jdk/src/jdk.crypto.mscapi/windows/classes/sun/security/mscapi/KeyStore.java
author igerasim
Mon, 15 Aug 2016 23:45:32 +0300
changeset 40389 c6df8bba0b71
parent 36759 07dc1868fd1e
child 45193 a4c62ccf8688
permissions -rw-r--r--
8163896: Finalizing one key of a KeyPair invalidates the other key Reviewed-by: coffeys, vinnie
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     1
/*
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
     2
 * Copyright (c) 2005, 2016, Oracle and/or its affiliates. All rights reserved.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     3
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
90ce3da70b43 Initial load
duke
parents:
diff changeset
     4
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
     5
 * This code is free software; you can redistribute it and/or modify it
90ce3da70b43 Initial load
duke
parents:
diff changeset
     6
 * under the terms of the GNU General Public License version 2 only, as
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 2
diff changeset
     7
 * published by the Free Software Foundation.  Oracle designates this
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     8
 * particular file as subject to the "Classpath" exception as provided
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 2
diff changeset
     9
 * by Oracle in the LICENSE file that accompanied this code.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    10
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    11
 * This code is distributed in the hope that it will be useful, but WITHOUT
90ce3da70b43 Initial load
duke
parents:
diff changeset
    12
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
90ce3da70b43 Initial load
duke
parents:
diff changeset
    13
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
90ce3da70b43 Initial load
duke
parents:
diff changeset
    14
 * version 2 for more details (a copy is included in the LICENSE file that
90ce3da70b43 Initial load
duke
parents:
diff changeset
    15
 * accompanied this code).
90ce3da70b43 Initial load
duke
parents:
diff changeset
    16
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    17
 * You should have received a copy of the GNU General Public License version
90ce3da70b43 Initial load
duke
parents:
diff changeset
    18
 * 2 along with this work; if not, write to the Free Software Foundation,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    19
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    20
 *
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 2
diff changeset
    21
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 2
diff changeset
    22
 * or visit www.oracle.com if you need additional information or have any
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 2
diff changeset
    23
 * questions.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    24
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    25
90ce3da70b43 Initial load
duke
parents:
diff changeset
    26
package sun.security.mscapi;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    27
90ce3da70b43 Initial load
duke
parents:
diff changeset
    28
import java.io.ByteArrayInputStream;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    29
import java.io.IOException;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    30
import java.io.InputStream;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    31
import java.io.OutputStream;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    32
import java.security.AccessController;
9508
310b4f6c8e61 6732372: Some MSCAPI native methods not returning correct exceptions.
vinnie
parents: 5506
diff changeset
    33
import java.security.InvalidKeyException;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    34
import java.security.KeyStoreSpi;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    35
import java.security.KeyStoreException;
23582
d5fa3327ab3a 8038177: Eliminate unnecessary dependency to sun.security.action
mchung
parents: 10336
diff changeset
    36
import java.security.PrivilegedAction;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    37
import java.security.UnrecoverableKeyException;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    38
import java.security.NoSuchAlgorithmException;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    39
import java.security.SecurityPermission;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    40
import java.security.cert.X509Certificate;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    41
import java.security.cert.Certificate;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    42
import java.security.cert.CertificateException;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    43
import java.security.cert.CertificateFactory;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    44
import java.security.interfaces.RSAPrivateCrtKey;
31264
896105040033 8023546: sun/security/mscapi/ShortRSAKey1024.sh fails intermittently
weijun
parents: 25859
diff changeset
    45
import java.util.*;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    46
90ce3da70b43 Initial load
duke
parents:
diff changeset
    47
/**
90ce3da70b43 Initial load
duke
parents:
diff changeset
    48
 * Implementation of key store for Windows using the Microsoft Crypto API.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    49
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    50
 * @since 1.6
90ce3da70b43 Initial load
duke
parents:
diff changeset
    51
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    52
abstract class KeyStore extends KeyStoreSpi {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    53
90ce3da70b43 Initial load
duke
parents:
diff changeset
    54
    public static final class MY extends KeyStore {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    55
        public MY() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    56
            super("MY");
90ce3da70b43 Initial load
duke
parents:
diff changeset
    57
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
    58
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
    59
90ce3da70b43 Initial load
duke
parents:
diff changeset
    60
    public static final class ROOT extends KeyStore {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    61
        public ROOT() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    62
            super("ROOT");
90ce3da70b43 Initial load
duke
parents:
diff changeset
    63
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
    64
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
    65
90ce3da70b43 Initial load
duke
parents:
diff changeset
    66
    class KeyEntry
90ce3da70b43 Initial load
duke
parents:
diff changeset
    67
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    68
        private Key privateKey;
31538
0981099a3e54 8130022: Use Java-style array declarations consistently
igerasim
parents: 31264
diff changeset
    69
        private X509Certificate[] certChain;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    70
        private String alias;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    71
90ce3da70b43 Initial load
duke
parents:
diff changeset
    72
        KeyEntry(Key key, X509Certificate[] chain) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    73
            this(null, key, chain);
90ce3da70b43 Initial load
duke
parents:
diff changeset
    74
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
    75
90ce3da70b43 Initial load
duke
parents:
diff changeset
    76
        KeyEntry(String alias, Key key, X509Certificate[] chain) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    77
            this.privateKey = key;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    78
            this.certChain = chain;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    79
            /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
    80
             * The default alias for both entry types is derived from a
90ce3da70b43 Initial load
duke
parents:
diff changeset
    81
             * hash value intrinsic to the first certificate in the chain.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    82
             */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    83
             if (alias == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    84
                 this.alias = Integer.toString(chain[0].hashCode());
90ce3da70b43 Initial load
duke
parents:
diff changeset
    85
             } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    86
                 this.alias = alias;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    87
             }
90ce3da70b43 Initial load
duke
parents:
diff changeset
    88
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
    89
90ce3da70b43 Initial load
duke
parents:
diff changeset
    90
        /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
    91
         * Gets the alias for the keystore entry.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    92
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    93
        String getAlias()
90ce3da70b43 Initial load
duke
parents:
diff changeset
    94
        {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    95
            return alias;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    96
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
    97
90ce3da70b43 Initial load
duke
parents:
diff changeset
    98
        /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
    99
         * Sets the alias for the keystore entry.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   100
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   101
        void setAlias(String alias)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   102
        {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   103
            // TODO - set friendly name prop in cert store
90ce3da70b43 Initial load
duke
parents:
diff changeset
   104
            this.alias = alias;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   105
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   106
90ce3da70b43 Initial load
duke
parents:
diff changeset
   107
        /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   108
         * Gets the private key for the keystore entry.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   109
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   110
        Key getPrivateKey()
90ce3da70b43 Initial load
duke
parents:
diff changeset
   111
        {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   112
            return privateKey;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   113
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   114
90ce3da70b43 Initial load
duke
parents:
diff changeset
   115
        /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   116
         * Sets the private key for the keystore entry.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   117
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   118
        void setPrivateKey(RSAPrivateCrtKey key)
9508
310b4f6c8e61 6732372: Some MSCAPI native methods not returning correct exceptions.
