9C, (byte)0xAC, (byte)0x17, 
(byte)0x9B, (byte)0xD4, (byte)0x6B, (byte)0x28, (byte)0xED, (byte)0xF2, (byte)0x14, (byte)0x81, 
(byte)0x0B, (byte)0xDD, (byte)0x62, (byte)0x40, (byte)0xA6, (byte)0x34, (byte)0xB8, (byte)0x94, 
(byte)0x40, (byte)0x8B, (byte)0x94, (byte)0xA5, (byte)0x5C, (byte)0xC0, (byte)0x85, (byte)0x00, 
(byte)0x8F, (byte)0x57, (byte)0x5F, (byte)0xD3, (byte)0xE5, (byte)0x6F, (byte)0x5B, (byte)0x2E, 
(byte)0xE9, (byte)0x2D, (byte)0x85, (byte)0x84, (byte)0xE3, (byte)0xE8, (byte)0xAD, (byte)0x8A, 
(byte)0xAD, (byte)0xD7, (byte)0x43, (byte)0x10, (byte)0xE7, (byte)0xBC, (byte)0xAD, (byte)0x0A, 
(byte)0xDD, (byte)0x1D, (byte)0x3C, (byte)0x15, (byte)0xA6, (byte)0x36, (byte)0xCE, (byte)0xC9, 
(byte)0x40, (byte)0x6B, (byte)0x87, (byte)0xA6, (byte)0x60, (byte)0xE5, (byte)0x1B, (byte)0x28, 
(byte)0x41
	};
/**
 * SignVerifyTest constructor comment.
 */
public SignVerifyTest() {
	super();
}
/**
 * Starts the application.
 * @param args an array of command-line arguments
 */
public static void main(java.lang.String[] args) {
	// Insert code to start the application here.

   try
   {

       java.lang.System.out.println("started.");
       java.lang.System.setProperty("javax.net.debug", "all");
       java.security.Security.addProvider(new com.sun.net.ssl.internal.ssl.Provider());
       char passphrase[] = "123".toCharArray();
       com.sun.net.ssl.KeyManagerFactory kmf = com.sun.net.ssl.KeyManagerFactory.getInstance("SunX509");
       java.security.KeyStore ks = java.security.KeyStore.getInstance("JKS");
       ks.load(new java.io.ByteArrayInputStream(jks_store), passphrase);
       java.util.Enumeration enum = ks.aliases();
       java.lang.String alias = (java.lang.String)enum.nextElement();
       java.security.PrivateKey k = (java.security.PrivateKey)ks.getKey(alias, passphrase);
       java.security.cert.Certificate c = ks.getCertificate(alias);

       java.security.Signature [] s = new java.security.Signature[4];
       s[0] = java.security.Signature.getInstance("SHA1withRSA");
       s[1] = java.security.Signature.getInstance("MD5withRSA");
       s[2] = java.security.Signature.getInstance("MD2withRSA");
       s[3] = RSASignature.b();

       for(int i=0;i<s.length;i++)
       {
          byte[] M = {1,2,3,4,5,6,7,8,9,0};
          s[i].initSign(k);
          s[i].update(M);
          byte [] C = s[i].sign();
          s[i].initVerify(c.getPublicKey());
          s[i].update(M);
          boolean res = s[i].verify(C);
          System.out.println(s[i].toString());
          System.out.println(res? "ok":"ERROR");
       }

   } catch (Throwable t) {
           t.printStackTrace();

   }
}
}


---------- END SOURCE ----------
(Review ID: 167037) 
======================================================================


Name: nt126004			Date: 12/17/2002


FULL PRODUCT VERSION :
RE SE build 1.4.1-b21


FULL OPERATING SYSTEM VERSION :
Windows 98 4.10.2222

A DESCRIPTION OF THE PROBLEM :
SSL authentication doesn't work with some client
certificates due to RSASignature BUG. I have a key pair
that cause this sequence to fail:
1 Sign some data with private key (using RSASignature)
2 Verify this signature

Arguments:
1. This key pair succeeds, if we change RSASiganture to
some other, Signature.getInstance("xxxxwithRSA").
That means that key pair is correct.
2. There are other key pairs that I consider as "good",
which doesn't cause error with any RSA signature
implementation.



