Example usage for java.security.cert CertificateException CertificateException

List of usage examples for java.security.cert CertificateException CertificateException

Introduction

In this page you can find the example usage for java.security.cert CertificateException CertificateException.

Prototype

public CertificateException() 

Source Link

Document

Constructs a certificate exception with no detail message.

Usage

From source file:net.shibboleth.idp.cas.authn.PkixProxyAuthenticatorTest.java

@DataProvider(name = "data")
public Object[][] buildTestData() {
    return new Object[][] { new Object[] { "testCase1", 200, null },
            new Object[] { "testCase1", 404, new FailedLoginException() },
            new Object[] { "testCase2", 200, new CertificateException() }, };
}

From source file:ch.cyberduck.core.udt.UDTProxyConfiguratorTest.java

@Test(expected = ConnectionCanceledException.class)
public void testConnectFailureCertificateTls() throws Exception {
    final Host host = new Host(new S3Protocol(), "s3.amazonaws.com", new Credentials(
            System.getProperties().getProperty("s3.key"), System.getProperties().getProperty("s3.secret")));
    final UDTProxyConfigurator proxy = new UDTProxyConfigurator(
            new S3LocationFeature.S3Region("ap-northeast-1"), new LocalhostProxyProvider(),
            new AbstractX509TrustManager() {
                @Override//from  w  w  w  . j a v  a2  s .  c  om
                public X509TrustManager init() {
                    return this;
                }

                @Override
                public void verify(final String hostname, final X509Certificate[] certs, final String cipher)
                        throws CertificateException {
                    throw new CertificateException();
                }

                @Override
                public void checkClientTrusted(final X509Certificate[] x509Certificates, final String s)
                        throws CertificateException {
                    //
                }

                @Override
                public void checkServerTrusted(final X509Certificate[] x509Certificates, final String s)
                        throws CertificateException {
                    throw new CertificateException();
                }
            }, new DefaultX509KeyManager());
    final S3Session tunneled = new S3Session(host);
    proxy.configure(tunneled);
    assertNotNull(tunneled.open(new DisabledHostKeyCallback()));
    tunneled.login(new DisabledPasswordStore(), new DisabledLoginCallback(), new DisabledCancelCallback());
}

From source file:org.wso2.carbon.identity.oauth2.token.handlers.grant.saml.SAML2BearerGrantHandlerTest.java

@DataProvider(name = "validateGrantExceptionDataProvider")
public Object[][] validateGrantExceptionDataProvider() throws Exception {

    NameID nameId1 = (new NameIDBuilder()).buildObject();
    nameId1.setValue("nameIdValue");
    Subject subject1 = (new SubjectBuilder()).buildObject();
    subject1.setNameID(nameId1);//w w  w  .  j  a  v  a  2s.com

    NameID nameId2 = (new NameIDBuilder()).buildObject();
    nameId2.setValue(null);
    Subject subject2 = (new SubjectBuilder()).buildObject();
    subject2.setNameID(nameId2);

    DateTime validOnOrAfter = new DateTime(System.currentTimeMillis() + 10000000L);
    DateTime expiredOnOrAfter = new DateTime(System.currentTimeMillis() - 10000000L);
    return new Object[][] { { validOnOrAfter, "LOCAL", true, true, TestConstants.OAUTH2_TOKEN_EP,
            TestConstants.LOACALHOST_DOMAIN, new IdentityException("Error"), "Error while unmashalling" },
            { validOnOrAfter, "FED", true, true, TestConstants.OAUTH2_TOKEN_EP, TestConstants.LOACALHOST_DOMAIN,
                    new IdentityProviderManagementException("Error"),
                    "Error while retrieving identity provider" },
            { validOnOrAfter, "FED", true, true, TestConstants.OAUTH2_TOKEN_EP, TestConstants.LOACALHOST_DOMAIN,
                    new ValidationException(), "Error while validating the signature" },
            { validOnOrAfter, "LOCAL", true, true, TestConstants.OAUTH2_TOKEN_EP,
                    TestConstants.LOACALHOST_DOMAIN, new IdentityApplicationManagementException("Error"),
                    "Error while retrieving service provider" },
            { validOnOrAfter, "LOCAL", true, true, TestConstants.OAUTH2_TOKEN_EP,
                    TestConstants.LOACALHOST_DOMAIN, new UserStoreException(),
                    "Error while building local user" },
            { validOnOrAfter, "FED", true, true, TestConstants.OAUTH2_TOKEN_EP, TestConstants.LOACALHOST_DOMAIN,
                    new CertificateException(), "Error occurred while decoding public certificate" },
            { validOnOrAfter, "LOCAL", true, false, TestConstants.OAUTH2_TOKEN_EP,
                    TestConstants.LOACALHOST_DOMAIN, null, "User not found" },
            { validOnOrAfter, "LOCAL", false, true, TestConstants.OAUTH2_TOKEN_EP,
                    TestConstants.LOACALHOST_DOMAIN, null, "Non SaaS app" },
            { validOnOrAfter, "LOCAL", true, true, "invalidAudience", TestConstants.LOACALHOST_DOMAIN, null,
                    "Audience Restriction validation failed" },
            { validOnOrAfter, "LOCAL", true, true, "", TestConstants.LOACALHOST_DOMAIN, null,
                    "Token Endpoint alias has not been configured" },
            { validOnOrAfter, "FED", true, true, "invalidAudience", TestConstants.LOACALHOST_DOMAIN, null,
                    "Audience Restriction validation failed" },
            { validOnOrAfter, "LOCAL", false, true, TestConstants.OAUTH2_TOKEN_EP, "invalidEntityId", null,
                    "Issuer verification failed" },
            { validOnOrAfter, "LOCAL", false, true, TestConstants.OAUTH2_TOKEN_EP, null, null,
                    "Issuer verification failed" },
            { validOnOrAfter, null, true, true, TestConstants.OAUTH2_TOKEN_EP, TestConstants.LOACALHOST_DOMAIN,
                    null, "Identity provider is null" },
            { expiredOnOrAfter, "LOCAL", true, true, TestConstants.OAUTH2_TOKEN_EP,
                    TestConstants.LOACALHOST_DOMAIN, null, "Assertion is not valid" },
            { null, "LOCAL", true, true, TestConstants.OAUTH2_TOKEN_EP, TestConstants.LOACALHOST_DOMAIN, null,
                    "Cannot find valid NotOnOrAfter" }, };
}