vinnie
parents: 5506
diff changeset
   119
            throws InvalidKeyException, KeyStoreException
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   120
        {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   121
            byte[] modulusBytes = key.getModulus().toByteArray();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   122
90ce3da70b43 Initial load
duke
parents:
diff changeset
   123
            // Adjust key length due to sign bit
90ce3da70b43 Initial load
duke
parents:
diff changeset
   124
            int keyBitLength = (modulusBytes[0] == 0)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   125
                ? (modulusBytes.length - 1) * 8
90ce3da70b43 Initial load
duke
parents:
diff changeset
   126
                : modulusBytes.length * 8;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   127
90ce3da70b43 Initial load
duke
parents:
diff changeset
   128
            byte[] keyBlob = generatePrivateKeyBlob(
90ce3da70b43 Initial load
duke
parents:
diff changeset
   129
                keyBitLength,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   130
                modulusBytes,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   131
                key.getPublicExponent().toByteArray(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   132
                key.getPrivateExponent().toByteArray(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   133
                key.getPrimeP().toByteArray(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   134
                key.getPrimeQ().toByteArray(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   135
                key.getPrimeExponentP().toByteArray(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   136
                key.getPrimeExponentQ().toByteArray(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   137
                key.getCrtCoefficient().toByteArray());
90ce3da70b43 Initial load
duke
parents:
diff changeset
   138
31264
896105040033 8023546: sun/security/mscapi/ShortRSAKey1024.sh fails intermittently
weijun
parents: 25859
diff changeset
   139
            privateKey = storePrivateKey(Objects.requireNonNull(keyBlob),
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   140
                "{" + UUID.randomUUID().toString() + "}", keyBitLength);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   141
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   142
90ce3da70b43 Initial load
duke
parents:
diff changeset
   143
        /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   144
         * Gets the certificate chain for the keystore entry.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   145
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   146
        X509Certificate[] getCertificateChain()
90ce3da70b43 Initial load
duke
parents:
diff changeset
   147
        {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   148
            return certChain;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   149
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   150
90ce3da70b43 Initial load
duke
parents:
diff changeset
   151
        /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   152
         * Sets the certificate chain for the keystore entry.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   153
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   154
        void setCertificateChain(X509Certificate[] chain)
9508
310b4f6c8e61 6732372: Some MSCAPI native methods not returning correct exceptions.
vinnie
parents: 5506
diff changeset
   155
            throws CertificateException, KeyStoreException
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   156
        {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   157
            for (int i = 0; i < chain.length; i++) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   158
                byte[] encoding = chain[i].getEncoded();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   159
                if (i == 0 && privateKey != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   160
                    storeCertificate(getName(), alias, encoding,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   161
                        encoding.length, privateKey.getHCryptProvider(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   162
                        privateKey.getHCryptKey());
90ce3da70b43 Initial load
duke
parents:
diff changeset
   163
90ce3da70b43 Initial load
duke
parents:
diff changeset
   164
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   165
                    storeCertificate(getName(), alias, encoding,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   166
                        encoding.length, 0L, 0L); // no private key to attach
90ce3da70b43 Initial load
duke
parents:
diff changeset
   167
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   168
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   169
            certChain = chain;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   170
        }
40389
c6df8bba0b71 8163896: Finalizing one key of a KeyPair invalidates the other key
igerasim
parents: 36759
diff changeset
   171
    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   172
90ce3da70b43 Initial load
duke
parents:
diff changeset
   173
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   174
     * An X.509 certificate factory.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   175
     * Used to create an X.509 certificate from its DER-encoding.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   176
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   177
    private CertificateFactory certificateFactory = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   178
90ce3da70b43 Initial load
duke
parents:
diff changeset
   179
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   180
     * Compatibility mode: for applications that assume keystores are
90ce3da70b43 Initial load
duke
parents:
diff changeset
   181
     * stream-based this mode tolerates (but ignores) a non-null stream
90ce3da70b43 Initial load
duke
parents:
diff changeset
   182
     * or password parameter when passed to the load or store methods.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   183
     * The mode is enabled by default.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   184
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   185
    private static final String KEYSTORE_COMPATIBILITY_MODE_PROP =
90ce3da70b43 Initial load
duke
parents:
diff changeset
   186
        "sun.security.mscapi.keyStoreCompatibilityMode";
90ce3da70b43 Initial load
duke
parents:
diff changeset
   187
    private final boolean keyStoreCompatibilityMode;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   188
90ce3da70b43 Initial load
duke
parents:
diff changeset
   189
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   190
     * The keystore entries.
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   191
     * Keys in the map are unique aliases (thus can differ from
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   192
     * KeyEntry.getAlias())
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   193
     */
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   194
    private Map<String,KeyEntry> entries = new HashMap<>();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   195
90ce3da70b43 Initial load
duke
parents:
diff changeset
   196
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   197
     * The keystore name.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   198
     * Case is not significant.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   199
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   200
    private final String storeName;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   201
90ce3da70b43 Initial load
duke
parents:
diff changeset
   202
    KeyStore(String storeName) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   203
        // Get the compatibility mode
23582
d5fa3327ab3a 8038177: Eliminate unnecessary dependency to sun.security.action
mchung
parents: 10336
diff changeset
   204
        String prop = AccessController.doPrivileged(
d5fa3327ab3a 8038177: Eliminate unnecessary dependency to sun.security.action
mchung
parents: 10336
diff changeset
   205
            (PrivilegedAction<String>) () -> System.getProperty(KEYSTORE_COMPATIBILITY_MODE_PROP));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   206
90ce3da70b43 Initial load
duke
parents:
diff changeset
   207
        if ("false".equalsIgnoreCase(prop)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   208
            keyStoreCompatibilityMode = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   209
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   210
            keyStoreCompatibilityMode = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   211
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   212
90ce3da70b43 Initial load
duke
parents:
diff changeset
   213
        this.storeName = storeName;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   214
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   215
90ce3da70b43 Initial load
duke
parents:
diff changeset
   216
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   217
     * Returns the key associated with the given alias.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   218
     * <p>
90ce3da70b43 Initial load
duke
parents:
diff changeset
   219
     * A compatibility mode is supported for applications that assume
90ce3da70b43 Initial load
duke
parents:
diff changeset
   220
     * a password must be supplied. It permits (but ignores) a non-null
90ce3da70b43 Initial load
duke
parents:
diff changeset
   221
     * <code>password</code>.  The mode is enabled by default.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   222
     * Set the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   223
     * <code>sun.security.mscapi.keyStoreCompatibilityMode</code>
90ce3da70b43 Initial load
duke
parents:
diff changeset
   224
     * system property to <code>false</code> to disable compatibility mode
90ce3da70b43 Initial load
duke
parents:
diff changeset
   225
     * and reject a non-null <code>password</code>.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   226
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   227
     * @param alias the alias name
90ce3da70b43 Initial load
duke
parents:
diff changeset
   228
     * @param password the password, which should be <code>null</code>
90ce3da70b43 Initial load
duke
parents:
diff changeset
   229
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   230
     * @return the requested key, or null if the given alias does not exist
90ce3da70b43 Initial load
duke
parents:
diff changeset
   231
     * or does not identify a <i>key entry</i>.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   232
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   233
     * @exception NoSuchAlgorithmException if the algorithm for recovering the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   234
     * key cannot be found,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   235
     * or if compatibility mode is disabled and <code>password</code> is
