亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? httpgetcert.java

?? 一套JAVA的CA證書簽發系統.
?? JAVA
字號:
/************************************************************************* *                                                                       * *  EJBCA: The OpenSource Certificate Authority                          * *                                                                       * *  This software is free software; you can redistribute it and/or       * *  modify it under the terms of the GNU Lesser General Public           * *  License as published by the Free Software Foundation; either         * *  version 2.1 of the License, or any later version.                    * *                                                                       * *  See terms of license at gnu.org.                                     * *                                                                       * *************************************************************************/ package se.anatom.ejbca.samples;import java.io.BufferedReader;import java.io.ByteArrayOutputStream;import java.io.InputStreamReader;import java.io.PrintWriter;import java.net.HttpURLConnection;import java.net.URL;import java.net.URLConnection;import java.net.URLEncoder;import java.security.KeyPair;import org.apache.log4j.BasicConfigurator;import org.apache.log4j.Logger;import org.bouncycastle.asn1.DEROutputStream;import org.bouncycastle.jce.PKCS10CertificationRequest;import se.anatom.ejbca.util.Base64;import se.anatom.ejbca.util.CertTools;import se.anatom.ejbca.util.KeyTools;/** * NOTE: Support for SSL has been commented out in this sample, since it requires JSSE. This sample * class generates a PKCS10 request and POSTs to the CAs web interface. The reply is received and * printed to stdout. Takes arguments: * * <ul> * <li> * requesturl - URL to the CA web (servlet where requests are POSTed), * http://127.0.0.1/apply/apply_man.jsp. * </li> * <li> * username - username of a user registered with the CA with status NEW. * </li> * <li> * password - password for the above user. * </li> * </ul> * * * @version $Id: HttpGetCert.java,v 1.16 2004/05/31 14:29:07 anatom Exp $ */public class HttpGetCert {    private static Logger log = Logger.getLogger(HttpGetCert.class);    /**     * Constructor     */    public HttpGetCert() throws java.io.IOException {        log.debug(">HttpGetCert:");        // Use for SSL connections        /*        System.setProperty("java.protocol.handler.pkgs","com.sun.net.ssl.internal.www.protocol");        java.security.Security.addProvider(new com.sun.net.ssl.internal.ssl.Provider());        */        log.debug("<HttpGetCert:");    }    // HttpGetCert    /**     * Sets the CA certificate used to verify the web server's certificate. We only support a     * single self-signed CA certificate here.     *     * @param url servercertificate     *     * @return DOCUMENT ME!     *     * @exception java.security.cert.CertificateException if the certificate is not correct.     * @throws IllegalArgumentException if webcert is not a self-signed certificate     */    // Use for SSL connections    /*    public void setSSLTrustedServerCert(byte[] cert) throws java.security.cert.CertificateException {    log.debug(">setSSLTrustedServerCert:");    CertificateFactory cf = CertTools.getCertificateFactory();    webcert = (X509Certificate)cf.generateCertificate(new ByteArrayInputStream(cert));    if ( CertTools.isSelfSigned( webcert ) )        throw new IllegalArgumentException("Webcert certificate is not self signed (not a root CA certificate).");    log.debug("<setSSLTrustedServerCert:");    } // setSSLTrustedServerCert    */    /**     * Creates a SSLSocketFactory to communicate with the server using HTTPS.     *     * @param url DOCUMENT ME!     *     * @return DOCUMENT ME!     *     * @throws IllegalArgumentException if webcert is not set.     * @throws Exception error in setting up SSLContext.     */    // Use for SSL connections    /*    private SSLSocketFactory getSSLFactory() throws IllegalArgumentException, Exception {        log.debug( ">getSSLFactory" );        SSLContext ctx = SSLContext.getInstance( "SSL" );        KeyManagerFactory kmf = KeyManagerFactory.getInstance( "SunX509" );        String proxyHost = null;        String proxyPort = null;        // if we are behind a proxy, there must be set        if (proxyHost != null)            System.setProperty("https.proxyHost", proxyHost);        if (proxyPort != null)            System.setProperty("https.proxyPort", proxyPort);        if (webcert == null)            throw new IllegalArgumentException("Server certificate must be set for SSL communication");        // If we must use client certificates here, we should read some certs and keys and create a keystore to put in the KeyManagerFactory        // Make a truststore to verify the server        KeyStore trustks = KeyStore.getInstance( "jks" );        trustks.load( null, new String("foo123").toCharArray() );        trustks.setCertificateEntry( "trustedRootCA", webcert);        TrustManagerFactory tmf = TrustManagerFactory.getInstance("SunX509");        tmf.init( trustks );        ctx.init( null, tmf.getTrustManagers(), null );        log.debug( "<getSSLFactory" );        return ctx.getSocketFactory();    }    */    /**     * Creates a URLConnection either HTTP or HTTPS.     *     * @param url the URL (http:// or https://     *     * @return URLConnection     */    private URLConnection getUrlConnection(URL url) throws Exception {        URLConnection con = url.openConnection();        // Use for SSL connections        /*        if( con instanceof HttpsURLConnection ) {            HttpsURLConnection httpscon = (HttpsURLConnection) con;            httpscon.setSSLSocketFactory( getSSLFactory() );        }        */        return con;    }    /**     * Sends a certificate request (PKCS10) to the CA and receives the reply.     *     * @param requestUrl DOCUMENT ME!     * @param request Base64 encoded PKCS10-request (PEM-format)     * @param username username     * @param password password     *     * @exception IllegalArgumentException if requesturl is not a vlid HTTP or HTTPS url.     * @exception Exception if the trusted webcert is not a correct certificate.     * @exception Exception if we get back a HTTP response code != 200 from the CA.     * @exception Exception if the reply is not a correct certificate.     */    public void sendHttpReq(String requestUrl, String request, String username, String password)        throws Exception {        log.debug(">sendHttpReq: request=" + request.toString() + ", username=" + username +            ", password=" + password);        if (requestUrl == null) {            throw new IllegalArgumentException("requesturl can not be  null.");        }        log.debug("Sending request to: " + requestUrl);        URL url = new URL(requestUrl);        HttpURLConnection con = (HttpURLConnection) getUrlConnection(url);        // we are going to do a POST        con.setDoOutput(true);        con.setRequestMethod("POST");        // POST it        PrintWriter out = new PrintWriter(con.getOutputStream());        out.println("pkcs10req=" + URLEncoder.encode(request,"UTF-8") + "&user=" +            URLEncoder.encode(username,"UTF-8") + "&password=" + URLEncoder.encode(password,"UTF-8") +            "&submit=Submit+Query");        out.close();        // Read the reqponse        BufferedReader in = new BufferedReader(new InputStreamReader(con.getInputStream()));        String inputLine;        while ((inputLine = in.readLine()) != null) {            System.out.println(inputLine);        }        if (con.getResponseCode() == 200) {            log.debug("Received certificate reply.");        } else {            throw new Exception("Error sending PKCS10-request.");        }        // We are done, disconnect        con.disconnect();        log.debug("<sendHttpReq:");    }    // sendHttpReq    /**     * DOCUMENT ME!     *     * @param args DOCUMENT ME!     *     * @throws Exception DOCUMENT ME!     */    public static void main(String[] args) throws Exception {        //Configure Log4j        BasicConfigurator.configure();        // Install BouncyCastle provider        CertTools.installBCProvider();        // Generate keys (512 bit for sample purposes)        System.out.print("Generating 512 bit RSA keys.");        KeyPair rsaKeys = KeyTools.genKeys(512);        System.out.println("Keys generated.");        // Generate PKCS10 certificate request        PKCS10CertificationRequest req = new PKCS10CertificationRequest("SHA1WithRSA",                CertTools.stringToBcX509Name("C=SE,O=AnaTom,CN=HttpTest"), rsaKeys.getPublic(),                null, rsaKeys.getPrivate());        ByteArrayOutputStream bOut = new ByteArrayOutputStream();        DEROutputStream dOut = new DEROutputStream(bOut);        dOut.writeObject(req);        dOut.close();        ByteArrayOutputStream bos1 = new ByteArrayOutputStream();        bos1.write("-----BEGIN CERTIFICATE REQUEST-----\n".getBytes());        