Home > Keytool Error > Keytool Error Nullpointerexception

Keytool Error Nullpointerexception

If no file is given, the certificate is output to stdout. If the original entry is protected with an entry password, the password can be supplied via the "-keypass" option. SAN or SubjectAlternativeName type:value(,type:value)*, type can be EMAIL, URI, DNS, IP, or OID, value is the string format value for the type. Log in to reply. have a peek at this web-site

If the alias points to a key entry, then keytool assumes you are importing a certificate reply. Is it legal to bring board games (made of wood) to Australia? If the destination alias already exists in the destination keystore, the user is prompted to either overwrite the entry, or to create a new entry under a different alias name. It generates v3 certificates.

The -exportcert command by default outputs a certificate in binary encoding, but will instead output a certificate in the printable encoding format, if the -rfc option is specified. Ignite Realtime Home | Projects | Downloads | Community | Fans | Group Chat | About © 2016 Jive Software | Powered by Jive SoftwareHome | Top of page | HelpJive A different reply format (defined by the PKCS#7 standard) also includes the supporting certificate chain, in addition to the issued certificate. In this case, besides the options you see in the above example, you need to specify the alias you want to import.

Reference Sheets Code Snippets C Snippets C++ Snippets Java Snippets Visual Basic Snippets C# Snippets VB.NET Snippets ASP.NET Snippets PHP Snippets Python Snippets Ruby Snippets ColdFusion Snippets SQL Snippets Assembly Snippets All the data in a certificate is encoded using two related standards called ASN.1/DER. Requested extensions are not honored by default. For example, if you have a provider package that supplies a keystore implementation for a keystore type called "pkcs12", change the line to keystore.type=pkcs12 Note: case doesn't matter in keystore type

feedbackText.length : '0'}}/255 {{status}} Not what you were looking for? The first certificate in the chain contains the public key corresponding to the private key. Why won't a series converge if the limit of the sequence is 0? http://stackoverflow.com/questions/15398020/what-could-cause-nullpointerexception-inside-suns-javakeystore-enginestore-me If you press RETURN at the prompt, the key password is set to the same password as that used for the keystore.

The null pointer in keytool looks familiar, a similar problem was reported last year. The top-level (root) CA certificate is self-signed. As a result, e1 should contain ca, ca1, and ca2 in its certificate chain: keytool -alias e1 -certreq | keytool -alias ca2 -gencert > e1.cert -genkeypair {-alias alias} You said you are able to printcert it.

Nice to meet you. http://www.ca.com/us/services-support/ca-support/ca-support-online/knowledge-base-articles.tec483297.html Entity An entity is a person, organization, program, computer, business, bank, or something else you are trusting to some degree. Any extra character other than standard HEX numbers (0-9, a-f, A-F) are ignored in the HEX string. Do you want the keystore file?

SystemAdmin 110000D4XK 2262 Posts Re: cannot import PKCS 7 cert chain using keytool ‏2003-04-25T19:18:47Z This is the accepted answer. Check This Out Like Show 0 Likes(0) Actions Actions More Like This Retrieving data ... SystemAdmin 110000D4XK 2262 Posts Re: cannot import PKCS 7 cert chain using keytool ‏2003-05-08T15:04:06Z This is the accepted answer. keytool also enables users to administer secret keys used in symmetric encryption/decryption (e.g.

COMMAND AND OPTION NOTES The various commands and their options are listed and described below. If it appears, the specified javaoption string is passed through directly to the Java interpreter. If the -noprompt option is given, however, there will be no interaction with the user. Source All Fields Required First Name Last Name Email Address How can we help you?

The user then has the option of aborting the import operation. You may use :c in place of :critical. The CA will authenticate you, the requestor (usually off-line), and then will return a certificate, signed by them, authenticating your public key. (In some cases, they will actually return a chain

Log in to reply.

The following example creates a certificate, e1, that contains three certificates in its certificate chain. As an example, you can copy your certificate to a file named MJ.cer via the following, assuming the entry is aliased by "mykey": keytool -exportcert -alias mykey -file MJ.cer Given that When the option is not provided, the start date is the current time. Are you trying to import it into the same database which contains the original request?

In many cases, this is a self-signed certificate (that is, a certificate from the CA authenticating its own public key) and the last certificate in the chain. So in this case, I don't have a known alias to reference in mycompany.jks Either way I don't have an alias. I have a file MyCert.pfx which I specified in its configuration as follows: hk.hku.cecid.piazza.commons.security.KeyStoreManager