JavaKeyStore Unicode C Reference Documentation

JavaKeyStore

Current Version: 10.0.0

API to read, write, access, and update Java key stores (JKS format).

This class also supports the JCEKS format starting in Chilkat v9.5.0.66.

Create/Dispose

HCkJavaKeyStoreW instance = CkJavaKeyStoreW_Create();
// ...
CkJavaKeyStoreW_Dispose(instance);
HCkJavaKeyStoreW CkJavaKeyStoreW_Create(void);

Creates an instance of the HCkJavaKeyStoreW object and returns a handle ("void *" pointer). The handle is passed in the 1st argument for the functions listed on this page.

void CkJavaKeyStoreW_Dispose(HCkJavaKeyStoreW handle);

Objects created by calling CkJavaKeyStoreW_Create must be freed by calling this method. A memory leak occurs if a handle is not disposed by calling this function. Also, any handle returned by a Chilkat "C" function must also be freed by the application by calling the appropriate Dispose method, such as CkJavaKeyStoreW_Dispose.

Properties

DebugLogFilePath
void CkJavaKeyStoreW_getDebugLogFilePath(HCkJavaKeyStoreW cHandle, HCkString retval);
void CkJavaKeyStoreW_putDebugLogFilePath(HCkJavaKeyStoreW cHandle, const wchar_t *newVal);
const wchar_t *CkJavaKeyStoreW_debugLogFilePath(HCkJavaKeyStoreW cHandle);

If set to a file path, causes each Chilkat method or property call to automatically append it's LastErrorText to the specified log file. The information is appended such that if a hang or crash occurs, it is possible to see the context in which the problem occurred, as well as a history of all Chilkat calls up to the point of the problem. The VerboseLogging property can be set to provide more detailed information.

This property is typically used for debugging the rare cases where a Chilkat method call hangs or generates an exception that halts program execution (i.e. crashes). A hang or crash should generally never happen. The typical causes of a hang are:

  1. a timeout related property was set to 0 to explicitly indicate that an infinite timeout is desired,
  2. the hang is actually a hang within an event callback (i.e. it is a hang within the application code), or
  3. there is an internal problem (bug) in the Chilkat code that causes the hang.

More Information and Examples
top
LastErrorHtml
void CkJavaKeyStoreW_getLastErrorHtml(HCkJavaKeyStoreW cHandle, HCkString retval);
const wchar_t *CkJavaKeyStoreW_lastErrorHtml(HCkJavaKeyStoreW cHandle);

Provides information in HTML format about the last method/property called. If a method call returns a value indicating failure, or behaves unexpectedly, examine this property to get more information.

top
LastErrorText
void CkJavaKeyStoreW_getLastErrorText(HCkJavaKeyStoreW cHandle, HCkString retval);
const wchar_t *CkJavaKeyStoreW_lastErrorText(HCkJavaKeyStoreW cHandle);

Provides information in plain-text format about the last method/property called. If a method call returns a value indicating failure, or behaves unexpectedly, examine this property to get more information.

top
LastErrorXml
void CkJavaKeyStoreW_getLastErrorXml(HCkJavaKeyStoreW cHandle, HCkString retval);
const wchar_t *CkJavaKeyStoreW_lastErrorXml(HCkJavaKeyStoreW cHandle);

Provides information in XML format about the last method/property called. If a method call returns a value indicating failure, or behaves unexpectedly, examine this property to get more information.

top
LastMethodSuccess
BOOL CkJavaKeyStoreW_getLastMethodSuccess(HCkJavaKeyStoreW cHandle);
void CkJavaKeyStoreW_putLastMethodSuccess(HCkJavaKeyStoreW cHandle, BOOL newVal);

Indicate whether the last method call succeeded or failed. A value of TRUE indicates success, a value of FALSE indicates failure. This property is automatically set for method calls. It is not modified by property accesses. The property is automatically set to indicate success for the following types of method calls:

  • Any method that returns a string.
  • Any method returning a Chilkat object, binary bytes, or a date/time.
  • Any method returning a standard boolean status value where success = TRUE and failure = FALSE.
  • Any method returning an integer where failure is defined by a return value less than zero.

