Lines Matching defs:alias

114     private String alias = null;
168 CHANGEALIAS("Changes.an.entry.s.alias",
256 ALIAS("alias", "<alias>", "alias.name.of.the.entry.to.process"),
257 DESTALIAS("destalias", "<destalias>", "destination.alias"),
284 SRCALIAS("srcalias", "<srcalias>", "source.alias"),
463 } else if (collator.compare(flags, "-alias") == 0 ||
465 alias = args[++i];
750 ("Must.specify.destination.alias"));
754 if (command == DELETE && alias == null) {
755 alias = getAlias(null);
756 if ("".equals(alias)) {
757 throw new Exception(rb.getString("Must.specify.alias"));
929 doCertReq(alias, sigAlgName, out);
943 doDeleteEntry(alias);
953 doExportCert(alias, out);
969 doGenKeyPair(alias, dname, keyAlgName, keysize, sigAlgName);
975 doGenSecretKey(alias, keyAlgName, keysize);
994 String importAlias = (alias!=null)?alias:keyAlias;
1030 if (alias == null) {
1031 alias = keyAlias;
1033 if (keyStore.containsAlias(alias) == false) {
1035 (rb.getString("Alias.alias.does.not.exist"));
1036 Object[] source = {alias};
1039 if (!keyStore.entryInstanceOf(alias, KeyStore.PrivateKeyEntry.class)) {
1041 "Alias.alias.references.an.entry.type.that.is.not.a.private.key.entry.The.keyclone.command.only.supports.cloning.of.private.key"));
1042 Object[] source = {alias};
1046 doCloneEntry(alias, dest, true); // Now everything can be cloned
1049 if (alias == null) {
1050 alias = keyAlias;
1052 doCloneEntry(alias, dest, false);
1054 if (keyStore.containsAlias(alias)) {
1055 doDeleteEntry(alias);
1060 doChangeKeyPasswd(alias);
1063 if (alias != null) {
1064 doPrintEntry(alias, out, true);
1071 doSelfCert(alias, dname, sigAlgName);
1080 if (alias == null) {
1081 alias = keyAlias;
1093 doGenCert(alias, sigAlgName, inStream, out);
1103 if (alias == null) {
1104 alias = keyAlias;
1162 * certificate to out. Use alias as CA, sigAlgName as the signature
1165 private void doGenCert(String alias, String sigAlgName, InputStream in, PrintStream out)
1169 Certificate signerCert = keyStore.getCertificate(alias);
1184 (PrivateKey)recoverKey(alias, storePass, keyPass).fst;
1243 for (Certificate ca: keyStore.getCertificateChain(alias)) {
1258 Certificate signerCert = keyStore.getCertificate(alias);
1274 (PrivateKey)recoverKey(alias, storePass, keyPass).fst;
1305 * keys (and name) associated with a given alias.
1307 private void doCertReq(String alias, String sigAlgName, PrintStream out)
1310 if (alias == null) {
1311 alias = keyAlias;
1314 Pair<Key,char[]> objs = recoverKey(alias, storePass, keyPass);
1320 Certificate cert = keyStore.getCertificate(alias);
1323 (rb.getString("alias.has.no.public.key.certificate."));
1324 Object[] source = {alias};
1352 private void doDeleteEntry(String alias) throws Exception {
1353 if (keyStore.containsAlias(alias) == false) {
1355 (rb.getString("Alias.alias.does.not.exist"));
1356 Object[] source = {alias};
1359 keyStore.deleteEntry(alias);
1365 private void doExportCert(String alias, PrintStream out)
1372 if (alias == null) {
1373 alias = keyAlias;
1375 if (keyStore.containsAlias(alias) == false) {
1377 (rb.getString("Alias.alias.does.not.exist"));
1378 Object[] source = {alias};
1382 X509Certificate cert = (X509Certificate)keyStore.getCertificate(alias);
1385 (rb.getString("Alias.alias.has.no.certificate"));
1386 Object[] source = {alias};
1394 * @param alias the entry we will set password for
1398 private char[] promptForKeyPass(String alias, String orig, char[] origPass) throws Exception{
1406 ("Enter.key.password.for.alias."));
1407 Object[] source = {alias};
