jdk/src/share/classes/sun/security/tools/KeyTool.java
author weijun
Fri, 03 Apr 2009 11:36:19 +0800
changeset 2437 098db6faaf66
parent 2432 dc17f417ef85
child 3316 32d30c561c5a
permissions -rw-r--r--
6825352: support self-issued certificate in keytool Reviewed-by: xuelei
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     1
/*
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
     2
 * Copyright 1997-2009 Sun Microsystems, Inc.  All Rights Reserved.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     3
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
90ce3da70b43 Initial load
duke
parents:
diff changeset
     4
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
     5
 * This code is free software; you can redistribute it and/or modify it
90ce3da70b43 Initial load
duke
parents:
diff changeset
     6
 * under the terms of the GNU General Public License version 2 only, as
90ce3da70b43 Initial load
duke
parents:
diff changeset
     7
 * published by the Free Software Foundation.  Sun designates this
90ce3da70b43 Initial load
duke
parents:
diff changeset
     8
 * particular file as subject to the "Classpath" exception as provided
90ce3da70b43 Initial load
duke
parents:
diff changeset
     9
 * by Sun in the LICENSE file that accompanied this code.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    10
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    11
 * This code is distributed in the hope that it will be useful, but WITHOUT
90ce3da70b43 Initial load
duke
parents:
diff changeset
    12
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
90ce3da70b43 Initial load
duke
parents:
diff changeset
    13
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
90ce3da70b43 Initial load
duke
parents:
diff changeset
    14
 * version 2 for more details (a copy is included in the LICENSE file that
90ce3da70b43 Initial load
duke
parents:
diff changeset
    15
 * accompanied this code).
90ce3da70b43 Initial load
duke
parents:
diff changeset
    16
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    17
 * You should have received a copy of the GNU General Public License version
90ce3da70b43 Initial load
duke
parents:
diff changeset
    18
 * 2 along with this work; if not, write to the Free Software Foundation,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    19
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    20
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    21
 * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    22
 * CA 95054 USA or visit www.sun.com if you need additional information or
90ce3da70b43 Initial load
duke
parents:
diff changeset
    23
 * have any questions.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    24
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    25
90ce3da70b43 Initial load
duke
parents:
diff changeset
    26
package sun.security.tools;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    27
90ce3da70b43 Initial load
duke
parents:
diff changeset
    28
import java.io.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    29
import java.security.KeyStore;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    30
import java.security.KeyStoreException;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    31
import java.security.MessageDigest;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    32
import java.security.Key;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    33
import java.security.PublicKey;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    34
import java.security.PrivateKey;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    35
import java.security.Security;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    36
import java.security.Signature;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    37
import java.security.UnrecoverableEntryException;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    38
import java.security.UnrecoverableKeyException;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    39
import java.security.Principal;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    40
import java.security.Provider;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    41
import java.security.Identity;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    42
import java.security.cert.Certificate;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    43
import java.security.cert.CertificateFactory;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    44
import java.security.cert.X509Certificate;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    45
import java.security.cert.CertificateException;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    46
import java.text.Collator;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    47
import java.text.MessageFormat;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    48
import java.util.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    49
import java.lang.reflect.Constructor;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    50
import java.net.URL;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    51
import java.net.URLClassLoader;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    52
90ce3da70b43 Initial load
duke
parents:
diff changeset
    53
import sun.misc.BASE64Encoder;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    54
import sun.security.util.ObjectIdentifier;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    55
import sun.security.pkcs.PKCS10;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    56
import sun.security.provider.IdentityDatabase;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    57
import sun.security.provider.SystemSigner;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    58
import sun.security.provider.SystemIdentity;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    59
import sun.security.provider.X509Factory;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    60
import sun.security.util.DerOutputStream;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    61
import sun.security.util.Password;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    62
import sun.security.util.PathList;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    63
import javax.crypto.KeyGenerator;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    64
import javax.crypto.SecretKey;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    65
904
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
    66
import javax.net.ssl.HostnameVerifier;
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
    67
import javax.net.ssl.HttpsURLConnection;
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
    68
import javax.net.ssl.SSLContext;
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
    69
import javax.net.ssl.SSLSession;
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
    70
import javax.net.ssl.TrustManager;
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
    71
import javax.net.ssl.X509TrustManager;
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
    72
import sun.misc.BASE64Decoder;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
    73
import sun.security.pkcs.PKCS10Attribute;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
    74
import sun.security.pkcs.PKCS9Attribute;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
    75
import sun.security.util.DerValue;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    76
import sun.security.x509.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    77
90ce3da70b43 Initial load
duke
parents:
diff changeset
    78
import static java.security.KeyStore.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    79
90ce3da70b43 Initial load
duke
parents:
diff changeset
    80
/**
90ce3da70b43 Initial load
duke
parents:
diff changeset
    81
 * This tool manages keystores.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    82
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    83
 * @author Jan Luehe
90ce3da70b43 Initial load
duke
parents:
diff changeset
    84
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    85
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    86
 * @see java.security.KeyStore
90ce3da70b43 Initial load
duke
parents:
diff changeset
    87
 * @see sun.security.provider.KeyProtector
90ce3da70b43 Initial load
duke
parents:
diff changeset
    88
 * @see sun.security.provider.JavaKeyStore
90ce3da70b43 Initial load
duke
parents:
diff changeset
    89
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    90
 * @since 1.2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    91
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    92
public final class KeyTool {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    93
90ce3da70b43 Initial load
duke
parents:
diff changeset
    94
    private boolean debug = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    95
    private int command = -1;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    96
    private String sigAlgName = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    97
    private String keyAlgName = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    98
    private boolean verbose = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    99
    private int keysize = -1;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   100
    private boolean rfc = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   101
    private long validity = (long)90;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   102
    private String alias = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   103
    private String dname = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   104
    private String dest = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   105
    private String filename = null;
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   106
    private String infilename = null;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   107
    private String outfilename = null;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   108
    private String srcksfname = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   109
90ce3da70b43 Initial load
duke
parents:
diff changeset
   110
    // User-specified providers are added before any command is called.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   111
    // However, they are not removed before the end of the main() method.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   112
    // If you're calling KeyTool.main() directly in your own Java program,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   113
    // please programtically add any providers you need and do not specify
90ce3da70b43 Initial load
duke
parents:
diff changeset
   114
    // them through the command line.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   115
90ce3da70b43 Initial load
duke
parents:
diff changeset
   116
    private Set<Pair <String, String>> providers = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   117
    private String storetype = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   118
    private String srcProviderName = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   119
    private String providerName = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   120
    private String pathlist = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   121
    private char[] storePass = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   122
    private char[] storePassNew = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   123
    private char[] keyPass = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   124
    private char[] keyPassNew = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   125
    private char[] newPass = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   126
    private char[] destKeyPass = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   127
    private char[] srckeyPass = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   128
    private String ksfname = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   129
    private File ksfile = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   130
    private InputStream ksStream = null; // keystore stream
904
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
   131
    private String sslserver = null;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   132
    private KeyStore keyStore = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   133
    private boolean token = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   134
    private boolean nullStream = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   135
    private boolean kssave = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   136
    private boolean noprompt = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   137
    private boolean trustcacerts = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   138
    private boolean protectedPath = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   139
    private boolean srcprotectedPath = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   140
    private CertificateFactory cf = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   141
    private KeyStore caks = null; // "cacerts" keystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
   142
    private char[] srcstorePass = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   143
    private String srcstoretype = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   144
    private Set<char[]> passwords = new HashSet<char[]> ();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   145
    private String startDate = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   146
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   147
    private List <String> v3ext = new ArrayList <String> ();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   148
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   149
    private static final int CERTREQ = 1;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   150
    private static final int CHANGEALIAS = 2;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   151
    private static final int DELETE = 3;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   152
    private static final int EXPORTCERT = 4;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   153
    private static final int GENKEYPAIR = 5;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   154
    private static final int GENSECKEY = 6;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   155
    // there is no HELP
90ce3da70b43 Initial load
duke
parents:
diff changeset
   156
    private static final int IDENTITYDB = 7;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   157
    private static final int IMPORTCERT = 8;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   158
    private static final int IMPORTKEYSTORE = 9;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   159
    private static final int KEYCLONE = 10;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   160
    private static final int KEYPASSWD = 11;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   161
    private static final int LIST = 12;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   162
    private static final int PRINTCERT = 13;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   163
    private static final int SELFCERT = 14;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   164
    private static final int STOREPASSWD = 15;
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   165
    private static final int GENCERT = 16;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   166
    private static final int PRINTCERTREQ = 17;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   167
90ce3da70b43 Initial load
duke
parents:
diff changeset
   168
    private static final Class[] PARAM_STRING = { String.class };
90ce3da70b43 Initial load
duke
parents:
diff changeset
   169
90ce3da70b43 Initial load
duke
parents:
diff changeset
   170
    private static final String JKS = "jks";
90ce3da70b43 Initial load
duke
parents:
diff changeset
   171
    private static final String NONE = "NONE";
90ce3da70b43 Initial load
duke
parents:
diff changeset
   172
    private static final String P11KEYSTORE = "PKCS11";
90ce3da70b43 Initial load
duke
parents:
diff changeset
   173
    private static final String P12KEYSTORE = "PKCS12";
90ce3da70b43 Initial load
duke
parents:
diff changeset
   174
    private final String keyAlias = "mykey";
90ce3da70b43 Initial load
duke
parents:
diff changeset
   175
90ce3da70b43 Initial load
duke
parents:
diff changeset
   176
    // for i18n
90ce3da70b43 Initial load
duke
parents:
diff changeset
   177
    private static final java.util.ResourceBundle rb =
90ce3da70b43 Initial load
duke
parents:
diff changeset
   178
        java.util.ResourceBundle.getBundle("sun.security.util.Resources");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   179
    private static final Collator collator = Collator.getInstance();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   180
    static {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   181
        // this is for case insensitive string comparisons
90ce3da70b43 Initial load
duke
parents:
diff changeset
   182
        collator.setStrength(Collator.PRIMARY);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   183
    };
90ce3da70b43 Initial load
duke
parents:
diff changeset
   184
90ce3da70b43 Initial load
duke
parents:
diff changeset
   185
    private KeyTool() { }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   186
90ce3da70b43 Initial load
duke
parents:
diff changeset
   187
    public static void main(String[] args) throws Exception {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   188
        KeyTool kt = new KeyTool();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   189
        kt.run(args, System.out);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   190
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   191
90ce3da70b43 Initial load
duke
parents:
diff changeset
   192
    private void run(String[] args, PrintStream out) throws Exception {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   193
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   194
            parseArgs(args);
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   195
            if (command != -1) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   196
                doCommands(out);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   197
            }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   198
        } catch (Exception e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   199
            System.out.println(rb.getString("keytool error: ") + e);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   200
            if (verbose) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   201
                e.printStackTrace(System.out);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   202
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   203
            if (!debug) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   204
                System.exit(1);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   205
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   206
                throw e;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   207
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   208
        } finally {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   209
            for (char[] pass : passwords) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   210
                if (pass != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   211
                    Arrays.fill(pass, ' ');
90ce3da70b43 Initial load
duke
parents:
diff changeset
   212
                    pass = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   213
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   214
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   215
90ce3da70b43 Initial load
duke
parents:
diff changeset
   216
            if (ksStream != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   217
                ksStream.close();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   218
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   219
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   220
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   221
90ce3da70b43 Initial load
duke
parents:
diff changeset
   222
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   223
     * Parse command line arguments.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   224
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   225
    void parseArgs(String[] args) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   226
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   227
        if (args.length == 0) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   228
            usage();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   229
            return;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   230
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   231
90ce3da70b43 Initial load
duke
parents:
diff changeset
   232
        int i=0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   233
90ce3da70b43 Initial load
duke
parents:
diff changeset
   234
        for (i=0; (i < args.length) && args[i].startsWith("-"); i++) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   235
90ce3da70b43 Initial load
duke
parents:
diff changeset
   236
            String flags = args[i];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   237
            /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   238
             * command modes
90ce3da70b43 Initial load
duke
parents:
diff changeset
   239
             */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   240
            if (collator.compare(flags, "-certreq") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   241
                command = CERTREQ;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   242
            } else if (collator.compare(flags, "-delete") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   243
                command = DELETE;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   244
            } else if (collator.compare(flags, "-export") == 0 ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   245
                    collator.compare(flags, "-exportcert") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   246
                command = EXPORTCERT;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   247
            } else if (collator.compare(flags, "-genkey") == 0 ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   248
                    collator.compare(flags, "-genkeypair") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   249
                command = GENKEYPAIR;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   250
            } else if (collator.compare(flags, "-help") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   251
                usage();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   252
                return;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   253
            } else if (collator.compare(flags, "-identitydb") == 0) { // obsolete
90ce3da70b43 Initial load
duke
parents:
diff changeset
   254
                command = IDENTITYDB;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   255
            } else if (collator.compare(flags, "-import") == 0 ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   256
                    collator.compare(flags, "-importcert") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   257
                command = IMPORTCERT;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   258
            } else if (collator.compare(flags, "-keyclone") == 0) { // obsolete
90ce3da70b43 Initial load
duke
parents:
diff changeset
   259
                command = KEYCLONE;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   260
            } else if (collator.compare(flags, "-changealias") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   261
                command = CHANGEALIAS;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   262
            } else if (collator.compare(flags, "-keypasswd") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   263
                command = KEYPASSWD;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   264
            } else if (collator.compare(flags, "-list") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   265
                command = LIST;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   266
            } else if (collator.compare(flags, "-printcert") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   267
                command = PRINTCERT;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   268
            } else if (collator.compare(flags, "-selfcert") == 0) {     // obsolete
90ce3da70b43 Initial load
duke
parents:
diff changeset
   269
                command = SELFCERT;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   270
            } else if (collator.compare(flags, "-storepasswd") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   271
                command = STOREPASSWD;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   272
            } else if (collator.compare(flags, "-importkeystore") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   273
                command = IMPORTKEYSTORE;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   274
            } else if (collator.compare(flags, "-genseckey") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   275
                command = GENSECKEY;
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   276
            } else if (collator.compare(flags, "-gencert") == 0) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   277
                command = GENCERT;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   278
            } else if (collator.compare(flags, "-printcertreq") == 0) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   279
                command = PRINTCERTREQ;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   280
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   281
90ce3da70b43 Initial load
duke
parents:
diff changeset
   282
            /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   283
             * specifiers
90ce3da70b43 Initial load
duke
parents:
diff changeset
   284
             */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   285
            else if (collator.compare(flags, "-keystore") == 0 ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   286
                    collator.compare(flags, "-destkeystore") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   287
                if (++i == args.length) errorNeedArgument(flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   288
                ksfname = args[i];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   289
            } else if (collator.compare(flags, "-storepass") == 0 ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   290
                    collator.compare(flags, "-deststorepass") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   291
                if (++i == args.length) errorNeedArgument(flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   292
                storePass = args[i].toCharArray();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   293
                passwords.add(storePass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   294
            } else if (collator.compare(flags, "-storetype") == 0 ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   295
                    collator.compare(flags, "-deststoretype") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   296
                if (++i == args.length) errorNeedArgument(flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   297
                storetype = args[i];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   298
            } else if (collator.compare(flags, "-srcstorepass") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   299
                if (++i == args.length) errorNeedArgument(flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   300
                srcstorePass = args[i].toCharArray();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   301
                passwords.add(srcstorePass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   302
            } else if (collator.compare(flags, "-srcstoretype") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   303
                if (++i == args.length) errorNeedArgument(flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   304
                srcstoretype = args[i];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   305
            } else if (collator.compare(flags, "-srckeypass") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   306
                if (++i == args.length) errorNeedArgument(flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   307
                srckeyPass = args[i].toCharArray();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   308
                passwords.add(srckeyPass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   309
            } else if (collator.compare(flags, "-srcprovidername") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   310
                if (++i == args.length) errorNeedArgument(flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   311
                srcProviderName = args[i];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   312
            } else if (collator.compare(flags, "-providername") == 0 ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   313
                    collator.compare(flags, "-destprovidername") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   314
                if (++i == args.length) errorNeedArgument(flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   315
                providerName = args[i];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   316
            } else if (collator.compare(flags, "-providerpath") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   317
                if (++i == args.length) errorNeedArgument(flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   318
                pathlist = args[i];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   319
            } else if (collator.compare(flags, "-keypass") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   320
                if (++i == args.length) errorNeedArgument(flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   321
                keyPass = args[i].toCharArray();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   322
                passwords.add(keyPass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   323
            } else if (collator.compare(flags, "-new") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   324
                if (++i == args.length) errorNeedArgument(flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   325
                newPass = args[i].toCharArray();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   326
                passwords.add(newPass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   327
            } else if (collator.compare(flags, "-destkeypass") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   328
                if (++i == args.length) errorNeedArgument(flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   329
                destKeyPass = args[i].toCharArray();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   330
                passwords.add(destKeyPass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   331
            } else if (collator.compare(flags, "-alias") == 0 ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   332
                    collator.compare(flags, "-srcalias") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   333
                if (++i == args.length) errorNeedArgument(flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   334
                alias = args[i];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   335
            } else if (collator.compare(flags, "-dest") == 0 ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   336
                    collator.compare(flags, "-destalias") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   337
                if (++i == args.length) errorNeedArgument(flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   338
                dest = args[i];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   339
            } else if (collator.compare(flags, "-dname") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   340
                if (++i == args.length) errorNeedArgument(flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   341
                dname = args[i];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   342
            } else if (collator.compare(flags, "-keysize") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   343
                if (++i == args.length) errorNeedArgument(flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   344
                keysize = Integer.parseInt(args[i]);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   345
            } else if (collator.compare(flags, "-keyalg") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   346
                if (++i == args.length) errorNeedArgument(flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   347
                keyAlgName = args[i];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   348
            } else if (collator.compare(flags, "-sigalg") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   349
                if (++i == args.length) errorNeedArgument(flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   350
                sigAlgName = args[i];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   351
            } else if (collator.compare(flags, "-startdate") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   352
                if (++i == args.length) errorNeedArgument(flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   353
                startDate = args[i];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   354
            } else if (collator.compare(flags, "-validity") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   355
                if (++i == args.length) errorNeedArgument(flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   356
                validity = Long.parseLong(args[i]);
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   357
            } else if (collator.compare(flags, "-ext") == 0) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   358
                if (++i == args.length) errorNeedArgument(flags);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   359
                v3ext.add(args[i]);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   360
            } else if (collator.compare(flags, "-file") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   361
                if (++i == args.length) errorNeedArgument(flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   362
                filename = args[i];
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   363
            } else if (collator.compare(flags, "-infile") == 0) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   364
                if (++i == args.length) errorNeedArgument(flags);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   365
                infilename = args[i];
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   366
            } else if (collator.compare(flags, "-outfile") == 0) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   367
                if (++i == args.length) errorNeedArgument(flags);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   368
                outfilename = args[i];
904
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
   369
            } else if (collator.compare(flags, "-sslserver") == 0) {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
   370
                if (++i == args.length) errorNeedArgument(flags);
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
   371
                sslserver = args[i];
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   372
            } else if (collator.compare(flags, "-srckeystore") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   373
                if (++i == args.length) errorNeedArgument(flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   374
                srcksfname = args[i];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   375
            } else if ((collator.compare(flags, "-provider") == 0) ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   376
                        (collator.compare(flags, "-providerclass") == 0)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   377
                if (++i == args.length) errorNeedArgument(flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   378
                if (providers == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   379
                    providers = new HashSet<Pair <String, String>> (3);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   380
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   381
                String providerClass = args[i];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   382
                String providerArg = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   383
90ce3da70b43 Initial load
duke
parents:
diff changeset
   384
                if (args.length > (i+1)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   385
                    flags = args[i+1];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   386
                    if (collator.compare(flags, "-providerarg") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   387
                        if (args.length == (i+2)) errorNeedArgument(flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   388
                        providerArg = args[i+2];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   389
                        i += 2;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   390
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   391
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   392
                providers.add(
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   393
                        Pair.of(providerClass, providerArg));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   394
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   395
90ce3da70b43 Initial load
duke
parents:
diff changeset
   396
            /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   397
             * options
90ce3da70b43 Initial load
duke
parents:
diff changeset
   398
             */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   399
            else if (collator.compare(flags, "-v") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   400
                verbose = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   401
            } else if (collator.compare(flags, "-debug") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   402
                debug = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   403
            } else if (collator.compare(flags, "-rfc") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   404
                rfc = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   405
            } else if (collator.compare(flags, "-noprompt") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   406
                noprompt = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   407
            } else if (collator.compare(flags, "-trustcacerts") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   408
                trustcacerts = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   409
            } else if (collator.compare(flags, "-protected") == 0 ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   410
                    collator.compare(flags, "-destprotected") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   411
                protectedPath = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   412
            } else if (collator.compare(flags, "-srcprotected") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   413
                srcprotectedPath = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   414
            } else  {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   415
                System.err.println(rb.getString("Illegal option:  ") + flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   416
                tinyHelp();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   417
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   418
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   419
90ce3da70b43 Initial load
duke
parents:
diff changeset
   420
        if (i<args.length) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   421
            MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
   422
                (rb.getString("Usage error, <arg> is not a legal command"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   423
            Object[] source = {args[i]};
90ce3da70b43 Initial load
duke
parents:
diff changeset
   424
            throw new RuntimeException(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   425
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   426
90ce3da70b43 Initial load
duke
parents:
diff changeset
   427
        if (command == -1) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   428
            System.err.println(rb.getString("Usage error: no command provided"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   429
            tinyHelp();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   430
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   431
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   432
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   433
    boolean isKeyStoreRelated(int cmd) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   434
        return cmd != PRINTCERT && cmd != PRINTCERTREQ;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   435
    }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   436
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   437