REGRESSION.  Last worked in version 1.3

STEPS TO FOLLOW TO REPRODUCE THE PROBLEM :
1. Create com.sun.net.ssl.internal.ssl.RSASignature instance
2. Sign some data with my private key
3. Verify the signature with my public key

EXPECTED VERSUS ACTUAL BEHAVIOR :
if (signature.verify()==false)
System.out.println("error");

ERROR MESSAGES/STACK TRACES THAT OCCUR :
.
.
.
Client write key:
0000: 03 5D EA 90 9B F8 0B 07   DE CD 25 EA D9 1B 14 E4  .]........%.....
Server write key:
0000: C0 94 FD 22 1C E7 3E 7A   6D F4 FB 28 7E 93 BF B1  ..."..>zm..(....
... no IV for cipher
Trying provider SUN ... searching for RSA/ECB/PKCS1Padding
Trying provider SunJSSE ... searching for RSA/ECB/PKCS1Padding
JsseJCE: Using JSSE internal implementation for cipher RSA/ECB/PKCS1Padding
No provider implementation for RSA/ECB/PKCS1Padding found.
*** CertificateVerify
[write] MD5 and SHA1 hashes:  len = 134
0000: 0F 00 00 82 00 80 99 4D   40 CD B4 0E 32 F4 97 B0  .......M@...2...
0010: CD A5 B6 BA DB 5D CD BD   77 F8 CF 33 EA 5C 75 0B  .....]..w..3.\u.
0020: BC 6A 62 09 55 3A 5D A7   C2 38 23 C1 1D DB 58 C8  .jb.U:]..8#...X.
0030: B6 FE 29 5D 2B AF B8 85   B3 67 A3 37 3B AF AC 31  ..)]+....g.7;..1
0040: 02 67 A2 1F D6 84 6D 59   FC E3 46 66 1D 0F DB E8  .g....mY..Ff....
0050: B3 9B D9 A6 E9 66 D4 EA   4D AE F2 92 FF 58 E7 E5  .....f..M....X..
0060: FE 60 0E 40 15 AE CB 51   9A B0 D6 74 4E AF 90 31  .`.@...Q...tN..1
0070: 21 BC DD F8 4C 0E AE 4A   F1 CE C8 89 11 42 86 E8  !...L..J.....B..
0080: 5B FA 02 5D F0 A8                                  [..]..
main, WRITE: TLSv1 Handshake, length = 134
main, WRITE: TLSv1 Change Cipher Spec, length = 1
Trying provider SUN ... searching for RC4
Trying provider SunJSSE ... searching for RC4
JsseJCE: Using JSSE internal implementation for cipher RC4
No provider implementation for RC4 found.
*** Finished
verify_data:  { 47, 64, 49, 139, 204, 174, 59, 147, 245, 184, 154, 131 }
***
[write] MD5 and SHA1 hashes:  len = 16
0000: 14 00 00 0C 2F 40 31 8B   CC AE 3B 93 F5 B8 9A 83  ..../@1...;.....
Plaintext before ENCRYPTION:  len = 32
0000: 14 00 00 0C 2F 40 31 8B   CC AE 3B 93 F5 B8 9A 83  ..../@1...;.....
0010: 4C 54 49 F8 3F B6 7E 61   46 53 CE 3C B7 0E 8A E3  LTI.?..aFS.<....
main, WRITE: TLSv1 Handshake, length = 32
waiting for close_notify or alert: state 1
main, READ: TLSv1 Alert, length = 2
main, RECV TLSv1 ALERT:  fatal, bad_certificate
main, called closeSocket()
Exception while waiting for close javax.net.ssl.SSLHandshakeException: Received
fatal alert: bad_certificate
main, handling exception: javax.net.ssl.SSLHandshakeException: Received fatal
alert: bad_certificate


REPRODUCIBILITY :
This bug can be reproduced always.

