summaryrefslogtreecommitdiffstats
path: root/base/ca
diff options
context:
space:
mode:
authorEndi Sukma Dewata <edewata@redhat.com>2012-04-05 14:49:11 -0500
committerEndi Sukma Dewata <edewata@redhat.com>2012-04-09 10:03:25 -0500
commit7c7b9d023cd466c1771068badc020dab36beb553 (patch)
tree178877eb83e25336be7577953945fbdb0b9e1a15 /base/ca
parentda1e6e2f49f66fd46c8039ff1aa4386309fba8f4 (diff)
downloadpki-7c7b9d023cd466c1771068badc020dab36beb553.tar.gz
pki-7c7b9d023cd466c1771068badc020dab36beb553.tar.xz
pki-7c7b9d023cd466c1771068badc020dab36beb553.zip
Removed whitespaces from Java code.
Whitespaces in Java code have been removed with the following command: find . -not -path .git -name *.java -exec sed -i 's/[[:blank:]]\+$//' {} \; Ticket #134
Diffstat (limited to 'base/ca')
-rw-r--r--base/ca/src/com/netscape/ca/CAPolicy.java4
-rw-r--r--base/ca/src/com/netscape/ca/CAService.java76
-rw-r--r--base/ca/src/com/netscape/ca/CMSCRLExtensions.java4
-rw-r--r--base/ca/src/com/netscape/ca/CRLIssuingPoint.java62
-rw-r--r--base/ca/src/com/netscape/ca/CRLWithExpiredCerts.java4
-rw-r--r--base/ca/src/com/netscape/ca/CertificateAuthority.java44
-rw-r--r--base/ca/src/com/netscape/ca/SigningUnit.java8
7 files changed, 101 insertions, 101 deletions
diff --git a/base/ca/src/com/netscape/ca/CAPolicy.java b/base/ca/src/com/netscape/ca/CAPolicy.java
index 4df28d344..fa41a961a 100644
--- a/base/ca/src/com/netscape/ca/CAPolicy.java
+++ b/base/ca/src/com/netscape/ca/CAPolicy.java
@@ -38,7 +38,7 @@ import com.netscape.cmscore.util.Debug;
* connectors.
* XXX2 moved to just implement IPolicy since GenericPolicyProcessor is
* unuseable for CA.
- *
+ *
* @deprecated
* @version $Revision$, $Date$
*/
@@ -90,7 +90,7 @@ public class CAPolicy implements IPolicy {
return true;
}
- /**
+ /**
*/
public PolicyResult apply(IRequest r) {
if (r == null) {
diff --git a/base/ca/src/com/netscape/ca/CAService.java b/base/ca/src/com/netscape/ca/CAService.java
index 62bae3b5f..919f01e96 100644
--- a/base/ca/src/com/netscape/ca/CAService.java
+++ b/base/ca/src/com/netscape/ca/CAService.java
@@ -119,7 +119,7 @@ public class CAService implements ICAService, IService {
public CAService(ICertificateAuthority ca) {
mCA = ca;
- // init services.
+ // init services.
mServants.put(
IRequest.ENROLLMENT_REQUEST,
new serviceIssue(this));
@@ -170,11 +170,11 @@ public class CAService implements ICAService, IService {
try {
// MOVED TO com.netscape.certsrv.apps.CMS
// java.security.Security.addProvider(new netscape.security.provider.CMS());
- // java.security.Provider pr = java.security.Security.getProvider("CMS");
+ // java.security.Provider pr = java.security.Security.getProvider("CMS");
// if (pr != null) {
// ;
- // }
- // else
+ // }
+ // else
// Debug.trace("Something is wrong in CMS install !");
java.security.cert.CertificateFactory cf = java.security.cert.CertificateFactory.getInstance("X.509");
@@ -282,20 +282,20 @@ public class CAService implements ICAService, IService {
RemoteAuthority remauthority =
new RemoteAuthority(host, port, uri, timeout);
- // Change end
+ // Change end
if (nickname == null)
nickname = mCA.getNickname();
// Changed by beomsuk
- //connector =
+ //connector =
// new HttpConnector(mCA, nickname, remauthority, resendInterval);
if (timeout == 0)
connector = new HttpConnector((IAuthority) mCA, nickname, remauthority, resendInterval, config);
else
connector =
new HttpConnector((IAuthority) mCA, nickname, remauthority, resendInterval, config, timeout);
- // Change end
+ // Change end
- // log(ILogger.LL_INFO, "remote authority "+
+ // log(ILogger.LL_INFO, "remote authority "+
// host+":"+port+" "+uri+" inited");
}
return connector;
@@ -346,19 +346,19 @@ public class CAService implements ICAService, IService {
// This function is called only from ConnectorServlet
- // serialize to request queue
+ // serialize to request queue
}
/**
* method interface for IService
* <P>
- *
+ *
* <ul>
* <li>signed.audit LOGGING_SIGNED_AUDIT_PRIVATE_KEY_ARCHIVE_REQUEST used whenever a user private key archive
* request is made. This is an option in a cert enrollment request detected by an RA or a CA, so, if selected, it
* should be logged immediately following the certificate request.
