/** * * @return */ public boolean hasSignaturePolicyAlgo() { return !DSSUtils.isEmpty(signaturePolicyAlgo); }
public static boolean isNotEmpty(final Collection collection) { return !isEmpty(collection); }
/** * <p>Checks if a String is not empty ("") and not null.</p> * <p/> * <pre> * DSSUtils.isNotEmpty(null) = false * DSSUtils.isNotEmpty("") = false * DSSUtils.isNotEmpty(" ") = true * DSSUtils.isNotEmpty("bob") = true * DSSUtils.isNotEmpty(" bob ") = true * </pre> * * @param str the String to check, may be null * @return {@code true} if the String is not empty and not null */ public static boolean isNotEmpty(String str) { return !isEmpty(str); }
/** * * @param source * @param values * @return */ public static boolean contains(final String source, final String... values) { if (DSSUtils.isEmpty(source)) { return false; } for (final String value : values) { if (source.equals(value)) { return true; } } return false; }
/** * Adds a claimed signer role * * @param claimedSignerRole the value */ public void addClaimedSignerRole(final String claimedSignerRole) { final boolean empty = DSSUtils.isEmpty(claimedSignerRole); if (empty) { throw new DSSNullException(String.class, "claimedSignerRole"); } if (claimedSignerRoles == null) { claimedSignerRoles = new ArrayList<String>(); } claimedSignerRoles.add(claimedSignerRole); }
/** * Returns true if the HTTP proxy must be enabled. * * @return a boolean value */ public boolean isHttpEnabled() { ProxyPreference preference = getProxyDao().get(ProxyKey.HTTP_ENABLED); if (preference == null || DSSUtils.isEmpty(preference.getValue())) { return false; } else { return Boolean.valueOf(preference.getValue()).booleanValue(); } }
/** * Returns true if the HTTPS proxy must be enabled. * * @return a boolean value */ public boolean isHttpsEnabled() { ProxyPreference preference = getProxyDao().get(ProxyKey.HTTPS_ENABLED); if (preference == null || DSSUtils.isEmpty(preference.getValue())) { return false; } else { return Boolean.valueOf(preference.getValue()).booleanValue(); } }
private void xmlForKeyUsageBits(CertificateToken certToken, XmlCertificate xmlCert) { final List<String> keyUsageBits = certToken.getKeyUsageBits(); if (DSSUtils.isEmpty(keyUsageBits)) { return; } final XmlKeyUsageBits xmlKeyUsageBits = DIAGNOSTIC_DATA_OBJECT_FACTORY.createXmlKeyUsageBits(); final List<String> xmlKeyUsageBitItems = xmlKeyUsageBits.getKeyUsage(); for (final String keyUsageBit : keyUsageBits) { xmlKeyUsageBitItems.add(keyUsageBit); } xmlCert.setKeyUsageBits(xmlKeyUsageBits); }
private void addSignedBy(final XmlNode signatureNode, final XmlDom signCert) { String signedBy = "?"; if (signCert != null) { final String dn = signCert.getValue("./SubjectDistinguishedName[@Format='RFC2253']/text()"); final X509Principal principal = new X509Principal(dn); final Vector<?> values = principal.getValues(new ASN1ObjectIdentifier("2.5.4.3")); if (values != null && values.size() > 0) { final String string = (String) values.get(0); if (DSSUtils.isNotBlank(string)) { signedBy = DSSUtils.replaceStrStr(string, "&", "&"); } if (DSSUtils.isEmpty(signedBy)) { signedBy = DSSUtils.replaceStrStr(dn, "&", "&"); } } } signatureNode.addChild(NodeName.SIGNED_BY, signedBy); }
private void setSigningCertificateAndChain(final WSParameters wsParameters, final SignatureParameters params) { final byte[] signingCertBytes = wsParameters.getSigningCertificateBytes(); if (signingCertBytes == null) { return; } final X509Certificate x509SigningCertificate = DSSUtils.loadCertificate(signingCertBytes); params.setSigningCertificate(x509SigningCertificate); final List<ChainCertificate> chainCertificates = new ArrayList<ChainCertificate>(); chainCertificates.add(new ChainCertificate(x509SigningCertificate, true)); final List<WSChainCertificate> wsChainCertificateList = wsParameters.getChainCertificateList(); if (!DSSUtils.isEmpty(wsChainCertificateList)) { for (final WSChainCertificate wsChainCertificate : wsChainCertificateList) { final X509Certificate x509Certificate = DSSUtils.loadCertificate(wsChainCertificate.getX509Certificate()); final ChainCertificate chainCertificate = new ChainCertificate(x509Certificate, wsChainCertificate.isSignedAttribute()); if (!chainCertificates.contains(chainCertificate)) { chainCertificates.add(chainCertificate); } } } params.setCertificateChain(chainCertificates); }
