This chapter provides information about using the Oracle Security Engine Software Development Kit (SDK) certificate package. Oracle Security Engine is a superset of Oracle Crypto. It contains all of the libraries and tools provided with Oracle Crypto, plus additional packages and utilities for generating digital certificates.
Note:
The use of the Oracle Security Engine library is not recommended beginning with Oracle AS 11gR1. Instead use the JDK's Certificate APIs.For details, see the JDK documentation at:
http://java.sun.com/javase/6/docs/technotes/guides/security/cert3.html
However, the following Public-Key Cryptography Standards (PKCS) have no JCE equivalents:
PKCS#7
PKCS#10
Signed Public Key And Challenge (SPKAC)
and you can continue using Oracle Security Engine for these features.
Oracle Crypto allows Java developers to develop applications that ensure data security and integrity. For more information about the Oracle Crypto functionality, see "Oracle Crypto" in Chapter 3.
For an overview of public key infrastructure, see "Public Key Infrastructure (PKI)" in Chapter 1.
This chapter contains the following topics:
Oracle Security Engine provides the following features:
X.509 Version 3 Certificates, as defined in RFC 3280
Full PKCS#12 support
PKCS#10 support for certificate requests
certificate revocation list (CRL) functionality as defined in RFC 3280
Implementation of Signed Public Key And Challenge (SPKAC)
Support for X.500 Relative Distinguished Names
PKCS#7 support for wrapping X.509 certificates and CRLs
Implementation of standard X.509 certificates and CRL extensions
The Oracle Security Developer Tools are installed with Oracle Application Server in ORACLE_HOME
. This section provides information for setting up your environment for Oracle Security Engine. It contains the following topics:
In order to use Oracle Security Engine, your system must have the Java Development Kit (JDK) version 1.4.
Your CLASSPATH
environment variable must contain the full path and file names to the required jar and class files. Make sure the following items are included in your CLASSPATH
:
osdt_core.jar
osdt_cert.jar
To set your CLASSPATH
on Windows:
In your Windows Control Panel, select System.
In the System Properties dialog, select the Advanced tab.
Click Environment Variables.
In the User Variables section, click New to add a CLASSPATH
environment variable for your user profile. If a CLASSPATH
environment variable already exists, select it and click Edit.
Add the full path and file names for all of the required jar and class files to the CLASSPATH
.
For example, your CLASSPATH
might look like this:
%CLASSPATH%; %ORACLE_HOME%\modules\oracle.osdt_11.1.1\osdt_core.jar; %ORACLE_HOME%\modules\oracle.osdt_11.1.1\osdt_cert.jar;
Click OK.
To set your CLASSPATH on UNIX, set your CLASSPATH
environment variable to include the full path and file name of all of the required jar and class files. For example:
setenv CLASSPATH $CLASSPATH: $ORACLE_HOME/modules/oracle.osdt_11.1.1/osdt_core.jar: $ORACLE_HOME/modules/oracle.osdt_11.1.1/osdt_cert.jar:
This section provides information and code samples for using the certificate facility classes of Oracle Security Engine. Oracle Security Engine also includes all of the classes provided with Oracle Crypto. See Chapter 3, "Oracle Crypto" for an overview of the core Oracle Crypto classes.
Class Changes in OracleAS 11gR1
In OracleAS 11gR1, the oracle.security.crypto.cert.X509 class for certificate management has been replaced with java.security.cert.X509Certificate
The core certificate facility classes are:
This class represents an X.500 Relative Distinguished Name (RDN). This is the building block for X.500 names. A RDN consists of a set of attribute-value pairs. Typically, there is a single attribute-value pair in each RDN.
Example 4-1 Code Example for Creating and Retrieving an X500RDN
Object
// Create the X500RDN object
X500RDN rdn = new X500RDN(PKIX.id_at_commonName, "Joe Smith");
// Retrieve the value
X500Name n = Instance of oracle.security.crypto.cert.X500Name;
String name = n.getAttribute(PKIX.id_at_commonName).getValue().getValue();
This class represents distinguished names as used in the X.500 series of specifications, defined in X.520. An X500Name
object is made of X500RDN
objects. An X500Name holds attributes defining an entity such as the common name, country, organization, and so on.
