protected char[] getPassword(Exchange exchange) throws CryptoCmsException { if (password != null) { return password; } String pw = null; if (getKeyStoreParameters() != null) { pw = getKeyStoreParameters().getPassword(); } if (pw == null) { throw new CryptoCmsException("No password for accessing the private key from the keystore found for the singer infor " + this); } return pw.toCharArray(); }
private void configureSslForHttp4() { KeyStoreParameters trust_ksp = new KeyStoreParameters(); trust_ksp.setResource("c:\\Projects\\blah\\fakeca.jks"); trust_ksp.setPassword("123456"); TrustManagersParameters trustp = new TrustManagersParameters(); trustp.setKeyStore(trust_ksp); SSLContextParameters scp = new SSLContextParameters(); scp.setTrustManagers(trustp); HttpComponent httpComponent = getContext().getComponent("https4", HttpComponent.class); httpComponent.setSslContextParameters(scp); }
/** * Sets the KeyStore that can contain keys and Certficates for use in * signing and verifying exchanges based on the given KeyStoreParameters. * A {@link KeyStore} is typically used * with an alias, either one supplied in the Route definition or dynamically * via the message header "CamelSignatureKeyStoreAlias". If no alias is * supplied and there is only a single entry in the Keystore, then this * single entry will be used. */ public void setKeyStoreParameters(KeyStoreParameters keyStoreParameters) throws Exception { this.keyStoreParameters = keyStoreParameters; if (keyStoreParameters != null) { this.keystore = keyStoreParameters.createKeyStore(); } }
KeyStoreParameters ksp = new KeyStoreParameters(); ksp.setResource(resourceName(sslConfig.getKeyStore())); ksp.setPassword(sslConfig.getKeyStorePassword()); ksp.setProvider(sslConfig.getKeyStoreProvider()); ksp.setType(sslConfig.getKeyStoreType()); KeyManagersParameters kmp = new KeyManagersParameters(); kmp.setKeyStore(ksp); KeyStoreParameters tsp = new KeyStoreParameters(); tsp.setResource(resourceName(sslConfig.getTrustStore())); tsp.setPassword(sslConfig.getTrustStorePassword()); tsp.setProvider(sslConfig.getTrustStoreProvider()); tsp.setType(sslConfig.getTrustStoreType()); TrustManagersParameters tmp = new TrustManagersParameters(); tmp.setKeyStore(tsp);
ObjectHelper.notNull(sslParameters.getTrustManagers().getKeyStore().getResource(), "Trust store path"); ObjectHelper.notNull(sslParameters.getTrustManagers().getKeyStore().getPassword(), "Trust store password"); : sslParameters.getCipherSuites().getCipherSuite().stream().toArray(String[]::new)); if (ObjectHelper.isNotEmpty(sslParameters.getTrustManagers().getProvider()) && ObjectHelper.isNotEmpty(sslParameters.getTrustManagers().getKeyStore().getType())) { sslParams.setTrustStore(sslParameters.getTrustManagers().getKeyStore().getResource(), sslParameters.getTrustManagers().getKeyStore().getPassword(), sslParameters.getTrustManagers().getProvider(), sslParameters.getTrustManagers().getKeyStore().getType()); } else { sslParams.setTrustStore(sslParameters.getTrustManagers().getKeyStore().getResource(), sslParameters.getTrustManagers().getKeyStore().getPassword());
ObjectHelper.notNull(sslParameters.getKeyManagers().getKeyStore().getResource(), "Keystore path"); ObjectHelper.notNull(sslParameters.getKeyManagers().getKeyStore().getPassword(), "Keystore password"); : sslParameters.getCipherSuites().getCipherSuite().stream().toArray(String[]::new)); if (ObjectHelper.isNotEmpty(sslParameters.getKeyManagers().getKeyStore().getProvider()) && ObjectHelper.isNotEmpty(sslParameters.getKeyManagers().getKeyStore().getType())) { sslParams.setKeyStore(sslParameters.getKeyManagers().getKeyStore().getResource(), sslParameters.getKeyManagers().getKeyStore().getPassword(), sslParameters.getKeyManagers().getKeyStore().getProvider(), sslParameters.getKeyManagers().getKeyStore().getType()); } else { sslParams.setKeyStore(sslParameters.getKeyManagers().getKeyStore().getResource(), sslParameters.getKeyManagers().getKeyStore().getPassword());
addPropertyIfNotNull(props, SslConfigs.SSL_KEYSTORE_TYPE_CONFIG, keyStore.getType()); addPropertyIfNotNull(props, SslConfigs.SSL_KEYSTORE_LOCATION_CONFIG, keyStore.getResource()); addPropertyIfNotNull(props, SslConfigs.SSL_KEYSTORE_PASSWORD_CONFIG, keyStore.getPassword()); addPropertyIfNotNull(props, SslConfigs.SSL_TRUSTSTORE_TYPE_CONFIG, keyStore.getType()); addPropertyIfNotNull(props, SslConfigs.SSL_TRUSTSTORE_LOCATION_CONFIG, keyStore.getResource()); addPropertyIfNotNull(props, SslConfigs.SSL_KEYSTORE_PASSWORD_CONFIG, keyStore.getPassword());
private void configureSslForJetty() { KeyStoreParameters ksp = new KeyStoreParameters(); ksp.setResource("c:\\Projects\\blah\\fakefilter.jks"); ksp.setPassword("123456"); KeyManagersParameters kmp = new KeyManagersParameters(); kmp.setKeyStore(ksp); kmp.setKeyPassword("export-password"); SSLContextParameters scp = new SSLContextParameters(); scp.setKeyManagers(kmp); JettyHttpComponent jettyComponent = getContext().getComponent("jetty", JettyHttpComponent.class); jettyComponent.setSslContextParameters(scp); }
protected char[] getPassword(Exchange exchange) throws CryptoCmsException { if (password == null) { if (getKeyStoreParameters() != null) { String passwordS = getKeyStoreParameters().getPassword(); if (passwordS == null) { throw new CryptoCmsException("Password for private keys not configured"); } else { return passwordS.toCharArray(); } } else { throw new CryptoCmsException("Password for private keys not configured"); } } else { return password; } }
/** * Keystore containing signer private keys, verifier public keys, encryptor * public keys, decryptor private keys depending on the operation. Use * either this parameter or the parameter 'keystore'. */ public void setKeyStoreParameters(KeyStoreParameters keyStoreParameters) throws CryptoCmsException { this.keyStoreParameters = keyStoreParameters; if (keyStoreParameters != null) { try { this.keyStore = keyStoreParameters.createKeyStore(); } catch (GeneralSecurityException | IOException e) { throw new CryptoCmsException("Problem during generating the keystore", e); } } }
context.addRoutes(new RouteBuilder() { private void configurate(){ KeyStoreParameters trust_ksp = new KeyStoreParameters(); trust_ksp.setResource("keystore/keystore.jks"); trust_ksp.setPassword("qweqwe"); TrustManagersParameters trustp = new TrustManagersParameters(); trustp.setKeyStore(trust_ksp);