Note: Methods that do not fit the above requirements will always set this property equal to TRUE. For example, a method that returns no value (such as a "void" in C++) will technically always succeed.

top
NumPrivateKeys
int CkJavaKeyStoreW_getNumPrivateKeys(HCkJavaKeyStoreW cHandle);
Introduced in version 9.5.0.44

The number of private keys contained within the keystore. Each private key has an alias and certificate chain associated with it.

top
NumSecretKeys
int CkJavaKeyStoreW_getNumSecretKeys(HCkJavaKeyStoreW cHandle);
Introduced in version 9.5.0.66

The number of secret keys (such as AES keys) contained within the keystore. Each secret key can have an alias associated with it.

More Information and Examples
top
NumTrustedCerts
int CkJavaKeyStoreW_getNumTrustedCerts(HCkJavaKeyStoreW cHandle);
Introduced in version 9.5.0.44

The number of trusted certificates contained within the keystore. Each certificate has an alias (identifying string) associated with it.

top
RequireCompleteChain
BOOL CkJavaKeyStoreW_getRequireCompleteChain(HCkJavaKeyStoreW cHandle);
void CkJavaKeyStoreW_putRequireCompleteChain(HCkJavaKeyStoreW cHandle, BOOL newVal);
Introduced in version 9.5.0.44

If TRUE, then adding a private key to the JKS only succeeds if the certificate chain can be completed to the root certificate. A root certificate is either a trusted CA root or a self-signed certificate. If FALSE, then incomplete certificate chains are allowed. The default value is TRUE.

top
VerboseLogging
BOOL CkJavaKeyStoreW_getVerboseLogging(HCkJavaKeyStoreW cHandle);
void CkJavaKeyStoreW_putVerboseLogging(HCkJavaKeyStoreW cHandle, BOOL newVal);

If set to TRUE, then the contents of LastErrorText (or LastErrorXml, or LastErrorHtml) may contain more verbose information. The default value is FALSE. Verbose logging should only be used for debugging. The potentially large quantity of logged information may adversely affect peformance.

top
VerifyKeyedDigest
BOOL CkJavaKeyStoreW_getVerifyKeyedDigest(HCkJavaKeyStoreW cHandle);
void CkJavaKeyStoreW_putVerifyKeyedDigest(HCkJavaKeyStoreW cHandle, BOOL newVal);
Introduced in version 9.5.0.44

If TRUE, then the keystore's keyed digest is required to pass validation (password required) for any of the load methods (such as LoadFile, LoadBinary, or LoadEncoded). If FALSE, then a keystore may be loaded into memory without password validation (if a null or empty string is passed to the load method). The default value of this property is TRUE.

top
Version
void CkJavaKeyStoreW_getVersion(HCkJavaKeyStoreW cHandle, HCkString retval);
const wchar_t *CkJavaKeyStoreW_version(HCkJavaKeyStoreW cHandle);

Version of the component/library, such as "9.5.0.94"

More Information and Examples
top

Methods

AddPfx
BOOL CkJavaKeyStoreW_AddPfx(HCkJavaKeyStoreW cHandle, HCkPfxW pfx, const wchar_t *alias, const wchar_t *password);
Introduced in version 9.5.0.44

Adds the contents of a PFX or PKCS #12 (.p12) to the Java keystore object. One JKS entry per private key found in the PKCS12 is added. The certs found within the PCKS12 are used to build the certificate chains for each private key. (A typical PFX file contains a single private key along with its associated certificate, and the certificates in the chain of authentication to the root CA cert.)

This method does not add trusted certificate entries to the JKS.

The specified alias is applied to the 1st private key found. If the alias is empty, then the alias is obtained from the cert/PFX in the following order of preference:

  1. Certificate's subject common name
  2. Certificate's subject email address
  3. Certificate's friendly name found in the PKCS9 attributes of the PKCS12
  4. Certificate's serial number

If multiple private keys are found in the PKCS12, then all but the first will automaticallly be assigned aliases using the preference just described.

The UseCertVault method may be called to provide additional certificates for the automatic construction of the certificate chains. If the RequireCompleteChain property is set to TRUE, then this method will fail if any certificate chain is not completed to the root. The TrustedRoots class may be used to provide a source for obtaining trusted CA roots if these are not already present within the PKCS12.

