@Override public void engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain) throws KeyStoreException { throw new KeyStoreException("Not supported"); }
@Override public void engineSetCertificateEntry(String alias, Certificate cert) throws KeyStoreException { throw new KeyStoreException("Not supported"); }
@Override public void engineSetKeyEntry(String alias, byte[] key, Certificate[] chain) throws KeyStoreException { throw new KeyStoreException("Not supported"); }
@Override public void engineDeleteEntry(String alias) throws KeyStoreException { throw new KeyStoreException("Not supported"); }
@Override public void engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain) throws KeyStoreException { throw new KeyStoreException("Not supported"); }
public void setCertificate(String alias, Certificate certificate) throws KeyStoreException { try { keyStore.setCertificateEntry(alias, certificate); } catch (GeneralSecurityException e) { throw new KeyStoreException("Failed to set the certificate", e); } }
public void setPrivateKey(String alias, PrivateKey privateKey, Certificate[] certChain) throws KeyStoreException { try { keyStore.setKeyEntry(alias, privateKey, "".toCharArray(), certChain); } catch (GeneralSecurityException e) { throw new KeyStoreException("Failed to set the private key", e); } }
public KeyStoreHolder() throws KeyStoreException { try { keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); keyStore.load(null, null); } catch (GeneralSecurityException | IOException e) { throw new KeyStoreException("KeyStore creation error", e); } }
@Override protected void engineInit(KeyStore keyStore) throws KeyStoreException { try { parent.engineInit(keyStore); } catch (KeyStoreException e) { throw e; } catch (Exception e) { throw new KeyStoreException(e); } }
@Override protected synchronized void engineInit(KeyStore keyStore, char[] chars) throws KeyStoreException, NoSuchAlgorithmException, UnrecoverableKeyException { if (providerFactory != null) { throw new KeyStoreException("Already initialized"); } if (!keyStore.aliases().hasMoreElements()) { throw new KeyStoreException("No aliases found"); } kmf.init(keyStore, chars); providerFactory = new ProviderFactory(ReferenceCountedOpenSslContext.chooseX509KeyManager( kmf.getKeyManagers()), password(chars), Collections.list(keyStore.aliases())); }
@Override protected void engineInit(KeyStore keyStore) throws KeyStoreException { try { parent.engineInit(keyStore); } catch (KeyStoreException e) { throw e; } catch (Exception e) { throw new KeyStoreException(e); } }
public static PublicKey loadPublicKey(String publicKey) throws GeneralSecurityException { Matcher matcher = PUBLIC_KEY_PATTERN.matcher(publicKey); if (!matcher.find()) { throw new KeyStoreException("did not find a public key"); } String data = matcher.group(1); byte[] encodedKey = base64Decode(data); X509EncodedKeySpec encodedKeySpec = new X509EncodedKeySpec(encodedKey); for (String algorithm : SUPPORTED_KEY_TYPES) { try { KeyFactory keyFactory = KeyFactory.getInstance(algorithm); return keyFactory.generatePublic(encodedKeySpec); } catch (InvalidKeySpecException ignore) { } } throw new InvalidKeySpecException("Key type must be one of " + SUPPORTED_KEY_TYPES); }
@Override public final KeyStoreException invalidKeyStoreEntryType(final String alias, final Class<?> expectedClass, final Class<?> actualClass) { final KeyStoreException result = new KeyStoreException(String.format(getLoggingLocale(), invalidKeyStoreEntryType$str(), alias, expectedClass, actualClass)); final StackTraceElement[] st = result.getStackTrace(); result.setStackTrace(Arrays.copyOfRange(st, 1, st.length)); return result; } private static final String keyCannotBeProtected = "ELY02003: Key store key for alias \"%s\" cannot be protected";
@Override public final KeyStoreException creationNotConfigured(final String alias) { final KeyStoreException result = new KeyStoreException(String.format(getLoggingLocale(), creationNotConfigured$str(), alias)); final StackTraceElement[] st = result.getStackTrace(); result.setStackTrace(Arrays.copyOfRange(st, 1, st.length)); return result; } private static final String ldapKeyStoreFailedToStore = "ELY02025: LdapKeyStore failed store alias [%s]";
@Override public final KeyStoreException ldapKeyStoreFailedToSerializeCertificate(final String alias, final Throwable cause) { final KeyStoreException result = new KeyStoreException(String.format(getLoggingLocale(), ldapKeyStoreFailedToSerializeCertificate$str(), alias), cause); final StackTraceElement[] st = result.getStackTrace(); result.setStackTrace(Arrays.copyOfRange(st, 1, st.length)); return result; } private static final String ldapKeyStoreFailedToSerializeKey = "ELY02027: LdapKeyStore failed to protect (pack into keystore) key of alias [%s]";
@Override public final KeyStoreException ldapKeyStoreFailedToDeleteNonExisting(final String alias) { final KeyStoreException result = new KeyStoreException(String.format(getLoggingLocale(), ldapKeyStoreFailedToDeleteNonExisting$str(), alias)); final StackTraceElement[] st = result.getStackTrace(); result.setStackTrace(Arrays.copyOfRange(st, 1, st.length)); return result; } private static final String ldapKeyStoreFailedToTestAliasExistence = "ELY02030: LdapKeyStore failed to test alias [%s] existence";
@Override public final KeyStoreException keyCannotBeProtected(final String alias) { final KeyStoreException result = new KeyStoreException(String.format(getLoggingLocale(), keyCannotBeProtected$str(), alias)); final StackTraceElement[] st = result.getStackTrace(); result.setStackTrace(Arrays.copyOfRange(st, 1, st.length)); return result; } private static final String keyStoreFailedToTranslate = "ELY02004: Key store failed to translate password for alias \"%s\"";
@Override public final KeyStoreException ldapKeyStoreFailedToSerializeKey(final String alias, final Throwable cause) { final KeyStoreException result = new KeyStoreException(String.format(getLoggingLocale(), ldapKeyStoreFailedToSerializeKey$str(), alias), cause); final StackTraceElement[] st = result.getStackTrace(); result.setStackTrace(Arrays.copyOfRange(st, 1, st.length)); return result; } private static final String ldapKeyStoreFailedToDelete = "ELY02028: LdapKeyStore failed to delete alias [%s]";
public void engineSetKeyEntry(final String alias, final Key key, final char[] password, final Certificate[] chain) throws KeyStoreException { if (password != null) { throw new KeyStoreException(log.invalidKeyStoreEntryPassword(alias)); } if (key instanceof Password) { engineSetEntry(alias, new PasswordEntry((Password) key), null); } throw log.invalidKeyStoreEntryType(alias, PasswordEntry.class, Key.class); }
public void engineSetEntry(final String alias, final KeyStore.Entry entry, final KeyStore.ProtectionParameter protParam) throws KeyStoreException { if (entry instanceof PasswordEntry) try { delegate.setEntry(alias, new KeyStore.SecretKeyEntry(encoded(((PasswordEntry) entry).getPassword())), protParam); } catch (InvalidKeyException e) { throw new KeyStoreException(e); }else { delegate.setEntry(alias, entry, protParam); } }