@Override protected void init() { final Parameters parameters = getController().getParameter(); final SignatureModel model = getModel(); if (parameters.hasSignaturePolicyAlgo() && DSSUtils.isEmpty(model.getSignaturePolicyAlgo())) { model.setSignaturePolicyAlgo(parameters.getSignaturePolicyAlgo()); } if (parameters.hasSignaturePolicyValue() && DSSUtils.isEmpty(model.getSignaturePolicyValue())) { model.setSignaturePolicyValue(DSSUtils.base64Encode(parameters.getSignaturePolicyValue())); } // TODO: (Bob: 2014 Jan 19) To be adapted to baseline profile final boolean levelBES = model.getLevel().toUpperCase().endsWith("-BES"); model.setSignaturePolicyVisible(!levelBES); }
private static void prepareCertificateChain(SignatureParameters parameters, WsParameters wsParameters) { final List<ChainCertificate> certificateChain = parameters.getCertificateChain(); if (!DSSUtils.isEmpty(certificateChain)) { final List<WsChainCertificate> wsChainCertificateList = wsParameters.getChainCertificateList(); for (final ChainCertificate chainCertificate : certificateChain) { final WsChainCertificate wsChainCertificate = new WsChainCertificate(); final X509Certificate x509Certificate = chainCertificate.getX509Certificate(); wsChainCertificate.setX509Certificate(DSSUtils.getEncoded(x509Certificate)); wsChainCertificate.setSignedAttribute(chainCertificate.isSignedAttribute()); wsChainCertificateList.add(wsChainCertificate); } } }
@Override public CRLToken findCrl(final CertificateToken certificateToken) throws DSSException { if (certificateToken == null) { return null; } final CertificateToken issuerToken = certificateToken.getIssuerToken(); if (issuerToken == null) { return null; } final List<String> crlUrls = getCrlUrl(certificateToken, preferredProtocol); if (DSSUtils.isEmpty(crlUrls)) { return null; } final DataLoader.DataAndUrl dataAndUrl = downloadCrl(crlUrls); if (dataAndUrl == null) { return null; } final X509CRL x509CRL = buildX509Crl(dataAndUrl.data); if (x509CRL == null) { return null; } final List<String> dpUrlList = new ArrayList<String>(); dpUrlList.add(dataAndUrl.urlString); final CRLValidity crlValidity = isValidCRL(x509CRL, issuerToken, dpUrlList); final CRLToken crlToken = new CRLToken(certificateToken, crlValidity); crlToken.setSourceURL(dataAndUrl.urlString); return crlToken; }
if (DSSUtils.isEmpty(transforms)) { transformedReferenceBytes = DSSXMLUtils.serializeNode(nodeToTransform); } else {
if (DSSUtils.isEmpty(crlUrls)) { return null;
if (value != null && "*".equals(expectedValue)) { contains = true; } else if (!DSSUtils.isEmpty(valueList)) { contains = valueList.containsAll(identifiers); value = valueList.toString();
@Override public OCSPToken getOCSPToken(final CertificateToken certificateToken, final CertificatePool certificatePool) { if (certificateToken == null) { return null; } if (certificateToken.getIssuerToken() == null) { return null; } final String ocspAccessLocation = getAccessLocation(certificateToken); if (DSSUtils.isEmpty(ocspAccessLocation)) { return null; } final CertificateID certificateId = DSSRevocationUtils.getCertificateID(certificateToken); // The nonce extension is used to bind the request to the response, to prevent replay attacks. final NonceContainer nonceContainer = getNonceContainer(); final byte[] ocspRequest = buildOCSPRequest(certificateId, nonceContainer); final boolean refresh = shouldCacheBeRefreshed(certificateId); final BasicOCSPResp basicOCSPResp = buildBasicOCSPResp(ocspAccessLocation, ocspRequest, refresh); checkNonce(certificateToken.getDSSIdAsString(), basicOCSPResp, nonceContainer); final SingleResp bestSingleResp = getBestSingleResp(certificateId, basicOCSPResp); if (bestSingleResp == null) { return null; } final OCSPToken ocspToken = new OCSPToken(basicOCSPResp, bestSingleResp, certificatePool); ocspToken.setSourceURI(ocspAccessLocation); certificateToken.setRevocationToken(ocspToken); updateCacheIfRefreshed(certificateId, refresh, ocspToken); return ocspToken; }
DSSUtils.closeQuietly(inputStream); final DSSDocument signature; if (DSSUtils.isEmpty(toSignDocument.getName())) { signature = new InMemoryDocument(byteArrayOutputStream.toByteArray(), null, MimeType.PDF); } else {