* </ul>
- *
+ *
* @param request a certificate enrollment request from an RA or CA
* @return true or false
*/
@@ -635,7 +635,7 @@ public class CAService implements ICAService, IService {
certi.get(X509CertInfo.KEY) == null) {
mCA.log(ILogger.LL_FAILURE, CMS.getLogMessage("CMSCORE_CA_MISSING_ATTR"));
- // XXX how do you reject a request in the service object ?
+ // XXX how do you reject a request in the service object ?
throw new ECAException(
CMS.getUserMessage("CMS_CA_MISSING_REQD_FIELDS_IN_CERTISSUE"));
}
@@ -647,8 +647,8 @@ public class CAService implements ICAService, IService {
}
// set default validity if not set.
- // validity would normally be set by policies or by
- // agent or by authentication module.
+ // validity would normally be set by policies or by
+ // agent or by authentication module.
CertificateValidity validity = (CertificateValidity)
certi.get(X509CertInfo.VALIDITY);
Date begin = null, end = null;
@@ -673,7 +673,7 @@ public class CAService implements ICAService, IService {
/*
* For non-CA certs, check if validity exceeds CA time.
- * If so, set to CA's not after if default validity
+ * If so, set to CA's not after if default validity
* exceeds ca's not after.
*/
@@ -787,12 +787,12 @@ public class CAService implements ICAService, IService {
CMS.getUserMessage("CMS_CA_MISSING_INFO_IN_RENEWREQ"));
}
} catch (CertificateException e) {
- // not possible
+ // not possible
mCA.log(ILogger.LL_FAILURE, CMS.getLogMessage("CMSCORE_CA_NO_ORG_SERIAL", e.getMessage()));
throw new ECAException(
CMS.getUserMessage("CMS_CA_MISSING_INFO_IN_RENEWREQ"));
} catch (IOException e) {
- // not possible.
+ // not possible.
mCA.log(ILogger.LL_FAILURE, CMS.getLogMessage("CMSCORE_CA_NO_ORG_SERIAL", e.getMessage()));
throw new ECAException(
CMS.getUserMessage("CMS_CA_MISSING_INFO_IN_RENEWREQ"));
@@ -868,8 +868,8 @@ public class CAService implements ICAService, IService {
boolean renewal, BigInteger oldSerialNo, String crmfReqId,
String challengePassword, String profileId) throws EBaseException {
// now store in repository.
- // if renewal, set the old serial number in the new cert,
- // set the new serial number in the old cert.
+ // if renewal, set the old serial number in the new cert,
+ // set the new serial number in the old cert.
CMS.debug("In storeX509Cert");
try {
@@ -1131,10 +1131,10 @@ public class CAService implements ICAService, IService {
/**
* Signed Audit Log
- *
+ *
* This method is called to store messages to the signed audit log.
* <P>
- *
+ *
* @param msg signed audit log message
*/
private void audit(String msg) {
@@ -1154,11 +1154,11 @@ public class CAService implements ICAService, IService {
/**
* Signed Audit Log Subject ID
- *
+ *
* This method is called to obtain the "SubjectID" for
* a signed audit log message.
* <P>
- *
+ *
* @return id string containing the signed audit log message SubjectID
*/
private String auditSubjectID() {
@@ -1190,11 +1190,11 @@ public class CAService implements ICAService, IService {
/**
* Signed Audit Log Requester ID
- *
+ *
* This method is called to obtain the "RequesterID" for
* a signed audit log message.
