/** * Creates a CertificateToken wrapping the provided X509Certificate. A certificate must come from a source like: * trusted store, trusted list, signature... * * @param x509Certificate X509Certificate * @param id DSS internal id (unique certificate's identifier) */ protected CertificateToken(X509Certificate x509Certificate, int id) { this.dssId = id; this.x509Certificate = x509Certificate; this.issuerX500Principal = DSSUtils.getIssuerX500Principal(x509Certificate); // The Algorithm OID is used and not the name {@code x509Certificate.getSigAlgName()} final String sigAlgOID = x509Certificate.getSigAlgOID(); final SignatureAlgorithm signatureAlgorithm = SignatureAlgorithm.forOID(sigAlgOID); this.algorithmUsedToSignToken = signatureAlgorithm; super.extraInfo = this.extraInfo = new CertificateTokenValidationExtraInfo(); }
private void setDefaultValues() { final X509CRL x509crl = crlValidity.x509CRL; final String sigAlgOID = x509crl.getSigAlgOID(); final SignatureAlgorithm signatureAlgorithm = SignatureAlgorithm.forOID(sigAlgOID); this.algorithmUsedToSignToken = signatureAlgorithm; this.issuingTime = x509crl.getThisUpdate(); this.nextUpdate = x509crl.getNextUpdate(); issuerX500Principal = x509crl.getIssuerX500Principal(); this.extraInfo = new TokenValidationExtraInfo(); issuerToken = crlValidity.issuerToken; signatureValid = crlValidity.signatureIntact; signatureInvalidityReason = crlValidity.signatureInvalidityReason; }
final SignatureAlgorithm signatureAlgorithm = SignatureAlgorithm.forOID(oid); return signatureAlgorithm.getEncryptionAlgorithm();
setStatus(singleResp.getCertStatus()); final ASN1ObjectIdentifier signatureAlgOID = basicOCSPResp.getSignatureAlgOID(); final SignatureAlgorithm signatureAlgorithm = SignatureAlgorithm.forOID(signatureAlgOID.getId()); this.algorithmUsedToSignToken = signatureAlgorithm; this.extraInfo = new TokenValidationExtraInfo();