Returns TRUE for success, FALSE for failure.

top
AddPrivateKey
BOOL CkJavaKeyStoreW_AddPrivateKey(HCkJavaKeyStoreW cHandle, HCkCertW cert, const wchar_t *alias, const wchar_t *password);
Introduced in version 9.5.0.44

Adds a private key entry to the JKS. Both the private key and certificate chain are obtained from the certificate object that is passed in the 1st argument.

If the alias is empty, then the alias is automatically chosen based on the certificate's information, in the following order of preference:

  1. Certificate's subject common name
  2. Certificate's subject email address
  3. Certificate's serial number

The UseCertVault method may be called to provide additional certificates for the automatic construction of the certificate chains. If the RequireCompleteChain property is set to TRUE, then this method will fail if the certificate chain is not completed to the root. The TrustedRoots class may be used to provide a source for obtaining trusted CA roots.

Returns TRUE for success, FALSE for failure.

top
AddSecretKey
BOOL CkJavaKeyStoreW_AddSecretKey(HCkJavaKeyStoreW cHandle, const wchar_t *encodedKeyBytes, const wchar_t *encoding, const wchar_t *algorithm, const wchar_t *alias, const wchar_t *password);
Introduced in version 9.5.0.66

Adds a secret (symmetric) key entry to the JKS. This adds a symmetric key, which is simply a number of binary bytes (such as 16 bytes for a 128-bit AES key). The encodedKeyBytes provides the actual bytes of the symmetric key, in an encoded string form. The encoding indicates the encoding of encodedKeyBytes (such as "base64", "hex", "base64url", etc.) The algorithm describes the symmetric algorithm, such as "AES". The alias is the password used to seal (encrypt) the key bytes.

Note: The algorithm describes the usage of the encodedKeyBytes. For example, if encodedKeyBytes contains the 16 bytes of a 128-bit AES key, then algorithm should be set to "AES". The actual encryption algorithm used to seal the key within the JCEKS is PBEWithMD5AndTripleDES, which is part of the JCEKS specification.

Returns TRUE for success, FALSE for failure.

More Information and Examples
top
AddTrustedCert
BOOL CkJavaKeyStoreW_AddTrustedCert(HCkJavaKeyStoreW cHandle, HCkCertW cert, const wchar_t *alias);
Introduced in version 9.5.0.44

Adds a trusted certificate to the Java keystore object.

Returns TRUE for success, FALSE for failure.

More Information and Examples
top
ChangePassword
BOOL CkJavaKeyStoreW_ChangePassword(HCkJavaKeyStoreW cHandle, int index, const wchar_t *oldPassword, const wchar_t *newPassword);
Introduced in version 9.5.0.44

Changes the password for a private key.

Returns TRUE for success, FALSE for failure.

More Information and Examples
top
FindCertChain
HCkCertChainW CkJavaKeyStoreW_FindCertChain(HCkJavaKeyStoreW cHandle, const wchar_t *alias, BOOL caseSensitive);
Introduced in version 9.5.0.44

Finds and returns the certificate chain for the private key with the specified alias.

Returns NULL on failure

top
FindPrivateKey
HCkPrivateKeyW CkJavaKeyStoreW_FindPrivateKey(HCkJavaKeyStoreW cHandle, const wchar_t *password, const wchar_t *alias, BOOL caseSensitive);
Introduced in version 9.5.0.44

Finds and returns the private key with the specified alias.

Returns NULL on failure

top
FindTrustedCert
HCkCertW CkJavaKeyStoreW_FindTrustedCert(HCkJavaKeyStoreW cHandle, const wchar_t *alias, BOOL caseSensitive);
Introduced in version 9.5.0.44

Finds and returns the trusted certificate with the specified alias.

Returns NULL on failure

top
GetCertChain
HCkCertChainW CkJavaKeyStoreW_GetCertChain(HCkJavaKeyStoreW cHandle, int index);
Introduced in version 9.5.0.44

Returns the certificate chain associated with the Nth private key contained within the keystore. The 1st private key is at index 0.