90ce3da70b43 Initial load
duke
parents:
diff changeset
   236
     * non-null.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   237
     * @exception UnrecoverableKeyException if the key cannot be recovered.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   238
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   239
    public java.security.Key engineGetKey(String alias, char[] password)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   240
        throws NoSuchAlgorithmException, UnrecoverableKeyException
90ce3da70b43 Initial load
duke
parents:
diff changeset
   241
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   242
        if (alias == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   243
            return null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   244
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   245
90ce3da70b43 Initial load
duke
parents:
diff changeset
   246
        if (password != null && !keyStoreCompatibilityMode) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   247
            throw new UnrecoverableKeyException("Password must be null");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   248
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   249
90ce3da70b43 Initial load
duke
parents:
diff changeset
   250
        if (engineIsKeyEntry(alias) == false)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   251
            return null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   252
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   253
        KeyEntry entry = entries.get(alias);
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   254
        return (entry == null)
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   255
                ? null
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   256
                : entry.getPrivateKey();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   257
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   258
90ce3da70b43 Initial load
duke
parents:
diff changeset
   259
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   260
     * Returns the certificate chain associated with the given alias.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   261
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   262
     * @param alias the alias name
90ce3da70b43 Initial load
duke
parents:
diff changeset
   263
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   264
     * @return the certificate chain (ordered with the user's certificate first
90ce3da70b43 Initial load
duke
parents:
diff changeset
   265
     * and the root certificate authority last), or null if the given alias
90ce3da70b43 Initial load
duke
parents:
diff changeset
   266
     * does not exist or does not contain a certificate chain (i.e., the given
90ce3da70b43 Initial load
duke
parents:
diff changeset
   267
     * alias identifies either a <i>trusted certificate entry</i> or a
90ce3da70b43 Initial load
duke
parents:
diff changeset
   268
     * <i>key entry</i> without a certificate chain).
90ce3da70b43 Initial load
duke
parents:
diff changeset
   269
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   270
    public Certificate[] engineGetCertificateChain(String alias)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   271
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   272
        if (alias == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   273
            return null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   274
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   275
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   276
        KeyEntry entry = entries.get(alias);
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   277
        X509Certificate[] certChain = (entry == null)
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   278
                ? null
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   279
                : entry.getCertificateChain();
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   280
        return (certChain == null)
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   281
                ? null
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   282
                : certChain.clone();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   283
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   284
90ce3da70b43 Initial load
duke
parents:
diff changeset
   285
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   286
     * Returns the certificate associated with the given alias.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   287
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   288
     * <p>If the given alias name identifies a
90ce3da70b43 Initial load
duke
parents:
diff changeset
   289
     * <i>trusted certificate entry</i>, the certificate associated with that
90ce3da70b43 Initial load
duke
parents:
diff changeset
   290
     * entry is returned. If the given alias name identifies a
90ce3da70b43 Initial load
duke
parents:
diff changeset
   291
     * <i>key entry</i>, the first element of the certificate chain of that
90ce3da70b43 Initial load
duke
parents:
diff changeset
   292
     * entry is returned, or null if that entry does not have a certificate
90ce3da70b43 Initial load
duke
parents:
diff changeset
   293
     * chain.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   294
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   295
     * @param alias the alias name
90ce3da70b43 Initial load
duke
parents:
diff changeset
   296
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   297
     * @return the certificate, or null if the given alias does not exist or
90ce3da70b43 Initial load
duke
parents:
diff changeset
   298
     * does not contain a certificate.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   299
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   300
    public Certificate engineGetCertificate(String alias)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   301
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   302
        if (alias == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   303
            return null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   304
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   305
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   306
        KeyEntry entry = entries.get(alias);
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   307
        X509Certificate[] certChain = (entry == null)
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   308
                ? null
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   309
                : entry.getCertificateChain();
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   310
        return (certChain == null || certChain.length == 0)
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   311
                ? null
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   312
                : certChain[0];
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   313
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   314
90ce3da70b43 Initial load
duke
parents:
diff changeset
   315
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   316
     * Returns the creation date of the entry identified by the given alias.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   317
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   318
     * @param alias the alias name
90ce3da70b43 Initial load
duke
parents:
diff changeset
   319
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   320
     * @return the creation date of this entry, or null if the given alias does
90ce3da70b43 Initial load
duke
parents:
diff changeset
   321
     * not exist
90ce3da70b43 Initial load
duke
parents:
diff changeset
   322
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   323
    public Date engineGetCreationDate(String alias) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   324
        if (alias == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   325
            return null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   326
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   327
        return new Date();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   328
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   329
90ce3da70b43 Initial load
duke
parents:
diff changeset
   330
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   331
     * Stores the given private key and associated certificate chain in the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   332
     * keystore.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   333
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   334
     * <p>The given java.security.PrivateKey <code>key</code> must
90ce3da70b43 Initial load
duke
parents:
diff changeset
   335
     * be accompanied by a certificate chain certifying the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   336
     * corresponding public key.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   337
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   338
     * <p>If the given alias already exists, the keystore information
90ce3da70b43 Initial load
duke
parents:
diff changeset
   339
     * associated with it is overridden by the given key and certificate
90ce3da70b43 Initial load
duke
parents:
diff changeset
   340
     * chain. Otherwise, a new entry is created.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   341
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   342
     * <p>
90ce3da70b43 Initial load
duke
parents:
diff changeset
   343
     * A compatibility mode is supported for applications that assume
90ce3da70b43 Initial load
duke
parents:
diff changeset
   344
     * a password must be supplied. It permits (but ignores) a non-null
90ce3da70b43 Initial load
duke
parents:
diff changeset
   345
     * <code>password</code>.  The mode is enabled by default.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   346
     * Set the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   347
     * <code>sun.security.mscapi.keyStoreCompatibilityMode</code>
90ce3da70b43 Initial load
duke
parents:
diff changeset
   348
     * system property to <code>false</code> to disable compatibility mode
90ce3da70b43 Initial load
duke
parents:
diff changeset
   349
     * and reject a non-null <code>password</code>.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   350
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   351
     * @param alias the alias name
90ce3da70b43 Initial load
duke
parents:
diff changeset
   352
     * @param key the private key to be associated with the alias
90ce3da70b43 Initial load
duke
parents:
diff changeset
   353
     * @param password the password, which should be <code>null</code>
90ce3da70b43 Initial load
duke
parents:
diff changeset
   354
     * @param chain the certificate chain for the corresponding public
90ce3da70b43 Initial load
duke
parents:
diff changeset
   355
     *        key (only required if the given key is of type
90ce3da70b43 Initial load
duke
parents:
diff changeset
   356
     *        <code>java.security.PrivateKey</code>).