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   438
     * Execute the commands.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   439
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   440
    void doCommands(PrintStream out) throws Exception {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   441
90ce3da70b43 Initial load
duke
parents:
diff changeset
   442
        if (storetype == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   443
            storetype = KeyStore.getDefaultType();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   444
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   445
        storetype = KeyStoreUtil.niceStoreTypeName(storetype);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   446
90ce3da70b43 Initial load
duke
parents:
diff changeset
   447
        if (srcstoretype == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   448
            srcstoretype = KeyStore.getDefaultType();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   449
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   450
        srcstoretype = KeyStoreUtil.niceStoreTypeName(srcstoretype);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   451
90ce3da70b43 Initial load
duke
parents:
diff changeset
   452
        if (P11KEYSTORE.equalsIgnoreCase(storetype) ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   453
                KeyStoreUtil.isWindowsKeyStore(storetype)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   454
            token = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   455
            if (ksfname == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   456
                ksfname = NONE;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   457
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   458
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   459
        if (NONE.equals(ksfname)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   460
            nullStream = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   461
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   462
90ce3da70b43 Initial load
duke
parents:
diff changeset
   463
        if (token && !nullStream) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   464
            System.err.println(MessageFormat.format(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
   465
                ("-keystore must be NONE if -storetype is {0}"), storetype));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   466
            System.err.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   467
            tinyHelp();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   468
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   469
90ce3da70b43 Initial load
duke
parents:
diff changeset
   470
        if (token &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   471
            (command == KEYPASSWD || command == STOREPASSWD)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   472
            throw new UnsupportedOperationException(MessageFormat.format(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
   473
                        ("-storepasswd and -keypasswd commands not supported " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
   474
                        "if -storetype is {0}"), storetype));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   475
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   476
90ce3da70b43 Initial load
duke
parents:
diff changeset
   477
        if (P12KEYSTORE.equalsIgnoreCase(storetype) && command == KEYPASSWD) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   478
            throw new UnsupportedOperationException(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
   479
                        ("-keypasswd commands not supported " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
   480
                        "if -storetype is PKCS12"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   481
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   482
90ce3da70b43 Initial load
duke
parents:
diff changeset
   483
        if (token && (keyPass != null || newPass != null || destKeyPass != null)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   484
            throw new IllegalArgumentException(MessageFormat.format(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
   485
                ("-keypass and -new " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
   486
                "can not be specified if -storetype is {0}"), storetype));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   487
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   488
90ce3da70b43 Initial load
duke
parents:
diff changeset
   489
        if (protectedPath) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   490
            if (storePass != null || keyPass != null ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   491
                    newPass != null || destKeyPass != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   492
                throw new IllegalArgumentException(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
   493
                        ("if -protected is specified, " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
   494
                        "then -storepass, -keypass, and -new " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
   495
                        "must not be specified"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   496
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   497
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   498
90ce3da70b43 Initial load
duke
parents:
diff changeset
   499
        if (srcprotectedPath) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   500
            if (srcstorePass != null || srckeyPass != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   501
                throw new IllegalArgumentException(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
   502
                        ("if -srcprotected is specified, " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
   503
                        "then -srcstorepass and -srckeypass " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
   504
                        "must not be specified"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   505
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   506
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   507
90ce3da70b43 Initial load
duke
parents:
diff changeset
   508
        if (KeyStoreUtil.isWindowsKeyStore(storetype)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   509
            if (storePass != null || keyPass != null ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   510
                    newPass != null || destKeyPass != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   511
                throw new IllegalArgumentException(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
   512
                        ("if keystore is not password protected, " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
   513
                        "then -storepass, -keypass, and -new " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
   514
                        "must not be specified"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   515
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   516
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   517
90ce3da70b43 Initial load
duke
parents:
diff changeset
   518
        if (KeyStoreUtil.isWindowsKeyStore(srcstoretype)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   519
            if (srcstorePass != null || srckeyPass != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   520
                throw new IllegalArgumentException(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
   521
                        ("if source keystore is not password protected, " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
   522
                        "then -srcstorepass and -srckeypass " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
   523
                        "must not be specified"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   524
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   525
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   526
90ce3da70b43 Initial load
duke
parents:
diff changeset
   527
        if (validity <= (long)0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   528
            throw new Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
   529
                (rb.getString("Validity must be greater than zero"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   530
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   531
90ce3da70b43 Initial load
duke
parents:
diff changeset
   532
        // Try to load and install specified provider
90ce3da70b43 Initial load
duke
parents:
diff changeset
   533
        if (providers != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   534
            ClassLoader cl = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   535
            if (pathlist != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   536
                String path = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   537
                path = PathList.appendPath(
90ce3da70b43 Initial load
duke
parents:
diff changeset
   538
                        path, System.getProperty("java.class.path"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   539
                path = PathList.appendPath(
90ce3da70b43 Initial load
duke
parents:
diff changeset
   540
                        path, System.getProperty("env.class.path"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   541
                path = PathList.appendPath(path, pathlist);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   542
90ce3da70b43 Initial load
duke
parents:
diff changeset
   543
                URL[] urls = PathList.pathToURLs(path);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   544
                cl = new URLClassLoader(urls);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   545
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   546
                cl = ClassLoader.getSystemClassLoader();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   547
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   548
90ce3da70b43 Initial load
duke
parents:
diff changeset
   549
            for (Pair <String, String> provider: providers) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   550
                String provName = provider.fst;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   551
                Class<?> provClass;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   552
                if (cl != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   553
                    provClass = cl.loadClass(provName);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   554
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   555
                    provClass = Class.forName(provName);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   556
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   557
90ce3da70b43 Initial load
duke
parents:
diff changeset
   558
                String provArg = provider.snd;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   559
                Object obj;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   560
                if (provArg == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   561
                    obj = provClass.newInstance();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   562
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   563
                    Constructor<?> c = provClass.getConstructor(PARAM_STRING);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   564
                    obj = c.newInstance(provArg);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   565
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   566
                if (!(obj instanceof Provider)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   567
                    MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
   568
                        (rb.getString("provName not a provider"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   569
                    Object[] source = {provName};
90ce3da70b43 Initial load
duke
parents:
diff changeset
   570
                    throw new Exception(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   571
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   572
                Security.addProvider((Provider)obj);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   573
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   574
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   575
90ce3da70b43 Initial load
duke
parents:
diff changeset
   576
        if (command == LIST && verbose && rfc) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   577
            System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
   578
                ("Must not specify both -v and -rfc with 'list' command"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   579
            tinyHelp();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   580
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   581
90ce3da70b43 Initial load
duke
parents:
diff changeset
   582
        // Make sure provided passwords are at least 6 characters long
90ce3da70b43 Initial load
duke
parents:
diff changeset
   583
        if (command == GENKEYPAIR && keyPass!=null && keyPass.length < 6) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   584
            throw new Exception(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
   585
                ("Key password must be at least 6 characters"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   586
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   587
        if (newPass != null && newPass.length < 6) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   588
            throw new Exception(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
   589
                ("New password must be at least 6 characters"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   590
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   591
        if (destKeyPass != null && destKeyPass.length < 6) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   592
            throw new Exception(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
   593
                ("New password must be at least 6 characters"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   594
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   595
90ce3da70b43 Initial load
duke
parents:
diff changeset
   596
        // Check if keystore exists.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   597
        // If no keystore has been specified at the command line, try to use
90ce3da70b43 Initial load
duke
parents:
diff changeset
   598
        // the default, which is located in $HOME/.keystore.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   599
        // If the command is "genkey", "identitydb", "import", or "printcert",
90ce3da70b43 Initial load
duke
parents:
diff changeset
   600
        // it is OK not to have a keystore.
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   601
        if (isKeyStoreRelated(command)) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   602
            if (ksfname == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   603
                ksfname = System.getProperty("user.home") + File.separator
90ce3da70b43 Initial load
duke
parents:
diff changeset
   604
                    + ".keystore";
90ce3da70b43 Initial load
duke
parents:
diff changeset
   605
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   606
90ce3da70b43 Initial load
duke
parents:
diff changeset
   607
            if (!nullStream) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   608
                try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   609
                    ksfile = new File(ksfname);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   610
                    // Check if keystore file is empty
90ce3da70b43 Initial load
duke
parents:
diff changeset
   611
                    if (ksfile.exists() && ksfile.length() == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   612
                        throw new Exception(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
   613
                        ("Keystore file exists, but is empty: ") + ksfname);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   614
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   615
                    ksStream = new FileInputStream(ksfile);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   616
                } catch (FileNotFoundException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   617
                    if (command != GENKEYPAIR &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   618
                        command != GENSECKEY &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   619
                        command != IDENTITYDB &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   620
                        command != IMPORTCERT &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   621
                        command != IMPORTKEYSTORE) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   622
                        throw new Exception(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
   623
                                ("Keystore file does not exist: ") + ksfname);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   624
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   625
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   626
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   627
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   628
90ce3da70b43 Initial load
duke
parents:
diff changeset
   629
        if ((command == KEYCLONE || command == CHANGEALIAS)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   630
                && dest == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   631
            dest = getAlias("destination");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   632
            if ("".equals(dest)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   633
                throw new Exception(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
   634
                        ("Must specify destination alias"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   635
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   636
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   637
90ce3da70b43 Initial load
duke
parents:
diff changeset
   638
        if (command == DELETE && alias == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   639
            alias = getAlias(null);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   640
            if ("".equals(alias)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   641
                throw new Exception(rb.getString("Must specify alias"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   642
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   643
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   644
90ce3da70b43 Initial load
duke
parents:
diff changeset
   645
        // Create new keystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
   646
        if (providerName == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   647
            keyStore = KeyStore.getInstance(storetype);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   648
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   649
            keyStore = KeyStore.getInstance(storetype, providerName);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   650
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   651
90ce3da70b43 Initial load
duke
parents:
diff changeset
   652
        /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   653
         * Load the keystore data.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   654
         *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   655
         * At this point, it's OK if no keystore password has been provided.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   656
         * We want to make sure that we can load the keystore data, i.e.,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   657
         * the keystore data has the right format. If we cannot load the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   658
         * keystore, why bother asking the user for his or her password?
90ce3da70b43 Initial load
duke
parents:
diff changeset
   659
         * Only if we were able to load the keystore, and no keystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
   660
         * password has been provided, will we prompt the user for the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   661
         * keystore password to verify the keystore integrity.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   662
         * This means that the keystore is loaded twice: first load operation
90ce3da70b43 Initial load
duke
parents:
diff changeset
   663
         * checks the keystore format, second load operation verifies the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   664
         * keystore integrity.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   665
         *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   666
         * If the keystore password has already been provided (at the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   667
         * command line), however, the keystore is loaded only once, and the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   668
         * keystore format and integrity are checked "at the same time".
90ce3da70b43 Initial load
duke
parents:
diff changeset
   669
         *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   670
         * Null stream keystores are loaded later.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   671
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   672
        if (!nullStream) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   673
            keyStore.load(ksStream, storePass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   674
            if (ksStream != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   675
                ksStream.close();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   676
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   677
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   678
90ce3da70b43 Initial load
duke
parents:
diff changeset
   679
        // All commands that create or modify the keystore require a keystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
   680
        // password.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   681
90ce3da70b43 Initial load
duke
parents:
diff changeset
   682
        if (nullStream && storePass != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   683
            keyStore.load(null, storePass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   684
        } else if (!nullStream && storePass != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   685
            // If we are creating a new non nullStream-based keystore,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   686
            // insist that the password be at least 6 characters
90ce3da70b43 Initial load
duke
parents:
diff changeset
   687
            if (ksStream == null && storePass.length < 6) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   688
                throw new Exception(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
   689
                        ("Keystore password must be at least 6 characters"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   690
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   691
        } else if (storePass == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   692
90ce3da70b43 Initial load
duke
parents:
diff changeset
   693
            // only prompt if (protectedPath == false)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   694
90ce3da70b43 Initial load
duke
parents:
diff changeset
   695
            if (!protectedPath && !KeyStoreUtil.isWindowsKeyStore(storetype) &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
   696
                (command == CERTREQ ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   697
                        command == DELETE ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   698
                        command == GENKEYPAIR ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   699
                        command == GENSECKEY ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   700
                        command == IMPORTCERT ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   701
                        command == IMPORTKEYSTORE ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   702
                        command == KEYCLONE ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   703
                        command == CHANGEALIAS ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   704
                        command == SELFCERT ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   705
                        command == STOREPASSWD ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   706
                        command == KEYPASSWD ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   707
                        command == IDENTITYDB)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   708
                int count = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   709
                do {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   710
                    if (command == IMPORTKEYSTORE) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   711
                        System.err.print
90ce3da70b43 Initial load
duke
parents:
diff changeset
   712
                                (rb.getString("Enter destination keystore password:  "));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   713
                    } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   714
                        System.err.print
90ce3da70b43 Initial load
duke
parents:
diff changeset
   715
                                (rb.getString("Enter keystore password:  "));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   716
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   717
                    System.err.flush();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   718
                    storePass = Password.readPassword(System.in);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   719
                    passwords.add(storePass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   720
90ce3da70b43 Initial load
duke
parents:
diff changeset
   721
                    // If we are creating a new non nullStream-based keystore,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   722
                    // insist that the password be at least 6 characters
90ce3da70b43 Initial load
duke
parents:
diff changeset
   723
                    if (!nullStream && (storePass == null || storePass.length < 6)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   724
                        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
   725
                                ("Keystore password is too short - " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
   726
                                "must be at least 6 characters"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   727
                        storePass = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   728
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   729
90ce3da70b43 Initial load
duke
parents:
diff changeset
   730
                    // If the keystore file does not exist and needs to be
90ce3da70b43 Initial load
duke
parents:
diff changeset
   731
                    // created, the storepass should be prompted twice.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   732
                    if (storePass != null && !nullStream && ksStream == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   733
                        System.err.print(rb.getString("Re-enter new password: "));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   734
                        char[] storePassAgain = Password.readPassword(System.in);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   735
                        passwords.add(storePassAgain);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   736
                        if (!Arrays.equals(storePass, storePassAgain)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   737
                            System.err.println
90ce3da70b43 Initial load
duke
parents:
diff changeset
   738
                                (rb.getString("They don't match. Try again"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   739
                            storePass = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   740
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   741
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   742
90ce3da70b43 Initial load
duke
parents:
diff changeset
   743
                    count++;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   744
                } while ((storePass == null) && count < 3);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   745
90ce3da70b43 Initial load
duke
parents:
diff changeset
   746
90ce3da70b43 Initial load
duke
parents:
diff changeset
   747
                if (storePass == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   748
                    System.err.println
90ce3da70b43 Initial load
duke
parents:
diff changeset
   749
                        (rb.getString("Too many failures - try later"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   750
                    return;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   751
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   752
            } else if (!protectedPath
90ce3da70b43 Initial load
duke
parents:
diff changeset
   753
                    && !KeyStoreUtil.isWindowsKeyStore(storetype)
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   754
                    && isKeyStoreRelated(command)) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   755
                // here we have EXPORTCERT and LIST (info valid until STOREPASSWD)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   756
                System.err.print(rb.getString("Enter keystore password:  "));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   757
                System.err.flush();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   758
                storePass = Password.readPassword(System.in);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   759
                passwords.add(storePass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   760
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   761
90ce3da70b43 Initial load
duke
parents:
diff changeset
   762
            // Now load a nullStream-based keystore,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   763
            // or verify the integrity of an input stream-based keystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
   764
            if (nullStream) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   765
                keyStore.load(null, storePass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   766
            } else if (ksStream != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   767
                ksStream = new FileInputStream(ksfile);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   768
                keyStore.load(ksStream, storePass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   769
                ksStream.close();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   770
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   771
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   772
90ce3da70b43 Initial load
duke
parents:
diff changeset
   773
        if (storePass != null && P12KEYSTORE.equalsIgnoreCase(storetype)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   774
            MessageFormat form = new MessageFormat(rb.getString(
90ce3da70b43 Initial load
duke
parents:
diff changeset
   775
                "Warning:  Different store and key passwords not supported " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
   776
                "for PKCS12 KeyStores. Ignoring user-specified <command> value."));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   777
            if (keyPass != null && !Arrays.equals(storePass, keyPass)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   778
                Object[] source = {"-keypass"};
90ce3da70b43 Initial load
duke
parents:
diff changeset
   779
                System.err.println(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   780
                keyPass = storePass;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   781
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   782
            if (newPass != null && !Arrays.equals(storePass, newPass)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   783
                Object[] source = {"-new"};
90ce3da70b43 Initial load
duke
parents:
diff changeset
   784
                System.err.println(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   785
                newPass = storePass;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   786
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   787
            if (destKeyPass != null && !Arrays.equals(storePass, destKeyPass)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   788
                Object[] source = {"-destkeypass"};
90ce3da70b43 Initial load
duke
parents:
diff changeset
   789
                System.err.println(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   790
                destKeyPass = storePass;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   791
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   792
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   793
90ce3da70b43 Initial load
duke
parents:
diff changeset
   794
        // Create a certificate factory
90ce3da70b43 Initial load
duke
parents:
diff changeset
   795
        if (command == PRINTCERT || command == IMPORTCERT
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   796
                || command == IDENTITYDB) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   797
            cf = CertificateFactory.getInstance("X509");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   798
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   799
90ce3da70b43 Initial load
duke
parents:
diff changeset
   800
        if (trustcacerts) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   801
            caks = getCacertsKeyStore();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   802
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   803
90ce3da70b43 Initial load
duke
parents:
diff changeset
   804
        // Perform the specified command
90ce3da70b43 Initial load
duke
parents:
diff changeset
   805
        if (command == CERTREQ) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   806
            PrintStream ps = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   807
            if (filename != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   808
                ps = new PrintStream(new FileOutputStream
90ce3da70b43 Initial load
duke
parents:
diff changeset
   809
                                                 (filename));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   810
                out = ps;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   811
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   812
            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   813
                doCertReq(alias, sigAlgName, out);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   814
            } finally {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   815
                if (ps != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   816
                    ps.close();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   817
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   818
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   819
            if (verbose && filename != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   820
                MessageFormat form = new MessageFormat(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
   821
                        ("Certification request stored in file <filename>"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   822
                Object[] source = {filename};
90ce3da70b43 Initial load
duke
parents:
diff changeset
   823
                System.err.println(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   824
                System.err.println(rb.getString("Submit this to your CA"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   825
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   826
        } else if (command == DELETE) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   827
            doDeleteEntry(alias);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   828
            kssave = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   829
        } else if (command == EXPORTCERT) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   830
            PrintStream ps = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   831
            if (filename != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   832
                ps = new PrintStream(new FileOutputStream
90ce3da70b43 Initial load
duke
parents:
diff changeset
   833
                                                 (filename));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   834
                out = ps;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   835
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   836
            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   837
                doExportCert(alias, out);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   838
            } finally {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   839
                if (ps != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   840
                    ps.close();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   841
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   842
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   843
            if (filename != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   844
                MessageFormat form = new MessageFormat(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
   845
                        ("Certificate stored in file <filename>"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   846
                Object[] source = {filename};
90ce3da70b43 Initial load
duke
parents:
diff changeset
   847
                System.err.println(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   848
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   849
        } else if (command == GENKEYPAIR) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   850
            if (keyAlgName == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   851
                keyAlgName = "DSA";
90ce3da70b43 Initial load
duke
parents:
diff changeset
   852
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   853
            doGenKeyPair(alias, dname, keyAlgName, keysize, sigAlgName);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   854
            kssave = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   855
        } else if (command == GENSECKEY) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   856
            if (keyAlgName == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   857
                keyAlgName = "DES";
90ce3da70b43 Initial load
duke
parents:
diff changeset
   858
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   859
            doGenSecretKey(alias, keyAlgName, keysize);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   860
            kssave = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   861
        } else if (command == IDENTITYDB) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   862
            InputStream inStream = System.in;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   863
            if (filename != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   864
                inStream = new FileInputStream(filename);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   865
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   866
            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   867
                doImportIdentityDatabase(inStream);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   868
            } finally {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   869
                if (inStream != System.in) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   870
                    inStream.close();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   871
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   872
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   873
        } else if (command == IMPORTCERT) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   874
            InputStream inStream = System.in;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   875
            if (filename != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   876
                inStream = new FileInputStream(filename);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   877
            }
2289
99207c64bf80 6819272: keytool -importcert should read the whole input
weijun
parents: 2179
diff changeset
   878
            // Read the full stream before feeding to X509Factory,
99207c64bf80 6819272: keytool -importcert should read the whole input
weijun
parents: 2179
diff changeset
   879
            // otherwise, keytool -gencert | keytool -importcert
99207c64bf80 6819272: keytool -importcert should read the whole input
weijun
parents: 2179
diff changeset
   880
            // might not work properly, since -gencert is slow
99207c64bf80 6819272: keytool -importcert should read the whole input
weijun
parents: 2179
diff changeset
   881
            // and there's no data in the pipe at the beginning.
