Refine search
String alias = customKeyManager.chooseClientAlias(keyType, issuers, socket); if( alias == null ) { alias = jvmKeyManager.chooseClientAlias(keyType, issuers, socket); logger.warn("Reverting to JVM CLIENT alias : " + alias); String alias = customKeyManager.chooseServerAlias(keyType, issuers, socket); if( alias == null ) { alias = jvmKeyManager.chooseServerAlias(keyType, issuers, socket); logger.warn("Reverting to JVM Server alias : " + alias); X509Certificate[] chain = customKeyManager.getCertificateChain(alias); if( chain == null || chain.length == 0) { logger.warn("Reverting to JVM Chain : " + alias); return jvmKeyManager.getCertificateChain(alias); } else { return chain; String[] cAliases = customKeyManager.getClientAliases(keyType, issuers); String[] jAliases = jvmKeyManager.getClientAliases(keyType, issuers); logger.warn("Supported Client Aliases Custom: " + cAliases.length + " JVM : " + jAliases.length); return ArrayUtils.join(cAliases,jAliases); PrivateKey key = customKeyManager.getPrivateKey(alias); if( key == null ) { logger.warn("Reverting to JVM Key : " + alias); return jvmKeyManager.getPrivateKey(alias); } else { return key;
if (algorithmName != null) { if (credentialCallback.isCredentialTypeSupported(X509CertificateChainPrivateCredential.class, algorithmName)) { final String alias = keyManager.chooseServerAlias(algorithmName, null, null); if (alias != null) { final X509Certificate[] certificateChain = keyManager.getCertificateChain(alias); final PrivateKey privateKey = keyManager.getPrivateKey(alias); if (certificateChain != null && certificateChain.length != 0) { credentialCallback.setCredential(new X509CertificateChainPrivateCredential(privateKey, certificateChain));
builder = SslContextBuilder.forServer(mgr.getPrivateKey(null), null, mgr.getCertificateChain(null)); } else { KeyManagerFactory keyMgrFactory = getKeyMgrFactory(vertx);
acceptableIssuers = null; final String alias = keyManager.chooseClientAlias(new String[] { allowedAlgorithm }, acceptableIssuers, null); if (alias != null) { final X509Certificate[] certificateChain = keyManager.getCertificateChain(alias); final PrivateKey privateKey = keyManager.getPrivateKey(alias); credentialCallback.setCredential(new X509CertificateChainPrivateCredential(privateKey, certificateChain)); continue;
public String chooseServerAlias( final String keyType, final Principal[] issuers, final Socket socket) { final Map<String, PrivateKeyDetails> validAliases = new HashMap<String, PrivateKeyDetails>(); final String[] aliases = this.keyManager.getServerAliases(keyType, issuers); if (aliases != null) { for (final String alias: aliases) { validAliases.put(alias, new PrivateKeyDetails(keyType, this.keyManager.getCertificateChain(alias))); } } return this.aliasStrategy.chooseAlias(validAliases, socket); }
/** * @see javax.net.ssl.X509KeyManager#getPrivateKey(java.lang.String) */ public PrivateKey getPrivateKey(String alias) { return keyManager.getPrivateKey(alias); }
public SslContext getContext(VertxInternal vertx, String serverName) { if (serverName == null) { if (sslContext == null) { TrustManagerFactory trustMgrFactory = null; try { trustMgrFactory = getTrustMgrFactory(vertx, null); } catch (Exception e) { throw new VertxException(e); } sslContext = createContext(vertx, null, trustMgrFactory); } return sslContext; } else { X509KeyManager mgr; try { mgr = keyCertOptions.keyManagerMapper(vertx).apply(serverName); } catch (Exception e) { throw new RuntimeException(e); } if (mgr == null) { return sslContext; } try { TrustManagerFactory trustMgrFactory = getTrustMgrFactory(vertx, serverName); return sslContextMap.computeIfAbsent(mgr.getCertificateChain(null)[0], s -> createContext(vertx, mgr, trustMgrFactory)); } catch (Exception e) { throw new VertxException(e); } } }
/** * @see javax.net.ssl.X509KeyManager#getClientAliases(java.lang.String, java.security.Principal[]) */ public String[] getClientAliases(String keyType, Principal[] issuers) { return keyManager.getClientAliases(keyType, issuers); }