* <P>
- *
+ *
* @return id string containing the signed audit log message RequesterID
*/
private String auditRequesterID() {
@@ -1244,7 +1244,7 @@ class serviceIssue implements IServant {
public boolean service(IRequest request)
throws EBaseException {
- // XXX This is ugly. should associate attributes with
+ // XXX This is ugly. should associate attributes with
// request types, not policy.
// XXX how do we know what to look for in request ?
@@ -1256,7 +1256,7 @@ class serviceIssue implements IServant {
public boolean serviceX509(IRequest request)
throws EBaseException {
- // XXX This is ugly. should associate attributes with
+ // XXX This is ugly. should associate attributes with
// request types, not policy.
// XXX how do we know what to look for in request ?
X509CertInfo certinfos[] =
@@ -1293,14 +1293,14 @@ class serviceIssue implements IServant {
e.printStackTrace();
mCA.log(ILogger.LL_FAILURE,
CMS.getLogMessage("CMSCORE_CA_STORE_ERROR", Integer.toString(i), rid, e.toString()));
- ex = e; // save to throw later.
+ ex = e; // save to throw later.
break;
}
}
if (ex != null) {
for (int j = 0; j < i; j++) {
- // delete the stored cert records from the database.
- // we issue all or nothing.
+ // delete the stored cert records from the database.
+ // we issue all or nothing.
BigInteger serialNo =
((X509Certificate) certs[i]).getSerialNumber();
@@ -1400,7 +1400,7 @@ class serviceRenewal implements IServant {
continue;
}
- // check if cert has been revoked.
+ // check if cert has been revoked.
String certStatus = certRecord.getStatus();
if (certStatus.equals(ICertRecord.STATUS_REVOKED) ||
@@ -1425,7 +1425,7 @@ class serviceRenewal implements IServant {
mCA.getCertificateRepository().getX509Certificate(serial);
if (cert == null) {
- // something wrong
+ // something wrong
mCA.log(ILogger.LL_FAILURE,
CMS.getLogMessage("CMSCORE_CA_MISSING_RENEWED", serial.toString()));
svcerrors[i] = new ECAException(
@@ -1571,8 +1571,8 @@ class serviceCheckChallenge implements IServant {
public boolean service(IRequest request)
throws EBaseException {
- // note: some request attributes used below are set in
- // authentication/ChallengePhraseAuthentication.java :(
+ // note: some request attributes used below are set in
+ // authentication/ChallengePhraseAuthentication.java :(
BigInteger serialno = request.getExtDataInBigInteger("serialNumber");
String pwd = request.getExtDataInString(
CAService.CHALLENGE_PHRASE);
@@ -1681,14 +1681,14 @@ class serviceRevoke implements IServant {
throws EBaseException {
boolean sendStatus = true;
// XXX Need to think passing as array.
- // XXX every implemented according to servlet.
+ // XXX every implemented according to servlet.
RevokedCertImpl crlentries[] =
request.getExtDataInRevokedCertArray(IRequest.CERT_INFO);
if (crlentries == null ||
crlentries.length == 0 ||
crlentries[0] == null) {
- // XXX should this be an error ?
+ // XXX should this be an error ?
mCA.log(ILogger.LL_FAILURE,
CMS.getLogMessage("CMSCORE_CA_CRL_NOT_FOUND", request.getRequestId().toString()));
throw new ECAException(CMS.getUserMessage("CMS_CA_MISSING_INFO_IN_REVREQ"));
@@ -1992,7 +1992,7 @@ class serviceCert4Crl implements IServant {
public boolean service(IRequest request)
throws EBaseException {
// XXX Need to think passing as array.
- // XXX every implemented according to servlet.
+ // XXX every implemented according to servlet.
BigInteger revokedCertIds[] = request.getExtDataInBigIntegerArray(
IRequest.REVOKED_CERT_RECORDS);
if (revokedCertIds == null ||
@@ -2012,7 +2012,7 @@ class serviceCert4Crl implements IServant {
if (revokedCertRecs == null ||
revokedCertRecs.length == 0 ||
revokedCertRecs[0] == null) {
- // XXX should this be an error ?