99207c64bf80 6819272: keytool -importcert should read the whole input
weijun
parents: 2179
diff changeset
   882
            ByteArrayOutputStream bout = new ByteArrayOutputStream();
99207c64bf80 6819272: keytool -importcert should read the whole input
weijun
parents: 2179
diff changeset
   883
            byte[] b = new byte[4096];
99207c64bf80 6819272: keytool -importcert should read the whole input
weijun
parents: 2179
diff changeset
   884
            while (true) {
99207c64bf80 6819272: keytool -importcert should read the whole input
weijun
parents: 2179
diff changeset
   885
                int len = inStream.read(b);
99207c64bf80 6819272: keytool -importcert should read the whole input
weijun
parents: 2179
diff changeset
   886
                if (len < 0) break;
99207c64bf80 6819272: keytool -importcert should read the whole input
weijun
parents: 2179
diff changeset
   887
                bout.write(b, 0, len);
99207c64bf80 6819272: keytool -importcert should read the whole input
weijun
parents: 2179
diff changeset
   888
            }
99207c64bf80 6819272: keytool -importcert should read the whole input
weijun
parents: 2179
diff changeset
   889
            inStream = new ByteArrayInputStream(bout.toByteArray());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   890
            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   891
                String importAlias = (alias!=null)?alias:keyAlias;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   892
                if (keyStore.entryInstanceOf(importAlias, KeyStore.PrivateKeyEntry.class)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   893
                    kssave = installReply(importAlias, inStream);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   894
                    if (kssave) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   895
                        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
   896
                            ("Certificate reply was installed in keystore"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   897
                    } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   898
                        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
   899
                            ("Certificate reply was not installed in keystore"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   900
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   901
                } else if (!keyStore.containsAlias(importAlias) ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   902
                        keyStore.entryInstanceOf(importAlias,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   903
                            KeyStore.TrustedCertificateEntry.class)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   904
                    kssave = addTrustedCert(importAlias, inStream);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   905
                    if (kssave) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   906
                        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
   907
                            ("Certificate was added to keystore"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   908
                    } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   909
                        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
   910
                            ("Certificate was not added to keystore"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   911
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   912
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   913
            } finally {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   914
                if (inStream != System.in) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   915
                    inStream.close();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   916
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   917
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   918
        } else if (command == IMPORTKEYSTORE) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   919
            doImportKeyStore();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   920
            kssave = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   921
        } else if (command == KEYCLONE) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   922
            keyPassNew = newPass;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   923
90ce3da70b43 Initial load
duke
parents:
diff changeset
   924
            // added to make sure only key can go thru
90ce3da70b43 Initial load
duke
parents:
diff changeset
   925
            if (alias == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   926
                alias = keyAlias;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   927
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   928
            if (keyStore.containsAlias(alias) == false) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   929
                MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
   930
                    (rb.getString("Alias <alias> does not exist"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   931
                Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
   932
                throw new Exception(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   933
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   934
            if (!keyStore.entryInstanceOf(alias, KeyStore.PrivateKeyEntry.class)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   935
                MessageFormat form = new MessageFormat(rb.getString(
90ce3da70b43 Initial load
duke
parents:
diff changeset
   936
                        "Alias <alias> references an entry type that is not a private key entry.  " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
   937
                        "The -keyclone command only supports cloning of private key entries"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   938
                Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
   939
                throw new Exception(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   940
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   941
90ce3da70b43 Initial load
duke
parents:
diff changeset
   942
            doCloneEntry(alias, dest, true);  // Now everything can be cloned
90ce3da70b43 Initial load
duke
parents:
diff changeset
   943
            kssave = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   944
        } else if (command == CHANGEALIAS) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   945
            if (alias == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   946
                alias = keyAlias;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   947
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   948
            doCloneEntry(alias, dest, false);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   949
            // in PKCS11, clone a PrivateKeyEntry will delete the old one
90ce3da70b43 Initial load
duke
parents:
diff changeset
   950
            if (keyStore.containsAlias(alias)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   951
                doDeleteEntry(alias);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   952
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   953
            kssave = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   954
        } else if (command == KEYPASSWD) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   955
            keyPassNew = newPass;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   956
            doChangeKeyPasswd(alias);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   957
            kssave = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   958
        } else if (command == LIST) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   959
            if (alias != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   960
                doPrintEntry(alias, out, true);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   961
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   962
                doPrintEntries(out);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   963
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   964
        } else if (command == PRINTCERT) {
904
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
   965
            doPrintCert(out);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   966
        } else if (command == SELFCERT) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   967
            doSelfCert(alias, dname, sigAlgName);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   968
            kssave = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   969
        } else if (command == STOREPASSWD) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   970
            storePassNew = newPass;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   971
            if (storePassNew == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   972
                storePassNew = getNewPasswd("keystore password", storePass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   973
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   974
            kssave = true;
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   975
        } else if (command == GENCERT) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   976
            if (alias == null) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   977
                alias = keyAlias;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   978
            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   979
            InputStream inStream = System.in;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   980
            if (infilename != null) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   981
                inStream = new FileInputStream(infilename);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   982
            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   983
            PrintStream ps = null;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   984
            if (outfilename != null) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   985
                ps = new PrintStream(new FileOutputStream(outfilename));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   986
                out = ps;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   987
            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   988
            try {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   989
                doGenCert(alias, sigAlgName, inStream, out);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   990
            } finally {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   991
                if (inStream != System.in) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   992
                    inStream.close();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   993
                }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   994
                if (ps != null) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   995
                    ps.close();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   996
                }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   997
            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   998
        } else if (command == PRINTCERTREQ) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
   999
            InputStream inStream = System.in;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1000
            if (filename != null) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1001
                inStream = new FileInputStream(filename);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1002
            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1003
            try {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1004
                doPrintCertReq(inStream, out);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1005
            } finally {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1006
                if (inStream != System.in) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1007
                    inStream.close();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1008
                }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1009
            }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1010
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1011
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1012
        // If we need to save the keystore, do so.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1013
        if (kssave) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1014
            if (verbose) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1015
                MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1016
                        (rb.getString("[Storing ksfname]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1017
                Object[] source = {nullStream ? "keystore" : ksfname};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1018
                System.err.println(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1019
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1020
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1021
            if (token) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1022
                keyStore.store(null, null);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1023
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1024
                FileOutputStream fout = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1025
                try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1026
                    fout = (nullStream ?
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1027
                                        (FileOutputStream)null :
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1028
                                        new FileOutputStream(ksfname));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1029
                    keyStore.store
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1030
                        (fout,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1031
                        (storePassNew!=null) ? storePassNew : storePass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1032
                } finally {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1033
                    if (fout != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1034
                        fout.close();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1035
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1036
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1037
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1038
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1039
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1040
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1041
    /**
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1042
     * Generate a certificate: Read PKCS10 request from in, and print
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1043
     * certificate to out. Use alias as CA, sigAlgName as the signature
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1044
     * type.
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1045
     */
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1046
    private void doGenCert(String alias, String sigAlgName, InputStream in, PrintStream out)
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1047
            throws Exception {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1048
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1049
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1050
        Certificate signerCert = keyStore.getCertificate(alias);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1051
        byte[] encoded = signerCert.getEncoded();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1052
        X509CertImpl signerCertImpl = new X509CertImpl(encoded);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1053
        X509CertInfo signerCertInfo = (X509CertInfo)signerCertImpl.get(
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1054
                X509CertImpl.NAME + "." + X509CertImpl.INFO);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1055
        X500Name owner = (X500Name)signerCertInfo.get(X509CertInfo.SUBJECT + "." +
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1056
                                           CertificateSubjectName.DN_NAME);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1057
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1058
        Date firstDate = getStartDate(startDate);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1059
        Date lastDate = new Date();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1060
        lastDate.setTime(firstDate.getTime() + validity*1000L*24L*60L*60L);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1061
        CertificateValidity interval = new CertificateValidity(firstDate,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1062
                                                               lastDate);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1063
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1064
        PrivateKey privateKey = (PrivateKey)recoverKey(alias, storePass, keyPass).fst;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1065
        if (sigAlgName == null) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1066
            sigAlgName = getCompatibleSigAlgName(privateKey.getAlgorithm());
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1067
        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1068
        Signature signature = Signature.getInstance(sigAlgName);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1069
        signature.initSign(privateKey);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1070
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1071
        X500Signer signer = new X500Signer(signature, owner);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1072
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1073
        X509CertInfo info = new X509CertInfo();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1074
        info.set(X509CertInfo.VALIDITY, interval);
2293
cb6d01cb3c3d 6820606: keytool can generate serialno more randomly
weijun
parents: 2289
diff changeset
  1075
        info.set(X509CertInfo.SERIAL_NUMBER, new CertificateSerialNumber(
cb6d01cb3c3d 6820606: keytool can generate serialno more randomly
weijun
parents: 2289
diff changeset
  1076
                    new java.util.Random().nextInt() & 0x7fffffff));
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1077
        info.set(X509CertInfo.VERSION,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1078
                     new CertificateVersion(CertificateVersion.V3));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1079
        info.set(X509CertInfo.ALGORITHM_ID,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1080
                     new CertificateAlgorithmId(signer.getAlgorithmId()));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1081
        info.set(X509CertInfo.ISSUER,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1082
                     new CertificateIssuerName(signer.getSigner()));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1083
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1084
        BufferedReader reader = new BufferedReader(new InputStreamReader(in));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1085
        boolean canRead = false;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1086
        StringBuffer sb = new StringBuffer();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1087
        while (true) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1088
            String s = reader.readLine();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1089
            if (s == null) break;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1090
            // OpenSSL does not use NEW
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1091
            //if (s.startsWith("-----BEGIN NEW CERTIFICATE REQUEST-----")) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1092
            if (s.startsWith("-----BEGIN") && s.indexOf("REQUEST") >= 0) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1093
                canRead = true;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1094
            //} else if (s.startsWith("-----END NEW CERTIFICATE REQUEST-----")) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1095
            } else if (s.startsWith("-----END") && s.indexOf("REQUEST") >= 0) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1096
                break;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1097
            } else if (canRead) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1098
                sb.append(s);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1099
            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1100
        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1101
        byte[] rawReq = new BASE64Decoder().decodeBuffer(new String(sb));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1102
        PKCS10 req = new PKCS10(rawReq);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1103
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1104
        info.set(X509CertInfo.KEY, new CertificateX509Key(req.getSubjectPublicKeyInfo()));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1105
        info.set(X509CertInfo.SUBJECT, new CertificateSubjectName(req.getSubjectName()));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1106
        CertificateExtensions reqex = null;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1107
        Iterator<PKCS10Attribute> attrs = req.getAttributes().getAttributes().iterator();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1108
        while (attrs.hasNext()) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1109
            PKCS10Attribute attr = attrs.next();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1110
            if (attr.getAttributeId().equals(PKCS9Attribute.EXTENSION_REQUEST_OID)) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1111
                reqex = (CertificateExtensions)attr.getAttributeValue();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1112
            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1113
        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1114
        CertificateExtensions ext = createV3Extensions(
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1115
                reqex,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1116
                null,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1117
                v3ext,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1118
                req.getSubjectPublicKeyInfo(),
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1119
                signerCert.getPublicKey());
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1120
        info.set(X509CertInfo.EXTENSIONS, ext);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1121
        X509CertImpl cert = new X509CertImpl(info);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1122
        cert.sign(privateKey, sigAlgName);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1123
        dumpCert(cert, out);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1124
    }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1125
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1126
    /**
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1127
     * Creates a PKCS#10 cert signing request, corresponding to the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1128
     * keys (and name) associated with a given alias.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1129
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1130
    private void doCertReq(String alias, String sigAlgName, PrintStream out)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1131
        throws Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1132
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1133
        if (alias == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1134
            alias = keyAlias;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1135
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1136
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1137
        Pair<Key,char[]> objs = recoverKey(alias, storePass, keyPass);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1138
        PrivateKey privKey = (PrivateKey)objs.fst;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1139
        if (keyPass == null) {
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1140
            keyPass = objs.snd;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1141
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1142
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1143
        Certificate cert = keyStore.getCertificate(alias);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1144
        if (cert == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1145
            MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1146
                (rb.getString("alias has no public key (certificate)"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1147
            Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1148
            throw new Exception(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1149
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1150
        PKCS10 request = new PKCS10(cert.getPublicKey());
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1151
        CertificateExtensions ext = createV3Extensions(null, null, v3ext, cert.getPublicKey(), null);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1152
        // Attribute name is not significant
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1153
        request.getAttributes().setAttribute(X509CertInfo.EXTENSIONS,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1154
                new PKCS10Attribute(PKCS9Attribute.EXTENSION_REQUEST_OID, ext));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1155
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1156
        // Construct an X500Signer object, so that we can sign the request
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1157
        if (sigAlgName == null) {
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1158
            sigAlgName = getCompatibleSigAlgName(privKey.getAlgorithm());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1159
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1160
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1161
        Signature signature = Signature.getInstance(sigAlgName);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1162
        signature.initSign(privKey);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1163
        X500Name subject =
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1164
            new X500Name(((X509Certificate)cert).getSubjectDN().toString());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1165
        X500Signer signer = new X500Signer(signature, subject);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1166
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1167
        // Sign the request and base-64 encode it
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1168
        request.encodeAndSign(signer);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1169
        request.print(out);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1170
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1171
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1172
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1173
     * Deletes an entry from the keystore.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1174
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1175
    private void doDeleteEntry(String alias) throws Exception {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1176
        if (keyStore.containsAlias(alias) == false) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1177
            MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1178
                (rb.getString("Alias <alias> does not exist"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1179
            Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1180
            throw new Exception(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1181
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1182
        keyStore.deleteEntry(alias);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1183
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1184
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1185
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1186
     * Exports a certificate from the keystore.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1187
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1188
    private void doExportCert(String alias, PrintStream out)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1189
        throws Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1190
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1191
        if (storePass == null
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1192
                && !KeyStoreUtil.isWindowsKeyStore(storetype)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1193
            printWarning();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1194
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1195
        if (alias == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1196
            alias = keyAlias;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1197
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1198
        if (keyStore.containsAlias(alias) == false) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1199
            MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1200
                (rb.getString("Alias <alias> does not exist"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1201
            Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1202
            throw new Exception(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1203
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1204
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1205
        X509Certificate cert = (X509Certificate)keyStore.getCertificate(alias);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1206
        if (cert == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1207
            MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1208
                (rb.getString("Alias <alias> has no certificate"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1209
            Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1210
            throw new Exception(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1211
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1212
        dumpCert(cert, out);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1213
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1214
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1215
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1216
     * Prompt the user for a keypass when generating a key entry.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1217
     * @param alias the entry we will set password for
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1218
     * @param orig the original entry of doing a dup, null if generate new
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1219
     * @param origPass the password to copy from if user press ENTER
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1220
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1221
    private char[] promptForKeyPass(String alias, String orig, char[] origPass) throws Exception{
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1222
        if (P12KEYSTORE.equalsIgnoreCase(storetype)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1223
            return origPass;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1224
        } else if (!token) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1225
            // Prompt for key password
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1226
            int count;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1227
            for (count = 0; count < 3; count++) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1228
                MessageFormat form = new MessageFormat(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1229
                        ("Enter key password for <alias>"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1230
                Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1231
                System.err.println(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1232
                if (orig == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1233
                    System.err.print(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1234
                            ("\t(RETURN if same as keystore password):  "));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1235
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1236
                    form = new MessageFormat(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1237
                            ("\t(RETURN if same as for <otherAlias>)"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1238
                    Object[] src = {orig};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1239
                    System.err.print(form.format(src));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1240
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1241
                System.err.flush();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1242
                char[] entered = Password.readPassword(System.in);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1243
                passwords.add(entered);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1244
                if (entered == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1245
                    return origPass;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1246
                } else if (entered.length >= 6) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1247
                    System.err.print(rb.getString("Re-enter new password: "));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1248
                    char[] passAgain = Password.readPassword(System.in);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1249
                    passwords.add(passAgain);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1250
                    if (!Arrays.equals(entered, passAgain)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1251
                        System.err.println
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1252
                            (rb.getString("They don't match. Try again"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1253
                        continue;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1254
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1255
                    return entered;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1256
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1257
                    System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1258
                        ("Key password is too short - must be at least 6 characters"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1259
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1260
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1261
            if (count == 3) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1262
                if (command == KEYCLONE) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1263
                    throw new Exception(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1264
                        ("Too many failures. Key entry not cloned"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1265
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1266
                    throw new Exception(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1267
                            ("Too many failures - key not added to keystore"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1268
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1269
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1270
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1271
        return null;    // PKCS11
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1272
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1273
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1274
     * Creates a new secret key.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1275
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1276
    private void doGenSecretKey(String alias, String keyAlgName,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1277
                              int keysize)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1278
        throws Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1279
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1280
        if (alias == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1281
            alias = keyAlias;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1282
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1283
        if (keyStore.containsAlias(alias)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1284
            MessageFormat form = new MessageFormat(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1285
                ("Secret key not generated, alias <alias> already exists"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1286
            Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1287
            throw new Exception(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1288
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1289
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1290
        SecretKey secKey = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1291
        KeyGenerator keygen = KeyGenerator.getInstance(keyAlgName);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1292
        if (keysize != -1) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1293
            keygen.init(keysize);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1294
        } else if ("DES".equalsIgnoreCase(keyAlgName)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1295
            keygen.init(56);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1296
        } else if ("DESede".equalsIgnoreCase(keyAlgName)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1297
            keygen.init(168);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1298
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1299
            throw new Exception(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1300
                ("Please provide -keysize for secret key generation"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1301
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1302
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1303
        secKey = keygen.generateKey();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1304
        if (keyPass == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1305
            keyPass = promptForKeyPass(alias, null, storePass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1306
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1307
        keyStore.setKeyEntry(alias, secKey, keyPass, null);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1308
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1309
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1310
    /**
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1311
     * If no signature algorithm was specified at the command line,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1312
     * we choose one that is compatible with the selected private key
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1313
     */
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1314
    private static String getCompatibleSigAlgName(String keyAlgName)
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1315
            throws Exception {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1316
        if ("DSA".equalsIgnoreCase(keyAlgName)) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1317
            return "SHA1WithDSA";
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1318
        } else if ("RSA".equalsIgnoreCase(keyAlgName)) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1319
            return "SHA1WithRSA";
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1320
        } else if ("EC".equalsIgnoreCase(keyAlgName)) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1321
            return "SHA1withECDSA";
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1322
        } else {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1323
            throw new Exception(rb.getString
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1324
                    ("Cannot derive signature algorithm"));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1325
        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1326
    }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1327
    /**
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1328
     * Creates a new key pair and self-signed certificate.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1329
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1330
    private void doGenKeyPair(String alias, String dname, String keyAlgName,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1331
                              int keysize, String sigAlgName)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1332
        throws Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1333
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1334
        if (keysize == -1) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1335
            if ("EC".equalsIgnoreCase(keyAlgName)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1336
                keysize = 256;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1337
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1338
                keysize = 1024;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1339
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1340
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1341
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1342
        if (alias == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1343
            alias = keyAlias;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1344
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1345
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1346
        if (keyStore.containsAlias(alias)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1347
            MessageFormat form = new MessageFormat(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1348
                ("Key pair not generated, alias <alias> already exists"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1349
            Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1350
            throw new Exception(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1351
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1352
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1353
        if (sigAlgName == null) {
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1354
            sigAlgName = getCompatibleSigAlgName(keyAlgName);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1355
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1356
        CertAndKeyGen keypair =
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1357
                new CertAndKeyGen(keyAlgName, sigAlgName, providerName);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1358
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1359
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1360
        // If DN is provided, parse it. Otherwise, prompt the user for it.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1361
        X500Name x500Name;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1362
        if (dname == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1363
            x500Name = getX500Name();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1364
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1365
            x500Name = new X500Name(dname);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1366
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1367
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1368
        keypair.generate(keysize);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1369
        PrivateKey privKey = keypair.getPrivateKey();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1370
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1371
        X509Certificate[] chain = new X509Certificate[1];
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1372
        chain[0] = keypair.getSelfCertificate(
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1373
                x500Name, getStartDate(startDate), validity*24L*60L*60L);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1374
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1375
        if (verbose) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1376
            MessageFormat form = new MessageFormat(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1377
                ("Generating keysize bit keyAlgName key pair and self-signed certificate " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1378
                    "(sigAlgName) with a validity of validality days\n\tfor: x500Name"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1379
            Object[] source = {new Integer(keysize),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1380
                                privKey.getAlgorithm(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1381
                                chain[0].getSigAlgName(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1382
                                new Long(validity),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1383
                                x500Name};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1384
            System.err.println(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1385
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1386
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1387
        if (keyPass == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1388
            keyPass = promptForKeyPass(alias, null, storePass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1389
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1390
        keyStore.setKeyEntry(alias, privKey, keyPass, chain);
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1391
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1392
        // resign so that -ext are applied.
