Its not the worst diagnostic situation that I have seen on z/OS ( that
award would go to the C-library OS I/O stuff IMO).

In this case, the external API that failed is gsk_decode_import_key(), and
if you look it up the error that you are getting is documented:
https://www.ibm.com/support/knowledgecenter/en/SSLTBW_2.3.0/com.ibm.zos.v2r3.gska100/msg34.htm

The algorithm codes can be found in /usr/include gskcms.h
x509_alg_pbeWithSha1And40BitRc2Cbc  = 36,  /* 1.2.840.113549.1.12.1.6   */

Kirk Wolf
Dovetailed Technologies
http://dovetail.com

PS>  If you want some "fun", take you X.509 cert and load it into a ASN.1
tool that displays the whole ugly thing

On Mon, Nov 6, 2017 at 7:55 PM, Charles Mills <charl...@mcn.org> wrote:

> Got it! The only password encryption algorithm (PBE) supported for FIPS
> mode is pbeWithSha1And3DesCbc.
>
> In OpenSSL PCKS12, I needed to add -certpbe PBE-SHA1-3DES
>
> Sheesh! Would a more specific error message kill them?
>
> Charles
>
>
> -----Original Message-----
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
> Behalf Of Charles Mills
> Sent: Monday, November 6, 2017 5:41 PM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: What cryptographic algorithm is not supported?
>
> Okay, I got trace information out of gskkyman. What do you make of this?
>
> INFO crypto_des3_encrypt_ctx(): Clear key DES3 encryption performed for 8
> bytes
> INFO crypto_des3_decrypt_ctx(): Clear key DES3 decryption performed for 8
> bytes
> INFO crypto_des3_encrypt_ctx_alet(): Clear key DES3 encryption performed
> for 8 bytes
> INFO crypto_des3_decrypt_ctx_alet(): Clear key DES3 decryption performed
> for 8 bytes
> INFO crypto_aes_encrypt_ctx(): Clear key AES 128-bit encryption performed
> for 16 bytes
> INFO crypto_aes_decrypt_ctx(): Clear key AES 128-bit decryption performed
> for 16 bytes
> INFO crypto_aes_encrypt_ctx_alet(): Clear key AES 128-bit encryption
> performed for 16 bytes
> INFO crypto_aes_decrypt_ctx_alet(): Clear key AES 128-bit decryption
> performed for 16 bytes
> INFO crypto_aes_encrypt_ctx(): Clear key AES 256-bit encryption performed
> for 16 bytes
> INFO crypto_aes_decrypt_ctx(): Clear key AES 256-bit decryption performed
> for 16 bytes
> INFO crypto_aes_encrypt_ctx_alet(): Clear key AES 256-bit encryption
> performed for 16 bytes
> INFO crypto_aes_decrypt_ctx_alet(): Clear key AES 256-bit decryption
> performed for 16 bytes
> INFO crypto_rsa_public_encrypt(): RSA modulus is 2048 bits
> INFO crypto_rsa_public_encrypt(): Software RSA public key encryption
> performed
> INFO crypto_rsa_private_decrypt(): Using PKCS private key
> INFO crypto_rsa_private_decrypt(): RSA modulus is 2048 bits
> INFO crypto_rsa_private_decrypt(): Software RSA private key decryption
> performed
> INFO open_kdb_check_filedata(): Record size 5000, Record count 12
> INFO gsk_build_issuer_chains(): Record 'Equifax Secure Certificate
> Authority' is self-signed
> INFO gsk_build_issuer_chains(): Record 'Equifax Secure eBusiness CA-2' is
> self-signed
> INFO gsk_build_issuer_chains(): Record 'VeriSign Class 1 Public Primary CA
> - G2' is self-signed
> INFO gsk_build_issuer_chains(): Record 'VeriSign Class 2 Public Primary CA
> - G2' is self-signed
> INFO gsk_build_issuer_chains(): Record 'VeriSign Class 3 Public Primary CA
> - G2' is self-signed
> INFO gsk_build_issuer_chains(): Record 'VeriSign Class 4 Public Primary CA
> - G2' is self-signed
> INFO gsk_build_issuer_chains(): Record 'VeriSign Class 1 Public Primary CA
> - G3' is self-signed
> INFO gsk_build_issuer_chains(): Record 'VeriSign Class 2 Public Primary CA
> - G3' is self-signed
> INFO gsk_build_issuer_chains(): Record 'VeriSign Class 3 Public Primary CA
> - G3' is self-signed
> INFO gsk_build_issuer_chains(): Record 'VeriSign Class 4 Public Primary CA
> - G3' is self-signed
> INFO gsk_build_issuer_chains(): Record 'VeriSign Class 3 Public Primary CA
> - G5' is self-signed
> INFO gsk_build_issuer_chains(): Record 'CMC_root_Exp_2024a' is self-signed
> INFO open_kdb_check_filedata(): Record size 5000, Record count 0
> ERROR crypto_pbe_decrypt_data(): Algorithm 36 is not supported for PBE
> ERROR import_pkcs12v3(): Unable to decrypt EncryptedData message: Error
> 0x03353003
> ERROR gsk_decode_import_key(): Unable to import PKCS12 V3: Error 0x03353003
> ERROR gsk_import_key(): Unable to decode subject certificate or chain:
> Error 0x03353003
>
> Algorithm 36 (cipher suite 36?) is TLS_DH_DSS_WITH_AES_256_CBC_SHA. Where
> does that come into the picture? What is PBE?
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to