static Crypto |
CryptoFactory.getCrypto(Credential encryption,
Map<String,PrivateKey> decryptionKeys,
String oCSPPolicy)
Possible values of the OCSPPolicy parameter:
Key
Description
NONE
No OCSP check.
static Crypto |
CryptoFactory.getCryptoFromSession()
|
static RevocationStatusChecker |
RevocationStatusCheckerFactory.getStatusChecker()
|
static RevocationStatusChecker |
RevocationFactory.getStatusChecker()
Deprecated. |
boolean |
CertificateChecker.isCertificateRevoked(File certFile)
|
boolean |
CertificateChecker.isCertificateRevoked(File certFile,
org.joda.time.DateTime validOn)
|
boolean |
CertificateChecker.isCertificateRevoked(X509Certificate cert)
|
boolean |
CertificateChecker.isCertificateRevoked(X509Certificate cert,
org.joda.time.DateTime validOn)
|
boolean |
CertificateChecker.isValidCertificateChain(List<X509Certificate> certificateChain)
|
boolean |
CertificateChecker.isValidCertificateChain(List<X509Certificate> certificateChain,
org.joda.time.DateTime validOn)
|
byte[] |
Crypto.seal(byte[] content,
SecretKey secretKey,
String keyId)
Deprecated. replaced by Crypto.seal(SigningPolicySelector, KeyResult, byte[]) |
byte[] |
Crypto.seal(Crypto.SigningPolicySelector type,
EncryptionToken enncryptionToken,
byte[] content)
|
byte[] |
Crypto.seal(Crypto.SigningPolicySelector type,
KeyResult symmKey,
byte[] content)
|
byte[] |
Crypto.seal(Crypto.SigningPolicySelector type,
Set<EncryptionToken> paramEncryptionTokenSet,
byte[] content)
|
byte[] |
Crypto.seal(Crypto.SigningPolicySelector type,
Set<EncryptionToken> paramEncryptionTokenSet,
KeyResult symmKey,
byte[] content)
|
byte[] |
Crypto.seal(EncryptionToken paramEncryptionToken,
byte[] content)
Deprecated. replaced by Crypto.seal(SigningPolicySelector, EncryptionToken, byte[]) |
byte[] |
Crypto.seal(Set<EncryptionToken> paramEncryptionTokenSet,
byte[] content)
Deprecated. replaced by Crypto.seal(SigningPolicySelector, Set, byte[]) |
byte[] |
Crypto.seal(Set<EncryptionToken> paramEncryptionTokenSet,
byte[] content,
SecretKey secretKey,
String keyId)
Deprecated. replaced by Crypto.seal(SigningPolicySelector, Set, KeyResult, byte[]) |
byte[] |
Crypto.unseal(byte[] message)
Deprecated. replaced by Crypto.unseal(SigningPolicySelector, byte[]) |
UnsealedData |
Crypto.unseal(Crypto.SigningPolicySelector type,
byte[] protectedMessage)
|
UnsealedData |
Crypto.unseal(Crypto.SigningPolicySelector type,
KeyResult symmKey,
byte[] protectedMessage)
|
byte[] |
Crypto.unsealForUnknown(SecretKey key,
byte[] protectedMessage)
Deprecated. replaced by Crypto.unseal(SigningPolicySelector, KeyResult, byte[]) |
| Methods in be.ehealth.technicalconnector.service.etee.impl that throw TechnicalConnectorException |
Key |
AbstractCrypto.generateSecretKey()
|
void |
CryptoImpl.initialize(Map<String,Object> parameterMap)
|
boolean |
ConnectorCertificateChecker.isCertificateRevoked(File certFile)
|
boolean |
ConnectorCertificateChecker.isCertificateRevoked(File certFile,
org.joda.time.DateTime validOn)
|
boolean |
ConnectorCertificateChecker.isCertificateRevoked(X509Certificate cert)
|
boolean |
ConnectorCertificateChecker.isCertificateRevoked(X509Certificate cert,
org.joda.time.DateTime validOn)
|
boolean |
ConnectorCertificateChecker.isValidCertificateChain(List<X509Certificate> certificateChain)
|
boolean |
ConnectorCertificateChecker.isValidCertificateChain(List<X509Certificate> certificateChain,
org.joda.time.DateTime validOn)
|
byte[] |
AbstractEndToEndCrypto.seal(byte[] paramArrayOfByte,
SecretKey secretKey,
String base64encodedSymKekId)
|
byte[] |
AbstractEndToEndCrypto.seal(Crypto.SigningPolicySelector type,
EncryptionToken encryptionToken,
byte[] content)
|
byte[] |
AbstractEndToEndCrypto.seal(Crypto.SigningPolicySelector type,
KeyResult symmKey,
byte[] content)
|
byte[] |
AbstractEndToEndCrypto.seal(Crypto.SigningPolicySelector type,
Set<EncryptionToken> paramEncryptionTokenSet,
byte[] content)
|
byte[] |
CryptoImpl.seal(Crypto.SigningPolicySelector type,
Set<EncryptionToken> paramEncryptionTokenSet,
KeyResult symmKey,
byte[] content)
|
byte[] |
AbstractEndToEndCrypto.seal(EncryptionToken paramEncryptionToken,
byte[] paramArrayOfByte)
|
byte[] |
AbstractEndToEndCrypto.seal(Set<EncryptionToken> paramEncryptionTokenSet,
byte[] paramArrayOfByte)
|
byte[] |
AbstractEndToEndCrypto.seal(Set<EncryptionToken> paramEncryptionTokenSet,
byte[] content,
SecretKey secretKey,
String base64encodedSymKekId)
|
byte[] |
AbstractEndToEndCrypto.unseal(byte[] protectedMessage)
