/** * Sets the criterion for the subject public key signature algorithm. * <p> * The certificate must contain a subject public key with the algorithm * specified. * * @param oid * the OID (object identifier) of the signature algorithm or * {@code null} to not check the OID. * @throws IOException * if the specified object identifier is invalid. */ public void setSubjectPublicKeyAlgID(String oid) throws IOException { if (oid == null) { subjectPublicKeyAlgID = null; return; } checkOID(oid); subjectPublicKeyAlgID = oid; }
/** * Sets the criterion for the {@literal ExtendedKeyUsage} extension. * * @param keyUsage * the set of key usage OIDs, or {@code null} to not check it. * @throws IOException * if one of the OIDs is invalid. */ public void setExtendedKeyUsage(Set<String> keyUsage) throws IOException { extendedKeyUsage = null; if ((keyUsage == null) || (keyUsage.size() == 0)) { return; } HashSet<String> key_u = new HashSet<String>(); for (String usage : keyUsage) { checkOID(usage); key_u.add(usage); } extendedKeyUsage = Collections.unmodifiableSet(key_u); }
/** * Sets the criterion for the policy constraint. * <p> * The certificate must have at least one of the specified certificate * policy extensions. For an empty set the certificate must have at least * some policies in its policy extension. * * @param policies * the certificate policy OIDs, an empty set, or {@code null} to * not perform this check. * @throws IOException * if parsing the specified OIDs fails. */ public void setPolicy(Set<String> policies) throws IOException { if (policies == null) { this.policies = null; return; } HashSet<String> pols = new HashSet<String>(policies.size()); for (String certPolicyId : policies) { checkOID(certPolicyId); pols.add(certPolicyId); } this.policies = Collections.unmodifiableSet(pols); }
/** * Sets the criterion for the subject public key signature algorithm. * <p> * The certificate must contain a subject public key with the algorithm * specified. * * @param oid * the OID (object identifier) of the signature algorithm or * {@code null} to not check the OID. * @throws IOException * if the specified object identifier is invalid. */ public void setSubjectPublicKeyAlgID(String oid) throws IOException { if (oid == null) { subjectPublicKeyAlgID = null; return; } checkOID(oid); subjectPublicKeyAlgID = oid; }
/** * Sets the criterion for the subject public key signature algorithm. * <p> * The certificate must contain a subject public key with the algorithm * specified. * * @param oid * the OID (object identifier) of the signature algorithm or * {@code null} to not check the OID. * @throws IOException * if the specified object identifier is invalid. */ public void setSubjectPublicKeyAlgID(String oid) throws IOException { if (oid == null) { subjectPublicKeyAlgID = null; return; } checkOID(oid); subjectPublicKeyAlgID = oid; }
/** * Sets the criterion for the subject public key signature algorithm. * <p> * The certificate must contain a subject public key with the algorithm * specified. * * @param oid * the OID (object identifier) of the signature algorithm or * {@code null} to not check the OID. * @throws IOException * if the specified object identifier is invalid. */ public void setSubjectPublicKeyAlgID(String oid) throws IOException { if (oid == null) { subjectPublicKeyAlgID = null; return; } checkOID(oid); subjectPublicKeyAlgID = oid; }
/** * Sets the criterion for the subject public key signature algorithm. * <p> * The certificate must contain a subject public key with the algorithm * specified. * * @param oid * the OID (object identifier) of the signature algorithm or * {@code null} to not check the OID. * @throws IOException * if the specified object identifier is invalid. */ public void setSubjectPublicKeyAlgID(String oid) throws IOException { if (oid == null) { subjectPublicKeyAlgID = null; return; } checkOID(oid); subjectPublicKeyAlgID = oid; }
/** * Sets the criterion for the subject public key signature algorithm. * <p> * The certificate must contain a subject public key with the algorithm * specified. * * @param oid * the OID (object identifier) of the signature algorithm or * {@code null} to not check the OID. * @throws IOException * if the specified object identifier is invalid. */ public void setSubjectPublicKeyAlgID(String oid) throws IOException { if (oid == null) { subjectPublicKeyAlgID = null; return; } checkOID(oid); subjectPublicKeyAlgID = oid; }
/** * Sets the criterion for the subject public key signature algorithm. * <p> * The certificate must contain a subject public key with the algorithm * specified. * * @param oid * the OID (object identifier) of the signature algorithm or * {@code null} to not check the OID. * @throws IOException * if the specified object identifier is invalid. */ public void setSubjectPublicKeyAlgID(String oid) throws IOException { if (oid == null) { subjectPublicKeyAlgID = null; return; } checkOID(oid); subjectPublicKeyAlgID = oid; }
/** * Sets the criterion for the {@literal ExtendedKeyUsage} extension. * * @param keyUsage * the set of key usage OIDs, or {@code null} to not check it. * @throws IOException * if one of the OIDs is invalid. */ public void setExtendedKeyUsage(Set<String> keyUsage) throws IOException { extendedKeyUsage = null; if ((keyUsage == null) || (keyUsage.size() == 0)) { return; } HashSet<String> key_u = new HashSet<String>(); for (String usage : keyUsage) { checkOID(usage); key_u.add(usage); } extendedKeyUsage = Collections.unmodifiableSet(key_u); }
/** * Sets the criterion for the {@literal ExtendedKeyUsage} extension. * * @param keyUsage * the set of key usage OIDs, or {@code null} to not check it. * @throws IOException * if one of the OIDs is invalid. */ public void setExtendedKeyUsage(Set<String> keyUsage) throws IOException { extendedKeyUsage = null; if ((keyUsage == null) || (keyUsage.size() == 0)) { return; } HashSet<String> key_u = new HashSet<String>(); for (String usage : keyUsage) { checkOID(usage); key_u.add(usage); } extendedKeyUsage = Collections.unmodifiableSet(key_u); }
