/** * {@inheritDoc} * * <p> * If the set of trusted names is null or empty, or if no supported name types are configured to be * checked, then the evaluation is considered successful. * </p> * */ @SuppressWarnings("unchecked") public boolean evaluate(X509Credential credential, Set<String> trustedNames) throws SecurityException { if (!isNameCheckingActive()) { log.debug("No trusted name options are active, skipping name evaluation"); return true; } else if (trustedNames == null || trustedNames.isEmpty()) { log.debug("Supplied trusted names are null or empty, skipping name evaluation"); return true; } if (log.isDebugEnabled()) { log.debug("Checking trusted names against credential: {}", X509Util.getIdentifiersToken(credential, x500DNHandler)); log.debug("Trusted names being evaluated are: {}", trustedNames.toString()); } return processNameChecks(credential, trustedNames); }
/** * {@inheritDoc} * * <p> * If the set of trusted names is null or empty, or if no supported name types are configured to be * checked, then the evaluation is considered successful. * </p> * */ @SuppressWarnings("unchecked") public boolean evaluate(X509Credential credential, Set<String> trustedNames) throws SecurityException { if (!isNameCheckingActive()) { log.debug("No trusted name options are active, skipping name evaluation"); return true; } else if (trustedNames == null || trustedNames.isEmpty()) { log.debug("Supplied trusted names are null or empty, skipping name evaluation"); return true; } if (log.isDebugEnabled()) { log.debug("Checking trusted names against credential: {}", X509Util.getIdentifiersToken(credential, x500DNHandler)); log.debug("Trusted names being evaluated are: {}", trustedNames.toString()); } return processNameChecks(credential, trustedNames); }