|
UnsealedData |
CryptoImpl.unseal(Crypto.SigningPolicySelector type,
byte[] protectedMessage)
|
UnsealedData |
CryptoImpl.unseal(Crypto.SigningPolicySelector type,
KeyResult symmKey,
byte[] protectedMessage)
|
byte[] |
AbstractEndToEndCrypto.unsealForUnknown(SecretKey key,
byte[] protectedMessage)
|
static byte[] |
AbstractCrypto.unsealWithSymmKey(Key symmKey,
byte[] objectToUnseal)
Deprecated. replaced with ConnectorCryptoUtils.decrypt(symmkey,"DESede",objectToUnseal) |
| Methods in be.ehealth.technicalconnector.service.keydepot that throw TechnicalConnectorException |
EncryptionToken |
KeyDepotManager.getEncryptionETK()
Deprecated. replaced byKeyDepotManager#getETK(EncryptionTokenType.ENCRYPTION) |
GetEtkResponse |
KeyDepotService.getETK(GetEtkRequest etkRequest)
Request an ETK from the Key Depot |
EncryptionToken |
KeyDepotManager.getEtk(IdentifierType identifierType,
Long identifierValue,
String application)
Deprecated. |
EncryptionToken |
KeyDepotManager.getETK(IdentifierType identifierType,
Long identifierValue,
String application)
Gets the EncryptionToken based on the input parameters |
EncryptionToken |
KeyDepotManager.getETK(KeyDepotManager.EncryptionTokenType type)
Gets the EncryptionToken linked with the given EncryptionTokenType parameter. |
Set<EncryptionToken> |
KeyDepotManager.getETKs(IdentifierType identifierType,
Long identifierValue,
String application)
Gets the a Set of EncryptionToken based on the input parameters. |
Set<EncryptionToken> |
KeyDepotManager.getEtkSet(IdentifierType identifierType,
Long identifierValue,
String application)
Deprecated. |
Set<EncryptionToken> |
KeyDepotService.getETKSet(IdentifierType identifierType,
String identifierValue,
String applicationId)
Gets the a Set of EncryptionToken from the KeyDepot based on the input parameters. |
EncryptionToken |
KeyDepotManager.getHolderOfKeyETK()
Deprecated. replaced byKeyDepotManager#getETK(EncryptionTokenType.HOLDER_OF_KEY) |
| Methods in be.ehealth.technicalconnector.service.keydepot.impl that throw TechnicalConnectorException |
EncryptionToken |
KeyDepotManagerImpl.getEncryptionETK()
|
GetEtkResponse |
KeyDepotServiceImpl.getETK(GetEtkRequest etkRequest)
|
EncryptionToken |
KeyDepotManagerImpl.getEtk(IdentifierType identifierType,
Long identifierValue,
String application)
|
EncryptionToken |
KeyDepotManagerImpl.getETK(IdentifierType identifierType,
Long identifierValue,
String application)
|
EncryptionToken |
KeyDepotManagerImpl.getETK(KeyDepotManager.EncryptionTokenType type)
|
Set<EncryptionToken> |
KeyDepotManagerImpl.getETKs(IdentifierType identifierType,
Long identifierValue,
String application)
|
Set<EncryptionToken> |
KeyDepotManagerImpl.getEtkSet(IdentifierType identifierType,
Long identifierValue,
String application)
|
Set<EncryptionToken> |
KeyDepotServiceImpl.getETKSet(IdentifierType identifierType,
String identifierValue,
String applicationId)
|
EncryptionToken |
KeyDepotManagerImpl.getHolderOfKeyETK()
|
| Methods in be.ehealth.technicalconnector.service.kgss that throw TechnicalConnectorException |
void |
KgssManager.add(List<CredentialType> allowedReaders,
byte[] myEtk)
Requests a new key from KGSS and adds it to the cache |
void |
KgssManager.add(String cacheId,
List<CredentialType> allowedReaders,
byte[] myEtk)
Requests a new key from KGSS and adds it to the cache |
KeyResult |
KgssManager.get(String keyId,
byte[] myEtk)
Gets a key from the KeyCache, if the key is not present in the cache it will be retrieved from the KGSS Web Service and added to the
KeyCache. the format of the KeyCache ID searched : keyId |
KeyResult |
KgssService.getKey(GetKeyRequestContent request,
byte[] kgssETK,
SessionItem session)
Gets the key. |
GetKeyResponseContent |
KgssService.getKey(GetKeyRequestContent request,
Credential encryption,
Credential serviceCredential,
Element samlAssertion,
Map<String,PrivateKey> decryptionKeys,
byte[] etk)
Ask the eHealth-platform Key Generation and Storage Service (KGSS) to retrieve a key, based on a given key identifier. |
KeyResult |
KgssService.getNewKey(GetNewKeyRequestContent request,
byte[] kgssETK)
Asks KGSS to generate and store a new key. |
GetNewKeyResponseContent |
KgssService.getNewKey(GetNewKeyRequestContent request,
Credential encryptionCredential,
Map<String,PrivateKey> decryptionKeys,
byte[] kgssETK)
Ask the eHealth-platform Key Generation and Storage Service (KGSS) to generate and store a new key, and return the identifier. |
KeyResult |
