OK, find the solution here: http://ws.apache.org/xmlrpc/ssl.html (The
recommended solution)
Thank all of you.
James.
Hi, Ozkan,
Thanks for you help.
Yes, i followed the steps in
http://tomcat.apache.org/tomcat-4.1-doc/ssl-howto.html
I guess it's self signed certificate, right? i'm really not goot at
it. is there any way i can verify if it's self-signed?
Yes, that is a self signed certificate. Otherwise it has to be
certified by an organization like Verisign or Thawte and is paid.
How to add it in the trusted certificates store in the client side,
by the way i'm testing the server/client on the same machine.
It doesn't matter that they are running on the same machine you have
to add it.
The java certificate store should be jAVA_HOME/jre/lib/security/cacerts
To import the server's certificate use the keytool again. Should be
something like this:
keytool -import -trustcacerts -file SERVER_CER_FILE -keystore
jAVA_HOME/jre/lib/security/cacerts -alias myjames.
The command i used to generate the cert keystore is
#1 > %JAVA_HOME%\bin\keytool -genkey -alias james -keyalg RSA
So, what you mean is i MUST import the generated server's cert into
the JRE/lib/security/cacerts with the command
#2 > keytool -import -trustcacerts -file .\keystore -keystore
%JAVA_HOME%\jre\lib\security\cacerts -alias james
Well after i did this, it ask me to input the keystore password, i
assume it's the password i set during the first step.
But i got this java.io.IOException: Keystore was tampered with, or
password was incorrect
I realized it might not correct. so i tried the default password
"changeit" , this time i got "java.lang.Exception: it's not a X.509
cert.."
James.
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]