private String chooseClientAlias(ReferenceCountedOpenSslEngine engine, String[] keyTypes, X500Principal[] issuer) { X509KeyManager manager = provider.keyManager(); if (manager instanceof X509ExtendedKeyManager) { return ((X509ExtendedKeyManager) manager).chooseEngineClientAlias(keyTypes, issuer, engine); } return manager.chooseClientAlias(keyTypes, issuer, null); }
/** * @see javax.net.ssl.X509KeyManager#getServerAliases(java.lang.String, java.security.Principal[]) */ public String[] getServerAliases(String keyType, Principal[] issuers) { return keyManager.getServerAliases(keyType, issuers); }
private String chooseServerAlias(ReferenceCountedOpenSslEngine engine, String type) { X509KeyManager manager = provider.keyManager(); if (manager instanceof X509ExtendedKeyManager) { return ((X509ExtendedKeyManager) manager).chooseEngineServerAlias(type, null, engine); } return manager.chooseServerAlias(type, null, null); } }
private boolean checkForPrivateKey(String keyType, Class<?> keyClass) { String alias = sslParameters.getKeyManager().chooseServerAlias(keyType, null, null); if (alias == null) { return false; } PrivateKey key = sslParameters.getKeyManager().getPrivateKey(alias); return (key != null && keyClass.isAssignableFrom(key.getClass())); } }
X509Certificate[] certificates = keyManager.getCertificateChain(alias); if (certificates == null || certificates.length == 0) { return null; PrivateKey key = keyManager.getPrivateKey(alias); PemEncoded encoded = PemX509Certificate.toPEM(allocator, true, certificates); long chainBio = 0;
@Override public String chooseServerAlias(final String keyType, final Principal[] issuers, final Socket socket) { final Map<String, PrivateKeyDetails> validAliases = new HashMap<String, PrivateKeyDetails>(); final String[] aliases = this.keyManager.getServerAliases(keyType, issuers); if (aliases != null) { for (final String alias: aliases) { validAliases.put(alias, new PrivateKeyDetails(keyType, this.keyManager.getCertificateChain(alias))); } } return this.aliasStrategy.chooseAlias(validAliases, socket); }
/** * Returns the key associated with the given alias. * * @param alias The alias name * * @return The requested key, or null if the alias can't be found */ public PrivateKey getPrivateKey(String alias) { return delegate.getPrivateKey(alias); } }
/** * @see javax.net.ssl.X509KeyManager#getCertificateChain(java.lang.String) */ public X509Certificate[] getCertificateChain(String alias) { return keyManager.getCertificateChain(alias); }
/** * Get the matching aliases for authenticating the client side of a secure socket, given the public key type and the * list of certificate issuer authorities recognized by the peer (if any). * * @param keyType The key algorithm type name * @param issuers The list of acceptable CA issuer subject names, or null if it does not matter which issuers are * used * * @return Array of the matching alias names, or null if there were no matches */ public String[] getClientAliases(String keyType, Principal[] issuers) { return delegate.getClientAliases(keyType, issuers); }
private String chooseClientAlias(ReferenceCountedOpenSslEngine engine, String[] keyTypes, X500Principal[] issuer) { X509KeyManager manager = provider.keyManager(); if (manager instanceof X509ExtendedKeyManager) { return ((X509ExtendedKeyManager) manager).chooseEngineClientAlias(keyTypes, issuer, engine); } return manager.chooseClientAlias(keyTypes, issuer, null); }
/** * Get the matching aliases for authenticating the server side of a secure socket, given the public key type and the * list of certificate issuer authorities recognized by the peer (if any). * * @param keyType The key algorithm type name * @param issuers The list of acceptable CA issuer subject names, or null if it does not matter which issuers are * used * * @return Array of the matching alias names, or null if there were no matches */ public String[] getServerAliases(String keyType, Principal[] issuers) { return delegate.getServerAliases(keyType, issuers); }
private String chooseServerAlias(ReferenceCountedOpenSslEngine engine, String type) { X509KeyManager manager = provider.keyManager(); if (manager instanceof X509ExtendedKeyManager) { return ((X509ExtendedKeyManager) manager).chooseEngineServerAlias(type, null, engine); } return manager.chooseServerAlias(type, null, null); } }