KgssManager.getNewKeyFromKgss(List<CredentialType> allowedReaders,
byte[] myEtk)
Retrieves a new key from the KGSS Web Service and returns it. |
| Methods in be.ehealth.technicalconnector.service.kgss.impl that throw TechnicalConnectorException |
static boolean |
KgssServiceImpl.checkReplyStatus(String responseCode)
Check reply status of the web service call, return true when OK. |
KeyResult |
KgssServiceImpl.getKey(GetKeyRequestContent request,
byte[] kgssETK,
SessionItem session)
|
GetKeyResponseContent |
KgssServiceImpl.getKey(GetKeyRequestContent request,
Credential encryption,
Credential service,
Element samlAssertion,
Map<String,PrivateKey> decryptionKeys,
byte[] etkKGSS)
Gets the key. |
KeyResult |
KgssServiceImpl.getNewKey(GetNewKeyRequestContent request,
byte[] kgssETK)
|
GetNewKeyResponseContent |
KgssServiceImpl.getNewKey(GetNewKeyRequestContent request,
Credential encryption,
Map<String,PrivateKey> decryptionKeys,
byte[] etkKGSS)
Gets the new key. |
| Methods in be.ehealth.technicalconnector.service.sts that throw TechnicalConnectorException |
static STSService |
STSServiceFactory.getInstance()
|
Element |
STSService.getToken(Credential headerCredentials,
Credential bodyCredentials,
List<SAMLAttribute> attributes,
List<SAMLAttributeDesignator> designators,
String subjectConfirmationMethod,
Duration validity)
|
Element |
STSService.getToken(Credential headerCredentials,
Credential bodyCredentials,
List<SAMLAttribute> attributes,
List<SAMLAttributeDesignator> designators,
String subjectConfirmationMethod,
int validity)
Deprecated. |
Element |
STSService.getToken(Credential headerCredentials,
Credential bodyCredentials,
List<SAMLAttribute> attributes,
List<SAMLAttributeDesignator> designators,
String authenticationMethod,
String nameQualifier,
String value,
String subjectConfirmationMethod,
Duration validity)
|
Element |
STSService.getToken(Credential headerCredentials,
Credential bodyCredentials,
List<SAMLAttribute> attributes,
List<SAMLAttributeDesignator> designators,
String authenticationMethod,
String nameQualifier,
String value,
String subjectConfirmationMethod,
int validity)
Deprecated. |
Element |
STSService.renewToken(Credential headerCredentials,
Credential bodyCredentials,
Element samlToken,
Duration validity)
|
Element |
STSService.renewToken(Credential headerCredentials,
Credential bodyCredentials,
Element samlToken,
int validity)
Deprecated. |
| Methods in be.ehealth.technicalconnector.service.sts.impl that throw TechnicalConnectorException |
Element |
STSServiceWsTrustImpl.getToken(Credential headerCredentials,
Credential bodyCredentials,
List<SAMLAttribute> attributes,
List<SAMLAttributeDesignator> designators,
String subjectConfirmationMethod,
Duration validity)
|
Element |
STSServiceImpl.getToken(Credential headerCredentials,
Credential bodyCredentials,
List<SAMLAttribute> attributes,
List<SAMLAttributeDesignator> designators,
String subjectConfirmationMethod,
Duration validity)
|
Element |
AbstractSTSService.getToken(Credential headerCredentials,
Credential bodyCredentials,
List<SAMLAttribute> attributes,
List<SAMLAttributeDesignator> designators,
String subjectConfirmationMethod,
int validity)
|
Element |
STSServiceWsTrustImpl.getToken(Credential headerCredentials,
Credential bodyCredentials,
List<SAMLAttribute> attributes,
List<SAMLAttributeDesignator> designators,
String authenticationMethod,
String nameQualifier,
String value,
String subjectConfirmationMethod,
Duration validity)
|
Element |
STSServiceImpl.getToken(Credential headerCredentials,
Credential bodyCredentials,
List<SAMLAttribute> attributes,
List<SAMLAttributeDesignator> designators,
String authenticationMethod,
String nameQualifier,
String value,
String subjectConfirmationMethod,
Duration validity)
|
Element |
AbstractSTSService.getToken(Credential headerCredentials,
Credential bodyCredentials,
List<SAMLAttribute> attributes,
List<SAMLAttributeDesignator> designators,
String authenticationMethod,
String nameQualifier,
String value,
String subjectConfirmationMethod,
int validity)
|
Element |
STSServiceWsTrustImpl.renewToken(Credential headerCredentials,
Credential bodyCredentials,
Element samlToken,
Duration validity)
|
Element |
STSServiceImpl.renewToken(Credential headerCredentials,
Credential bodyCredentials,
Element samlToken,
Duration validity)
|
Element |
AbstractSTSService.renewToken(Credential headerCredentials,
Credential bodyCredentials,
Element samlToken,
int validity)
|
