Example usage for java.security KeyPair getPrivate

List of usage examples for java.security KeyPair getPrivate

Introduction

In this page you can find the example usage for java.security KeyPair getPrivate.

Prototype

public PrivateKey getPrivate() 

Source Link

Document

Returns a reference to the private key component of this key pair.

Usage

From source file:com.aaasec.sigserv.cssigapp.KeyStoreFactory.java

/**
 * Add the private key and the certificate chain to the key store.
 *///from  ww  w. java2  s .c om
public void addToKeyStore(KeyPair keyPair, X509Certificate[] chain, String alias, KeyStore key_store,
        char[] KS_PASSWORD) throws KeyStoreException {
    key_store.setKeyEntry(alias, keyPair.getPrivate(), KS_PASSWORD, chain);
}

From source file:org.apache.nifi.toolkit.tls.standalone.TlsToolkitStandaloneTest.java

private X509Certificate checkLoadCertPrivateKey(String algorithm)
        throws IOException, NoSuchAlgorithmException, InvalidKeySpecException, CertificateException {
    KeyPair keyPair = TlsHelperTest.loadKeyPair(new File(tempDir, TlsToolkitStandalone.NIFI_KEY + ".key"));

    assertEquals(algorithm, keyPair.getPrivate().getAlgorithm());
    assertEquals(algorithm, keyPair.getPublic().getAlgorithm());

    X509Certificate x509Certificate = TlsHelperTest
            .loadCertificate(new File(tempDir, TlsToolkitStandalone.NIFI_CERT + ".pem"));
    assertEquals(keyPair.getPublic(), x509Certificate.getPublicKey());
    return x509Certificate;
}

From source file:com.aqnote.shared.cryptology.cert.gen.CertGenerator.java

public X509Certificate createClass3EndCert(long sno, X500Name sdn, Map<String, String> exts, PublicKey pubKey,
        KeyPair pKeyPair) throws Exception {
    PublicKey pPubKey = pKeyPair.getPublic();
    PrivateKey pPrivKey = pKeyPair.getPrivate();

    X500Name idn = X500NameUtil.createClass3CaPrincipal();
    BigInteger _sno = BigInteger.valueOf(sno <= 0 ? System.currentTimeMillis() : sno);
    Date nb = new Date(System.currentTimeMillis() - HALF_DAY);
    Date na = new Date(nb.getTime() + FIVE_YEAR);

    X509v3CertificateBuilder certBuilder = new JcaX509v3CertificateBuilder(idn, _sno, nb, na, sdn, pubKey);

    addSubjectKID(certBuilder, pubKey);//  w  ww . jav  a  2s.  com
    addAuthorityKID(certBuilder, pPubKey);
    certBuilder.addExtension(Extension.extendedKeyUsage, false, new ExtendedKeyUsage(MOST_EKU));
    certBuilder.addExtension(Extension.keyUsage, false, new KeyUsage(END_KEY_USAGE));
    if (exts != null) {
        Set<String> key = exts.keySet();
        for (Iterator<String> it = key.iterator(); it.hasNext();) {
            String oid = it.next();
            String value = exts.get(oid);
            if (!StringUtils.isBlank(value)) {
                certBuilder.addExtension(new ASN1ObjectIdentifier(oid), false,
                        new DEROctetString(value.getBytes()));
            }
        }
    }

    X509Certificate certificate = signCert(certBuilder, pPrivKey);
    certificate.checkValidity(new Date());
    certificate.verify(pPubKey);

    setPKCS9Info(certificate);

    return certificate;
}

From source file:com.aqnote.shared.encrypt.cert.gen.BCCertGenerator.java

public X509Certificate createClass3EndCert(long sno, X500Name sdn, Map<String, String> exts, KeyPair keyPair,
        KeyPair pKeyPair) throws Exception {
    PublicKey pPubKey = pKeyPair.getPublic();
    PrivateKey pPrivKey = pKeyPair.getPrivate();

    X500Name idn = X500NameUtil.createClass3RootPrincipal();
    BigInteger _sno = BigInteger.valueOf(sno <= 0 ? System.currentTimeMillis() : sno);
    Date nb = new Date(System.currentTimeMillis() - HALF_DAY);
    Date na = new Date(nb.getTime() + FIVE_YEAR);
    PublicKey pubKey = keyPair.getPublic();

