⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 reissuecommand.java

📁 一个免费的CA,基于EJB平台的,老师叫我们测试,现把之共享出来让大家参考
💻 JAVA
字号:
/************************************************************************* *                                                                       * *  EJBCA: The OpenSource Certificate Authority                          * *                                                                       * *  This software is free software; you can redistribute it and/or       * *  modify it under the terms of the GNU Lesser General Public           * *  License as published by the Free Software Foundation; either         * *  version 2.1 of the License, or any later version.                    * *                                                                       * *  See terms of license at gnu.org.                                     * *                                                                       * *************************************************************************/ package org.ejbca.core.protocol.xkms.client;import java.io.FileInputStream;import java.security.KeyStore;import java.security.PrivateKey;import java.security.cert.Certificate;import java.security.cert.CertificateException;import java.security.cert.X509Certificate;import java.util.ArrayList;import java.util.Collection;import java.util.Iterator;import java.util.List;import javax.xml.bind.JAXBElement;import org.ejbca.core.protocol.xkms.common.XKMSConstants;import org.ejbca.ui.cli.ErrorAdminCommandException;import org.ejbca.ui.cli.IAdminCommand;import org.ejbca.ui.cli.IllegalAdminCommandException;import org.ejbca.util.CertTools;import org.ejbca.util.KeyTools;import org.w3._2000._09.xmldsig_.KeyInfoType;import org.w3._2000._09.xmldsig_.X509DataType;import org.w3._2002._03.xkms_.KeyBindingType;import org.w3._2002._03.xkms_.ObjectFactory;import org.w3._2002._03.xkms_.ReissueRequestType;import org.w3._2002._03.xkms_.ReissueResultType;/** * Performes KRSS reissue calls to an web service. * * @version $Id: ReissueCommand.java,v 1.1 2007/01/07 00:31:51 herrvendil Exp $ * @author Philip Vendil */public class ReissueCommand extends XKMSCLIBaseCommand implements IAdminCommand{	private ObjectFactory xKMSObjectFactory = new ObjectFactory();	private org.w3._2000._09.xmldsig_.ObjectFactory sigFactory = new org.w3._2000._09.xmldsig_.ObjectFactory();		private static final int ARG_KEYSTORE           = 1;	private static final int ARG_ALIAS              = 2;	private static final int ARG_KEYSTOREPASSWORD   = 3;	private static final int ARG_AUTHPASSWORD       = 4;	private static final int ARG_ENCODING           = 5;	private static final int ARG_OUTPUTPATH         = 6;	       	    /**     * Creates a new instance of RaAddUserCommand     *     * @param args command line arguments     */    public ReissueCommand(String[] args) {        super(args);    }    /**     * Runs the command     *     * @throws IllegalAdminCommandException Error in command args     * @throws ErrorAdminCommandException Error running command     */    public void execute() throws IllegalAdminCommandException, ErrorAdminCommandException {    	        try {                          if(args.length < 6 || args.length > 7){            	usage();            	System.exit(-1);            }                          String keyPass = args[ARG_KEYSTOREPASSWORD];            String authPass = args[ARG_AUTHPASSWORD];            String alias = args[ARG_ALIAS];            String encoding = useEncoding(args[ARG_ENCODING]);                         KeyStore ks  = readKeyStore(args[ARG_KEYSTORE],encoding, keyPass);               X509Certificate orgCert = (X509Certificate) ks.getCertificate(alias);                        String outputPath = "";            if(args.length >= ARG_OUTPUTPATH +1){            	if(args[ARG_OUTPUTPATH] != null){            	  outputPath = args[ARG_OUTPUTPATH] + "/";            	            	            	}            }            String reqId = genId();            ReissueRequestType reissueRequestType = xKMSObjectFactory.createReissueRequestType();            reissueRequestType.setId(reqId);            reissueRequestType.getRespondWith().add(XKMSConstants.RESPONDWITH_X509CHAIN);                        String keyBindingId =  "_" + orgCert.getSerialNumber().toString();            X509DataType x509DataType = sigFactory.createX509DataType();            x509DataType.getX509IssuerSerialOrX509SKIOrX509SubjectName().add(sigFactory.createX509DataTypeX509Certificate(orgCert.getEncoded()));            KeyInfoType keyInfoType = sigFactory.createKeyInfoType();            keyInfoType.getContent().add(sigFactory.createX509Data(x509DataType));                        KeyBindingType keyBindingType = xKMSObjectFactory.createKeyBindingType();                            keyBindingType.setKeyInfo(keyInfoType);            keyBindingType.setId(keyBindingId);            reissueRequestType.setReissueKeyBinding(keyBindingType);                                               PrivateKey privateKey = (PrivateKey) ks.getKey(alias, keyPass.toCharArray());            ReissueResultType reissueResultType = getXKMSInvoker().reissue(reissueRequestType, clientCert, privateKey, authPass, privateKey, keyBindingId);                                     if(reissueResultType.getResultMajor().equals(XKMSConstants.RESULTMAJOR_SUCCESS) &&                reissueResultType.getResultMinor() == null){                            