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1393
        doSelfCert(alias, null, sigAlgName);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1394
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1395
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1396
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1397
     * Clones an entry
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1398
     * @param orig original alias
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1399
     * @param dest destination alias
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1400
     * @changePassword if the password can be changed
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1401
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1402
    private void doCloneEntry(String orig, String dest, boolean changePassword)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1403
        throws Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1404
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1405
        if (orig == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1406
            orig = keyAlias;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1407
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1408
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1409
        if (keyStore.containsAlias(dest)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1410
            MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1411
                (rb.getString("Destination alias <dest> already exists"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1412
            Object[] source = {dest};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1413
            throw new Exception(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1414
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1415
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1416
        Pair<Entry,char[]> objs = recoverEntry(keyStore, orig, storePass, keyPass);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1417
        Entry entry = objs.fst;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1418
        keyPass = objs.snd;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1419
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1420
        PasswordProtection pp = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1421
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1422
        if (keyPass != null) {  // protected
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1423
            if (!changePassword || P12KEYSTORE.equalsIgnoreCase(storetype)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1424
                keyPassNew = keyPass;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1425
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1426
                if (keyPassNew == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1427
                    keyPassNew = promptForKeyPass(dest, orig, keyPass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1428
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1429
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1430
            pp = new PasswordProtection(keyPassNew);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1431
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1432
        keyStore.setEntry(dest, entry, pp);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1433
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1434
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1435
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1436
     * Changes a key password.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1437
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1438
    private void doChangeKeyPasswd(String alias) throws Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1439
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1440
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1441
        if (alias == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1442
            alias = keyAlias;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1443
        }
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1444
        Pair<Key,char[]> objs = recoverKey(alias, storePass, keyPass);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1445
        Key privKey = objs.fst;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1446
        if (keyPass == null) {
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1447
            keyPass = objs.snd;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1448
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1449
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1450
        if (keyPassNew == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1451
            MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1452
                (rb.getString("key password for <alias>"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1453
            Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1454
            keyPassNew = getNewPasswd(form.format(source), keyPass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1455
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1456
        keyStore.setKeyEntry(alias, privKey, keyPassNew,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1457
                             keyStore.getCertificateChain(alias));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1458
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1459
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1460
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1461
     * Imports a JDK 1.1-style identity database. We can only store one
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1462
     * certificate per identity, because we use the identity's name as the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1463
     * alias (which references a keystore entry), and aliases must be unique.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1464
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1465
    private void doImportIdentityDatabase(InputStream in)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1466
        throws Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1467
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1468
        byte[] encoded;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1469
        ByteArrayInputStream bais;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1470
        java.security.cert.X509Certificate newCert;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1471
        java.security.cert.Certificate[] chain = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1472
        PrivateKey privKey;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1473
        boolean modified = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1474
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1475
        IdentityDatabase idb = IdentityDatabase.fromStream(in);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1476
        for (Enumeration<Identity> enum_ = idb.identities();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1477
                                        enum_.hasMoreElements();) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1478
            Identity id = enum_.nextElement();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1479
            newCert = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1480
            // only store trusted identities in keystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1481
            if ((id instanceof SystemSigner && ((SystemSigner)id).isTrusted())
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1482
                || (id instanceof SystemIdentity
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1483
                    && ((SystemIdentity)id).isTrusted())) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1484
                // ignore if keystore entry with same alias name already exists
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1485
                if (keyStore.containsAlias(id.getName())) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1486
                    MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1487
                        (rb.getString("Keystore entry for <id.getName()> already exists"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1488
                    Object[] source = {id.getName()};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1489
                    System.err.println(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1490
                    continue;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1491
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1492
                java.security.Certificate[] certs = id.certificates();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1493
                if (certs!=null && certs.length>0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1494
                    // we can only store one user cert per identity.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1495
                    // convert old-style to new-style cert via the encoding
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1496
                    DerOutputStream dos = new DerOutputStream();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1497
                    certs[0].encode(dos);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1498
                    encoded = dos.toByteArray();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1499
                    bais = new ByteArrayInputStream(encoded);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1500
                    newCert = (X509Certificate)cf.generateCertificate(bais);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1501
                    bais.close();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1502
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1503
                    // if certificate is self-signed, make sure it verifies
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1504
                    if (isSelfSigned(newCert)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1505
                        PublicKey pubKey = newCert.getPublicKey();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1506
                        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1507
                            newCert.verify(pubKey);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1508
                        } catch (Exception e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1509
                            // ignore this cert
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1510
                            continue;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1511
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1512
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1513
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1514
                    if (id instanceof SystemSigner) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1515
                        MessageFormat form = new MessageFormat(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1516
                            ("Creating keystore entry for <id.getName()> ..."));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1517
                        Object[] source = {id.getName()};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1518
                        System.err.println(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1519
                        if (chain==null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1520
                            chain = new java.security.cert.Certificate[1];
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1521
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1522
                        chain[0] = newCert;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1523
                        privKey = ((SystemSigner)id).getPrivateKey();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1524
                        keyStore.setKeyEntry(id.getName(), privKey, storePass,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1525
                                             chain);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1526
                    } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1527
                        keyStore.setCertificateEntry(id.getName(), newCert);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1528
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1529
                    kssave = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1530
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1531
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1532
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1533
        if (!kssave) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1534
            System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1535
                ("No entries from identity database added"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1536
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1537
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1538
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1539
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1540
     * Prints a single keystore entry.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1541
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1542
    private void doPrintEntry(String alias, PrintStream out,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1543
                              boolean printWarning)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1544
        throws Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1545
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1546
        if (storePass == null && printWarning
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1547
                && !KeyStoreUtil.isWindowsKeyStore(storetype)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1548
            printWarning();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1549
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1550
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1551
        if (keyStore.containsAlias(alias) == false) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1552
            MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1553
                (rb.getString("Alias <alias> does not exist"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1554
            Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1555
            throw new Exception(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1556
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1557
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1558
        if (verbose || rfc || debug) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1559
            MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1560
                (rb.getString("Alias name: alias"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1561
            Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1562
            out.println(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1563
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1564
            if (!token) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1565
                form = new MessageFormat(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1566
                    ("Creation date: keyStore.getCreationDate(alias)"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1567
                Object[] src = {keyStore.getCreationDate(alias)};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1568
                out.println(form.format(src));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1569
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1570
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1571
            if (!token) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1572
                MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1573
                    (rb.getString("alias, keyStore.getCreationDate(alias), "));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1574
                Object[] source = {alias, keyStore.getCreationDate(alias)};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1575
                out.print(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1576
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1577
                MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1578
                    (rb.getString("alias, "));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1579
                Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1580
                out.print(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1581
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1582
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1583
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1584
        if (keyStore.entryInstanceOf(alias, KeyStore.SecretKeyEntry.class)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1585
            if (verbose || rfc || debug) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1586
                Object[] source = {"SecretKeyEntry"};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1587
                out.println(new MessageFormat(
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1588
                        rb.getString("Entry type: <type>")).format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1589
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1590
                out.println("SecretKeyEntry, ");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1591
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1592
        } else if (keyStore.entryInstanceOf(alias, KeyStore.PrivateKeyEntry.class)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1593
            if (verbose || rfc || debug) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1594
                Object[] source = {"PrivateKeyEntry"};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1595
                out.println(new MessageFormat(
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1596
                        rb.getString("Entry type: <type>")).format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1597
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1598
                out.println("PrivateKeyEntry, ");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1599
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1600
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1601
            // Get the chain
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1602
            Certificate[] chain = keyStore.getCertificateChain(alias);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1603
            if (chain != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1604
                if (verbose || rfc || debug) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1605
                    out.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1606
                        ("Certificate chain length: ") + chain.length);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1607
                    for (int i = 0; i < chain.length; i ++) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1608
                        MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1609
                                (rb.getString("Certificate[(i + 1)]:"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1610
                        Object[] source = {new Integer((i + 1))};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1611
                        out.println(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1612
                        if (verbose && (chain[i] instanceof X509Certificate)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1613
                            printX509Cert((X509Certificate)(chain[i]), out);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1614
                        } else if (debug) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1615
                            out.println(chain[i].toString());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1616
                        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1617
                            dumpCert(chain[i], out);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1618
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1619
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1620
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1621
                    // Print the digest of the user cert only
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1622
                    out.println
909
c7bb1699d1b0 6709758: keytool default cert fingerprint algorithm should be SHA1, not MD5
weijun
parents: 904
diff changeset
  1623
                        (rb.getString("Certificate fingerprint (SHA1): ") +
c7bb1699d1b0 6709758: keytool default cert fingerprint algorithm should be SHA1, not MD5
weijun
parents: 904
diff changeset
  1624
                        getCertFingerPrint("SHA1", chain[0]));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1625
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1626
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1627
        } else if (keyStore.entryInstanceOf(alias,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1628
                KeyStore.TrustedCertificateEntry.class)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1629
            // We have a trusted certificate entry
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1630
            Certificate cert = keyStore.getCertificate(alias);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1631
            if (verbose && (cert instanceof X509Certificate)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1632
                out.println(rb.getString("Entry type: trustedCertEntry\n"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1633
                printX509Cert((X509Certificate)cert, out);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1634
            } else if (rfc) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1635
                out.println(rb.getString("Entry type: trustedCertEntry\n"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1636
                dumpCert(cert, out);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1637
            } else if (debug) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1638
                out.println(cert.toString());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1639
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1640
                out.println(rb.getString("trustedCertEntry,"));
909
c7bb1699d1b0 6709758: keytool default cert fingerprint algorithm should be SHA1, not MD5
weijun
parents: 904
diff changeset
  1641
                out.println(rb.getString("Certificate fingerprint (SHA1): ")
c7bb1699d1b0 6709758: keytool default cert fingerprint algorithm should be SHA1, not MD5
weijun
parents: 904
diff changeset
  1642
                            + getCertFingerPrint("SHA1", cert));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1643
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1644
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1645
            out.println(rb.getString("Unknown Entry Type"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1646
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1647
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1648
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1649
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1650
     * Load the srckeystore from a stream, used in -importkeystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1651
     * @returns the src KeyStore
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1652
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1653
    KeyStore loadSourceKeyStore() throws Exception {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1654
        boolean isPkcs11 = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1655
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1656
        InputStream is = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1657
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1658
        if (P11KEYSTORE.equalsIgnoreCase(srcstoretype) ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1659
                KeyStoreUtil.isWindowsKeyStore(srcstoretype)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1660
            if (!NONE.equals(srcksfname)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1661
                System.err.println(MessageFormat.format(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1662
                    ("-keystore must be NONE if -storetype is {0}"), srcstoretype));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1663
                System.err.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1664
                tinyHelp();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1665
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1666
            isPkcs11 = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1667
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1668
            if (srcksfname != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1669
                File srcksfile = new File(srcksfname);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1670
                    if (srcksfile.exists() && srcksfile.length() == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1671
                        throw new Exception(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1672
                                ("Source keystore file exists, but is empty: ") +
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1673
                                srcksfname);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1674
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1675
                is = new FileInputStream(srcksfile);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1676
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1677
                throw new Exception(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1678
                        ("Please specify -srckeystore"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1679
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1680
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1681
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1682
        KeyStore store;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1683
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1684
            if (srcProviderName == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1685
                store = KeyStore.getInstance(srcstoretype);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1686
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1687
                store = KeyStore.getInstance(srcstoretype, srcProviderName);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1688
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1689
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1690
            if (srcstorePass == null
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1691
                    && !srcprotectedPath
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1692
                    && !KeyStoreUtil.isWindowsKeyStore(srcstoretype)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1693
                System.err.print(rb.getString("Enter source keystore password:  "));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1694
                System.err.flush();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1695
                srcstorePass = Password.readPassword(System.in);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1696
                passwords.add(srcstorePass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1697
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1698
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1699
            // always let keypass be storepass when using pkcs12
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1700
            if (P12KEYSTORE.equalsIgnoreCase(srcstoretype)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1701
                if (srckeyPass != null && srcstorePass != null &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1702
                        !Arrays.equals(srcstorePass, srckeyPass)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1703
                    MessageFormat form = new MessageFormat(rb.getString(
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1704
                        "Warning:  Different store and key passwords not supported " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1705
                        "for PKCS12 KeyStores. Ignoring user-specified <command> value."));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1706
                    Object[] source = {"-srckeypass"};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1707
                    System.err.println(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1708
                    srckeyPass = srcstorePass;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1709
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1710
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1711
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1712
            store.load(is, srcstorePass);   // "is" already null in PKCS11
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1713
        } finally {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1714
            if (is != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1715
                is.close();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1716
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1717
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1718
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1719
        if (srcstorePass == null
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1720
                && !KeyStoreUtil.isWindowsKeyStore(srcstoretype)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1721
            // anti refactoring, copied from printWarning(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1722
            // but change 2 lines
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1723
            System.err.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1724
            System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1725
                ("*****************  WARNING WARNING WARNING  *****************"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1726
            System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1727
                ("* The integrity of the information stored in the srckeystore*"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1728
            System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1729
                ("* has NOT been verified!  In order to verify its integrity, *"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1730
            System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1731
                ("* you must provide the srckeystore password.                *"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1732
            System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1733
                ("*****************  WARNING WARNING WARNING  *****************"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1734
            System.err.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1735
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1736
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1737
        return store;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1738
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1739
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1740
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1741
     * import all keys and certs from importkeystore.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1742
     * keep alias unchanged if no name conflict, otherwise, prompt.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1743
     * keep keypass unchanged for keys
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1744
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1745
    private void doImportKeyStore() throws Exception {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1746
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1747
        if (alias != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1748
            doImportKeyStoreSingle(loadSourceKeyStore(), alias);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1749
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1750
            if (dest != null || srckeyPass != null || destKeyPass != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1751
                throw new Exception(rb.getString(
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1752
                        "if alias not specified, destalias, srckeypass, " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1753
                        "and destkeypass must not be specified"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1754
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1755
            doImportKeyStoreAll(loadSourceKeyStore());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1756
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1757
        /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1758
         * Information display rule of -importkeystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1759
         * 1. inside single, shows failure
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1760
         * 2. inside all, shows sucess
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1761
         * 3. inside all where there is a failure, prompt for continue
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1762
         * 4. at the final of all, shows summary
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1763
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1764
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1765
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1766
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1767
     * Import a single entry named alias from srckeystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1768
     * @returns 1 if the import action succeed
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1769
     *          0 if user choose to ignore an alias-dumplicated entry
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1770
     *          2 if setEntry throws Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1771
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1772
    private int doImportKeyStoreSingle(KeyStore srckeystore, String alias)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1773
            throws Exception {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1774
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1775
        String newAlias = (dest==null) ? alias : dest;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1776
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1777
        if (keyStore.containsAlias(newAlias)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1778
            Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1779
            if (noprompt) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1780
                System.err.println(new MessageFormat(rb.getString(
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1781
                        "Warning: Overwriting existing alias <alias> in destination keystore")).format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1782
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1783
                String reply = getYesNoReply(new MessageFormat(rb.getString(
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1784
                        "Existing entry alias <alias> exists, overwrite? [no]:  ")).format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1785
                if ("NO".equals(reply)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1786
                    newAlias = inputStringFromStdin(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1787
                            ("Enter new alias name\t(RETURN to cancel import for this entry):  "));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1788
                    if ("".equals(newAlias)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1789
                        System.err.println(new MessageFormat(rb.getString(
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1790
                                "Entry for alias <alias> not imported.")).format(
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1791
                                source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1792
                        return 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1793
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1794
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1795
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1796
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1797
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1798
        Pair<Entry,char[]> objs = recoverEntry(srckeystore, alias, srcstorePass, srckeyPass);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1799
        Entry entry = objs.fst;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1800
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1801
        PasswordProtection pp = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1802
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1803
        // According to keytool.html, "The destination entry will be protected
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1804
        // using destkeypass. If destkeypass is not provided, the destination
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1805
        // entry will be protected with the source entry password."
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1806
        // so always try to protect with destKeyPass.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1807
        if (destKeyPass != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1808
            pp = new PasswordProtection(destKeyPass);
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1809
        } else if (objs.snd != null) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1810
            pp = new PasswordProtection(objs.snd);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1811
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1812
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1813
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1814
            keyStore.setEntry(newAlias, entry, pp);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1815
            return 1;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1816
        } catch (KeyStoreException kse) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1817
            Object[] source2 = {alias, kse.toString()};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1818
            MessageFormat form = new MessageFormat(rb.getString(
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1819
                    "Problem importing entry for alias <alias>: <exception>.\nEntry for alias <alias> not imported."));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1820
            System.err.println(form.format(source2));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1821
            return 2;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1822
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1823
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1824
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1825
    private void doImportKeyStoreAll(KeyStore srckeystore) throws Exception {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1826
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1827
        int ok = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1828
        int count = srckeystore.size();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1829
        for (Enumeration<String> e = srckeystore.aliases();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1830
                                        e.hasMoreElements(); ) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1831
            String alias = e.nextElement();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1832
            int result = doImportKeyStoreSingle(srckeystore, alias);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1833
            if (result == 1) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1834
                ok++;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1835
                Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1836
                MessageFormat form = new MessageFormat(rb.getString("Entry for alias <alias> successfully imported."));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1837
                System.err.println(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1838
            } else if (result == 2) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1839
                if (!noprompt) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1840
                    String reply = getYesNoReply("Do you want to quit the import process? [no]:  ");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1841
                    if ("YES".equals(reply)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1842
                        break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1843
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1844
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1845
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1846
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1847
        Object[] source = {ok, count-ok};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1848
        MessageFormat form = new MessageFormat(rb.getString(
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1849
                "Import command completed:  <ok> entries successfully imported, <fail> entries failed or cancelled"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1850
        System.err.println(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1851
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1852
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1853
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1854
     * Prints all keystore entries.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1855
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1856
    private void doPrintEntries(PrintStream out)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1857
        throws Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1858
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1859
        if (storePass == null
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1860
                && !KeyStoreUtil.isWindowsKeyStore(storetype)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1861
            printWarning();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1862
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1863
            out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1864
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1865
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1866
        out.println(rb.getString("Keystore type: ") + keyStore.getType());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1867
        out.println(rb.getString("Keystore provider: ") +
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1868
                keyStore.getProvider().getName());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1869
        out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1870
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1871
        MessageFormat form;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1872
        form = (keyStore.size() == 1) ?