+ // XXX should this be an error ?
mCA.log(ILogger.LL_FAILURE,
CMS.getLogMessage("CMSCORE_CA_CERT4CRL_NO_ENTRY", request.getRequestId().toString()));
throw new ECAException(CMS.getUserMessage("CMS_CA_MISSING_INFO_IN_CLAREQ"));
diff --git a/base/ca/src/com/netscape/ca/CMSCRLExtensions.java b/base/ca/src/com/netscape/ca/CMSCRLExtensions.java
index 94693d69a..bbb4e5f19 100644
--- a/base/ca/src/com/netscape/ca/CMSCRLExtensions.java
+++ b/base/ca/src/com/netscape/ca/CMSCRLExtensions.java
@@ -431,7 +431,7 @@ public class CMSCRLExtensions implements ICMSCRLExtensions {
}
public boolean isCRLExtensionEnabled(String extName) {
- return ((mCRLExtensionNames.contains(extName) || mCRLEntryExtensionNames.contains(extName)) &&
+ return ((mCRLExtensionNames.contains(extName) || mCRLEntryExtensionNames.contains(extName)) &&
mEnabledCRLExtensions.contains(extName));
}
@@ -610,7 +610,7 @@ public class CMSCRLExtensions implements ICMSCRLExtensions {
mCriticalCRLExtensions.remove(id);
}
}
- //Sync the onlyContainsCACerts with similar property in CRLIssuingPoint
+ //Sync the onlyContainsCACerts with similar property in CRLIssuingPoint
//called caCertsOnly.
if (name.equals(CMSIssuingDistributionPointExtension.PROP_CACERTS)) {
NameValuePairs crlIssuingPointPairs = null;
diff --git a/base/ca/src/com/netscape/ca/CRLIssuingPoint.java b/base/ca/src/com/netscape/ca/CRLIssuingPoint.java
index d4b747b32..e55c95cfd 100644
--- a/base/ca/src/com/netscape/ca/CRLIssuingPoint.java
+++ b/base/ca/src/com/netscape/ca/CRLIssuingPoint.java
@@ -92,7 +92,7 @@ import com.netscape.cmscore.util.Debug;
* parameter minUpdateInterval can be used to prevent CRL
* from being updated too often
* <P>
- *
+ *
* @author awnuk
* @author lhsiao
* @author galperin
@@ -415,7 +415,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
/**
* Initializes a CRL issuing point config.
* <P>
- *
+ *
* @param ca reference to CertificateAuthority instance which
* owns this issuing point.
* @param id string id of this CRL issuing point.
@@ -697,10 +697,10 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
mAutoUpdateInterval < mMinUpdateInterval)
mAutoUpdateInterval = mMinUpdateInterval;
- // get next update grace period
+ // get next update grace period
mNextUpdateGracePeriod = MINUTE * config.getInteger(Constants.PR_GRACE_PERIOD, 0);
- // Get V2 or V1 CRL
+ // Get V2 or V1 CRL
mAllowExtensions = config.getBoolean(Constants.PR_EXTENSIONS, false);
mIncludeExpiredCerts = config.getBoolean(Constants.PR_INCLUDE_EXPIREDCERTS, false);
@@ -718,13 +718,13 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
String algorithm = config.getString(Constants.PR_SIGNING_ALGORITHM, null);
if (algorithm != null) {
- // make sure this algorithm is acceptable to CA.
+ // make sure this algorithm is acceptable to CA.
mCA.getCRLSigningUnit().checkSigningAlgorithmFromName(algorithm);
mSigningAlgorithm = algorithm;
}
mPublishOnStart = config.getBoolean(PROP_PUBLISH_ON_START, false);
- // if publish dn is null then certificate will be published to
+ // if publish dn is null then certificate will be published to
// CA's entry in the directory.
mPublishDN = config.getString(PROP_PUBLISH_DN, null);
@@ -771,7 +771,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
return;
} catch (EBaseException e) {
// CRL was never set.
- // fall to the following..
+ // fall to the following..
}
if (crlRecord != null) {
@@ -892,7 +892,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
}
if (crlRecord == null) {
- // no crl was ever created, or crl in db is corrupted.
+ // no crl was ever created, or crl in db is corrupted.