    X509v3CertificateBuilder certBuilder = new JcaX509v3CertificateBuilder(idn, _sno, nb, na, sdn, pubKey);

    addSubjectKID(certBuilder, pubKey);//from  ww w  .  java2  s.  com
    addAuthorityKID(certBuilder, pPubKey);
    certBuilder.addExtension(Extension.extendedKeyUsage, false, new ExtendedKeyUsage(MOST_EKU));
    certBuilder.addExtension(Extension.keyUsage, false, new KeyUsage(END_KEY_USAGE));
    if (exts != null) {
        Set<String> key = exts.keySet();
        for (Iterator<String> it = key.iterator(); it.hasNext();) {
            String oid = it.next();
            String value = exts.get(oid);
            if (!StringUtils.isBlank(value)) {
                certBuilder.addExtension(new ASN1ObjectIdentifier(oid), false,
                        new DEROctetString(value.getBytes()));
            }
        }
    }

    X509Certificate certificate = signCert(certBuilder, pPrivKey);
    certificate.checkValidity(new Date());
    certificate.verify(pPubKey);

    setPKCS9Info(certificate);

    return certificate;
}

From source file:org.ejbca.core.protocol.ws.client.NestedCrmfRequestTestCommand.java

private void init(String args[]) {

    FileInputStream file_inputstream;
    try {// w w w  .j a v  a2  s. com
        String pwd = args[ARG_KEYSTOREPASSWORD];
        String certNameInKeystore = args[ARG_CERTNAMEINKEYSTORE];
        file_inputstream = new FileInputStream(args[ARG_KEYSTOREPATH]);
        KeyStore keyStore = KeyStore.getInstance("PKCS12");
        keyStore.load(file_inputstream, pwd.toCharArray());
        System.out.println("Keystore size " + keyStore.size());
        Enumeration aliases = keyStore.aliases();
        while (aliases.hasMoreElements()) {
            System.out.println(aliases.nextElement());
        }
        Key key = keyStore.getKey(certNameInKeystore, pwd.toCharArray());
        getPrintStream().println("Key information " + key.getAlgorithm() + " " + key.getFormat());
        PKCS8EncodedKeySpec keySpec = new PKCS8EncodedKeySpec(key.getEncoded());
        KeyFactory keyFactory = KeyFactory.getInstance("RSA");
        innerSignKey = keyFactory.generatePrivate(keySpec);
        innerCertificate = keyStore.getCertificate(certNameInKeystore);
    } catch (FileNotFoundException e2) {
        e2.printStackTrace();
    } catch (KeyStoreException e) {
        e.printStackTrace();
    } catch (NoSuchAlgorithmException e) {
        e.printStackTrace();
    } catch (CertificateException e) {
        e.printStackTrace();
    } catch (IOException e) {
        e.printStackTrace();
    } catch (UnrecoverableKeyException e) {
        e.printStackTrace();
    } catch (InvalidKeySpecException e) {
        e.printStackTrace();
    }

    try {
        KeyPair outerSignKeys = KeyTools.genKeys("1024", "RSA");
        outerSignKey = outerSignKeys.getPrivate();
        X509Certificate signCert = CertTools.genSelfCert("CN=cmpTest,C=SE", 5000, null,
                outerSignKeys.getPrivate(), outerSignKeys.getPublic(),
                PKCSObjectIdentifiers.sha256WithRSAEncryption.getId(), true, "BC");

        writeCertificate(signCert, "/opt/racerts", "cmpTest.pem");

        /*
        ArrayList<Certificate> certCollection = new ArrayList<Certificate>();
        certCollection.add(signCert);
        byte[] pemRaCert = CertTools.getPEMFromCerts(certCollection);
                
        FileOutputStream out = new FileOutputStream(new File("/opt/racerts/cmpStressTest.pem"));
        out.write(pemRaCert);
        out.close();
        */
    } catch (NoSuchAlgorithmException e1) {
        e1.printStackTrace();
    } catch (NoSuchProviderException e1) {
        e1.printStackTrace();
    } catch (InvalidAlgorithmParameterException e1) {
        e1.printStackTrace();
    } catch (InvalidKeyException e) {
        e.printStackTrace();
    } catch (CertificateEncodingException e) {
        e.printStackTrace();
    } catch (SignatureException e) {
        e.printStackTrace();
    } catch (IllegalStateException e) {
        e.printStackTrace();
        //} catch (FileNotFoundException e) {
        //   e.printStackTrace();
        //} catch (IOException e) {
        //   e.printStackTrace();
        //} catch (CertificateException e) {
        //   e.printStackTrace();
    }

}

From source file:org.cesecore.audit.log.SecurityEventsLoggerSessionBeanTest.java

@Test
public void test08Authorization() throws Exception {
    KeyPair keys = KeyTools.genKeys("512", AlgorithmConstants.KEYALGORITHM_RSA);
    X509Certificate certificate = CertTools.genSelfCert(
            "C=SE,O=Test,CN=Test SecurityEventsLoggerSessionTestNoAuth", 365, null, keys.getPrivate(),
            keys.getPublic(), AlgorithmConstants.SIGALG_SHA1_WITH_RSA, true);

    Set<X509Certificate> credentials = new HashSet<X509Certificate>();
    credentials.add(certificate);/*from  ww w .ja  v  a2  s . c o m*/
    Set<X500Principal> principals = new HashSet<X500Principal>();
    principals.add(certificate.getSubjectX500Principal());

    AuthenticationToken adminTokenNoAuth = new X509CertificateAuthenticationToken(principals, credentials);

    try {
        securityEventsLogger.log(adminTokenNoAuth, EventTypes.AUTHENTICATION, EventStatus.SUCCESS,
                ModuleTypes.AUTHENTICATION, ServiceTypes.CORE);
        fail("should throw");
    } catch (AuthorizationDeniedException e) {
        // NOPMD: ignore this is what we want
    }
}

From source file:com.thoughtworks.go.security.X509CertificateGenerator.java

public Registration createCertificateWithDn(String dn) {
    KeyPair keypair = generateKeyPair();
    Date epoch = new Date(0);
    X509Certificate certificate = createTypeOneX509Certificate(epoch, dn, keypair);
    return new Registration(keypair.getPrivate(), certificate);
}

From source file:fi.okm.mpass.idp.authn.impl.ValidateOIDCIDTokenSignatureTest.java

/**
 * Tests with valid signature, with no kid defined.
 *//*from   w ww.j ava 2 s  .  c  om*/
@Test
public void testValidSignatureTokenNoKid() throws Exception {
    action.initialize();
    final SocialUserOpenIdConnectContext suCtx = new SocialUserOpenIdConnectContext();
    suCtx.setoIDCProviderMetadata(initializeMockMetadata());

    final KeyPair keyPair = generateKeyPair(2048);
    final RSAPrivateKey privateKey = (RSAPrivateKey) keyPair.getPrivate();

    final OIDCTokenResponse oidcTokenResponse = buildTokenResponse(privateKey, null);

    suCtx.setOidcTokenResponse(oidcTokenResponse);
    prc.getSubcontext(AuthenticationContext.class, false).addSubcontext(suCtx);
    final Event event = executeWithServer(action, null, buildRsaKey(generateKeyPair(2048), "wrongOne"),
            buildRsaKey(keyPair, "mockId"));
    ActionTestingSupport.assertEvent(event, AuthnEventIds.NO_CREDENTIALS);
}

From source file:fi.okm.mpass.idp.authn.impl.ValidateOIDCIDTokenSignatureTest.java

/**
 * Tests with valid signature, with matching kid defined.
 *///www  .j  av  a  2  s .  c  o  m
@Test
public void testValidSignatureTokenKid() throws Exception {
    action.initialize();
    final SocialUserOpenIdConnectContext suCtx = new SocialUserOpenIdConnectContext();
    suCtx.setoIDCProviderMetadata(initializeMockMetadata());

    final KeyPair keyPair = generateKeyPair(2048);
    final RSAPrivateKey privateKey = (RSAPrivateKey) keyPair.getPrivate();

    final String kid = "mockId";
    final OIDCTokenResponse oidcTokenResponse = buildTokenResponse(privateKey, kid);

    suCtx.setOidcTokenResponse(oidcTokenResponse);
    prc.getSubcontext(AuthenticationContext.class, false).addSubcontext(suCtx);
    final Event event = executeWithServer(action, null, buildRsaKey(generateKeyPair(2048), "wrongOne"),
            buildRsaKey(keyPair, kid));
    Assert.assertNull(event);
}

From source file:com.aqnote.shared.cryptology.cert.gen.CertGenerator.java

private X509Certificate createEndCert(X500Name subject, PublicKey pubKey, KeyPair pKeyPair, X500Name issuer)
        throws Exception {

    PublicKey pPubKey = pKeyPair.getPublic();
    PrivateKey pPrivKey = pKeyPair.getPrivate();

    BigInteger sno = BigInteger.valueOf(System.currentTimeMillis());
    Date nb = new Date(System.currentTimeMillis() - HALF_DAY);
    Date na = new Date(nb.getTime() + FIVE_YEAR);

    X509v3CertificateBuilder certBuilder = new JcaX509v3CertificateBuilder(issuer, sno, nb, na, subject,
            pubKey);/*from  ww  w. java2s  . co  m*/

    addSubjectKID(certBuilder, pubKey);
    addAuthorityKID(certBuilder, pPubKey);
    certBuilder.addExtension(Extension.extendedKeyUsage, false, new ExtendedKeyUsage(BASE_EKU));
    certBuilder.addExtension(Extension.keyUsage, false, new KeyUsage(END_KEY_USAGE));

    X509Certificate certificate = signCert(certBuilder, pPrivKey);
    certificate.checkValidity(new Date());
    certificate.verify(pPubKey);

    setPKCS9Info(certificate);

    return certificate;
}