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1873
                new MessageFormat(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1874
                        ("Your keystore contains keyStore.size() entry")) :
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1875
                new MessageFormat(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1876
                        ("Your keystore contains keyStore.size() entries"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1877
        Object[] source = {new Integer(keyStore.size())};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1878
        out.println(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1879
        out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1880
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1881
        for (Enumeration<String> e = keyStore.aliases();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1882
                                        e.hasMoreElements(); ) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1883
            String alias = e.nextElement();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1884
            doPrintEntry(alias, out, false);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1885
            if (verbose || rfc) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1886
                out.println(rb.getString("\n"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1887
                out.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1888
                        ("*******************************************"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1889
                out.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1890
                        ("*******************************************\n\n"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1891
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1892
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1893
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1894
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1895
    private void doPrintCertReq(InputStream in, PrintStream out)
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1896
            throws Exception {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1897
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1898
        BufferedReader reader = new BufferedReader(new InputStreamReader(in));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1899
        StringBuffer sb = new StringBuffer();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1900
        boolean started = false;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1901
        while (true) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1902
            String s = reader.readLine();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1903
            if (s == null) break;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1904
            if (!started) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1905
                if (s.startsWith("-----")) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1906
                    started = true;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1907
                }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1908
            } else {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1909
                if (s.startsWith("-----")) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1910
                    break;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1911
                }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1912
                sb.append(s);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1913
            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1914
        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1915
        PKCS10 req = new PKCS10(new BASE64Decoder().decodeBuffer(new String(sb)));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1916
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1917
        PublicKey pkey = req.getSubjectPublicKeyInfo();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1918
        out.printf(rb.getString("PKCS #10 Certificate Request (Version 1.0)\n" +
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1919
                "Subject: %s\nPublic Key: %s format %s key\n"),
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1920
                req.getSubjectName(), pkey.getFormat(), pkey.getAlgorithm());
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1921
        for (PKCS10Attribute attr: req.getAttributes().getAttributes()) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1922
            ObjectIdentifier oid = attr.getAttributeId();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1923
            if (oid.equals(PKCS9Attribute.EXTENSION_REQUEST_OID)) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1924
                CertificateExtensions exts = (CertificateExtensions)attr.getAttributeValue();
2179
e172c13ca87a 6813402: keytool cannot -printcert entries without extensions
weijun
parents: 2067
diff changeset
  1925
                if (exts != null) {
e172c13ca87a 6813402: keytool cannot -printcert entries without extensions
weijun
parents: 2067
diff changeset
  1926
                    printExtensions(rb.getString("Extension Request:"), exts, out);
e172c13ca87a 6813402: keytool cannot -printcert entries without extensions
weijun
parents: 2067
diff changeset
  1927
                }
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1928
            } else {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1929
                out.println(attr.getAttributeId());
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1930
                out.println(attr.getAttributeValue());
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1931
            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1932
        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1933
        if (debug) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1934
            out.println(req);   // Just to see more, say, public key length...
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1935
        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1936
    }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1937
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1938
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1939
     * Reads a certificate (or certificate chain) and prints its contents in
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  1940
     * a human readable format.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1941
     */
904
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1942
    private void printCertFromStream(InputStream in, PrintStream out)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1943
        throws Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1944
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1945
        Collection<? extends Certificate> c = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1946
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1947
            c = cf.generateCertificates(in);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1948
        } catch (CertificateException ce) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1949
            throw new Exception(rb.getString("Failed to parse input"), ce);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1950
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1951
        if (c.isEmpty()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1952
            throw new Exception(rb.getString("Empty input"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1953
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1954
        Certificate[] certs = c.toArray(new Certificate[c.size()]);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1955
        for (int i=0; i<certs.length; i++) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1956
            X509Certificate x509Cert = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1957
            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1958
                x509Cert = (X509Certificate)certs[i];
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1959
            } catch (ClassCastException cce) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1960
                throw new Exception(rb.getString("Not X.509 certificate"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1961
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1962
            if (certs.length > 1) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1963
                MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1964
                        (rb.getString("Certificate[(i + 1)]:"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1965
                Object[] source = {new Integer(i + 1)};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1966
                out.println(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1967
            }
904
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1968
            if (rfc) dumpCert(x509Cert, out);
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1969
            else printX509Cert(x509Cert, out);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1970
            if (i < (certs.length-1)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1971
                out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1972
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1973
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1974
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1975
904
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1976
    private void doPrintCert(final PrintStream out) throws Exception {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1977
        if (sslserver != null) {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1978
            SSLContext sc = SSLContext.getInstance("SSL");
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1979
            final boolean[] certPrinted = new boolean[1];
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1980
            sc.init(null, new TrustManager[] {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1981
                new X509TrustManager() {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1982
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1983
                    public java.security.cert.X509Certificate[] getAcceptedIssuers() {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1984
                        return null;
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1985
                    }
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1986
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1987
                    public void checkClientTrusted(
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1988
                        java.security.cert.X509Certificate[] certs, String authType) {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1989
                    }
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1990
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1991
                    public void checkServerTrusted(
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1992
                            java.security.cert.X509Certificate[] certs, String authType) {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1993
                        for (int i=0; i<certs.length; i++) {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1994
                            X509Certificate cert = certs[i];
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1995
                            try {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1996
                                if (rfc) {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1997
                                    dumpCert(cert, out);
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1998
                                } else {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  1999
                                    out.println("Certificate #" + i);
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2000
                                    out.println("====================================");
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2001
                                    printX509Cert(cert, out);
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2002
                                    out.println();
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2003
                                }
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2004
                            } catch (Exception e) {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2005
                                if (debug) {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2006
                                    e.printStackTrace();
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2007
                                }
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2008
                            }
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2009
                        }
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2010
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2011
                        // Set to true where there's something to print
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2012
                        if (certs.length > 0) {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2013
                            certPrinted[0] = true;
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2014
                        }
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2015
                    }
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2016
                }
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2017
            }, null);
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2018
            HttpsURLConnection.setDefaultSSLSocketFactory(sc.getSocketFactory());
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2019
            HttpsURLConnection.setDefaultHostnameVerifier(
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2020
                    new HostnameVerifier() {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2021
                        public boolean verify(String hostname, SSLSession session) {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2022
                            return true;
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2023
                        }
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2024
                    });
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2025
            // HTTPS instead of raw SSL, so that -Dhttps.proxyHost and
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2026
            // -Dhttps.proxyPort can be used. Since we only go through
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2027
            // the handshake process, an HTTPS server is not needed.
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2028
            // This program should be able to deal with any SSL-based
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2029
            // network service.
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2030
            Exception ex = null;
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2031
            try {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2032
                new URL("https://" + sslserver).openConnection().connect();
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2033
            } catch (Exception e) {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2034
                ex = e;
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2035
            }
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2036
            // If the certs are not printed out, we consider it an error even
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2037
            // if the URL connection is successful.
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2038
            if (!certPrinted[0]) {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2039
                Exception e = new Exception(
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2040
                        rb.getString("No certificate from the SSL server"));
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2041
                if (ex != null) {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2042
                    e.initCause(ex);
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2043
                }
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2044
                throw e;
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2045
            }
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2046
        } else {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2047
            InputStream inStream = System.in;
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2048
            if (filename != null) {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2049
                inStream = new FileInputStream(filename);
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2050
            }
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2051
            try {
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2052
                // Read the full stream before feeding to X509Factory,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2053
                // otherwise, keytool -gencert | keytool -printcert
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2054
                // might not work properly, since -gencert is slow
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2055
                // and there's no data in the pipe at the beginning.
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2056
                ByteArrayOutputStream bout = new ByteArrayOutputStream();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2057
                byte[] b = new byte[4096];
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2058
                while (true) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2059
                    int len = inStream.read(b);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2060
                    if (len < 0) break;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2061
                    bout.write(b, 0, len);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2062
                }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2063
                printCertFromStream(new ByteArrayInputStream(bout.toByteArray()), out);
904
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2064
            } finally {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2065
                if (inStream != System.in) {
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2066
                    inStream.close();
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2067
                }
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2068
            }
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2069
        }
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  2070
    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2071
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2072
     * Creates a self-signed certificate, and stores it as a single-element
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2073
     * certificate chain.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2074
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2075
    private void doSelfCert(String alias, String dname, String sigAlgName)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2076
        throws Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2077
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2078
        if (alias == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2079
            alias = keyAlias;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2080
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2081
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2082
        Pair<Key,char[]> objs = recoverKey(alias, storePass, keyPass);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2083
        PrivateKey privKey = (PrivateKey)objs.fst;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2084
        if (keyPass == null)
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2085
            keyPass = objs.snd;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2086
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2087
        // Determine the signature algorithm
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2088
        if (sigAlgName == null) {
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2089
            sigAlgName = getCompatibleSigAlgName(privKey.getAlgorithm());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2090
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2091
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2092
        // Get the old certificate
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2093
        Certificate oldCert = keyStore.getCertificate(alias);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2094
        if (oldCert == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2095
            MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2096
                (rb.getString("alias has no public key"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2097
            Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2098
            throw new Exception(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2099
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2100
        if (!(oldCert instanceof X509Certificate)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2101
            MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2102
                (rb.getString("alias has no X.509 certificate"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2103
            Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2104
            throw new Exception(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2105
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2106
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2107
        // convert to X509CertImpl, so that we can modify selected fields
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2108
        // (no public APIs available yet)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2109
        byte[] encoded = oldCert.getEncoded();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2110
        X509CertImpl certImpl = new X509CertImpl(encoded);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2111
        X509CertInfo certInfo = (X509CertInfo)certImpl.get(X509CertImpl.NAME
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2112
                                                           + "." +
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2113
                                                           X509CertImpl.INFO);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2114
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2115
        // Extend its validity
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2116
        Date firstDate = getStartDate(startDate);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2117
        Date lastDate = new Date();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2118
        lastDate.setTime(firstDate.getTime() + validity*1000L*24L*60L*60L);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2119
        CertificateValidity interval = new CertificateValidity(firstDate,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2120
                                                               lastDate);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2121
        certInfo.set(X509CertInfo.VALIDITY, interval);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2122
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2123
        // Make new serial number
2293
cb6d01cb3c3d 6820606: keytool can generate serialno more randomly
weijun
parents: 2289
diff changeset
  2124
        certInfo.set(X509CertInfo.SERIAL_NUMBER, new CertificateSerialNumber(
cb6d01cb3c3d 6820606: keytool can generate serialno more randomly
weijun
parents: 2289
diff changeset
  2125
                    new java.util.Random().nextInt() & 0x7fffffff));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2126
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2127
        // Set owner and issuer fields
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2128
        X500Name owner;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2129
        if (dname == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2130
            // Get the owner name from the certificate
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2131
            owner = (X500Name)certInfo.get(X509CertInfo.SUBJECT + "." +
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2132
                                           CertificateSubjectName.DN_NAME);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2133
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2134
            // Use the owner name specified at the command line
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2135
            owner = new X500Name(dname);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2136
            certInfo.set(X509CertInfo.SUBJECT + "." +
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2137
                         CertificateSubjectName.DN_NAME, owner);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2138
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2139
        // Make issuer same as owner (self-signed!)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2140
        certInfo.set(X509CertInfo.ISSUER + "." +
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2141
                     CertificateIssuerName.DN_NAME, owner);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2142
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2143
        // The inner and outer signature algorithms have to match.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2144
        // The way we achieve that is really ugly, but there seems to be no
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2145
        // other solution: We first sign the cert, then retrieve the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2146
        // outer sigalg and use it to set the inner sigalg
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2147
        X509CertImpl newCert = new X509CertImpl(certInfo);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2148
        newCert.sign(privKey, sigAlgName);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2149
        AlgorithmId sigAlgid = (AlgorithmId)newCert.get(X509CertImpl.SIG_ALG);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2150
        certInfo.set(CertificateAlgorithmId.NAME + "." +
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2151
                     CertificateAlgorithmId.ALGORITHM, sigAlgid);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2152
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2153
        certInfo.set(X509CertInfo.VERSION,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2154
                        new CertificateVersion(CertificateVersion.V3));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2155
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2156
        CertificateExtensions ext = createV3Extensions(
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2157
                null,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2158
                (CertificateExtensions)certInfo.get(X509CertInfo.EXTENSIONS),
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2159
                v3ext,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2160
                oldCert.getPublicKey(),
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2161
                null);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2162
        certInfo.set(X509CertInfo.EXTENSIONS, ext);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2163
        // Sign the new certificate
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2164
        newCert = new X509CertImpl(certInfo);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2165
        newCert.sign(privKey, sigAlgName);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2166
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2167
        // Store the new certificate as a single-element certificate chain
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2168
        keyStore.setKeyEntry(alias, privKey,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2169
                             (keyPass != null) ? keyPass : storePass,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2170
                             new Certificate[] { newCert } );
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2171
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2172
        if (verbose) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2173
            System.err.println(rb.getString("New certificate (self-signed):"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2174
            System.err.print(newCert.toString());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2175
            System.err.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2176
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2177
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2178
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2179
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2180
     * Processes a certificate reply from a certificate authority.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2181
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2182
     * <p>Builds a certificate chain on top of the certificate reply,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2183
     * using trusted certificates from the keystore. The chain is complete
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2184
     * after a self-signed certificate has been encountered. The self-signed
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2185
     * certificate is considered a root certificate authority, and is stored
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2186
     * at the end of the chain.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2187
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2188
     * <p>The newly generated chain replaces the old chain associated with the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2189
     * key entry.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2190
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2191
     * @return true if the certificate reply was installed, otherwise false.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2192
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2193
    private boolean installReply(String alias, InputStream in)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2194
        throws Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2195
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2196
        if (alias == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2197
            alias = keyAlias;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2198
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2199
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2200
        Pair<Key,char[]> objs = recoverKey(alias, storePass, keyPass);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2201
        PrivateKey privKey = (PrivateKey)objs.fst;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2202
        if (keyPass == null) {
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2203
            keyPass = objs.snd;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2204
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2205
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2206
        Certificate userCert = keyStore.getCertificate(alias);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2207
        if (userCert == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2208
            MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2209
                (rb.getString("alias has no public key (certificate)"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2210
            Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2211
            throw new Exception(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2212
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2213
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2214
        // Read the certificates in the reply
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2215
        Collection<? extends Certificate> c = cf.generateCertificates(in);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2216
        if (c.isEmpty()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2217
            throw new Exception(rb.getString("Reply has no certificates"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2218
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2219
        Certificate[] replyCerts = c.toArray(new Certificate[c.size()]);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2220
        Certificate[] newChain;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2221
        if (replyCerts.length == 1) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2222
            // single-cert reply
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2223
            newChain = establishCertChain(userCert, replyCerts[0]);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2224
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2225
            // cert-chain reply (e.g., PKCS#7)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2226
            newChain = validateReply(alias, userCert, replyCerts);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2227
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2228
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2229
        // Now store the newly established chain in the keystore. The new
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2230
        // chain replaces the old one.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2231
        if (newChain != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2232
            keyStore.setKeyEntry(alias, privKey,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2233
                                 (keyPass != null) ? keyPass : storePass,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2234
                                 newChain);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2235
            return true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2236
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2237
            return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2238
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2239
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2240
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2241
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2242
     * Imports a certificate and adds it to the list of trusted certificates.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2243
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2244
     * @return true if the certificate was added, otherwise false.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2245
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2246
    private boolean addTrustedCert(String alias, InputStream in)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2247
        throws Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2248
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2249
        if (alias == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2250
            throw new Exception(rb.getString("Must specify alias"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2251
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2252
        if (keyStore.containsAlias(alias)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2253
            MessageFormat form = new MessageFormat(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2254
                ("Certificate not imported, alias <alias> already exists"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2255
            Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2256
            throw new Exception(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2257
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2258
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2259
        // Read the certificate
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2260
        X509Certificate cert = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2261
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2262
            cert = (X509Certificate)cf.generateCertificate(in);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2263
        } catch (ClassCastException cce) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2264
            throw new Exception(rb.getString("Input not an X.509 certificate"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2265
        } catch (CertificateException ce) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2266
            throw new Exception(rb.getString("Input not an X.509 certificate"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2267
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2268
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2269
        // if certificate is self-signed, make sure it verifies
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2270
        boolean selfSigned = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2271
        if (isSelfSigned(cert)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2272
            cert.verify(cert.getPublicKey());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2273
            selfSigned = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2274
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2275
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2276
        if (noprompt) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2277
            keyStore.setCertificateEntry(alias, cert);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2278
            return true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2279
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2280
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2281
        // check if cert already exists in keystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2282
        String reply = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2283
        String trustalias = keyStore.getCertificateAlias(cert);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2284
        if (trustalias != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2285
            MessageFormat form = new MessageFormat(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2286
                ("Certificate already exists in keystore under alias <trustalias>"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2287
            Object[] source = {trustalias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2288
            System.err.println(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2289
            reply = getYesNoReply
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2290
                (rb.getString("Do you still want to add it? [no]:  "));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2291
        } else if (selfSigned) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2292
            if (trustcacerts && (caks != null) &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2293
                    ((trustalias=caks.getCertificateAlias(cert)) != null)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2294
                MessageFormat form = new MessageFormat(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2295
                        ("Certificate already exists in system-wide CA keystore under alias <trustalias>"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2296
                Object[] source = {trustalias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2297
                System.err.println(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2298
                reply = getYesNoReply
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2299
                        (rb.getString("Do you still want to add it to your own keystore? [no]:  "));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2300
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2301
            if (trustalias == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2302
                // Print the cert and ask user if they really want to add
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2303
                // it to their keystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2304
                printX509Cert(cert, System.out);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2305
                reply = getYesNoReply
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2306
                        (rb.getString("Trust this certificate? [no]:  "));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2307
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2308
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2309
        if (reply != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2310
            if ("YES".equals(reply)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2311
                keyStore.setCertificateEntry(alias, cert);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2312
                return true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2313
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2314
                return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2315
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2316
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2317
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2318
        // Try to establish trust chain
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2319
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2320
            Certificate[] chain = establishCertChain(null, cert);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2321
            if (chain != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2322
                keyStore.setCertificateEntry(alias, cert);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2323
                return true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2324
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2325
        } catch (Exception e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2326
            // Print the cert and ask user if they really want to add it to
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2327
            // their keystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2328
            printX509Cert(cert, System.out);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2329
            reply = getYesNoReply
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2330
                (rb.getString("Trust this certificate? [no]:  "));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2331
            if ("YES".equals(reply)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2332
                keyStore.setCertificateEntry(alias, cert);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2333
                return true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2334
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2335
                return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2336
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2337
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2338
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2339
        return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2340
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2341
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2342
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2343
     * Prompts user for new password. New password must be different from
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2344
     * old one.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2345
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2346
     * @param prompt the message that gets prompted on the screen
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2347
     * @param oldPasswd the current (i.e., old) password
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2348
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2349
    private char[] getNewPasswd(String prompt, char[] oldPasswd)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2350
        throws Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2351
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2352
        char[] entered = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2353
        char[] reentered = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2354
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2355
        for (int count = 0; count < 3; count++) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2356
            MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2357
                (rb.getString("New prompt: "));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2358
            Object[] source = {prompt};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2359
            System.err.print(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2360
            entered = Password.readPassword(System.in);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2361
            passwords.add(entered);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2362
            if (entered == null || entered.length < 6) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2363
                System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2364
                    ("Password is too short - must be at least 6 characters"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2365
            } else if (Arrays.equals(entered, oldPasswd)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2366
                System.err.println(rb.getString("Passwords must differ"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2367
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2368
                form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2369
                        (rb.getString("Re-enter new prompt: "));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2370
                Object[] src = {prompt};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2371
                System.err.print(form.format(src));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2372
                reentered = Password.readPassword(System.in);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2373
                passwords.add(reentered);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2374
                if (!Arrays.equals(entered, reentered)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2375
                    System.err.println
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2376
                        (rb.getString("They don't match. Try again"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2377
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2378
                    Arrays.fill(reentered, ' ');
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2379
                    return entered;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2380