---------- BEGIN SOURCE ----------
package com.sun.net.ssl.internal.ssl;
/**
 * Insert the type's description here.
 * Creation date: (11/15/2002 12:27:56)
 * @author: Administrator
 */
public class SignVerifyTest {
	final static byte [] jks_store =
	{
(byte)0xFE, (byte)0xED, (byte)0xFE, (byte)0xED, (byte)0x00, (byte)0x00, (byte)0x00, (byte)0x02, 
(byte)0x00, (byte)0x00, (byte)0x00, (byte)0x01, (byte)0x00, (byte)0x00, (byte)0x00, (byte)0x01, 
(byte)0x00, (byte)0x03, (byte)0x74, (byte)0x61, (byte)0x76, (byte)0x00, (byte)0x00, (byte)0x00, 
(byte)0xF1, (byte)0x2A, (byte)0xCE, (byte)0x4E, (byte)0x3F, (byte)0x00, (byte)0x00, (byte)0x02, 
(byte)0xBC, (byte)0x30, (byte)0x82, (byte)0x02, (byte)0xB8, (byte)0x30, (byte)0x0E, (byte)0x06, 
(byte)0x0A, (byte)0x2B, (byte)0x06, (byte)0x01, (byte)0x04, (byte)0x01, (byte)0x2A, (byte)0x02, 
(byte)0x11, (byte)0x01, (byte)0x01, (byte)0x05, (byte)0x00, (byte)0x04, (byte)0x82, (byte)0x02, 
(byte)0xA4, (byte)0xB2, (byte)0xEF, (byte)0x9B, (byte)0xAD, (byte)0x5E, (byte)0xEC, (byte)0x78, 
(byte)0x24, (byte)0xA2, (byte)0xF0, (byte)0x16, (byte)0xAD, (byte)0x55, (byte)0x13, (byte)0x85, 
(byte)0x09, (byte)0x91, (byte)0x69, (byte)0x2E, (byte)0xE2, (byte)0x36, (byte)0x83, (byte)0xE7, 
(byte)0xFE, (byte)0xAB, (byte)0xBA, (byte)0xC7, (byte)0xAB, (byte)0xFC, (byte)0xF2, (byte)0xFB, 
(byte)0x6A, (byte)0x57, (byte)0x1F, (byte)0xCE, (byte)0xD3, (byte)0xB3, (byte)0xB3, (byte)0x3F, 
(byte)0x69, (byte)0x33, (byte)0xD9, (byte)0x01, (byte)0x29, (byte)0x38, (byte)0x3E, (byte)0x49, 
(byte)0x64, (byte)0xEE, (byte)0x6A, (byte)0x59, (byte)0x7D, (byte)0x9E, (byte)0x4C, (byte)0x36, 
(byte)0x1C, (byte)0x51, (byte)0x8B, (byte)0xB2, (byte)0x4C, (byte)0x08, (byte)0x60, (byte)0xE1, 
(byte)0xC4, (byte)0x0C, (byte)0xBF, (byte)0xFE, (byte)0xCA, (byte)0x47, (byte)0xA9, (byte)0x7A, 
(byte)0xCA, (byte)0x8F, (byte)0xBA, (byte)0xB4, (byte)0x84, (byte)0x5D, (byte)0x3E, (byte)0xAB, 
(byte)0xBE, (byte)0xC9, (byte)0x53, (byte)0x5F, (byte)0x30, (byte)0x08, (byte)0x37, (byte)0x0C, 
(byte)0x88, (byte)0xCB, (byte)0x63, (byte)0xAD, (byte)0x2A, (byte)0x82, (byte)0x5A, (byte)0x71, 
(byte)0xE1, (byte)0xE7, (byte)0x62, (byte)0x3A, (byte)0x53, (byte)0x99, (byte)0x1A, (byte)0xE0, 
(byte)0xD5, (byte)0xC3, (byte)0x6E, (byte)0xFC, (byte)0x19, (byte)0xD3, (byte)0xD9, (byte)0xB7, 
(byte)0x71, (byte)0xC6, (byte)0x06, (byte)0x48, (byte)0x38, (byte)0xCB, (byte)0x06, (byte)0xBD, 
(byte)0xEF, (byte)0x70, (byte)0x1C, (byte)0xFA, (byte)0xAF, (byte)0x81, (byte)0xA4, (byte)0x7A, 
