org.bouncycastle.asn1.x509.ExtendedKeyUsage.hasKeyPurposeId()方法的使用及代码示例

x33g5p2x  于2022-01-19 转载在 其他  
字(2.7k)|赞(0)|评价(0)|浏览(93)

本文整理了Java中org.bouncycastle.asn1.x509.ExtendedKeyUsage.hasKeyPurposeId()方法的一些代码示例,展示了ExtendedKeyUsage.hasKeyPurposeId()的具体用法。这些代码示例主要来源于Github/Stackoverflow/Maven等平台,是从一些精选项目中提取出来的代码,具有较强的参考意义,能在一定程度帮忙到你。ExtendedKeyUsage.hasKeyPurposeId()方法的具体详情如下:
包路径:org.bouncycastle.asn1.x509.ExtendedKeyUsage
类名称:ExtendedKeyUsage
方法名:hasKeyPurposeId

ExtendedKeyUsage.hasKeyPurposeId介绍

[英]Return true if this ExtendedKeyUsage object contains the passed in keyPurposeId.
[中]如果此ExtendedKeyUsage对象包含传入的keyPurposeId,则返回true。

代码示例

代码示例来源:origin: org.codeartisans.qipki/qipki-crypto

@Override
@SuppressWarnings( "SetReplaceableByEnumSet" )
public Set<ExtendedKeyUsage> getExtendedKeyUsages( X509Certificate cert )
{
  try {
    byte[] value = cert.getExtensionValue( X509Extensions.ExtendedKeyUsage.getId() );
    if ( value == null ) {
      return Collections.emptySet();
    }
    byte[] asn1octets = ( ( ASN1OctetString ) ASN1Object.fromByteArray( value ) ).getOctets();
    org.bouncycastle.asn1.x509.ExtendedKeyUsage usages = org.bouncycastle.asn1.x509.ExtendedKeyUsage.getInstance( ( ASN1Sequence ) ASN1Sequence.fromByteArray( asn1octets ) );
    Set<ExtendedKeyUsage> keyUsages = new LinkedHashSet<ExtendedKeyUsage>();
    for ( ExtendedKeyUsage eachPossible : ExtendedKeyUsage.values() ) {
      if ( usages.hasKeyPurposeId( eachPossible.getKeyPurposeId() ) ) {
        keyUsages.add( eachPossible );
      }
    }
    return keyUsages;
  } catch ( IOException ex ) {
    throw new CryptoFailure( "Unable to extract ExtendedKeyUsages from X509Certificate extensions", ex );
  }
}

代码示例来源:origin: org.xipki/ca-server

private static void addRequestedExtKeyusage(List<ASN1ObjectIdentifier> usages,
  Extensions requestedExtensions, Set<ExtKeyUsageControl> usageOccs) {
 Extension extension = requestedExtensions.getExtension(Extension.extendedKeyUsage);
 if (extension == null) {
  return;
 }
 ExtendedKeyUsage reqKeyUsage = ExtendedKeyUsage.getInstance(extension.getParsedValue());
 for (ExtKeyUsageControl k : usageOccs) {
  if (k.isRequired()) {
   continue;
  }
  if (reqKeyUsage.hasKeyPurposeId(KeyPurposeId.getInstance(k.getExtKeyUsage()))) {
   usages.add(k.getExtKeyUsage());
  }
 }
} // method addRequestedExtKeyusage

代码示例来源:origin: org.xipki.pki/ca-qa

extension.getParsedValue());
for (ExtKeyUsageControl k : optionalExtKeyusage) {
  if (reqKeyUsage.hasKeyPurposeId(KeyPurposeId.getInstance(k.extKeyUsage()))) {
    expectedUsages.add(k.extKeyUsage().getId());

代码示例来源:origin: be.fedict.jtrust/jtrust-lib

.getInstance(asn1InputStream.readObject());
if (false == extendedKeyUsage
    .hasKeyPurposeId(KeyPurposeId.id_kp_codeSigning)) {
  throw new TrustLinkerResultException(
      TrustLinkerResultReason.CONSTRAINT_VIOLATION,

代码示例来源:origin: poreid/poreid

if (!ExtendedKeyUsage.fromExtensions(certHolder.getExtensions()).hasKeyPurposeId(KeyPurposeId.id_kp_OCSPSigning)){
  throw new OCSPValidationException("Certificado não contém extensão necessária (id_kp_OCSPSigning)");

相关文章