@Override public Date getNotAfter() { return mDelegate.getNotAfter(); }
public Date getNotAfter() { return cert.getNotAfter(); }
private boolean certificateMatches(X509Certificate[] certs, boolean needsToBeExpired) { for (X509Certificate cert : certs) if (cert.getSubjectX500Principal().getName().equals(subjectPrincipalName) && (!needsToBeExpired || cert.getNotAfter().before(new Date()))) return true; return false; }
@Override public Date getNotAfter() { return unwrap().getNotAfter(); }
@Override public Date getNotAfter() { return unwrap().getNotAfter(); }
private SigModel(X509Certificate cert) { this.subject=cert.getSubjectDN().toString(); this.issuer=cert.getIssuerDN().toString(); this.validDates= FORMAT.format(cert.getNotBefore())+" to "+ FORMAT.format(cert.getNotAfter()); } }
public String generateHeader() { StringBuilder builder = new StringBuilder(); append(builder, NLS.str("certificate.cert_type"), x509cert.getType()); append(builder, NLS.str("certificate.serialSigVer"), ((Integer) x509cert.getVersion()).toString()); // serial number append(builder, NLS.str("certificate.serialNumber"), "0x" + x509cert.getSerialNumber().toString(16)); // Get subject Principal subjectDN = x509cert.getSubjectDN(); append(builder, NLS.str("certificate.cert_subject"), subjectDN.getName()); append(builder, NLS.str("certificate.serialValidFrom"), x509cert.getNotBefore().toString()); append(builder, NLS.str("certificate.serialValidUntil"), x509cert.getNotAfter().toString()); return builder.toString(); }
final Date notAfter = certificate.getNotAfter(); if (earliestNotAfter == null || ( notAfter != null && notAfter.before( earliestNotAfter ) ) )
/** * {@inheritDoc} */ @Override public void handle(Socket socket) throws IOException, InterruptedException { try { X509Certificate certificate = (X509Certificate) keyStore.getCertificate("jenkins"); if (certificate == null || certificate.getNotAfter().getTime() < System.currentTimeMillis() + TimeUnit.DAYS.toMillis(1)) { LOGGER.log(Level.INFO, "Updating {0} TLS certificate to retain validity", getName()); X509Certificate identityCertificate = InstanceIdentityProvider.RSA.getCertificate(); RSAPrivateKey privateKey = InstanceIdentityProvider.RSA.getPrivateKey(); char[] password = "password".toCharArray(); keyStore.setKeyEntry("jenkins", privateKey, password, new X509Certificate[]{identityCertificate}); } } catch (KeyStoreException e) { LOGGER.log(Level.FINEST, "Ignored", e); } handler.handle(socket, Collections.singletonMap(JnlpConnectionState.COOKIE_KEY, JnlpAgentReceiver.generateCookie()), ExtensionList.lookup(JnlpAgentReceiver.class)); }
173 Date now = new Date(); 174 if (lastCertificate.getSubjectDN().equals(lastCertificate.getIssuerDN()) 175 && now.after(lastCertificate.getNotAfter())) { 176 --chainLength; 177 }
Date now = new Date(); if (lastCertificate.getSubjectDN().equals(lastCertificate.getIssuerDN()) && now.after(lastCertificate.getNotAfter()))
Date now = new Date(); if (lastCertificate.getSubjectDN().equals(lastCertificate.getIssuerDN()) && now.after(lastCertificate.getNotAfter())) { --chainLength;
certs.append(x509cert.getNotBefore()); certs.append("\nNot After: "); certs.append(x509cert.getNotAfter()); certs.append("\n\n-----BEGIN CERTIFICATE-----\n"); certs.append(DatatypeConverter.printBase64Binary(
@Override public void run() { try { if (AcmeClient.DOMAIN_CHAIN_FILE.exists()) { //stream closed inside utilities method X509Certificate cert = readX509Certificate(); Date expirationDate = cert.getNotAfter(); long daysToExpire = getDateDiff(expirationDate); log.info("Certificate expiration date is {}. Days left : {}", expirationDate, daysToExpire); if (daysToExpire <= renewBeforeDays) { renew(); } } else { renew(); } } catch (Exception e) { log.error("Error during certificate renewal.", e); } }
Log.debug( " length: " + chain.length ); for (int i=0; i<chain.length; i++) { Log.debug( " Certificate[{}] (valid from {} to {}):", i, chain[ i ].getNotBefore(), chain[ i ].getNotAfter() ); Log.debug( " subjectDN: " + chain[ i ].getSubjectDN() ); Log.debug( " issuerDN: " + chain[ i ].getIssuerDN() );
certificate.writeCertificate(fw); log.info("Overriding certificate. Expiration date is : {}", certificate.getCertificate().getNotAfter());
@Override public Date getNotAfter() { return unwrap().getNotAfter(); }
public static CertificateMeta from(X509Certificate certificate) throws CertificateEncodingException { byte[] bytes = certificate.getEncoded(); String certMd5 = md5Digest(bytes); String publicKeyString = byteToHexString(bytes); String certBase64Md5 = md5Digest(publicKeyString); return new CertificateMeta( certificate.getSigAlgName().toUpperCase(), certificate.getSigAlgOID(), certificate.getNotBefore(), certificate.getNotAfter(), bytes, certBase64Md5, certMd5); }
/** * Adds the to store. * * @param certs the certs * @param alias the alias * @param x509Cert the x509 cert */ private void addToStore(List<Cert> certs, String alias, X509Certificate x509Cert) { Cert cert = new Cert(); cert.setAlias(alias); cert.setSubjectDistinguishedName(x509Cert.getSubjectDN().toString()); cert.setNotBefore(x509Cert.getNotBefore()); cert.setNotAfter(x509Cert.getNotAfter()); cert.setIssuerDistinguishedName(x509Cert.getIssuerDN().toString()); certs.add(cert); }
@Test public void testCertificateConversionMethods() throws Exception { final X509Certificate in = caCertificate; final String pem = CertUtils.x509CertificateToPem(in); final X509Certificate out = CertUtils.pemToX509Certificate(pem); Assert.assertTrue(pem.startsWith("-----BEGIN CERTIFICATE-----\n")); Assert.assertTrue(pem.endsWith("-----END CERTIFICATE-----\n")); Assert.assertEquals(in.getSerialNumber(), out.getSerialNumber()); Assert.assertArrayEquals(in.getSignature(), out.getSignature()); Assert.assertEquals(in.getSigAlgName(), out.getSigAlgName()); Assert.assertEquals(in.getPublicKey(), out.getPublicKey()); Assert.assertEquals(in.getNotBefore(), out.getNotBefore()); Assert.assertEquals(in.getNotAfter(), out.getNotAfter()); Assert.assertEquals(in.getIssuerDN().toString(), out.getIssuerDN().toString()); }