// create new one.
try {
crlRecord = new CRLIssuingPointRecord(mId, BigInteger.ZERO, Long.valueOf(-1),
@@ -1248,7 +1248,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
/**
* Returns internal id of this CRL issuing point.
* <P>
- *
+ *
* @return internal id of this CRL issuing point
*/
public String getId() {
@@ -1258,7 +1258,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
/**
* Returns internal description of this CRL issuing point.
* <P>
- *
+ *
* @return internal description of this CRL issuing point
*/
public String getDescription() {
@@ -1267,7 +1267,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
/**
* Sets internal description of this CRL issuing point.
- *
+ *
* @param description description for this CRL issuing point.
*/
public void setDescription(String description) {
@@ -1278,7 +1278,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
* Returns DN of the directory entry where CRLs.from this issuing point
* are published.
* <P>
- *
+ *
* @return DN of the directory entry where CRLs are published.
*/
public String getPublishDN() {
@@ -1288,7 +1288,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
/**
* Returns signing algorithm.
* <P>
- *
+ *
* @return SigningAlgorithm.
*/
public String getSigningAlgorithm() {
@@ -1302,7 +1302,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
/**
* Returns current CRL generation schema for this CRL issuing point.
* <P>
- *
+ *
* @return current CRL generation schema for this CRL issuing point
*/
public int getCRLSchema() {
@@ -1312,7 +1312,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
/**
* Returns current CRL number of this CRL issuing point.
* <P>
- *
+ *
* @return current CRL number of this CRL issuing point
*/
public BigInteger getCRLNumber() {
@@ -1322,7 +1322,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
/**
* Returns current delta CRL number of this CRL issuing point.
* <P>
- *
+ *
* @return current delta CRL number of this CRL issuing point
*/
public BigInteger getDeltaCRLNumber() {
@@ -1332,7 +1332,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
/**
* Returns next CRL number of this CRL issuing point.
* <P>
- *
+ *
* @return next CRL number of this CRL issuing point
*/
public BigInteger getNextCRLNumber() {
@@ -1342,7 +1342,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
/**
* Returns number of entries in the CRL
* <P>
- *
+ *
* @return number of entries in the CRL
*/
public long getCRLSize() {
@@ -1352,7 +1352,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
/**
* Returns number of entries in delta CRL
* <P>
- *
+ *
* @return number of entries in delta CRL
*/
public long getDeltaCRLSize() {
@@ -1362,7 +1362,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
/**
* Returns last update time
* <P>
- *
+ *
* @return last CRL update time
*/
public Date getLastUpdate() {
@@ -1372,7 +1372,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
/**
* Returns next update time
* <P>
- *
+ *
* @return next CRL update time
*/
public Date getNextUpdate() {
@@ -1382,7 +1382,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
/**
* Returns next update time
* <P>
- *
+ *
* @return next CRL update time
*/
public Date getNextDeltaUpdate() {
@@ -1392,7 +1392,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
/**
* Returns all the revoked certificates from the CRL cache.
* <P>
- *
+ *
* @return set of all the revoked certificates or null if there are none.
*/
public Set<RevokedCertificate> getRevokedCertificates(int start, int end) {
@@ -1407,7 +1407,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
/**
* Returns certificate authority.
* <P>
- *
+ *
* @return certificate authority
*/
public ISubsystem getCertificateAuthority() {
@@ -1488,7 +1488,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
/**
* Finds next update time expressed as delay or time of the next update.
- *
+ *
* @param fromLastUpdate if true, function returns delay to the next update time
* otherwise returns the next update time.
* @param delta if true, function returns the next update time for delta CRL,
@@ -1756,7 +1756,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
Debug.printStackTrace(e);
}
}
- // put this here to prevent continuous loop if internal
+ // put this here to prevent continuous loop if internal
// db is down.
if (mDoLastAutoUpdate)
mDoLastAutoUpdate = false;
@@ -1784,8 +1784,8 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
*/
private void updateCRL() throws EBaseException {
/*
- if (mEnableUpdateFreq && mAutoUpdateInterval > 0 &&
- (System.currentTimeMillis() - mLastUpdate.getTime() <
+ if (mEnableUpdateFreq && mAutoUpdateInterval > 0 &&
+ (System.currentTimeMillis() - mLastUpdate.getTime() <
mMinUpdateInterval)) {
// log or alternatively throw an Exception
return;
@@ -1852,7 +1852,7 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
* This does not include expired certs.