| Methods in be.ehealth.technicalconnector.service.timestamp that throw TechnicalConnectorException |
TSConsultResponse |
ConsultServiceV2.checkCompleteness(X509Certificate certificate,
PrivateKey privateKey,
TSConsultRequest request)
Retrieves the list of missing time stamps, provided is a time period and list of time stamps (id and times). |
TSConsultResponse |
ConsultService.checkCompleteness(X509Certificate certificate,
PrivateKey privateKey,
TSConsultRequest request)
Deprecated. Retrieves the list of missing time stamps, provided is a time period and list of time stamps (id and times). |
static org.bouncycastle.tsp.TimeStampToken |
TimestampUtil.getTimestamp(byte[] tsTokenResponse)
|
TSConsultTSBagResponse |
ConsultServiceV2.getTimestamp(X509Certificate certificate,
PrivateKey privateKey,
TSConsultTSBagRequest request)
Retrieves an actual time stamp from the eHealth-platform Archive, based on a unique sequence number and a time. |
TSConsultTSBagResponse |
ConsultService.getTimestamp(X509Certificate certificate,
PrivateKey privateKey,
TSConsultTSBagRequest request)
Deprecated. Retrieves an actual time stamp from the eHealth-platform Archive, based on a unique sequence number and a time. |
static org.bouncycastle.tsp.TimeStampResponse |
TimestampUtil.getTimestampResponse(byte[] tsTokenResponse)
|
static org.bouncycastle.tsp.TimeStampToken |
TimestampUtil.getTimeStampToken(byte[] tsToken)
Helper method for tests Process timestamp, use the Bouncy Castle framework to get the Time Stamp Token. |
SignResponse |
AuthorityService.signRequest(X509Certificate certificate,
PrivateKey privateKey,
SignRequest request)
This operation can be used to either make a time stamp of one or more documents, or to make a time stamp of the hash value of the
original documents. |
| Methods in be.ehealth.technicalconnector.service.timestamp.impl that throw TechnicalConnectorException |
TSConsultResponse |
ConsultServiceV2Impl.checkCompleteness(X509Certificate certificate,
PrivateKey privateKey,
TSConsultRequest consultRequest)
|
TSConsultResponse |
ConsultServiceImpl.checkCompleteness(X509Certificate certificate,
PrivateKey privateKey,
TSConsultRequest consultRequest)
|
TSConsultTSBagResponse |
ConsultServiceV2Impl.getTimestamp(X509Certificate certificate,
PrivateKey privateKey,
TSConsultTSBagRequest consultRequest)
|
TSConsultTSBagResponse |
ConsultServiceImpl.getTimestamp(X509Certificate certificate,
PrivateKey privateKey,
TSConsultTSBagRequest consultRequest)
|
SignResponse |
AuthorityServiceImpl.signRequest(X509Certificate certificate,
PrivateKey privateKey,
SignRequest signRequest)
|
| Methods in be.ehealth.technicalconnector.session that throw TechnicalConnectorException |
SessionItem |
SessionManager.createFallbackSession(String hokPwd)
Creates a fallback session using a eHealth certificate stored on the computer. |
SessionItem |
SessionManager.createFallbackSession(String hokPwd,
String encryptionPwd)
Creates a fallback session using a eHealth certificate stored on the computer. |
SessionItem |
SessionManager.createFallbackSession(String identPwd,
String hokPwd,
String encryptionPwd)
Creates a fallback session using a eHealth certificate stored on the computer. |
|
ImplementationClassFactory.createImplementationClass(Class<T> clazz,
SessionValidator sessionValidator,
EhealthReplyValidator replyValidator,
Crypto hokCrypto,
Crypto encryptionCrypto,
String... additionalParameters)
Deprecated. use the other createImplementationClass method without crypto |
|
ImplementationClassFactory.createImplementationClass(Class<T> clazz,
SessionValidator sessionValidator,
EhealthReplyValidator replyValidator,
String... additionalParameters)
|
SessionItem |
SessionManager.createSession(String hokPwd)
Creates a session using the certificate on the eID of the user and an holder of key certificate stored on the computer. |
SessionItem |
SessionManager.createSession(String hokPwd,
String encryptionPwd)
Creates a session using the certificate on the eID of the user and an holder of key certificate stored on the computer. |
SessionItem |
SessionManager.createSessionEidOnly()
Creates a session only based on eid card. |
Crypto |
SessionItem.getEncryptionCrypto()
Gets the crypto associated with the Encryption credentials |
Credential |
SessionItem.getHeaderCredential()
|
Crypto |
SessionItem.getHolderOfKeyCrypto()
Gets the crypto associated with the HOK credentials |
void |
SessionManager.loadEncryptionKeys(String encryptionPwd)
|