90ce3da70b43 Initial load
duke
parents:
diff changeset
   357
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   358
     * @exception KeyStoreException if the given key is not a private key,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   359
     * cannot be protected, or if compatibility mode is disabled and
90ce3da70b43 Initial load
duke
parents:
diff changeset
   360
     * <code>password</code> is non-null, or if this operation fails for
90ce3da70b43 Initial load
duke
parents:
diff changeset
   361
     * some other reason.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   362
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   363
    public void engineSetKeyEntry(String alias, java.security.Key key,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   364
        char[] password, Certificate[] chain) throws KeyStoreException
90ce3da70b43 Initial load
duke
parents:
diff changeset
   365
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   366
        if (alias == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   367
            throw new KeyStoreException("alias must not be null");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   368
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   369
90ce3da70b43 Initial load
duke
parents:
diff changeset
   370
        if (password != null && !keyStoreCompatibilityMode) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   371
            throw new KeyStoreException("Password must be null");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   372
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   373
90ce3da70b43 Initial load
duke
parents:
diff changeset
   374
        if (key instanceof RSAPrivateCrtKey) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   375
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   376
            KeyEntry entry = entries.get(alias);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   377
34334
512c85086978 8143913: MSCAPI keystore should accept Certificate[] in setEntry()
weijun
parents: 33868
diff changeset
   378
            X509Certificate[] xchain;
512c85086978 8143913: MSCAPI keystore should accept Certificate[] in setEntry()
weijun
parents: 33868
diff changeset
   379
            if (chain != null) {
512c85086978 8143913: MSCAPI keystore should accept Certificate[] in setEntry()
weijun
parents: 33868
diff changeset
   380
                if (chain instanceof X509Certificate[]) {
512c85086978 8143913: MSCAPI keystore should accept Certificate[] in setEntry()
weijun
parents: 33868
diff changeset
   381
                    xchain = (X509Certificate[]) chain;
512c85086978 8143913: MSCAPI keystore should accept Certificate[] in setEntry()
weijun
parents: 33868
diff changeset
   382
                } else {
512c85086978 8143913: MSCAPI keystore should accept Certificate[] in setEntry()
weijun
parents: 33868
diff changeset
   383
                    xchain = new X509Certificate[chain.length];
512c85086978 8143913: MSCAPI keystore should accept Certificate[] in setEntry()
weijun
parents: 33868
diff changeset
   384
                    System.arraycopy(chain, 0, xchain, 0, chain.length);
512c85086978 8143913: MSCAPI keystore should accept Certificate[] in setEntry()
weijun
parents: 33868
diff changeset
   385
                }
512c85086978 8143913: MSCAPI keystore should accept Certificate[] in setEntry()
weijun
parents: 33868
diff changeset
   386
            } else {
512c85086978 8143913: MSCAPI keystore should accept Certificate[] in setEntry()
weijun
parents: 33868
diff changeset
   387
                xchain = null;
512c85086978 8143913: MSCAPI keystore should accept Certificate[] in setEntry()
weijun
parents: 33868
diff changeset
   388
            }
512c85086978 8143913: MSCAPI keystore should accept Certificate[] in setEntry()
weijun
parents: 33868
diff changeset
   389
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   390
            if (entry == null) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   391
                entry =
90ce3da70b43 Initial load
duke
parents:
diff changeset
   392
                    //TODO new KeyEntry(alias, key, (X509Certificate[]) chain);
34334
512c85086978 8143913: MSCAPI keystore should accept Certificate[] in setEntry()
weijun
parents: 33868
diff changeset
   393
                    new KeyEntry(alias, null, xchain);
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   394
                storeWithUniqueAlias(alias, entry);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   395
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   396
90ce3da70b43 Initial load
duke
parents:
diff changeset
   397
            entry.setAlias(alias);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   398
90ce3da70b43 Initial load
duke
parents:
diff changeset
   399
            try {
9508
310b4f6c8e61 6732372: Some MSCAPI native methods not returning correct exceptions.
vinnie
parents: 5506
diff changeset
   400
                entry.setPrivateKey((RSAPrivateCrtKey) key);
34334
512c85086978 8143913: MSCAPI keystore should accept Certificate[] in setEntry()
weijun
parents: 33868
diff changeset
   401
                entry.setCertificateChain(xchain);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   402
90ce3da70b43 Initial load
duke
parents:
diff changeset
   403
            } catch (CertificateException ce) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   404
                throw new KeyStoreException(ce);
9508
310b4f6c8e61 6732372: Some MSCAPI native methods not returning correct exceptions.
vinnie
parents: 5506
diff changeset
   405
310b4f6c8e61 6732372: Some MSCAPI native methods not returning correct exceptions.
vinnie
parents: 5506
diff changeset
   406
            } catch (InvalidKeyException ike) {
310b4f6c8e61 6732372: Some MSCAPI native methods not returning correct exceptions.
vinnie
parents: 5506
diff changeset
   407
                throw new KeyStoreException(ike);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   408
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   409
90ce3da70b43 Initial load
duke
parents:
diff changeset
   410
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   411
            throw new UnsupportedOperationException(
90ce3da70b43 Initial load
duke
parents:
diff changeset
   412
                "Cannot assign the key to the given alias.");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   413
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   414
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   415
90ce3da70b43 Initial load
duke
parents:
diff changeset
   416
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   417
     * Assigns the given key (that has already been protected) to the given
90ce3da70b43 Initial load
duke
parents:
diff changeset
   418
     * alias.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   419
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   420
     * <p>If the protected key is of type
90ce3da70b43 Initial load
duke
parents:
diff changeset
   421
     * <code>java.security.PrivateKey</code>, it must be accompanied by a
90ce3da70b43 Initial load
duke
parents:
diff changeset
   422
     * certificate chain certifying the corresponding public key. If the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   423
     * underlying keystore implementation is of type <code>jks</code>,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   424
     * <code>key</code> must be encoded as an
90ce3da70b43 Initial load
duke
parents:
diff changeset
   425
     * <code>EncryptedPrivateKeyInfo</code> as defined in the PKCS #8 standard.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   426
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   427
     * <p>If the given alias already exists, the keystore information
90ce3da70b43 Initial load
duke
parents:
diff changeset
   428
     * associated with it is overridden by the given key (and possibly
90ce3da70b43 Initial load
duke
parents:
diff changeset
   429
     * certificate chain).
90ce3da70b43 Initial load
duke
parents:
diff changeset
   430
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   431
     * @param alias the alias name
90ce3da70b43 Initial load
duke
parents:
diff changeset
   432
     * @param key the key (in protected format) to be associated with the alias
90ce3da70b43 Initial load
duke
parents:
diff changeset
   433
     * @param chain the certificate chain for the corresponding public
90ce3da70b43 Initial load
duke
parents:
diff changeset
   434
     * key (only useful if the protected key is of type
90ce3da70b43 Initial load
duke
parents:
diff changeset
   435
     * <code>java.security.PrivateKey</code>).
