|
TIBCO Enterprise Message Service Version 4.3.0 |
|||||||||
PREV CLASS NEXT CLASS | FRAMES NO FRAMES | |||||||||
SUMMARY: NESTED | FIELD | CONSTR | METHOD | DETAIL: FIELD | CONSTR | METHOD |
java.lang.Objectcom.tibco.tibjms.TibjmsSSL
Provides methods and defines properties and miscellaneous
constants which are used to set parameters for SSL connections.
Normally a client JMS application obtains SSL setup as a part of the
ConnectionFactory definition. ConnectionFactory is usually obtained
by the client applications via JNDI lookup calls.
However, in some cases it may be more convenient or required to define
SSL parameters locally in the client rather than as a result of JNDI lookup
operation. This may be necessary, for example, due to security considerations
when JNDI lookup operation can not be performed securely over SSL protocol.
A JMS client is communicating with the server via SSL protocol when the server
URL provided to the ConnectionFactory is specified in the form
ssl://host:port. One exception is when using TIBCO Enterprise Message Service
JNDI lookups, in that case the provider URL should specify tibjmsnaming
protocol and the SSL connection type is set via
com.tibco.tibjms.naming.TibjmsContext.SECURITY_PROTOCOL environment property.
When the connection between the client and the server is an SSL connection,
the server and the client application must set parameters in order for the
SSL handshake to be successfull. The server parameters are set by the administrator.
Each client application is responsible for setting SSL parameters correctly
in order to be able to establish SSL connection to the server. Setting up SSL
parameters by the client can be done in one of three ways:
1. All SSL parameters are specified in the ConnectionFactory, that factory
is obtained by the client via a JNDI lookup call. Notice this does not address
an issue of making JNDI lookup calls over SSL connection.
2. SSL parameters are set globally via calls to this class. When a ConnectionFactory
is using a URL specifying 'ssl' protocol but does not specify any other SSL parameters,
the SSL parameters set via calls to the methods of this class will be used.
3. A client application can create a Map of SSL parameters and pass it directly
into constructor of TibjmsTopicConnectionFactory or TibjmsQueueConnectionFactory.
Notice that when using native JNDI supported by TIBCO Enterprise Message Service,
JNDI lookup calls can be also made securely over SSL protocol. See documentation
of com.tibco.tibjms.naming.TibjmsContext class for more details.
SSL Vendors.
TIBCO Enterprise Message Service supports multiple SSL vendors. Currently it supports
the JSSE vendor (JSSE is a Java Secure Socket Extension which is an add-on
package for JDK 1.3.x and is included with JDK 1.4.0 and later) and the Entrust
SSL vendor. The SSL vendor can be specified in the ConnectionFactory the client
application loads via JNDI lookup call, or it can be set directly as a JNDI context
or ConnectionFactory property. Currently valid values for the vendor specification
is one of the followinig strings:
'j2se' - to specify Sun's JSSE SSL vendor.
'j2se-default' - to specify default JSSE SSL vendor. Sun and IBM JSSE providers are supported.
'entrust61' - to specify Entrust SSL vendor.
Sun's JSSE is included with TIBCO Enterprise Message Service distribution. Entrust libraries
version 7.0 or later should be obtained and installed separately.
Notice that after the first SSL conection is initialized, SSL vendor specification
can not be changed and is ignored for all subsequent connections created by the same
application.
SSL Parameters.
When a client establishes SSL connection to the JMS server, it should
either specify trusted server certificates or completely disable host verification.
If neither is specified then SSL communication will fail.
Trusted server certificates are the certificates which were used to issue server
certificate. More than one trusted certificate can be specified by the client.
Alternatively a client can completely disable server certificate verification
and will effectively trust any server. If the client specifies trusted certificates
then it should also make sure the common name in the certificate sent by the server
is same as the server host name, or the client can supply another name which the
name in the certificate will be verified against. Alternatively the client can disable
host name verification or supply a custom host name verifier program.
If the server requires clients to present certificates then the client must set
the client-side certificate, private key and optionally issuer certificates
before establishing the SSL connection to the server.
The client can also specify its choice and/or preference of the
cipher suites to be used and renegotiation parameters.
Certificates, Private Key and Identity formats.
There are a number of supported formats which can be used to
represent the set of trusted certificates, client certificate, client private
key and optionally extra issuer certificates. Also note that the client
identity consisting of the certificate, private key and optionally
extra issuer certificates can be included into a single data block using
PKCS12, KeyStore or Entrust Store encodings.