void |
SessionManager.loadSession(SAMLToken token,
String hokPwd)
Load a session using a previously stored SAML token. |
void |
SessionManager.loadSession(SAMLToken token,
String hokPwd,
String encryptionPwd)
Load a session using a previously stored SAML token with the associated eHealth Encryption Certificates, needed for sealing and
unsealing messages. |
void |
SessionItem.setHeaderCredential(Credential headerCredential)
|
static void |
Session.validateSession()
Convenience method to validate session exists. |
| Methods in be.ehealth.technicalconnector.utils that throw TechnicalConnectorException |
static byte[] |
ConnectorIOUtils.base64Decode(byte[] input)
Deprecated. use ConnectorIOUtils.base64Decode(byte[], boolean) |
static byte[] |
ConnectorIOUtils.base64Decode(byte[] input,
boolean recursive)
Helper method to decode base64 byte[] with or without recursivity. |
static byte[] |
ConnectorCryptoUtils.calculateDigest(String digestAlgo,
byte[] content)
Helper method to calculate a Digest |
static SessionItem |
SessionUtil.checkAndRetrieveSession()
|
static byte[] |
ConnectorIOUtils.compress(boolean noWrap,
byte[] input)
Deprecated. Replaced by ConnectorIOUtils.compress(byte[])
Note:noWrap parameter is not longer used. |
static byte[] |
ConnectorIOUtils.compress(byte[] input)
Compress the given byte[] by using the ConnectorIOUtils.COMPRESSION_ALGO_GZIP |
static byte[] |
ConnectorIOUtils.compress(byte[] input,
String algo)
Compress the given byte[] by using the specified algorithm. |
static void |
ConnectorIOUtils.compress(InputStream in,
OutputStream out,
String algo)
Compress the given InputStream by using the specified algo to the given OutputStream
Note:None of the streams are closed. |
static String |
ConnectorIOUtils.convertStreamToString(InputStream is)
Convert the given InputStream to a String
Note: the inputstream is closed. |
static File |
ConnectorIOUtils.createTempFile(String name)
Given a filename creates a temp file based on the java.io.tmpdir System property. |
static File |
ConnectorIOUtils.createTempFile(String name,
boolean create)
|
static byte[] |
ConnectorIOUtils.decompress(boolean noWrap,
byte[] input)
Deprecated. Replaced by ConnectorIOUtils.compress(byte[])
Note:noWrap parameter is not longer used. |
static byte[] |
ConnectorIOUtils.decompress(byte[] input)
De-compress the given byte[] |
static InputStream |
ConnectorIOUtils.decompress(InputStream input)
De-compress the given InputStream by detecting the used algorithm. |
static void |
ConnectorIOUtils.decompress(InputStream in,
OutputStream out,
boolean noWrap)
Compress the given InputStream to the given OutputStream using the Inflater with or without wrap. |
static byte[] |
ConnectorCryptoUtils.decrypt(Key key,
byte[] encryptedBytes)
Decrypt the encryptedBytes bases on the key. |
static byte[] |
ConnectorCryptoUtils.decrypt(Key key,
String algo,
byte[] encryptedBytes)
Decrypt the encryptedBytes bases on the key and the given algoritm. |
static SecretKey |
ConnectorCryptoUtils.generateKey()
Generate a key based using th default algoritm and keysize. |
static SecretKey |
ConnectorCryptoUtils.generateKey(int keySize)
Generate a key based on the default algoritm and the keysize given as input. |
static SecretKey |
ConnectorCryptoUtils.generateKey(String algo,
int keySize)
Generate a key based on the algoritm and keysize given as input. |
static
|
ConfigurableImplementationHelper.get(String paramName,
Map<String,Object> parameterMap,
Class<T> paramType,
boolean required)
Helper method to extract the wanted param from the parameterMap. |
static byte[] |
ConnectorIOUtils.getBytes(InputStream inputStream)
Get the bytes from the given InputStream
Note: the given stream is closed. |
static Credential |
SessionUtil.getCredentail(CryptoType type,
Credential defaultCredential)
|
static Crypto |
SessionUtil.getCrypto(CryptoType type,
Crypto defaultCrypto)
|
static Credential |
SessionUtil.getEncryptionCredential()
checks the session and the presence of the encryption credential and returns it. |
static Crypto |
SessionUtil.getEncryptionCrypto()
validates if the session and the encryption crypto is present, and returns the encryption Crypto. |
static Credential |
SessionUtil.getHolderOfKeyCredential()
checks the session and the presence of the 'holder of key' credential and returns it. |
static Crypto |
SessionUtil.getHolderOfKeyCrypto()
validates if the session and the 'holder of key' crypto is present, and returns the 'holder of key' Crypto. |