90ce3da70b43 Initial load
duke
parents:
diff changeset
   436
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   437
     * @exception KeyStoreException if this operation fails.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   438
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   439
    public void engineSetKeyEntry(String alias, byte[] key,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   440
                                  Certificate[] chain)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   441
        throws KeyStoreException
90ce3da70b43 Initial load
duke
parents:
diff changeset
   442
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   443
        throw new UnsupportedOperationException(
90ce3da70b43 Initial load
duke
parents:
diff changeset
   444
            "Cannot assign the encoded key to the given alias.");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   445
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   446
90ce3da70b43 Initial load
duke
parents:
diff changeset
   447
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   448
     * Assigns the given certificate to the given alias.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   449
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   450
     * <p>If the given alias already exists in this keystore and identifies a
90ce3da70b43 Initial load
duke
parents:
diff changeset
   451
     * <i>trusted certificate entry</i>, the certificate associated with it is
90ce3da70b43 Initial load
duke
parents:
diff changeset
   452
     * overridden by the given certificate.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   453
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   454
     * @param alias the alias name
90ce3da70b43 Initial load
duke
parents:
diff changeset
   455
     * @param cert the certificate
90ce3da70b43 Initial load
duke
parents:
diff changeset
   456
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   457
     * @exception KeyStoreException if the given alias already exists and does
90ce3da70b43 Initial load
duke
parents:
diff changeset
   458
     * not identify a <i>trusted certificate entry</i>, or this operation
90ce3da70b43 Initial load
duke
parents:
diff changeset
   459
     * fails for some other reason.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   460
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   461
    public void engineSetCertificateEntry(String alias, Certificate cert)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   462
        throws KeyStoreException
90ce3da70b43 Initial load
duke
parents:
diff changeset
   463
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   464
        if (alias == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   465
            throw new KeyStoreException("alias must not be null");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   466
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   467
90ce3da70b43 Initial load
duke
parents:
diff changeset
   468
        if (cert instanceof X509Certificate) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   469
90ce3da70b43 Initial load
duke
parents:
diff changeset
   470
            // TODO - build CryptoAPI chain?
90ce3da70b43 Initial load
duke
parents:
diff changeset
   471
            X509Certificate[] chain =
90ce3da70b43 Initial load
duke
parents:
diff changeset
   472
                new X509Certificate[]{ (X509Certificate) cert };
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   473
            KeyEntry entry = entries.get(alias);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   474
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   475
            if (entry == null) {
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   476
                entry =
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   477
                    new KeyEntry(alias, null, chain);
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   478
                storeWithUniqueAlias(alias, entry);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   479
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   480
90ce3da70b43 Initial load
duke
parents:
diff changeset
   481
            if (entry.getPrivateKey() == null) { // trusted-cert entry
90ce3da70b43 Initial load
duke
parents:
diff changeset
   482
                entry.setAlias(alias);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   483
90ce3da70b43 Initial load
duke
parents:
diff changeset
   484
                try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   485
                    entry.setCertificateChain(chain);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   486
90ce3da70b43 Initial load
duke
parents:
diff changeset
   487
                } catch (CertificateException ce) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   488
                    throw new KeyStoreException(ce);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   489
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   490
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   491
90ce3da70b43 Initial load
duke
parents:
diff changeset
   492
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   493
            throw new UnsupportedOperationException(
90ce3da70b43 Initial load
duke
parents:
diff changeset
   494
                "Cannot assign the certificate to the given alias.");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   495
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   496
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   497
90ce3da70b43 Initial load
duke
parents:
diff changeset
   498
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   499
     * Deletes the entry identified by the given alias from this keystore.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   500
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   501
     * @param alias the alias name
90ce3da70b43 Initial load
duke
parents:
diff changeset
   502
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   503
     * @exception KeyStoreException if the entry cannot be removed.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   504
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   505
    public void engineDeleteEntry(String alias)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   506
        throws KeyStoreException
90ce3da70b43 Initial load
duke
parents:
diff changeset
   507
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   508
        if (alias == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   509
            throw new KeyStoreException("alias must not be null");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   510
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   511
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   512
        KeyEntry entry = entries.remove(alias);
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   513
        if (entry != null) {
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   514
            // Get end-entity certificate and remove from system cert store
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   515
            X509Certificate[] certChain = entry.getCertificateChain();
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   516
            if (certChain != null) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   517
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   518
                try {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   519
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   520
                    byte[] encoding = certChain[0].getEncoded();
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   521
                    removeCertificate(getName(), entry.getAlias(), encoding,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   522
                            encoding.length);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   523
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   524
                } catch (CertificateException e) {
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   525
                    throw new KeyStoreException("Cannot remove entry: ", e);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   526
                }
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   527
            }
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   528
            Key privateKey = entry.getPrivateKey();
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   529
            if (privateKey != null) {
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   530
                destroyKeyContainer(
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   531
                    Key.getContainerName(privateKey.getHCryptProvider()));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   532
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   533
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   534
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   535
90ce3da70b43 Initial load
duke
parents:
diff changeset
   536
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   537
     * Lists all the alias names of this keystore.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   538
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   539
     * @return enumeration of the alias names
90ce3da70b43 Initial load
duke
parents:
diff changeset
   540
     */
10336
0bb1999251f8 7064075: Security libraries don't build with javac -Xlint:all,-deprecation -Werror
jjg
parents: 9508
diff changeset
   541
    public Enumeration<String> engineAliases() {
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   542
        final Iterator<String> iter = entries.keySet().iterator();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   543
10336
0bb1999251f8 7064075: Security libraries don't build with javac -Xlint:all,-deprecation -Werror
jjg
parents: 9508
diff changeset
   544
        return new Enumeration<String>()
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   545
        {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   546
            public boolean hasMoreElements()
90ce3da70b43 Initial load
duke
parents:
diff changeset
   547
            {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   548
                return iter.hasNext();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   549
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   550
10336
0bb1999251f8 7064075: Security libraries don't build with javac -Xlint:all,-deprecation -Werror
jjg
parents: 9508
diff changeset
   551
            public String nextElement()
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   552
            {
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   553
                return iter.next();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   554
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   555
        };
90ce3da70b43 Initial load
duke
parents:
diff changeset
   556
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   557
90ce3da70b43 Initial load
duke
parents:
diff changeset
   558
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   559
     * Checks if the given alias exists in this keystore.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   560
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   561
     * @param alias the alias name
90ce3da70b43 Initial load
duke
parents:
diff changeset
   562
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   563
     * @return true if the alias exists, false otherwise
90ce3da70b43 Initial load
duke
parents:
diff changeset
   564
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   565
    public boolean engineContainsAlias(String alias) {
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   566
        return entries.containsKey(alias);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   567
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   568
90ce3da70b43 Initial load
duke
parents:
diff changeset
   569
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   570
     * Retrieves the number of entries in this keystore.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   571
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   572
     * @return the number of entries in this keystore
90ce3da70b43 Initial load
duke
parents:
diff changeset
   573
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   574
    public int engineSize() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   575
        return entries.size();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   576
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   577
90ce3da70b43 Initial load
duke
parents:
diff changeset
   578
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   579
     * Returns true if the entry identified by the given alias is a
90ce3da70b43 Initial load
duke
parents:
diff changeset
   580
     * <i>key entry</i>, and false otherwise.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   581
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   582
     * @return true if the entry identified by the given alias is a
90ce3da70b43 Initial load
duke
parents:
diff changeset
   583