The set of Trusted Certificates represents all trusted issuers of the server
certificate. It must be specified by the client application unless the
host certificate verification is completely disabled.
Trusted Certificates can be present in PEM or DER formats or as a PKCS7 file.
Client certificate can be present in PEM or DER format or be a part of PKCS12,
KeyStore or Entrust Store data. Private key can be present as PKCS8 file or
be a part of PKCS12, KeyStore or Entrust Store data. Issuer certificates can
be present in PEM or DER format or be a part of PKCS12, KeyStore or
Entrust Store data. Currently JSSE does not support PKCS8-encoded private
keys thus the client identity when using "j2se" SSL vendor must be preset
as either PKCS12 or KeyStore data.
When a certificate, private key or the store is passed to any method
of this class or is set as the value of corresponding properties, the format
of the data can be detected automatically or, if not, the format must be specified
explicitly by the application. In all cases the data passed as byte[] or
InputStream does not require format specification if it represents one or more
certificates encoded in PEM or DER format.
The following data types are accepted:
1. java.lang.String. If a certificate, identity or a private key
are specified as java.lang.String then the value must be the name of the file
on disk. If the file name has one of the predefined extensions described below
then it is not necessary to provide the type of the data in the file. If the
filename does not end with one of the predefined extensions, the type parameter
or the corresponding property must be present.
2. byte[]. Can be used to specify the certificate, the private key or
the store data. If specified byte[] represents one or more certificates in
PEM or DER format or a private key in PKCS8 format then the type is not required.
If the specified byte[] contains serialized PKCS12, Java KeyStore or Entrust Store
data then the type must be specified.
3. java.io.InputStream. Can represent one or more certificates in PEM or DER
format, private key in PKCS8 format, serialized PKCS12, Java KeyStore or
Entrust Store data.
The encoding and the type requirements are the same as for byte[] data.
4. java.security.cert.X509Certificate. Can be used to present a trusted
certificate, client certificate or issuer certificate.
5. java.security.cert.X509Certificate[]. Can be used to present a set
of trusted certificates.
6. java.security.KeyStore. Can be used to present Java KeyStore object
as client identity data. Normally the KeyStore object includes the client certificate,
corresponding private key and optionally extra issuer certificates.
7. Vendor specific object. Can be used to present Entrust certificate object
iaik.x509.X509Certificate as a certificate.
Standard File Name Extentions.
The file names are accepted as the name of a certificate or private key
file in many SSL parameters for trusted certificates, client identity and other.
When a file name is specified it should either end with one of the standard
extensions defining the encoding of the file or the file encoding must be
provided separately, for instance as a parameter to addTrustedCerts or as
an Integer object in the Vector of trusted certificates set by TRUSTED_CERTIFICATES
property. The standard extensions include: .pem (PEM), .der (DER),
.p8 (PKCS8), .p12 (PKCS12), .p7b (PKCS7),
.jks (Java KeyStore) and .epf (Entrust Store). Notice that depending
on the usage and chosen SSL vendor not all formats may be supported in all cases.
Cipher Suites.
The cipher suites supported by JMS clients are defined by this class as int
values. When a client application is required to change the priority of cipher suites,
or only use selected cipher suites, it can do so by setting the list of cipher suites.
The list of cipher suites can be presented as an array of int values or
alternatively as a java.lang.String value containing the list of cipher suite names.
When the String representation is used, the application can specify only cipher
suites to add or remove and can also change the priority of the cipher suite. When
the list of cipher suites is presented as array of int values, it must specify
all cipher suites allowed by the application in the order of priority.
