https://localhost:8440/Hello?wsdl
set SERVER_DN="CN=Server, OU=ec, O=ec, L=BEIJINGC, S=BEIJING, C=CN"
set CLIENT_DN="CN=Client, OU=ec, O=ec, L=BEIJING, S=BEIJING, C=CN"
set KS_PASS=-storepass changeit
set KEYINFO=-keyalg RSA
keytool -genkey -alias Server -dname %SERVER_DN% %KS_PASS% -keystore server.keystore %KEYINFO% -keypass changeit
keytool -export -alias Server -file test_axis.cer %KS_PASS% -keystore server.keystore
keytool -import -file test_axis.cer %KS_PASS% -keystore client.truststore -alias serverkey -noprompt
keytool -genkey -alias Client -dname %CLIENT_DN% %KS_PASS% -keystore client.keystore %KEYINFO% -keypass changeit
keytool -export -alias Client -file test_axis.cer %KS_PASS% -keystore client.keystore
keytool -import -file test_axis.cer %KS_PASS% -keystore server.truststore -alias clientkey -noprompt
好的,现在我们就有了四个文件:server.keystore,server.truststore,client.keystore,client.truststore
1. 服务器端的密匙库
keytool -genkey -alias test-server -keyalg RSA -keypass testserver -storepass testserver -validity 3600 -keystore D:\ keystore \test-server.keystore
全部test
2. 输出RSA证书
keytool -export -alias test-server -file test-server.cer -storepass testserver -keystore test.keystore
3. 获得一个名为client.truststore的信任库
keytool -import -file test-server.cer -storepass testserver -keystore client.truststore -alias serverkey -noprompt
//以下命令testclient是客户端的密码
keytool -import -file D:/keystore/test-server.cer -storepass testclient -keystore D:/keystore/client.trustStore -alias -noprompt
System.setProperty("javax.net.ssl.trustStore", "D:/keystore/client.truststore");
System.setProperty( "javax.net.ssl.trustStorePassword" , " testclient " );