(byte)0x38, (byte)0xA8, (byte)0xF4, (byte)0x10, (byte)0xC0, (byte)0x52, (byte)0x1D, (byte)0x8C, 
(byte)0x58, (byte)0xEA, (byte)0x23, (byte)0x01, (byte)0xA8, (byte)0x71, (byte)0x80, (byte)0x07, 
(byte)0xC2, (byte)0x82, (byte)0x7C, (byte)0xDE, (byte)0x1A, (byte)0xAE, (byte)0x8A, (byte)0xC5, 
(byte)0xA8, (byte)0xF3, (byte)0x00, (byte)0xAF, (byte)0xE0, (byte)0x91, (byte)0x3B, (byte)0x3C, 
(byte)0xCC, (byte)0xEC, (byte)0x0F, (byte)0xB2, (byte)0xAD, (byte)0x83, (byte)0xAE, (byte)0x35, 
(byte)0x8F, (byte)0xA5, (byte)0x85, (byte)0x06, (byte)0x30, (byte)0x7A, (byte)0x57, (byte)0x15, 
(byte)0x0A, (byte)0x77, (byte)0xBE, (byte)0x8C, (byte)0xB1, (byte)0x22, (byte)0xFD, (byte)0x9F, 
(byte)0xA8, (byte)0x3D, (byte)0xF4, (byte)0x38, (byte)0x5B, (byte)0x9F, (byte)0xFF, (byte)0x5B, 
(byte)0xDD, (byte)0xFB, (byte)0xFD, (byte)0x7E, (byte)0x38, (byte)0x16, (byte)0xD9, (byte)0xEF, 
(byte)0xED, (byte)0xAC, (byte)0x9D, (byte)0xB5, (byte)0x92, (byte)0x7C, (byte)0x3C, (byte)0x88, 
(byte)0xDA, (byte)0x7D, (byte)0x6C, (byte)0x28, (byte)0x63, (byte)0x81, (byte)0xBD, (byte)0x23, 
(byte)0xD3, (byte)0x43, (byte)0x05, (byte)0x26, (byte)0xE3, (byte)0xD6, (byte)0xEF, (byte)0xE8, 
(byte)0xFB, (byte)0x45, (byte)0x7F, (byte)0xC7, (byte)0x94, (byte)0xB0, (byte)0x90, (byte)0x6A, 
(byte)0xD0, (byte)0xE9, (byte)0xA4, (byte)0xA5, (byte)0x5B, (byte)0x27, (byte)0x5E, (byte)0xCE, 
(byte)0x2F, (byte)0x9D, (byte)0x72, (byte)0xFF, (byte)0x73, (byte)0x23, (byte)0xD7, (byte)0x57, 
(byte)0xE9, (byte)0xC9, (byte)0xFE, (byte)0x02, (byte)0x50, (byte)0x47, (byte)0x22, (byte)0xB0, 
(byte)0x4C, (byte)0x5E, (byte)0x23, (byte)0x0D, (byte)0x5C, (byte)0xD7, (byte)0x95, (byte)0x5F, 
(byte)0x2F, (byte)0xE0, (byte)0x1A, (byte)0xAC, (byte)0x6C, (byte)0xB9, (byte)0xCF, (byte)0x32, 
(byte)0x29, (byte)0x9B, (byte)0xEA, (byte)0x19, (byte)0x0F, (byte)0xA2, (byte)0xBA, (byte)0xCD, 
(byte)0xB2, (byte)0xAF, (byte)0x4A, (byte)0xEC, (byte)0x84, (byte)0xEB, (byte)0x89, (byte)0xF3, 
(byte)0x46, (byte)0xD4, (byte)0x80, (byte)0xB4, (byte)0xBE, (byte)0xCB, (byte)0x64, (byte)0xC4, 
(byte)0xDB, (byte)0x84, (byte)0xA9, (byte)0x56, (byte)0x89, (byte)0x2D, (byte)0xAC, (byte)0xCE, 
(byte)0x8A, (byte)0xAF, (byte)0xAF, (byte)0x61, (byte)0xCF, (byte)0x3F, (byte)0x57, (byte)0x33, 
(byte)0xB3, (byte)0x2F, (byte)0x28, (byte)0xED, (byte)0x3A, (byte)0xB2, (byte)0x12, (byte)0x2C, 
(byte)0xD2, (byte)0x63, (byte)0xA1, (byte)0x14, (byte)0x9F, (byte)0xE1, (byte)0xB8, (byte)0xB5, 
(byte)0x64, (byte)0x6C, (byte)0x25, (byte)0x3B, (byte)0x86, (byte)0x33, (byte)0x21, (byte)0xED, 