From source file:at.alladin.rmbt.client.RMBTClient.java

public static SSLContext getSSLContext(final String caResource, final String certResource)
        throws NoSuchAlgorithmException, KeyManagementException {
    X509Certificate _ca = null;/*w  w  w  .j  a v a2 s. c o m*/
    try {
        if (caResource != null) {
            final CertificateFactory cf = CertificateFactory.getInstance("X.509");
            _ca = (X509Certificate) cf
                    .generateCertificate(RMBTClient.class.getClassLoader().getResourceAsStream(caResource));
        }
    } catch (final Exception e) {
        e.printStackTrace();
    }

    final X509Certificate ca = _ca;

    X509Certificate _cert = null;
    try {
        if (certResource != null) {
            final CertificateFactory cf = CertificateFactory.getInstance("X.509");
            _cert = (X509Certificate) cf
                    .generateCertificate(RMBTClient.class.getClassLoader().getResourceAsStream(certResource));
        }
    } catch (final Exception e) {
        e.printStackTrace();
    }
    final X509Certificate cert = _cert;

    // TrustManagerFactory tmf = null;
    // try
    // {
    // if (cert != null)
    // {
    // final KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType());
    // ks.load(null, null);
    // ks.setCertificateEntry("crt", cert);
    //
    // tmf =
    // TrustManagerFactory.getInstance(TrustManagerFactory.getDefaultAlgorithm());
    // tmf.init(ks);
    // }
    // }
    // catch (Exception e)
    // {
    // e.printStackTrace();
    // }

    final TrustManager tm;
    if (cert == null)
        tm = getTrustingManager();
    else
        tm = new javax.net.ssl.X509TrustManager() {
            public X509Certificate[] getAcceptedIssuers() {
                // System.out.println("getAcceptedIssuers");
                if (ca == null)
                    return new X509Certificate[] { cert };
                else
                    return new X509Certificate[] { ca };
            }

            public void checkClientTrusted(final X509Certificate[] certs, final String authType)
                    throws CertificateException {
                // System.out.println("checkClientTrusted: " +
                // Arrays.toString(certs) + " - " + authType);
            }

            public void checkServerTrusted(final X509Certificate[] certs, final String authType)
                    throws CertificateException {
                // System.out.println("checkServerTrusted: " +
                // Arrays.toString(certs) + " - " + authType);
                if (certs == null)
                    throw new CertificateException();
                for (final X509Certificate c : certs)
                    if (cert.equals(c))
                        return;
                throw new CertificateException();
            }
        };

    final TrustManager[] trustManagers = new TrustManager[] { tm };

    javax.net.ssl.SSLContext sc;
    sc = javax.net.ssl.SSLContext.getInstance(Config.RMBT_ENCRYPTION_STRING);

    sc.init(null, trustManagers, new java.security.SecureRandom());
    return sc;
}

From source file:org.eclipse.smarthome.binding.digitalstrom.internal.lib.serverconnection.impl.HttpTransportImpl.java

private SSLSocketFactory generateSSLContextFromPEMCertString(String pemCert) {
    if (StringUtils.isNotBlank(pemCert) && pemCert.startsWith(BEGIN_CERT)) {
        try {//from  www . j  av a 2  s .  c om
            InputStream certInputStream = IOUtils.toInputStream(pemCert);
            final X509Certificate trustedCert = (X509Certificate) CertificateFactory.getInstance("X.509")
                    .generateCertificate(certInputStream);

            final TrustManager[] trustManager = new TrustManager[] { new X509TrustManager() {

                @Override
                public java.security.cert.X509Certificate[] getAcceptedIssuers() {
                    return null;
                }

                @Override
                public void checkClientTrusted(java.security.cert.X509Certificate[] certs, String authType)
                        throws CertificateException {
                    if (!certs[0].equals(trustedCert)) {
                        throw new CertificateException();
                    }
                }

                @Override
                public void checkServerTrusted(java.security.cert.X509Certificate[] certs, String authType)
                        throws CertificateException {
                    if (!certs[0].equals(trustedCert)) {
                        throw new CertificateException();
                    }
                }
            } };

            SSLContext sslContext = SSLContext.getInstance("SSL");
            sslContext.init(null, trustManager, new java.security.SecureRandom());
            return sslContext.getSocketFactory();
        } catch (NoSuchAlgorithmException e) {
            logger.error("A NoSuchAlgorithmException occurred: ", e);
        } catch (KeyManagementException e) {
            logger.error("A KeyManagementException occurred: ", e);
        } catch (CertificateException e) {
            logger.error("A CertificateException occurred: ", e);
        }
    } else {
        logger.error("Cert is empty");
    }
    return null;
}