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2381
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2382
            if (entered != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2383
                Arrays.fill(entered, ' ');
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2384
                entered = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2385
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2386
            if (reentered != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2387
                Arrays.fill(reentered, ' ');
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2388
                reentered = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2389
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2390
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2391
        throw new Exception(rb.getString("Too many failures - try later"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2392
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2393
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2394
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2395
     * Prompts user for alias name.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2396
     * @param prompt the {0} of "Enter {0} alias name:  " in prompt line
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2397
     * @returns the string entered by the user, without the \n at the end
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2398
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2399
    private String getAlias(String prompt) throws Exception {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2400
        if (prompt != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2401
            MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2402
                (rb.getString("Enter prompt alias name:  "));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2403
            Object[] source = {prompt};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2404
            System.err.print(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2405
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2406
            System.err.print(rb.getString("Enter alias name:  "));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2407
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2408
        return (new BufferedReader(new InputStreamReader(
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2409
                                        System.in))).readLine();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2410
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2411
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2412
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2413
     * Prompts user for an input string from the command line (System.in)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2414
     * @prompt the prompt string printed
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2415
     * @returns the string entered by the user, without the \n at the end
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2416
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2417
    private String inputStringFromStdin(String prompt) throws Exception {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2418
        System.err.print(prompt);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2419
        return (new BufferedReader(new InputStreamReader(
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2420
                                        System.in))).readLine();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2421
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2422
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2423
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2424
     * Prompts user for key password. User may select to choose the same
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2425
     * password (<code>otherKeyPass</code>) as for <code>otherAlias</code>.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2426
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2427
    private char[] getKeyPasswd(String alias, String otherAlias,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2428
                                char[] otherKeyPass)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2429
        throws Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2430
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2431
        int count = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2432
        char[] keyPass = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2433
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2434
        do {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2435
            if (otherKeyPass != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2436
                MessageFormat form = new MessageFormat(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2437
                        ("Enter key password for <alias>"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2438
                Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2439
                System.err.println(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2440
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2441
                form = new MessageFormat(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2442
                        ("\t(RETURN if same as for <otherAlias>)"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2443
                Object[] src = {otherAlias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2444
                System.err.print(form.format(src));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2445
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2446
                MessageFormat form = new MessageFormat(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2447
                        ("Enter key password for <alias>"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2448
                Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2449
                System.err.print(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2450
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2451
            System.err.flush();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2452
            keyPass = Password.readPassword(System.in);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2453
            passwords.add(keyPass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2454
            if (keyPass == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2455
                keyPass = otherKeyPass;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2456
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2457
            count++;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2458
        } while ((keyPass == null) && count < 3);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2459
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2460
        if (keyPass == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2461
            throw new Exception(rb.getString("Too many failures - try later"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2462
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2463
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2464
        return keyPass;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2465
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2466
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2467
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2468
     * Prints a certificate in a human readable format.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2469
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2470
    private void printX509Cert(X509Certificate cert, PrintStream out)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2471
        throws Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2472
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2473
        /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2474
        out.println("Owner: "
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2475
                    + cert.getSubjectDN().toString()
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2476
                    + "\n"
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2477
                    + "Issuer: "
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2478
                    + cert.getIssuerDN().toString()
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2479
                    + "\n"
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2480
                    + "Serial number: " + cert.getSerialNumber().toString(16)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2481
                    + "\n"
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2482
                    + "Valid from: " + cert.getNotBefore().toString()
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2483
                    + " until: " + cert.getNotAfter().toString()
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2484
                    + "\n"
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2485
                    + "Certificate fingerprints:\n"
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2486
                    + "\t MD5:  " + getCertFingerPrint("MD5", cert)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2487
                    + "\n"
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2488
                    + "\t SHA1: " + getCertFingerPrint("SHA1", cert));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2489
        */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2490
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2491
        MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2492
                (rb.getString("*PATTERN* printX509Cert"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2493
        Object[] source = {cert.getSubjectDN().toString(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2494
                        cert.getIssuerDN().toString(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2495
                        cert.getSerialNumber().toString(16),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2496
                        cert.getNotBefore().toString(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2497
                        cert.getNotAfter().toString(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2498
                        getCertFingerPrint("MD5", cert),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2499
                        getCertFingerPrint("SHA1", cert),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2500
                        cert.getSigAlgName(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2501
                        cert.getVersion()
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2502
                        };
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2503
        out.println(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2504
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2505
        if (cert instanceof X509CertImpl) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2506
            X509CertImpl impl = (X509CertImpl)cert;
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2507
            X509CertInfo certInfo = (X509CertInfo)impl.get(X509CertImpl.NAME
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2508
                                                           + "." +
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2509
                                                           X509CertImpl.INFO);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2510
            CertificateExtensions exts = (CertificateExtensions)
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2511
                    certInfo.get(X509CertInfo.EXTENSIONS);
2179
e172c13ca87a 6813402: keytool cannot -printcert entries without extensions
weijun
parents: 2067
diff changeset
  2512
            if (exts != null) {
e172c13ca87a 6813402: keytool cannot -printcert entries without extensions
weijun
parents: 2067
diff changeset
  2513
                printExtensions(rb.getString("Extensions: "), exts, out);
e172c13ca87a 6813402: keytool cannot -printcert entries without extensions
weijun
parents: 2067
diff changeset
  2514
            }
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2515
        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2516
    }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2517
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2518
    private static void printExtensions(String title, CertificateExtensions exts, PrintStream out)
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2519
            throws Exception {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2520
        int extnum = 0;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2521
        Iterator<Extension> i1 = exts.getAllExtensions().iterator();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2522
        Iterator<Extension> i2 = exts.getUnparseableExtensions().values().iterator();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2523
        while (i1.hasNext() || i2.hasNext()) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2524
            Extension ext = i1.hasNext()?i1.next():i2.next();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2525
            if (extnum == 0) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2526
                out.println();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2527
                out.println(title);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2528
                out.println();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2529
            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2530
            out.print("#"+(++extnum)+": "+ ext);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2531
            if (ext.getClass() == Extension.class) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2532
                byte[] v = ext.getExtensionValue();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2533
                if (v.length == 0) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2534
                    out.println(rb.getString("(Empty value)"));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2535
                } else {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2536
                    new sun.misc.HexDumpEncoder().encode(ext.getExtensionValue(), out);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2537
                    out.println();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2538
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2539
            }
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2540
            out.println();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2541
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2542
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2543
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2544
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2545
     * Returns true if the certificate is self-signed, false otherwise.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2546
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2547
    private boolean isSelfSigned(X509Certificate cert) {
2437
098db6faaf66 6825352: support self-issued certificate in keytool
weijun
parents: 2432
diff changeset
  2548
        return signedBy(cert, cert);
098db6faaf66 6825352: support self-issued certificate in keytool
weijun
parents: 2432
diff changeset
  2549
    }
098db6faaf66 6825352: support self-issued certificate in keytool
weijun
parents: 2432
diff changeset
  2550
098db6faaf66 6825352: support self-issued certificate in keytool
weijun
parents: 2432
diff changeset
  2551
    private boolean signedBy(X509Certificate end, X509Certificate ca) {
098db6faaf66 6825352: support self-issued certificate in keytool
weijun
parents: 2432
diff changeset
  2552
        if (!ca.getSubjectDN().equals(end.getIssuerDN())) {
098db6faaf66 6825352: support self-issued certificate in keytool
weijun
parents: 2432
diff changeset
  2553
            return false;
098db6faaf66 6825352: support self-issued certificate in keytool
weijun
parents: 2432
diff changeset
  2554
        }
098db6faaf66 6825352: support self-issued certificate in keytool
weijun
parents: 2432
diff changeset
  2555
        try {
098db6faaf66 6825352: support self-issued certificate in keytool
weijun
parents: 2432
diff changeset
  2556
            end.verify(ca.getPublicKey());
098db6faaf66 6825352: support self-issued certificate in keytool
weijun
parents: 2432
diff changeset
  2557
            return true;
098db6faaf66 6825352: support self-issued certificate in keytool
weijun
parents: 2432
diff changeset
  2558
        } catch (Exception e) {
098db6faaf66 6825352: support self-issued certificate in keytool
weijun
parents: 2432
diff changeset
  2559
            return false;
098db6faaf66 6825352: support self-issued certificate in keytool
weijun
parents: 2432
diff changeset
  2560
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2561
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2562
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2563
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2564
     * Returns true if the given certificate is trusted, false otherwise.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2565
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2566
    private boolean isTrusted(Certificate cert)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2567
        throws Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2568
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2569
        if (keyStore.getCertificateAlias(cert) != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2570
            return true; // found in own keystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2571
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2572
        if (trustcacerts && (caks != null) &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2573
                (caks.getCertificateAlias(cert) != null)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2574
            return true; // found in CA keystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2575
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2576
        return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2577
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2578
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2579
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2580
     * Gets an X.500 name suitable for inclusion in a certification request.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2581
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2582
    private X500Name getX500Name() throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2583
        BufferedReader in;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2584
        in = new BufferedReader(new InputStreamReader(System.in));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2585
        String commonName = "Unknown";
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2586
        String organizationalUnit = "Unknown";
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2587
        String organization = "Unknown";
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2588
        String city = "Unknown";
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2589
        String state = "Unknown";
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2590
        String country = "Unknown";
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2591
        X500Name name;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2592
        String userInput = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2593
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2594
        int maxRetry = 20;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2595
        do {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2596
            if (maxRetry-- < 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2597
                throw new RuntimeException(rb.getString(
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2598
                        "Too may retries, program terminated"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2599
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2600
            commonName = inputString(in,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2601
                    rb.getString("What is your first and last name?"),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2602
                    commonName);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2603
            organizationalUnit = inputString(in,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2604
                    rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2605
                        ("What is the name of your organizational unit?"),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2606
                    organizationalUnit);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2607
            organization = inputString(in,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2608
                    rb.getString("What is the name of your organization?"),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2609
                    organization);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2610
            city = inputString(in,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2611
                    rb.getString("What is the name of your City or Locality?"),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2612
                    city);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2613
            state = inputString(in,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2614
                    rb.getString("What is the name of your State or Province?"),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2615
                    state);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2616
            country = inputString(in,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2617
                    rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2618
                        ("What is the two-letter country code for this unit?"),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2619
                    country);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2620
            name = new X500Name(commonName, organizationalUnit, organization,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2621
                                city, state, country);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2622
            MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2623
                (rb.getString("Is <name> correct?"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2624
            Object[] source = {name};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2625
            userInput = inputString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2626
                (in, form.format(source), rb.getString("no"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2627
        } while (collator.compare(userInput, rb.getString("yes")) != 0 &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2628
                 collator.compare(userInput, rb.getString("y")) != 0);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2629
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2630
        System.err.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2631
        return name;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2632
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2633
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2634
    private String inputString(BufferedReader in, String prompt,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2635
                               String defaultValue)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2636
        throws IOException
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2637
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2638
        System.err.println(prompt);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2639
        MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2640
                (rb.getString("  [defaultValue]:  "));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2641
        Object[] source = {defaultValue};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2642
        System.err.print(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2643
        System.err.flush();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2644
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2645
        String value = in.readLine();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2646
        if (value == null || collator.compare(value, "") == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2647
            value = defaultValue;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2648
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2649
        return value;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2650
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2651
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2652
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2653
     * Writes an X.509 certificate in base64 or binary encoding to an output
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2654
     * stream.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2655
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2656
    private void dumpCert(Certificate cert, PrintStream out)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2657
        throws IOException, CertificateException
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2658
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2659
        if (rfc) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2660
            BASE64Encoder encoder = new BASE64Encoder();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2661
            out.println(X509Factory.BEGIN_CERT);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2662
            encoder.encodeBuffer(cert.getEncoded(), out);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2663
            out.println(X509Factory.END_CERT);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2664
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2665
            out.write(cert.getEncoded()); // binary
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2666
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2667
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2668
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2669
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2670
     * Converts a byte to hex digit and writes to the supplied buffer
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2671
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2672
    private void byte2hex(byte b, StringBuffer buf) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2673
        char[] hexChars = { '0', '1', '2', '3', '4', '5', '6', '7', '8',
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2674
                            '9', 'A', 'B', 'C', 'D', 'E', 'F' };
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2675
        int high = ((b & 0xf0) >> 4);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2676
        int low = (b & 0x0f);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2677
        buf.append(hexChars[high]);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2678
        buf.append(hexChars[low]);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2679
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2680
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2681
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2682
     * Converts a byte array to hex string
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2683
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2684
    private String toHexString(byte[] block) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2685
        StringBuffer buf = new StringBuffer();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2686
        int len = block.length;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2687
        for (int i = 0; i < len; i++) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2688
             byte2hex(block[i], buf);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2689
             if (i < len-1) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2690
                 buf.append(":");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2691
             }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2692
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2693
        return buf.toString();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2694
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2695
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2696
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2697
     * Recovers (private) key associated with given alias.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2698
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2699
     * @return an array of objects, where the 1st element in the array is the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2700
     * recovered private key, and the 2nd element is the password used to
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2701
     * recover it.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2702
     */
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2703
    private Pair<Key,char[]> recoverKey(String alias, char[] storePass,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2704
                                       char[] keyPass)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2705
        throws Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2706
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2707
        Key key = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2708
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2709
        if (keyStore.containsAlias(alias) == false) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2710
            MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2711
                (rb.getString("Alias <alias> does not exist"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2712
            Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2713
            throw new Exception(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2714
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2715
        if (!keyStore.entryInstanceOf(alias, KeyStore.PrivateKeyEntry.class) &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2716
                !keyStore.entryInstanceOf(alias, KeyStore.SecretKeyEntry.class)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2717
            MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2718
                (rb.getString("Alias <alias> has no key"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2719
            Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2720
            throw new Exception(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2721
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2722
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2723
        if (keyPass == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2724
            // Try to recover the key using the keystore password
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2725
            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2726
                key = keyStore.getKey(alias, storePass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2727
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2728
                keyPass = storePass;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2729
                passwords.add(keyPass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2730
            } catch (UnrecoverableKeyException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2731
                // Did not work out, so prompt user for key password
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2732
                if (!token) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2733
                    keyPass = getKeyPasswd(alias, null, null);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2734
                    key = keyStore.getKey(alias, keyPass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2735
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2736
                    throw e;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2737
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2738
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2739
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2740
            key = keyStore.getKey(alias, keyPass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2741
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2742
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2743
        return Pair.of(key, keyPass);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2744
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2745
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2746
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2747
     * Recovers entry associated with given alias.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2748
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2749
     * @return an array of objects, where the 1st element in the array is the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2750
     * recovered entry, and the 2nd element is the password used to
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2751
     * recover it (null if no password).
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2752
     */
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2753
    private Pair<Entry,char[]> recoverEntry(KeyStore ks,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2754
                            String alias,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2755
                            char[] pstore,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2756
                            char[] pkey) throws Exception {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2757
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2758
        if (ks.containsAlias(alias) == false) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2759
            MessageFormat form = new MessageFormat
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2760
                (rb.getString("Alias <alias> does not exist"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2761
            Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2762
            throw new Exception(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2763
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2764
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2765
        PasswordProtection pp = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2766
        Entry entry;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2767
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2768
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2769
            // First attempt to access entry without key password
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2770
            // (PKCS11 entry or trusted certificate entry, for example)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2771
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2772
            entry = ks.getEntry(alias, pp);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2773
            pkey = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2774
        } catch (UnrecoverableEntryException une) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2775
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2776
            if(P11KEYSTORE.equalsIgnoreCase(ks.getType()) ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2777
                KeyStoreUtil.isWindowsKeyStore(ks.getType())) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2778
                // should not happen, but a possibility
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2779
                throw une;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2780
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2781
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2782
            // entry is protected
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2783
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2784
            if (pkey != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2785
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2786
                // try provided key password
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2787
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2788
                pp = new PasswordProtection(pkey);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2789
                entry = ks.getEntry(alias, pp);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2790
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2791
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2792
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2793
                // try store pass
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2794
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2795
                try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2796
                    pp = new PasswordProtection(pstore);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2797
                    entry = ks.getEntry(alias, pp);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2798
                    pkey = pstore;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2799
                } catch (UnrecoverableEntryException une2) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2800
                    if (P12KEYSTORE.equalsIgnoreCase(ks.getType())) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2801
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2802
                        // P12 keystore currently does not support separate
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2803
                        // store and entry passwords
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2804
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2805
                        throw une2;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2806
                    } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2807
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2808
                        // prompt for entry password
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2809
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2810
                        pkey = getKeyPasswd(alias, null, null);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2811
                        pp = new PasswordProtection(pkey);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2812
                        entry = ks.getEntry(alias, pp);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2813
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2814
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2815
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2816
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2817
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  2818
        return Pair.of(entry, pkey);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2819
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2820
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2821
     * Gets the requested finger print of the certificate.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2822
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2823
    private String getCertFingerPrint(String mdAlg, Certificate cert)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2824
        throws Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2825
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2826
        byte[] encCertInfo = cert.getEncoded();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2827
        MessageDigest md = MessageDigest.getInstance(mdAlg);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2828
        byte[] digest = md.digest(encCertInfo);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2829
        return toHexString(digest);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2830
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2831
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2832
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2833
     * Prints warning about missing integrity check.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2834
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2835
    private void printWarning() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2836
        System.err.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2837
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2838
            ("*****************  WARNING WARNING WARNING  *****************"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2839
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2840
            ("* The integrity of the information stored in your keystore  *"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2841
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2842
            ("* has NOT been verified!  In order to verify its integrity, *"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2843
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2844
            ("* you must provide your keystore password.                  *"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2845
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2846
            ("*****************  WARNING WARNING WARNING  *****************"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2847
        System.err.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2848
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2849
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2850
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2851
     * Validates chain in certification reply, and returns the ordered
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2852
     * elements of the chain (with user certificate first, and root
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2853
     * certificate last in the array).
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2854
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2855
     * @param alias the alias name
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2856
     * @param userCert the user certificate of the alias
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2857
     * @param replyCerts the chain provided in the reply
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2858
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2859
    private Certificate[] validateReply(String alias,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2860
                                        Certificate userCert,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2861
                                        Certificate[] replyCerts)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2862
        throws Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2863
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2864
        // order the certs in the reply (bottom-up).
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2865
        // we know that all certs in the reply are of type X.509, because
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2866
        // we parsed them using an X.509 certificate factory
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2867
        int i;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2868
        PublicKey userPubKey = userCert.getPublicKey();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2869
        for (i=0; i<replyCerts.length; i++) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2870
            if (userPubKey.equals(replyCerts[i].getPublicKey())) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2871
                break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2872
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2873
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2874
        if (i == replyCerts.length) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2875
            MessageFormat form = new MessageFormat(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2876
                ("Certificate reply does not contain public key for <alias>"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2877
            Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2878
            throw new Exception(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2879
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2880
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2881
        Certificate tmpCert = replyCerts[0];
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2882
        replyCerts[0] = replyCerts[i];
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2883
        replyCerts[i] = tmpCert;
2437
098db6faaf66 6825352: support self-issued certificate in keytool
weijun
parents: 2432
diff changeset
  2884
098db6faaf66 6825352: support self-issued certificate in keytool
weijun
parents: 2432
diff changeset
  2885
        X509Certificate thisCert = (X509Certificate)replyCerts[0];
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2886
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2887
        for (i=1; i < replyCerts.length-1; i++) {
2437
098db6faaf66 6825352: support self-issued certificate in keytool
weijun
parents: 2432
diff changeset
  2888
            // find a cert in the reply who signs thisCert
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2889
            int j;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2890
            for (j=i; j<replyCerts.length; j++) {
2437
098db6faaf66 6825352: support self-issued certificate in keytool
weijun
parents: 2432
diff changeset
  2891
                if (signedBy(thisCert, (X509Certificate)replyCerts[j])) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2892
                    tmpCert = replyCerts[i];
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2893
                    replyCerts[i] = replyCerts[j];
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2894
                    replyCerts[j] = tmpCert;
2437
098db6faaf66 6825352: support self-issued certificate in keytool
weijun
parents: 2432
diff changeset
  2895
                    thisCert = (X509Certificate)replyCerts[i];
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2896
                    break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2897
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2898
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2899
            if (j == replyCerts.length) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2900
                throw new Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2901
                    (rb.getString("Incomplete certificate chain in reply"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2902
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2903
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2904
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2905
        if (noprompt) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2906
            return replyCerts;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2907
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2908
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2909
        // do we trust the (root) cert at the top?