T |
ConfigurableFactoryHelper.getImplementation()
Creates a builder based on the given properties in the configuration or the default class property. |
T |
ConfigurableFactoryHelper.getImplementation(boolean useCache)
Creates a builder based on the given properties in the configuration or the default class property. |
T |
ConfigurableFactoryHelper.getImplementation(Map<String,Object> configParameters)
Creates a builder based on the given properties in the configuration or the default class property. |
T |
ConfigurableFactoryHelper.getImplementation(Map<String,Object> hashMap,
boolean usecache)
|
T |
ConfigurableFactoryHelper.getImplementation(Map<String,Object> configParameters,
boolean useCaching,
boolean silent)
Creates a builder based on the given properties in the configuration or the default class property. |
List<T> |
ConfigurableFactoryHelper.getImplementations()
|
List<T> |
ConfigurableFactoryHelper.getImplementations(boolean useCache)
|
List<T> |
ConfigurableFactoryHelper.getImplementations(boolean useCache,
boolean silent)
|
List<T> |
ConfigurableFactoryHelper.getImplementations(Map<String,Object> configParameters)
|
List<T> |
ConfigurableFactoryHelper.getImplementations(Map<String,Object> configParameters,
boolean useCache)
|
List<T> |
ConfigurableFactoryHelper.getImplementations(Map<String,Object> configParameters,
boolean useCache,
boolean silent)
|
static IdentifierType |
IdentifierType.getInstance(Map<Integer,String> mapping,
int expectedLength)
Instanciate a new instance of IdentifierType if it is not found in the cache. |
static Map<String,List<String>> |
SessionUtil.getMatchingAttributes(String namespacePattern,
String attributeNamePattern)
|
static String |
SessionUtil.getNihii()
retrieves the NIHII of the user using the application. |
static String |
SessionUtil.getNihii11()
retrieves the NIHII of the user using the application. |
static String |
SessionUtil.getNiss()
retrieves the NIHII of the user using the application. |
static byte[] |
ConnectorIOUtils.getResourceAsByteArray(String location)
Gets content of the location as byte[]
Note: technical connector is bootstrapped. |
static File |
ConnectorIOUtils.getResourceAsFile(String location)
Gets content of the location as File
Note: technical connector is bootstrapped. |
static InputStream |
ConnectorIOUtils.getResourceAsStream(String location)
Gets the location as InputStream
Note: technical connector is bootstrapped. |
static InputStream |
ConnectorIOUtils.getResourceAsStream(String location,
boolean bootstrap)
Gets the location as InputStream
Note: technical connector can be bootstrapped. |
static String |
ConnectorIOUtils.getResourceAsString(String location)
Gets content of the location as String
Note: technical connector is bootstrapped. |
static String |
ConnectorIOUtils.getResourceFilePath(String location)
Gets the resource as stream. |
static String |
ConnectorIOUtils.getTempFileLocation(String name)
t Given a filename builds a temp file location path based on the java.io.tmpdir System property. |
void |
ConfigurableImplementation.initialize(Map<String,Object> parameterMap)
initializes the implementation with additional parameters. |
static SOAPMessage |
SOAPUtils.newSOAPMessage(String payload)
|
static byte[] |
ConnectorExceptionUtils.processUnsealConnectorException(UnsealConnectorException e,
String... allowedErrors)
Utility method that handles UnsealConnectorException by ignoring a Array of allowedErrors. |
static byte[] |
ConnectorIOUtils.toBytes(String content,
Charset charsetName)
Get the bytes from the given String by using the correct Charset |
static Document |
ConnectorXmlUtils.toDocument(byte[] data)
|
static Document |
ConnectorXmlUtils.toDocument(Source source)
|
static Document |
ConnectorXmlUtils.toDocument(String xml)
To Document based on a String |
static Element |
ConnectorXmlUtils.toElement(byte[] data)
To Element based on a byte[] |
static String |
ConnectorIOUtils.toString(byte[] message,
Charset charsetName)
Convert the given byte[] to a String by using the corrrect Charset |
static String |
ConnectorXmlUtils.toString(Node node)
To string based on a Node |
static String |
ConnectorXmlUtils.toString(Source source)
To string based on a Source |
static void |
PCSCUtils.verifyPin(char[] pin)
Method to verify the pin code of an EID smartcard |
| Methods in be.ehealth.technicalconnector.ws that throw TechnicalConnectorException |
static GenericWsSender |