     * <i>key entry</i>, false otherwise.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   584
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   585
    public boolean engineIsKeyEntry(String alias) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   586
90ce3da70b43 Initial load
duke
parents:
diff changeset
   587
        if (alias == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   588
            return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   589
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   590
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   591
        KeyEntry entry = entries.get(alias);
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   592
        return entry != null && entry.getPrivateKey() != null;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   593
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   594
90ce3da70b43 Initial load
duke
parents:
diff changeset
   595
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   596
     * Returns true if the entry identified by the given alias is a
90ce3da70b43 Initial load
duke
parents:
diff changeset
   597
     * <i>trusted certificate entry</i>, and false otherwise.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   598
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   599
     * @return true if the entry identified by the given alias is a
90ce3da70b43 Initial load
duke
parents:
diff changeset
   600
     * <i>trusted certificate entry</i>, false otherwise.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   601
     */
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   602
    public boolean engineIsCertificateEntry(String alias) {
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   603
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   604
        if (alias == null) {
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   605
            return false;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   606
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   607
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   608
        KeyEntry entry = entries.get(alias);
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   609
        return entry != null && entry.getPrivateKey() == null;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   610
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   611
90ce3da70b43 Initial load
duke
parents:
diff changeset
   612
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   613
     * Returns the (alias) name of the first keystore entry whose certificate
90ce3da70b43 Initial load
duke
parents:
diff changeset
   614
     * matches the given certificate.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   615
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   616
     * <p>This method attempts to match the given certificate with each
90ce3da70b43 Initial load
duke
parents:
diff changeset
   617
     * keystore entry. If the entry being considered
90ce3da70b43 Initial load
duke
parents:
diff changeset
   618
     * is a <i>trusted certificate entry</i>, the given certificate is
90ce3da70b43 Initial load
duke
parents:
diff changeset
   619
     * compared to that entry's certificate. If the entry being considered is
90ce3da70b43 Initial load
duke
parents:
diff changeset
   620
     * a <i>key entry</i>, the given certificate is compared to the first
90ce3da70b43 Initial load
duke
parents:
diff changeset
   621
     * element of that entry's certificate chain (if a chain exists).
90ce3da70b43 Initial load
duke
parents:
diff changeset
   622
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   623
     * @param cert the certificate to match with.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   624
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   625
     * @return the (alias) name of the first entry with matching certificate,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   626
     * or null if no such entry exists in this keystore.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   627
     */
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   628
    public String engineGetCertificateAlias(Certificate cert) {
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   629
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   630
        for (Map.Entry<String,KeyEntry> mapEntry : entries.entrySet()) {
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   631
            KeyEntry entry = mapEntry.getValue();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   632
            if (entry.certChain != null && entry.certChain[0].equals(cert)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   633
                return entry.getAlias();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   634
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   635
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   636
90ce3da70b43 Initial load
duke
parents:
diff changeset
   637
        return null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   638
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   639
90ce3da70b43 Initial load
duke
parents:
diff changeset
   640
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   641
     * engineStore is currently a no-op.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   642
     * Entries are stored during engineSetEntry.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   643
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   644
     * A compatibility mode is supported for applications that assume
90ce3da70b43 Initial load
duke
parents:
diff changeset
   645
     * keystores are stream-based. It permits (but ignores) a non-null
90ce3da70b43 Initial load
duke
parents:
diff changeset
   646
     * <code>stream</code> or <code>password</code>.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   647
     * The mode is enabled by default.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   648
     * Set the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   649
     * <code>sun.security.mscapi.keyStoreCompatibilityMode</code>
90ce3da70b43 Initial load
duke
parents:
diff changeset
   650
     * system property to <code>false</code> to disable compatibility mode
90ce3da70b43 Initial load
duke
parents:
diff changeset
   651
     * and reject a non-null <code>stream</code> or <code>password</code>.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   652
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   653
     * @param stream the output stream, which should be <code>null</code>
90ce3da70b43 Initial load
duke
parents:
diff changeset
   654
     * @param password the password, which should be <code>null</code>
90ce3da70b43 Initial load
duke
parents:
diff changeset
   655
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   656
     * @exception IOException if compatibility mode is disabled and either
90ce3da70b43 Initial load
duke
parents:
diff changeset
   657
     * parameter is non-null.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   658
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   659
    public void engineStore(OutputStream stream, char[] password)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   660
        throws IOException, NoSuchAlgorithmException, CertificateException
90ce3da70b43 Initial load
duke
parents:
diff changeset
   661
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   662
        if (stream != null && !keyStoreCompatibilityMode) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   663
            throw new IOException("Keystore output stream must be null");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   664
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   665
90ce3da70b43 Initial load
duke
parents:
diff changeset
   666
        if (password != null && !keyStoreCompatibilityMode) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   667
            throw new IOException("Keystore password must be null");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   668
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   669
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   670
90ce3da70b43 Initial load
duke
parents:
diff changeset
   671
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   672
     * Loads the keystore.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   673
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   674
     * A compatibility mode is supported for applications that assume
90ce3da70b43 Initial load
duke
parents:
diff changeset
   675
     * keystores are stream-based. It permits (but ignores) a non-null
90ce3da70b43 Initial load
duke
parents:
diff changeset
   676
     * <code>stream</code> or <code>password</code>.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   677
     * The mode is enabled by default.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   678
     * Set the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   679
     * <code>sun.security.mscapi.keyStoreCompatibilityMode</code>
90ce3da70b43 Initial load
duke
parents:
diff changeset
   680
     * system property to <code>false</code> to disable compatibility mode
90ce3da70b43 Initial load
duke
parents:
diff changeset
   681
     * and reject a non-null <code>stream</code> or <code>password</code>.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   682
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   683
     * @param stream the input stream, which should be <code>null</code>.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   684
     * @param password the password, which should be <code>null</code>.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   685
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   686
     * @exception IOException if there is an I/O or format problem with the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   687
     * keystore data. Or if compatibility mode is disabled and either
90ce3da70b43 Initial load
duke
parents:
diff changeset
   688
     * parameter is non-null.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   689
     * @exception NoSuchAlgorithmException if the algorithm used to check
90ce3da70b43 Initial load
duke
parents:
diff changeset
   690
     * the integrity of the keystore cannot be found
90ce3da70b43 Initial load
duke
parents:
diff changeset
   691
     * @exception CertificateException if any of the certificates in the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   692
     * keystore could not be loaded
90ce3da70b43 Initial load
duke
parents:
diff changeset
   693
     * @exception SecurityException if the security check for
90ce3da70b43 Initial load
duke
parents:
diff changeset
   694
     *  <code>SecurityPermission("authProvider.<i>name</i>")</code> does not
90ce3da70b43 Initial load
duke
parents:
diff changeset
   695
     *  pass, where <i>name</i> is the value returned by
90ce3da70b43 Initial load
duke
parents:
diff changeset
   696
     *  this provider's <code>getName</code> method.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   697
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   698
    public void engineLoad(InputStream stream, char[] password)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   699
        throws IOException, NoSuchAlgorithmException, CertificateException
90ce3da70b43 Initial load
duke
parents:
diff changeset
   700
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   701
        if (stream != null && !keyStoreCompatibilityMode) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   702
            throw new IOException("Keystore input stream must be null");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   703
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   704
90ce3da70b43 Initial load
duke
parents:
diff changeset
   705
        if (password != null && !keyStoreCompatibilityMode) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   706
            throw new IOException("Keystore password must be null");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   707
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   708
90ce3da70b43 Initial load
duke
parents:
diff changeset
   709
        /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   710
         * Use the same security check as AuthProvider.login
90ce3da70b43 Initial load
duke
parents:
diff changeset
   711
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   712
        SecurityManager sm = System.getSecurityManager();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   713
        if (sm != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   714
            sm.checkPermission(new SecurityPermission(
90ce3da70b43 Initial load
duke
parents:
diff changeset
   715
                "authProvider.SunMSCAPI"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   716
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   717
90ce3da70b43 Initial load
duke
parents:
diff changeset
   718
        // Clear all key entries
90ce3da70b43 Initial load
duke
parents:
diff changeset
   719
        entries.clear();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   720
9508
310b4f6c8e61 6732372: Some MSCAPI native methods not returning correct exceptions.