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2910
        Certificate topCert = replyCerts[replyCerts.length-1];
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2911
        if (!isTrusted(topCert)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2912
            boolean verified = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2913
            Certificate rootCert = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2914
            if (trustcacerts && (caks!= null)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2915
                for (Enumeration<String> aliases = caks.aliases();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2916
                     aliases.hasMoreElements(); ) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2917
                    String name = aliases.nextElement();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2918
                    rootCert = caks.getCertificate(name);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2919
                    if (rootCert != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2920
                        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2921
                            topCert.verify(rootCert.getPublicKey());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2922
                            verified = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2923
                            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2924
                        } catch (Exception e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2925
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2926
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2927
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2928
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2929
            if (!verified) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2930
                System.err.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2931
                System.err.println
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2932
                        (rb.getString("Top-level certificate in reply:\n"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2933
                printX509Cert((X509Certificate)topCert, System.out);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2934
                System.err.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2935
                System.err.print(rb.getString("... is not trusted. "));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2936
                String reply = getYesNoReply
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2937
                        (rb.getString("Install reply anyway? [no]:  "));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2938
                if ("NO".equals(reply)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2939
                    return null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2940
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2941
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2942
                if (!isSelfSigned((X509Certificate)topCert)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2943
                    // append the (self-signed) root CA cert to the chain
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2944
                    Certificate[] tmpCerts =
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2945
                        new Certificate[replyCerts.length+1];
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2946
                    System.arraycopy(replyCerts, 0, tmpCerts, 0,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2947
                                     replyCerts.length);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2948
                    tmpCerts[tmpCerts.length-1] = rootCert;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2949
                    replyCerts = tmpCerts;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2950
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2951
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2952
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2953
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2954
        return replyCerts;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2955
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2956
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2957
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2958
     * Establishes a certificate chain (using trusted certificates in the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2959
     * keystore), starting with the user certificate
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2960
     * and ending at a self-signed certificate found in the keystore.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2961
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2962
     * @param userCert the user certificate of the alias
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2963
     * @param certToVerify the single certificate provided in the reply
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2964
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2965
    private Certificate[] establishCertChain(Certificate userCert,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2966
                                             Certificate certToVerify)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2967
        throws Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2968
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2969
        if (userCert != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2970
            // Make sure that the public key of the certificate reply matches
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2971
            // the original public key in the keystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2972
            PublicKey origPubKey = userCert.getPublicKey();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2973
            PublicKey replyPubKey = certToVerify.getPublicKey();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2974
            if (!origPubKey.equals(replyPubKey)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2975
                throw new Exception(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2976
                        ("Public keys in reply and keystore don't match"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2977
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2978
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2979
            // If the two certs are identical, we're done: no need to import
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2980
            // anything
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2981
            if (certToVerify.equals(userCert)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2982
                throw new Exception(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2983
                        ("Certificate reply and certificate in keystore are identical"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2984
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2985
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2986
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2987
        // Build a hash table of all certificates in the keystore.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2988
        // Use the subject distinguished name as the key into the hash table.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2989
        // All certificates associated with the same subject distinguished
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2990
        // name are stored in the same hash table entry as a vector.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2991
        Hashtable<Principal, Vector<Certificate>> certs = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2992
        if (keyStore.size() > 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2993
            certs = new Hashtable<Principal, Vector<Certificate>>(11);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2994
            keystorecerts2Hashtable(keyStore, certs);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2995
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2996
        if (trustcacerts) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2997
            if (caks!=null && caks.size()>0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2998
                if (certs == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2999
                    certs = new Hashtable<Principal, Vector<Certificate>>(11);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3000
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3001
                keystorecerts2Hashtable(caks, certs);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3002
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3003
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3004
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3005
        // start building chain
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3006
        Vector<Certificate> chain = new Vector<Certificate>(2);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3007
        if (buildChain((X509Certificate)certToVerify, chain, certs)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3008
            Certificate[] newChain = new Certificate[chain.size()];
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3009
            // buildChain() returns chain with self-signed root-cert first and
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3010
            // user-cert last, so we need to invert the chain before we store
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3011
            // it
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3012
            int j=0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3013
            for (int i=chain.size()-1; i>=0; i--) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3014
                newChain[j] = chain.elementAt(i);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3015
                j++;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3016
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3017
            return newChain;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3018
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3019
            throw new Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3020
                (rb.getString("Failed to establish chain from reply"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3021
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3022
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3023
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3024
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3025
     * Recursively tries to establish chain from pool of trusted certs.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3026
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3027
     * @param certToVerify the cert that needs to be verified.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3028
     * @param chain the chain that's being built.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3029
     * @param certs the pool of trusted certs
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3030
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3031
     * @return true if successful, false otherwise.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3032
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3033
    private boolean buildChain(X509Certificate certToVerify,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3034
                        Vector<Certificate> chain,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3035
                        Hashtable<Principal, Vector<Certificate>> certs) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3036
        Principal issuer = certToVerify.getIssuerDN();
2437
098db6faaf66 6825352: support self-issued certificate in keytool
weijun
parents: 2432
diff changeset
  3037
        if (isSelfSigned(certToVerify)) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3038
            // reached self-signed root cert;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3039
            // no verification needed because it's trusted.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3040
            chain.addElement(certToVerify);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3041
            return true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3042
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3043
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3044
        // Get the issuer's certificate(s)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3045
        Vector<Certificate> vec = certs.get(issuer);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3046
        if (vec == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3047
            return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3048
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3049
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3050
        // Try out each certificate in the vector, until we find one
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3051
        // whose public key verifies the signature of the certificate
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3052
        // in question.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3053
        for (Enumeration<Certificate> issuerCerts = vec.elements();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3054
             issuerCerts.hasMoreElements(); ) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3055
            X509Certificate issuerCert
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3056
                = (X509Certificate)issuerCerts.nextElement();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3057
            PublicKey issuerPubKey = issuerCert.getPublicKey();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3058
            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3059
                certToVerify.verify(issuerPubKey);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3060
            } catch (Exception e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3061
                continue;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3062
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3063
            if (buildChain(issuerCert, chain, certs)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3064
                chain.addElement(certToVerify);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3065
                return true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3066
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3067
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3068
        return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3069
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3070
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3071
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3072
     * Prompts user for yes/no decision.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3073
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3074
     * @return the user's decision, can only be "YES" or "NO"
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3075
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3076
    private String getYesNoReply(String prompt)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3077
        throws IOException
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3078
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3079
        String reply = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3080
        int maxRetry = 20;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3081
        do {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3082
            if (maxRetry-- < 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3083
                throw new RuntimeException(rb.getString(
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3084
                        "Too may retries, program terminated"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3085
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3086
            System.err.print(prompt);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3087
            System.err.flush();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3088
            reply = (new BufferedReader(new InputStreamReader
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3089
                                        (System.in))).readLine();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3090
            if (collator.compare(reply, "") == 0 ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3091
                collator.compare(reply, rb.getString("n")) == 0 ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3092
                collator.compare(reply, rb.getString("no")) == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3093
                reply = "NO";
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3094
            } else if (collator.compare(reply, rb.getString("y")) == 0 ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3095
                       collator.compare(reply, rb.getString("yes")) == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3096
                reply = "YES";
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3097
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3098
                System.err.println(rb.getString("Wrong answer, try again"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3099
                reply = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3100
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3101
        } while (reply == null);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3102
        return reply;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3103
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3104
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3105
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3106
     * Returns the keystore with the configured CA certificates.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3107
     */
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2293
diff changeset
  3108
    public static KeyStore getCacertsKeyStore()
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3109
        throws Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3110
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3111
        String sep = File.separator;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3112
        File file = new File(System.getProperty("java.home") + sep
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3113
                             + "lib" + sep + "security" + sep
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3114
                             + "cacerts");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3115
        if (!file.exists()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3116
            return null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3117
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3118
        FileInputStream fis = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3119
        KeyStore caks = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3120
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3121
            fis = new FileInputStream(file);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3122
            caks = KeyStore.getInstance(JKS);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3123
            caks.load(fis, null);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3124
        } finally {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3125
            if (fis != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3126
                fis.close();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3127
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3128
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3129
        return caks;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3130
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3131
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3132
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3133
     * Stores the (leaf) certificates of a keystore in a hashtable.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3134
     * All certs belonging to the same CA are stored in a vector that
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3135
     * in turn is stored in the hashtable, keyed by the CA's subject DN
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3136
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3137
    private void keystorecerts2Hashtable(KeyStore ks,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3138
                Hashtable<Principal, Vector<Certificate>> hash)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3139
        throws Exception {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3140
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3141
        for (Enumeration<String> aliases = ks.aliases();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3142
                                        aliases.hasMoreElements(); ) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3143
            String alias = aliases.nextElement();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3144
            Certificate cert = ks.getCertificate(alias);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3145
            if (cert != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3146
                Principal subjectDN = ((X509Certificate)cert).getSubjectDN();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3147
                Vector<Certificate> vec = hash.get(subjectDN);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3148
                if (vec == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3149
                    vec = new Vector<Certificate>();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3150
                    vec.addElement(cert);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3151
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3152
                    if (!vec.contains(cert)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3153
                        vec.addElement(cert);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3154
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3155
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3156
                hash.put(subjectDN, vec);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3157
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3158
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3159
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3160
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3161
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3162
     * Returns the issue time that's specified the -startdate option
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3163
     * @param s the value of -startdate option
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3164
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3165
    private static Date getStartDate(String s) throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3166
        Calendar c = new GregorianCalendar();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3167
        if (s != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3168
            IOException ioe = new IOException(
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3169
                    rb.getString("Illegal startdate value"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3170
            int len = s.length();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3171
            if (len == 0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3172
                throw ioe;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3173
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3174
            if (s.charAt(0) == '-' || s.charAt(0) == '+') {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3175
                // Form 1: ([+-]nnn[ymdHMS])+
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3176
                int start = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3177
                while (start < len) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3178
                    int sign = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3179
                    switch (s.charAt(start)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3180
                        case '+': sign = 1; break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3181
                        case '-': sign = -1; break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3182
                        default: throw ioe;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3183
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3184
                    int i = start+1;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3185
                    for (; i<len; i++) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3186
                        char ch = s.charAt(i);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3187
                        if (ch < '0' || ch > '9') break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3188
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3189
                    if (i == start+1) throw ioe;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3190
                    int number = Integer.parseInt(s.substring(start+1, i));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3191
                    if (i >= len) throw ioe;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3192
                    int unit = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3193
                    switch (s.charAt(i)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3194
                        case 'y': unit = Calendar.YEAR; break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3195
                        case 'm': unit = Calendar.MONTH; break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3196
                        case 'd': unit = Calendar.DATE; break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3197
                        case 'H': unit = Calendar.HOUR; break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3198
                        case 'M': unit = Calendar.MINUTE; break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3199
                        case 'S': unit = Calendar.SECOND; break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3200
                        default: throw ioe;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3201
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3202
                    c.add(unit, sign * number);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3203
                    start = i + 1;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3204
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3205
            } else  {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3206
                // Form 2: [yyyy/mm/dd] [HH:MM:SS]
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3207
                String date = null, time = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3208
                if (len == 19) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3209
                    date = s.substring(0, 10);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3210
                    time = s.substring(11);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3211
                    if (s.charAt(10) != ' ')
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3212
                        throw ioe;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3213
                } else if (len == 10) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3214
                    date = s;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3215
                } else if (len == 8) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3216
                    time = s;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3217
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3218
                    throw ioe;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3219
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3220
                if (date != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3221
                    if (date.matches("\\d\\d\\d\\d\\/\\d\\d\\/\\d\\d")) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3222
                        c.set(Integer.valueOf(date.substring(0, 4)),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3223
                                Integer.valueOf(date.substring(5, 7))-1,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3224
                                Integer.valueOf(date.substring(8, 10)));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3225
                    } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3226
                        throw ioe;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3227
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3228
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3229
                if (time != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3230
                    if (time.matches("\\d\\d:\\d\\d:\\d\\d")) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3231
                        c.set(Calendar.HOUR_OF_DAY, Integer.valueOf(time.substring(0, 2)));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3232
                        c.set(Calendar.MINUTE, Integer.valueOf(time.substring(0, 2)));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3233
                        c.set(Calendar.SECOND, Integer.valueOf(time.substring(0, 2)));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3234
                        c.set(Calendar.MILLISECOND, 0);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3235
                    } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3236
                        throw ioe;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3237
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3238
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3239
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3240
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3241
        return c.getTime();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3242
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3243
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3244
    /**
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3245
     * Match a command (may be abbreviated) with a command set.
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3246
     * @param s the command provided
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3247
     * @param list the legal command set
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3248
     * @return the position of a single match, or -1 if none matched
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3249
     * @throws Exception if s is ambiguous
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3250
     */
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3251
    private static int oneOf(String s, String... list) throws Exception {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3252
        int[] match = new int[list.length];
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3253
        int nmatch = 0;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3254
        for (int i = 0; i<list.length; i++) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3255
            String one = list[i];
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3256
            if (one.toLowerCase().startsWith(s.toLowerCase())) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3257
                match[nmatch++] = i;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3258
            } else {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3259
                StringBuffer sb = new StringBuffer();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3260
                boolean first = true;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3261
                for (char c: one.toCharArray()) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3262
                    if (first) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3263
                        sb.append(c);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3264
                        first = false;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3265
                    } else {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3266
                        if (!Character.isLowerCase(c)) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3267
                            sb.append(c);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3268
                        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3269
                    }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3270
                }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3271
                if (sb.toString().equalsIgnoreCase(s)) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3272
                    match[nmatch++] = i;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3273
                }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3274
            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3275
        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3276
        if (nmatch == 0) return -1;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3277
        if (nmatch == 1) return match[0];
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3278
        StringBuffer sb = new StringBuffer();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3279
        MessageFormat form = new MessageFormat(rb.getString
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3280
            ("command {0} is ambiguous:"));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3281
        Object[] source = {s};
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3282
        sb.append(form.format(source) +"\n    ");
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3283
        for (int i=0; i<nmatch; i++) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3284
            sb.append(" " + list[match[i]]);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3285
        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3286
        throw new Exception(sb.toString());
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3287
    }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3288
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3289
    /**
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3290
     * Create a GeneralName object from known types
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3291
     * @param t one of 5 known types
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3292
     * @param v value
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3293
     * @return which one
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3294
     */
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3295
    private GeneralName createGeneralName(String t, String v)
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3296
            throws Exception {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3297
        GeneralNameInterface gn;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3298
        int p = oneOf(t, "EMAIL", "URI", "DNS", "IP", "OID");
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3299
        if (p < 0) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3300
            throw new Exception(rb.getString(
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3301
                    "Unrecognized GeneralName type: ") + t);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3302
        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3303
        switch (p) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3304
            case 0: gn = new RFC822Name(v); break;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3305
            case 1: gn = new URIName(v); break;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3306
            case 2: gn = new DNSName(v); break;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3307
            case 3: gn = new IPAddressName(v); break;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3308
            default: gn = new OIDName(v); break; //4
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3309
        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3310
        return new GeneralName(gn);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3311
    }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3312
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3313
    private static final String[] extSupported = {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3314
                        "BasicConstraints",
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3315
                        "KeyUsage",
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3316
                        "ExtendedKeyUsage",
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3317
                        "SubjectAlternativeName",
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3318
                        "IssuerAlternativeName",
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3319
                        "SubjectInfoAccess",
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3320
                        "AuthorityInfoAccess",
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3321
    };
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3322
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3323
    private ObjectIdentifier findOidForExtName(String type)
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3324
            throws Exception {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3325
        switch (oneOf(type, extSupported)) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3326
            case 0: return PKIXExtensions.BasicConstraints_Id;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3327
            case 1: return PKIXExtensions.KeyUsage_Id;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3328
            case 2: return PKIXExtensions.ExtendedKeyUsage_Id;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3329
            case 3: return PKIXExtensions.SubjectAlternativeName_Id;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3330
            case 4: return PKIXExtensions.IssuerAlternativeName_Id;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3331
            case 5: return PKIXExtensions.SubjectInfoAccess_Id;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3332
            case 6: return PKIXExtensions.AuthInfoAccess_Id;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3333
            default: return new ObjectIdentifier(type);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3334
        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3335
    }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3336
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3337
    /**
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3338
     * Create X509v3 extensions from a string representation. Note that the
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3339
     * SubjectKeyIdentifierExtension will always be created non-critical besides
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3340
     * the extension requested in the <code>extstr</code> argument.
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3341
     *
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3342
     * @param reqex the requested extensions, can be null, used for -gencert
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3343
     * @param ext the original extensions, can be null, used for -selfcert
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3344
     * @param extstrs -ext values, Read keytool doc
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3345
     * @param pkey the public key for the certificate
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3346
     * @param akey the public key for the authority (issuer)
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3347
     * @return the created CertificateExtensions
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3348
     */
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3349
    private CertificateExtensions createV3Extensions(
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3350
            CertificateExtensions reqex,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3351
            CertificateExtensions ext,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3352
            List <String> extstrs,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3353
            PublicKey pkey,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3354
            PublicKey akey) throws Exception {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3355
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3356
        if (ext != null && reqex != null) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3357
            // This should not happen
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3358
            throw new Exception("One of request and original should be null.");
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3359
        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3360
        if (ext == null) ext = new CertificateExtensions();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3361
        try {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3362
            // name{:critical}{=value}
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3363
            // Honoring requested extensions
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3364
            if (reqex != null) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3365
                for(String extstr: extstrs) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3366
                    if (extstr.toLowerCase().startsWith("honored=")) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3367
                        List<String> list = Arrays.asList(
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3368
                                extstr.toLowerCase().substring(8).split(","));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3369
                        // First check existence of "all"
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3370
                        if (list.contains("all")) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3371
                            ext = reqex;    // we know ext was null
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3372
                        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3373
                        // one by one for others
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3374
                        for (String item: list) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3375
                            if (item.equals("all")) continue;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3376
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3377
                            // add or remove
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3378
                            boolean add = true;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3379
                            // -1, unchanged, 0 crtical, 1 non-critical
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3380
                            int action = -1;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3381
                            String type = null;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3382
                            if (item.startsWith("-")) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3383
                                add = false;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3384
                                type = item.substring(1);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3385
                            } else {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3386
                                int colonpos = item.indexOf(':');
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3387
                                if (colonpos >= 0) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3388
                                    type = item.substring(0, colonpos);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3389
                                    action = oneOf(item.substring(colonpos+1),
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3390
                                            "critical", "non-critical");
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3391
                                    if (action == -1) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3392
                                        throw new Exception(rb.getString
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3393
                                            ("Illegal value: ") + item);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3394
                                    }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3395
                                }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3396
                            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3397
                            String n = reqex.getNameByOid(findOidForExtName(type));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3398
                            if (add) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3399
                                Extension e = (Extension)reqex.get(n);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3400
                                if (!e.isCritical() && action == 0
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3401
                                        || e.isCritical() && action == 1) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3402
                                    e = Extension.newExtension(
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3403
                                            e.getExtensionId(),
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3404
                                            !e.isCritical(),
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3405
                                            e.getExtensionValue());
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3406
                                    ext.set(n, e);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3407
                                }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3408
                            } else {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3409
                                ext.delete(n);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3410
                            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3411
                        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3412
                        break;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3413
                    }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3414
                }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3415
            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3416
            for(String extstr: extstrs) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3417
                String name, value;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3418
                boolean isCritical = false;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3419
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3420
                int eqpos = extstr.indexOf('=');
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3421
                if (eqpos >= 0) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3422
                    name = extstr.substring(0, eqpos);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3423
                    value = extstr.substring(eqpos+1);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3424
                } else {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3425
                    name = extstr;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3426
                    value = null;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3427
                }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3428
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3429
                int colonpos = name.indexOf(':');
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3430
                if (colonpos >= 0) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3431
                    if (name.substring(colonpos+1).equalsIgnoreCase("critical")) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3432
                        isCritical = true;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3433
                    }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3434
                    name = name.substring(0, colonpos);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3435
                }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3436
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3437
                if (name.equalsIgnoreCase("honored")) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3438
                    continue;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3439
                }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3440
                int exttype = oneOf(name, extSupported);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3441
                switch (exttype) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3442
                    case 0:     // BC
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3443
                        int pathLen = -1;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3444
                        boolean isCA = false;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3445
                        if (value == null) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3446
                            isCA = true;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3447
                        } else {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3448
                            try {   // the abbr format
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3449
                                pathLen = Integer.parseInt(value);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3450
                                isCA = true;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3451
                            } catch (NumberFormatException ufe) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3452
                                // ca:true,pathlen:1
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3453
                                for (String part: value.split(",")) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3454
                                    String[] nv = part.split(":");
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3455
                                    if (nv.length != 2) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3456
                                        throw new Exception(rb.getString
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3457
                                                ("Illegal value: ") + extstr);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3458
                                    } else {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3459
                                        if (nv[0].equalsIgnoreCase("ca")) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3460
                                            isCA = Boolean.parseBoolean(nv[1]);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3461
                                        } else if (nv[0].equalsIgnoreCase("pathlen")) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3462
                                            pathLen = Integer.parseInt(nv[1]);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3463
                                        } else {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3464
                                            throw new Exception(rb.getString
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3465
                                                ("Illegal value: ") + extstr);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3466
                                        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3467
                                    }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3468
                                }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3469
                            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3470
                        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3471
                        ext.set(BasicConstraintsExtension.NAME,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3472
                                new BasicConstraintsExtension(isCritical, isCA,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3473
                                pathLen));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3474
                        break;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3475
                    case 1:     // KU
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3476
                        if(value != null) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3477
                            boolean[] ok = new boolean[9];
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3478
                            for (String s: value.split(",")) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3479
                                int p = oneOf(s,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3480
                                       "digitalSignature",  // (0),
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3481
                                       "nonRepudiation",    // (1)
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3482
                                       "keyEncipherment",   // (2),
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3483
                                       "dataEncipherment",  // (3),
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3484
                                       "keyAgreement",      // (4),
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3485
                                       "keyCertSign",       // (5),
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3486
                                       "cRLSign",           // (6),
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3487
                                       "encipherOnly",      // (7),
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3488
                                       "decipherOnly",      // (8)
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3489
                                       "contentCommitment"  // also (1)
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3490
                                       );
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3491
                                if (p < 0) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3492
                                    throw new Exception(rb.getString("Unknown keyUsage type: ") + s);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3493
                                }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3494
                                if (p == 9) p = 1;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3495
                                ok[p] = true;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3496
                            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3497
                            KeyUsageExtension kue = new KeyUsageExtension(ok);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3498
                            // The above KeyUsageExtension constructor does not
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3499
                            // allow isCritical value, so...
