| Package | Description |
|---|---|
| be.fgov.ehealth.etee.crypto.decrypt |
Classes for validation and unsealing of sealed message.
|
| be.fgov.ehealth.etee.crypto.encrypt |
Classes for sealing of message and validation of ETKs.
|
| be.fgov.ehealth.etee.crypto.policies |
Contains supported policies and options for configuration of the crypto services.
|
| Modifier and Type | Method and Description |
|---|---|
CryptoResult<UnsealedData> |
DataUnsealer.unseal(byte[] data,
javax.crypto.SecretKey kek,
SigningCredential... signers)
Unseals the data using the given Key Encryption Key and validate the signature using the given signer credential(s).
|
CryptoResult<UnsealedData> |
DataUnsealer.unseal(byte[] data,
SigningCredential... signers)
Unseals the data using the private keys that were provided to the DataUnsealerFactory when this DataUnsealer was created and validate
the signature using the given signer credential(s).
|
CryptoResult<UnsealedData> |
DataUnsealer.unseal(java.io.InputStream sealedData,
java.io.OutputStream unsealedData,
javax.crypto.SecretKey kek,
SigningCredential... signers)
Unseals the data using the given Key Encryption Key and validate the signature using the given signer credential(s).
|
CryptoResult<UnsealedData> |
DataUnsealer.unseal(java.io.InputStream sealedData,
java.io.OutputStream unsealedData,
SigningCredential... signers)
Unseals the data using the private keys that were provided to the DataUnsealerFactory when this DataUnsealer was created and validate
the signature using the given signer credential(s).
|
CryptoResult<UnsealedData> |
DataSealChecker.validate(byte[] data,
SigningCredential... signers)
Verify if the sealed data is acceptable according to specified policies (ocsp, signing, encryption).
Different levels of notifications can be added to the result (warning, error, fatal). Additional data from the result can be used for further verifications. If credential(s) of a signer are given, message must be signed with one of the given credentials. |
CryptoResult<UnsealedData> |
DataSealChecker.validate(java.io.InputStream data,
java.io.OutputStream verifiedData,
DataPipe pipe,
SigningCredential... signers)
Verify if the sealed data is acceptable according to specified policies (ocsp, signing, encryption).
Different levels of notifications can be added to the result (warning, error, fatal). Additional data from the result can be used for further verifications. If credential(s) of a signer are given, message must be signed with one of the given credentials. |
CryptoResult<UnsealedData> |
DataSealChecker.validate(java.io.InputStream data,
java.io.OutputStream verifiedData,
SigningCredential... signers)
Verify if the sealed data is acceptable according to specified policies (ocsp, signing, encryption).
Different levels of notifications can be added to the result (warning, error, fatal). Additional data from the result can be used for further verifications. If credential(s) of a signer are given, message must be signed with one of the given credentials. |
| Modifier and Type | Method and Description |
|---|---|
DataSealerBuilder.PublicKeyEncryptionPolicyStep |
DataSealerBuilder.SigningPolicyStep.addSigningPolicy(SigningPolicy policy,
SigningCredential signingCredential)
Same credential for both inner and outer signatures
|
DataSealerBuilder.PublicKeyEncryptionPolicyStep |
DataSealerBuilder.SigningPolicyStep.addSigningPolicy(SigningPolicy policy,
SigningCredential signingCredential,
SigningCredential authCredential)
Different credential for inner and outer signatures
|
| Modifier and Type | Method and Description |
|---|---|
static SigningCredential |
SigningCredential.create(java.util.List<java.security.cert.X509Certificate> certificateChain)
Create a new
SigningCredential with a certificate(chain) to verify if messages are signed by an expected signer. |
static SigningCredential |
SigningCredential.create(java.security.PrivateKey privateKey,
java.util.List<java.security.cert.X509Certificate> certificateChain)
Create a new
SigningCredential with a PrivateKey and a list of certificates to sign messages with a certified public
key. |
static SigningCredential |
SigningCredential.create(java.security.PrivateKey privateKey,
java.lang.String subjectKeyIdentifier)
Create a new
SigningCredential with a PrivateKey and a subject's key id to sign messages with a registered public
key. |
static SigningCredential |
SigningCredential.create(java.security.PrivateKey privateKey,
java.security.cert.X509Certificate... certificateChain)
Create a new
SigningCredential with a PrivateKey and a dynamic list of certificates. |
static SigningCredential |
SigningCredential.create(java.lang.String subjectKeyIdentifier,
java.security.PublicKey publicKey)
Create a new
SigningCredential with a key id and registered public key to validate signed messages. |
static SigningCredential |
SigningCredential.create(java.security.cert.X509Certificate... certificateChain)
Create a new
SigningCredential with a certificate(chain) to verify if messages are signed by an expected signer. |
| Modifier and Type | Method and Description |
|---|---|
static KeyType |
KeyType.from(SigningCredential signingCredential) |
Copyright © 2021 eHealth. All rights reserved.