vinnie
parents: 5506
diff changeset
   721
        try {
310b4f6c8e61 6732372: Some MSCAPI native methods not returning correct exceptions.
vinnie
parents: 5506
diff changeset
   722
310b4f6c8e61 6732372: Some MSCAPI native methods not returning correct exceptions.
vinnie
parents: 5506
diff changeset
   723
            // Load keys and/or certificate chains
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   724
            loadKeysOrCertificateChains(getName());
9508
310b4f6c8e61 6732372: Some MSCAPI native methods not returning correct exceptions.
vinnie
parents: 5506
diff changeset
   725
310b4f6c8e61 6732372: Some MSCAPI native methods not returning correct exceptions.
vinnie
parents: 5506
diff changeset
   726
        } catch (KeyStoreException e) {
310b4f6c8e61 6732372: Some MSCAPI native methods not returning correct exceptions.
vinnie
parents: 5506
diff changeset
   727
            throw new IOException(e);
310b4f6c8e61 6732372: Some MSCAPI native methods not returning correct exceptions.
vinnie
parents: 5506
diff changeset
   728
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   729
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   730
90ce3da70b43 Initial load
duke
parents:
diff changeset
   731
    /**
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   732
     * Stores the given entry into the map, making sure
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   733
     * the alias, used as the key is unique.
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   734
     * If the same alias already exists, it tries to append
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   735
     * a suffix  (1), (2), etc to it until it finds a unique
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   736
     * value.
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   737
     */
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   738
    private void storeWithUniqueAlias(String alias, KeyEntry entry) {
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   739
        String uniqAlias = alias;
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   740
        int uniqNum = 1;
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   741
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   742
        while (true) {
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   743
            if (entries.putIfAbsent(uniqAlias, entry) == null) {
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   744
                break;
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   745
            }
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   746
            uniqAlias = alias + " (" + (uniqNum++) + ")";
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   747
        }
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   748
    }
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   749
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   750
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   751
    /**
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   752
     * Generates a certificate chain from the collection of
90ce3da70b43 Initial load
duke
parents:
diff changeset
   753
     * certificates and stores the result into a key entry.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   754
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   755
    private void generateCertificateChain(String alias,
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   756
        Collection<? extends Certificate> certCollection)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   757
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   758
        try
90ce3da70b43 Initial load
duke
parents:
diff changeset
   759
        {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   760
            X509Certificate[] certChain =
90ce3da70b43 Initial load
duke
parents:
diff changeset
   761
                new X509Certificate[certCollection.size()];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   762
90ce3da70b43 Initial load
duke
parents:
diff changeset
   763
            int i = 0;
10336
0bb1999251f8 7064075: Security libraries don't build with javac -Xlint:all,-deprecation -Werror
jjg
parents: 9508
diff changeset
   764
            for (Iterator<? extends Certificate> iter =
0bb1999251f8 7064075: Security libraries don't build with javac -Xlint:all,-deprecation -Werror
jjg
parents: 9508
diff changeset
   765
                    certCollection.iterator(); iter.hasNext(); i++)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   766
            {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   767
                certChain[i] = (X509Certificate) iter.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   768
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   769
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   770
            storeWithUniqueAlias(alias,
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   771
                    new KeyEntry(alias, null, certChain));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   772
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   773
        catch (Throwable e)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   774
        {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   775
            // Ignore the exception and skip this entry
90ce3da70b43 Initial load
duke
parents:
diff changeset
   776
            // TODO - throw CertificateException?
90ce3da70b43 Initial load
duke
parents:
diff changeset
   777
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   778
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   779
90ce3da70b43 Initial load
duke
parents:
diff changeset
   780
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   781
     * Generates RSA key and certificate chain from the private key handle,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   782
     * collection of certificates and stores the result into key entries.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   783
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   784
    private void generateRSAKeyAndCertificateChain(String alias,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   785
        long hCryptProv, long hCryptKey, int keyLength,
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   786
        Collection<? extends Certificate> certCollection)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   787
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   788
        try
90ce3da70b43 Initial load
duke
parents:
diff changeset
   789
        {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   790
            X509Certificate[] certChain =
90ce3da70b43 Initial load
duke
parents:
diff changeset
   791
                new X509Certificate[certCollection.size()];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   792
90ce3da70b43 Initial load
duke
parents:
diff changeset
   793
            int i = 0;
10336
0bb1999251f8 7064075: Security libraries don't build with javac -Xlint:all,-deprecation -Werror
jjg
parents: 9508
diff changeset
   794
            for (Iterator<? extends Certificate> iter =
0bb1999251f8 7064075: Security libraries don't build with javac -Xlint:all,-deprecation -Werror
jjg
parents: 9508
diff changeset
   795
                    certCollection.iterator(); iter.hasNext(); i++)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   796
            {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   797
                certChain[i] = (X509Certificate) iter.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   798
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   799
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   800
            storeWithUniqueAlias(alias, new KeyEntry(alias,
40389
c6df8bba0b71 8163896: Finalizing one key of a KeyPair invalidates the other key
igerasim
parents: 36759
diff changeset
   801
                    new RSAPrivateKey(new Key.NativeHandles(hCryptProv,
c6df8bba0b71 8163896: Finalizing one key of a KeyPair invalidates the other key
igerasim
parents: 36759
diff changeset
   802
                            hCryptKey), keyLength),
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   803
                    certChain));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   804
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   805
        catch (Throwable e)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   806
        {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   807
            // Ignore the exception and skip this entry
90ce3da70b43 Initial load
duke
parents:
diff changeset
   808
            // TODO - throw CertificateException?