/** * Sets the criterion for the {@literal ExtendedKeyUsage} extension. * * @param keyUsage * the set of key usage OIDs, or {@code null} to not check it. * @throws IOException * if one of the OIDs is invalid. */ public void setExtendedKeyUsage(Set<String> keyUsage) throws IOException { extendedKeyUsage = null; if ((keyUsage == null) || (keyUsage.size() == 0)) { return; } HashSet<String> key_u = new HashSet<String>(); for (String usage : keyUsage) { checkOID(usage); key_u.add(usage); } extendedKeyUsage = Collections.unmodifiableSet(key_u); }
/** * Sets the criterion for the {@literal ExtendedKeyUsage} extension. * * @param keyUsage * the set of key usage OIDs, or {@code null} to not check it. * @throws IOException * if one of the OIDs is invalid. */ public void setExtendedKeyUsage(Set<String> keyUsage) throws IOException { extendedKeyUsage = null; if ((keyUsage == null) || (keyUsage.size() == 0)) { return; } HashSet<String> key_u = new HashSet<String>(); for (String usage : keyUsage) { checkOID(usage); key_u.add(usage); } extendedKeyUsage = Collections.unmodifiableSet(key_u); }
/** * Sets the criterion for the {@literal ExtendedKeyUsage} extension. * * @param keyUsage * the set of key usage OIDs, or {@code null} to not check it. * @throws IOException * if one of the OIDs is invalid. */ public void setExtendedKeyUsage(Set<String> keyUsage) throws IOException { extendedKeyUsage = null; if ((keyUsage == null) || (keyUsage.size() == 0)) { return; } HashSet<String> key_u = new HashSet<String>(); for (String usage : keyUsage) { checkOID(usage); key_u.add(usage); } extendedKeyUsage = Collections.unmodifiableSet(key_u); }
/** * Sets the criterion for the {@literal ExtendedKeyUsage} extension. * * @param keyUsage * the set of key usage OIDs, or {@code null} to not check it. * @throws IOException * if one of the OIDs is invalid. */ public void setExtendedKeyUsage(Set<String> keyUsage) throws IOException { extendedKeyUsage = null; if ((keyUsage == null) || (keyUsage.size() == 0)) { return; } HashSet<String> key_u = new HashSet<String>(); for (String usage : keyUsage) { checkOID(usage); key_u.add(usage); } extendedKeyUsage = Collections.unmodifiableSet(key_u); }
/** * Sets the criterion for the policy constraint. * <p> * The certificate must have at least one of the specified certificate * policy extensions. For an empty set the certificate must have at least * some policies in its policy extension. * * @param policies * the certificate policy OIDs, an empty set, or {@code null} to * not perform this check. * @throws IOException * if parsing the specified OIDs fails. */ public void setPolicy(Set<String> policies) throws IOException { if (policies == null) { this.policies = null; return; } HashSet<String> pols = new HashSet<String>(policies.size()); for (String certPolicyId : policies) { checkOID(certPolicyId); pols.add(certPolicyId); } this.policies = Collections.unmodifiableSet(pols); }
/** * Sets the criterion for the policy constraint. * <p> * The certificate must have at least one of the specified certificate * policy extensions. For an empty set the certificate must have at least * some policies in its policy extension. * * @param policies * the certificate policy OIDs, an empty set, or {@code null} to * not perform this check. * @throws IOException * if parsing the specified OIDs fails. */ public void setPolicy(Set<String> policies) throws IOException { if (policies == null) { this.policies = null; return; } HashSet<String> pols = new HashSet<String>(policies.size()); for (String certPolicyId : policies) { checkOID(certPolicyId); pols.add(certPolicyId); } this.policies = Collections.unmodifiableSet(pols); }
/** * Sets the criterion for the policy constraint. * <p> * The certificate must have at least one of the specified certificate * policy extensions. For an empty set the certificate must have at least * some policies in its policy extension. * * @param policies * the certificate policy OIDs, an empty set, or {@code null} to * not perform this check. * @throws IOException * if parsing the specified OIDs fails. */ public void setPolicy(Set<String> policies) throws IOException { if (policies == null) { this.policies = null; return; } HashSet<String> pols = new HashSet<String>(policies.size()); for (String certPolicyId : policies) { checkOID(certPolicyId); pols.add(certPolicyId); } this.policies = Collections.unmodifiableSet(pols); }
/** * Sets the criterion for the policy constraint. * <p> * The certificate must have at least one of the specified certificate * policy extensions. For an empty set the certificate must have at least * some policies in its policy extension. * * @param policies * the certificate policy OIDs, an empty set, or {@code null} to * not perform this check. * @throws IOException * if parsing the specified OIDs fails. */ public void setPolicy(Set<String> policies) throws IOException { if (policies == null) { this.policies = null; return; } HashSet<String> pols = new HashSet<String>(policies.size()); for (String certPolicyId : policies) { checkOID(certPolicyId); pols.add(certPolicyId); } this.policies = Collections.unmodifiableSet(pols); }
/** * Sets the criterion for the policy constraint. * <p> * The certificate must have at least one of the specified certificate * policy extensions. For an empty set the certificate must have at least * some policies in its policy extension. * * @param policies * the certificate policy OIDs, an empty set, or {@code null} to * not perform this check. * @throws IOException * if parsing the specified OIDs fails. */ public void setPolicy(Set<String> policies) throws IOException { if (policies == null) { this.policies = null; return; } HashSet<String> pols = new HashSet<String>(policies.size()); for (String certPolicyId : policies) { checkOID(certPolicyId); pols.add(certPolicyId); } this.policies = Collections.unmodifiableSet(pols); }