APAR status
Closed as program error.
Error description
Error Message: N/A . Stack Trace: N/A . When restricted policy file is used, the IBMPKCS11Impl in the provider list will be loaded to check if AES_256 is supported, even when IBMJCE is put before IBMPKCS11Impl.
Local fix
Use unrestricted policy file
Problem summary
The IBMPKCS11Impl provider is loaded because when JSSE tries to create a real AES cipher to detect if AES_256 is supported.
Problem conclusion
This defect will be fixed in: 7.0.0 SR5 6.0.1 SR6 6.0.0 SR14 5.0.0 SR16 FP3 . A fix is made to IBMJSSE2 provider to reject AES_256 before the AES cipher was created, based on the policy file. The associated Hursley CMVC defect is 197844 The associated Austin CMVC defect is 113817 The fix was delivered for Java 5.0 SR16FP3, Java 6.0 SR14, Java 626 SR6, and Java 7.0 SR5. . The affected jar is "ibmjsseprovider2.jar". The build level of this jar for the affected releases is "20130515"
Temporary fix
Comments
APAR Information
APAR number
IV42739
Reported component name
SECURITY
Reported component ID
620700125
Reported release
260
Status
CLOSED PER
PE
NoPE
HIPER
NoHIPER
Special Attention
NoSpecatt
Submitted date
2013-05-16
Closed date
2013-05-21
Last modified date
2013-06-09
APAR is sysrouted FROM one or more of the following:
APAR is sysrouted TO one or more of the following:
Fix information
Fixed component name
SECURITY
Fixed component ID
620700125
Applicable component levels
R260 PSY
UP
R600 PSY
UP
[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSNVBF","label":"Runtimes for Java Technology"},"Component":"","ARM Category":[],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"260","Edition":"","Line of Business":{"code":"LOB36","label":"IBM Automation"}}]
Document Information
Modified date:
07 December 2020