90ce3da70b43 Initial load
duke
parents:
diff changeset
   809
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   810
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   811
90ce3da70b43 Initial load
duke
parents:
diff changeset
   812
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   813
     * Generates certificates from byte data and stores into cert collection.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   814
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   815
     * @param data Byte data.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   816
     * @param certCollection Collection of certificates.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   817
     */
10336
0bb1999251f8 7064075: Security libraries don't build with javac -Xlint:all,-deprecation -Werror
jjg
parents: 9508
diff changeset
   818
    private void generateCertificate(byte[] data,
0bb1999251f8 7064075: Security libraries don't build with javac -Xlint:all,-deprecation -Werror
jjg
parents: 9508
diff changeset
   819
        Collection<Certificate> certCollection) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   820
        try
90ce3da70b43 Initial load
duke
parents:
diff changeset
   821
        {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   822
            ByteArrayInputStream bis = new ByteArrayInputStream(data);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   823
90ce3da70b43 Initial load
duke
parents:
diff changeset
   824
            // Obtain certificate factory
90ce3da70b43 Initial load
duke
parents:
diff changeset
   825
            if (certificateFactory == null) {
33868
9c1bde39fe18 8139436: sun.security.mscapi.KeyStore might load incomplete data
clanger
parents: 31538
diff changeset
   826
                certificateFactory = CertificateFactory.getInstance("X.509", "SUN");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   827
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   828
90ce3da70b43 Initial load
duke
parents:
diff changeset
   829
            // Generate certificate
10336
0bb1999251f8 7064075: Security libraries don't build with javac -Xlint:all,-deprecation -Werror
jjg
parents: 9508
diff changeset
   830
            Collection<? extends Certificate> c =
0bb1999251f8 7064075: Security libraries don't build with javac -Xlint:all,-deprecation -Werror
jjg
parents: 9508
diff changeset
   831
                    certificateFactory.generateCertificates(bis);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   832
            certCollection.addAll(c);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   833
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   834
        catch (CertificateException e)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   835
        {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   836
            // Ignore the exception and skip this certificate
90ce3da70b43 Initial load
duke
parents:
diff changeset
   837
            // TODO - throw CertificateException?
90ce3da70b43 Initial load
duke
parents:
diff changeset
   838
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   839
        catch (Throwable te)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   840
        {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   841
            // Ignore the exception and skip this certificate
90ce3da70b43 Initial load
duke
parents:
diff changeset
   842
            // TODO - throw CertificateException?
90ce3da70b43 Initial load
duke
parents:
diff changeset
   843
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   844
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   845
90ce3da70b43 Initial load
duke
parents:
diff changeset
   846
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   847
     * Returns the name of the keystore.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   848
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   849
    private String getName()
90ce3da70b43 Initial load
duke
parents:
diff changeset
   850
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   851
        return storeName;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   852
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   853
90ce3da70b43 Initial load
duke
parents:
diff changeset
   854
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   855
     * Load keys and/or certificates from keystore into Collection.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   856
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   857
     * @param name Name of keystore.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   858
     */
36759
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   859
    private native void loadKeysOrCertificateChains(String name)
07dc1868fd1e 6483657: MSCAPI provider does not create unique alias names
igerasim
parents: 34334
diff changeset
   860
            throws KeyStoreException;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   861
90ce3da70b43 Initial load
duke
parents:
diff changeset
   862
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   863
     * Stores a DER-encoded certificate into the certificate store
90ce3da70b43 Initial load
duke
parents:
diff changeset
   864
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   865
     * @param name Name of the keystore.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   866
     * @param alias Name of the certificate.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   867
     * @param encoding DER-encoded certificate.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   868
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   869
    private native void storeCertificate(String name, String alias,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   870
        byte[] encoding, int encodingLength, long hCryptProvider,
9508
310b4f6c8e61 6732372: Some MSCAPI native methods not returning correct exceptions.
vinnie
parents: 5506
diff changeset
   871
        long hCryptKey) throws CertificateException, KeyStoreException;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   872
90ce3da70b43 Initial load
duke
parents:
diff changeset
   873
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   874
     * Removes the certificate from the certificate store
90ce3da70b43 Initial load
duke
parents:
diff changeset
   875
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   876
     * @param name Name of the keystore.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   877
     * @param alias Name of the certificate.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   878
     * @param encoding DER-encoded certificate.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   879
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   880
    private native void removeCertificate(String name, String alias,
9508
310b4f6c8e61 6732372: Some MSCAPI native methods not returning correct exceptions.
vinnie
parents: 5506
diff changeset
   881
        byte[] encoding, int encodingLength)
310b4f6c8e61 6732372: Some MSCAPI native methods not returning correct exceptions.
vinnie
parents: 5506
diff changeset
   882
            throws CertificateException, KeyStoreException;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   883
90ce3da70b43 Initial load
duke
parents:
diff changeset
   884
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   885
     * Destroys the key container.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   886
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   887
     * @param keyContainerName The name of the key container.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   888
     */
9508
310b4f6c8e61 6732372: Some MSCAPI native methods not returning correct exceptions.
vinnie
parents: 5506
diff changeset
   889
    private native void destroyKeyContainer(String keyContainerName)
310b4f6c8e61 6732372: Some MSCAPI native methods not returning correct exceptions.
vinnie
parents: 5506
diff changeset
   890
        throws KeyStoreException;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   891
90ce3da70b43 Initial load
duke
parents:
diff changeset
   892
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   893
     * Generates a private-key BLOB from a key's components.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   894
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   895
    private native byte[] generatePrivateKeyBlob(
90ce3da70b43 Initial load
duke
parents:
diff changeset
   896
        int keyBitLength,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   897
        byte[] modulus,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   898
        byte[] publicExponent,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   899
        byte[] privateExponent,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   900
        byte[] primeP,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   901
        byte[] primeQ,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   902
        byte[] exponentP,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   903
        byte[] exponentQ,
9508
310b4f6c8e61 6732372: Some MSCAPI native methods not returning correct exceptions.
vinnie
parents: 5506
diff changeset
   904
        byte[] crtCoefficient) throws InvalidKeyException;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   905
90ce3da70b43 Initial load
duke
parents:
diff changeset
   906
    private native RSAPrivateKey storePrivateKey(byte[] keyBlob,
9508
310b4f6c8e61 6732372: Some MSCAPI native methods not returning correct exceptions.
vinnie
parents: 5506
diff changeset
   907
        String keyContainerName, int keySize) throws KeyStoreException;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   908
}