|
||||||||||
| PREV NEXT | FRAMES NO FRAMES | |||||||||
| Packages that use CryptoResult | |
|---|---|
| be.fgov.ehealth.etee.crypto.cert | Classes for validation of a certificate path. |
| be.fgov.ehealth.etee.crypto.crl | Classes to validate revocation status of a certificate using CRL. |
| be.fgov.ehealth.etee.crypto.decrypt | Classes for validation and unsealing of sealed message. |
| be.fgov.ehealth.etee.crypto.encrypt | Classes for sealing of message and validation of ETKs. |
| be.fgov.ehealth.etee.crypto.ocsp | Classes to validate revocation status of a certificate using OCSP (Online Certificate Status Protocol). |
| be.fgov.ehealth.etee.crypto.status | Contains result objects and possible notifications. |
| Uses of CryptoResult in be.fgov.ehealth.etee.crypto.cert |
|---|
| Methods in be.fgov.ehealth.etee.crypto.cert that return CryptoResult | |
|---|---|
CryptoResult<CertificateStatus> |
CertPathChecker.validate(java.util.List<java.security.cert.X509Certificate> certificateChain)
|
CryptoResult<CertificateStatus> |
CertPathChecker.validate(java.util.List<java.security.cert.X509Certificate> certificateChain,
java.util.Date validationDate)
|
| Uses of CryptoResult in be.fgov.ehealth.etee.crypto.crl |
|---|
| Methods in be.fgov.ehealth.etee.crypto.crl that return CryptoResult | |
|---|---|
CryptoResult<CRLData> |
CRLChecker.validate(java.security.cert.X509Certificate cert)
Extracts the CRL distribution points from the certificate (if available) and checks the certificate revocation status against the CRLs coming from the distribution points. |
CryptoResult<CRLData> |
CRLChecker.validate(java.security.cert.X509Certificate cert,
java.security.cert.CertStore certStore)
Extracts the CRL distribution points from the certificate (if available) and checks the certificate revocation status against the CRLs coming from the distribution points. |
| Uses of CryptoResult in be.fgov.ehealth.etee.crypto.decrypt |
|---|
| Methods in be.fgov.ehealth.etee.crypto.decrypt that return CryptoResult | |
|---|---|
CryptoResult<UnsealedData> |
DataSealChecker.stamp(byte[] data,
byte[] timestamp)
Puts a timestamp on sealed data to prove that it existed in that state on a certain moment in time. |
CryptoResult<UnsealedData> |
DataSealChecker.stamp(java.io.InputStream data,
java.io.OutputStream stampedData,
byte[] timestamp)
Puts a timestamp on sealed data to prove that it existed in that state on a certain moment in time. |
CryptoResult<UnsealedData> |
DataSealChecker.stamp(java.io.InputStream data,
java.io.OutputStream stampedData,
byte[] timestamp,
DataPipe pipe)
Puts a timestamp on sealed data to prove that it existed in that state on a certain moment in time. The updated sealed message will be written into the given outputstream. |
CryptoResult<UnsealedData> |
DataUnsealer.unseal(byte[] data)
Unseals the data using the private keys that were provided to the DataUnsealerFactory when this DataUnsealer was created. |
CryptoResult<UnsealedData> |
DataUnsealer.unseal(byte[] data,
javax.crypto.SecretKey kek)
Unseals the data using the given Key Encryption Key. |
CryptoResult<UnsealedData> |
DataUnsealer.unseal(java.io.InputStream sealedData,
java.io.OutputStream unsealedData)
Unseals the data using the private keys that were provided to the DataUnsealerFactory when this DataUnsealer was created. |
CryptoResult<UnsealedData> |
DataUnsealer.unseal(java.io.InputStream sealedData,
java.io.OutputStream unsealedData,
javax.crypto.SecretKey kek)
Unseals the data using the given Key Encryption Key. |
CryptoResult<UnsealedData> |
DataSealChecker.validate(byte[] data)
Verify if the sealed data is acceptable according to specified policies (ocsp, signing, encryption). Different levels of notifications can be added to the result (warning, error, fatal). Additional data from the result can be used for further verifications. |
CryptoResult<UnsealedData> |
DataSealChecker.validate(java.io.InputStream data,
java.io.OutputStream verifiedData)
Verify if the sealed data is acceptable according to specified policies (ocsp, signing, encryption). Different levels of notifications can be added to the result (warning, error, fatal). Additional data from the result can be used for further verifications. |
CryptoResult<UnsealedData> |
DataSealChecker.validate(java.io.InputStream data,
java.io.OutputStream verifiedData,
DataPipe pipe)
Verify if the sealed data is acceptable according to specified policies (ocsp, signing, encryption). Different levels of notifications can be added to the result (warning, error, fatal). Additional data from the result can be used for further verifications. |
| Uses of CryptoResult in be.fgov.ehealth.etee.crypto.encrypt |
|---|
| Methods in be.fgov.ehealth.etee.crypto.encrypt that return CryptoResult | |
|---|---|
CryptoResult<EncryptionToken> |
EncryptionTokenChecker.validate(EncryptionToken encryptionToken)
|
| Uses of CryptoResult in be.fgov.ehealth.etee.crypto.ocsp |
|---|
| Methods in be.fgov.ehealth.etee.crypto.ocsp that return CryptoResult | |
|---|---|
CryptoResult<OCSPData> |
OCSPChecker.validate(java.security.cert.X509Certificate certificate)
|
CryptoResult<OCSPData> |
OCSPChecker.validate(java.security.cert.X509Certificate certificate,
java.util.Date signingTime,
RevocationValues revocationValues)
|
| Uses of CryptoResult in be.fgov.ehealth.etee.crypto.status |
|---|
| Classes in be.fgov.ehealth.etee.crypto.status that implement CryptoResult | |
|---|---|
class |
BasicCryptoResult<T>
Basic implementation for status. |
| Methods in be.fgov.ehealth.etee.crypto.status with parameters of type CryptoResult | |
|---|---|
void |
CryptoResult.copyNotifications(CryptoResult<?> subResult)
Copies notifications of subresults to this one. |
void |
BasicCryptoResult.copyNotifications(CryptoResult<?> subResult)
|
|
||||||||||
| PREV NEXT | FRAMES NO FRAMES | |||||||||