(byte)0x9C, (byte)0x5D, (byte)0x18, (byte)0xF8, (byte)0x4E, (byte)0x5E, (byte)0xA1, (byte)0xA5, 
(byte)0x82, (byte)0xF2, (byte)0x77, (byte)0xEC, (byte)0x54, (byte)0x2E, (byte)0xA6, (byte)0xF8, 
(byte)0xA2, (byte)0x65, (byte)0x7B, (byte)0xED, (byte)0xE2, (byte)0x50, (byte)0x69, (byte)0xC4, 
(byte)0x6B, (byte)0xBB, (byte)0x58, (byte)0x92, (byte)0xC5, (byte)0xB7, (byte)0x22, (byte)0xD5, 
(byte)0x95, (byte)0x23, (byte)0x7B, (byte)0x20, (byte)0x1A, (byte)0xB4, (byte)0x6A, (byte)0xE9, 
(byte)0xD9, (byte)0xD2, (byte)0xB8, (byte)0x7F, (byte)0x15, (byte)0x88, (byte)0xB0, (byte)0xD0, 
(byte)0xA5, (byte)0x3D, (byte)0xCF, (byte)0x20, (byte)0x21, (byte)0xD0, (byte)0x45, (byte)0xEB, 
(byte)0xB2, (byte)0x58, (byte)0x6E, (byte)0xB3, (byte)0xD3, (byte)0x6A, (byte)0x90, (byte)0x0C, 
(byte)0x9E, (byte)0x09, (byte)0x2E, (byte)0xE3, (byte)0x0F, (byte)0xC4, (byte)0xE1, (byte)0x08, 
(byte)0xDC, (byte)0x4A, (byte)0x88, (byte)0xC0, (byte)0x4A, (byte)0x4D, (byte)0x0D, (byte)0x61, 
(byte)0x10, (byte)0x14, (byte)0xB7, (byte)0x40, (byte)0x16, (byte)0xC2, (byte)0x67, (byte)0x40, 
(byte)0x8F, (byte)0x8C, (byte)0x78, (byte)0x3D, (byte)0x71, (byte)0xD9, (byte)0xD6, (byte)0xDD, 
(byte)0x14, (byte)0x94, (byte)0x96, (byte)0x5E, (byte)0x3E, (byte)0xF5, (byte)0x48, (byte)0x14, 
(byte)0x44, (byte)0xB1, (byte)0x99, (byte)0xEC, (byte)0x8E, (byte)0xDD, (byte)0x9F, (byte)0x84, 
(byte)0x51, (byte)0x64, (byte)0x78, (byte)0x6A, (byte)0x4E, (byte)0x7E, (byte)0xE4, (byte)0x06, 
(byte)0x64, (byte)0xAF, (byte)0xD0, (byte)0x46, (byte)0xED, (byte)0xA9, (byte)0xE4, (byte)0x3B, 
(byte)0x7F, (byte)0xCC, (byte)0xFB, (byte)0xE7, (byte)0x3B, (byte)0x74, (byte)0x23, (byte)0x1A, 
(byte)0xA1, (byte)0x92, (byte)0x19, (byte)0x6A, (byte)0x16, (byte)0xCA, (byte)0x19, (byte)0x37, 
(byte)0x81, (byte)0x13, (byte)0xCA, (byte)0xEF, (byte)0xC6, (byte)0xDB, (byte)0x47, (byte)0x2C, 
(byte)0x12, (byte)0x79, (byte)0xF1, (byte)0xF8, (byte)0xE8, (byte)0xE7, (byte)0x57, (byte)0x9D, 
(byte)0x5E, (byte)0xCA, (byte)0x37, (byte)0xF4, (byte)0x04, (byte)0xE5, (byte)0xF9, (byte)0x4E, 
(byte)0x3E, (byte)0x4D, (byte)0x85, (byte)0x4B, (byte)0x21, (byte)0xD8, (byte)0x70, (byte)0x2D, 
(byte)0x72, (byte)0xC0, (byte)0x41, (byte)0x1E, (byte)0x51, (byte)0x18, (byte)0x90, (byte)0x9F, 
(byte)0x2C, (byte)0xBB, (byte)0x20, (byte)0xC6, (byte)0x58, (byte)0xA6, (byte)0xBC, (byte)0x17, 
(byte)0x78, (byte)0x01, (byte)0xFE, (byte)0x67, (byte)0x87, (byte)0xCA, (byte)0x39, (byte)0x81, 