When a String with the list of names is used, each cipher suite name can be prepended
with a special character:
'+' - add cipher suite to the list
'-' - remove cipher suite from the list
'<' - move the cipher suite to be the first in the list
'>' - move the cipher suite to be the last in the list
The accepted cipher suite names are the same as the constant names defined
by this class. In addition OpenSSL names can be used as well as the short
names used by TIBCO Enterprise Message Service in the configuration files. It is
advised that the Java applications only use the full names as defined by
this class:
SSL_RSA_WITH_RC4_128_MD5
SSL_RSA_WITH_RC4_128_SHA
SSL_RSA_WITH_DES_CBC_SHA
SSL_RSA_WITH_3DES_EDE_CBC_SHA
SSL_RSA_EXPORT_WITH_RC4_40_MD5
SSL_RSA_EXPORT_WITH_DES_40_CBC_SHA
SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
SSL_DHE_RSA_WITH_DES_CBC_SHA
SSL_DHE_RSA_EXPORT_WITH_DES_40_CBC_SHA
SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
SSL_DHE_DSS_WITH_DES_CBC_SHA
SSL_DHE_DSS_EXPORT_WITH_DES_40_CBC_SHA
since EMS 4.2.0
SSL_RSA_WITH_NULL_MD5
SSL_RSA_WITH_NULL_SHA
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_DHE_DSS_WITH_AES_128_CBC_SHA
TLS_DHE_DSS_WITH_AES_256_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
Field Summary | |
static java.lang.String |
AUTH_ONLY
Name of SSL property specifying if SSL is used for authentication only. |
static java.lang.String |
CIPHER_SUITES
Name of SSL property specifying the set of cipher suites to be used by the SSL connection. |
static java.lang.String |
DEBUG_TRACE
Name of SSL property specifying if client debug trace is required. |
static java.lang.String |
ENABLE_VERIFY_HOST
Name of SSL property specifying if client should verify server certificate. |
static java.lang.String |
ENABLE_VERIFY_HOST_NAME
Name of SSL property specifying if client should verify the common name in the server certificate. |
static int |
ENCODING_AUTO
Integer defining AUTO format of the certificate or private key data. |
static int |
ENCODING_DER
Integer defining DER format of the certificate or private key data. |
static int |
ENCODING_ENTRUST
Integer defining Entrust Store format of the client identity data. |
static int |
ENCODING_KEYSTORE
Integer defining KeyStore format of the client identity data. |
static int |
ENCODING_PEM
Integer defining PEM format of the certificate or private key data. |
static int |
ENCODING_PKCS12
Integer defining PKCS12 format of the client identity data. |
static int |
ENCODING_PKCS7
Integer defining PKCS7 format. |
static int |
ENCODING_PKCS8
Integer defining PKCS8 format of the private key data. |
static java.lang.String |
EXPECTED_HOST_NAME
Name of SSL property specifying the common name in the server certificate. |
static java.lang.String |
HOST_NAME_VERIFIER
Name of SSL property specifying the custom host name verifier. |
static java.lang.String |
IDENTITY
Name of SSL property specifying the client-side identity. |
static java.lang.String |
IDENTITY_ENCODING
Name of SSL property specifying the encoding of the data presented by IDENTITY property. |
static java.lang.String |
ISSUER_CERTIFICATES
Name of SSL property specifying the additional issuer certificates for the client certificate. |
static java.lang.String |
PASSWORD
Name of SSL property specifying the password for the private key or the identity store. |
static java.lang.String |
PRIVATE_KEY
Name of SSL property specifying the private key for the client certificate. |
static java.lang.String |
PRIVATE_KEY_ENCODING
Name of SSL property specifying the encoding of the data presented by PRIVATE_KEY property. |
static java.lang.String |
RENEGOTIATE_INTERVAL
Deprecated. This property is no longer supported, and may be removed from future versions of EMS. |
static java.lang.String |
RENEGOTIATE_SIZE
Deprecated. This property is no longer supported, and may be removed from future versions of EMS. |
static int |
SSL_DHE_DSS_EXPORT_WITH_DES_40_CBC_SHA
Cipher Suite: Ephemeral Diffie-Hellman key signed with DSS, and 40-bit DES, using SHA1 hash algorithm. |
static int |
SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
Cipher Suite: Ephemeral Diffie-Hellman key signed with DSS, and 3 key triple-DES in EDE-CBC mode, and SHA1 hash algorithm. |
static int |
SSL_DHE_DSS_WITH_DES_CBC_SHA
Cipher Suite: Ephemeral Diffie-Hellman key signed with DSS, and 56-bit DES, using SHA1 hash algorithm. |
static int |
SSL_DHE_RSA_EXPORT_WITH_DES_40_CBC_SHA
Cipher Suite: Ephemeral Diffie-Hellman key signed with RSA, and 40-bit DES, using SHA1 hash algorithm. |
static int |
SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Cipher Suite: Ephemeral Diffie-Hellman key signed with RSA, nand Triple-DES in EDE-CBC mode, and SHA1 hash algorithm. |
