Uses of Interface
be.fgov.ehealth.etee.crypto.status.CryptoResult

Packages that use CryptoResult
be.fgov.ehealth.etee.crypto.cert Classes for validation of a certificate path. 
be.fgov.ehealth.etee.crypto.crl Classes to validate revocation status of a certificate using CRL. 
be.fgov.ehealth.etee.crypto.decrypt Classes for validation and unsealing of sealed message. 
be.fgov.ehealth.etee.crypto.encrypt Classes for sealing of message and validation of ETKs. 
be.fgov.ehealth.etee.crypto.ocsp Classes to validate revocation status of a certificate using OCSP (Online Certificate Status Protocol). 
be.fgov.ehealth.etee.crypto.status Contains result objects and possible notifications. 
 

Uses of CryptoResult in be.fgov.ehealth.etee.crypto.cert
 

Methods in be.fgov.ehealth.etee.crypto.cert that return CryptoResult
 CryptoResult<CertificateStatus> CertPathChecker.validate(java.util.List<java.security.cert.X509Certificate> certificateChain)
           
 CryptoResult<CertificateStatus> CertPathChecker.validate(java.util.List<java.security.cert.X509Certificate> certificateChain, java.util.Date validationDate)
           
 

Uses of CryptoResult in be.fgov.ehealth.etee.crypto.crl
 

Methods in be.fgov.ehealth.etee.crypto.crl that return CryptoResult
 CryptoResult<CRLData> CRLChecker.validate(java.security.cert.X509Certificate cert)
          Extracts the CRL distribution points from the certificate (if available) and checks the certificate revocation status against the CRLs coming from the distribution points.
 CryptoResult<CRLData> CRLChecker.validate(java.security.cert.X509Certificate cert, java.security.cert.CertStore certStore)
          Extracts the CRL distribution points from the certificate (if available) and checks the certificate revocation status against the CRLs coming from the distribution points.
 

Uses of CryptoResult in be.fgov.ehealth.etee.crypto.decrypt
 

Methods in be.fgov.ehealth.etee.crypto.decrypt that return CryptoResult
 CryptoResult<UnsealedData> DataSealChecker.stamp(byte[] data, byte[] timestamp)
          Puts a timestamp on sealed data to prove that it existed in that state on a certain moment in time.
 CryptoResult<UnsealedData> DataSealChecker.stamp(java.io.InputStream data, java.io.OutputStream stampedData, byte[] timestamp)
          Puts a timestamp on sealed data to prove that it existed in that state on a certain moment in time.
 CryptoResult<UnsealedData> DataSealChecker.stamp(java.io.InputStream data, java.io.OutputStream stampedData, byte[] timestamp, DataPipe pipe)
          Puts a timestamp on sealed data to prove that it existed in that state on a certain moment in time.

The updated sealed message will be written into the given outputstream.
 CryptoResult<UnsealedData> DataUnsealer.unseal(byte[] data)
          Unseals the data using the private keys that were provided to the DataUnsealerFactory when this DataUnsealer was created.
 CryptoResult<UnsealedData> DataUnsealer.unseal(byte[] data, javax.crypto.SecretKey kek)
          Unseals the data using the given Key Encryption Key.
 CryptoResult<UnsealedData> DataUnsealer.unseal(java.io.InputStream sealedData, java.io.OutputStream unsealedData)
          Unseals the data using the private keys that were provided to the DataUnsealerFactory when this DataUnsealer was created.
 CryptoResult<UnsealedData> DataUnsealer.unseal(java.io.InputStream sealedData, java.io.OutputStream unsealedData, javax.crypto.SecretKey kek)
          Unseals the data using the given Key Encryption Key.
 CryptoResult<UnsealedData> DataSealChecker.validate(byte[] data)
          Verify if the sealed data is acceptable according to specified policies (ocsp, signing, encryption).
Different levels of notifications can be added to the result (warning, error, fatal).
Additional data from the result can be used for further verifications.
 CryptoResult<UnsealedData> DataSealChecker.validate(java.io.InputStream data, java.io.OutputStream verifiedData)
          Verify if the sealed data is acceptable according to specified policies (ocsp, signing, encryption).
Different levels of notifications can be added to the result (warning, error, fatal).
Additional data from the result can be used for further verifications.
 CryptoResult<UnsealedData> DataSealChecker.validate(java.io.InputStream data, java.io.OutputStream verifiedData, DataPipe pipe)
          Verify if the sealed data is acceptable according to specified policies (ocsp, signing, encryption).
Different levels of notifications can be added to the result (warning, error, fatal).
Additional data from the result can be used for further verifications.
 

Uses of CryptoResult in be.fgov.ehealth.etee.crypto.encrypt
 

Methods in be.fgov.ehealth.etee.crypto.encrypt that return CryptoResult
 CryptoResult<EncryptionToken> EncryptionTokenChecker.validate(EncryptionToken encryptionToken)
           
 

Uses of CryptoResult in be.fgov.ehealth.etee.crypto.ocsp
 

Methods in be.fgov.ehealth.etee.crypto.ocsp that return CryptoResult
 CryptoResult<OCSPData> OCSPChecker.validate(java.security.cert.X509Certificate certificate)
           
 CryptoResult<OCSPData> OCSPChecker.validate(java.security.cert.X509Certificate certificate, java.util.Date signingTime, RevocationValues revocationValues)
           
 

Uses of CryptoResult in be.fgov.ehealth.etee.crypto.status
 

Classes in be.fgov.ehealth.etee.crypto.status that implement CryptoResult
 class BasicCryptoResult<T>
          Basic implementation for status.
 

Methods in be.fgov.ehealth.etee.crypto.status with parameters of type CryptoResult
 void CryptoResult.copyNotifications(CryptoResult<?> subResult)
          Copies notifications of subresults to this one.
 void BasicCryptoResult.copyNotifications(CryptoResult<?> subResult)
           
 



Copyright © 2018 eHealth. All Rights Reserved.