Returns NULL on failure

top
GetPrivateKey
HCkPrivateKeyW CkJavaKeyStoreW_GetPrivateKey(HCkJavaKeyStoreW cHandle, const wchar_t *password, int index);
Introduced in version 9.5.0.44

Returns the Nth private key contained within the keystore. The 1st private key is at index 0.

Returns NULL on failure

top
GetPrivateKeyAlias
BOOL CkJavaKeyStoreW_GetPrivateKeyAlias(HCkJavaKeyStoreW cHandle, int index, const wchar_t *outStr);
const wchar_t *CkJavaKeyStoreW_getPrivateKeyAlias(HCkJavaKeyStoreW cHandle, int index);
Introduced in version 9.5.0.44

Returns the Nth private key alias contained within the keystore. The 1st private key is at index 0.

Returns TRUE for success, FALSE for failure.

top
GetSecretKey
BOOL CkJavaKeyStoreW_GetSecretKey(HCkJavaKeyStoreW cHandle, const wchar_t *password, int index, const wchar_t *encoding, const wchar_t *outStr);
const wchar_t *CkJavaKeyStoreW_getSecretKey(HCkJavaKeyStoreW cHandle, const wchar_t *password, int index, const wchar_t *encoding);
Introduced in version 9.5.0.66

Returns the Nth secret key contained within the keystore. The 1st secret key is at index 0. The bytes of the secret key are returned in the specified encoding. (such as hex, base64, base64url, etc.)

Returns TRUE for success, FALSE for failure.

More Information and Examples
top
GetSecretKeyAlias
BOOL CkJavaKeyStoreW_GetSecretKeyAlias(HCkJavaKeyStoreW cHandle, int index, const wchar_t *outStr);
const wchar_t *CkJavaKeyStoreW_getSecretKeyAlias(HCkJavaKeyStoreW cHandle, int index);
Introduced in version 9.5.0.66

Returns the Nth secret key alias contained within the keystore. The 1st secret key is at index 0.

Returns TRUE for success, FALSE for failure.

More Information and Examples
top
GetTrustedCert
HCkCertW CkJavaKeyStoreW_GetTrustedCert(HCkJavaKeyStoreW cHandle, int index);
Introduced in version 9.5.0.44

Returns the Nth trusted certificate contained within the keystore. The 1st certificate is at index 0.

Returns NULL on failure

top
GetTrustedCertAlias
BOOL CkJavaKeyStoreW_GetTrustedCertAlias(HCkJavaKeyStoreW cHandle, int index, const wchar_t *outStr);
const wchar_t *CkJavaKeyStoreW_getTrustedCertAlias(HCkJavaKeyStoreW cHandle, int index);
Introduced in version 9.5.0.44

Returns the Nth trusted certificate alias contained within the keystore. The 1st certificate is at index 0.

Returns TRUE for success, FALSE for failure.

top
LoadBd
BOOL CkJavaKeyStoreW_LoadBd(HCkJavaKeyStoreW cHandle, const wchar_t *password, HCkBinDataW bd);
Introduced in version 9.5.0.77

Loads a Java keystore from the contents of bd.

Returns TRUE for success, FALSE for failure.

top
LoadBinary
BOOL CkJavaKeyStoreW_LoadBinary(HCkJavaKeyStoreW cHandle, const wchar_t *password, HCkByteData jksData);
Introduced in version 9.5.0.44

Loads a Java keystore from in-memory byte data.

Returns TRUE for success, FALSE for failure.

top
LoadEncoded
BOOL CkJavaKeyStoreW_LoadEncoded(HCkJavaKeyStoreW cHandle, const wchar_t *password, const wchar_t *jksEncData, const wchar_t *encoding);
Introduced in version 9.5.0.44

Loads a Java keystore from an encoded string (such as base64, hex, etc.)

Returns TRUE for success, FALSE for failure.

top
LoadFile
BOOL CkJavaKeyStoreW_LoadFile(HCkJavaKeyStoreW cHandle, const wchar_t *password, const wchar_t *path);
Introduced in version 9.5.0.44

Loads a Java keystore from a file.

Returns TRUE for success, FALSE for failure.