1453 private void doGenSecretKey(String alias, String keyAlgName,
1457 if (alias == null) {
1458 alias = keyAlias;
1460 if (keyStore.containsAlias(alias)) {
1462 ("Secret.key.not.generated.alias.alias.already.exists"));
1463 Object[] source = {alias};
1482 keyPass = promptForKeyPass(alias, null, storePass);
1484 keyStore.setKeyEntry(alias, secKey, keyPass, null);
1507 private void doGenKeyPair(String alias, String dname, String keyAlgName,
1521 if (alias == null) {
1522 alias = keyAlias;
1525 if (keyStore.containsAlias(alias)) {
1527 ("Key.pair.not.generated.alias.alias.already.exists"));
1528 Object[] source = {alias};
1573 keyPass = promptForKeyPass(alias, null, storePass);
1575 keyStore.setKeyEntry(alias, privKey, keyPass, chain);
1580 * @param orig original alias
1581 * @param dest destination alias
1593 (rb.getString("Destination.alias.dest.already.exists"));
1620 private void doChangeKeyPasswd(String alias) throws Exception
1623 if (alias == null) {
1624 alias = keyAlias;
1626 Pair<Key,char[]> objs = recoverKey(alias, storePass, keyPass);
1634 (rb.getString("key.password.for.alias."));
1635 Object[] source = {alias};
1638 keyStore.setKeyEntry(alias, privKey, keyPassNew,
1639 keyStore.getCertificateChain(alias));
1645 * alias (which references a keystore entry), and aliases must be unique.
1657 private void doPrintEntry(String alias, PrintStream out,
1666 if (keyStore.containsAlias(alias) == false) {
1668 (rb.getString("Alias.alias.does.not.exist"));
1669 Object[] source = {alias};
1675 (rb.getString("Alias.name.alias"));
1676 Object[] source = {alias};
1681 ("Creation.date.keyStore.getCreationDate.alias."));
1682 Object[] src = {keyStore.getCreationDate(alias)};
1688 (rb.getString("alias.keyStore.getCreationDate.alias."));
1689 Object[] source = {alias, keyStore.getCreationDate(alias)};
1693 (rb.getString("alias."));
1694 Object[] source = {alias};
1699 if (keyStore.entryInstanceOf(alias, KeyStore.SecretKeyEntry.class)) {
1707 } else if (keyStore.entryInstanceOf(alias, KeyStore.PrivateKeyEntry.class)) {
1717 Certificate[] chain = keyStore.getCertificateChain(alias);
1742 } else if (keyStore.entryInstanceOf(alias,
1745 Certificate cert = keyStore.getCertificate(alias);
1855 * keep alias unchanged if no name conflict, otherwise, prompt.
1860 if (alias != null) {
1861 doImportKeyStoreSingle(loadSourceKeyStore(), alias);
1865 "if.alias.not.specified.destalias.srckeypass.and.destkeypass.must.not.be.specified"));
1879 * Import a single entry named alias from srckeystore
1881 * 0 if user choose to ignore an alias-dumplicated entry
1884 private int doImportKeyStoreSingle(KeyStore srckeystore, String alias)
1887 String newAlias = (dest==null) ? alias : dest;
1890 Object[] source = {alias};
1893 "Warning.Overwriting.existing.alias.alias.in.destination.keystore")).format(source));
1896 "Existing.entry.alias.alias.exists.overwrite.no.")).format(source));
1899 ("Enter.new.alias.name.RETURN.to.cancel.import.for.this.entry."));
1902 "Entry.for.alias.alias.not.imported.")).format(
1910 Pair<Entry,char[]> objs = recoverEntry(srckeystore, alias, srcstorePass, srckeyPass);
1929 Object[] source2 = {alias, kse.toString()};
1931 "Problem.importing.entry.for.alias.alias.exception.Entry.for.alias.alias.not.imported."));
1943 String alias = e.nextElement();
1944 int result = doImportKeyStoreSingle(srckeystore, alias);
1947 Object[] source = {alias};
1948 MessageFormat form = new MessageFormat(rb.getString("Entry.for.alias.alias.successfully.imported."));
1995 String alias = e.nextElement();