(byte)0x05, (byte)0xF7, (byte)0x3C, (byte)0x0C, (byte)0x44, (byte)0x27, (byte)0xD8, (byte)0x74, 
(byte)0xA6, (byte)0xD0, (byte)0x32, (byte)0xC2, (byte)0xDC, (byte)0xEB, (byte)0x19, (byte)0xBA, 
(byte)0x9C, (byte)0x07, (byte)0xE5, (byte)0x6F, (byte)0xF6, (byte)0xFA, (byte)0x5E, (byte)0x29, 
(byte)0x31, (byte)0x82, (byte)0x07, (byte)0x92, (byte)0x6B, (byte)0xD9, (byte)0x8A, (byte)0xAD, 
(byte)0x95, (byte)0x31, (byte)0x6E, (byte)0xAA, (byte)0x82, (byte)0x33, (byte)0xA5, (byte)0x05, 
(byte)0x7A, (byte)0xE9, (byte)0x9B, (byte)0xDB, (byte)0xCD, (byte)0x68, (byte)0x22, (byte)0xCD, 
(byte)0x52, (byte)0x2F, (byte)0x79, (byte)0xB4, (byte)0x4A, (byte)0xE8, (byte)0xEC, (byte)0x3A, 
(byte)0x43, (byte)0x40, (byte)0x43, (byte)0x35, (byte)0x6F, (byte)0xAE, (byte)0x33, (byte)0xF4, 
(byte)0x98, (byte)0x97, (byte)0xA4, (byte)0x52, (byte)0x53, (byte)0xF1, (byte)0x6C, (byte)0xC7, 
(byte)0x6D, (byte)0x2B, (byte)0x16, (byte)0x32, (byte)0x1B, (byte)0xA2, (byte)0x0D, (byte)0x6A, 
(byte)0x8F, (byte)0x59, (byte)0x9B, (byte)0xC2, (byte)0x93, (byte)0x99, (byte)0xE9, (byte)0x5B, 
(byte)0x21, (byte)0xCD, (byte)0x56, (byte)0x41, (byte)0x59, (byte)0xE3, (byte)0xF9, (byte)0xC0, 
(byte)0xFD, (byte)0x4B, (byte)0x8B, (byte)0xF6, (byte)0x63, (byte)0xC5, (byte)0x56, (byte)0xDE, 
(byte)0x49, (byte)0x03, (byte)0xB6, (byte)0xF3, (byte)0x4D, (byte)0x8A, (byte)0x6D, (byte)0x04, 
(byte)0xBE, (byte)0xAF, (byte)0x1B, (byte)0x60, (byte)0xCE, (byte)0xFB, (byte)0x41, (byte)0xF1, 
(byte)0x0E, (byte)0xF2, (byte)0xC7, (byte)0xD4, (byte)0x62, (byte)0x23, (byte)0x8F, (byte)0x2B, 
(byte)0x01, (byte)0x5D, (byte)0x87, (byte)0xFC, (byte)0x88, (byte)0x28, (byte)0x0A, (byte)0xE4, 
(byte)0xD0, (byte)0xDC, (byte)0x58, (byte)0x92, (byte)0x81, (byte)0x00, (byte)0x00, (byte)0x00, 
(byte)0x01, (byte)0x00, (byte)0x05, (byte)0x58, (byte)0x2E, (byte)0x35, (byte)0x30, (byte)0x39, 
(byte)0x00, (byte)0x00, (byte)0x03, (byte)0x19, (byte)0x30, (byte)0x82, (byte)0x03, (byte)0x15, 
(byte)0x30, (byte)0x82, (byte)0x01, (byte)0xFD, (byte)0xA0, (byte)0x03, (byte)0x02, (byte)0x01, 
(byte)0x02, (byte)0x02, (byte)0x04, (byte)0x3C, (byte)0xB1, (byte)0x55, (byte)0xC1, (byte)0x30, 
(byte)0x0D, (byte)0x06, (byte)0x09, (byte)0x2A, (byte)0x86, (byte)0x48, (byte)0x86, (byte)0xF7, 
(byte)0x0D, (byte)0x01, (byte)0x01, (byte)0x05, (byte)0x05, (byte)0x00, (byte)0x30, (byte)0x81, 
(byte)0xA5, (byte)0x31, (byte)0x0B, (byte)0x30, (byte)0x09, (byte)0x06, (byte)0x03, (byte)0x55, 
(byte)0x04, (byte)0x06, (byte)0x13, (byte)0x02, (byte)0x72, (byte)0x75, (byte)0x31, (byte)0x1E, 