More Information and Examples
top
LoadJwkSet
BOOL CkJavaKeyStoreW_LoadJwkSet(HCkJavaKeyStoreW cHandle, const wchar_t *password, HCkJsonObjectW jwkSet);
Introduced in version 9.5.0.66

Loads the Java KeyStore from a JSON Web Key (JWK) Set.

Returns TRUE for success, FALSE for failure.

top
RemoveEntry
BOOL CkJavaKeyStoreW_RemoveEntry(HCkJavaKeyStoreW cHandle, int entryType, int index);
Introduced in version 9.5.0.44

Removes the Nth trusted certificate or private key entry from the keystore. The entryType indicates whether it is a trusted root or private key entry (1 = trusted certificate entry, 2 = private key entry). The 1st entry is at index 0.

Returns TRUE for success, FALSE for failure.

top
SetAlias
BOOL CkJavaKeyStoreW_SetAlias(HCkJavaKeyStoreW cHandle, int entryType, int index, const wchar_t *alias);
Introduced in version 9.5.0.44

Sets the alias name for a trusted certificate or private key entry. The entryType indicates whether it is a trusted root or private key entry (1 = trusted certificate entry, 2 = private key entry). The 1st entry is at index 0.

Returns TRUE for success, FALSE for failure.

top
ToBinary
BOOL CkJavaKeyStoreW_ToBinary(HCkJavaKeyStoreW cHandle, const wchar_t *password, const unsigned char * outBytes);
Introduced in version 9.5.0.44

Writes the key store to in-memory bytes. The password is used for the keyed hash of the entire JKS file. (Each private key within the file may use different passwords, and these are provided when the private key is added via the AddPrivateKey method.)

Returns TRUE for success, FALSE for failure.

top
ToEncodedString
BOOL CkJavaKeyStoreW_ToEncodedString(HCkJavaKeyStoreW cHandle, const wchar_t *password, const wchar_t *encoding, const wchar_t *outStr);
const wchar_t *CkJavaKeyStoreW_toEncodedString(HCkJavaKeyStoreW cHandle, const wchar_t *password, const wchar_t *encoding);
Introduced in version 9.5.0.44

Writes the key store to an encoded string. The encoding can be any encoding such as "base64" or "hex". The password is used for the keyed hash of the entire JKS file. (Each private key within the file may use different passwords, and these are provided when the private key is added via the AddPrivateKey method.)

Returns TRUE for success, FALSE for failure.

top
ToFile
BOOL CkJavaKeyStoreW_ToFile(HCkJavaKeyStoreW cHandle, const wchar_t *password, const wchar_t *path);
Introduced in version 9.5.0.44

Writes the key store to a file. The password is used for the keyed hash of the entire JKS file. (Each private key within the file may use different passwords, and these are provided when the private key is added via the AddPrivateKey method.)

Returns TRUE for success, FALSE for failure.

top
ToJwkSet
BOOL CkJavaKeyStoreW_ToJwkSet(HCkJavaKeyStoreW cHandle, const wchar_t *password, HCkStringBuilderW sbJwkSet);
Introduced in version 9.5.0.66

Returns the private keys in JSON JWK Set format. The JWK identifier (kid) will be set from the key alias in the store.

Returns TRUE for success, FALSE for failure.

top
ToPem
HCkPemW CkJavaKeyStoreW_ToPem(HCkJavaKeyStoreW cHandle, const wchar_t *password);
Introduced in version 9.5.0.49

Returns the Java KeyStore as a Pem object.

Returns NULL on failure

top
ToPfx
HCkPfxW CkJavaKeyStoreW_ToPfx(HCkJavaKeyStoreW cHandle, const wchar_t *password);
Introduced in version 9.5.0.49

Returns the Java KeyStore as a Pfx object.

Returns NULL on failure

top
UseCertVault
BOOL CkJavaKeyStoreW_UseCertVault(HCkJavaKeyStoreW cHandle, HCkXmlCertVaultW vault);
Introduced in version 9.5.0.44

Adds an XML certificate vault to the object's internal list of sources to be searched for certificates for help in building certificate chains to a root certificate.

Returns TRUE for success, FALSE for failure.

top