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3500
                            ext.set(KeyUsageExtension.NAME, Extension.newExtension(
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3501
                                    kue.getExtensionId(),
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3502
                                    isCritical,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3503
                                    kue.getExtensionValue()));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3504
                        } else {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3505
                            throw new Exception(rb.getString
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3506
                                    ("Illegal value: ") + extstr);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3507
                        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3508
                        break;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3509
                    case 2:     // EKU
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3510
                        if(value != null) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3511
                            Vector <ObjectIdentifier> v =
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3512
                                    new Vector <ObjectIdentifier>();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3513
                            for (String s: value.split(",")) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3514
                                int p = oneOf(s,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3515
                                        "anyExtendedKeyUsage",
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3516
                                        "serverAuth",       //1
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3517
                                        "clientAuth",       //2
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3518
                                        "codeSigning",      //3
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3519
                                        "emailProtection",  //4
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3520
                                        "",                 //5
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3521
                                        "",                 //6
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3522
                                        "",                 //7
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3523
                                        "timeStamping",     //8
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3524
                                        "OCSPSigning"       //9
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3525
                                       );
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3526
                                if (p < 0) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3527
                                    try {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3528
                                        v.add(new ObjectIdentifier(s));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3529
                                    } catch (Exception e) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3530
                                        throw new Exception(rb.getString(
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3531
                                                "Unknown extendedkeyUsage type: ") + s);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3532
                                    }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3533
                                } else if (p == 0) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3534
                                    v.add(new ObjectIdentifier("2.5.29.37.0"));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3535
                                } else {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3536
                                    v.add(new ObjectIdentifier("1.3.6.1.5.5.7.3." + p));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3537
                                }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3538
                            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3539
                            ext.set(ExtendedKeyUsageExtension.NAME,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3540
                                    new ExtendedKeyUsageExtension(isCritical, v));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3541
                        } else {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3542
                            throw new Exception(rb.getString
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3543
                                    ("Illegal value: ") + extstr);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3544
                        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3545
                        break;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3546
                    case 3:     // SAN
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3547
                    case 4:     // IAN
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3548
                        if(value != null) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3549
                            String[] ps = value.split(",");
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3550
                            GeneralNames gnames = new GeneralNames();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3551
                            for(String item: ps) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3552
                                colonpos = item.indexOf(':');
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3553
                                if (colonpos < 0) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3554
                                    throw new Exception("Illegal item " + item + " in " + extstr);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3555
                                }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3556
                                String t = item.substring(0, colonpos);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3557
                                String v = item.substring(colonpos+1);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3558
                                gnames.add(createGeneralName(t, v));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3559
                            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3560
                            if (exttype == 3) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3561
                                ext.set(SubjectAlternativeNameExtension.NAME,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3562
                                        new SubjectAlternativeNameExtension(
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3563
                                            isCritical, gnames));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3564
                            } else {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3565
                                ext.set(IssuerAlternativeNameExtension.NAME,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3566
                                        new IssuerAlternativeNameExtension(
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3567
                                            isCritical, gnames));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3568
                            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3569
                        } else {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3570
                            throw new Exception(rb.getString
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3571
                                    ("Illegal value: ") + extstr);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3572
                        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3573
                        break;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3574
                    case 5:     // SIA, always non-critical
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3575
                    case 6:     // AIA, always non-critical
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3576
                        if (isCritical) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3577
                            throw new Exception(rb.getString(
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3578
                                    "This extension cannot be marked as critical. ") + extstr);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3579
                        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3580
                        if(value != null) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3581
                            List<AccessDescription> accessDescriptions =
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3582
                                    new ArrayList<AccessDescription>();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3583
                            String[] ps = value.split(",");
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3584
                            for(String item: ps) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3585
                                colonpos = item.indexOf(':');
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3586
                                int colonpos2 = item.indexOf(':', colonpos+1);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3587
                                if (colonpos < 0 || colonpos2 < 0) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3588
                                    throw new Exception(rb.getString
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3589
                                            ("Illegal value: ") + extstr);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3590
                                }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3591
                                String m = item.substring(0, colonpos);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3592
                                String t = item.substring(colonpos+1, colonpos2);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3593
                                String v = item.substring(colonpos2+1);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3594
                                int p = oneOf(m,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3595
                                        "",
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3596
                                        "ocsp",         //1
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3597
                                        "caIssuers",    //2
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3598
                                        "timeStamping", //3
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3599
                                        "",
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3600
                                        "caRepository"  //5
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3601
                                        );
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3602
                                ObjectIdentifier oid;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3603
                                if (p < 0) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3604
                                    try {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3605
                                        oid = new ObjectIdentifier(m);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3606
                                    } catch (Exception e) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3607
                                        throw new Exception(rb.getString(
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3608
                                                "Unknown AccessDescription type: ") + m);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3609
                                    }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3610
                                } else {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3611
                                    oid = new ObjectIdentifier("1.3.6.1.5.5.7.48." + p);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3612
                                }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3613
                                accessDescriptions.add(new AccessDescription(
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3614
                                        oid, createGeneralName(t, v)));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3615
                            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3616
                            if (exttype == 5) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3617
                                ext.set(SubjectInfoAccessExtension.NAME,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3618
                                        new SubjectInfoAccessExtension(accessDescriptions));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3619
                            } else {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3620
                                ext.set(AuthorityInfoAccessExtension.NAME,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3621
                                        new AuthorityInfoAccessExtension(accessDescriptions));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3622
                            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3623
                        } else {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3624
                            throw new Exception(rb.getString
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3625
                                    ("Illegal value: ") + extstr);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3626
                        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3627
                        break;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3628
                    case -1:
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3629
                        ObjectIdentifier oid = new ObjectIdentifier(name);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3630
                        byte[] data = null;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3631
                        if (value != null) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3632
                            data = new byte[value.length() / 2 + 1];
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3633
                            int pos = 0;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3634
                            for (char c: value.toCharArray()) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3635
                                int hex;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3636
                                if (c >= '0' && c <= '9') {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3637
                                    hex = c - '0' ;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3638
                                } else if (c >= 'A' && c <= 'F') {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3639
                                    hex = c - 'A' + 10;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3640
                                } else if (c >= 'a' && c <= 'f') {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3641
                                    hex = c - 'a' + 10;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3642
                                } else {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3643
                                    continue;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3644
                                }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3645
                                if (pos % 2 == 0) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3646
                                    data[pos/2] = (byte)(hex << 4);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3647
                                } else {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3648
                                    data[pos/2] += hex;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3649
                                }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3650
                                pos++;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3651
                            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3652
                            if (pos % 2 != 0) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3653
                                throw new Exception(rb.getString(
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3654
                                        "Odd number of hex digits found: ") + extstr);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3655
                            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3656
                            data = Arrays.copyOf(data, pos/2);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3657
                        } else {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3658
                            data = new byte[0];
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3659
                        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3660
                        ext.set(oid.toString(), new Extension(oid, isCritical,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3661
                                new DerValue(DerValue.tag_OctetString, data)
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3662
                                        .toByteArray()));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3663
                        break;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3664
                }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3665
            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3666
            // always non-critical
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3667
            ext.set(SubjectKeyIdentifierExtension.NAME,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3668
                    new SubjectKeyIdentifierExtension(
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3669
                        new KeyIdentifier(pkey).getIdentifier()));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3670
            if (akey != null && !pkey.equals(akey)) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3671
                ext.set(AuthorityKeyIdentifierExtension.NAME,
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3672
                        new AuthorityKeyIdentifierExtension(
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3673
                        new KeyIdentifier(akey), null, null));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3674
            }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3675
        } catch(IOException e) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3676
            throw new RuntimeException(e);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3677
        }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3678
        return ext;
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3679
    }
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3680
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3681
    /**
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3682
     * Prints the usage of this tool.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3683
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3684
    private void usage() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3685
        System.err.println(rb.getString("keytool usage:\n"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3686
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3687
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3688
                ("-certreq     [-v] [-protected]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3689
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3690
                ("\t     [-alias <alias>] [-sigalg <sigalg>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3691
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3692
                ("\t     [-file <csr_file>] [-keypass <keypass>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3693
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3694
                ("\t     [-keystore <keystore>] [-storepass <storepass>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3695
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3696
                ("\t     [-storetype <storetype>] [-providername <name>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3697
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3698
                ("\t     [-providerclass <provider_class_name> [-providerarg <arg>]] ..."));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3699
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3700
                ("\t     [-providerpath <pathlist>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3701
        System.err.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3702
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3703
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3704
                ("-changealias [-v] [-protected] -alias <alias> -destalias <destalias>"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3705
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3706
                ("\t     [-keypass <keypass>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3707
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3708
                ("\t     [-keystore <keystore>] [-storepass <storepass>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3709
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3710
                ("\t     [-storetype <storetype>] [-providername <name>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3711
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3712
                ("\t     [-providerclass <provider_class_name> [-providerarg <arg>]] ..."));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3713
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3714
                ("\t     [-providerpath <pathlist>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3715
        System.err.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3716
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3717
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3718
                ("-delete      [-v] [-protected] -alias <alias>"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3719
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3720
                ("\t     [-keystore <keystore>] [-storepass <storepass>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3721
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3722
                ("\t     [-storetype <storetype>] [-providername <name>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3723
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3724
                ("\t     [-providerclass <provider_class_name> [-providerarg <arg>]] ..."));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3725
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3726
                ("\t     [-providerpath <pathlist>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3727
        System.err.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3728
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3729
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3730
                ("-exportcert  [-v] [-rfc] [-protected]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3731
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3732
                ("\t     [-alias <alias>] [-file <cert_file>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3733
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3734
                ("\t     [-keystore <keystore>] [-storepass <storepass>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3735
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3736
                ("\t     [-storetype <storetype>] [-providername <name>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3737
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3738
                ("\t     [-providerclass <provider_class_name> [-providerarg <arg>]] ..."));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3739
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3740
                ("\t     [-providerpath <pathlist>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3741
        System.err.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3742
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3743
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3744
                ("-genkeypair  [-v] [-protected]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3745
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3746
                ("\t     [-alias <alias>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3747
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3748
                ("\t     [-keyalg <keyalg>] [-keysize <keysize>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3749
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3750
                ("\t     [-sigalg <sigalg>] [-dname <dname>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3751
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3752
                ("\t     [-startdate <startdate>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3753
        System.err.println(rb.getString
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3754
                ("\t     [-ext <key>[:critical][=<value>]]..."));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3755
        System.err.println(rb.getString
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3756
                ("\t     [-validity <valDays>] [-keypass <keypass>]"));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3757
        System.err.println(rb.getString
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3758
                ("\t     [-keystore <keystore>] [-storepass <storepass>]"));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3759
        System.err.println(rb.getString
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3760
                ("\t     [-storetype <storetype>] [-providername <name>]"));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3761
        System.err.println(rb.getString
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3762
                ("\t     [-providerclass <provider_class_name> [-providerarg <arg>]] ..."));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3763
        System.err.println(rb.getString
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3764
                ("\t     [-providerpath <pathlist>]"));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3765
        System.err.println();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3766
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3767
        System.err.println(rb.getString
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3768
                ("-gencert     [-v] [-rfc] [-protected]"));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3769
        System.err.println(rb.getString
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3770
                ("\t     [-infile <infile>] [-outfile <outfile>]"));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3771
        System.err.println(rb.getString
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3772
                ("\t     [-alias <alias>]"));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3773
        System.err.println(rb.getString
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3774
                ("\t     [-sigalg <sigalg>]"));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3775
        System.err.println(rb.getString
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3776
                ("\t     [-startdate <startdate>]"));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3777
        System.err.println(rb.getString
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3778
                ("\t     [-ext <key>[:critical][=<value>]]..."));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3779
        System.err.println(rb.getString
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3780
                ("\t     [-validity <valDays>] [-keypass <keypass>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3781
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3782
                ("\t     [-keystore <keystore>] [-storepass <storepass>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3783
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3784
                ("\t     [-storetype <storetype>] [-providername <name>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3785
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3786
                ("\t     [-providerclass <provider_class_name> [-providerarg <arg>]] ..."));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3787
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3788
                ("\t     [-providerpath <pathlist>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3789
        System.err.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3790
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3791
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3792
                ("-genseckey   [-v] [-protected]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3793
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3794
                ("\t     [-alias <alias>] [-keypass <keypass>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3795
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3796
                ("\t     [-keyalg <keyalg>] [-keysize <keysize>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3797
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3798
                ("\t     [-keystore <keystore>] [-storepass <storepass>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3799
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3800
                ("\t     [-storetype <storetype>] [-providername <name>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3801
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3802
                ("\t     [-providerclass <provider_class_name> [-providerarg <arg>]] ..."));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3803
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3804
                ("\t     [-providerpath <pathlist>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3805
        System.err.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3806
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3807
        System.err.println(rb.getString("-help"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3808
        System.err.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3809
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3810
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3811
                ("-importcert  [-v] [-noprompt] [-trustcacerts] [-protected]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3812
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3813
                ("\t     [-alias <alias>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3814
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3815
                ("\t     [-file <cert_file>] [-keypass <keypass>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3816
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3817
                ("\t     [-keystore <keystore>] [-storepass <storepass>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3818
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3819
                ("\t     [-storetype <storetype>] [-providername <name>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3820
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3821
                ("\t     [-providerclass <provider_class_name> [-providerarg <arg>]] ..."));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3822
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3823
                ("\t     [-providerpath <pathlist>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3824
        System.err.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3825
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3826
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3827
                ("-importkeystore [-v] "));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3828
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3829
                ("\t     [-srckeystore <srckeystore>] [-destkeystore <destkeystore>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3830
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3831
                ("\t     [-srcstoretype <srcstoretype>] [-deststoretype <deststoretype>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3832
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3833
                ("\t     [-srcstorepass <srcstorepass>] [-deststorepass <deststorepass>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3834
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3835
                ("\t     [-srcprotected] [-destprotected]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3836
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3837
                ("\t     [-srcprovidername <srcprovidername>]\n\t     [-destprovidername <destprovidername>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3838
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3839
                ("\t     [-srcalias <srcalias> [-destalias <destalias>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3840
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3841
                ("\t       [-srckeypass <srckeypass>] [-destkeypass <destkeypass>]]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3842
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3843
                ("\t     [-noprompt]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3844
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3845
                ("\t     [-providerclass <provider_class_name> [-providerarg <arg>]] ..."));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3846
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3847
                ("\t     [-providerpath <pathlist>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3848
        System.err.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3849
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3850
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3851
                ("-keypasswd   [-v] [-alias <alias>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3852
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3853
                ("\t     [-keypass <old_keypass>] [-new <new_keypass>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3854
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3855
                ("\t     [-keystore <keystore>] [-storepass <storepass>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3856
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3857
                ("\t     [-storetype <storetype>] [-providername <name>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3858
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3859
                ("\t     [-providerclass <provider_class_name> [-providerarg <arg>]] ..."));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3860
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3861
                ("\t     [-providerpath <pathlist>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3862
        System.err.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3863
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3864
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3865
                ("-list        [-v | -rfc] [-protected]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3866
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3867
                ("\t     [-alias <alias>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3868
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3869
                ("\t     [-keystore <keystore>] [-storepass <storepass>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3870
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3871
                ("\t     [-storetype <storetype>] [-providername <name>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3872
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3873
                ("\t     [-providerclass <provider_class_name> [-providerarg <arg>]] ..."));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3874
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3875
                ("\t     [-providerpath <pathlist>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3876
        System.err.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3877
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3878
        System.err.println(rb.getString
904
eadc9fa4b700 6480981: keytool should be able to import certificates from remote SSL servers
weijun
parents: 2
diff changeset
  3879
                ("-printcert   [-v] [-rfc] [-file <cert_file> | -sslserver <host[:port]>]"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3880
        System.err.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3881
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3882
        System.err.println(rb.getString
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3883
                ("-printcertreq   [-v] [-file <cert_file>]"));
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3884
        System.err.println();
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3885
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3886
        System.err.println(rb.getString
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3887
                ("-storepasswd [-v] [-new <new_storepass>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3888
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3889
                ("\t     [-keystore <keystore>] [-storepass <storepass>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3890
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3891
                ("\t     [-storetype <storetype>] [-providername <name>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3892
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3893
                ("\t     [-providerclass <provider_class_name> [-providerarg <arg>]] ..."));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3894
        System.err.println(rb.getString
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3895
                ("\t     [-providerpath <pathlist>]"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3896
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3897
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3898
    private void tinyHelp() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3899
        System.err.println(rb.getString("Try keytool -help"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3900
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3901
        // do not drown user with the help lines.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3902
        if (debug) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3903
            throw new RuntimeException("NO BIG ERROR, SORRY");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3904
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3905
            System.exit(1);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3906
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3907
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3908
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3909
    private void errorNeedArgument(String flag) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3910
        Object[] source = {flag};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3911
        System.err.println(new MessageFormat(
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3912
                rb.getString("Command option <flag> needs an argument.")).format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3913
        tinyHelp();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3914
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3915
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3916
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3917
// This class is exactly the same as com.sun.tools.javac.util.Pair,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3918
// it's copied here since the original one is not included in JRE.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3919
class Pair<A, B> {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3920
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3921
    public final A fst;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3922
    public final B snd;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3923
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3924
    public Pair(A fst, B snd) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3925
        this.fst = fst;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3926
        this.snd = snd;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3927
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3928
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3929
    public String toString() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3930
        return "Pair[" + fst + "," + snd + "]";
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3931
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3932
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3933
    private static boolean equals(Object x, Object y) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3934
        return (x == null && y == null) || (x != null && x.equals(y));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3935
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3936
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3937
    public boolean equals(Object other) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3938
        return
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3939
            other instanceof Pair &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3940
            equals(fst, ((Pair)other).fst) &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3941
            equals(snd, ((Pair)other).snd);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3942
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3943
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3944
    public int hashCode() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3945
        if (fst == null) return (snd == null) ? 0 : snd.hashCode() + 1;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3946
        else if (snd == null) return fst.hashCode() + 2;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3947
        else return fst.hashCode() * 17 + snd.hashCode();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3948
    }
2067
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3949
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3950
    public static <A,B> Pair<A,B> of(A a, B b) {
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3951
        return new Pair<A,B>(a,b);
6f9db5f305cd 6780416: New keytool commands/options: -gencert, -printcertreq, -ext
weijun
parents: 909
diff changeset
  3952
    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  3953
}