static int |
SSL_DHE_RSA_WITH_DES_CBC_SHA
Cipher Suite: Ephemeral Diffie-Hellman key signed with RSA, and 56-bit DES, using SHA1 hash algorithm. |
static int |
SSL_RSA_EXPORT_WITH_DES_40_CBC_SHA
Cipher Suite: RSA key, Exportable 40-bit DES in CBC mode with SHA hash algorithm |
static int |
SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5
Cipher Suite: RSA key, Exportable 40-bit RC2 in CBC mode with MD5 hash algorithm |
static int |
SSL_RSA_EXPORT_WITH_RC4_40_MD5
Cipher Suite: RSA key, Exportable 40-bit RC4 with MD5 hash algorithm |
static int |
SSL_RSA_WITH_3DES_EDE_CBC_SHA
Cipher Suite: RSA key, Triple-DES in EDE-CBC mode with SHA |
static int |
SSL_RSA_WITH_DES_CBC_SHA
Cipher Suite: RSA key, 56-bit DES in CBC mode with SHA |
static int |
SSL_RSA_WITH_NULL_MD5
Cipher Suite: RSA, no encryption, MD5 hash. |
static int |
SSL_RSA_WITH_NULL_SHA
Cipher Suite: RSA, no encryption, SHA hash. |
static int |
SSL_RSA_WITH_RC4_128_MD5
Cipher Suite: RSA key, 128-bit RC4 with MD5 hash algorithm |
static int |
SSL_RSA_WITH_RC4_128_SHA
Cipher Suite: RSA key, 128-bit RC4 with SHA hash algorithm |
static java.lang.String |
TRACE
Name of SSL property specifying if client trace is required. |
static java.lang.String |
TRUSTED_CERTIFICATES
Name of SSL property specifying the set of trusted certificates. |
static java.lang.String |
VENDOR
Name of SSL property specifying the SSL vendor to be used. |
Constructor Summary | |
TibjmsSSL()
|
Method Summary | |
static void |
addIssuerCerts(java.lang.Object cert)
Adds one or more issuer certificates to the set of issuer certificates. |
static void |
addIssuerCerts(java.lang.Object cert,
int encoding)
Adds one or more issuer certificates in the specified format to the set of issuer certificates. |
static void |
addTrustedCerts(java.lang.Object cert)
Adds one or more trusted certificates to the set of trusted certificates. |
static void |
addTrustedCerts(java.lang.Object cert,
int encoding)
Adds one or more trusted certificates in the specified format to the set of trusted certificates. |
static void |
clearIssuerCerts()
Removes all previously set issuer certificates. |
static void |
clearTrustedCerts()
Removes all previously set trusted certificates. |
static java.lang.String |
getCipherSuiteName(int cipherSuite)
Returns the name of cipher suite with specified number. |
static java.io.PrintStream |
getClientTracer()
Returns client tracer or null if client tracing is disabled. |
static boolean |
getDebugTraceEnabled()
Returns if debug tracing is enabled. |
static java.lang.String |
getExpectedHostName()
Returns the name set as the expected name in the host certificate. |
static TibjmsSSLHostNameVerifier |
getHostNameVerifier()
Returns currently set custom host name verifier. |
static long |
getRenegotiateInterval()
Deprecated. This method is no longer supported, and may be removed from future versions of EMS. |
static long |
getRenegotiateSize()
Deprecated. This method is no longer supported, and may be removed from future versions of EMS. |
static int[] |
getSupportedCipherSuites()
Returns all supported cipher suites. |
static java.lang.String |
getVendor()
Returns a String with the name of currently used SSL vendor. |
static boolean |
getVerifyHost()
Returns if the host certificate verification is enabled. |
static boolean |
getVerifyHostName()
Returns if the verification of the host certificate name is enabled. |
static void |
initialize()
Initializes SSL environment. |
static void |
initialize(java.lang.String vendorName)
Initializes SSL environment with specified SSL vendor. |
static boolean |
isAuthOnly()
Returns true if SSL is used only during connection authentication, returns false otherwise. |
static boolean |
isCipherSuiteSupported(int cipherSuite)
Returns if the specified cipher suite is supported. |
static void |
setAuthOnly(boolean b)
Set client connections to use SSL only during initial connection authentication. |
static void |
setCipherSuites(int[] cipherSuites)
Set cipher suites to be used by SSL connections. |
static void |
setCipherSuites(java.lang.String cipherSuites)
Set cipher suites as a String specification. |
static void |
setClientTracer(java.io.PrintStream tracer)
Set client tracer to given output stream. |
static void |
setDebugTraceEnabled(boolean enabled)
Enables debug tracing. |
static void |
setExpectedHostName(java.lang.String hostname)
Set the name which is expected to be set in the host certificate. |
static void |
setHostNameVerifier(TibjmsSSLHostNameVerifier verifier)
Set the custom host name verifier. |
static void |
setIdentity(java.lang.Object identity,
char[] password)
