IBM Support

IJ08530: IBMPKCS11IMPL PROVIDER USES THE WRONG RSA CIPHER MECHANISM FOR THE RSA/ECB/PKCS1PADDING CIPHER

Subscribe to this APAR

By subscribing, you receive periodic emails alerting you to the status of the APAR, along with a link to the fix after it becomes available. You can track this item individually or track all items by product.

Notify me when this APAR changes.

Notify me when an APAR for this component changes.

 

APAR status

  • Closed as program error.

Error description

  • Error Message: N/A
    .
    Stack Trace: N/A
    .
    The customer experienced a "No such algorithm" exception while
    attempting to get an RSA/ECB/PKCS1Padding cipher instance.  An
    IBM Crypto Express adapter configured in CCA mode was being
    used.
    java.security.NoSuchAlgorithmException: No such algorithm:
    RSA/ECB/PKCS1Padding
            at javax.crypto.Cipher.getInstance(Unknown Source)
            at rbitest.decryptMessage(rbitest.java:388)
            at rbitest.runTest(rbitest.java:164)
            at rbitest.runTest(rbitest.java:136)
            at rbitest.main(rbitest.java:110)
    

Local fix

Problem summary

  • The customer experienced a "No such algorithm" exception while
    using an IBM Crypto Express adapter configured in CCA mode.
    java.security.NoSuchAlgorithmException: No such algorithm:
    RSA/ECB/PKCS1Padding
            at javax.crypto.Cipher.getInstance(Unknown Source)
            at test.decryptMessage(test.java:388)
            at test.runTest(test.java:164)
            at test.runTest(test.java:136)
            at test.main(test.java:110)
    This exception was seen because the IBMPKCS11Impl provider was
    using the CKM_RSA_X_509 mechanism for the RSA/ECB/PKCS1Padding
    cipher.  Not only is CKM_RSA_X_509 the incorrect mechanism for
    this cipher, CKM_RSA_X_509 is not available on an IBM Crypto
    Express adapter configured in CCA mode.  The IBMPKCS11Impl
    provider should have been using the CKM_RSA_PKCS mechanism
    instead.
    

Problem conclusion

  • The IBMPKCS11Impl provider has been modified to use the
    CKM_RSA_PKCS mechanism for the RSA/ECB/PKCS1Padding cipher.
    The associated CMVC defect is 117903.
    The associated RTC problem report is 138957.
    JVMs affected : Java 6.0, Java 6.1, Java 7.0 , Java 7.1 and Java
    8.0
    This fix was delivered for: 6.0 SR16 FP75,  6.1 SR8 FP75, 70
    SR10 FP35, 7.1 SR4 FP35, and 80 SR5 FP 25.
    The affected jar file is ibmpkcs11impl.jar.
    The build level of this jar for the affected releases is
    "20180814".
    .
    This APAR will be fixed in the following Java Releases:
       8    SR5 FP25  (8.0.5.25)
       6    SR16 FP75 (6.0.16.75)
       7 R1 SR4 FP35  (7.1.4.35)
       7    SR10 FP35 (7.0.10.35)
       6 R1 SR8 FP75  (6.1.8.75)
    .
    Contact your IBM Product's Service Team for these Service
    Refreshes and Fix Packs.
    For those running stand-alone, information about the available
    Service Refreshes and Fix Packs can be found at:
               https://www.ibm.com/developerworks/java/jdk/
    

Temporary fix

Comments

APAR Information

  • APAR number

    IJ08530

  • Reported component name

    SECURITY

  • Reported component ID

    620700125

  • Reported release

    600

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt / Xsystem

  • Submitted date

    2018-08-16

  • Closed date

    2018-08-20

  • Last modified date

    2018-08-20

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

Fix information

  • Fixed component name

    SECURITY

  • Fixed component ID

    620700125

Applicable component levels

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSNVBF","label":"Runtimes for Java Technology"},"Component":"","ARM Category":[],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"6.0","Edition":"","Line of Business":{"code":"LOB36","label":"IBM Automation"}}]

Document Information

Modified date:
07 December 2020