* <i>Override this method to make a CRL other than the
* full/complete CRL.</i>
- *
+ *
* @return Enumeration of CertRecords to put into CRL.
* @exception EBaseException if an error occured in the database.
*/
@@ -2793,8 +2793,8 @@ public class CRLIssuingPoint implements ICRLIssuingPoint, Runnable {
/*
* The Session Context is a Hashtable, but without type information.
- * Suppress the warnings generated by adding to the session context
- *
+ * Suppress the warnings generated by adding to the session context
+ *
*/
protected void publishCRL(X509CRLImpl x509crl, boolean isDeltaCRL)
throws EBaseException {
diff --git a/base/ca/src/com/netscape/ca/CRLWithExpiredCerts.java b/base/ca/src/com/netscape/ca/CRLWithExpiredCerts.java
index 9ad619ff8..0fa835051 100644
--- a/base/ca/src/com/netscape/ca/CRLWithExpiredCerts.java
+++ b/base/ca/src/com/netscape/ca/CRLWithExpiredCerts.java
@@ -31,9 +31,9 @@ public class CRLWithExpiredCerts extends CRLIssuingPoint {
/**
* overrides getRevokedCerts in CRLIssuingPoint to include
* all revoked certs, including once that have expired.
- *
+ *
* @param thisUpdate parameter is ignored.
- *
+ *
* @exception EBaseException if an exception occured getting revoked
* certificates from the database.
*/
diff --git a/base/ca/src/com/netscape/ca/CertificateAuthority.java b/base/ca/src/com/netscape/ca/CertificateAuthority.java
index c8783f566..592f1557b 100644
--- a/base/ca/src/com/netscape/ca/CertificateAuthority.java
+++ b/base/ca/src/com/netscape/ca/CertificateAuthority.java
@@ -119,7 +119,7 @@ import com.netscape.cmsutil.ocsp.UnknownInfo;
* A class represents a Certificate Authority that is
* responsible for certificate specific operations.
* <P>
- *
+ *
* @author lhsiao
* @version $Revision$, $Date$
*/
@@ -132,7 +132,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori
protected IConfigStore mConfig = null;
protected ILogger mLogger = CMS.getLogger();
protected Hashtable<String, ICRLIssuingPoint> mCRLIssuePoints = new Hashtable<String, ICRLIssuingPoint>();
- protected CRLIssuingPoint mMasterCRLIssuePoint = null; // the complete crl.
+ protected CRLIssuingPoint mMasterCRLIssuePoint = null; // the complete crl.
protected SigningUnit mSigningUnit;
protected SigningUnit mOCSPSigningUnit;
protected SigningUnit mCRLSigningUnit;
@@ -286,7 +286,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori
/**
* Initializes this CA subsystem.
* <P>
- *
+ *
* @param owner owner of this subsystem
* @param config configuration of this subsystem
* @exception EBaseException failed to initialize this CA
@@ -299,7 +299,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori
mOwner = owner;
mConfig = config;
- // init cert & crl database.
+ // init cert & crl database.
initCaDatabases();
// init signing unit & CA cert.
@@ -374,8 +374,8 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori
// rely on this subsystem, so it has to be initialized)
initPublish();
- // Initialize CRL issuing points.
- // note CRL framework depends on DBS, CRYPTO and PUBLISHING
+ // Initialize CRL issuing points.
+ // note CRL framework depends on DBS, CRYPTO and PUBLISHING
// being functional.
initCRL();
@@ -624,7 +624,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori
/**
* Retrieves certificate repository.
* <P>
- *
+ *
* @return certificate repository
*/
public ICertificateRepository getCertificateRepository() {
@@ -634,7 +634,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori
/**
* Retrieves replica repository.
* <P>
- *
+ *
* @return replica repository
*/
public IReplicaIDRepository getReplicaRepository() {
@@ -655,7 +655,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori
/**
* Retrieves the CRL issuing point by id.