Set client identity object and password. |
static void |
setIdentity(java.lang.Object identity,
int encoding,
char[] password)
Set client identity object in the specified format and password. |
static void |
setIdentity(java.lang.Object identity,
int encoding,
java.lang.Object key,
char[] password)
Set client identity object in the specified format, private key and password. |
static void |
setIdentity(java.lang.Object identity,
int identityEncoding,
java.lang.Object key,
int keyEncoding,
char[] password)
Set client identity object in the specified format, private key in the specified format and password. |
static void |
setIdentity(java.lang.Object identity,
java.lang.Object key,
char[] password)
Set client identity, private key and password. |
static void |
setPassword(char[] password)
Sets private key password. |
static void |
setRenegotiateInterval(long milliseconds)
Deprecated. This method is no longer supported, and may be removed from future versions of EMS. |
static void |
setRenegotiateSize(long bytes)
Deprecated. This method is no longer supported, and may be removed from future versions of EMS. |
static void |
setSecureRandom(java.security.SecureRandom secureRandom)
Set a java.Security.SecureRandom object. |
static void |
setVendor(java.lang.String vendorName)
Set SSL vendor to the specified vendor. |
static void |
setVerifyHost(boolean enable)
Set if the host certificate should be verified by the client. |
static void |
setVerifyHostName(boolean enable)
Set if the name in the host certificate should be verified or not. |
Methods inherited from class java.lang.Object |
equals, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait |
Field Detail |
public static final int SSL_RSA_EXPORT_WITH_RC4_40_MD5
public static final int SSL_RSA_WITH_RC4_128_MD5
public static final int SSL_RSA_WITH_RC4_128_SHA
public static final int SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5
public static final int SSL_RSA_EXPORT_WITH_DES_40_CBC_SHA
public static final int SSL_RSA_WITH_DES_CBC_SHA
public static final int SSL_RSA_WITH_3DES_EDE_CBC_SHA
public static final int SSL_DHE_DSS_EXPORT_WITH_DES_40_CBC_SHA
public static final int SSL_DHE_DSS_WITH_DES_CBC_SHA
public static final int SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
public static final int SSL_DHE_RSA_EXPORT_WITH_DES_40_CBC_SHA
public static final int SSL_DHE_RSA_WITH_DES_CBC_SHA
public static final int SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
public static final int SSL_RSA_WITH_NULL_MD5
public static final int SSL_RSA_WITH_NULL_SHA
public static final java.lang.String VENDOR
public static final java.lang.String TRACE
public static final java.lang.String AUTH_ONLY
public static final java.lang.String DEBUG_TRACE
public static final java.lang.String TRUSTED_CERTIFICATES
public static final java.lang.String ENABLE_VERIFY_HOST
public static final java.lang.String ENABLE_VERIFY_HOST_NAME
public static final java.lang.String EXPECTED_HOST_NAME
public static final java.lang.String HOST_NAME_VERIFIER
public static final java.lang.String IDENTITY
public static final java.lang.String IDENTITY_ENCODING
public static final java.lang.String ISSUER_CERTIFICATES
public static final java.lang.String PRIVATE_KEY
public static final java.lang.String PRIVATE_KEY_ENCODING
public static final java.lang.String PASSWORD
public static final java.lang.String RENEGOTIATE_SIZE
public static final java.lang.String RENEGOTIATE_INTERVAL
public static final java.lang.String CIPHER_SUITES
public static final int ENCODING_AUTO
public static final int ENCODING_PEM
public static final int ENCODING_DER
public static final int ENCODING_PKCS7
public static final int ENCODING_PKCS8
public static final int ENCODING_PKCS12
public static final int ENCODING_ENTRUST
public static final int ENCODING_KEYSTORE
Constructor Detail |
public TibjmsSSL()
Method Detail |
public static java.lang.String getVendor()
public static void setVendor(java.lang.String vendorName) throws JMSSecurityException
JMSSecurityException
- if specified vendor is not supported.public static void initialize() throws JMSSecurityException
JMSSecurityException
- if method fails due to
some error.public static void initialize(java.lang.String vendorName) throws JMSSecurityException
JMSSecurityException
- if specified vendor is not
supported or if method fails due to some error.public static void setDebugTraceEnabled(boolean enabled)
public static void setAuthOnly(boolean b)
true
then connections use SSL only
for authentication and switch to TCP protocol for all subsequent
messaging. If parameter is false
then SSL is used
for the lifetime of the connection, which is the default mode.