(byte)0x30, (byte)0x1C, (byte)0x06, (byte)0x03, (byte)0x55, (byte)0x04, (byte)0x0A, (byte)0x13, 
(byte)0x15, (byte)0x4D, (byte)0x61, (byte)0x69, (byte)0x6E, (byte)0x20, (byte)0x43, (byte)0x6F, 
(byte)0x6D, (byte)0x70, (byte)0x75, (byte)0x74, (byte)0x69, (byte)0x6E, (byte)0x67, (byte)0x20, 
(byte)0x43, (byte)0x65, (byte)0x6E, (byte)0x74, (byte)0x65, (byte)0x72, (byte)0x31, (byte)0x0F, 
(byte)0x30, (byte)0x0D, (byte)0x06, (byte)0x03, (byte)0x55, (byte)0x04, (byte)0x0B, (byte)0x13, 
(byte)0x06, (byte)0x63, (byte)0x61, (byte)0x2E, (byte)0x63, (byte)0x73, (byte)0x73, (byte)0x31, 
(byte)0x43, (byte)0x30, (byte)0x41, (byte)0x06, (byte)0x03, (byte)0x55, (byte)0x04, (byte)0x03, 
(byte)0x13, (byte)0x3A, (byte)0x4D, (byte)0x69, (byte)0x6E, (byte)0x69, (byte)0x73, (byte)0x74, 
(byte)0x72, (byte)0x79, (byte)0x20, (byte)0x6F, (byte)0x66, (byte)0x20, (byte)0x52, (byte)0x61, 
(byte)0x69, (byte)0x6C, (byte)0x77, (byte)0x61, (byte)0x79, (byte)0x20, (byte)0x54, (byte)0x72, 
(byte)0x61, (byte)0x6E, (byte)0x73, (byte)0x70, (byte)0x6F, (byte)0x72, (byte)0x74, (byte)0x20, 
(byte)0x52, (byte)0x6F, (byte)0x6F, (byte)0x74, (byte)0x20, (byte)0x43, (byte)0x65, (byte)0x72, 
(byte)0x74, (byte)0x69, (byte)0x66, (byte)0x69, (byte)0x63, (byte)0x61, (byte)0x74, (byte)0x69, 
(byte)0x6F, (byte)0x6E, (byte)0x20, (byte)0x41, (byte)0x75, (byte)0x74, (byte)0x68, (byte)0x6F, 
(byte)0x72, (byte)0x69, (byte)0x74, (byte)0x79, (byte)0x31, (byte)0x20, (byte)0x30, (byte)0x1E, 
(byte)0x06, (byte)0x0A, (byte)0x09, (byte)0x92, (byte)0x26, (byte)0x89, (byte)0x93, (byte)0xF2, 
(byte)0x2C, (byte)0x64, (byte)0x01, (byte)0x03, (byte)0x14, (byte)0x10, (byte)0x63, (byte)0x61, 
(byte)0x40, (byte)0x63, (byte)0x61, (byte)0x2E, 

Comments
CONVERTED DATA BugTraq+ Release Management Values COMMIT TO FIX: 1.0.3_02 1.4.1_03 mantis-beta FIXED IN: 1.0.3_02 1.4.1_03 mantis-beta INTEGRATED IN: 1.0.3_02 1.4.1_03 mantis-b13 mantis-beta VERIFIED IN: 1.4.1_03
02-09-2004

EVALUATION ###@###.### 2002-12-18 will fix. ###@###.### 2002-12-23 This is a bug in our wrapper program around the RSA Jsafe library. For all RSAPrivateKey objects whose P is less than Q, JSSE would not verify the signature correctly and thus considers a legitimate certificate to be invalid. Same bug applies to the cipher part where the decryption process would fail with an exception when it should not. The fix is really straight-forward, and considering the impact, this bug should be fixed for mantis.
02-09-2004