/** * Returns the CRL entry for the specified certificate. * * @param certificate * the certificate to search a CRL entry for. * @return the entry for the specified certificate, or {@code null} if not * found. */ public X509CRLEntry getRevokedCertificate(X509Certificate certificate) { if (certificate == null) { throw new NullPointerException("certificate == null"); } return getRevokedCertificate(certificate.getSerialNumber()); }
throws RevokedCertificateException X509CRLEntry revokedCRLEntry = crl.getRevokedCertificate(cert); if (revokedCRLEntry != null && revokedCRLEntry.getRevocationDate().compareTo(signDate) <= 0)
@Override public X509CRLEntry getRevokedCertificate(BigInteger serialNumber) { X509CRL crl = this.crl; if (crl != null) { return crl.getRevokedCertificate(serialNumber); } else { return null; } }
/** * Returns the CRL entry for the specified certificate. * * @param certificate * the certificate to search a CRL entry for. * @return the entry for the specified certificate, or {@code null} if not * found. */ public X509CRLEntry getRevokedCertificate(X509Certificate certificate) { if (certificate == null) { throw new NullPointerException("certificate == null"); } return getRevokedCertificate(certificate.getSerialNumber()); }
/** * Returns the CRL entry for the specified certificate. * * @param certificate * the certificate to search a CRL entry for. * @return the entry for the specified certificate, or {@code null} if not * found. */ public X509CRLEntry getRevokedCertificate(X509Certificate certificate) { if (certificate == null) { throw new NullPointerException("certificate == null"); } return getRevokedCertificate(certificate.getSerialNumber()); }
/** * Returns the CRL entry for the specified certificate. * * @param certificate * the certificate to search a CRL entry for. * @return the entry for the specified certificate, or {@code null} if not * found. */ public X509CRLEntry getRevokedCertificate(X509Certificate certificate) { if (certificate == null) { throw new NullPointerException("certificate == null"); } return getRevokedCertificate(certificate.getSerialNumber()); }
/** * Returns the CRL entry for the specified certificate. * * @param certificate * the certificate to search a CRL entry for. * @return the entry for the specified certificate, or {@code null} if not * found. */ public X509CRLEntry getRevokedCertificate(X509Certificate certificate) { if (certificate == null) { throw new NullPointerException("certificate == null"); } return getRevokedCertificate(certificate.getSerialNumber()); }
/** * Returns the CRL entry for the specified certificate. * * @param certificate * the certificate to search a CRL entry for. * @return the entry for the specified certificate, or {@code null} if not * found. */ public X509CRLEntry getRevokedCertificate(X509Certificate certificate) { if (certificate == null) { throw new NullPointerException("certificate == null"); } return getRevokedCertificate(certificate.getSerialNumber()); }
/** * Returns the CRL entry for the specified certificate. * * @param certificate * the certificate to search a CRL entry for. * @return the entry for the specified certificate, or {@code null} if not * found. */ public X509CRLEntry getRevokedCertificate(X509Certificate certificate) { if (certificate == null) { throw new NullPointerException("certificate == null"); } return getRevokedCertificate(certificate.getSerialNumber()); }
@Override public X509CRLEntry getRevocationInfo(CRLValidity crlValidity, BigInteger serialNumber) { X509CRL crl = getCRL(crlValidity); return crl.getRevokedCertificate(serialNumber); }
LOGGER.debug("Valid CRLs [{}] found that are not expired yet", crls); val revokedCrls = crls.stream().map(crl -> crl.getRevokedCertificate(cert)).filter(Objects::nonNull).collect(Collectors.toList()); if (revokedCrls.size() == crls.size()) { val entry = revokedCrls.get(0);
final X509CRLEntry entry = crl.getRevokedCertificate(cert); if (entry != null) { revokedCrls.add(entry);
throws RevokedCertificateException X509CRLEntry revokedCRLEntry = crl.getRevokedCertificate(cert); if (revokedCRLEntry != null && revokedCRLEntry.getRevocationDate().compareTo(signDate) <= 0)
X509CRLEntry crlEntry = x509crl.getRevokedCertificate(certificate.getSerialNumber()); if (crlEntry == null) { log.debug("CRL status is valid for '" + subjectX500Principal + "'");
/** * @param certificateToken the {@code CertificateToken} which is managed by this CRL. */ private void setRevocationStatus(final CertificateToken certificateToken) { final CertificateToken issuerToken = certificateToken.getIssuerToken(); if (!issuerToken.equals(crlValidity.issuerToken)) { if (!crlValidity.signatureIntact) { throw new DSSException(crlValidity.signatureInvalidityReason); } throw new DSSException("The CRLToken is not signed by the same issuer as the CertificateToken to be verified!"); } final BigInteger serialNumber = certificateToken.getSerialNumber(); final X509CRL x509crl = crlValidity.x509CRL; final X509CRLEntry crlEntry = x509crl.getRevokedCertificate(serialNumber); status = null == crlEntry; if (!status) { revocationDate = crlEntry.getRevocationDate(); final String revocationReason = DSSRevocationUtils.getRevocationReason(crlEntry); reason = revocationReason; } }
crl_entry = crl.getRevokedCertificate(getSerialNumber(cert)); crl_entry = crl.getRevokedCertificate(getSerialNumber(cert));
crl_entry = crl.getRevokedCertificate(getSerialNumber(cert)); crl_entry = crl.getRevokedCertificate(getSerialNumber(cert));
crl_entry = crl.getRevokedCertificate(getSerialNumber(cert)); crl_entry = crl.getRevokedCertificate(getSerialNumber(cert));
crl_entry = crl.getRevokedCertificate(getSerialNumber(cert)); crl_entry = crl.getRevokedCertificate(getSerialNumber(cert));
crl_entry = crl.getRevokedCertificate(CertPathValidatorUtilitiesCanl.getSerialNumber(cert)); } else crl_entry = crl.getRevokedCertificate(CertPathValidatorUtilitiesCanl.getSerialNumber(cert));