1996 doPrintEntry(alias, out, false);
2159 out.println("WARNING: not verified. Make sure -keystore and -alias are correct.");
2435 private void doSelfCert(String alias, String dname, String sigAlgName)
2438 if (alias == null) {
2439 alias = keyAlias;
2442 Pair<Key,char[]> objs = recoverKey(alias, storePass, keyPass);
2453 Certificate oldCert = keyStore.getCertificate(alias);
2456 (rb.getString("alias.has.no.public.key"));
2457 Object[] source = {alias};
2462 (rb.getString("alias.has.no.X.509.certificate"));
2463 Object[] source = {alias};
2528 keyStore.setKeyEntry(alias, privKey,
2553 private boolean installReply(String alias, InputStream in)
2556 if (alias == null) {
2557 alias = keyAlias;
2560 Pair<Key,char[]> objs = recoverKey(alias, storePass, keyPass);
2566 Certificate userCert = keyStore.getCertificate(alias);
2569 (rb.getString("alias.has.no.public.key.certificate."));
2570 Object[] source = {alias};
2586 newChain = validateReply(alias, userCert, replyCerts);
2592 keyStore.setKeyEntry(alias, privKey,
2606 private boolean addTrustedCert(String alias, InputStream in)
2609 if (alias == null) {
2610 throw new Exception(rb.getString("Must.specify.alias"));
2612 if (keyStore.containsAlias(alias)) {
2614 ("Certificate.not.imported.alias.alias.already.exists"));
2615 Object[] source = {alias};
2637 keyStore.setCertificateEntry(alias, cert);
2646 ("Certificate.already.exists.in.keystore.under.alias.trustalias."));
2655 ("Certificate.already.exists.in.system.wide.CA.keystore.under.alias.trustalias."));
2671 keyStore.setCertificateEntry(alias, cert);
2682 keyStore.setCertificateEntry(alias, cert);
2692 keyStore.setCertificateEntry(alias, cert);
2755 * Prompts user for alias name.
2756 * @param prompt the {0} of "Enter {0} alias name: " in prompt line
2762 (rb.getString("Enter.prompt.alias.name."));
2766 System.err.print(rb.getString("Enter.alias.name."));
2787 private char[] getKeyPasswd(String alias, String otherAlias,
2797 ("Enter.key.password.for.alias."));
2798 Object[] source = {alias};
2807 ("Enter.key.password.for.alias."));
2808 Object[] source = {alias};
3072 * Recovers (private) key associated with given alias.
3078 private Pair<Key,char[]> recoverKey(String alias, char[] storePass,
3084 if (keyStore.containsAlias(alias) == false) {
3086 (rb.getString("Alias.alias.does.not.exist"));
3087 Object[] source = {alias};
3090 if (!keyStore.entryInstanceOf(alias, KeyStore.PrivateKeyEntry.class) &&
3091 !keyStore.entryInstanceOf(alias, KeyStore.SecretKeyEntry.class)) {
3093 (rb.getString("Alias.alias.has.no.key"));
3094 Object[] source = {alias};
3101 key = keyStore.getKey(alias, storePass);
3108 keyPass = getKeyPasswd(alias, null, null);
3109 key = keyStore.getKey(alias, keyPass);
3115 key = keyStore.getKey(alias, keyPass);
3122 * Recovers entry associated with given alias.
3129 String alias,
3133 if (ks.containsAlias(alias) == false) {
3135 (rb.getString("Alias.alias.does.not.exist"));
3136 Object[] source = {alias};
3147 entry = ks.getEntry(alias, pp);
3164 entry = ks.getEntry(alias, pp);
3172 entry = ks.getEntry(alias, pp);
3185 pkey = getKeyPasswd(alias, null, null);
3187 entry = ks.getEntry(alias, pp);
3226 * @param alias the alias name
3227 * @param userCert the user certificate of the alias
3230 private Certificate[] validateReply(String alias,
3247 ("Certificate.reply.does.not.contain.public.key.for.alias."));
3248 Object[] source = {alias};
3318 * @param userCert the user certificate of the alias
3499 String alias = aliases.nextElement();
3500 Certificate cert = ks.getCertificate(alias);