* @see org.ejbca.core.protocol.ws.common.IEjbcaWS#softTokenRequest(org.ejbca.core.protocol.ws.objects.UserDataVOWS, String, String, String)
*/
public KeyStore softTokenRequest(UserDataVOWS userdata, String hardTokenSN, String keyspec, String keyalg)
throws CADoesntExistsException, AuthorizationDeniedException, NotFoundException, UserDoesntFullfillEndEntityProfile,
ApprovalException, WaitingForApprovalException, EjbcaException {
final IPatternLogger logger = TransactionLogger.getPatternLogger();
try {
log.debug("Soft token req for user '" + userdata.getUsername() + "'.");
userdata.setStatus(UserDataVOWS.STATUS_NEW);
userdata.setClearPwd(true);
final EjbcaWSHelper ejbcawshelper = new EjbcaWSHelper(wsContext, authorizationSession, caAdminSession, certificateProfileSession, certificateStoreSession, endEntityProfileSession, hardTokenSession, userAdminSession);
final Admin admin = ejbcawshelper.getAdmin(false);
logAdminName(admin,logger);
final UserDataVO userdatavo = ejbcawshelper.convertUserDataVOWS(admin, userdata);
final boolean createJKS = userdata.getTokenType().equals(UserDataVOWS.TOKEN_TYPE_JKS);
final byte[] encodedKeyStore = certificateRequestSession.processSoftTokenReq(admin, userdatavo, hardTokenSN, keyspec, keyalg, createJKS);
// Convert encoded KeyStore to the proper return type
final java.security.KeyStore ks;
if (createJKS) {
ks = java.security.KeyStore.getInstance("JKS");
} else {
ks = java.security.KeyStore.getInstance("PKCS12", "BC");
}
ks.load(new ByteArrayInputStream(encodedKeyStore), userdata.getPassword().toCharArray());
return new KeyStore(ks, userdata.getPassword());
} catch( CADoesntExistsException t ) {
logger.paramPut(TransactionTags.ERROR_MESSAGE.toString(), t.toString());
throw t;
} catch( AuthorizationDeniedException t ) {
logger.paramPut(TransactionTags.ERROR_MESSAGE.toString(), t.toString());
throw t;
} catch( NotFoundException t ) {
logger.paramPut(TransactionTags.ERROR_MESSAGE.toString(), t.toString());
throw t;
} catch (InvalidKeyException e) {
throw EjbcaWSHelper.getEjbcaException(e, logger, ErrorCode.INVALID_KEY, Level.ERROR);
} catch (IllegalKeyException e) {
// Don't log a bad error for this (user's key length too small)
throw EjbcaWSHelper.getEjbcaException(e, logger, ErrorCode.ILLEGAL_KEY, Level.DEBUG);
} catch (AuthStatusException e) {
// Don't log a bad error for this (user wrong status)
throw EjbcaWSHelper.getEjbcaException(e, logger, ErrorCode.USER_WRONG_STATUS, Level.DEBUG);
} catch (AuthLoginException e) {
throw EjbcaWSHelper.getEjbcaException(e, logger, ErrorCode.LOGIN_ERROR, Level.ERROR);
} catch (SignatureException e) {
throw EjbcaWSHelper.getEjbcaException(e, logger, ErrorCode.SIGNATURE_ERROR, Level.ERROR);
} catch (SignRequestSignatureException e) {
throw EjbcaWSHelper.getEjbcaException(e.getMessage(), logger, null, Level.ERROR);
} catch (InvalidKeySpecException e) {
throw EjbcaWSHelper.getEjbcaException(e, logger, ErrorCode.INVALID_KEY_SPEC, Level.ERROR);
} catch (NoSuchAlgorithmException e) {
throw EjbcaWSHelper.getInternalException(e, logger);
} catch (NoSuchProviderException e) {
throw EjbcaWSHelper.getInternalException(e, logger);
} catch( KeyStoreException e ) {
throw EjbcaWSHelper.getInternalException(e, logger);
} catch (CertificateException e) {
throw EjbcaWSHelper.getInternalException(e, logger);
} catch (CreateException e) {
throw EjbcaWSHelper.getInternalException(e, logger);
} catch (IOException e) {
throw EjbcaWSHelper.getInternalException(e, logger);
} catch (FinderException e) {
throw new NotFoundException(e.getMessage());
} catch (InvalidAlgorithmParameterException e) {
throw EjbcaWSHelper.getInternalException(e, logger);
} catch (RuntimeException e) { // EJBException, ...
throw EjbcaWSHelper.getInternalException(e, logger);
} finally {
logger.writeln();
logger.flush();
}
}