ServiceFactory.getGenericWsSender()
|
GenericResponse |
GenericWsSender.send(GenericRequest request)
|
Node |
GenericWsSender.sendCertificateSecured(String url,
Document payload,
X509Certificate certificate,
PrivateKey privateKey)
Deprecated. use the method send(GenericRequest) |
Node |
GenericWsSender.sendCertificateSecured(String url,
Document payload,
X509Certificate certificate,
PrivateKey privateKey,
String soapAction)
Deprecated. use the method send(GenericRequest) |
String |
GenericWsSender.sendCertificateSecured(String url,
String payload,
X509Certificate certificate,
PrivateKey privateKey)
Deprecated. use the method send(GenericRequest) |
String |
GenericWsSender.sendCertificateSecured(String url,
String payload,
X509Certificate certificate,
PrivateKey privateKey,
String soapAction)
Deprecated. use the method send(GenericRequest) |
Node |
GenericWsSender.sendSamlSecured(String url,
Document payload,
Element assertion,
Credential credential)
Deprecated. use the method send(GenericRequest) |
Node |
GenericWsSender.sendSamlSecured(String url,
Document payload,
Element assertion,
Credential credential,
String soapAction)
Deprecated. use the method send(GenericRequest) |
String |
GenericWsSender.sendSamlSecured(String url,
String payload,
Element assertion,
Credential credential)
Deprecated. use the method send(GenericRequest) |
String |
GenericWsSender.sendSamlSecured(String url,
String payload,
Element assertion,
Credential credential,
String soapAction)
Deprecated. use the method send(GenericRequest) |
Node |
GenericWsSender.sendUnsecured(String url,
Document payload)
Deprecated. use the method send(GenericRequest) |
Node |
GenericWsSender.sendUnsecured(String url,
Document payload,
String soapAction)
Deprecated. use the method send(GenericRequest) |
String |
GenericWsSender.sendUnsecured(String url,
String payload)
Deprecated. use the method send(GenericRequest) |
String |
GenericWsSender.sendUnsecured(String url,
String payload,
String soapAction)
Deprecated. use the method send(GenericRequest) |
| Methods in be.ehealth.technicalconnector.ws.impl that throw TechnicalConnectorException |
GenericResponse |
AbstractWsSender.send(GenericRequest genericRequest)
|
Node |
GenericWsSenderImpl.sendCertificateSecured(String url,
Document payload,
X509Certificate certificate,
PrivateKey privateKey)
|
Node |
GenericWsSenderImpl.sendCertificateSecured(String url,
Document payload,
X509Certificate certificate,
PrivateKey privateKey,
String soapAction)
|
String |
GenericWsSenderImpl.sendCertificateSecured(String url,
String payload,
X509Certificate certificate,
PrivateKey privateKey)
|
String |
GenericWsSenderImpl.sendCertificateSecured(String url,
String payload,
X509Certificate certificate,
PrivateKey privateKey,
String soapAction)
|
Node |
GenericWsSenderImpl.sendSamlSecured(String url,
Document payload,
Element assertion,
Credential credential)
|
Node |
GenericWsSenderImpl.sendSamlSecured(String url,
Document payload,
Element assertion,
Credential credential,
String soapAction)
|
String |
GenericWsSenderImpl.sendSamlSecured(String url,
String payload,
Element assertion,
Credential credential)
|
String |
GenericWsSenderImpl.sendSamlSecured(String url,
String payload,
Element assertion,
Credential credential,
String soapAction)
|
Node |
GenericWsSenderImpl.sendUnsecured(String url,
Document payload)
|
Node |
GenericWsSenderImpl.sendUnsecured(String url,
Document payload,
String soapAction)
|
String |
GenericWsSenderImpl.sendUnsecured(String url,
String payload)
|
String |
GenericWsSenderImpl.sendUnsecured(String url,
String payload,
String soapAction)
|
| Methods in be.fgov.ehealth.technicalconnector.ra.utils that throw TechnicalConnectorException |
void |
KeyStoreManager.addAuthenticationChain(char[] passwd,
X509Certificate... chain)
Add the X509Certificate chain to the keystore, the alias of the actuele certificate is "authentication". |
void |
KeyStoreManager.addAuthenticationKeyPair(KeyPair entry,
char[] passwd)
Add the authentication keypair to the keystore, a dummy X509Certificate will be generated. |
void |
KeyStoreManager.addEncryptionToken(KeyPair entry,
char[] passwd,
X509Certificate etkCert)
Add the EncryptionToken to the keystore, the alias will be the hex value of the serialnumber. |
static X509Certificate |
CertificateUtils.generateCert(PublicKey rqPubKey,
BigInteger serialNr,
Credential cred)
Generates a self signed certificate based on the given Credential |
static String |
