This exception indicates that a secure server socket could not be opened at the given port xxxx.
In order to initialize the server socket, a valid private key and pass phrase is required.
If you are using JKS keystore as an identity then make sure the keystore also contains the private key for the leaf certificate.
For example,the command
>>keytool –list –v –keystore <keystore name>
will output the contents of the keystore on the console:
Check the Entry type: trustedCertEntry or Entry type
If it has “trustedCertEntry” which means that this keystore does not have the private key corresponding to the above certificate.
If the above keystore have “Entry type” as “keyEntry” then its fine.
Resolution:
Create the key and import the signed certificate in the same keystore using the following commands:
1. keytool -genkey -v -alias <alias> -keysize 1024 -keypass <key password> -keystore <keystore name> -storepass <keystore password> -validity <no. of days of validity>
2. keytool -certreq -v -alias <alias> -keystore <keystore name> -keypass <password for the keys> -storepass <keystore password> -file <certificate request file name>
3. keytool –import –v –alias <alias> -keystore <keystore name> -storepass <keystore password –file <signed certificate in a file>
In order to initialize the server socket, a valid private key and pass phrase is required.
If you are using JKS keystore as an identity then make sure the keystore also contains the private key for the leaf certificate.
For example,the command
>>keytool –list –v –keystore <keystore name>
will output the contents of the keystore on the console:
Check the Entry type: trustedCertEntry or Entry type
If it has “trustedCertEntry” which means that this keystore does not have the private key corresponding to the above certificate.
If the above keystore have “Entry type” as “keyEntry” then its fine.
Resolution:
Create the key and import the signed certificate in the same keystore using the following commands:
1. keytool -genkey -v -alias <alias> -keysize 1024 -keypass <key password> -keystore <keystore name> -storepass <keystore password> -validity <no. of days of validity>
2. keytool -certreq -v -alias <alias> -keystore <keystore name> -keypass <password for the keys> -storepass <keystore password> -file <certificate request file name>
3. keytool –import –v –alias <alias> -keystore <keystore name> -storepass <keystore password –file <signed certificate in a file>