if(reissueResultType.getKeyBinding().size() >0){                	KeyBindingType keyBinding = reissueResultType.getKeyBinding().get(0);                	                	List certs = getCertsFromKeyBinding(keyBinding);                	                  	X509Certificate userCert = getUserCert(certs);                	                	certs.remove(userCert);                	                    	createKeyStore(alias, userCert, certs,privateKey,keyPass,encoding,outputPath);                }               }else{            	displayRequestErrors(reissueResultType);            }            } catch (Exception e) {            throw new ErrorAdminCommandException(e);        }    }    private KeyStore readKeyStore(String keystorefilename, String encoding, String keyPass)  {        KeyStore ks = null;                try {        	if(encoding.equals(ENCODING_JKS)){        		ks = KeyStore.getInstance("JKS");        		ks.load(new FileInputStream(keystorefilename), keyPass.toCharArray());        	}        	        	if(encoding.equals(ENCODING_P12)){        		ks = KeyStore.getInstance("PKCS12");        		ks.load(new FileInputStream(keystorefilename), keyPass.toCharArray());        	}        } catch (Exception e) {    		getPrintStream().println("Error reading keystore " + keystorefilename + " from file : " + e.getMessage());            usage();        	System.exit(-1);		}    	    			return ks;	}	private X509Certificate getUserCert(Collection certs) {		X509Certificate retval = null;		Iterator iter = certs.iterator();		while(iter.hasNext()){			X509Certificate next = (X509Certificate) iter.next();			if(next.getBasicConstraints() == -1){				retval = next;				break;			}		}    			return retval;	}	private void createKeyStore(String alias, X509Certificate userCert, List caCerts, PrivateKey privKey, String password, String encoding, String outputPath) throws Exception {		boolean createJKS = false;				if(encoding.equals(ENCODING_JKS)){			createJKS = true;		}	                        Certificate[] caChain = new Certificate[caCerts.size()];        for(int i=0;i<caCerts.size();i++){        	caChain[i] = (Certificate) caCerts.get(i);        }		        // Store keys and certificates in keystore.        KeyStore ks = null;        if (createJKS) {            ks = KeyTools.createJKS(alias, privKey, password, userCert, caChain);        } else {            ks = KeyTools.createP12(alias, privKey,  userCert, caChain);        }        storeKeyStore(ks, alias, password, createJKS, false, outputPath);			}	private List getCertsFromKeyBinding(KeyBindingType keyBinding) throws CertificateException {		ArrayList retval = new ArrayList();				JAXBElement<X509DataType> jAXBX509Data = (JAXBElement<X509DataType>) keyBinding.getKeyInfo().getContent().get(0);				Iterator iter2 = jAXBX509Data.getValue().getX509IssuerSerialOrX509SKIOrX509SubjectName().iterator();		while(iter2.hasNext()){			JAXBElement next = (JAXBElement) iter2.next();								if(next.getName().getLocalPart().equals("X509Certificate")){			  byte[] encoded = (byte[]) next.getValue();			  X509Certificate nextCert = CertTools.getCertfromByteArray(encoded);			  retval.add(nextCert);			}		}					return retval;	}	private void displayRequestErrors(ReissueResultType reissueResultType) {		if(reissueResultType.getResultMinor().equals(XKMSConstants.RESULTMINOR_NOMATCH)){			getPrintStream().println("Error no user could be found for the given certiifcate.");		}else			if(reissueResultType.getResultMinor().equals(XKMSConstants.RESULTMINOR_NOAUTHENTICATION)){				getPrintStream().println("Error password couldn't be verified");			}else				if(reissueResultType.getResultMinor().equals(XKMSConstants.RESULTMINOR_REFUSED)){					getPrintStream().println("The user doesn't seem to have the wrong status.");				}else{					getPrintStream().println("Error occured during processing : " + reissueResultType.getResultMinor());				}	}		/**	 * Returns the encoding that the data should be written in	 * @return	 */	private String useEncoding(String arg){				if(arg.equalsIgnoreCase(ENCODING_P12)){			return ENCODING_P12;		}				if(arg.equalsIgnoreCase(ENCODING_JKS)){			return ENCODING_JKS;		}				getPrintStream().println("Illegal encoding (should be p12 or jks) : " + arg);        usage();    	System.exit(-1);    	return null;	}		protected void usage() {		getPrintStream().println("Command used to reissue an existing certificate");		getPrintStream().println("Usage : reissue <keystore> <alias> <keypass> <authenticationpassword> <p12|jks> <outputpath (optional)> \n\n");		getPrintStream().println("Keystore is the p12 or jks about to be renewed.\n");		getPrintStream().println("alias of the key in the keystore (use 'NOALIAS' for p12).\n");		getPrintStream().println("keypass is the password to unlock the keystore.\n");		getPrintStream().println("authenticationpassword is the password used to authenticate against the XKMS service.\n");        getPrintStream().println("Use p12 or jks for encoding of the generated keystore.\n");        getPrintStream().println("Outputpath specifies to which directory to write the new keystore to, current directory is used if omitted\n\n");        getPrintStream().println("Example: reissue oldkey.p12 NOALIAS foo123 xkmspassword  p12");        getPrintStream().println("Generates a new keystore using the keys in the oldkey.p12");                    	        	}}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -