public abstract class CMPCredentialReader extends CredentialReader
| Modifier and Type | Field and Description |
|---|---|
static int |
DSASignature
Deprecated.
as of JTK 7.0 the algorithm of the signing key pair is always
extracted from the user's policy settings.
|
static int |
ECDSASignature
Deprecated.
as of JTK 7.0 the algorithm of the signing key pair is always
extracted from the user's policy settings.
|
static int |
PKIX4Version
Deprecated.
as of JTK 7.0 proto-PKIX is no longer supported; instead PKIX-CMP
is always used for communication with the Security Manager
|
static int |
PKIX5Version
Deprecated.
as of JTK 7.0 proto-PKIX is no longer supported; instead PKIX-CMP
is always used for communication with the Security Manager
|
static int |
RSASignature
Deprecated.
as of JTK 7.0 the algorithm of the signing key pair is always
extracted from the user's policy settings.
|
| Constructor and Description |
|---|
CMPCredentialReader() |
| Modifier and Type | Method and Description |
|---|---|
void |
setClientKeyGenParams(java.security.spec.AlgorithmParameterSpec params)
Sets the client key generation parameters.
|
void |
setForceV1KeyPair(boolean v1KeyPair)
Allows the caller to force the PKIX-CMP user creation or recovery operation
to be done using the V1-key-pair implementation of the protocol (typically
used by V1-key-pair clients).
|
checkPwd, getTypepublic static final int RSASignature
public static final int DSASignature
public static final int ECDSASignature
public static final int PKIX4Version
public static final int PKIX5Version
public final void setForceV1KeyPair(boolean v1KeyPair)
The terminology V1-key-pair and V2-key-pair only applies to users created against an Entrust Authority Security Manager (EASM), whose digital identity exists in Entrust format (Entrust Profile (EPF), Entrust format on a smart card or token, or Entrust format in the Microsoft CryptoAPI repository). These terms are defined as follows:
By default, with this version of the Toolkit, user creation and recovery is always done as V2-key-pair when communicating with a 7.0 (or later) EASM and as V1-key-pair when communicating with a pre-7.0 EASM. Thus, this version of the Toolkit is considered a V2-key-pair client. However, this API permits the default behaviour to be over-ridden.
For creation, this API will force the user to be created as a V1-key-pair user. However, for recovery, this API can only attempt to force the user to be recovered as a V1-key-pair user. The EASM will not permit a user that exists as V2-key-pair to be recovered as a V1-key-pair user. If this is attempted with a V2-key-pair user, the recovery operation will fail with an exception whose root cause message will look something similar to the following:
If the intention is to simply recover the user while maintaining the existing
key pair version, setPreserveUserKeyPairVersion should be used.
v1KeyPair - indicates whether or not the PKIX-CMP creation or recovery operation
must be done as V1-key-pairpublic final void setClientKeyGenParams(java.security.spec.AlgorithmParameterSpec params)
When set, the indicated client key generation parameters will be used during the generation of any client-generated user keys for which the parameters match the key type (algorithm) For example, users with client-generated elliptic curve (EC) key pairs may wish to specify a custom curve. This can done by calling this method with a set of EC parameters, indicating the custom curve to be used. However, these parameters will apply to all the user's EC key pairs; if the user has two client-generated EC key pairs, both will be generated using the provided EC parameters.
Currently, this is only supported for the following key types (as indicated by Entrust policy at the Security Manager):
ECParameters,
EcParameterSpecWithName, or
java.security.spec.ECGenParameterSpecparams - client specified key generation parametersjava.lang.IllegalArgumentException - if the key generation parameters are an unsupported type