* <P>
- *
+ *
* @param id string id of the CRL issuing point
* @return CRL issuing point
*/
@@ -666,7 +666,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori
/**
* Enumerates CRL issuing points
* <P>
- *
+ *
* @return security service
*/
public Enumeration<ICRLIssuingPoint> getCRLIssuingPoints() {
@@ -855,7 +855,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori
/**
* Returns X500 name of the Certificate Authority
* <P>
- *
+ *
* @return CA name
*/
public X500Name getX500Name() {
@@ -873,7 +873,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori
/**
* Returns nickname of CA's signing cert.
* <p>
- *
+ *
* @return CA signing cert nickname.
*/
public String getNickname() {
@@ -883,7 +883,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori
/**
* Returns nickname of OCSP's signing cert.
* <p>
- *
+ *
* @return OCSP signing cert nickname.
*/
public String getOCSPNickname() {
@@ -893,7 +893,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori
/**
* Returns default signing unit used by this CA
* <P>
- *
+ *
* @return request identifier
*/
public ISigningUnit getSigningUnit() {
@@ -917,12 +917,12 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori
* If no algorithm is specified the CA's default signing algorithm
* is used.
* <P>
- *
+ *
* @param crl the CRL to be signed.
* @param algname the algorithm name to use. This is a JCA name such
* as MD5withRSA, etc. If set to null the default signing algorithm
* is used.
- *
+ *
* @return the signed CRL
*/
public X509CRLImpl sign(X509CRLImpl crl, String algname)
@@ -991,7 +991,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori
* Signs the given certificate info using specified signing algorithm
* If no algorithm is specified the CA's default algorithm is used.
* <P>
- *
+ *
* @param certInfo the certificate info to be signed.
* @param algname the signing algorithm to use. These are names defined
* in JCA, such as MD5withRSA, etc. If null the CA's default
@@ -1078,7 +1078,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori
* Sign a byte array using the specified algorithm.
* If algorithm is null the CA's default algorithm is used.
* <p>
- *
+ *
* @param data the data to be signed in a byte array.
* @param algname the algorithm to use.
* @return the signature in a byte array.
@@ -1090,7 +1090,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori
/**
* logs a message in the CA area.
- *
+ *
* @param level the debug level.
* @param msg the message to debug.
*/
@@ -1101,7 +1101,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori
/**
* Retrieves certificate chains of this CA.
- *
+ *
* @return this CA's cert chain.
*/
public CertificateChain getCACertChain() {
@@ -1161,7 +1161,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori
}
//////////
- // Initialization routines.
+ // Initialization routines.
//
/**
@@ -1351,7 +1351,7 @@ public class CertificateAuthority implements ICertificateAuthority, ICertAuthori
try {
mDefaultCertVersion = new CertificateVersion(version - 1);
} catch (IOException e) {
- // should never occur.
+ // should never occur.
}
int validity_in_days = mConfig.getInteger(PROP_DEF_VALIDITY, 2 * 365);
diff --git a/base/ca/src/com/netscape/ca/SigningUnit.java b/base/ca/src/com/netscape/ca/SigningUnit.java
index 85e3621d7..85ee1d482 100644
--- a/base/ca/src/com/netscape/ca/SigningUnit.java
+++ b/base/ca/src/com/netscape/ca/SigningUnit.java
@@ -51,7 +51,7 @@ import com.netscape.cmsutil.util.Cert;
/**
* CA signing unit based on JSS.
- *
+ *
* $Revision$ $Date$
*/
@@ -209,10 +209,10 @@ public final class SigningUnit implements ISigningUnit {
/**
* Check if the signing algorithm name is supported and valid for this
* signing unit's token and key.
- *
+ *
* @param algname a signing algorithm name from JCA.
* @return the mapped JSS signature algorithm object.
- *
+ *
* @exception EBaseException if signing algorithm is not supported.
*/
public SignatureAlgorithm checkSigningAlgorithmFromName(String algname)
@@ -263,7 +263,7 @@ public final class SigningUnit implements ISigningUnit {
signAlg = checkSigningAlgorithmFromName(algname);
}
- // XXX use a pool of signers based on alg ?
+ // XXX use a pool of signers based on alg ?
// XXX Map algor. name to id. hack: use hardcoded define for now.
CMS.debug(
"Getting algorithm context for " + algname + " " + signAlg);