Connections use this setting at the time they are created.
Changing this setting only affects connection created after
the change. By default this parameter is disabled.
b
- - true to only use SSL for authentication, false to use SSL
for the lifetime of the connections.public static boolean isAuthOnly()
public static boolean getDebugTraceEnabled()
public static void setClientTracer(java.io.PrintStream tracer)
public static java.io.PrintStream getClientTracer()
public static void setRenegotiateSize(long bytes)
public static long getRenegotiateSize()
public static void setRenegotiateInterval(long milliseconds)
public static void setSecureRandom(java.security.SecureRandom secureRandom)
public static long getRenegotiateInterval()
public static java.lang.String getCipherSuiteName(int cipherSuite) throws JMSSecurityException
JMSSecurityException
- if cipherSuite parameter does
not specify a valid cipher suite number.public static boolean isCipherSuiteSupported(int cipherSuite) throws JMSSecurityException
JMSSecurityException
- if cipherSuite parameter does
not specify a valid cipher suite number.public static int[] getSupportedCipherSuites() throws JMSSecurityException
JMSSecurityException
- if method fails due to some error.public static void setCipherSuites(int[] cipherSuites) throws JMSSecurityException
JMSSecurityException
- if method fails due to some error.public static void setCipherSuites(java.lang.String cipherSuites) throws JMSSecurityException
JMSSecurityException
- if method fails due to some error.public static void setVerifyHost(boolean enable)
public static boolean getVerifyHost()
public static void setExpectedHostName(java.lang.String hostname)
public static java.lang.String getExpectedHostName()
public static void setVerifyHostName(boolean enable)
public static boolean getVerifyHostName()
public static void setHostNameVerifier(TibjmsSSLHostNameVerifier verifier)
public static TibjmsSSLHostNameVerifier getHostNameVerifier()
public static void clearTrustedCerts() throws JMSSecurityException
JMSSecurityException
public static void addTrustedCerts(java.lang.Object cert) throws JMSSecurityException
JMSSecurityException
- if certificate data is not valid
or if method fails due to some error.public static void addTrustedCerts(java.lang.Object cert, int encoding) throws JMSSecurityException
JMSSecurityException
- if certificate data is not valid
or if method fails due to some error.public static void clearIssuerCerts() throws JMSSecurityException
JMSSecurityException
public static void addIssuerCerts(java.lang.Object cert) throws JMSSecurityException
JMSSecurityException
- if certificate data is not valid
or if method fails due to some error.public static void addIssuerCerts(java.lang.Object cert, int encoding) throws JMSSecurityException
JMSSecurityException
- if certificate data is not valid
or if method fails due to some error.public static void setIdentity(java.lang.Object identity, char[] password) throws JMSSecurityException
JMSSecurityException
- if identity data is not valid
or if method fails due to some error.public static void setIdentity(java.lang.Object identity, java.lang.Object key, char[] password) throws JMSSecurityException
JMSSecurityException
- if identity or private key
data is not valid
or if method fails due to some error.public static void setIdentity(java.lang.Object identity, int encoding, char[] password) throws JMSSecurityException
JMSSecurityException
- if identity data is not valid
or if method fails due to some error.public static void setIdentity(java.lang.Object identity, int encoding, java.lang.Object key, char[] password) throws JMSSecurityException
JMSSecurityException
- if identity or private key data
is not valid or if method fails due to some error.public static void setIdentity(java.lang.Object identity, int identityEncoding, java.lang.Object key, int keyEncoding, char[] password) throws JMSSecurityException
JMSSecurityException
- if identity or private key data
is not valid or if method fails due to some error.public static void setPassword(char[] password)
|
TIBCO Enterprise Message Service Version 4.3.0 |
|||||||||
PREV CLASS NEXT CLASS | FRAMES NO FRAMES | |||||||||
SUMMARY: NESTED | FIELD | CONSTR | METHOD | DETAIL: FIELD | CONSTR | METHOD |