/** * @return the pkcs12File */ public File getPkcs12File() { if (pkcs12File == null) { final String path = userPreferencesDAO.getPKCS12FilePath(); if (DSSUtils.isNotEmpty(path)) { pkcs12File = new File(path); } } return pkcs12File; }
/** * @return the pkcs11File */ public File getPkcs11File() { if (pkcs11File == null) { final String path = userPreferencesDAO.getPKCS11LibraryPath(); if (DSSUtils.isNotEmpty(path)) { pkcs11File = new File(path); } } return pkcs11File; }
@Override protected boolean isValid() { final SignatureModel model = getModel(); if (model.isSignaturePolicyCheck()) { return DSSUtils.isNotEmpty(model.getSignaturePolicyAlgo()) && DSSUtils.isNotEmpty(model.getSignaturePolicyId()) && DSSUtils.isNotEmpty(model.getSignaturePolicyValue()); } return true; } }
@Override protected boolean isValid() { final ExtendSignatureModel model = getModel(); return DSSUtils.isNotEmpty(model.getFormat()) && model.getPackaging() != null && DSSUtils.isNotEmpty(model.getLevel()); } }
@Override protected boolean isValid() { final SignatureModel model = getModel(); return DSSUtils.isNotEmpty(model.getFormat()) && model.getPackaging() != null && DSSUtils.isNotEmpty(model.getLevel()); }
@Override protected boolean isValid() { final File file = getModel().getPkcs12File(); final String password = getModel().getPkcs12Password(); boolean valid = file != null && file.exists() && file.isFile(); valid &= DSSUtils.isNotEmpty(password); return valid; } }
@Override protected boolean isValid() { final File file = getModel().getPkcs11File(); final String password = getModel().getPkcs11Password(); boolean valid = file != null && file.exists() && file.isFile(); valid &= DSSUtils.isNotEmpty(password); return valid; }
private void storeZipComment(final ASiCParameters asicParameters, final ZipOutputStream outZip, final String toSignDocumentName) { if (asicParameters.isZipComment() && DSSUtils.isNotEmpty(toSignDocumentName)) { outZip.setComment("mimetype=" + getMimeTypeBytes(asicParameters)); } }
/** * This method returns {@code true} if the certificate digest or IssuerSerial/issuerAndSerialNumber match or the certificate is signed. The signed reference is checked * following the validation policy. * * @return {@code true} if the certificate digest matches. */ public boolean isValid() { final boolean valid = isDigestEqual() || (isDistinguishedNameEqual() && isSerialNumberEqual()) || DSSUtils.isNotEmpty(getSigned()); return valid; }
proxyPassword = proxyPreferenceManager.getHttpPassword(); if (DSSUtils.isNotEmpty(proxyUser) && DSSUtils.isNotEmpty(proxyPassword)) {
if (DSSUtils.isNotEmpty(appletUsageParam)) { parameters.setAppletUsage(AppletUsage.valueOf(appletUsageParam.toUpperCase())); if (DSSUtils.isNotEmpty(rfc3370Param)) { try { parameters.setStrictRFC3370(Boolean.parseBoolean(rfc3370Param)); if (DSSUtils.isNotEmpty(pkcs11Param)) { final File file = new File(pkcs11Param); if (!file.exists() || file.isFile()) { if (DSSUtils.isNotEmpty(pkcs12Param)) { final File file = new File(pkcs12Param); if (!file.exists() || file.isFile()) { if (DSSUtils.isNotEmpty(defaultPolicyUrl)) { try { parameters.setDefaultPolicyUrl(new URL(defaultPolicyUrl));
@Override protected void init() { final SignatureModel model = getModel(); final Parameters parameters = getController().getParameter(); final SignaturePackaging packaging = parameters.getSignaturePackaging(); final String level = parameters.getSignatureLevel(); final String format = parameters.getSignatureFormat(); if (format != null) { model.setFormat(format); if (packaging != null) { model.setPackaging(packaging); if (DSSUtils.isNotEmpty(level)) { model.setLevel(level); } } } }
if (DSSUtils.isNotEmpty(dpUrlStringList) && dpUrlStringList.contains(name)) { urlFound = true;
if (DSSUtils.isNotEmpty(signedElement)) {