RaUtils.generateRequestId()
|
static
|
RaUtils.invokeEtkRa(String payload,
String soapAction,
Class<T> clazz)
|
static BigInteger |
CertificateUtils.obtainSerialNumber(PrivateKey key,
byte[] challenge)
Extract the serialnumber from the challenge. |
static void |
RaUtils.setCommonAttributes(RequestType payload)
|
static void |
RaUtils.setIssueInstant(RequestType payload)
|
static String |
RaUtils.sign(Object payload,
String payloadId,
Credential credential)
|
void |
KeyStoreManager.store(String location,
char[] passwd)
Store the keystore to the given location with the given password. |
| Methods in be.fgov.ehealth.technicalconnector.signature that throw TechnicalConnectorException |
static SignatureBuilder |
SignatureBuilderFactory.getSignatureBuilder(AdvancedElectronicSignatureEnumeration instance)
|
byte[] |
SignatureBuilder.sign(Credential signatureCredential,
byte[] byteArrayToSign)
|
byte[] |
SignatureBuilder.sign(Credential signatureCredential,
byte[] byteArrayToSign,
Map<String,Object> options)
|
SignatureVerificationResult |
SignatureBuilder.verify(byte[] content,
byte[] signature,
Map<String,Object> options)
|
SignatureVerificationResult |
SignatureBuilder.verify(byte[] signedByteArray,
Map<String,Object> options)
|
SignatureVerificationResult |
SignatureBuilder.verify(Document signedContent,
Element sigElement,
Map<String,Object> options)
|
| Methods in be.fgov.ehealth.technicalconnector.signature.impl that throw TechnicalConnectorException |
byte[] |
XmlSignatureBuilder.sign(Credential signatureCredential,
byte[] byteArrayToSign)
|
byte[] |
CmsSignatureBuilder.sign(Credential signatureCredential,
byte[] byteArrayToSign)
|
byte[] |
XmlSignatureBuilder.sign(Credential signatureCredential,
byte[] byteArrayToSign,
Map<String,Object> options)
|
byte[] |
CmsSignatureBuilder.sign(Credential signatureCredential,
byte[] byteToSign,
Map<String,Object> options)
|
SignatureVerificationResult |
XmlSignatureBuilder.verify(byte[] signedByteArray,
byte[] signature,
Map<String,Object> options)
|
SignatureVerificationResult |
CmsSignatureBuilder.verify(byte[] content,
byte[] signature,
Map<String,Object> options)
|
SignatureVerificationResult |
XmlSignatureBuilder.verify(byte[] signedByteArray,
Map<String,Object> options)
|
SignatureVerificationResult |
CmsSignatureBuilder.verify(byte[] signedByteArray,
Map<String,Object> options)
|
SignatureVerificationResult |
XmlSignatureBuilder.verify(Document signedContent,
Element sigElement,
Map<String,Object> options)
|
SignatureVerificationResult |
CmsSignatureBuilder.verify(Document signedContent,
Element sigElement,
Map<String,Object> options)
|
| Methods in be.fgov.ehealth.technicalconnector.signature.impl.xades.impl that throw TechnicalConnectorException |
void |
XadesTSpecification.addOptionalAfterSignatureParts(UnsignedPropertiesBuilder unsignedProps,
org.apache.xml.security.signature.XMLSignature sig,
String uuid,
Map<String,Object> options)
|
void |
XadesSpecification.addOptionalAfterSignatureParts(UnsignedPropertiesBuilder unsignedProps,
org.apache.xml.security.signature.XMLSignature sig,
String uuid,
Map<String,Object> options)
|
void |
XadesCSpecification.addOptionalAfterSignatureParts(UnsignedPropertiesBuilder unsignedProps,
org.apache.xml.security.signature.XMLSignature sig,
String uuid,
Map<String,Object> options)
|
void |
XadesBesSpecification.addOptionalAfterSignatureParts(UnsignedPropertiesBuilder unsignedProps,
org.apache.xml.security.signature.XMLSignature sig,
String uuid,
Map<String,Object> options)
|
void |
XadesTSpecification.addOptionalBeforeSignatureParts(SignedPropertiesBuilder signedProps,
org.apache.xml.security.signature.XMLSignature sig,
Credential signing,
String uuid,
Map<String,Object> options)
|
void |
XadesSpecification.addOptionalBeforeSignatureParts(SignedPropertiesBuilder signedProps,
org.apache.xml.security.signature.XMLSignature sig,
Credential signing,
String uuid,
Map<String,Object> options)
|
void |
XadesCSpecification.addOptionalBeforeSignatureParts(SignedPropertiesBuilder signedProps,
org.apache.xml.security.signature.XMLSignature sig,
Credential signing,
String uuid,
Map<String,Object> options)
|
void |
XadesBesSpecification.addOptionalBeforeSignatureParts(SignedPropertiesBuilder signedProps,
org.apache.xml.security.signature.XMLSignature sig,
Credential signing,
String uuid,
Map<String,Object> options)
|
Connector Packaging TECHNICAL 3.28.5 API Copyright © {inceptionYear}-2025 eHealth. All Rights Reserved.
|