bos1.write(Base64.encode(bOut.toByteArray()));        bos1.write("\n-----END CERTIFICATE REQUEST-----\n".getBytes());        bos1.close();        System.out.println("CertificationRequest generated:");        System.out.println(new String(bos1.toByteArray()));        // Now send the request        System.out.println("Trying to send request...");        HttpGetCert getter = new HttpGetCert();        getter.sendHttpReq("http://127.0.0.1:8080/apply/certreq", new String(bos1.toByteArray()),            "foo", "foo123");    }}// class CertRequest

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
中文字幕av在线一区二区三区| 亚洲高清视频的网址| 在线精品视频免费观看| 国产成人在线看| 国产一区二区三区免费看| 免费观看在线色综合| 老司机一区二区| 狠狠狠色丁香婷婷综合激情 | 久久美女高清视频| 午夜精品久久久久久久99樱桃| 日韩精品一二三| 免费观看成人av| 精品一区二区在线观看| 极品少妇xxxx精品少妇| 国产精品一二三四| 97精品电影院| 欧美美女一区二区在线观看| 欧美一区二区三区成人| 精品入口麻豆88视频| 中文在线一区二区| 亚洲美女一区二区三区| 亚洲高清视频的网址| 一区二区三区蜜桃网| 不卡的电影网站| 欧美日本一道本在线视频| 91精品福利在线一区二区三区 | 欧美精品一区二区三区久久久| 亚洲成a人v欧美综合天堂| 欧美在线视频全部完| 亚洲午夜精品17c| 日韩国产在线观看一区| 激情六月婷婷久久| 国产精品99精品久久免费| 91精品国产综合久久久蜜臀图片| 国产在线国偷精品产拍免费yy| 亚洲精品乱码久久久久久久久 | 亚洲精品中文在线观看| 亚洲午夜成aⅴ人片| 亚洲视频一区在线| 免费高清在线视频一区·| 国产成人在线观看免费网站| 视频一区视频二区中文字幕| 99精品国产热久久91蜜凸| 欧美经典一区二区| 亚洲大片精品永久免费| 中文字幕日本不卡| 亚洲欧美日韩国产手机在线 | 99久久免费精品| 欧美精品一区二区三区蜜臀| 在线观看一区二区视频| 成人免费视频app| 国产精品久久久久久久午夜片| 中文天堂在线一区| 成人激情文学综合网| 国产成人在线看| 欧美久久一二区| 欧美日韩免费高清一区色橹橹| 国产精品 日产精品 欧美精品| 欧美激情在线观看视频免费| 亚洲麻豆国产自偷在线| 日韩国产在线一| 国产精品你懂的在线欣赏| 51午夜精品国产| 亚洲男女毛片无遮挡| 粉嫩av一区二区三区粉嫩| 国产精品99久久久久久似苏梦涵| 欧美日韩激情在线| 欧美视频一区二区在线观看| 欧美成人免费网站| 欧美日韩在线直播| 精品99999| 国产精品网站在线播放| 精品国产sm最大网站免费看| 亚洲第一成人在线| 国产aⅴ综合色| 久久综合资源网| 五月天精品一区二区三区| 不卡一区二区三区四区| 国产精品久久久久久久久快鸭 | 精品久久久久久亚洲综合网| 免费av网站大全久久| 亚洲影视资源网| 在线一区二区三区四区五区 | 国产欧美日韩激情| 成人激情动漫在线观看| 亚洲婷婷综合久久一本伊一区| av在线不卡观看免费观看| 亚洲视频图片小说| 欧美色欧美亚洲另类二区| 亚洲成a人片在线不卡一二三区| 欧美日韩一二三区| 久久丁香综合五月国产三级网站| 精品噜噜噜噜久久久久久久久试看| 精品制服美女丁香| 中文字幕一区av| 欧美撒尿777hd撒尿| 久久se精品一区二区| 久久久美女毛片| 一本一本久久a久久精品综合麻豆| 亚洲精品成a人| 日韩一区二区三区视频| 成人午夜在线播放| 亚洲成人1区2区| 精品少妇一区二区三区| 99免费精品视频| 丝袜诱惑亚洲看片| 国产日韩精品视频一区| 国产成人无遮挡在线视频| 精品国产一区二区三区不卡 | 欧美日韩国产123区| 麻豆91在线观看| 亚洲美女免费视频| 日韩欧美专区在线| 99re6这里只有精品视频在线观看| 欧美日本一道本| 一本到高清视频免费精品| 日本欧美一区二区| 18欧美亚洲精品| 日韩视频国产视频| 91亚洲精华国产精华精华液| 天堂一区二区在线| 国产精品美女久久久久久久久 | 国产亚洲精品中文字幕| 色婷婷亚洲精品| 国产成人午夜高潮毛片| 国产精品高潮呻吟| 欧美v国产在线一区二区三区| 99re这里只有精品视频首页| 久久99国产精品成人| 亚洲午夜私人影院| 亚洲婷婷综合色高清在线| 日韩精品一区二区三区视频在线观看| 91免费视频网址| 国产69精品久久777的优势| 蜜桃精品在线观看| 午夜精品福利久久久| 亚洲天堂成人在线观看| 久久久国产精品午夜一区ai换脸| 欧美视频中文字幕| 99精品久久免费看蜜臀剧情介绍| 天堂在线亚洲视频| 午夜精品久久久久| 亚洲成人av一区二区三区| 一区二区三区在线观看动漫| 中文字幕一区二区三区在线播放| 久久这里都是精品| 亚洲精品在线三区| 欧美一级欧美一级在线播放| 色综合久久66| 91福利国产成人精品照片| 色婷婷综合视频在线观看| 色综合久久综合| 国产午夜精品在线观看| 日韩免费福利电影在线观看| 91精品一区二区三区久久久久久 | 国产精品福利一区二区三区| www国产精品av| 久久久久国产免费免费| 久久综合九色综合97婷婷 | 色噜噜狠狠一区二区三区果冻| 不卡在线观看av| 不卡av免费在线观看| 国产成人精品免费视频网站| 粉嫩av一区二区三区| 成人午夜免费视频| 色狠狠色狠狠综合| 欧美肥妇毛茸茸| 日韩欧美一级精品久久| 亚洲精品一线二线三线| 国产精品另类一区| 亚洲欧美日韩久久| 日韩高清在线一区| 国产永久精品大片wwwapp| 日韩电影一区二区三区四区| 秋霞午夜鲁丝一区二区老狼| 久久66热偷产精品| 不卡的av电影| 91.麻豆视频| 国产视频911| 不卡的av中国片| 91精品在线一区二区| 精品国产乱码久久久久久浪潮 | 日韩视频一区二区三区| 欧美电影免费观看高清完整版| 欧美性生活影院| 色婷婷精品大视频在线蜜桃视频 | 日韩影院免费视频| 久久精品av麻豆的观看方式| 国产成人在线影院| 欧美二区乱c少妇| 国产精品福利av| 五月婷婷欧美视频| 9色porny自拍视频一区二区| 欧美三级电影网站| 久久亚洲欧美国产精品乐播| 亚洲黄一区二区三区| 国产伦精一区二区三区| 欧美美女激情18p| 日本一区二区三区免费乱视频| 丝袜诱惑制服诱惑色一区在线观看 |