Hi Dominik, The example you provided is a little bit confusing. The PUBLIC key of the recipient is applied for asymmetric encryption. So, there no need to access a password-protected key when the data is being marshalled. However, the recipient will use a PRIVATE key from a key store to decrypt / unmarshall the message.
It is possible that the private key could have a password that is different than the keystore password. That feature is not currently supported, but in my opinion it should be. I created a ticket for this: https://issues.apache.org/jira/browse/CAMEL-5545 I'll try to have a look at this in the next several days. -Rich On Tue, Aug 28, 2012 at 6:18 PM, ychawla <premiergenerat...@yahoo.com>wrote: > Hi Dominik, > I think this is the default behavior in Java. Whenever I work with > keystores, the keystore password must match the key password. > > This could be due to the KeyManagerFactory implementation: > > > http://docs.oracle.com/javase/6/docs/api/javax/net/ssl/KeyManagerFactory.html#init%28java.security.KeyStore,%20char[]%29 > > It only allows for a single password. > > Thanks, > Yogesh > > > > -- > View this message in context: > http://camel.465427.n5.nabble.com/XMLSecurity-key-recovery-fails-when-keystore-and-key-use-different-passwords-tp5718094p5718217.html > Sent from the Camel - Users mailing list archive at Nabble.com. >