VU#306792: Bouncy Castle BKS-V1 keystore files vulnerable to trivial hash collisions
Bouncy Castle BKS version 1 keystore files use an HMAC that is only 16 bits long,which can allow an attacker to compromise the integrity of a BKS-V1 keystore. Continue reading VU#306792: Bouncy Castle BKS-V1 keystore files vulnerable to trivial hash collisions