To create an X500Name
object, use the standard constructor and then populate the object with attributes. Once created, the object can then be DER-encoded to make it available to other processes:
Example 4-2 Code Example for Creating an X500Name Object
X500Name name = new X500Name(); name.addComponent(PKIX.id_at_commonName, "Joe Smith"); name.addComponent(PKIX.id_at_countryName, "USA"); name.addComponent(PKIX.id_at_stateOrProvinceName, "NY"); name.addComponent(PKIX.id_at_localityName, "New York"); name.addComponent(PKIX.id_at_organizationName, "Oracle"); name.addComponent(PKIX.id_at_organizationalUnitName, "Engineering"); name.addComponent(PKIX.emailAddress, "[email protected]"); // Make object DER-encoded so its available to other processes byte[] encodedName = Utils.toBytes(name); X500Name n = new X500Name(new ByteArrayInputStream(encodedName)); String name = n.getAttribute(PKIX.id_at_commonName).getValue().getValue(); String email = n.getAttribute(PKIX.emailAddress).getValue().getValue();
This class represents a PKCS#10 certificate request containing information about an entity and a signature of the content of the request. The certificate request is used to convey information and authentication data (the signature) that will be used by a Certificate Authority (CA) to generate a certificate for the corresponding entity.
Creating a new certificate request involves the following high-level steps:
Create a new instance of CertificateRequest
by using the empty constructor and setting the keys and the subject name, or by using the constructor taking an X500Name
and a KeyPair
object.
Add X.509 extensions to the certificate request.
Sign the certificate request and save it to a file.
Send the certificate request you created to a Certificate Authority.
Example 4-3 Code Example for Creating a Certificate Request
//Create CertificateRequest by setting the keys and subject name CertificateRequest certReq = new CertificateRequest(); certReq.setPrivateKey(privKey); certReq.setPublicKey(pubKey); certReq.setSubject(subjectName); //OR // Create CertificateRequest by taking an X500Name and KeyPair object CertificateRequest certReq = new CertificateRequest(subjectName, keyPair); // Add X.509 certificate extensions in a extensionRequest attribute X509ExtensionSet extSet = new X509ExtensionSet(); // Basic Constraints: non-CA, critical extSet.addExtension(new BasicConstraintsExtension(false, true)); // Key Usage: signature, data encipherment, key agreement // & non-repudiation flags, critical extSet.addExtension(new KeyUsageExtension(new int[] { KeyUsageExtension.DIGITAL_SIGNATURE, KeyUsageExtension.DATA_ENCIPHERMENT, KeyUsageExtension.KEY_AGREEMENT, KeyUsageExtension.NON_REPUDIATION}, true)); // Subject Alternative Name: email address, non-critical if (email.length() > 0) extSet.addExtension(new SubjectAltNameExtension( new GeneralName(GeneralName.Type.RFC822_NAME, email), false)); // Subject Key Identifier: key ID bytes, non-critical extSet.addExtension(new SubjectKeyIDExtension (CryptoUtils.generateKeyID(kp.getPublic()))); req.addAttribute(PKIX.extensionRequest, extSet); // Sign the certificate request and save to file req.sign(); req.output(reqOS); reqOS.close(); } // The certificate request can then be sent to a CA
Note:
This class replaces oracle.security.crypto.cert.X509 for X.509 certificate management in Oracle Application Server 11g.The java.security.cert.X509Certificate class supports the generation of new certificates as well as parsing of existing certificates.
Complete documentation of the java.security.cert.X509Certificate class is available at http://java.sun.com/j2se/1.4.2/docs/api/java/security/cert/X509Certificate.html
.
Converting Your Code to Use java.security.cert.X509Certificate
You can create the X509Certificate object using the certificate factory java.security.cert.CertificateFactory.
The certificate is generated from an input stream, which can be:
a FileInputSream, if the certificate is stored in a file, or
a ByteArrayInputStream, if the encoded bytes are from an existing X509 object, or
any other source.
An example follows:
// Generating an X.509 certificate from a file-based certificate CertificateFactory cf = CertificateFactory.getInstance("X.509"); X509Certificate cert = (X509Certificate)cf.generateCertificate( new FileInputStream(certFileName);
**
The Oracle Security Engine Java API reference (Javadoc) is available at:
Oracle Fusion Middleware Security Engine Java API Reference for Oracle Security Developer Tools
For example programs using the Oracle Security Developer Tools, see the Oracle Technology Network Web Site at http://www.oracle.com/technology/sample_code/products/id_mgmt/index.html
.