@Override public String getMessage() { return getLocalizedMessage(); } }
/** * The default constructor for DSSNotETSICompliantException. * * @param message */ public DSSNotETSICompliantException(final MSG message, final String more) { init(message); this.more = more; }
throw new DSSNotETSICompliantException(DSSNotETSICompliantException.MSG.UNRECOGNIZED_TAG, namespaceUri + ":" + localName);
@Override public List<OCSPRef> getOCSPRefs() { final List<OCSPRef> certIds = new ArrayList<OCSPRef>(); final Element signingCertEl = DSSXMLUtils.getElement(signatureElement, xPathQueryHolder.XPATH_OCSP_REFS); if (signingCertEl != null) { final NodeList ocspRefNodes = DSSXMLUtils.getNodeList(signingCertEl, xPathQueryHolder.XPATH__OCSPREF); for (int i = 0; i < ocspRefNodes.getLength(); i++) { final Element certId = (Element) ocspRefNodes.item(i); final Element digestAlgorithmEl = DSSXMLUtils.getElement(certId, xPathQueryHolder.XPATH__DAAV_DIGEST_METHOD); final Element digestValueEl = DSSXMLUtils.getElement(certId, xPathQueryHolder.XPATH__DAAV_DIGEST_VALUE); if (digestAlgorithmEl == null || digestValueEl == null) { throw new DSSNotETSICompliantException(DSSNotETSICompliantException.MSG.XADES_DIGEST_ALG_AND_VALUE_ENCODING); } final String xmlName = digestAlgorithmEl.getAttribute(XMLE_ALGORITHM); final DigestAlgorithm digestAlgo = DigestAlgorithm.forXML(xmlName); final String digestValue = digestValueEl.getTextContent(); final byte[] base64EncodedDigestValue = DSSUtils.base64Decode(digestValue); final OCSPRef ocspRef = new OCSPRef(digestAlgo, base64EncodedDigestValue, false); certIds.add(ocspRef); } } return certIds; }
private void parseQualificationElement(final QualificationElementType qualificationElement, final ServiceInfo service) { final QualifiersType qualifierList = qualificationElement.getQualifiers(); if (qualifierList == null || qualifierList.getQualifier().isEmpty()) { return; } try { final CriteriaListType criteriaList = qualificationElement.getCriteriaList(); if (criteriaList != null) { if (criteriaList.getKeyUsage().isEmpty() && criteriaList.getPolicySet().isEmpty() && criteriaList.getCriteriaList().isEmpty()) { LOG.trace("CriteriaList for service is empty, the QualificationElement is skipped."); return; } final Condition compositeCondition = parseCriteriaList(criteriaList); for (QualifierType qualifier : qualifierList.getQualifier()) { service.addQualifierAndCondition(qualifier.getUri(), compositeCondition); } } } catch (IllegalArgumentException e) { throw new DSSNotETSICompliantException(DSSNotETSICompliantException.MSG.UNSUPPORTED_ASSERT); } }
/** * Adds a service entry (current or history) to the list of certificate tokens. * * @param x509Certificate the certificate which identifies the trusted service * @param trustedService Object defining the trusted service * @param tsProvider Object defining the trusted service provider, must be the parent of the trusted service * @param tlWellSigned Indicates if the signature of trusted list is valid */ private synchronized void addCertificate(final X509Certificate x509Certificate, final AbstractTrustService trustedService, final TrustServiceProvider tsProvider, final boolean tlWellSigned) { try { final ServiceInfo serviceInfo = getServiceInfo(trustedService, tsProvider, tlWellSigned); addCertificate(x509Certificate, serviceInfo); } catch (DSSNotETSICompliantException ex) { LOG.error("The entry for " + trustedService.getServiceName() + " doesn't respect ETSI specification " + ex.getLocalizedMessage()); } }
/** * The default constructor for DSSNotETSICompliantException. * * @param message */ public DSSNotETSICompliantException(final MSG message) { init(message); }
throw new DSSNotETSICompliantException(DSSNotETSICompliantException.MSG.DIFFERENT_SIGNATURE_FORMATS); throw new DSSNotETSICompliantException(DSSNotETSICompliantException.MSG.DIFFERENT_SIGNATURE_FORMATS);
public DSSNotETSICompliantException(final MSG message, final Throwable cause) { super(cause); init(message); }